ACE - Command Referrence
ACE - Command Referrence
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCDE, CCVP, Cisco Eos, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and
Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the
Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without
Limitation, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient,
IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise,
The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United
States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0801R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Preface xxi
Audience xxi
changeto 2-4
checkpoint 2-5
clear 2-6
clear access-list 2-8
clear accounting log 2-9
clear arp 2-10
clear buffer stats 2-11
clear capture 2-12
clear conn 2-13
clear cores 2-14
clear debug-logfile 2-15
clear fifo stats 2-16
clear ft 2-17
clear icmp statistics 2-18
clear interface 2-19
clear ip 2-20
clear line 2-21
clear logging 2-22
clear netio stats 2-23
clear ntp statistics 2-24
clear probe 2-25
clear processes log 2-26
clear rserver 2-27
clear rtcache 2-28
clear screen 2-29
clear serverfarm 2-30
clear service-policy 2-31
clear ssh 2-32
clear startup-config 2-33
clear stats 2-34
clear sticky database 2-35
clear tcp statistics 2-36
clear telnet 2-37
clear udp statistics 2-38
clear user 2-39
clear vnet stats 2-40
clear xlate 2-41
clock set 2-42
configure 2-43
copy capture 2-44
CLI COMMAND
SUMMARY BY
MODE
Audience
This guide is intended for the following trained and qualified service personnel who are responsible for
configuring the ACE:
• Web master
• System administrator
• System operator
Chapter Description
Chapter 1, Using the Describes how to use the command-line interface
Command-Line (CLI) on the ACE.
Interface
Chapter 2, CLI Provides detailed information for the following types
Commands of CLI commands for the ACE:
• Commands that you can enter after you log in to
the ACE.
• Configuration mode commands that allow you to
access global configuration mode and its subset of
modes after you log in to the ACE.
Related Documentation
In addition to this document, the ACE documentation set includes the following:
Convention Description
boldface font Commands, command options, and keywords are in boldface. Bold text also
indicates a command in a paragraph.
italic font Arguments for which you supply values are in italics. Italic text also indicates
the first occurrence of a new term, book title, emphasized text.
{ } Encloses required arguments and keywords.
[ ] Encloses optional arguments and keywords.
{x|y|z} Required alternative keywords are grouped in braces and separated by vertical
bars.
[x|y|z] Optional alternative keywords are grouped in brackets and separated by
vertical bars.
string A nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
Convention Description
screen font Terminal sessions and information the system displays are in screen font.
boldface screen Information you must enter in a command line is in boldface screen font.
font
italic screen font Arguments for which you supply values are in italic screen font.
^ The symbol ^ represents the key labeled Control—for example, the key
combination ^D in a screen display means hold down the Control key while
you press the D key.
< > Nonprinting characters, such as passwords are in angle brackets.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
publication.
Caution Means reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Warning Means possible physical harm or equipment damage. A warning describes an action that could cause
you physical harm or damage the equipment.
For additional information about CLI syntax formatting, see Chapter 1, Using the Command-Line
Interface.
License Issues
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the
original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses
are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact
openssl-core@openssl.org.
OpenSSL License:
© 1998-1999 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and
the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgment: “This product includes software developed by the OpenSSL Project for use in the
OpenSSL Toolkit. (http://www.openssl.org/)”
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote
products derived from this software without prior written permission. For written permission, please
contact openssl-core@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in
their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
“This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
(http://www.openssl.org/)”
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS”' AND ANY EXPRESSED OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product
includes software written by Tim Hudson (tjh@cryptsoft.com).
The command-line interface (CLI) is a line-oriented user interface that provides commands for
configuring, managing, and monitoring the Cisco 4700 Series Application Control Engine (ACE)
appliance. This chapter contains the following topics:
• Accessing the ACE Command Modes
• Using the CLI Commands
• Getting CLI Help
• Creating Configuration Files Using a Text Editor
Note The CLI uses similar syntax and other conventions to the Cisco IOS CLI, but the ACE operating system
is not a version of Cisco IOS software. Do not assume that a Cisco IOS CLI command works or has the
same function with the ACE.
If you log in as a user context (for example, you log in as user context C1), the following prompt appears:
switch/C1#
Exec mode has a set of commands that allow you to maintain the ACE and access configuration mode.
To access configuration mode, use the configure command. This mode is identified by a (config) prompt.
For example:
switch/Admin# configure
switch/Admin(config)#
Configuration mode has a set of commands that allow you to configure the ACE and access its
subordinate configuration modes. When you access any of the subordinate configuration modes, the
ACE appends the mode name to the (config) prompt. For example, when you access real server host
configuration mode from configuration mode, the prompt changes to (config-rserver-host).
To exit a configuration mode and access the previous mode, use the exit command. To exit any
configuration mode and return to Exec mode, press Ctrl-Z or use the end command.
Figure 1-1 shows the modes that you can access from configuration mode and their associated prompts.
Abbreviating Commands
The ACE allows you to abbreviate most command keywords or options to its fewest unique characters.
For example, instead of entering the full write terminal command, you can enter:
host/Admin# w t
Generating configuration....
• Scripts
• Sticky groups
The objects that you create are specific to the context where they are created. If the context is partitioned
into multiple domains, you allocate objects within each domain.
The ACE supports case sensitivity when you configure an object name. If you create a context named
C11 and another context c11, the ACE considers them as two different contexts. For example, enter:
host/Admin(config)# context C11
host/Admin(config-context)# exit
host/Admin(config)# context c11
host/Admin(config-context)# exit
When you perform a query for contexts, both C11 and c11 appear as separate contexts.
host/Admin(config)# context ?
<WORD> Enter the context name (Max Size - 64)
C11
c11
do exec_command_string
The exec_command_string argument is the Exec mode command that you want to execute.
For example, to display the running configuration in configuration mode, enter:
host1/Admin(config)# do show running-config
The following example shows the CLI response when you enter an incomplete command:
host1/Admin(config)# interface
^
% incomplete command detected at ‘^’ marker.
Pressing the Tab key or Ctrl-I keys also completes an option up to the point where it is unique. If multiple
commands have the same abbreviation that you entered, the CLI lists all of these commands.
In the text configuration file, you are not prompted to enter commands, so the prompt is omitted:
resource-class abc
Subordinate Commands
Subordinate commands appear indented under the main command when entered at the command line.
Your text file lines do not need to be indented, as long as the subcommands appear directly following
the main command. For example, the following unindented text is read the same as indented text:
resource-class abc
limit-resource all minimum 0.00 maximum unlimited
limit-resource rate syslog minimum 0.00 maximum unlimited
Line Order
For the most part, commands can be in any order in the file. However, some lines, such as entries for
access control lists (ACLs), are processed in the order that they appear, and the order can affect the
function of the ACL. Other commands might also have order requirements. For example, you must enter
the interface vlan command for an interface before you assign an IP address to it because many
subsequent commands use the name of the interface. Also, subcommands must directly follow the main
command.
Passwords
The user password is automatically encrypted before it is stored in the configuration. For example, the
encrypted form of the letmein password might look like jMorNbK0514fadBh. You can copy the
configuration passwords to another ACE in their encrypted form, but you cannot unencrypt the
passwords yourself.
If you enter an unencrypted password in a text file, the ACE does not automatically encrypt them when
you copy the configuration to the ACE. The ACE encrypts them only when you save the
running configuration from the command line using the copy running-config startup-config or write
memory command.
This chapter provides detailed information for the following types of CLI commands for the Cisco 4700
Series Application Control Engine (ACE) appliance:
• Commands that you can enter after you log in to the ACE.
• Configuration mode commands that allow you to access configuration mode and its subset of modes
after you log in to the ACE.
The description of each command includes the following:
• The syntax of the command
• Any related commands, when appropriate
capture
To enable the context packet capture function for packet sniffing and network fault isolation, use the
capture command. As part of the packet capture process, you specify whether to capture packets from
all interfaces or an individual VLAN interface.
capture buffer_name {{all | {interface vlan number}} access-list name [bufsize buf_size
[circular-buffer]]} | remove | start | stop
Syntax Description buffer_name Name of the packet capture buffer. The buffer_name argument associates the packet
capture with a name. Specify a text string from 1 to 80 alphanumeric characters.
all Specifies that packets from all input interfaces are captured.
interface Specifies a particular input interface from which to capture packets.
vlan number Specifies the VLAN identifier associated with the interface.
access-list name Selects packets to capture based on a specific access list. A packet must pass the
access list filters before the packet is stored in the capture buffer. Specify a
previously created access list identifier. Enter an unquoted text string with a
maximum of 64 characters.
Note Ensure that the access list is for an input interface; input is considered with
regards to the direction of the session that you wish to capture. If you
configure the packet capture on the output interface, the ACE will fail to
match any packets.
bufsize buf_size (Optional) Specifies the buffer size, in kilobytes (KB), used to store the packet
capture. The range is from 1 to 5000 KB.
circular-buffer (Optional) Enables the packet capture buffer to overwrite itself, starting from the
beginning, when the buffer is full.
remove Clears the packet capture configuration.
start Starts the packet capture function. The packet capture function automatically stops
when the buffer is full unless you enable the circular buffer function.
stop Stops the packet capture function.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The packet capture function enables access control lists (ACLs) to control which packets are captured
by the ACE on the input interface. If the ACLs are selecting an excessive amount of traffic for the packet
capture operation, the ACE will see a heavy load, which can cause a degradation in performance. We
recommend that you avoid using the packet capture function when high network performance is critical.
The capture packet function works on an individual context basis. The ACE traces only the packets that
belong to the context where you execute the capture command. You can use the context ID, which is
passed with the packet, to isolate packets that belong to a specific context. To trace the packets for a
single specific context, use the changeto command and enter the capture command for the new context.
The ACE does not automatically save the packet capture in a configuration file. To copy the capture
buffer information as a file in Flash memory, use the copy capture command.
changeto
To move from one context on the ACE to another context, use the changeto command.
changeto context_name
Syntax Description context_name Name of an existing context. This argument is case sensitive.
Usage Guidelines This command requires the changeto feature in your user role (as found in all of the predefined user
roles). For details about role-based access control (RBAC) and user roles, see the Cisco 4700 Series
Application Control Engine Appliance Virtualization Configuration Guide.
Only users authorized in the admin context can use the changeto command to navigate between the
various contexts. Context administrators, who have access to multiple contexts, must explicitly log in to
the other contexts to which they have access.
The command prompt indicates the context that you are currently in (see the following example).
Examples To change from the Admin context to the context CTX1, enter:
host1/Admin# changeto CTX1
host1/CTX1#
checkpoint
To create or modify a checkpoint (snapshot) of the running configuration, use the checkpoint command.
Syntax Description create Creates a new checkpoint with the value of name.
delete Deletes the existing checkpoint with the value of name.
rollback Reverts back to the checkpoint with the value of name.
name Name of a new or existing checkpoint. Specify a text string from 1 to
64 alphanumeric characters (no spaces).
Usage Guidelines This command requires the Admin role. For details about role-based access control (RBAC) and user
roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
clear
To clear specific context logs and buffers of their statistics and monitoring history, use one of the
following clear commands:
clear access-list Clears access control list (ACL) statistics.
clear accounting log Clears the accounting log.
clear arp Clears the Address Resolution Protocol (ARP) table entries or statistics.
clear buffer stats Clears the control plane buffer statistics.
clear capture Clears an existing capture buffer.
clear conn Clears a connection that passes through, terminates, or originates with the
ACE.
clear cores Clears all core dumps.
clear debug-logfile Removes a debug log file.
clear fifo stats Clears the first in, first out (FIFO) statistics.
clear ft Clears the fault-tolerant statistics.
clear icmp statistics Clears the Internet Control Message Protocol (ICMP) statistics.
clear interface Clears the interface statistics.
clear ip Clears the IP and Dynamic Host Configuration Protocol (DHCP) relay
statistics.
clear line Clears a specified virtual terminal (VTY) session.
clear logging Clears information stored in the logging buffer.
clear netio stats Clears the control plane network I/O statistics.
clear ntp statistics Clears the Network Time Protocol (NTP) statistics.
clear probe Clears probe statistics.
clear processes log Clears processes log statistics.
clear rserver Clears the real server statistics.
clear rtcache Clears the route cache.
clear screen Clears the display screen.
clear serverfarm Clear the server farm statistics.
clear service-policy Clears the service policy statistics.
clear ssh Clears a Secure Shell (SSH) session or clears the public keys of all SSH
hosts.
clear startup-config Clears the startup configuration of the current context.
clear stats Clears the statistical information stored in the ACE buffer.
clear sticky database Clears all sticky database entries for the context or a specified sticky group.
clear tcp statistics Clears the TCP statistics.
clear telnet Clears a Telnet session.
clear udp statistics Clears the UDP statistics.
clear user Clears a user session.
clear vnet stats Clears the virtual network device (VNET) statistics.
clear xlate Clears the global address to the local address mapping information based on
the global address, global port, local address, local port, interface address
as global address, and Network Address Translation (NAT) type.
Usage Guidelines The features required in your user role to execute a specific clear command are described in the “Usage
Guidelines” section of the command. For details about role-based access control (RBAC) and user roles,
see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide.
If you configure redundancy, then you need to explicitly clear the statistics on both the active and the
standby ACEs. Clearing the statistics on the active appliance will not clear the statistics on the standby
appliance.
clear access-list
To clear access control list (ACL) statistics, use the clear access-list command.
Usage Guidelines This command requires the access-list feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
clear arp
To clear the Address Resolution Protocol (ARP) entries in the ARP table or statistics with ARP
processes, use the clear arp command.
Syntax Description no-refresh (Optional) Removes the learned ARP entries from the ARP table without
refreshing the ARP entries.
statistics (Optional) Clears ARP statistics counters globally or for the specified interface,
[interface_name] interface_name.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
If you enter the clear arp command with no option, it clears all learned ARP entries and then refreshes
the ARP entries.
To clear the ARP learned entries and then refresh the ARP entries, enter:
host1/Admin# clear arp
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
clear capture
To clear an existing capture buffer, use the clear capture command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Use the dir command to view the capture files that you copied to the disk0: file system using the copy
capture command.
clear conn
To clear a connection that passes through, terminates, or originates with the ACE, use the clear conn
command.
clear conn [all | flow {prot_number | icmp | tcp | udp {source_ip | source_port | dest_ip |
dest_port}} | rserver name]
Syntax Description all (Optional) Clears all connections that go through the ACE, originate with the ACE,
or terminate with the ACE.
flow (Optional) Clears the connection that matches the specified flow descriptor.
prot_number Protocol number of the flow.
icmp Specifies the flow types using ICMP.
tcp Specifies the flow types using TCP.
udp Specifies the flow types using UDP.
source_ip Source IP address of the flow. Enter an IP address in dotted-decimal notation (for
example, 172.27.16.10).
source_port Source port of the flow.
dest_ip Destination IP address of the flow. Enter an IP address in dotted-decimal notation
(for example, 172.27.16.10).
dest_port Destination port of the flow.
rserver name (Optional) Clears all connections to the specified real server.
Usage Guidelines This command requires the loadbalance, inspect, NAT, connection, or SSL feature in your user role. For
details about role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application
Control Engine Appliance Virtualization Configuration Guide.
To clear only the connections that go through the ACE (flows that pass through the ACE between the
originating network host and the terminating network host), use the clear conn command without any
keywords. When you do not include any keywords, the connections that terminate or originate with the
ACE are not cleared.
Examples To clear the connections for the real server RSERVER1, enter:
host1/Admin# clear conn rserver RSERVER1
clear cores
To clear all of the core dumps stored in the core: file system, use the clear cores command.
clear cores
Usage Guidelines This command requires the Admin role. For details about role-based access control (RBAC) and user
roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
Note The ACE creates a core dump when it experiences a fatal error. Core dump information is for Cisco
Technical Assistance Center (TAC) use only. We recommend that you contact TAC for assistance in
interpreting the information in the core dump.
To view the list of core files in the core: file system, use the dir core: command.
To save a copy of a core dump to a remote server before clearing it, use the copy capture command.
To delete a specific core dump file from the core: file system, use the delete core: command.
clear debug-logfile
To remove a debug log file, use the clear debug-logfile command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The ACE debug commands are intended for use by trained Cisco personnel only. Entering these
commands may cause unexpected results. Do not attempt to use these commands without guidance from
Cisco support personnel.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
clear ft
To clear the fault-tolerant (FT) statistics, use the clear ft stats command.
Usage Guidelines This command requires the fault-tolerant feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
clear interface
To clear the interface statistics, use the clear interface command.
Syntax Description bvi number (Optional) Clears the statistics for the specified Bridge Group Virtual Interface
(BVI).
vlan number (Optional) Clears the statistics for the specified VLAN.
gigabitEthernet (Optional) Clears the statistics for the specified Gigabit Ethernet slot and port.
slot_number/
• The slot_number represents the physical slot on the ACE containing the
port_number
Ethernet ports. This selection is always 1.
• The port_number represents the physical Ethernet port on the ACE. Valid
selections are 1 through 4.
This keyword is available in the Admin context only.
Usage Guidelines This command requires the interface feature in your user role. In addition, the Ethernet data port
interface command requires the Admin user role. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To clear all of the interface statistics, enter the clear interface command without using the optional
keywords.
Examples To clear all of the interface statistics for VLAN 212, enter:
host1/Admin# clear interface vlan 212
clear ip
To clear the IP and Dynamic Host Configuration Protocol (DHCP) relay statistics, use the clear ip
command.
Syntax Description dhcp relay statistics (Optional) Clears all of the DHCP relay statistics.
statistics (Optional) Clears all of the statistics associated with IP normalization,
fragmentation, and reassembly.
Usage Guidelines This command requires the DHCP feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To clear the IP and DHCP relay statistics, execute the clear ip command without using the optional
keywords.
Examples To clear all of the IP normalization, fragmentation, and reassembly statistics, enter:
host1/Admin# clear ip statistics
clear line
To close a specified virtual terminal (VTY) session, use the clear line command.
Syntax Description vty_name Name of a VTY session. Enter a maximum of 64 alphanumeric characters.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
clear logging
To clear information stored in the logging buffer, use the clear logging command.
Syntax Description disabled (Optional) Clears the logging buffer of “disabled” messages.
rate-limit (Optional) Clears the logging buffer of “rate-limit configuration” messages.
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To clear all of the information stored in the logging buffer, enter the clear logging command without
using either of the optional keywords.
Examples To clear all of the information stored in the logging buffer, enter:
host1/Admin# clear logging
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
clear probe
To clear the probe statistics displayed through the show probe command, use the clear probe command.
Usage Guidelines This command requires the probe feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Examples To clear all the statistics for the probe HTTP1, enter:
host1/Admin# clear probe HTTP1
Syntax Description all Clears all statistics for the processes logs.
pid id Specifies the processes log to clear.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To display the list of process identifiers assigned to each of the processes running on the ACE, use the show
processes command.
Examples To clear all the statistics for the processes log, enter:
host1/Admin# clear processes log all
clear rserver
To clear the real server statistics of all instances of a particular real server regardless of the server farms
that it is associated with, use the clear rserver command.
Usage Guidelines This command requires the rserver feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Examples To clear the statistics for the real server RS1, enter:
host1/Admin# clear rserver RS1
clear rtcache
To clear the route cache, use the clear rtcache command.
clear rtcache
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
clear screen
To clear the display screen, use the clear screen command.
clear screen
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
clear serverfarm
To clear the statistics for all real servers in a specific server farm, use the clear serverfarm command.
Usage Guidelines This command requires the serverfarm feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Examples To clear the statistics for the server farm SFARM1, enter:
host1/Admin# clear serverfarm SFARM1
clear service-policy
To clear the service policy statistics, use the clear service-policy command.
Syntax Description policy_name Name of an existing policy map that is currently in service (applied to an
interface).
Usage Guidelines This command requires the interface feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Examples To clear the statistics for the service policy HTTP1, enter:
host1/Admin# clear service-policy HTTP1
clear ssh
To clear a Secure Shell (SSH) session or clear the public keys of all SSH hosts, use the clear ssh
command.
Syntax Description session_id Identifier of the SSH session to clear, terminating the session.
hosts Clears the public keys of all trusted SSH hosts.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To obtain the specific SSH session ID value, use the show ssh session-info command.
Examples To clear the SSH session with the identifier 345, enter:
host1/Admin# clear ssh 345
clear startup-config
To clear the startup configuration of the current context, use the clear startup-config command.
clear startup-config
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
Clearing the startup configuration does not affect the context running-configuration.
The clear startup-config command does not remove license files or crypto files (certs and keys) from
the ACE. To remove license files, see the license uninstall command. To remove crypto files, see the
crypto delete command.
To clear the startup configuration, you can also use the write erase command.
Before you clear a startup configuration, we recommend that you back up your current startup
configuration to a file on a remote server using the copy startup-config command. Once you clear the
startup configuration, you can perform one of the following processes to recover a copy of an existing
configuration:
• Use the copy running-config startup-config command to copy the contents of the running
configuration to the startup configuration.
• Upload a backup of a previously saved startup-configuration file from a remote server using the
copy startup-config command.
clear stats
To clear the statistical information stored in the ACE buffer, use the clear stats command.
clear stats {all | connections | http | inspect | loadbalance | optimization | probe | sticky}
Usage Guidelines This command requires the loadbalance, inspect, NAT, connection, or SSL feature in your user role. For
details about role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application
Control Engine Appliance Virtualization Configuration Guide.
Syntax Description all Clears all dynamic sticky database entries in a context.
group name Clears all dynamic sticky database entries for the specified sticky group.
Usage Guidelines This command requires the interface feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To clear static sticky database entries, use the no form of the (config-sticky-cookie) static cookie-value,
or (config-sticky-ip) static client source command.
Examples To clear all dynamic sticky database entries in the Admin context, enter:
host1/Admin# clear sticky database all
Usage Guidelines This command requires the interface feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
clear telnet
To clear a Telnet session, use the clear telnet command.
Syntax Description session_id Identifier of the Telnet session to clear, terminating the session.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
To obtain the specific Telnet session identification number, use the show telnet command.
Examples To clear the Telnet session with the identification number of 236, enter:
host1/Admin# clear telnet 236
Usage Guidelines This command requires the interface feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
clear user
To clear a user session, use the clear user command.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To display the list of users that are currently logged in to the ACE, use the show users command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
clear xlate
To clear the global address to the local address mapping information based on the global address, global
port, local address, local port, interface address as global address, and NAT type, use the clear xlate
command.
clear xlate [{global | local} start_ip [end_ip [netmask netmask]]] [{gport | lport} start_port
[end_port]] [interface vlan number] [state static] [portmap]
Syntax Description global (Optional) Clears the active translation by the global IP address.
local (Optional) Clears the active translation by the local IP address.
start_ip Global or local IP address or the first IP address in a range of addresses.
Enter an IP address in dotted-decimal notation (for example, 172.27.16.10).
end_ip (Optional) Last IP address in a global or local range of IP addresses. Enter
an IP address in dotted-decimal notation (for example, 172.27.16.10).
netmask netmask (Optional) Specifies the network mask for global or local IP addresses. Enter
a mask in dotted-decimal notation (for example, 255.255.255.0).
gport (Optional) Clears active translations by the global port.
lport (Optional) Clears active translations by the local port.
start_port Global or local port number.
end_port (Optional) Last port number in a global or local range of ports.
interface vlan number (Optional) Clears active translations by the VLAN number.
state static (Optional) Clears active translations by the state.
portmap (Optional) Clears active translations by the port map.
Usage Guidelines This command requires the NAT feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
When you enter this command, the ACE releases sessions that are using the translations (Xlates).
If you configure redundancy, then you need to explicitly clear Xlates on both the active and the standby
ACEs. Clearing Xlates on the active appliance does not clear Xlates in the standby appliance.
clock set
To set the time and the date for an ACE, use the clock set command in Exec mode.
Syntax Description hh:mm:ss Current time to which the ACE clock is being reset.
Specify one or two digits for the hour, minutes, and
seconds.
DD MONTH YYYY Current date to which the ACE clock is being reset.
Specify the full name of the month, one or two digits
for the day, and four digits for the year. The following
month names are recognized:
• January
• February
• March
• April
• May
• June
• July
• August
• September
• October
• November
• December
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
When you enter this command, the ACE displays the current configured date and time.
If you want to use the Network Time Protocol (NTP) to automatically synchronize the ACE system clock
to an authoritative time server (such as a radio clock or an atomic clock), see Chapter 1, Setting Up the
ACE, in the Cisco 4700 Series Application Control Engine Appliance Administration Guide. In this
case, the NTP time server automatically sets the ACE system clock.
If you previously configured NTP on an ACE, the ACE prevents you from using the clock set command
and displays an error message. To manually set the ACE system clock, remove the NTP peer and NTP
server from the configuration before setting the clock on an ACE.
Examples For example, to specify a time of 1:38:30 and a date of October 7, 2007, enter:
host1/Admin# clock set 01:38:30 7 Oct 2007
Sun Oct 7 01:38:30 PST 2007
configure
To change from the Exec mode to the configuration mode, use the configure command.
configure [terminal]
Syntax Description terminal (Optional) Enables you to configure the system from the terminal.
Usage Guidelines This command requires one or more features assigned to your user role, such as the AAA, interface, or
fault-tolerant features. For details about role-based access control (RBAC) and user roles, see the Cisco
4700 Series Application Control Engine Appliance Virtualization Configuration Guide.
To return to the Exec mode from the configuration mode, use the exit command.
To execute an Exec mode command from any of the configuration modes, use the do version of the
command.
Examples To change to the configuration mode from the Exec mode, enter:
host1/Admin# configure
host1/Admin(config)#
copy capture
To copy an existing context packet capture buffer as the source file in the ACE compact Flash to another
file system, use the copy capture command.
Syntax Description capture_name Name of the packet capture buffer on the disk0: file system. Specify a text
string from 1 to 80 alphanumeric characters.
disk0: Specifies that the buffer is copied to the disk0: file system.
[path/]destination_name Destination path (optional) and name for the packet capture buffer. Specify
a text string from 1 to 80 alphanumeric characters. If you do not provide the
optional path, the ACE copies the file to the root directory on the disk0: file
system.
Usage Guidelines This command requires the config-copy feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
After you copy a capture file to a remote server, you can use the delete disk0:filename command to
delete the file from the ACE and free memory.
Examples To copy the packet capture buffer to a file in disk0: called MYCAPTURE1, enter:
host1/Admin# copy capture CAPTURE1 disk0:MYCAPTURE1
copy core:
To copy a core file to a remote server, use the copy core: command.
Syntax Description filename Specifies the filename of the core dump residing on the
ACE in Flash memory. Use the dir core: command to
view the core dump files available in the core: file
system.
disk0:[path/]filename Specifies that the file destination is the disk0: directory
of the current context and the filename for the core. If
you do not provide the optional path, the ACE copies the
file to the root directory on the disk0: file system.
ftp://server/path[/filename] Specifies the File Transfer Protocol (FTP) network
server and optional renamed core dump.
sftp://[username@]server/path[/filename] Specifies the Secure File Transfer Protocol (SFTP)
network server and optional renamed core dump.
tftp://server[:port]/path[/filename] Specifies the Trivial File Transfer Protocol (TFTP)
network server and optional renamed core dump.
Usage Guidelines This command requires the config-copy feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
To display the list of available core files, use the dir core: command. Copy the complete filename (for
example, 0x401_vsh_log.25256.tar.gz) into the copy core: command.
When you select a destination file system using ftp:, sftp:, or tftp:, the ACE does the following:
• Prompts you for your username and password if the destination file system requires user
authentication.
• Prompts you for the server information if you do not provide the information with the command.
• Copies the file to the root directory of the destination file system if you do not provide the path
information.
Examples To copy a core file from the ACE to a remote FTP server, enter:
host1/Admin# copy core:ixp0_crash.txt ftp://192.168.1.2
Enter the destination filename[]? [ixp0_crash.txt]
Enter username[]? user1
Enter the file transfer mode[bin/ascii]: [bin]
Password:
Passive mode on.
Hash mark printing on (1024 bytes/hash mark).
Note The bin (binary) file transfer mode is intended for transferring compiled files (executables). The ascii
file transfer mode is intended for transferring text files, such as config files. The default selection of bin
should be sufficient in all cases when copying files to a remote FTP server.
copy disk0:
To copy a file from one directory in the disk0: file system of Flash memory to another directory in disk0: or
a network server, use the copy disk0: command.
Syntax Description disk0:[path/]filename1 Specifies the name of the file to copy in the disk0: file
system. Use the dir disk0: command to view the files
available in disk0:. If you do not provide the optional path,
the ACE copies the file from the root directory on the
disk0: file system.
disk0:[path/]filename2 Specifies that the file destination is the disk0: directory of
the current context and the filename for the core. If you do
not provide the optional path, the ACE copies the file to
the root directory on the disk0: file system.
ftp://server/path[/filename] Specifies the File Transfer Protocol (FTP) network server
and, optionally, the renamed file.
image:image_filename Specifies the image: filesystem and the image filename.
sftp://[username@]server/path[/filename] Specifies the Secure File Transfer Protocol (SFTP)
network server and, optionally, the renamed file.
ftp://server[:port]/path[/filename] Specifies the Trivial File Transfer Protocol (TFTP)
network server and, optionally, the renamed file.
running-config Specifies to replace the running-configuration file
currently residing on the ACE in volatile memory.
startup-config Specifies to replace the startup-configuration file
currently residing on the ACE in Flash memory.
Usage Guidelines This command requires the config-copy feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
When you select a destination file system using ftp:, sftp:, or tftp:, the ACE does the following:
• Prompts you for your username and password if the destination file system requires user
authentication.
• Prompts you for the server information if you do not provide the information with the command.
• Copies the file to the root directory of the destination file system if you do not provide the path
information.
Examples To copy the file called SAMPLEFILE to the MYSTORAGE directory in Flash memory, enter:
host1/Admin# copy disk0:samplefile disk0:MYSTORAGE/SAMPLEFILE
copy ftp:
To copy a file, software image, running-configuration file, or startup-configuration file from a remote
File Transfer Protocol (FTP) server to a location on the ACE, use the copy ftp: command.
Syntax Description ftp://server/path[/filename] Specifies the FTP network server and optional file to copy.
disk0:[path/]filename Specifies that the file destination is the disk0: directory of the current
context and the filename. If you do not provide the optional path, the
ACE copies the file to the root directory on the disk0: file system.
image: [image_name] Specifies to copy a system software image to Flash memory. Use the
boot system command in configuration mode to specify the BOOT
environment variable. The BOOT environment variable specifies a list
of image files on various devices from which the ACE can boot at
startup. The image: keyword is available only in the Admin context.
The image_name argument is optional. If you do not enter a name, the
ACE uses the source filename.
running-config Specifies to replace the running-configuration file that currently resides
on the ACE in RAM (volatile memory).
startup-config Specifies to replace the startup-configuration file that currently resides
on the ACE in Flash memory (nonvolatile memory).
Usage Guidelines This command requires the config-copy feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Examples To copy a startup-configuration file from a remote FTP server to the ACE, enter:
host1/Admin# copy ftp://192.168.1.2/startup_config_Adminctx startup-config
copy image:
To copy an ACE software system image from Flash memory to a remote server using File Transfer
Protocol (FTP), Secure File Transfer Protocol (SFTP), or Trivial File Transfer Protocol (TFTP), use the
copy image: command.
Syntax Description image_filename The name of the ACE system software image. Use the dir
image: command or the show version command to view
the software system images available in Flash memory.
ftp://server/path[/filename] Specifies the FTP network server and optional renamed
image.
sftp://[username@]server/path[/filename] Specifies the SFTP network server and optional renamed
image.
tftp://server[:port]/path[/filename] Specifies the TFTP network server and optional renamed
image.
Usage Guidelines This command requires the config-copy feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
When you select a destination file system using ftp:, sftp:, or tftp:, the ACE does the following:
• Prompts you for your username and password if the destination file system requires user
authentication.
• Prompts you for the server information if you do not provide the information with the command.
• Copies the file to the root directory of the destination file system if you do not provide the path
information.
copy licenses
To create a backup license file for the ACE licenses in the .tar format and copy it to the disk0: file system,
use the copy licenses command.
Syntax Description disk0: Specifies that the backup license file is copied to the disk0: file system.
[path/]filename.tar Specifies the destination filename for the backup licenses. The destination
filename must have a .tar file extension. If you do not provide the optional path,
the ACE copies the file to the root directory on the disk0: file system.
Usage Guidelines This command requires the config-copy feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Examples To copy the installed software licenses to the disk0: file system, enter:
host1/Admin# copy licenses disk0:mylicenses.tar
copy running-config
To copy the contents of the running configuration file in RAM (volatile memory) to the startup configuration
file in Flash memory (nonvolatile memory) or a network server, use the copy running-config command.
Usage Guidelines This command requires the config-copy feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
When you select a destination file system using ftp:, sftp:, or tftp:, the ACE does the following:
• Prompts you for your username and password if the destination file system requires user
authentication.
• Prompts you for the server information if you do not provide the information with the command.
• Copies the file to the root directory of the destination file system if you do not provide the path
information.
To copy the running configuration to the startup configuration, you can also use the write memory
command.
Examples To save the running-configuration file to the startup-configuration file in Flash memory on the ACE,
enter:
host1/Admin# copy running-config startup-config
copy startup-config
To merge the contents of the startup configuration file into the running configuration file or copy the startup
configuration file to a network server, use the copy startup-config command.
Syntax Description disk0:[path/]filename Specifies that the startup configuration is copied to a file
on the disk0: file system. If you do not provide the
optional path, the ACE copies the file to the root directory
on the disk0: file system.
running-config Merges contents of the startup configuration file into the
running configuration file.
ftp://server/pat[/filename] Specifies the File Transfer Protocol (FTP) network server
and optional renamed file.
sftp://[username@]server/path[/filename] Specifies the Secure File Transfer Protocol (SFTP)
network server and optional renamed file.
tftp://server[:port]/path[/filename] Specifies the Trivial File Transfer Protocol (TFTP)
network server and, optional renamed file.
Usage Guidelines This command requires the config-copy feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
When you select a destination file system using ftp:, sftp:, or tftp:, the ACE does the following:
• Prompts you for your username and password if the destination file system requires user
authentication.
• Prompts you for the server information if you do not provide the information with the command.
• Copies the file to the root directory of the destination file system if you do not provide the path
information.
Examples To merge the contents of the startup-configuration file into the running-configuration file in Flash
memory, enter:
host1/Admin# copy startup-config running-config
copy sftp:
To copy a file, software image, running-configuration file, or startup-configuration file from a remote
Secure File Transfer Protocol (SFTP) server to a location on the ACE, use the copy sftp: command.
Syntax Description sftp://[username@]server/path[/filename] Specifies the SFTP network server and optional renamed
file.
disk0:[path/]filename Specifies that the file destination is the disk0: directory of
the current context and the filename. If you do not provide
the optional path, the ACE copies the file to the root
directory on the disk0: file system.
image: [image_name] Specifies to copy a system software image to Flash
memory. Use the boot system command in configuration
mode to specify the BOOT environment variable. The
BOOT environment variable specifies a list of image files
on various devices from which the ACE can boot at
startup. The image: keyword is available only in the
Admin context. The image_name argument is optional. If
you do not enter a name, the ACE uses the source
filename.
running-config Specifies to replace the running-configuration file that
currently resides on the ACE in RAM (volatile memory).
startup-config Specifies to replace the startup-configuration file that
currently resides on the ACE in Flash memory
(nonvolatile memory).
Usage Guidelines This command requires the config-copy feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Examples To copy a startup-configuration file from a remote SFTP server to the ACE, enter:
host1/Admin# copy sftp://192.168.1.2/startup_config_Adminctx startup-config
copy tftp:
To copy a file, software image, running-configuration file, or startup-configuration file from a remote
Trivial File Transfer Protocol (TFTP) server to a location on the ACE, use the copy tftp: command.
Syntax Description tftp://server[:port]/path[/filename] Specifies the TFTP network server and optional renamed file.
disk0:[path/]filename Specifies that the file destination is the disk0: directory of the
current context and the filename. If you do not provide the
optional path, the ACE copies the file to the root directory on the
disk0: file system.
image: [image_name] Specifies to copy a system software image to Flash memory. Use
the boot system command in configuration mode to specify the
BOOT environment variable. The BOOT environment variable
specifies a list of image files on various devices from which the
ACE can boot at startup. The image: keyword is available only
in the Admin context. The image_name argument is optional. If
you do not enter a name, the ACE uses the source filename.
running-config Specifies to replace the running-configuration file that currently
resides on the ACE in RAM (volatile memory).
startup-config Specifies to replace the startup-configuration file that currently
resides on the ACE in Flash memory (nonvolatile memory).
Usage Guidelines This command requires the config-copy feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Examples To copy a startup-configuration file from a remote TFTP server to the ACE, enter:
host1/Admin# copy tftp://192.168.1.2/startup_config_Adminctx startup-config
crypto delete
To delete a certificate and key pair file from the ACE that is no longer valid, use the crypto delete
command.
Syntax Description filename Name of a specific certificate or key pair file to delete. Enter an unquoted text
string with no spaces and a maximum of 40 alphanumeric characters.
all Deletes all of the certificate and key pair files.
Usage Guidelines This command requires the SSL feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To view the list of the certificate and key pair files stored on the ACE for the current context, use the
show crypto files command.
crypto export
To export a copy of a certificate or key pair file from the ACE to a remote server or the terminal screen,
use the crypto export command.
crypto export local_filename {ftp | sftp | tftp | terminal} ip_addr username remote_filename
Syntax Description local_filename Name of the file stored on the ACE to export. Enter an unquoted text string with
no spaces and a maximum of 40 alphanumeric characters.
ftp Specifies the File Transfer Protocol (FTP) file transfer process.
sftp Specifies the Secure File Transfer Protocol (SFTP) file transfer process.
tftp Specifies the Trivial File Transfer Protocol (TFTP) file transfer process.
terminal Displays the file content on the terminal for copy and paste purposes. Use the
terminal keyword when you need to cut and paste certificate or private key
information from the console. You can only use the terminal method to display
PEM files, which are in ASCII format.
ip_addr IP address or name of the remote server. Enter an IP address in dotted-decimal
notation (for example, 172.27.16.10).
username Username required to access the remote server. The ACE prompts you for your
password when you enter the command.
remote_filename Name to save the file to on the remote server. Enter an unquoted text string with
no spaces and a maximum of 40 alphanumeric characters.
Usage Guidelines This command requires the SSL feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
You cannot export a certificate or key pair file that you marked as nonexportable when you imported the
file to the ACE.
The remote server variables listed after the terminal keyword in the “Syntax Description” are used by
the ACE only when you select a transport type of ftp, sftp, or tftp (the variables are not used for
terminal). We recommend using SFTP as it provides the most security.
To view the list of the certificate and key pair files stored on the ACE for the current context, use the
show crypto files command.
Examples To use SFTP to export the key file MYKEY.PEM from the ACE to a remote SFTP server, enter:
host1/Admin# crypto export MYKEY.PEM sftp 192.168.1.2 JOESMITH /USR/KEYS/MYKEY.PEM
User password: ****
Writing remote file /usr/keys/mykey.pem
host1/Admin#
Syntax Description csr_params CSR parameters file that contains the distinguished name attributes. The ACE
applies the distinguished name attributes contained in the CSR parameters file to
the CSR.
To create a CSR parameters file, use the (config) crypto csr-params command in
the configuration mode.
key_filename RSA key pair filename that contains the key on which the CSR is built. Enter an
unquoted text string with no spaces and a maximum of 40 alphanumeric
characters. It is the public key that the ACE embeds in the CSR. Ensure that the
RSA key pair file is loaded on the ACE for the current context. If the appropriate
key pair does not exist, the ACE logs an error message.
Usage Guidelines This command requires the Secure Sockets Layer (SSL) feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
The crypto generate csr command generates the CSR in PKCS10 encoded in PEM format and outputs
it to the screen. Most major certificate authorities have web-based applications that require you to cut
and paste the certificate request to the screen. If necessary, you can also cut and paste the CSR to a file.
Note The ACE does not save a copy of the CSR locally.
After submitting your CSR to the CA, you will receive your signed certificate in one to seven business
days. When you receive your certificate, use the crypto import command to import the certificate to the
ACE.
Examples To generate a CSR that is based on the CSR parameter set CSR_PARAMS_1 and the RSA key pair in
the file MYRSAKEY_1.PEM, enter:
host1/Admin# crypto generate csr CSR_PARAMS_1 MYRSAKEY_1.PEM
Syntax Description non-exportable (Optional) Marks the key pair file as nonexportable, which means that you cannot
export the key pair file from the ACE.
bitsize Key pair security strength. The number of bits in the key pair file defines the size
of the RSA key pair used to secure web transactions. Longer keys produce a more
secure implementation by increasing the strength of the RSA security policy.
Available entries (in bits) are as follows:
• 512 (least security)
• 768 (normal security)
• 1024 (high security, level 1)
• 1536 (high security, level 2)
• 2048 (high security, level 3)
filename Name that you assign the generated RSA key pair file. Enter an unquoted text
string with no spaces and a maximum of 40 alphanumeric characters. The key pair
filename is used only for identification purposes by the ACE.
Usage Guidelines This command requires the SSL feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Examples To generate the RSA key pair file MYRSAKEYS.PEM with a bit size of 1536, enter:
host1/Admin# crypto generate key 1536 MYRSAKEYS.PEM
crypto import
To import a certificate or key pair file to the ACE or terminal screen from a remote server, use the crypto
import command.
Syntax Description non-exportable (Optional) Specifies that the ACE marks the imported file as nonexportable, which
means that you cannot export the file from the ACE.
ftp Specifies the File Transfer Protocol (FTP) file transfer process.
sftp Specifies the Secure File Transfer Protocol (SFTP) file transfer process.
passphrase (Optional) Indicates that the file was created with a passphrase, which you must
passphrase submit with the file transfer request in order to use the file. The passphrase
pertains only to encrypted PEM files and PKCS files.
ip_addr IP address or name of the remote server. Enter an IP address in dotted-decimal
notation (for example, 172.27.16.10).
username Username required to access the remote server. The ACE prompts you for your
password when you enter the command.
remote_filename Name of the certificate or key pair file that resides on the remote server to import.
Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric
characters.
local_filename Name to save the file to when imported to the ACE. Enter an unquoted text string
with no spaces and a maximum of 40 alphanumeric characters.
tftp Specifies the Trivial File Transfer Protocol (TFTP) file transfer process.
terminal Allows you to import a file using cut and paste by pasting the certificate and key
pair information to the terminal display. You can only use the terminal method to
display PEM files, which are in ASCII format.
Usage Guidelines This command requires the Secure Sockets Layer (SSL) feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
Because a device uses its certificate and corresponding public key together to prove its identity during
the SSL handshake, be sure to import both corresponding file types: the certificate file and its
corresponding key pair file.
The remote server variables listed after the passphrase variable in the Syntax Description table are only
used by the ACE when you select a transport type of ftp, sftp, or tftp (the variables are not used for
terminal). If you select one of these transport types and do not define the remote server variables, the
ACE prompts you for the variable information. We recommend using SFTP as it provides the most
security.
To view the list of the certificate and key pair files stored on the ACE for the current context, use the
show crypto files command.
Examples To import the RSA key file MYRSAKEY.PEM from an SFTP server, enter:
host1/Admin# crypto import non-exportable sftp 1.1.1.1 JOESMITH /USR/KEYS/MYRSAKEY.PEM
MYKEY.PEM
Password: ********
Passive mode on.
Hash mark printing on (1024 bytes/hash mark).
#
Successfully imported file from remote server.
host1/Admin#
This example shows how to use the terminal keyword to allow pasting of the certificate information to
the file MYCERT.PEM:
host1/Admin# crypto import terminal MYCERT.PEM
Enter PEM formatted data ending with a blank line or "quit" on a line by itself
--------BEGIN CERTIFICATE-----------------------
MIIC1DCCAj2gAwIBAgIDCCQAMA0GCSqGSIb3DQEBAgUAMIHEMQswCQYDVQQGEwJa
QTEVMBMGA1UECBMMV2VzdGVybiBDYXBlMRIwEAYDVQQHEwlDYXBlIFRvd24xHTAb
BgNVBAoTFFRoYXd0ZSBDb25zdWx0aW5nIGNjMSgwJgYDVQQLEx9DZXJ0aWZpY2F0
aW9uIFNlcnZpY2VzIERpdmlzaW9uMRkwFwYDVQQDExBUaGF3dGUgU2VydmVyIENB
MSYwJAYJKoZIhvcNAQkBFhdzZXJ2ZXItY2VydHNAdGhhd3RlLmNvbTAeFw0wMTA3
-----------END CERTIFICATE------------------------
QUIT
host1/Admin#
crypto verify
To compare the public key in a certificate with the public key in a key pair file, and to verify that they
are identical, use the crypto verify command.
Syntax Description key_filename Name of the key pair file (stored on the ACE) that the ACE uses to verify against
the specified certificate. Enter an unquoted text string with no spaces and a
maximum of 40 alphanumeric characters.
cert_filename Name of the certificate file (stored on the ACE) that the ACE uses to verify against
the specified key pair. Enter an unquoted text string with no spaces and a
maximum of 40 alphanumeric characters.
Usage Guidelines This command requires the Secure Sockets Layer (SSL) feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
If the public key in the certificate does not match the public key in the key pair file, the ACE logs an
error message.
To view the list of the certificate and key pair files stored on the ACE for the current context, use the
show crypto files command.
Examples To verify that the public keys in the Admin context files MYRSAKEY.PEM and MYCERT.PEM match,
enter:
host1/Admin# crypto verify MYRSAKEY.PEM MYCERT.PEM
keypair in myrsakey.pem matches certificate in mycert.pem
This example shows what happens when the public keys do not match:
host1/Admin# crypto verify MYRSAKEY2.PEM MYCERT.PEM
Keypair in myrsakey2.pem does not match certificate in mycert.pem
host1/Admin#
debug
To enable the ACE debugging functions, use the debug command.
debug {aaa | access-list | all | arpmgr | bpdu | buffer | cfg_cntlr | cfgmgr | fifo | fm | ha_dp_mgr
| ha_mgr | hardware | hm | ifmgr | ip | ldap | license | logfile | nat-download | netio | ntp |
optimize | pfmgr | pktcap | portmgr | radius | routemgr | security | sme | snmp | ssl | syslogd
| system | tacacs+ | tl | virtualization | vnet}
Syntax Description aaa Enables debugging for authentication, authorization, and accounting
(AAA).
access-list Enables access-list debugging.
all Enables all debugging functions.
arpmgr Enables Address Resolution Protocol (ARP) manager debugging.
bpdu Enables bridge protocol data unit (BPDU) debugging.
buffer Configures debugging of CP buffer manager.
cfg_cntlr Enables configuration controller debugging.
cfgmgr Enables configuration manager debugging.
fifo Configures debugging of the packet first in, first out (FIFO) driver.
fm Enables ACE feature manager debugging.
ha_dp_mgr Enables HA-DP debugging.
ha_mgr Enables HA debugging.
hardware Debugs hardware kernel loadable module parameters.
hm Enables HM debugging.
ifmgr Enables interface manager debugging.
ip Enables IP service debugging.
ldap Configures debugging for Lightweight Directory Access Protocol
(LDAP).
license Enables licensing debugging.
logfile Directs the debug output to a logfile.
nat-download Enables Network Address Translation (NAT) download debugging.
netio Configures debugging of CP network I/O.
ntp Debugs the Network Time Protocol (NTP) module.
optimize Sets the log level options.
pfmgr Debugs the platform manager.
pktcap Enables packet capture debugging.
portmgr Debugs the port manager.
radius Configures debugging for the Remote Authentication Dial-In User
Service (RADIUS) daemon.
Usage Guidelines This command is available to roles that allow debugging and to network monitor or technician users. For
details about role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application
Control Engine Appliance Virtualization Configuration Guide.
The ACE debug commands are intended for use by trained Cisco personnel only. Entering these
commands may cause unexpected results. Do not attempt to use these commands without guidance from
Cisco support personnel.
delete
To delete a specified file in an ACE file system, use the delete command.
Syntax Description core:filename Deletes the specified file from the core: file system.
disk0:[path/]filename Deletes the specified file from the disk0: file system. If you do not
specify the optional path, the ACE looks for the file in the root directory
of the disk0: file system.
image:filename Deletes the specified file from the image: file system.
volatile:filename Deletes the specified file from the volatile: file system.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
If you do not specify a filename with the file system keyword, the ACE prompts you for a filename.
To display the list of files that reside in a file system, use the dir command.
Examples To delete the file 0x401_VSH_LOG.25256.TAR.GZ from the core: file system, enter:
host1/Admin# delete core:0x401_VSH_LOG.25256.TAR.GZ
dir
To display the contents of a specified ACE file system, use the dir command.
Syntax Description core: Displays the contents of the core: file system.
disk0:[path/] Displays the contents of the disk0: file system. Specify the optional path to
display the contents of a specific directory on the disk0: file system.
image: Displays the contents of the image: file system.
volatile: Displays the contents of the volatile: file system.
filename (Optional) Specified file to display. Displays information, such as the file
size and the date that it was created. You can use wildcards in the filename.
A wildcard character (*) matches all patterns. Strings after a wildcard are
ignored.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To delete a file from a file system, use the delete command.
To delete all core dumps, use the clear cores command.
exit
To exit out of Exec mode and log out the CLI session, use the exit command.
exit
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
format flash:
To erase all data stored on the Flash memory and reformat it with the third extended filesystem (ext3) as
the base file system, use the format flash: command. All user-defined configuration information is
erased and the ACE returns to the factory-default settings.
format flash:
Usage Guidelines This command requires Admin user role. For details about role-based access control (RBAC) and user
roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
The ACE performs the following verification sequence prior to reformatting Flash memory:
• If the system image (the current loaded image) is present in the GNU GRand Unified Bootloader
(GRUB) boot loader, the ACE automatically performs a backup of that image and then performs the
reformat of Flash memory.
• If the system image is not present in the Grub boot loader, the ACE prompts you for the location of
an available image to backup prior to reformatting the Flash memory.
• If you choose not to backup an available image file, the ACE searches for the
ACE-APPLIANCE-RECOVERY-IMAGE.bin image in the Grub partition of Flash memory.
ACE-APPLIANCE-RECOVERY-IMAGE.bin is the recovery software image that the ACE uses if
the disk partition in Flash memory is corrupted.
– If ACE-APPLIANCE-RECOVERY-IMAGE.bin is present, the ACE continues with the Flash
memory reformat. The CLI prompt changes to “switch(RECOVERY-IMAGE)/Admin#” as a
means for you to copy the regular ACE software image.
– If ACE-APPLIANCE-RECOVERY-IMAGE.bin is not present, the ACE stops the Flash memory
reformat because there is no image to boot after format.
Before you reformat the Flash memory, you should save a copy of the following ACE operation and
configuration attributes to a remote server:
• ACE software image (use the copy image: command)
• ACE license (use the copy licenses command)
• Startup configuration of each context (use the copy startup-config command)
• Running configuration of each context (use the copy running-config command)
• Core dump files of each context (use the copy core: command)
• Packet capture buffers of each context (use the copy capture command)
• Secure Sockets Layer (SSL) certificate and key pair files of each context (use the crypto export
command)
After you reformat the Flash memory, perform the following actions:
• Copy the ACE software image to the image: file system using the copy ftp:, copy tftp:, or copy
sftp: command
• Reinstall the ACE license using the license command
• Import the following configuration files into the associated context using the copy disk0: command:
– Startup-configuration file
– Running-configuration file
• Import the following SSL files into the associated context using the crypto import command:
– SSL certificate files
– SSL key pair files
Examples For example, to erase all information in Flash memory and reformat it, enter:
host1/Admin# format flash:
Warning!! This will erase everything in the compact flash including startup configs for
all the contexts and reboot the system!!
Do you wish to proceed anyway? (yes/no) [no] yes
If the ACE fails to extract a system image from the Grub bootloader, it prompts you to provide the
location of an available system image to backup:
Failed to extract system image Information from Grub
backup specific imagefile? (yes/no) [no] yes
Enter Image name: scimi-3.bin
Saving Image [scimi-3.bin]
Formatting the cf.....
Unmounting ext3 filesystems...
Unmounting FAT filesystems...
Unmounting done...
ft switchover
To purposely cause a failover to make a particular context active, use the ft switchover command.
Syntax Description force (Optional) Causes a switchover while ignoring the state of the standby member. Use
this option only when the fault-tolerant (FT) VLAN is down.
group_id (Optional) Identifier of the FT group. Enter the ID of an existing FT group as an
integer from 1 to 20.
Usage Guidelines This command requires the fault-tolerant feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
By using the ft switchover command, you direct the standby group member to statefully become the
active member of the FT group, which forces a switchover.
You might need to force a switchover when you want to make a particular context the standby (for
example, for maintenance or a software upgrade on the currently active context). If the standby group
member can statefully become the active member of the FT group, a switchover occurs. You must
configure no preempt to use this command (use the preempt command in FT group configuration
mode).
The ft switchover command exhibits the following behavior, depending on whether you enter the
command from the Admin context or a user context:
• Admin context—If you specify an FT group ID, then the FT group specified by the group ID
switches over. If you do not specify a group ID, then the Admin context switches over.
• User context—Because you cannot specify an FT group ID in a user context, the context in which
you enter the command switches over.
Examples To cause a switchover from the active appliance to the standby appliance of FT group1, enter:
host1/Admin# ft switchover 1
gunzip
To uncompress (unzip) LZ77 coded files residing in the disk0: file system (for example, zipped probe
script files), use the gunzip command.
gunzip disk0:[path/]filename.gz
Syntax Description disk0:[path/]filename.gz Specifies the name of the compressed file on the disk0: file system. The
filename must end with a .gz extension. If you do not specify the
optional path, the ACE looks for the file in the root directory.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
This command is useful in uncompressing large files. The filename must end with a .gz extension for the
file to be uncompressed using the gunzip command. The .gz extension indicates a file that is zipped by
the gzip (GNU zip) compression utility.
To display a list of available zipped files on disk0:, use the dir command.
Examples To unzip a compressed series of probe script files from the file PROBE_SCRIPTS in the disk0: file
system, enter:
host1/Admin# gunzip disk0:PROBE_SCRIPTS.gz
invoke context
To display the context running configuration information from the Admin context, use the invoke context
command.
Syntax Description context_name Name of user-created context. This argument is case sensitive.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Examples To display the running configuration for the C1 user context from the Admin context, enter:
host1/Admin# invoke context C1 show running-config
license
To install, update, or uninstall licenses on the ACE, use the license command.
Syntax Description install Installs a demo or permanent license from the disk0: file system into
disk0:[path/]filename Flash memory on the ACE. The filename is the name of the license on
the disk0: file system. If you do not specify the optional path, the ACE
looks for the file in the root directory.
target_filename (Optional) Target filename for the license file.
uninstall name Uninstalls the specified license file. Enter the license name as an
unquoted text string with no spaces.
update disk0: Updates an installed demo license with a permanent license.
[path/]permanent_filename Filename for the permanent license.
demo_filename Filename for the demo license.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
After you receive a demo or permanent software license key in an e-mail from Cisco Systems, you must
copy the license file to a network server and then use the copy tftp command in Exec mode to copy the
file to the disk0: file system on the ACE.
To update an installed demo license with a permanent license, use the license update command. The
demo license is valid for 60 days. To view the expiration of the demo license, use the show license usage
command.
To back up license files, use the copy licenses command
Caution When you remove a demo or permanent virtual context license, the ACE removes all user contexts from
the Admin running configuration. By removing the user contexts, their running and startup
configurations are also removed from the ACE. Before removing any virtual context license, save the
Admin running configuration and the user context running configurations to a remote server.
If you uninstall a Secure Sockets Layer (SSL) license, it also brings down the SSL transactions per
second (TPS) to 1000 TPS on the ACE.
If you uninstall the appliance bandwidth license, it brings down the ACE appliance bandwidth to the
default of 1 Gbps on the ACE.
For more information about the types of ACE licenses available and how to manage the licenses on your
ACE, see the Cisco 4700 Series Application Control Engine Appliance Administration Guide.
mkdir disk0:
To create a new directory in disk0:, use the mkdir disk0: command.
mkdir disk0:[path/]directory_name
Syntax Description [path/]directory_name Name that you assign to the new directory. Specify the optional path if you
want to create a directory within an existing directory.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
If a directory with the same name already exists, the ACE does not create the new directory and the
“Directory already exists” message appears.
move disk0:
To move a file between directories in the disk0: file system, use the move disk0: command.
Syntax Description disk0: Indicates the disk0: file system of the current context.
source_path/ (Optional) Path of the source directory.
destination_path/ (Optional) Path of the destination directory.
filename Name of the file to move in the disk0: file system.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
If a file with the same name already exists in the destination directory, that file is overwritten by the file
that you move.
Examples To move the file called SAMPLEFILE in the root directory of disk0: to the MYSTORAGE directory in
disk0:, enter:
host1/Admin# move disk0:SAMPLEFILE disk0:MYSTORAGE/SAMPLEFILE
ping
To verify the connectivity of a remote host or server by sending echo messages from the ACE, use the
ping command.
Syntax Description target_ip (Optional) IP address of the remote host to ping. Enter an IP address in
dotted-decimal notation (for example, 172.27.16.10). If you do not specify the IP
address of the remote host, the CLI prompts you for the information.
count count (Optional) Repeat count. Enter the repeat count as an integer from 1 to 65000.
size size (Optional) Datagram size. Enter the datagram size as an integer from 36 to 452.
timeout time (Optional) Timeout in seconds. Enter the timeout value as an integer from 0 to 3600.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The ping command sends an echo request packet to an address from the current context on the ACE and
then awaits a reply. The ping output can help you evaluate path-to-host reliability, delays over displaying
the name of the current directory and the path, and whether the host can be reached or is functioning.
To terminate a ping session before it reaches its timeout value, press Ctrl-C.
Examples To ping the FTP server with an IP address of 196.168.1.2 using the default ping session values, enter:
host1/Admin# ping 196.168.1.2
reload
To reload the configuration on the ACE, use the reload command.
reload
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
The reload command reboots the ACE and performs a full power cycle of both the hardware and
software. The reset process can take several minutes. Any open connections with the ACE are dropped
after you enter the reload command.
Caution Configuration changes that are not written to Flash memory are lost after a reload. Before rebooting,
enter the copy running-conf startup-config command to save a copy of the running configuration to
the startup configuration in Flash memory. If you fail to save your running configuration changes, the
ACE reverts to the last saved version of the startup configuration upon restart.
rmdir disk0:
To remove a directory from the disk0: file system, use the rmdir disk0: command.
rmdir disk0:directory
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To remove a directory from disk0:, the directory must be empty. To view the contents of a directory, use
the dir command. To delete files from a directory, use the delete command.
setup
To initiate a special setup script that guides you through the basic process of quickly configuring the
ACE to access the Device Manager GUI, use the setup command.
setup
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The setup script is intended primarily as the means to guide you though a basic configuration of the ACE
to quickly access the Device Manager. Use the setup command when the ACE boots without a
startup-configuration file. This situation may occur when the ACE is new and the appliance was not
configured upon initial startup. The setup script guides you through configuring a management VLAN
on the ACE through one of its Gigabit Ethernet ports.
After you specify a gigabit Ethernet port, the port mode, and management VLAN, the setup script
automatically applies the following default configuration:
• Management VLAN allocated to the specified Ethernet port.
• Extended IP access list that allows IP traffic originating from any other host addresses.
• Traffic classification (class map and policy map) created for management protocols HTTP, HTTPS,
ICMP, SSH, Telnet, and XML-HTTPS. HTTPS is dedicated for connectivity with the Device
Manager GUI.
• VLAN interface configured on the ACE and a policy map assigned to the VLAN interface.
The ACE provides a default answer in brackets [ ] for each question in the setup script. To accept a
default configuration prompt, press Enter, and the ACE accepts the setting. To skip the remaining
configuration prompts, press Ctrl-C any time during the configuration sequence.
When completed, the setup script automatically applies a configuration and prompts you to perform the
following actions:
• Edit the configuration—Modifies the default configuration at the CLI.
• Use this configuration—Instructs the ACE to boot using the newly created running-configuration
file.
• Save the running-config to startup-config—Saves the running-configuration file to the
start-configuration file.
This setup utility will guide you through the basic configuration of
the system. Setup configures only enough connectivity to the
ACE appliance Device Manager GUI of the system.
Would you like to enter the basic configuration dialog (yes/no): yes
show
To display ACE statistical and configuration information, use the show command.
show keyword [| {begin pattern | count | end | exclude pattern | include pattern | last | more}]
[> {filename | {disk0:| volatile}:[path/][filename] | ftp://server/path[/filename] |
sftp://[username@]server/path[/filename] | tftp://server[:port]/path[/filename]}]
Usage Guidelines The features required in your user role to execute a specific show command are described in the “Usage
Guidelines” section of the command. For details about role-based access control (RBAC) and user roles,
see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide.
Most commands have an associated show command. For example, the associated show command for the
interface command in configuration mode is the show interface command. Use the associated show
command to verify changes that you make to the running configuration.
The output of the show command may vary depending on the context that you enter the command from.
For example, the show running-config command displays the running-configuration for the current
context only.
To convert show command output from the ACE to XML for result monitoring by an NMS, use the
xml-show command.
show aaa
To display AAA accounting and authentication configuration information for the current context, use the
show aaa command.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show aaa command output, see the Cisco 4700 Series Application
Control Engine Appliance Security Configuration Guide.
show access-list
To display statistics associated with a specific access control list (ACL), use the show access-list command.
Syntax Description name Name of an existing ACL. Enter the name as an unquoted text string.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering
the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the options
available for redirecting the command output, see the show command.
Usage Guidelines This command requires the access-list feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
The ACL information that the ACE displays when you enter the show access-list command includes the
ACL name, the number of elements in the ACL, the operating status of the ACL (ACTIVE or NOT
ACTIVE), any configured remarks, the ACL entry, and the ACL hit count.
For information about the fields in the show access-list command output, see the Cisco 4700 Series
Application Control Engine Appliance Security Configuration Guide.
Examples To display statistical and configuration information for the ACL ACL1, enter:
host1/Admin# show access-list ACL1
Syntax Description size (Optional) Size (in bytes) of the local accounting file. Enter a value from 0 to
250000. The default is 250000 bytes.
| (Optional) Pipe character (|) for enabling an output modifier that filters the command
output. For a complete description of the options available for filtering the command
output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show accounting log command output, see the Cisco 4700 Series
Application Control Engine Appliance Security Configuration Guide.
show acl-merge
To display statistics related to merged ACLs, use the show acl-merge command.
show acl-merge {acls vlan number {in | out} [summary]} | {match vlan number {in | out}
ip_address1 ip_address2 protocol src_port dest_port} | {merged-list vlan number {in | out}
[non-redundant | summary]} [|] [>]
Syntax Description acls Displays various feature ACLs and their entries before the merge.
vlan number Specifies the interface on which the ACL was applied.
in | out Specifies the direction in which the ACL was applied to network traffic: incoming
or outgoing.
summary (Optional) Displays summary information before or after the merge.
match Displays the ACL entry that matches the specified tuple.
ip_address1 Source IP address. Enter an IP address in dotted-decimal notation (for example,
172.27.16.10).
ip_address2 Destination IP address. Enter an IP address in dotted-decimal notation (for example,
172.27.16.10).
protocol Protocol specified in the ACL.
src_port Source port specified in the ACL.
dest_port Destination port specified in the ACL.
merged-list (Optional) Displays the merged ACL.
non-redundant (Optional) Displays only those ACL entries that have been downloaded to a network
processor.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering the
command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command requires the acl-merge feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
The ACL merge list number (instance ID) is locally generated (not synchronized) on each ACE in a
redundant configuration. The number assigned depends on the order in which the ACLs are applied to
the VLANs. This number can be different on the two modules. Even the ACL merged list could be
different on the two modules depending on when redundancy is enabled.
Examples To display the ACL merge information for VLAN 401, enter:
host1/Admin# show acl-merge acls vlan 401 in summary
show action-list
To display information about action list configuration, use the show action-list command in Exec mode.
The show action-list command output displays all optimization action list configurations and default
values.
Syntax Description list_name Identifier of an existing action list as an unquoted text string with a maximum of
64 alphanumeric characters.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering the
command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show action-list command output, see the Cisco 4700 Series
Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide.
Examples To display configuration information for the ACT_LIST1 action list, enter:
host1/Admin# show action-list ACT_LIST1
show arp
To display the current active IP address-to-MAC address mapping in the Address Resolution Protocol
(ARP) table, statistics, or inspection or timeout configuration, use the show arp command.
show arp [inspection | internal event-history dbg | statistics [vlan vlan_number] | timeout] [|] [>]
Usage Guidelines This command requires the routing feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The show arp command without options displays the active IP address-to-MAC address mapping in the
ARP table.
For information about the fields in the show arp command output, see the Cisco 4700 Series Application
Control Engine Appliance Routing and Bridging Configuration Guide.
Examples To display the current active IP address-to-MAC address mapping in the ARP table, enter:
host1/Admin# show arp
Syntax Description | (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To configure the banner message, use the banner command in the configuration mode.
For information about the fields in the show banner motd command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
show bootvar
To display the current BOOT environment variable and configuration register setting, use the show
bootvar command. This command is available only in the Admin context.
Syntax Description | (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
To set the BOOT environment variable, use the boot system image: command in the configuration
mode.
For information about the fields in the show bootvar command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
Examples To display the current BOOT environment variable and configuration register setting, enter:
host1/Admin# show bootvar
BOOT variable = "image:/c4710ace-mz.3.0.0_AB0_0.488.bin;image:/c4710ace-mz.3.0.0
_AB0_0.453.bin"
Configuration register is 0x1
show buffer
To display the buffer manager module messages, use the show buffer command.
Syntax Description events-history Displays a historic log of the most recent messages generated by the buffer manager
event history.
stats Displays detailed counters for various buffer manager event occurrences.
usage Displays the number of buffers currently being held (allocated but not freed) by each
buffer module. The usage keyword also shows an estimate of the number of times a
particular buffer module has freed the same buffer more than once (this condition
indicates a software error).
| (Optional) Pipe character (|) for enabling an output modifier that filters the command
output. For a complete description of the options available for filtering the command
output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
show capture
To display the packet information that the ACE traces as part of the packet capture function, use the show
capture command.
Syntax Description buffer_name Name of the packet capture buffer. Specify a text string from 1 to 80 alphanumeric
characters.
detail (Optional) Displays additional protocol information for each packet.
connid (Optional) Displays protocol information for a specified connection identifier.
connection_id
range (Optional) Displays protocol information for a range of captured packets.
packet_start
packet_end
status (Optional) Displays capture status information for each packet.
| (Optional) Pipe character (|) for enabling an output modifier that filters the command
output. For a complete description of the options available for filtering the command
output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For all types of received packets, the console display is in tcpdump format.
To copy the capture buffer information as a file in Flash memory, use the copy capture command.
For information about the fields in the show capture command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
Examples To display the captured packet information contained in packet capture buffer CAPTURE1, enter:
switch/Admin# show capture CAPTURE1
show checkpoint
To display information relating to the configured checkpoints, use the show checkpoint command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show checkpoint command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
Examples To display the running configuration for the checkpoint MYCHECKPOINT, enter:
host1/Admin# show checkpoint detail MYCHECKPOINT
show clock
To display the current date and time settings of the system clock, use the show clock command.
Syntax Description | (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To configure the system clock setting, use the clock command in the configuration mode.
For information about the fields in the show clock command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
show conn
To display the connection statistics, use the show conn command.
show conn {address ip_address1 [ip_address2] netmask mask} | count | detail | {port number1
[number2]} | {protocol {tcp | udp} | rserver name | serverfarm name} [|] [>]
Syntax Description address ip_address1 Displays connection statistics for a single source or destination IP address or,
[ip_address2] optionally, for a range of source or destination IP addresses. To specify a range
of IP addresses, enter an IP address for the lower limit of the range and a
second IP address for the upper limit of the range. Enter one or two IP
addresses in dotted-decimal notation (for example, 192.168.12.15).
netmask mask Specifies the network mask for the IP address or range of IP addresses that you
specify. Enter a network mask in dotted-decimal notation (for example,
255.255.255.0).
count Displays the total current connections to the ACE.
detail Displays detailed connection information.
port number1 Displays connection statistics for a single source or destination port or
[number2] optionally, for a range of source or destination ports.
protocol {tcp | udp} Displays connection statistics for TCP or UDP.
rserver name Displays connections for the specified real server.
serverfarm name Displays connections for the specified server farm.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show conn command output, see the Cisco 4700 Series
Application Control Engine Appliance Security Configuration Guide.
show context
To display the context configuration information, use the show context command.
Syntax Description context_name (Optional) Name of user-created context. The ACE displays just the specified
context configuration information. The context_name argument is case sensitive.
and is visible only from the admin context.
Admin (Optional) Displays just the admin context configuration information. This keyword
is visible only from the admin context.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering the
command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The ACE displays different information for this command depending on the context that you are in when
executing the command:
• Admin context—When you are in the Admin context and use the show context command without
specifying a context, the ACE displays the configuration information for the admin context and all
user-created contexts.
• user-created context—When you are in a user-created context and enter the show context command,
the ACE displays only the configuration information of the current context.
For information about the fields in the show context command output, see the Cisco 4700 Series
Application Control Engine Appliance Virtualization Configuration Guide.
Examples To display the Admin context and all user-context configuration information, enter:
host1/Admin# show context
To display the configuration information for the user context CTX1, enter:
host1/Ctx1# show context
show copyright
To display the software copyright information for the ACE, use the show copyright command.
Syntax Description | (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show copyright command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
show crypto
To display the summary and detailed reports on files containing Secure Sockets Layer (SSL) certificates,
key pairs, and chain groups, use the show crypto command.
show crypto {certificate {filename | all} | chaingroup {filename | all} | csr-params {filename |
all} | files | key {filename | all}} [|] [>]
Usage Guidelines This command requires the SSL feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
When using the show crypto certificate command and the certificate file contains a chain, the ACE
displays only the bottom level certificate (the signers are not displayed).
For information about the fields in the show crypto command output, see the Cisco 4700 Series
Application Control Engine Appliance SSL Configuration Guide.
Examples To display the summary report that lists all of the crypto files, enter:
host1/Admin# show crypto files
show debug
To display the debug flags, use the show debug command.
show debug {aaa | access-list | arpmgr | ascii-cfg | bpdu | buffer | cfg_cntlr | cfgmgr | dhcp | fifo
| fm | fs-daemon | ha_dp_mgr | ha_mgr | hm | ifmgr | ipcp | ldap | license | logfile |
nat-download | netio | pfmgr | pktcap | radius | routemgr | security | sme | snmp | ssl |
syslogd | system | tacacs+ | tl | ttyd | virtualization | vnet | vshd} [|] [>]
Usage Guidelines This command requires the debug feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The ACE debug commands are intended for use by trained Cisco personnel only. Entering these
commands may cause unexpected results. Do not attempt to use these commands without guidance from
Cisco support personnel.
show domain
To display the information about the configured domains in the ACE, use the show domain command.
Syntax Description name (Optional) Name of an existing context domain. Specify a domain name to display
the detailed configuration report that relates to the specified domain.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering the
command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
To display the complete domain configuration report that lists all of the configured domains, enter the
show domain command without including the name argument.
For information about the fields in the show domain command output, see the Cisco 4700 Series
Application Control Engine Appliance Virtualization Configuration Guide.
Examples To display the domain configuration report for the domain D1, enter:
host1/Admin# show domain D1
show fifo
To display the packet first in, first out (FIFO) statistics for the Pkt-Fifo module, use the show fifo command.
Syntax Description event-history Displays a historic log of the most recent debug messages generated by the Pkt-Fifo
module.
registers Displays the state of all the registers associated with the transmit and receive
hardware engines.
stats Displays detailed counters for the various Pkt-Fifo module event occurrences.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering the
command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
show file
To display the contents of a specified file in a directory in persistent memory (Flash memory) or volatile
memory (RAM), use the show file command.
Syntax Description disk0: Specifies the disk0 file system in persistent memory.
volatile: Specifies the file system in volatile memory.
[directory/]filename Path and name of the specified file.
cksum (Optional) Displays the cyclic redundancy check (CRC) checksum for the file.
The checksum values compute a CRC for each named file. Use this command
to verify that the files are not corrupted. You compare the checksum output for
the received file against the checksum output for the original file.
md5sum (Optional) Displays the MD5 checksum (electronic fingerprint) for the file.
MD5 is the latest implementation of the Internet standards described in RFC
1321 and is useful for data security and integrity.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show file command output, see the Cisco 4700 Series Application
Control Engine Appliance Administration Guide.
Examples To display the contents of the file FILE1 stored in the directory MYFILES in disk0:, enter:
host1/Admin# show file disk0:MYFILES/FILE1
show fragment
To display the IP fragmentation and reassembly statistics for all interfaces in the ACE or the specified
interface, use the show fragment command.
Usage Guidelines This command requires the interface feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
If you omit the vlan vlan_id optional keyword and argument, you can display statistics for all interfaces
in the ACE.
For information about the fields in the show fragment command output, see the Cisco 4700 Series
Application Control Engine Appliance Security Configuration Guide.
Examples To display the IP fragmentation and reassembly statistics for VLAN 210, enter:
host1/Admin# show fragment vlan 210
show ft
To display the fault-tolerant (ft), or redundancy, statistics per context, use the show ft command.
Syntax Description group group_id Displays FT group statistics for the specified FT group. In the Admin context, this
keyword displays statistics for all FT groups in the ACE. Also, in the Admin
context, you can specify an FT group number to display statistics for an individual
group. In a user context, this keyword displays statistics only for the FT group to
which the user context belongs.
brief Displays the group ID, local state, peer state, context name, and context ID of all
FT groups configured in the ACE.
detail Displays detailed information for the specified FT group or peer.
status Displays the current operating status for the specified FT group or peer.
summary Displays summary information for the specified FT group or peer.
history Displays a history of internal redundancy software statistics (Admin context only).
cfg_cntlr Displays the configuration controller debug log.
ha_dp_mgr Displays the high availability (HA) dataplane manager debug log.
ha_mgr Displays the HA manager debug log.
idmap Displays the IDMAP table for all object types. In a redundancy configuration, the
IDMAP table is used to map onjects between the active and the standby ACEs for
use in config sync and state replication.
memory [detail] Displays summary HA manager memory statistics or optional detailed HA manager
memory statistics (Admin context only).
peer peer_id Specifies the identifier of the remote standby member of the FT group.
stats group_id Displays redundancy statistics for the specified FT group.
track group_id Displays redundancy statistics related to tracked items for all FT groups.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering
the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available
for redirecting the command output, see the show command.
Usage Guidelines This command requires the fault-tolerant feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
For information about the fields in the show ft command output, see the Cisco 4700 Series Application
Control Engine Appliance Administration Guide.
show hardware
To display the ACE hardware details, such as the serial number and the hardware revision level, use the
show hardware command.
Syntax Description | (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show hardware command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
Syntax Description | (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Use the clear icmp-statistics command to clear the ICMP statistics.
For information about the fields in the show icmp statistics command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
show interface
To display the interface information, use the show interface command.
Syntax Description bvi number (Optional) Displays the information for the specified Bridge Group Virtual
Interface (BVI).
gigabitEthernet (Optional) Displays the statistics for the specified gigabit Ethernet slot and port.
slot_number/port • The slot_number represents the physical slot on the ACE containing the
_number Ethernet ports. This selection is always 1.
• The port_number represents the physical Ethernet port on the ACE. Valid
selections are 1 through 4.
This keyword is available in the Admin context only.
counters Displays a summary of interface counters for the specified Ethernet data port
related to the receive and transmit queues.
internal (Optional) Displays the internal interface manager tables and events.
event-history Displays event history information.
dbg Displays debug history information.
mts Displays message history information.
iftable Displays the master interface table (Admin context only).
name (Optional) Interface table name. If you specify an interface table name, the ACE
displays the table information for that interface.
port-vlantable (Optional) Displays the Ethernet port manager VLAN table.
vlantable (Optional) Displays the VLAN table (Admin context only).
number (Optional) VLAN number. If you specify an interface number, the ACE displays
the table information for that interface.
port-channel (Optional) Displays the channel number assigned to a port-channel interface. Valid
channel_number values are from 1 to 255. This keyword is available in the Admin context only.
vlan number (Optional) Displays the statistics for the specified VLAN.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering
the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available
for redirecting the command output, see the show command.
Usage Guidelines This command requires the interface feature in your user role. In addition, the Ethernet data port,
Ethernet management port, and port-channel interface command functions require the Admin user role.
For details about role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application
Control Engine Appliance Virtualization Configuration Guide.
To display all of the interface statistical information, enter the show interface command without using
any of the optional keywords.
The internal keyword and options are intended for use by trained Cisco personnel for troubleshooting
purposes only.
For information about the fields in the show interface command output, see the Cisco 4700 Series
Application Control Engine Appliance Routing and Bridging Configuration Guide.
show inventory
To display the system hardware inventory, use the show inventory command.
Syntax Description raw (Optional) Displays the hardware inventory report and information about each
temperature sensor in the ACE.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering
the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
Use the show inventory command to display information about the field-replaceable units (FRUs) in the
ACE, including product IDs, serial numbers, and version IDs.
If you do not include the raw keyword, the ACE displays the hardware inventory report only.
For information about the fields in the show inventory command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
To display the hardware inventory report and information about each temperature sensor, enter:
host1/Admin# show inventory raw
show ip
To display the IP statistics, use the show ip command.
show ip {dhcp relay {conf | information policy | statistics} | fib [ixp {1 | 2 {dest-ip ip_address}}
| summary | wr dest-ip ip_address] | interface brief [[bvi | vlan] number] | route [internal
{event-history dbg | memory} | summary] | traffic} [|] [>]
Syntax Description dhcp relay Specifies the Dynamic Host Configuration Protocol (DHCP) configuration
information.
conf Displays the DHCP relay configuration information.
information policy Displays the relay agent information and the reforwarding policy status.
statistics Displays the DHCP relay statistics.
fib Displays the Forwarding Information Base (FIB) table for the context. This
table contains information that the forwarding processors require to make IP
forwarding decisions. This table is derived from the route and ARP table.
ixp 1 | 2 dest-ip (Optional) Displays the FIB information for a destination address on the
ip_address ACE IXP 1 or 2. Enter the IP address in dotted-decimal notation (for
example, 172.27.16.10).
summary (Optional) Displays the FIB table or route summary for the current context.
wr dest-ip ip_address (Optional) Displays the FIB information for the specified wire region (0
only) and destination IP address. Enter the IP address in dotted-decimal
notation (for example, 172.27.16.10).
interface brief Displays a brief configuratonal and status summary of all interfaces, or a
specified bridge group virtual interface (BVI) or a virtual LAN (VLAN),
including the interface number, IP address, status, and protocol.
bvi Displays the information for a specified Bridge Group Virtual
Interface (BVI).
vlan Displays the statistics for a specified VLAN number.
number Specifies the number of the existing BVI or the VLAN. For a BVI, enter an
integer from 1 to 4094. For a VLAN, enter an integer from 2 to 4094.
route Displays the route entries.
internal (Optional) Specifies the internal route entries.
event-history dbg Displays the event history statistics.
memory Displays the mtrack output statistics.
summary Displays a summary of route entries.
traffic Displays the IP protocol statistics.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The internal and fib keywords and options are intended for use by trained Cisco personnel for
troubleshooting purposes only.
For information about the fields in the show ip command output, see the Cisco 4700 Series Application
Control Engine Appliance Security Configuration Guide and the Cisco 4700 Series Application Control
Engine Appliance Routing and Bridging Configuration Guide.
show ipcp
To display the IP Control Protocol (IPCP) event history information, use the show ipcp command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
show ldap-server
To display the configured Lightweight Directory Access Protocol (LDAP) server and server group
parameters, use the show ldap-server command.
Syntax Description groups (Optional) Displays configured LDAP server group information.
| (Optional) Pipe character (|) for enabling an output modifier that filters the command
output. For a complete description of the options available for filtering the command
output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show ldap-server command output, see the Cisco 4700 Series
Application Control Engine Appliance Security Configuration Guide.
show license
To display your ACE license information, use the show license command.
show license [brief | file filename | internal event-history | status | usage] [|] [>]
Syntax Description brief (Optional) Displays a filename list of currently installed licenses.
file filename (Optional) Displays the file contents of the specified license.
internal (Optional) Displays a history of licensing-related events.
event-history
status (Optional) Displays the status of licensed features.
usage (Optional) Displays the usage table for all licenses.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering
the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
Entering the show license command without any options and arguments displays all of the installed ACE
license files and their contents.
For information about the fields in the show license command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
To manage the licenses on your ACE, use the license command.
Examples To display all of the installed ACE license files and their contents, enter:
host1/Admin# show license
show line
To display all of the configured console and virtual terminal line sessions, use the show line command.
Syntax Description console (Optional) Displays the configured console settings for the ACE.
connected (Optional) Displays the physical connection status.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering
the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
For information about the fields in the show line command output, see the Cisco 4700 Series Application
Control Engine Appliance Administration Guide.
Examples To display all configured console and virtual terminal line sessions, enter:
host1/Admin# show line
show logging
To display the current severity level and state of all syslog messages stored in the logging buffer, or to
display information related to specific syslog messages, use the show logging command.
show logging [history | internal {event-history dbg | facility} | message [syslog_id | all | disabled]
| persistent | queue | rate-limit | statistics] [|] [>]
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To use the show logging command, you must have the ACE buffer enabled as a logging output location.
By default, logging to the local buffer on the ACE is disabled. To enable system logging to a local buffer
and to limit the messages sent to the buffer based on severity, use the logging buffered configuration
command from the desired context.
The show logging command lists the current syslog messages and identifies which logging command
options are enabled.
To clear the ACE buffer of the logging information currently stored, use the clear logging command.
For information about the fields in the show logging command output, see the Cisco 4700 Series
Application Control Engine Appliance Security Configuration Guide.
To display statistics for the log messages sent to Flash memory on the ACE, enter:
host1/Admin# show logging persistent
Syntax Description | (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
To configure the login timeout value, use the login timeout command in configuration mode.
For information about the fields in the show login timeout command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
show nat-fabric
To display the Network Address Translation (NAT) policy and pool information for the current context, use
the show nat-fabric command.
Usage Guidelines This command requires the NAT feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
To obtain the values for the policy_id, mapped_if, and static_xlate_id arguments, view their respective
fields displayed by the show nat-fabric policies command.
show netio
To display the control plane network I/O information, use the show netio command.
Syntax Description clients Displays statistics for the applications that are transmitting and receiving packets
through the Netio module.
event-history Displays a historic log of the most recent debug network I/O messages.
stats Displays detailed counters for various Netio event occurrences.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering the
command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
show np
To display the hardware information stored on the two network processors (NPs), use the show np
command.
show np np_number {access-list {node vlan vlan_number {in node_address | out node_address} |
resource | root vlan vlan_number {in | out} | syslog {linenotable table_index [all] |
name_table table_index [all] } | trace vlan vlan_number {in | out} protocol prot_number |
source source_ip source_port | destination dest_ip dest_port} | adjacency [lower_index
upper_index [all] | cpu | internal [lower_index upper_index] | reap] | interface {icmlookup
[all] | iflookup [all]} | mac-address-table | me-stats ucdump_option | memory | mtrie dest-ip
dest_ip | nat {bitmap map_id | dst_nat policy_id | implicit-pat | policies | src-nat policy_id
interface_id} | status} [|] [>]
Syntax Description np_number Network processor number. Enter one of the following processor
identifier numbers:
• 0—x86 processor
• 1—Octeon processor
access-list Displays information related to the access list.
node Displays the contents of the hardware access control list (ACL) node,
identified by the vlan_number.
vlan vlan_number Specifies the number of the VLAN.
in Specifies the inbound traffic flow.
out Specifies the outbound traffic flow.
node_address Address of the node.
resource Displays information about the access list resource usage.
root Displays the hardware address of the root of the downloaded, aggregated
ACL, identified by the vlan_number.
syslog Displays information about the access list syslog tables.
linenotable table_index Displays the access list syslog namestring table. Enter an index entry
from 0 to 262143.
name_table table_index Displays the access list syslog line number table. Enter an index entry
from 0 to 16383.
all Specifies if invalid entries also need to be shown
trace vlan vlan_number Traces a packet through a specific access list.
protocol prot_number Specifies a protocol number.
source Specifies the source of the flow.
source_ip Source IP address.
source_port Source port number.
destination Specifies the destination of a flow.
dest_ip Destination IP address.
dest_port Destination port number.
adjacency (Optional) Displays information related to the adjacent nodes.
lower_index (Optional) Lower index value. Enter a value from 1 to 32767.
Usage Guidelines This command and its options require the access-list or interface feature in your user role, except for the
cpu, me-stats, and memory options. These three options require that you have the Admin user role in
any context. For details about role-based access control (RBAC) and user roles, see the Cisco 4700
Series Application Control Engine Appliance Virtualization Configuration Guide.
This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples To display the access list information from the hardware using the network processor 0, enter:
host1/Admin# show np 0 access-list
To display Micro Engine statistics for a ucdump utility (-b, which instructs the ACE to dump fastpath
buffer memory), enter:
host1/Admin# show np me-stats -b
show ntp
To display information about the Network Time Protocol (NTP) statistics, use the show ntp command.
show ntp {peer-status | peers | statistics [io | local | memory | peer ip_address]} [|] [>]
Syntax Description peer-status Displays the status for all configured NTP servers and peers.
peers Displays a listing of all peers.
statistics Displays the NTP statistics.
io (Optional) Displays information the input/output statistics.
local (Optional) Displays the counters maintained by the local NTP.
memory (Optional) Displays the statistical counters related to the memory code.
peer (Optional) Displays the peer-peer statistical counters of the specified peer.
ip_address Peer statistics for the specified IP address.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering
the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the options
available for redirecting the command output, see the show command.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
Examples To display the status for all configured NTP servers and peers, enter:
host1/Admin# show peer-status
show optimization-global
To display information about the global optimization statistics, use the show optimization-global
command.
Syntax Description | (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
show parameter-map
To display the detailed configuration information for a specified parameter map, use the show
parameter-map command.
Usage Guidelines This command requires the connection feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Examples To display the configuration for the parameter map SSL_PARAMMAP, enter:
host1/Admin# show parameter-map SSL_PARAMMAP
show probe
To display the probe information including script probes, use the show probe command.
Usage Guidelines This command requires the probe feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
If you enter the show probe command without specifying a probe name, the ACE displays a summary
report that includes all configured probes.
For information about the fields in the show probe command output, see the Cisco 4700 Series
Application Control Engine Appliance Server Load-Balancing Configuration Guide.
show processes
To display the general information about all of the processes running on the ACE, use the show processes
command. The show processes command displays summary CPU information for the Pentium processor.
show processes [cpu | log [details | pid process_id] | memory] [|] [>]
Syntax Description cpu (Optional) Displays information about the CPU processes for the Pentium processor.
log (Optional) Displays information about the process logs for the Pentium processor.
details (Optional) Displays detailed process log information for all process identifiers.
pid process_id (Optional) Displays process information about a specific process identifier. Enter a
value from 0 to 2147483647.
memory (Optional) Displays information about the memory processes for the Pentium
processor.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering the
command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
The show processes command is available only to Admin users (users with an Admin role) across all
contexts. The displayed system processes information is at the CPU system level (the total CPU usage) and
is not on a per-context level.
For information about the fields in the show processes command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
Examples To display information about the memory processes for the Pentium processor, enter:
host1/Admin# show processes memory
show radius-server
To display the configured Remote Authentication Dial-In User Service (RADIUS) server and group
parameters, use the show radius-server command.
Syntax Description groups (Optional) Displays configured RADIUS server group information.
sorted (Optional) Displays RADIUS server information sorted by name.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering the
command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide
For information about the fields in the show radius-server command output, see the Cisco 4700 Series
Application Control Engine Appliance Security Configuration Guide.
Syntax Description | (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
This command shows the resource allocation but does not show the actual resources being used. To
display information about actual resource usage, use the show resource usage command.
For information about the fields in the show resource allocation command output, see the Cisco 4700
Series Application Control Engine Appliance Administration Guide.
show resource usage [all | [[context context_name | summary | top number] [resource
{acc-connections | acl-memory | all | conc-connections | mgmt-connections | probes |
proxy-connections | rate {bandwidth | connections | inspect-conn | mac-miss | mgmt-traffic
| ssl-connections | syslog} | regexp | sticky | syslogbuffer | xlates}]]] [counter [all | current |
denied | peak [count_threshold]]] [|] [>]
Syntax Description all (Optional) Displays the resource usage for each context individually.
This is the default setting.
context context_name (Optional) Displays the resource usage for the specified context. The
context_name argument is case sensitive.
summary (Optional) Displays the total resource usage for all contexts together.
For example, the denied column shows the items that have been denied
for each context limit.
top number (Optional) Displays the greatest n users of a single resource arranged
from the highest to the lowest percentage of resources used. You must
specify a single resource type and cannot use the resource all
keywords with this option.
resource (Optional) Displays statistics for one of the following specified
resources:
acc-connections Displays the number of application acceleration connections.
acl-memory Displays the ACL memory usage.
all Displays the resource usage for all resources used by the specified
context or contexts.
conc-connections Displays the resource usage for simultaneous connections.
mgmt-connections Displays the resource usage for management connections.
probes Displays the resource usage for probes.
proxy-connections Displays the resource usage for proxy connections.
rate Displays the rate per second for the specified connections or syslog
messages.
bandwidth Displays the bandwidth in bytes per second.
connections Displays connections per second.
inspect-conn Displays RTSP/FTP inspection connections per second.
mac-miss Displays MAC miss traffic that was punted to the CP packets per
second.
mgmt-traffic Displays management traffic bytes per second.
ssl-connections Displays Secure Sockets Layer (SSL) connections.
syslog Displays the syslog message buffer usage.
regexp Displays resource usage for regular expressions.
sticky Displays resource usage for sticky entries.
syslogbuffer Displays resource usage for the syslog buffer.
Defaults None
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
For information about the fields in the show resource usage command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
show role
To display the configured user roles (predefined and user-configured roles), use the show role command.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
To configure roles, use the role command in configuration mode.
For information about the fields in the show role command output, see the Cisco 4700 Series Application
Control Engine Appliance Administration Guide.
show rserver
To display the summary or detailed statistics for a named real server or for all real servers, use the show
rserver command.
Usage Guidelines This command requires the rserver feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show rserver command output, see the Cisco 4700 Series
Application Control Engine Appliance Server Load-Balancing Configuration Guide.
Examples To display detailed statistics for all configured real servers, enter:
host1/Admin# show rserver detail
show running-config
To display the running configuration information associated with the current context, use the show
running-config command.
Syntax Description aaa (Optional) Displays authentication, authorization, and accounting (AAA)
information.
access-list (Optional) Displays access control list (ACL) information.
action-list (Optional) Displays action list information.
class-map (Optional) Displays the list of all class maps configured for the current context. The
ACE also displays configuration information for each class map listed.
context (Optional) Displays the list of contexts configured on the ACE. The ACE also
displays the resource class (member) assigned to each context. The context keyword
only works from within the admin context.
dhcp (Optional) Displays Dynamic Host Configuration Protocol (DHCP) information.
domain (Optional) Displays the list of domains configured for the current context. The ACE
also displays configuration information for each domain listed.
ft (Optional) Displays the list of redundancy or fault-tolerance (ft) configurations
configured for the current context. The ACE also displays configuration information
for each ft configuration listed.
interface (Optional) Displays interface information.
parameter-map (Optional) Displays parameter map information.
policy-map (Optional) Displays policy map information.
probe (Optional) Displays probe information.
resource-class (Optional) Displays resource class information.
role (Optional) Displays the list of roles configured for the current context. The ACE also
displays configuration information for each role on the list.
rserver (Optional) Displays rserver information.
serverfarm (Optional) Displays server farm information.
sticky (Optional) Displays sticky information.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering the
command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The show running-config command is a context-sensitive command. The ACE creates a running
configuration for each context that you create; therefore, to display the running-config file of a specific
context, you must enter the show running-config command from within the desired context. If you need
to change to another context before executing the show running-config command, use the changeto
command or log directly in to the desired context.
Use the copy capture command to do the following:
• Save a copy of the running configuration to a file on one or more destination locations.
• Save the running configuration as the startup configuration.
• Save the startup configuration as the running configuration.
For information about the fields in the show running-config command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
show script
To display the statistics for a script file that is active on the ACE including exit codes and exit messages,
use the show script command.
Usage Guidelines This command requires the probe feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show script command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
Examples To display the script file code for the script in the file MYSCRIPT, enter:
host1/Admin# show script code MYSCRIPT
Syntax Description errors Displays the debug error logs of the security manager.
msgs Displays the message logs of the security manager.
| (Optional) Pipe character (|) for enabling an output modifier that filters the command
output. For a complete description of the options available for filtering the command
output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
show serverfarm
To display a summary or detailed statistics about a specified server farm, use the show serverfarm
command.
Syntax Description name (Optional) Displays the detailed report for the specified server farm. If you do not
specify a server farm name, the summary report displays.
detail (Optional) Displays detailed statistics for the specified server farm.
retcode (Optional) Displays the HTTP return codes associated with the server farm.
| (Optional) Pipe character (|) for enabling an output modifier that filters the command
output. For a complete description of the options available for filtering the command
output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command requires the serverfarm feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
For information about the fields in the show serverfarm command output, see the Cisco 4700 Series
Application Control Engine Appliance Server Load-Balancing Configuration Guide.
show service-policy
To display the statistics for all policy maps or a specific policy map that is currently in service, use the
show service-policy command.
Syntax Description policy_name (Optional) Identifier of an existing policy map that is currently in service (applied
to an interface) as an unquoted text string with a maximum of 64 alphanumeric
characters. If you do not enter the name of an existing policy map, the ACE displays
information and statistics for all policy maps.
detail (Optional) Displays a more detailed listing of policy map statistics and status
information.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering the
command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The show service-policy command displays the following information:
• VLAN to which the policy is applied
• Class map associated with the policy
• Status of any load-balancing operations
The ACE updates the counters that the show service-policy command displays after the applicable
connections are closed.
For information about the fields in the show service-policy command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
Examples To display the statistics and current status of the service policy MGMT_POLICYMAP, enter:
host1/Admin# show service-policy MGMT_POLICYMAP detail
show snmp
To display the Simple Network Management Protocol (SNMP) statistics and configured SNMP
information, use the show snmp command.
show snmp [community | engineID | group | host | sessions | user] [|] [>]
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
By default, this command displays the ACE contact, the ACE location, the packet traffic information,
community strings, and the user information. You can instruct the ACE to display specific SNMP
information by including the appropriate keyword.
For information about the fields in the show snmp command output, see the Cisco 4700 Series
Application Control Engine Appliance Security Configuration Guide.
show ssh
To display the information about the Secure Shell (SSH) keys and sessions, use the show ssh command.
show ssh {key [dsa | rsa | rsa1] | maxsessions [context_name] | session-info [context_name]} [|] [>]
Syntax Description key Displays the host key pair details for all SSH keys.
dsa (Optional) Displays only the details of the DSA key pair for the SSH version 2
protocol.
rsa (Optional) Displays only the details of the RSA key pair for the SSH version 2
protocol.
rsa1 (Optional) Displays only the details of the RSA1 key pair for the SSH version 1
protocol.
maxsessions Displays the maximum number of SSH sessions that the ACE allows. Context
administrators may also view SSH session information associated with a particular
context.
context_name (Optional) Name of an existing context that contains the SSH session information
that the context administrator wants to view. Only the global administrator can view
Telnet information associated with a particular context. The context_name argument
is case sensitive and is visible only from the admin context.
session-info Displays session information, including the session ID, the remote host IP address,
and the active time.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering the
command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
From the Admin context, this argument allows you to display only the SSH information associated with
a specific user-created context.
For information about the fields in the show ssh command output, see the Cisco 4700 Series Application
Control Engine Appliance Security Configuration Guide.
To display the maximum number of SSH sessions that the ACE permits for the context C2:
host1/Admin # show ssh maxsessions C2
Maximum Sessions Allowed is 2(SSH Server is enabled)
show startup-config
To display information about the startup configuration that is associated with the current context, use the
show startup-config command.
Syntax Description | (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To clear the startup configuration, use the clear startup-config command.
To copy the running configuration to the startup configuration, or copy the startup configuration to the
running configuration, use the copy running-config command.
For information about the fields in the show startup-config command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
show stats
To display statistics about the ACE operation, use the show stats command.
show stats [connection | http | inspect | loadbalance | optimization http | probe [type
probe_type]| sticky] [|] [>]
Syntax Description connection (Optional) Displays global connection statistics associated with the current context.
http (Optional) Displays global HTTP statistics associated with the current context.
inspect (Optional) Displays global HTTP inspect statistics associated with the current
context.
loadbalance (Optional) Displays global load-balancing statistics associated with the current
context.
optimization (Optional) Displays HTTP optimization global statistics associated with the current
http context.
probe [type (Optional) Displays global probe statistics associated with the current context. To
probe_type] display the statistics for a specific probe type (for example, scripted), include the
type probe_type keyword and argument. To see a list of probe types, enter:
host1/Admin# show stats probe type ?
sticky (Optional) Displays global sticky statistics associated with the current context.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering the
command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command requires the loadbalance, inspect, NAT, connection, or SSL feature in your user role. For
details about role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application
Control Engine Appliance Virtualization Configuration Guide.
Examples To display all of the statistics about the ACE operation, enter:
host1/Admin# show stats
show sticky database [static] [client ip_address | group group_name | http-cookie cookie_value |
http-header hdr_value | rserver server_name {port_number} {serverfarm sfarm_name } |
type {http-cookie | http-header | ip-netmask {both | destination | source}}] [|] [>]
Syntax Description static (Optional) Displays static sticky database entries. If you do not use an
optional keyword to specify the kind of static sticky database entry to
display, all entries display.
client ip_address (Optional) Displays sticky database entries for the source IP address
of a client that you specify.
group group_name (Optional) Displays sticky database entries for the sticky group name
that you specify.
http-cookie cookie_value (Optional) Displays sticky database entries for the HTTP-cookie
value that you specify.
http-header hdr_value (Optional) Displays sticky database entries for the HTTP-header
value that you specify.
rserver server_name (Optional) Displays sticky database entries for the real-server name
that you specify.
port_number Real server port number.
serverfarm sfarm_name Specifies a server farm associated with the real server.
type (Optional) Displays sticky database entries for one of the following
sticky group types:
http-cookie Specifies HTTP-cookie sticky database entries.
http-header Specifies HTTP-header sticky database entries.
ip-netmask Specifies IP-netmask sticky database entries.
both Specifies the source and destination IP netmasks.
destination Specifies the destination IP netmask.
source Specifies the source IP netmask.
| (Optional) Pipe character (|) for enabling an output modifier that
filters the command output. For a complete description of the options
available for filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier
that redirects the command output to a file. For a complete description
of the options available for redirecting the command output, see the
show command.
Usage Guidelines This command requires the sticky feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show sticky command output, see the Cisco 4700 Series
Application Control Engine Appliance Server Load-Balancing Configuration Guide.
Examples To display sticky statistics for the client with a source IP address of 192.168.12.15, enter:
host1/Admin# show sticky database client 192.168.12.15
show system
To display the ACE system information, use the show system command.
show system cpuhog | {error-id {hex_id | list} | internal {aaa {event-history {errors | msgs} |
mem-stats} | log {boot {kickstart | system} | install [details]} | mts {buffers [age seconds |
details | node name | order | sap number | summary] | memory | opcode} | radius
event-history {errors | msgs} | sysmgr {event-history {errors | msgs} | service {all [detail]
| local [detail] | name service_name [dependencies | policies | seqnotbl] | not-running
[details] | pid id [config | dependencies | log] | running [details] | uuid hex_id [config |
dependencies]} | startup-config {locks | state} | state | time} | tacacs+ event-history {errors
| msgs} | urifs | vshd {config-intro | feature-list | license-info | log {running-config |
tree-table} | subtype-table | tree-table}} | kmemtrack | resources | skbtrack | uptime} [|] [>]
Syntax Description cpuhog Displays information related to the process watchdog timer that monitors
CPU usage by currently active processes.
error-id Displays description about errors.
hex_id Error ID in hexadecimal format. The range is from 0x0 to 0xffffffff.
list Specifies all error IDs.
internal Displays Cisco internal system-related functions. The internal keywords
and related keywords, options, and arguments are intended for use by
trained Cisco personnel for troubleshooting purposes only. This option is
available in the Admin context only.
kmemtrack Displays the kernal memory allocations in the kernel loadable modules.
resources Displays system-related CPU and memory statistics.
skbtrack Displays the socket buffer (network buffer) allocations in the kernel
loadable modules.
uptime Displays how long the ACE has been up and running.
| (Optional) Pipe character (|) for enabling an output modifier that filters
the command output. For a complete description of the options available
for filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show system command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
show tacacs-server
To display the configured Terminal Access Controller Access Control System Plus (TACACS+) server
and server group parameters, use the show tacacs-server command.
Syntax Description groups (Optional) Displays configured TACACS+ server group information.
sorted (Optional) Displays TACACS+ server information sorted by name.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering the
command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show tacacs-server command output, see the Cisco 4700 Series
Application Control Engine Appliance Security Configuration Guide.
Syntax Description | (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command requires the connection feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
For information about the fields in the show tcp statistics command output, see the Cisco 4700 Series
Application Control Engine Appliance Security Configuration Guide.
show tech-support
To display information that is useful to technical support when reporting a problem with your ACE, use
the show tech-support command.
Syntax Description details (Optional) Provides detailed information for each of the show commands described
below in the “Usage Guidelines” section.
| (Optional) Pipe character (|) for enabling an output modifier that filters the command
output. For a complete description of the options available for filtering the command
output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The show tech-support command is useful when collecting a large amount of information about your
ACE for troubleshooting purposes with Cisco technical support. The output of this command can be
provided to technical support representatives when reporting a problem.
The show tech-support command displays the output of several show commands at once. The output
from this command varies depending on your configuration. The default output of the show
tech-support command includes the output of the following commands:
• show environment—See the show fifo command.
• show hardware—See the show hardware command.
• show interface—See the show interface command.
• show process—See the show processes command.
Examples To display the summary version of the technical support report, enter:
host1/Admin# show tech-support
show telnet
To display the information about the Telnet session, use the show telnet command.
Syntax Description maxsessions (Optional) Displays the maximum number of enabled Telnet sessions.
context_name (Optional) Name of an existing context. Use the context_name argument to
display Telnet information that pertains only to the specified context. The
context_name argument is case sensitive.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
If you do not include the optional maxsessions keyword, the ACE displays the following Telnet
information:
• Session ID—Unique session identifier for the Telnet session
• Remote host—IP address and port of the remote Telnet client
• Active time—Time since the Telnet connection request was received by the ACE
For information about the fields in the show telnet command output, see the Cisco 4700 Series
Application Control Engine Appliance Security Configuration Guide.
show terminal
To display the console terminal settings, use the show terminal command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show terminal command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
Syntax Description | (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command requires the connection feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
For information about the fields in the show udp statistics command output, see the Cisco 4700 Series
Application Control Engine Appliance Security Configuration Guide.
show user-account
To display user account information, use the show user-account command.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To display the user account information for all users, do not specify a user with the optional user_name
argument.
For information about the fields in the show user-account command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
show users
To display the information for users that are currently logged in to the ACE, use the show users
command.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To display the information for all users that are currently logged in to the ACE, do not specify a user
with the optional user_name argument.
For information about the fields in the show users command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
Examples To display information for all users that are currently logged in to the ACE, enter:
host1/Admin# show users
show version
To display the version information of system software that is loaded in Flash memory and currently
running on the ACE, use the show version command.
Syntax Description | (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The show version command also displays information related to the following ACE hardware
components:
• CPU—Number of CPUs and type and model
• Memory—Total and shared volatile memory
• Flash memory—Total and used Flash memory
Use the show version command to verify the software version on the ACE before and after an upgrade.
For information about the fields in the show version command output, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
show vlans
To display the VLANs on the ACE, use the show vlans command.
Syntax Description | (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command requires the interface feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show vlans command output, see the Cisco 4700 Series
Application Control Engine Appliance Routing and Bridging Configuration Guide.
show vnet
To display information about the virtual network (VNET) device, use the show vnet command.
Syntax Description event-history Displays a historic log of the most recent debug VNET messages.
stats Displays detailed counters for various VNET events.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for
filtering the command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that
redirects the command output to a file. For a complete description of the
options available for redirecting the command output, see the show
command.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples To display VNET device statistics for the control plane, enter:
host1/Admin# show vnet stats
show xlate
To display information about the IP and port translation (XLATE), use the show xlate command.
Syntax Description global (Optional) Displays information for a global IP address or a range of global IP
ip_address1 addresses to which the ACE translates source addresses for static and dynamic NAT.
ip_address2 For a single global IP address, enter the address in dotted-decimal notation (for
example, 192.168.12.15). To specify a range of IP addresses, enter a second IP
address.
netmask mask (Optional) Specifies a subnet mask for the specified IP addresses.
local (Optional) Displays information for a local IP address or range of local IP addresses.
ip_address3 For a single local IP address, enter the address in dotted-decimal notation (for
ip_address4 example, 192.168.12.15). To specify a range of local IP addresses, enter a second IP
address.
gport port1 (Optional) Displays information for a global port or a range of global ports to which
port2 the ACE translates source ports for static port redirection and dynamic PAT. Enter a
port number as an integer from 0 to 65535. To specify a range of port numbers, enter
a second port number.
lport port1 (Optional) Displays information for a local port or a range of local ports. Enter a port
port2 number as an integer from 0 to 65535. To specify a range of port numbers, enter a
second port number.
| (Optional) Pipe character (|) for enabling an output modifier that filters the
command output. For a complete description of the options available for filtering the
command output, see the show command.
> (Optional) Greater-than character (>) for enabling an output modifier that redirects
the command output to a file. For a complete description of the options available for
redirecting the command output, see the show command.
Usage Guidelines This command requires the NAT feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the fields in the show xlate command output, see the Cisco 4700 Series
Application Control Engine Appliance Security Configuration Guide.
ssh
To initiate a Secure Shell (SSH) session with another device, use the ssh command.
Syntax Description hostname Name or IP address of the host to access. If no username is specified, the default is
“admin”. Enter up to 64 alphanumeric characters.
user User name on a host.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
system internal
To generate a debug snapshot of a service, use the system internal command.
Syntax Description name Name of a system service for which you want to take a snapshot. Enter an unquoted
text string with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines This command requires the Admin role in the Admin context. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
tac-pac
To save Technical Assistance Center (TAC) information to a local or remote location, use the tac-pac
command.
Syntax Description ftp: (Optional) Specifies the File Transfer Protocol network server as the destination.
scp: (Optional) Specifies the Secure Copy network server as the destination.
sftp: (Optional) Specifies the Secure File Transfer Protocol network server as the
destination.
tftp: (Optional) Specifies the Trivial File Transfer Protocol network server as the
destination.
disk0: (Optional) Specifies the disk0: file system in Flash memory on the ACE as the
destination.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The TAC information that the ACE saves when using the tac-pac command is the same information that
you can display using the show tech-support command.
If you do not specify a directory on a file system, the default is the root directory.
The output of the show tech-support command is in gzip format. We recommend that you include the
.gz extension in the filename so that it can be easily unzipped from the destination filesystem.
Examples To save TAC information and send the output of the show tech-support command to a remote FTP
server, enter:
host1/Admin# tac-pac ftp://192.168.1.2/tac-output_10-7-07.gz
telnet
To initiate a Telnet session with another network device, use the telnet command.
Syntax Description ip_address IP address of the network host. Enter an IP address in dotted-decimal notation (for
example, 172.16.1.10).
port (Optional) Port number on network host. The range is from 0 to 2147483647.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
terminal
To configure the terminal display settings, use the terminal command.
Syntax Description length lines Sets the number of lines displayed on the current terminal screen. This command is
specific to the console port only. Telnet and Secure Shell (SSH) sessions set the
length automatically. Valid entries are from 0 to 511. The default is 24 lines. A
selection of 0 instructs the ACE to scroll continuously (no pausing).
monitor Displays the syslog output on the terminal for the current terminal and session. To
enable the various levels of syslog messages to the terminal, use the logging
monitor command in configuration command mode.
no Negates a command or sets it back to its default value.
session-timeout Specifies the session timeout value in minutes to configure the automatic logout time
minutes for the current terminal session on the ACE. When you exceed the time limit
configured by this command, the ACE closes the session and exits. The range is 0 to
525600. The default is 5 minutes. You can set the terminal session-timeout value
to 0 to disable this feature so that the terminal remains active until you choose to exit
the ACE. The ACE does not save this change in the configuration file.
terminal-type Specifies the name and type of the terminal used to access the ACE. If a Telnet or
text SSH session specifies an unknown terminal type, the ACE uses the VT100 terminal
by default. Specify a text string from 1 to 80 alphanumeric characters.
width Sets the number of characters displayed on the current terminal screen. This
characters command is specific to only the console port. Telnet and SSH sessions set the width
automatically. Valid entries are from 24 to 512. The default is 80 columns.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Use the show terminal command to display the current terminal settings.
All terminal parameter-setting commands are set locally and do not remain in effect after you end a
session. You must perform this task at the Exec prompt at each session to see the debugging messages.
Examples To specify the VT100 terminal, set the number of screen lines to 35, and set the number of characters to
250, enter:
host1/Admin# terminal terminal-type vt220
host1/Admin# terminal length 35
host1/Admin# terminal width 250
To specify a terminal timeout of 600 minutes for the current session, enter
host1/Admin# terminal session-timeout 600
traceroute
To trace the route that an IP packet takes to a network host from the ACE, use the traceroute command.
Syntax Description ip_address (Optional) IP address of the network host. Enter an IP address in dotted-decimal
notation (for example, 172.27.16.10).
size packet (Optional) Specifies the packet size. Enter a number from 40 to 452. The default is 40.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
This command traces the route that an IP packet follows to an Internet host by launching User Datagram
Protocol (UDP) probe packets with a small time to live (TTL), and then listening for an Internet Control
Message Protocol (ICMP) “time exceeded” reply from a gateway.
Examples To display the route that a packet takes from the ACE to a network host with the IP address 196.126.1.2,
enter:
host1/Admin# traceroute 196.126.1.2
undebug all
To disable all debugging, use the undebug all command.
undebug all
Usage Guidelines This command is available to all user roles that allow debugging and is not available to network monitor
or technician users. For details about role-based access control (RBAC) and user roles, see the Cisco
4700 Series Application Control Engine Appliance Virtualization Configuration Guide.
The ACE debug commands are intended for use by trained Cisco personnel only. Entering these
commands may cause unexpected results. Do not attempt to use these commands without guidance from
Cisco support personnel.
untar disk0:
To untar a single file with a .tar extension in the disk0: file system, use the untar command.
untar disk0:[path/]filename
Syntax Description [path/]filename Name of the .tar file on the disk0: file system. The filename must end with a .tar
extension.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The copy licenses disk0: command creates backup .tar license files on the ACE. If a license becomes
corrupted or lost, or you accidently remove the license on the ACE, you can untar the license and
reinstall it.
You must use the untar command in the Admin context to untar a backup tar license file.
write
To manage persistent and nonpersistent configuration information, use the write command.
Syntax Description erase Erases the entire startup configuration with the exception of any configuration that
affects the loader functionality. The startup configuration then reverts back to the
factory-default values. The running configuration is not affected.
memory Writes the running configuration to the startup configuration.
all (Optional) Writes configurations for all existing contexts. This keyword is available
only in the Admin context.
terminal Writes the running configuration to the terminal.
Exec
Admin and user contexts
Usage Guidelines For details about role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application
Control Engine Appliance Virtualization Configuration Guide.
The different versions of this command require the following user role or feature in your user role:
• write erase—Admin user
• write memory—config-copy feature
• write all—Admin user
The write erase command does not remove license files or crypto files (certs and keys) from the ACE.
To remove license files, see the license uninstall command. To remove crypto files, see the crypto
delete command.
If you intend to use the write memory command to save the contents of the running-configuration file
for the current context to the startup-configuration file, you must also specify this command in the
Admin context. Saving changes to the Admin context startup-configuration file is important because the
Admin context startup-configuration file contains all configurations that are used to create each user
context.
To write the running configuration to the startup configuration, you can also use the
copy running-config startup-config command. To erase the startup configuration, you can also use the
clear startup-config command. To display the running configuration, you can also use the show
running-config command.
xml-show
To enable the display of raw XML request show command output in XML format, use the xml-show
command.
Syntax Description off Displays CLI show command output in regular CLI display output, not in XML
format.
on Displays CLI show command output in XML format unless a specific show
command is not implemented to display its output in XML format.
status Displays the current setting of the xml-show command (on or off).
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
By default, XML responses will automatically appear in XML format if the corresponding CLI show
command output supports the XML format. However, if you are running commands on the CLI console
or you are running raw XML responses from NMS, the XML responses appear in regular CLI display
format.
You can enable the display of raw XML request show command output in XML format by performing
one of the following actions:
• Specifying the xml-show on command in Exec mode from the CLI, or
• Including the xml-show on command in the raw XML request itself (CLI commands included in an
XML wrapper).
Specification of the xml-show on command is not required if you are running true XML.
For details on the show command output supported in XML format, consult the ACE DTD file,
ace_appliance.dtd, that is included as part of the software image (see the Cisco 4700 Series Application
Control Engine Appliance Administration Guide). The ACE DTD File contains the information on the
XML attributes for those show output commands that support XML format.
The off and on keywords affect only the current CLI session in use; they are session-based functions.
Examples To enable the display of raw XML request show command output in XML format from the CLI, enter:
host1/Admin# xml-show on
Usage Guidelines This command requires one or more features assigned to your user role that allow configuration, such as
AAA, interface, or fault-tolerant. For details about role-based access control (RBAC) and user roles, see
the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide.
Syntax Description group group_name Associates the accounting method with a TACACS+ or RADIUS server defined
previously through the aaa group server command. The server group name is a
maximum of 64 alphanumeric characters.
local Specifies to use the local database on the ACE as the accounting method.
none Specifies that the ACE does not perform password verification, which disables
password verification. If you configure this option, users can log in without
providing a valid password.
Note Only users with an Admin role can configure the none keyword.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Examples To enable user accounting to be performed using remote TACACS+ servers, followed by local login as
the fallback method, enter:
host1/Admin(config)# aaa accounting default group TacServer local
Syntax Description console Specifies the console port login authentication method, identified by the
specified server group.
default Specifies the default login authentication method (Telnet or Secure Shell [SSH]
login) that is identified by the specified server group.
group group_name Associates the login authentication process with a Terminal Access Controller
Access Control System Plus (TACACS+), Remote Authentication Dial-In User
Service (RADIUS), or Lightweight Directory Access Protocol (LDAP) server
defined through the aaa group server command. The server group name is a
maximum of 64 alphanumeric characters.
local Specifies to use the local database on the ACE as the login authentication
method. If the server does not respond, then the local database is used as the
fallback authentication method.
none Specifies that the ACE does not perform password verification. If you configure
this option, users can log in to the ACE without providing a valid password.
Note Only users with an Admin role can configure the none keyword.
error-enable Enables the display of the login error message when the remote AAA servers
fail to respond.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Use the error-enable option cautiously. If you specify none, any user will be able to access the ACE at
any time.
To view the current display status, use the show aaa authentication login error-enable command.
When a user attempts to log in, and the remote AAA servers do not respond to the authentication request,
the ACE processes the login sequence by switching to local user database.
Examples To enable console authentication using the TACSERVER server group, followed by local login as the
fallback method, enter:
host1/Admin(config)# aaa authentication login console group TACSERVER local
Syntax Description ldap Specifies an LDAP directory server group. For information about the commands in
the LDAP server configuration mode, see the “LDAP Configuration Mode
Commands” section.
radius Specifies a RADIUS server group. For information about the commands in the
RADIUS server configuration mode, see the “RADIUS Configuration Mode
Commands” section.
tacacs+ Specifies a TACACS+ server group. For information about the commands in the
TACACS+ server configuration mode, see the “TACACS+ Configuration Mode
Commands” section.
group_name Name for the LDAP, RADIUS, or TACACS+ server group. The server group name is
a maximum of 64 alphanumeric characters.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
A server group is a list of server hosts of a particular type. The ACE allows you to configure multiple
TACACS+, RADIUS, and LDAP servers as a named server group. You group the different AAA server
hosts into distinct lists. The ACE searches for the server hosts in the order in which you specify them
within a group. You can configure a maximum of 100 server groups for each context in the ACE.
You can configure server groups at any time, but they take effect only when you apply them to the AAA
service using the aaa authentication login or the aaa accounting default commands.
To create a AAA server group and access one of the three AAA server group configuration modes, enter
the aaa group server ldap, aaa group server radius, or aaa group server tacacs+ command in
configuration mode. The CLI prompt changes to (config-ldap), (config-radius), or (config-tacacs+). In
this mode, you specify the IP address of one or more previously configured servers that you want added
to or removed from the server group.
Examples To create a RADIUS server group and add a previously configured RADIUS server, enter:
(config)# aaa group server radius RAD_Server_Group1
host1/Admin(config-radius)# server 192.168.252.1
host1/Admin(config-radius)# server 192.168.252.2
host1/Admin(config-radius)# server 192.168.252.3
(config) access-group
To apply an access control list (ACL) to the inbound direction on all VLAN interfaces in a context and
make the ACL active, use the access-group command. Use the no form of this command to remove an
ACL from all interfaces in a context.
Syntax Description input Specifies the inbound direction of all interfaces in a context on which
you want to apply the ACL
acl_name Identifier of an existing ACL that you want to apply to an interface
Usage Guidelines This command requires the access-list feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
You must apply an ACL to an interface to allow the passing of traffic on that interface. This command
enables you to apply an ACL to all interfaces in a context in the inbound direction only and to allow
traffic on all interfaces simultaneously. The following considerations apply:
• You can use the access-group command in configuration mode only if there are no interfaces in the
context to which you have applied an ACL previously using the (config-if) access-group command
in interface configuration mode.
• If you have applied an ACL globally to all interfaces in a context, you cannot apply an ACL to an
individual interface using the (config-if) access-group command in interface configuration mode.
• You can apply one Layer 2 ACL and one Layer 3 ACL globally to all interfaces in a context.
• You can apply both a Layer 3 and a Layer 2 ACL to all Layer 2 bridge-group virtual interfaces
(BVIs) in a context.
• You can apply only a Layer 3 ACL to all Layer 3 virtual LANs (VLANs) in a context.
For complete details on ACLs, see the Cisco 4700 Series Application Control Engine Appliance Security
Configuration Guide.
Examples To apply an ACL named INBOUND to the inbound direction of all interfaces in the Admin context,
enter:
host1/Admin(config)# access-group input INBOUND
Syntax Description name Unique identifier of the ACL. Enter an unquoted text string with a maximum of
64 alphanumeric characters.
ethertype Specifies a subprotocol of type: any, bpdu, ipv6, or mpls.
deny Blocks connections on the assigned interface.
permit Allows connections on the assigned interface.
any Specifies any EtherType.
bpdu Specifies bridge protocol data units.
ipv6 Specifies Internet Protocol version 6.
mpls Specifies Multiprotocol Label Switching.
Usage Guidelines This command requires the access-list feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
You can configure an ACL that controls traffic based on its EtherType. An EtherType is a subprotocol
identifier. EtherType ACLs support Ethernet V2 frames. EtherType ACLs do not support
802.3-formatted frames because they use a length field instead of a type field. Bridge protocol data units
(BPDUs) are exceptions because they are SNAP-encapsulated, and the ACE is designed to specifically
handle BPDUs.
You can configure an EtherType ACL only on a Layer 2 interface in the inbound direction.
When you specify the mpls keyword in an EtherType ACL, the ACE denies or permits both
MPLS-unicast and MPLS-multicast traffic.
access-list name [line number] extended {deny | permit} protocol {src_ip_address netmask | any
| host src_ip_address} {dest_ip_address netmask | any | host dest_ip_address}
no access-list name [line number] extended {deny | permit} protocol {src_ip_address netmask |
any | host src_ip_address} {dest_ip_address netmask | any | host dest_ip_address}
access-list name [line number] extended {deny | permit} {{tcp | udp} {src_ip_address netmask |
any | host src_ip_address}} [operator port1 [port2]] {dest_ip_address netmask | any | host
dest_ip_address} [operator port3 [port4]]
no access-list name [line number] extended {deny | permit} {{tcp | udp} {src_ip_address netmask
| any | host src_ip_address}} [operator port1 [port2]] {dest_ip_address netmask | any | host
dest_ip_address} [operator port3 [port4]]
access-list name [line number] extended {deny | permit} icmp {src_ip_address netmask | any |
host src_ip_address} {any | host dest_ip_address | dest_ip_address netmask} [icmp_type]
[code operator_code]
no access-list name [line number] extended {deny | permit} icmp {src_ip_address netmask | any
| host src_ip_address} {any | host dest_ip_address | dest_ip_address netmask} [icmp_type]
[code operator_code]
Syntax Description name Unique identifier of the ACL. Enter an unquoted text string with a maximum of
64 alphanumeric characters.
line number (Optional) Specifies the line number position where you want the entry that you are
configuring to appear in the ACL. The position of an entry affects the lookup order
of the entries in an ACL. If you do not configure the line number of an entry, the
ACE applies a default increment and a line number to the entry and appends it at the
end of the ACL.
extended Specifies an extended ACL. Extended ACLs allow you to specify the destination IP
address and subnet mask and other parameters not available with a standard ACL.
deny Blocks connections on the assigned interface.
permit Allows connections on the assigned interface.
icmp_type (Optional) Type of ICMP messaging. Enter either an integer that corresponds to the
ICMP code number or one of the ICMP types as described in Table 2-1.
code (Optional) Specifies that a numeric operator and ICMP code follows. This keyword
is available only if you select icmp as the protocol type.
operator_code An operator that the ACE applies to the ICMP code number that follows. Enter one
of the following operators:
• lt—Less than.
• gt—Greater than.
• eq—Equal to.
• neq—Not equal to.
• range—An inclusive range of ICMP code values. When you use this operator,
specify two code numbers to define the range.
code1, code2 ICMP code number that corresponds to an ICMP type. See Table 2-2. If you entered
the range operator, enter a second ICMP code value to define the upper limit of the
range.
Usage Guidelines This command requires the access-list feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
The ACE does not explicitly support standard ACLs. To configure a standard ACL, specify the ports and
destination addresses as “any” in an extended ACL.
For TCP and UDP connections, you do not need to also apply an ACL on the destination interface to
allow returning traffic, because the ACE allows all returning traffic for established connections.
You can apply only one ACL of each type (extended and EtherType) to each direction of an interface.
You can also apply the same ACLs on multiple interfaces.
If you selected icmp as the IP protocol type, you can optionally specify the type of ICMP messaging.
Enter either an integer that corresponds to the ICMP code number or one of the ICMP messaging types
as described in Table 2-1.
To allow an external host with IP address 192.168.12.5 to be able to ping a host behind the ACE with an
IP address of 10.0.0.5, enter:
(config)# access-list INBOUND permit icmp host 192.168.12.5 host 10.0.0.5
Syntax Description name Unique identifier of the ACL. Enter an unquoted text string with a maximum of
64 alphanumeric characters.
remark text Specifies any comments that you want to include about the ACL. Comments appear
at the top of the ACL. Enter an unquoted text string with a maximum of
100 alphanumeric characters. You can enter leading spaces at the beginning of the
text. Trailing spaces are ignored.
Usage Guidelines This command requires the access-list feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
If you delete an ACL using the no access-list name command, then the remarks are also removed.
Syntax Description name Unique identifier of the ACL. Enter an unquoted text string with a maximum of
64 alphanumeric characters.
resequence Keyword that specifies the renumbering of the entries in an ACL.
number1 Number assigned to the first entry in the ACL. Enter any integer. The default is 10.
number2 Number added to each entry in the ACL after the first entry. Enter any integer. The
default is 10.
Usage Guidelines This command requires the access-list feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Syntax Description optimization http Specifies an optimization HTTP action list. After you create the
optimization HTTP type action list, you configure application
acceleration and optimization functions in the action list optimization
configuration mode. For information about the commands in action list
optimization configuration mode, see the “Action List Optimization
Configuration Mode Commands” section.
list_name Name assigned to the action list. Enter a unique name as an unquoted
text string with a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the loadbalance feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
The action-list type command allows you to configure a series of application acceleration and
optimization statements. An action list groups a series of individual functions that apply to a specific
type of operation. After you enter this command, the system enters the action list optimization configuration
mode.
After you configure the action list, you associate it with a specific statement in a Layer 7 HTTP
optimization policy map. The Layer 7 optimization HTTP policy map activates an optimization HTTP
action list that allows you to configure the specified optimization actions.
For information about the commands in action list optimization configuration mode, see the “Action List
Optimization Configuration Mode Commands” section. For details about configuring the commands in
the action list optimization configuration mode, see the Cisco 4700 Series Application Control Engine
Appliance Application Acceleration and Optimization Configuration Guide.
(config) arp
To configure the Address Resolution Protocol (ARP) on the ACE to manage and map IP to Media Access
Control (MAC) information to forward and transmit packets, use the arp command. Use the no form of
the command to remove the ARP entry or reset a default value.
Syntax Description ip_address mac_address Static ARP entry in the ARP table that allows ARP responses from an IP
address to a MAC address. Enter the IP address in dotted-decimal notation
(for example, 172.16.56.76). Enter the MAC address in dotted-hexadecimal
notation (for example, 00.60.97.d5.26.ab).
interval seconds Specifies the interval in seconds that the ACE sends ARP requests to the
configured hosts. Enter a number from 15 to 31526000. The default is 300.
inspection enable Enables ARP inspection, preventing malicious users from impersonating
other hosts or routers, known as ARP spoofing. The default is disabled.
flood (Optional) Enables ARP forwarding of nonmatching ARP packets. The
ACE forwards all ARP packets to all interfaces in the bridge group. This is
the default setting.
no flood (Optional) Disables ARP forwarding for the interface and drops
non-matching ARP packets.
learned-interval Sets the interval in seconds when the ACE sends ARP requests for learned
seconds hosts. Enter a number from 60 to 31536000. The default is 14400.
learned-mode enable Enables the ACE to learn MAC addresses on all traffic. The default is for
the ACE to learn MAC addresses from host responses only.
rate seconds Specifies the time interval in seconds between ARP retry attempts to hosts.
Enter a number from 1 to 60. The default is 10.
retries number Specifies the number of ARP attempts before the ACE flags the host as
down. Enter a number from 2 to 15. The default is 3.
sync disable Disables the replication of address resolution protocol (ARP) entries. By
default, ARP entry replication is enabled.
sync-interval number Specifies the time interval between ARP sync messages for learned hosts.
Enter an integer from 1 to 3600 seconds (1 hour). The default is 5 seconds.
Usage Guidelines This command requires the interface feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
When you enable ARP inspection, the ACE compares the MAC address, IP address, and source interface
in all ARP packets to static entries in the ARP table, and takes the following actions:
• If the IP address, MAC address, and source interface match an ARP entry, the ACE allows the packet
to pass.
• If a mismatch occurs between the MAC address, the IP address, or the interface, then the ACE drops
the packet.
• If the ARP packet does not match any entries in the static ARP table, then you can set the ACE to
either forward the packet out all interfaces (flood) or to drop the packet.
Examples To allow ARP responses from the router at 10.1.1.1 with the MAC address 00.02.9a.3b.94.d9, enter:
host1/contexta(config)# arp 10.1.1.1 00.02.9a.3b.94.d9
To enable ARP inspection and to drop all nonmatching ARP packets, enter:
host1/contexta(config)# arp inspection enable no-flood
(config) banner
Use the banner motd command to specify a message to display as the message-of-the-day banner when
a user connects to the ACE CLI. Use the no form of the command to delete or replace a banner or a line
in a multiline banner.
Syntax Description motd Configures the system to display as the message-of-the-day banner when a user connects to
the ACE.
text Line of message text to be displayed as the message-of-the-day banner. The text string
consists of all characters that follow the first space until the end of the line (carriage return
or line feed). The # character functions as the delimiting character for each line. For the
banner text, spaces are allowed but tabs cannot be entered at the CLI. Multiple lines in a
message-of-the-day banner are handled by entering a new banner command for each line
that you wish to add
The banner message is a maximum of 80 alphanumeric characters per line, up to a
maximum of 3000 characters (3000 bytes) total for a message-of-the-day banner. This
maximum value includes all line feeds and the last delimiting character in the message.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To replace a banner or a line in a multiline banner, use the no banner motd command before adding the new
lines.
To add multiple lines in a message-of-the-day banner, precede each line by the banner motd command.
The ACE appends each line to the end of the existing banner. If the text is empty, the ACE adds a carriage
return (CR) to the banner.
You can include tokens in the form $(token) in the message text. Tokens will be replaced with the
corresponding configuration variable, as follows:
• $(hostname)—Displays the hostname for the ACE during run time.
• $(line)—Displays the tty (teletypewriter) line or name (for example, /dev/console, /dev/pts/0, or 1).
To use the $(hostname) in single line banner motd input, include double quotation marks (“) around the
$(hostname) so that the $ is interpreted to a special character for the beginning of a variable in the single
line. An example is as follows:
switch/Admin(config)# banner motd #Welcome to “$(hostname)”...#
Do not use the double quotation mark (“) or the percent sign (%) as a delimiting character in a single
line message string. Do not use the delimiting character in the message string.
For multiline input, double quotation marks (“) are not required for the token because the input mode is
different from the signal line mode. The ACE treats the double quotation mark (“) as a regular character
when you operate in multiline mode.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
You can add several images to the BOOT environment variable to provide a fail-safe boot configuration.
If the first file fails to boot the ACE, subsequent images that are specified in the BOOT environment
variable are tried until the ACE boots or there are no additional images to attempt to boot. If there is no
valid image to boot, the ACE enters ROM-monitor mode where you can manually specify an image to
boot.
The ACE stores and executes images in the order in which you added them to the BOOT environment
variable. If you want to change the order in which images are tried at startup, you can either prepend and
clear images from the BOOT environment variable to attain the desired order or you can clear the entire
BOOT environment variable and then redefine the list in the desired order.
If the file does not exist (for example, if you entered the wrong filename), then the filename is appended
to the boot string, and this message displays:
Warning: File not found but still added in the bootstring.
If the file does exist, but is not a valid image, the file is not added to the bootstring, and this message
displays:
Warning: file found but it is not a valid boot image.
(config) class-map
To create a Layer 3 and Layer 4 or a Layer 7 class map, use the class-map command. Use the no form
of the class-map command to remove a class map from the ACE.
Syntax Description type (Optional) Specifies the class map type that is to be defined. When you specify a class
type, you enter its corresponding class map configuration mode (for example, HTTP
inspection).
ftp inspect Specifies a Layer 7 class map for the inspection of File Transfer Protocol (FTP)
request commands. For information about commands in FTP inspection
configuration mode, see the “Class Map FTP Inspection Configuration Mode
Commands” section.
http inspect | Specifies a Layer 7 class map for HTTP server load balancing (inspect keyword), or
loadbalance a Layer 7 class map for the HTTP deep packet application protocol inspection
(loadbalance keyword) of traffic through the ACE.
• For information about commands in class map HTTP inspection configuration
mode, see the “Class Map HTTP Inspection Configuration Mode Commands”
section.
• For information about commands in class map HTTP server load balancing
configuration mode, see the “Class Map HTTP Load Balancing Configuration
Mode Commands” section.
management Specifies a Layer 3 and Layer 4 class map to classify the IP network management
protocols received by the ACE. For information about commands in class map
management configuration mode, see the “Class Map Management Configuration
Mode Commands” section.
match-all | (Optional) Determines how the ACE evaluates Layer 3 and Layer 4 network traffic
match-any when multiple match criteria exist in a class map. The class map is considered a
match if the match commands meet one of the following conditions:
• match-all —All of the match criteria listed in the class map match the network
traffic class in the class map (typically, match commands of different types).
• match-any—Only one of the match criteria listed in the class map matches the
network traffic class in the class map (typically, match commands of the same
type).
The default setting is to meet all of the match criteria (match-all) in a class map.
map_name The name assigned to the class map. Enter an unquoted text string with no spaces and
a maximum of 64 alphanumeric characters.
For a Layer 3 and Layer 4 class map, you enter the class map configuration mode and
the prompt changes to (config-cmap).
Usage Guidelines This command requires the inspect, loadbalance, NAT, connection, SSL, or vip feature in your user role,
depending on the type of class map that you want to configure. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Use the class map configuration mode commands to create class maps that classify inbound network
traffic destined to, or passing through, the ACE based on a series of flow match criteria specified in the
class map. The CLI prompt changes correspondingly to the selected class map configuration mode:
(config-cmap), (config-cmap-ftp-insp), (config-cmap-http-insp), (config-cmap-http-lb), or
(config-cmap-mgmt).
A Layer 3 and Layer 4 class map contains match criteria that classifies the following:
• Network traffic that can pass through the ACE based on source or destination IP address, source or
destination port, or IP protocol and port
• Network management traffic that can be received by the ACE based on the HTTP, HTTPS, ICMP,
SNMP, SSH, or Telnet protocols
A Layer 7 class map contains match criteria that classifies specific Layer 7 protocol information. The
match criteria enables the ACE to do the following:
• Perform server load balancing based on the HTTP cookie, the HTTP header, the HTTP URL,
protocol header fields, or source IP addresses
• Perform deep packet inspection of the HTTP protocol
• Perform FTP request command filtering
The ACE supports a system-wide maximum of 8192 class maps.
For details about creating a class map, see the Cisco 4700 Series Application Control Engine Appliance
Administration Guide.
When multiple match criteria exist in the traffic class, you can identify evaluation instructions using the
match-any or match-all keywords. If you specify match-any, the traffic that is evaluated must match
one of the specified criteria (typically, match commands of the same type). If you specify match-all,
the traffic that is evaluated must match all of the specified criteria (typically, match commands of
different types).
Examples To create a Layer 3 and Layer 4 class map named L4VIP_CLASS that specifies the network traffic that
can pass through the ACE for server load balancing, enter:
host1/Admin# class-map match-all L4VIP_CLASS
host1/Admin(config-cmap)#
To create a Layer 3 and Layer 4 class map named MGMT-ACCESS_CLASS that classifies the network
management protocols that can be received by the ACE, enter:
host1/Admin# class-map type management match-any MGMT-ACCESS_CLASS
host1/Admin(config-cmap-mgmt)#
To create a Layer 7 class map named L7SLB_CLASS that performs server load balancing, enter:
host1/Admin(config)# class-map type http loadbalance match-any L7SLB_CLASS
host1/Admin(config-cmap-http-lb)#
To create a Layer 7 class map named HTTP_INSPECT_L7CLASS that performs HTTP deep packet
inspection, enter:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS
host1/Admin(config-cmap-http-insp)#
To create a Layer 7 class map named FTP_INSPECT_L7CLASS that performs FTP command
inspection, enter:
host1/Admin(config)# class-map type ftp inspect match-any FTP_INSPECT_L7CLASS
host1/Admin(config-cmap-ftp-insp)#
no clock timezone
Syntax Description zone_name 8-letter name of the time zone (for example, PDT) to be displayed when the time zone is
in effect. See Table 2-3 in the “Usage Guidelines” section for a list of the common time
zone acronyms used for this argument.
hours Hours offset from Coordinated Universal Time (UTC).
minutes Minutes offset from UTC. Range is from 0 to 59 minutes.
standard Sets the time to a standard time zone that include an applicable UTC hours offset. Enter
time_zone one of the following well-known time zones:
• ACST—Australian Central Standard Time as UTC + 9.5 hours
• AKST—Alaska Standard Time as UTC –9 hours
• AST—Atlantic Standard Time as UTC –4 hours
• BST—British Summer Time as UTC + 1 hour
• CEST—Central Europe Summer Time as UTC + 2 hours
• CET—Central Europe Time as UTC + 1 hour
• CST—Central Standard Time as UTC –6 hours
• EEST—Eastern Europe Summer Time as UTC + 3 hours
• EET—Eastern Europe Time as UTC + 2 hours
• EST—Eastern Standard Time as UTC –5 hours
• GMT—Greenwich Mean Time as UTC
• HST—Hawaiian Standard Time as UTC –10 hours
• IST—Irish Summer Time as UTC + 1 hour
• MSD—Moscow Summer Time as UTC + 4 hours
• MSK—Moscow Time as UTC + 3 hours
• MST—Mountain Standard Time as UTC –7 hours
• PST—Pacific Standard Time as UTC –8 hours
• WEST—Western Europe Summer Time as UTC + 1 hour
• WST—Western Standard Time as UTC + 8 hours
Usage Guidelines The ACE keeps time internally in Universal Time Coordinated (UTC) offset, so this command is used
only for display purposes and when the time is set manually.
This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
Table 2-3 lists common time zone acronyms used for the zone_name argument.
Examples To set the time zone to PST and to set an UTC offset of –8 hours, enter:
host1/Admin(config)# clock timezone PST -8 0
no clock summer-time
Syntax Description daylight_timezone_name 8-letter name of the time zone (for example, PDT) to be displayed when
summer time is in effect. For a list of the common time zone acronyms
used for this argument, see the “Usage Guidelines” section for the
(config) clock timezone command.
start_week Start week for summer time, ranging from 1 through 5.
start_day Start day for summer time, ranging from Sunday through Saturday.
start_month Start month for summer time, ranging from January through December.
start_time Start time (military time) in hours and minutes.
end_week End week for summer time, ranging from 1 through 5.
end_day End day for summer time, ranging from Sunday through Saturday.
end_month End month for summer time, ranging from January through December.
end_time End time (military format) in hours and minutes.
daylight_offset Number of minutes to add during summer time. Valid entries are from
1 to 1440. The default is 60.
standard time_zone Sets the daylight time to a standard time zone that includes an
applicable daylight time start and end range along with a daylight offset.
Enter one of the following well-known time zones:
• ADT—Atlantic Daylight Time: 2 a.m. first Sunday in April – 2 a.m.
last Sunday in October, + 60 minutes
• AKDT—Alaska Standard Daylight Time: 2 a.m. first Sunday in
April – 2 a.m. last Sunday in October, + 60 minutes
• CDT—Central Daylight Time: 2 a.m. first Sunday in April – 2 a.m.
last Sunday in October, + 60 minutes
• EDT—Eastern Daylight Time: 2 a.m. first Sunday in April – 2 a.m.
last Sunday in October, + 60 minutes
• MDT—Mountain Daylight Time: 2 a.m. first Sunday in April –
2 a.m. last Sunday in October, + 60 minutes
• PDT—Pacific Daylight Time: 2 a.m. first Sunday in April – 2 a.m.
last Sunday in October, + 60 minutes
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
The first part of the command specifies when summer time begins, and the second part of the command
specifies when summer time ends. All times are relative to the local time zone; the start time is relative
to standard time and the end time is relative to summer time. If the starting month is after the ending
month, the ACE assumes that you are located in the southern hemisphere.
Examples To specify that summer time begins on the first Sunday in April at 02:00 and ends on the last Sunday in
October at 02:00, with a daylight offset of 60 minutes, enter:
host1/Admin(config)# clock summer-time Pacific 1 Sun Apr 02:00 5 Sun Oct 02:00 60
(config) config-register
To change the configuration register boot settings, use the config-register configuration command. Use
the no form of this command to reset the config-register setting.
config-register value
no config-register value
Syntax Description value Configuration register value that you want to use the next time that you restart the ACE. The
supported value entries are as follows:
• 0x0—Upon reboot, the ACE boots to the GNU GRand Unified Bootloader (GRUB).
From the GRUB boot loader, you specify the system boot image to use to boot the ACE.
Upon startup, the ACE loads the startup-configuration file stored in Flash memory
(nonvolatile memory) to the running-configuration file stored in RAM (volatile
memory).
• 0x1—Upon reboot, the ACE boots the system image identified in the BOOT
environment variable (see (config) boot system). The BOOT environment variable
specifies a list of image files on various devices from which the ACE can boot at startup.
If the ACE encounters an error or if the image is not valid, it will try the second image
(if one is specified). Upon startup, the ACE loads the startup-configuration file stored
in Flash memory (nonvolatile memory) to the running-configuration file stored in RAM
(volatile memory).
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
You can modify the boot method that the ACE uses at the next startup by setting the boot field in the
software configuration register. The configuration register identifies how the ACE should boot.The
config-register command affects only the configuration register bits that control the boot field and
leaves the remaining bits unaltered.
Examples To set the boot field in the configuration register to boot the system image identified in the BOOT
environment variable upon reboot and to load the startup-configuration file stored in Flash memory,
enter:
host1/Admin(config)# config-register 0x1
(config) context
To create a context, use the context command. The CLI prompt changes to (config-context). A context
provides a user view into the ACE and determines the resources available to a user. Use the no form of
the command to remove a context.
context name
no context name
Syntax Description name Name that designates a context. Enter an unquoted text string with no spaces and a maximum
of 64 alphanumeric characters.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
By default, the ACE allows you to create and use five user-configured contexts plus the default Admin
context. To use a maximum of 251 contexts (Admin context plus 250 user contexts), you must purchase
an additional license from Cisco Systems.
Syntax Description group_name Name that you assign to the chain group. Enter the chain group name as an
alphanumeric string from 1 to 64 characters.
Usage Guidelines This command requires the Secure Sockets Layer (SSL) feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
A chain group specifies the certificate chains that the ACE sends to its peer during the handshake
process. A certificate chain is a hierarchal list of certificates that includes the subject’s certificate, the
root CA certificate, and any intermediate CA certificates. You include a chain group in the handshake
process by configuring the SSL proxy-service with the chain group (see the (config) ssl-proxy service
command).
Each context on the ACE can contain up to eight chain groups.
Syntax Description csr_param_name Name that designates a CSR parameter set. Enter the CSR parameter set name as a
alphanumeric string from 1 to 64 characters.
Usage Guidelines This command requires the SSL feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
A CSR parameter set defines the distinguished name attributes that the ACE applies to the CSR during
the CSR-generating process. The distinguished name attributes provide the CA with the information that
it needs to authenticate your site. Creating a CSR parameter set allows you to generate multiple CSRs
with the same distinguished name attributes. You can create up to eight CSR parameter sets per context.
When you use the crypto csr-params command to specify a CSR parameter set, the prompt changes to
the csr-params configuration mode (for more information on this mode and commands, see the “CSR
Parameters Configuration Mode Commands” section), where you define each of the distinguished name
attributes. The distinguished name consists of several required and optional attributes. The ACE requires
that you define the following attributes:
• Country name
• State or province
• Common name
• Serial number
If you do not configure the required attributes, the ACE displays an error message when you attempt to
generate a CSR using the incomplete CSR parameter set.
(config) domain
To create a domain, use the domain command. The CLI prompt changes to (config-domain). See the
“Domain Configuration Mode Commands” section for details. Use the no form of this command to
remove a domain from the configuration.
domain name
no domain name
Syntax Description name Name for the domain. Enter an unquoted text string with no spaces and a maximum of 64
alphanumeric characters.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
A domain does not restrict the context configuration that you can display using the show running-config
command. You can still display the running configuration for the entire context. However, you can
restrict your access to the configurable objects within a context by adding to the domain only a limited
subset of all the objects available to a context. To limit a user’s ability to manipulate the objects in a
domain, you can assign a role to that user. For more information about domains and user roles, see the
Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide.
(config) end
To exit from configuration mode and return to Exec mode, use the end command.
end
Usage Guidelines This command has no user role restrictions. For details about role-based access control (RBAC) and user
roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
You can also press Ctrl-Z or enter the exit command to exit configuration mode.
Examples To exit from configuration mode and return to Exec mode, enter:
host1/Admin(config)# end
host1/Admin#
(config) exit
To exit from the current configuration mode and return to the previous mode, use the exit command.
exit
Usage Guidelines This command has no user role restrictions. For details about role-based access control (RBAC) and user
roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
In configuration mode, the exit command transitions to the Exec mode.
In all other configuration modes, the exit command transitions to the previous configuration mode.
You can also press Ctrl-Z, enter the (config) end command, or enter the exit command to exit
configuration mode.
Examples To exit from configuration mode and return to Exec mode, enter:
host1/Admin(config)# exit
host1/Admin#
To exit from interface configuration mode and return to configuration mode, enter:
host1/Admin(config-if)# exit
host1/Admin(config)#
(config) ft auto-sync
To enable automatic synchronization of the running-configuration and the startup-configuration files in
a redundancy configuration, use the ft auto-sync command. Use the no form of this command to disable
the automatic synchronization of the running-configuration or the startup-configuration file.
Syntax Description running-config Enables autosynchronization of the running-configuration file. The default is
enabled.
startup-config Enables autosynchronization of the startup-configuration file. The default is
disabled.
Usage Guidelines This command requires the fault-tolerant feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
By default, the ACE automatically updates the running configuration on the standby context of an FT
group with any changes that occur to the running configuration of the active context. If you disable the
ft auto-sync command, you need to update the configuration of the standby context manually. For more
information about configuration synchronization and configuring redundancy, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
Caution Toggling ft auto-sync running-config in the Admin context may have undesirable side effects if the
same command is also disabled in an active user context. If ft auto-sync running-config is disabled in
the active Admin context and in an active user context, and you subsequently enable ft auto-sync
running-config in the active Admin context first, the entire configuration of the standby user context
will be lost. Always enable ft auto-sync running-config in the active user context first, then enable the
command in the active Admin context.
(config) ft group
To create a fault-tolerant (FT) group for redundancy, use the ft group command. After you enter this
command, the system enters the FT group configuration mode. Use the no form of this command to remove
an FT group from the configuration.
ft group group_id
no ft group group_id
Syntax Description group-id Unique identifier of the FT group. Enter an integer from 1 to 20.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
You must configure the same group ID on both peer appliances.
On each ACE, you can create multiple FT groups, up to a maximum of 21 groups. Each group consists
of a maximum of two members (contexts): one active context on one appliance and one standby context
on the peer appliance.
For information about the commands in FT group configuration mode, see the “FT Group Configuration
Mode Commands” section.
Syntax Description vlan_id Unique identifier for the FT VLAN. Enter an integer from 2 to 4094.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
Peer ACEs communicate with each other over a dedicated FT VLAN. These redundant peers use the FT
VLAN to transmit and receive heartbeat packets and state and configuration replication packets. You
must configure the same VLAN on each peer appliance. You cannot use this VLAN for normal network
traffic; it must be dedicated for redundancy only.
To configure one of the Ethernet ports or a port-channel interface on the ACE for fault tolerance using
a dedicated FT VLAN for communication between the members of an FT group, use the ft-port vlan
command in interface configuration mode. See the (config-if) ft-port vlan command for more
information.
On both peer ACE appliances, you must configure the same Ethernet port or port-channel interface as the
FT VLAN port. For example:
• If you configure ACE appliance 1 to use Ethernet port 4 as the FT VLAN port, then be sure to configure
ACE appliance 2 to use Ethernet port 4 as the FT VLAN port.
• If you configure ACE appliance 1 to use port-channel interface255 as the FT VLAN port, then be sure
to configure ACE appliance 2 to use port-channel interface 255 as the FT VLAN.
To remove an FT VLAN, first remove it from the FT peer using the no ft-interface vlan command in
FT peer configuration mode. See the (config-ft-peer) ft-interface vlan command for more information.
(config) ft peer
On both peer ACEs, configure an FT peer definition. To create an FT peer, use the ft peer command.
After you enter this command, the system enters the FT peer configuration mode. You can configure a
maximum of two ACEs as redundancy peers. Use the no form of this command to remove the FT peer
from the configuration.
ft peer peer_id
no ft peer peer_id
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
Each ACE appliance can have one FT peer. FT peers are redundant ACE appliances that communicate with
each other over a dedicated FT VLAN.
Before you can remove an FT peer from the configuration, remove the peer from the FT group using the
no peer command in FT group configuration mode.
For information about the commands in FT peer configuration mode, see the “FT Peer Configuration
Mode Commands” section.
Syntax Description name Unique identifier of the tracking process for a gateway or host. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines This command requires the fault-tolerant (FT) feature in your user role. For details about role-based
access control (RBAC) and user roles, see the the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
For information about commands in FT track host configuration mode, see the “FT Track Host
Configuration Mode Commands” section.
For details about configuring redundant ACE appliances, see the Cisco 4700 Series Application Control
Engine Appliance Administration Guide.
Syntax Description name Unique identifier of the tracking process for a critical interface. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines This command requires the fault-tolerant (FT) feature in your user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
You cannot delete an interface if the ACE is using the interface for tracking. Also, you cannot configure
the FT VLAN for tracking.
For information about commands in FT track interface configuration mode, see the “FT Track Interface
Configuration Mode Commands” section.
For details about configuring redundant ACE appliances, see the Cisco 4700 Series Application Control
Engine Appliance Administration Guide.
Examples To configure a tracking and failure detection process for an interface, enter:
host1/Admin(config)# ft track interface TRACK_VLAN100
(config) hostname
To specify a hostname for the ACE, use the hostname command. The hostname is used for the command
line prompts and default configuration filenames. If you establish sessions to multiple devices, the
hostname helps you track where you enter commands. Use the no form of this command to reset the
hostname to the default of switch.
hostname name
no hostname name
Syntax Description name New hostname for the ACE. Enter a case-sensitive text string that contains from 1 to
32 alphanumeric characters.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
By default, the hostname for the ACE is switch.
Examples To change the hostname of the ACE from switch to ACE_1, enter:
switch/Admin(config)# hostname ACE_1
ACE_1/Admin(config)#
(config) interface
To configure a bridge-group virtual interface (BVI), Ethernet port, port-channel interface, or VLAN
interface, use the interface command. The CLI prompt changes to (config-if). Use the no form of this
command to remove the interface.
Syntax Description bvi Creates a BVI for a bridge group and accesses interface configuration mode
group_number commands for the BVI. The group_number argument is the bridge-group number
configured on a VLAN interface.
gigabitEthernet Specifies one of the four Ethernet ports on the rear panel of the ACE as follows:
slot_number/ • slot_number—The physical slot on the ACE containing the Ethernet ports.
port_number
This selection is always 1, the location of the daughter card in the ACE. The
daughter card includes the four Layer 2 Ethernet ports to perform Layer 2
switching.
• port_number—The physical Ethernet port on the ACE. Valid selections are 1
through 4, which specifies one of the four Ethernet ports (1, 2, 3, or 4)
associated with the slot 1 (daughter card) selection.
port-channel Specifies the channel number assigned to this port-channel interface. Valid values
channel_number are from 1 to 255.
vlan number Assigns the VLAN to the context and accesses interface configuration mode
commands for the VLAN. The number argument is the number for a VLAN
assigned to the ACE.
Usage Guidelines This command requires the interface feature in your user role. In addition, the Ethernet port and
port-channel interface command functions require the Admin user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
The four Ethernet ports provide physical Ethernet ports to connect servers, PCs, routers, and other
devices to the ACE. You can configure the four Ethernet ports to provide an interface for connecting to
10-Mbps, 100-Mbps, or 1000-Mbps networks. Each Layer 2 Ethernet port supports autonegotiate,
full-duplex, or half-duplex operation on an Ethernet LAN and can carry traffic within a designated
VLAN.
You can group physical ports together on the ACE to form a logical Layer 2 interface called the
EtherChannel (or port channel). You must configure all the ports that belong to the same port channel
with the same values (such as port parameters, VLAN membership, and trunk configuration). Only one
port channel in a channel group is allowed, and a physical port can belong to only to a single port-channel
interface.
To enable the bridge-group VLANs, you must configure a bridge-group virtual interface (BVI) that
represents a corresponding bridge group. You should configure an IP address in the same subnet on the
BVI. This address is used for management traffic and as a source IP address for traffic from the ACE,
similar to ARP requests.
The ACE supports a maximum of 4000 VLAN interfaces with a maximum of 1024 shared VLANs.
The ACE requires a route back to the client before it can forward a request to a server. If the route back
is not present, the ACE cannot establish a flow and drops the client request. Make sure that you configure
the appropriate routing to the client network on the ACE VLAN where the client traffic enters the ACE
appliance.
For information about commands in interface configuration mode, see the “Interface Configuration
Mode Commands” section. For details about configuring a BVI interface, Ethernet port, port-channel
interface, or VLAN interface, see the Cisco 4700 Series Application Control Engine Appliance Routing
and Bridging Configuration Guide.
Examples To configure Ethernet port 3 and access interface configuration mode, enter:
host1/Admin(config)# interface gigabitEthernet 1/3
host1/Admin(config-if)#
To assign VLAN interface 200 to the Admin context and access interface configuration mode, enter:
host1/Admin(config)# interface vlan 200
host1/Admin(config-if)#
Syntax Description enable Accepts DHCP requests from clients on the associated context or interface and
enables the DHCP relay agent. The DHCP relay starts forwarding packets to the
DHCP server address specified in the ip dhcp relay server command for the
associated interface or context.
information policy Configures a relay agent information reforwarding policy on the DHCP server to
identify what the DHCP server should do if a forwarded message already
contains relay information.
keep Indicates that existing information is left unchanged on the DHCP relay agent.
This is the default setting.
replace Indicates that existing information is overwritten on the DHCP relay agent.
server Specifies the IP address of a DHCP server to which the DHCP relay agent
forwards client requests.
ip_address IP address of the DHCP server. Enter the address in dotted-decimal IP notation
(for example, 192.168.11.1).
Usage Guidelines This command requires the DHCP feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The DHCP relay agent can be configured at both the context and interface level of the ACE. Note the
following configuration considerations:
• If you configure the DHCP relay agent at the context level, the configuration is applicable to all
interfaces associated with the context.
• If you configure the DHCP relay agent at the interface level, the configuration is applicable to that
particular interface only; the remaining interfaces fallback to the context level configuration.
Examples To set the IP address of a DHCP server at the context level, enter:
host1/Admin# changeto C1
host1/C1# config
Enter configuration commands, one per line. End with CNTL/Z
host1/C1(config)# ip dhcp relay enable
host1/C1(config)# ip dhcp relay server 192.168.20.1
(config) ip route
To configure a default or static IP route, use the ip route command. Use the no form of this command
to remove a default or static IP route from the configuration.
Syntax Description dest_ip_prefix IP address for the route. The address that you specify for the static route is the
address that is in the packet before entering the ACE and performing network
address translation.
netmask Subnet mask for the route.
gateway_ip_address IP address of the gateway router (the next-hop address for this route). The
gateway address must be in the same network as specified in the ip address
command for a VLAN interface.
Usage Guidelines This command requires the routing feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The default route identifies the router IP address to which the ACE sends all IP packets for which it does
not have a route.
Admin and user contexts do not support dynamic routing. You must use static routes for any networks
to which the ACE is not directly connected; for example, use a static route when there is a router between
a network and the ACE.
The ACE supports up to eight equal cost routes on the same interface for load balancing.
Routes that identify a specific destination address take precedence over the default route.
See the Cisco 4700 Series Application Control Engine Appliance Routing and Bridging Configuration
Guide for more information about configuring default or static routes.
Examples To configure a default route, set the IP address and the subnet mask for the route to 0.0.0.0. For example,
if the ACE receives traffic that it does not have a route, it sends the traffic out the interface to the router
at 192.168.4.8. Enter:
host1/Admin(config)# ip route 0.0.0.0 255.255.255.0 192.168.4.8
Syntax Description ip_address IP address for the LDAP server. Enter the address in dotted-decimal IP notation
(for example, 192.168.11.1).
port port_number (Optional) Specifies the TCP destination port for communicating authentication
requests to the LDAP directory server. The port_number argument specifies the
LDAP + port number. Enter an integer from 1 to 65535.
timeout seconds (Optional) Specifies the time in seconds to wait for a response from the LDAP
server before the ACE can declare a timeout failure with the LDAP server. Use
this option to change the time interval that the ACE waits for the LDAP server to
reply to an authentication request. Enter an integer from 1 to 60. The default is
5 seconds.
rootDN (Optional) Defines the distinguished name (DN) for a user who is unrestricted by
“DN_string” access controls or administrative limit parameters to perform operations on the
LDAP server directory. The rootDN user can be thought of as the root user for
the LDAP server database. Enter a quoted string with a maximum of
63 alphanumeric characters. The default is an empty string.
password (Optional) Defines the bind password (rootpw) applied to the rootDN of the
bind_password LDAP server directory. Enter an unquoted string with a maximum of 63
alphanumeric characters. The default is an empty string.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
By default, the LDAP server port is 389. If your LDAP server uses a port other than 389, use the port
keyword to configure an appropriate port before starting the LDAP service. The ldap-server port
command overrides the global setting for the specified server.
By default, the ACE waits 5 seconds for the LDAP server to reply to an authentication request before the
ACE declares a timeout failure and attempts to contact the next server in the group. The ldap-server
timeout command overrides the global setting for the specified server.
Syntax Description port_number Destination port to the LDAP server. Enter an integer from 1 to 65535. The default is
TCP port 389.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To override the global TCP port setting (specified by the ldap-server port command) for a specific
server, use the ldap-server host port command.
Syntax Description seconds Timeout value in seconds. Enter an integer from 1 to 60. The default is 5 seconds.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To override the global TCP timeout setting (specified by the ldap-server timeout command) for a
specific server, use the ldap-server host timeout command.
line vty
no line vty
Usage Guidelines This command requires the Admin your user role. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about the commands in line configuration mode, see the “Line Configuration Mode
Commands” section.
no login timeout
Syntax Description minutes Length of time in minutes. Enter a value from 0 to 60 minutes. A value of 0 instructs the
ACE never to time out. The default is 5 minutes.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
no logging buffered
Syntax Description severity_level Maximum level for system log messages sent to the buffer. The severity level that
you specify indicates that you want syslog messages at that level and below.
Allowable entries are as follows:
• 0—emergencies (system unusable messages)
• 1—alerts (take immediate action)
• 2—critical (critical condition)
• 3—errors (error message)
• 4—warnings (warning message)
• 5—notifications (normal but significant condition)
• 6—informational (information message)
• 7—debugging (debug messages)
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Examples To set the logging buffer level to 3 for logging error messages, enter:
host1/Admin(config)# logging buffered 3
no logging console
Syntax Description severity_level Maximum level for system log messages sent to the console. The severity level that
you specify indicates that you want to log messages at that level and below.
Allowable entries are as follows:
• 0—emergencies (system unusable messages)
• 1—alerts (take immediate action)
• 2—critical (critical condition)
• 3—errors (error message)
• 4—warnings (warning message)
• 5—notifications (normal but significant condition)
• 6—informational (information message)
• 7—debugging (debug messages)
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Logging to the console can degrade system performance. Use the logging console command only when
you are testing and debugging problems, or when there is minimal load on the network. We recommend
that you use the lowest severity level possible because logging at a high rate may affect ACE
performance. Do not use this command when the network is busy.
Examples To enable system logging to the console for messages with severity levels of 2, 1, and 0:
host1/Admin(config)# logging buffered 2
no logging device-id
Syntax Description context-name Specifies the name of the current context as the device ID to uniquely identify the
syslog messages sent from the ACE
hostname Specifies the hostname of the ACE as the device ID to uniquely identify the
syslog messages sent from the ACE
ipaddress Specifies the IP address of the interface as the device ID to uniquely identify the
interface_name syslog messages sent from the ACE. You can specify the IP address of a VLAN
interface or BVI as the device ID. If you use the ipaddress keyword, syslog
messages sent to an external server contain the IP address of the interface
specified, regardless of which interface the ACE uses to send the log data to the
external server. The maximum length is 64 alphanumeric characters.
string text Specifies a text string to uniquely identify the syslog messages sent from the
ACE. The maximum length is 64 alphanumeric characters without spaces. You
cannot use the following characters: & (ampersand), ‘ (single quotation mark),
“ (double quotation marks), < (less than), > (greater than), or ? (question mark).
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The device ID part of the syslog message is viewed through the syslog server only and not directly on
the ACE. The device ID does not appear in EMBLEM-formatted messages, Simple Network
Management Protocol (SNMP) traps, or on the ACE console, management session, or buffer.
Examples To instruct the ACE to use the hostname of the ACE to uniquely identify the syslog messages, enter:
host1/Admin(config)# logging device-id hostname
logging enable
no logging enable
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Message logging is disabled by default. When enabled, log messages are sent to a logging process, which
logs messages to designated locations asynchronously to the processes that generated the messages. You
must set a logging output location to view any logs.
Syntax Description number The syslog facility. Enter an integer from 16 (LOCAL0) to 23 (LOCAL7). The default
is 20 (LOCAL4).
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The syslog daemon uses the specified syslog facility to determine how to process messages. Each
logging facility configures how the syslog daemon on the host handles a message. Syslog servers file
messages based on the facility number in the message. For more information on the syslog daemon and
facility levels, see your syslog daemon documentation.
logging fastpath
no logging fastpath
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Examples To configure the ACE to log connection setup and teardown syslog messages, enter:
host1/Admin(config)# logging fastpath
To disable the ACE from logging connection setup and teardown syslog messages, enter:
host1/Admin(config)# no logging fastpath
no logging history
Syntax Description severity_level Maximum level system log messages sent as traps to the NMS. The severity level that
you specify indicates that you want to log messages at that level and below.
Allowable entries are as follows:
• 0—emergencies (system unusable messages)
• 1—alerts (take immediate action)
• 2—critical (critical condition)
• 3—errors (error message)
• 4—warnings (warning message)
• 5—notifications (normal but significant condition)
• 6—informational (information message)
• 7—debugging (debug messages)
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To enable or disable all SNMP syslog message logging, use the logging history command without the
severity_level argument.
We recommend that you use the debugging (7) level during initial setup and during testing. After setup,
set the level from debugging (7) to a lower value for use in your network.
Syntax Description ip_address IP address of the host to be used as the syslog server.
tcp (Optional) Specifies to use TCP to send messages to the syslog server. A server
can only be specified to receive either UDP or TCP, not both.
udp (Optional) Specifies to use UDP to send messages to the syslog server. A
server can only be specified to receive either UDP or TCP, not both.
/port# (Optional) Port that the syslog server listens to for syslog messages. Enter an
integer from 1025 to 65535. The default protocol and port are UDP/514. The
default TCP port, if specified, is 1470.
default-udp (Optional) Instructs the ACE to default to UDP if the TCP transport fails to
communicate with the syslog server.
format emblem (Optional) Enables EMBLEM-format logging for each syslog server. The
Cisco Resource Management Environment (RME) is a network management
application that collects syslogs. RME can process syslog messages only if
they are in EMBLEM format.
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
If you choose to send log messages to a host, the ACE sends those messages using either UDP or TCP.
The host must run a program (known as a server) called syslogd, a daemon that accepts messages from
other applications and the network, and writes them out to system wide log files. UNIX provides the
syslog server as part of its operating system. If you are running Microsoft Windows, you must obtain a
syslog server for the Windows operating system.
If you use TCP as the logging transport protocol, the ACE denies new network access sessions if the
ACE is unable to reach the syslog server, if the syslog server is misconfigured, if the TCP queue is full,
or if the disk is full.
The format emblem keywords allows you to enable EMBLEM-format logging for each syslog server.
EMBLEM-format logging is available for either TCP or UDP syslog messages. If you enable
EMBLEM-format logging for a particular syslog host, then the messages are sent to that host. If you also
enable the logging timestamp command, the the messages are sent to the syslog server with a time
stamp.
For example, the EMBLEM format for a message with a time stamp appears as follows:
ipadress or dns name [Dummy Value/Counter]: [mmm dd hh:mm:ss TimeZone]:
%FACILITY-[SUBFACILITY-]SEVERITY-MNEMONIC: [vtl-ctx: context id] Message-text
Syntax Description syslog_id Specific message that you want to disable or to enable.
level (Optional) Changes the severity level associated with a specific system log
severity_level message. For example, the %<ACE>-4-411001 message listed in the syslog has the
default assigned severity level of 4 (warning message). You can change the
assigned default severity level to a different level.
Allowable entries are as follows:
• 0—emergencies (system unusable messages)
• 1—alerts (take immediate action)
• 2—critical (critical condition)
• 3—errors (error message)
• 4—warnings (warning message)
• 5—notifications (normal but significant condition)
• 6—informational (information message)
• 7—debugging (debug messages)
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
You can use the show logging command to determine the level currently assigned to a message and
whether the message is enabled.
For information on syslog messages and their IDs, see the Cisco 4700 Series Application Control Engine
Appliance Command Reference.
Examples To disable the %<ACE>-6-615004 syslog message (VLAN available for configuring an interface), enter:
host1/Admin(config)# no logging message 615004
To change the severity level of the 615004 syslog message from the default of 6 (informational) to a
severity level of 5 (notification), enter:
(config)# logging message 615004 level 5
To return the severity level of the 615004 syslog message to the default of 6, enter:
host1/Admin(config)# no logging message 615004
no logging monitor
Syntax Description severity_level Maximum level for system log messages displayed during the current SSH or Telnet
session. The severity level that you specify indicates that you want to log messages at
that level and below. Allowable entries are as follows:
• 0—emergencies (system unusable messages)
• 1—alerts (take immediate action)
• 2—critical (critical condition)
• 3—errors (error message)
• 4—warnings (warning message)
• 5—notifications (normal but significant condition)
• 6—informational (information message)
• 7—debugging (debug messages)
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Note Before you can use this command, you must enable remote access on the ACE and establish a remote
connection using the SSH or Telnet protocols from a PC.
To display logs during the SSH or Telnet session, use the terminal monitor Exec mode command. This
command enables syslog messages for all sessions in the current context. The logging monitor
command sets the logging preferences for all SSH and Telnet sessions, while the terminal monitor
command controls logging for each individual Telnet session. However, in each session, the terminal
monitor command controls whether syslog messages appear on the terminal during the session.
Examples To send informational system message logs to the current Telnet or SSH session, enter:
host1/Admin# terminal monitor
host1/Admin# config
Enter configuration commands, one per line. End with CNTL/Z
host1/Admin(config)# logging monitor 6
To disable system message logging to the current Telnet or SSH session, enter:
host1/Admin(config)# no logging monitor
no logging persistent
Syntax Description severity_level Maximum level for system log messages sent to compact flash. The severity level that
you specify indicates that you want to log messages at that level and below. Allowable
entries are as follows:
• 0—emergencies (system unusable messages)
• 1—alerts (take immediate action)
• 2—critical (critical condition)
• 3—errors (error message)
• 4—warnings (warning message)
• 5—notifications (normal but significant condition)
• 6—informational (information message)
• 7—debugging (debug messages)
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
We recommend that you use a lower severity level, such as severity level 3, because logging at a high
rate to flash memory on the ACE might affect performance.
Examples To send informational system message logs to flash memory on the ACE, enter:
host1/Admin(config)# logging persistent 6
Syntax Description queue_size Queue size for storing syslog messages. Enter an integer from 1 to 8192. The default is
100 messages.
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Set the queue size before the ACE processes syslog messages. When traffic is heavy, messages might get
discarded.
Examples To set the size of the syslog message queue to 1000, enter:
host1/Admin(config)# logging queue 1000
To reset the logging queue size to the default of 100 messages, enter:
host1/Admin(config)# no logging queue 0
logging rate-limit {num {interval | level severity_level | message syslog_id} | unlimited {level
severity_level | message syslog_id}}
no logging rate-limit {num {interval | level severity_level | message syslog_id} | unlimited {level
severity_level | message syslog_id}}
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The severity level you enter indicates that you want all syslog messages at the specified level to be
rate-limited. For example, if you specify a severity level of 7, the ACE applies a rate limit only to level 7
(debugging messages). If you want to apply a logging rate limit on a different severity level, you must
configure the logging rate-limit level command for that level as well.
For information on syslog messages and their IDs, see the Cisco 4700 Series Application Control Engine
Appliance Command Reference.
Examples To limit the syslog rate for a 60-second time interval, enter:
host1/Admin(config)# logging rate-limit 42 60
Syntax Description cp-buffer-full Specifies that the ACE will reject new connections when the syslog daemon
internal buffer is full.
rate-limit-reached Specifies that the ACE will reject new connections if the syslog message rate
specified through the logging rate-limit command has been reached. See the
(config) logging rate-limit command. Disabled by default.
tcp-queue-full Specifies that the ACE will reject new connections when syslogs can no longer
reach the TCP syslog server. Enabled by default.
Examples This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To configure the ACE to reject new connections if the specified syslog message rate has been reached,
enter:
host1/Admin(config)# logging reject-newconn rate-limit-reached
logging standby
no logging standby
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
This command is disabled by default.
logging timestamp
no logging timestamp
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
This command is disabled by default.
no logging trap
Syntax Description severity_level Maximum level for system log messages. The severity level that you specify indicates
that you want to log messages at that level and below. Allowable entries are as
follows:
• 0—emergencies (system unusable messages)
• 1—alerts (take immediate action)
• 2—critical (critical condition)
• 3—errors (error message)
• 4—warnings (warning message)
• 5—notifications (normal but significant condition)
• 6—informational (information message)
• 7—debugging (debug messages)
Usage Guidelines This command requires the syslog feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To send logging messages to a syslog server, use the logging host command to specify the name or IP
address of the host to be used as the syslog server.
Examples To send informational system message logs to the syslog server, enter:
host1/Admin(config)# logging trap 6
(config) ntp
To configure the ACE system clock to synchronize a peer (or to be synchronized by a peer) or to be
synchronized by a time server, use the ntp command. Use the no form of the command to remove an
NTP peer or server from the configuration.
Syntax Description peer Configures the ACE system clock to synchronize a peer or to be synchronized by a
peer. You can specify multiple associations.
ip_address1 IP address of the peer providing or being provided by the clock synchronization.
prefer (Optional) Makes this peer the preferred peer that provides synchronization. Using
the prefer keyword reduces switching back and forth between peers.
server Configures the ACE system clock to be synchronized by a time server. You can
specify multiple associations.
ip_address2 IP address of the time server that provides the clock synchronization.
prefer (Optional) Makes this server the preferred server that provides synchronization. Use
the prefer keyword to set this NTP server as the preferred server if multiple servers
have similar accuracy. NTP uses an algorithm to determine which server is the most
accurate and synchronizes to that one. If servers have similar accuracy, then the
prefer keyword specifies which of those servers to use.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
An NTP association can be a peer association, which means that the ACE is willing to synchronize to
the other system or to allow the other system to synchronize to the ACE. An NTP association can also
be a server association, which means that only this system will synchronize to the other system, not the
other way around. You can identify multiple servers; the ACE uses the most accurate server.
To send logging messages to a syslog server, use the logging host command to specify the name or IP
address of the host to be used as the syslog server.
Examples To specify multiple NTP server IP addresses and identify a preferred server, enter:
host1/Admin(config)# ntp server 192.168.10.10 prefer
host1/Admin(config)# ntp server 192.168.4.143
host1/Admin(config)# ntp server 192.168.5.10
(config) optimize
To configure the global optimization settings on the ACE, enter the optimize command. The CLI prompt
changes to (config-optimize). To remove an optimize mode selection, use the no form of the command.
optimize
no optimize
Usage Guidelines The commands in this mode require the loadbalance feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
For information about commands in optimize configuration mode, see the “Optimize Configuration
Mode Commands” section. For details about configuring the commands in the optimize configuration
mode, see the Cisco 4700 Series Application Control Engine Appliance Application Acceleration and
Optimization Configuration Guide.
Syntax Description connection Specifies a connection-type parameter map. After you create the
connection-type parameter map, you configure TCP, IP, and other
settings for the map in the parameter map connection configuration
mode. For information about the commands in parameter map
connection configuration mode, see the “Parameter Map Connection
Configuration Mode Commands” section.
http Specifies an HTTP-type parameter map. After you create the
HTTP-type parameter map, you configure HTTP settings for the map
in the parameter map HTTP configuration mode. For information
about the commands in parameter map HTTP connection
configuration mode, see the “Parameter Map HTTP Configuration
Mode Commands” section.
optimization http Specifies an optimization HTTP-type parameter map and define its
application acceleration and optimization settings. After you create
the optimization HTTP-type parameter map, you configure settings
for the map in the parameter map optimization HTTP configuration
mode. For information about the commands in parameter map HTTP
connection configuration mode, see the “Parameter Map
Optimization Configuration Mode Commands” section.
ssl Specifies an SSL-type parameter map. After you create the SSL-type
parameter map, you configure SSL settings for the map in the
parameter map SSL configuration mode. For information about the
commands in parameter map SSL connection configuration mode,
see the “Parameter Map Optimization Configuration Mode
Commands” section.
name Name assigned to the parameter map. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The connection and http commands requires the connection feature in your user role. The optimization
http commands in this mode require the loadbalance feature in your user role. The ssl commands in this
mode require the connection or SSL feature. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
The parameter-map type command allows you to configure a series of Layer 3 and Layer 4 statements
that instruct the ACE how to handle TCP termination, normalization and reuse, SSL termination, and
advanced HTTP behavior for server load-balancing connections. After you enter this command, the system
enters the corresponding parameter map configuration mode.
To access one of the three parameter-map configuration modes (connection, http, or ssl), enter the
parameter-map type connection, parameter-map type http, or parameter-map type ssl command in
configuration mode. The CLI prompt changes to the corresponding mode: (config-parammap-conn),
(config-parammap-http), or (config-parammap-ssl).
After you configure the parameter map, you associate it with a specific action statement in a policy map.
(config) policy-map
Use the policy-map command to create a Layer 3 and Layer 4 or Layer 7 policy map. You access one of
the policy map configuration modes by entering the policy-map command. Use the no form of the
policy-map command to remove a policy map from the ACE.
policy-map {multi-match | type {inspect ftp first-match | inspect http all-match | loadbalance
first-match | management first-match | optimization http first-match}} map_name
Syntax Description multi-match Configures a Layer 3 and Layer 4 policy map that defines the
different actions applied to traffic passing through the ACE. The ACE
attempts to match multiple classes within the Layer 3 and Layer 4
policy map to allow a multifeature Layer 3 and Layer 4 policy map.
The ACE executes the action for only one matching class within each
of the class sets. The definition of which classes are in the same class
set depends on the actions applied to the classes; the ACE associates
each policy map action with a specific set of classes.
For information about the commands in policy map configuration
mode, see the “Policy Map Configuration Mode Commands” section.
type Specifies the type of policy map to be defined. When you specify a
policy map type, you enter its corresponding policy map
configuration mode (for example, load balancing).
inspect ftp first-match Specifies a Layer 7 policy map that defines the inspection of File
Transfer Protocol (FTP) commands by the ACE. The ACE executes
the action for the first matching classification. For a list of classes in
a policy map, the actions associated with the first class that matches
the packet are the actions that the ACE executes on the packet. For
information about the commands in policy map FTP inspection
configuration mode, see the “Policy Map FTP Inspection
Configuration Mode Commands” section.
inspect http all-match Specifies a Layer 7 policy map that defines the deep packet
inspection of the HTTP protocol by the ACE. The ACE attempts to
match all specified conditions against the matching classification and
executes the actions of all matching classes until it encounters a deny
for a match request. For information about the commands in policy
map inspection HTTP configuration mode, see the “Policy Map
Inspection HTTP Configuration Mode Commands” section.
loadbalance first-match Specifies a Layer 7 policy map that defines Layer 7 HTTP server
load-balancing decisions. The ACE executes the action for the first
matching classification. For a list of classes in a policy-map, the
actions associated with the first class that matches the packet are the
actions that the ACE executes on the packet. For information about
the commands in policy map load balance configuration mode, see
the “Policy Map Load Balancing Configuration Mode Commands”
section.
management first-match Specifies a Layer 3 and Layer 4 policy map that defines the IP
management protocols that can be received by the ACE. The ACE
executes the specified action only for traffic that meets the first
matching classification with a policy map. For information about the
commands in policy map management configuration mode, see the
“Policy Map Management Configuration Mode Commands” section.
optimization http Specifies a Layer 7 policy map that defines Layer 7 HTTP
first-match optimization operations. The Layer 7 optimization HTTP policy map
associates an HTTP optimization action list and parameter map to
configure the specified optimization actions. The ACE executes the
action for the first matching classification. For a list of classes in a
policy-map, the actions associated with the first class that matches
the packet are the actions that the ACE executes on the packet. For
information about the commands in policy map optimization
configuration mode, see the “Policy Map Optimization Configuration
Mode Commands” section.
map_name Name assigned to the policy map. Enter an unquoted text string with
no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines This command requires the inspect, loadbalance, NAT, connection, or SSL feature in your user role. For
details about role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application
Control Engine Appliance Virtualization Configuration Guide.
Use the policy map configuration mode commands to configure a series of Layer 3 and Layer 4 or
Layer 7 policies. Each policy map defines a series of actions (functions) that you apply to a set of
classified inbound traffic. The CLI prompt changes correspondingly to the selected policy map
configuration mode: config-pmap, config-pmap-c, config-pmap-insp-http, config-pmap-insp-http-c,
config-pmap-insp-http-m, config-pmap-lb, config-pmap-lb-c, config-pmap-lb-m, config-pmap-mgmt,
config-pmap-mgmt-c, config-pmap-optmz, and config-pmap-optmz-c).
For a Layer 3 and Layer 4 traffic classification, you create Layer 3 and Layer 4 policy maps with actions
that configure the following:
• Network management traffic received by the ACE (HTTP, HTTPS, ICMP, SNMP, SSH, or Telnet)
• Server load balancing based on Layer 3 and Layer 4 connection information (virtual IP address)
• Secure Sockets Layer (SSL) security services between a web browser (the client) and the HTTP
connection (the server)
• Static or dynamic Network Address Translation (NAT)
• Application protocol inspection (also known as protocol fixup)
• TCP termination, normalization, and reuse
Examples To create a Layer 3 and Layer 4 server load-balancing policy map named L4_SLB_POLICY, enter:
host1/Admin(config)# policy-map multi-match L4_SLB_POLICY
host1/Admin(config-pmap)#
To create a Layer 7 HTTP server load balancing policy map named L7_SLB_POLICY, enter:
host1/Admin(config)# policy-map type loadbalance first-match L7_SLB_POLICY
host1/Admin(config-pmap-lb)#
To create a Layer 7 HTTP deep packet inspection policy map named L7_HTTP_INSPECT_POLICY,
enter:
host/Admin(config) # policy-map type inspect http all-match HTTP_INSPECT_L7POLICY
host/Admin(config-pmap-ins-http)#
To create a Layer 7 FTP command inspection policy map named L7_FTP_INSPECT_POLICY, enter:
host1/Admin(config)# class-map type ftp inspect match-any L7_FTP_INSPECT_POLICY
host1/Admin(config-pmap-ftp-ins)#
(config) probe
To define a probe and access its configuration mode, use the probe command. The CLI prompt changes
to (config-probe_type). Use the no form of this command to delete the probe.
Syntax Description probe_type Probe types. The probe type determines what the probe sends to the
real server. Enter one of the following keywords:
• dns—Sends a request to a DNS server giving it a configured
domain. To determine if the server is up, the ACE must receive
the configured IP address for that domain.
• echo—{tcp | udp}—Sends a string to the server and compares
the response with the original string. If the response string
matches the original string, the server is marked as passed.
Otherwise, the ACE retries a configured number of times and
time interval before the server is marked as failed.
• finger—Sends a Finger probe to a server to verify a defined
username is a username on the server. Use the Finger protocol to
configure the username string.
• ftp—Initiates an FTP session. By default, this probe is for an
anonymous login with the option of configuring a user ID and
password. The ACE performs an FTP GET or LS to determine
the outcome of the probe. This probe supports only active
connections.
• http—Sets up a TCP connection and issues an HTTP request.
The default request is an HTTP 1.1 GET request with the URL /.
Any valid HTTP response causes the probe to mark the real
server as passed. You can also configure an HTTP response
value.
• https—Similar to the HTTP probe, but this probe uses SSL to
generate encrypted data.
• icmp—Sends an ICMP request and listens for a response. If the
server returns a response, the ACE marks the real server as
passed. If there is no response and the time times out, or an ICMP
standard error such as DESTINATION_UNREACHABLE
occurs, the ACE marks the real server as failed.
• imap—Identical to POP/POP3 probe, but uses IMAP.
• pop—Initiates a POP session, using a configured user ID and
password. Then, the probe attempts to retrieve e-mail from the
server and validates the result of the probe based on the return
codes received from the server.
• radius—Connects to a RADIUS server and logs into it to
determine if the server is up.
Usage Guidelines This command requires the probe feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
For information about commands in probe configuration mode, see the “Probe Configuration Mode
Commands” section.
Examples To define a TCP probe named PROBE1 and access its mode, enter:
host1/Admin(config)# probe tcp PROBE1
host1/Admin(config-probe-tcp)#
Syntax Description nas_ip_address IP address that is used as the RADIUS NAS-IP-Address, attribute 4.
Enter the address in dotted-decimal IP notation (for example,
192.168.11.1).
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
By default, the NAS-IP-Address is not configured. The ACE performs a route lookup on the Remote
Authentication Dial-In User Service (RADIUS) server IP address and uses the result.
The RADIUS NAS-IP-Address attribute allows you to configure an arbitrary IP address to be used as
RADIUS attribute 4, NAS-IP-Address for each context.
The radius-server attribute nas-ipaddr command allows the ACE to behave as a single RADIUS client
from the perspective of the RADIUS server. The configured NAS-IP-Address will be encapsulated in all
outgoing RADIUS authentication request and accounting packets.
To delete the RADIUS NAS-IP-Address and return to the default configuration, enter:
host1/Admin(config)# no radius-server attribute nas-ipaddr 192.168.1.1
Syntax Description minutes Length of time that the ACE skips a nonresponsive RADIUS server
for transaction requests. Enter an integer from 0 to 1440 (24 hours).
The default is 0.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Use of this command causes the ACE to mark as “dead” any RADIUS servers that fail to respond to
authentication requests. This action avoids the wait for the request to time out before trying the next
configured server. The ACE skips a RADIUS server that is marked as dead by sending additional
requests for the duration of minutes.
The dead-time interval starts when the server does not respond to the number of authentication request
transmissions configured through the radius-server retransmit command. When the server responds to
a probe access-request packet, the ACE transmits the authentication request to the server.
Examples To globally configure a 15-minute dead-time for RADIUS servers that fail to respond to authentication
requests, enter:
host1/Admin(config)# radius-server deadtime 15
Syntax Description ip_address IP address for the RADIUS server. Enter the address in
dotted-decimal IP notation (for example, 192.168.11.1).
key (Optional) Enables an authentication key for communication
between the ACE and the RADIUS daemon running on the RADIUS
server. The key is a text string that must match the encryption key
used on the RADIUS server.
shared_secret Key that is used to authenticate communication between the
RADIUS client and server. The shared secret must match the one
configured on the RADIUS server. Enter the shared secret as a
case-sensitive string with no spaces with a maximum of 63
alphanumeric characters.
0 (Optional) Configures a key specified in clear text (indicated by 0) to
authenticate communication between the RADIUS client and server.
7 (Optional) Configures a key specified in encrypted text (indicated by
7) to authenticate communication between the RADIUS client and
server.
auth-port port_number (Optional) Specifies the UDP destination port for communicating
authentication requests to the RADIUS server. By default, the
RADIUS authentication port is 1812 (as defined in RFC 2138 and
RFC 2139). The port_number argument specifies the RADIUS port
number. Valid values are from 1 to 65535.
acct-port port_number (Optional) Specifies the UDP destination port for communicating
accounting requests to the RADIUS server. By default, the RADIUS
accounting port is 1813 (as defined in RFC 2138 and RFC 2139). The
port_number argument specifies the RADIUS port number. Valid
values are from 1 to 65535.
authentication (Optional) Specifies that the RADIUS server is used only for
authentication purposes.
If neither the authentication nor the accounting options are specified,
the RADIUS server is used for both accounting and authentication
purposes.
accounting (Optional) Specifies that the RADIUS server is used only for
accounting purposes.
If neither the authentication nor the accounting options are specified,
the RADIUS server is used for both accounting and authentication
purposes.
timeout seconds (Optional) Specifies the time interval that the ACE waits for the
RADIUS server to reply to an authentication request before
retransmitting a request. Valid entries are from 1 to 60 seconds. The
default is 1 second.
retransmit count (Optional) Specifies the number of times that the ACE retransmits an
authentication request to a timed-out RADIUS server before
declaring the server to be unresponsive and contacting the next server
in the group. Valid entries are from 1 to 5 attempts. The default is one
attempt.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The key option overrides the global setting of the radius-server key command. If you do not specify a
key, the global value is used. RADIUS keys are always stored in encrypted form in persistent storage.
The running configuration also displays keys in encrypted form.
If neither the authentication nor the accounting options are specified, the RADIUS server is used for
both accounting and authentication.
If your RADIUS server uses a port other than 1813, use the acct-port keyword to configure the ACE for
the appropriate port before starting the RADIUS service.
If your RADIUS server uses a port other than 1812, use the auth-port keyword to configure the ACE
for the appropriate port before starting the RADIUS service.
The retransmit and timeout options override the global settings assigned for the specified server when
you enter the radius-server retransmit and radius-server timeout commands.
Syntax Description shared_secret Key used to authenticate communication between the RADIUS client
and the server. The shared secret must match the one configured on
the RADIUS server. Enter the shared secret as a case-sensitive string
with no spaces and a maximum of 63 characters.
0 Configures a key specified in clear text (indicated by 0) to
authenticate communication between the RADIUS client and server.
7 Configures a key specified in encrypted text (indicated by 7) to
authenticate communication between the RADIUS client and server.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The key is a text string that must match the encryption key used on the RADIUS server. RADIUS keys
are always stored in encrypted form in persistent storage on the ACE. This global key will be applied to
those RADIUS servers in a named server group for which a shared secret is not individually configured
by the (config) radius-server host command.
Examples To globally configure an authentication key to be sent in encrypted text (indicated by 7) to the RADIUS
server, enter:
host1/Admin(config)# radius-server key 7 abe4DFeeweo00o
Syntax Description count Number of times that the ACE attempts to connect to a RADIUS
server(s) before trying to contact the next available server. Enter an
integer from 1 to 5. The default is 1.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The ACE applies this global retransmission value to those RADIUS servers for which a value is not
individually configured by the (config) radius-server host command.
If all servers in the group are unavailable for authentication and accounting, the ACE tries the local
database if you configure a local fallback method by entering the aaa authentication login or the aaa
accounting default commands. If you do not have a fallback method, the ACE continues to contact one
of the AAA servers listed in the server group.
Syntax Description seconds Tme in seconds between retransmissions to the RADIUS server.
Enter an integer from 1 to 60 seconds. The default is 1 second.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The ACE applies this global timeout value to those RADIUS servers for which a timeout value is not
individually configured by the (config) radius-server host command.
(config) resource-class
To create a resource class and enter resource configuration mode, use the resource-class command. The
CLI prompt changes to (config-resource). Configure a resource class to limit the use of system resources
by one or more contexts. Use the no form of this command to remove the resource-class setting.
resource-class name
no resource-class name
Syntax Description name Name assigned to the resource class. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters. You
can also use the resource class called default.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
Use a resource class to allocate and limit system resources among contexts in your ACE. The default
resource class allocates 100 percent of all configurable system resources to each context. By creating a
resource class, you can prevent oversubscription by limiting the percentage of resources available to
each context. After you create and configure a resource class, use the (config-context) member
command in context configuration mode to assign a context to the class.
To use the stickiness feature, you must allocate a minimum percentage of resources to the feature.
Otherwise, stickiness will not work. For more details, see the Cisco 4700 Series Application Control
Engine Appliance Virtualization Configuration Guide.
For information about the commands in the resource configuration mode, see the “Resource
Configuration Mode Commands” section.
Examples This example shows how to create a resource class called RC1.
host1/C1(config)# resource-class RC1
host1/C1(config-resource)
(config) role
To assign a user role to a user and enter role configuration mode, use the role command. The CLI prompt
changes to (config-role). User roles determine the privileges that a user has, the commands that a user
can enter, and the actions that a user can perform in a particular context. You can apply the roles that you
create only in the context in which you create them. See the “Role Configuration Mode Commands”
section for details. Use the no form of this command, to remove the user role assignment.
role name
no role name
Syntax Description name Identifier associated with a user role. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
If you do not assign a user role to a new user, the default user role is Network-Monitor. For users that
you create in the Admin context, the default scope of access is the entire device. For users that you create
in other contexts, the default scope of access is the entire context. If you need to restrict a user’s access,
you must assign a role-domain pair using the (config) username command.
For information about the commands in the role configuration mode, see the “Role Configuration Mode
Commands” section.
For information about configuring roles and assigning them to users, see the Cisco 4700 Series
Application Control Engine Appliance Virtualization Configuration Guide
(config) rserver
To create a real server for server load balancing (SLB) and enter real server configuration mode, use the
rserver command. The CLI prompt changes to (config-host-rserver) or (config-redirect-rserver),
depending on the type of real server that you create. You can create a maximum of 16,384 real servers.
Use the no form of this command to remove the real server from the configuration.
Syntax Description host (Optional) Specifies a typical real server that provides content and
services to clients. This is the default setting. For details on the
commands in real server host configuration mode, see the “Real
Server Host Configuration Mode Commands” section.
redirect (Optional) Specifies a real server used to redirect traffic to a new
location as specified in the relocn-string argument of the
webhost-redirection command. For details on the commands in real
server redirect configuration mode, see the “Real Server Redirect
Configuration Mode Commands” section.
name Identifier for the real server. Enter an unquoted text string with no
spaces and maximum of 64 alphanumeric characters.
Usage Guidelines This command requires the rserver feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
All servers in a server farm must be of the same type: host or redirect. You can create a maximum of
4096 real servers in each ACE.
To remove the real server of type host from the configuration, enter:
host1/Admin(config)# no rserver server1
Syntax Description index Index number for the script file. The number must be unique across
the context. Enter a number from 1 to 255.
script_name Name of the script on the disk0: filesystem. The script name must be
unique across the context. You will use the filename when you
configure the probe.
Usage Guidelines This command requires the probe feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To run a script or create a health probe using a script, you must see the script name, not the script file
from which the script was loaded.
(config) serverfarm
To create a new server farm or modify an existing server farm and enter the serverfarm configuration
mode, use the serverfarm command. You can configure a maximum of 4096 server farms on each ACE.
Use the no form of this command to remove the server farm from the configuration.
Syntax Description host (Optional) Specifies a typical server farm that consists of real servers
that provide content and services to clients. This is the default. For
details on the commands in the serverfarm host configuration mode,
see the “Serverfarm Host Configuration Mode Commands” section.
redirect (Optional) Specifies that the server farm consist only of real servers
that redirect client requests to alternate locations specified by the
relocation string or port number in the real server configuration. For
details on the commands in the serverfarm redirect host configuration
mode, see the “Serverfarm Redirect Configuration Mode
Commands” section.
name Unique identifier of the server farm. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines This command requires the server-farm feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
After you create a server farm, you configure the other server farm attributes and add real servers to the
farm. You can configure a maximum of 4096 server farms in each ACE.
(config) service-policy
To apply a previously created policy map and attach the traffic policy to a specific VLAN interface or
globally to all VLAN interfaces in the same context, use the service-policy command. Use the no form
of this command to remove a service policy.
Syntax Description input Specifies that the traffic policy is to be attached to the input
direction of an interface. The traffic policy evaluates all traffic
received by that interface.
policy_name Name of a previously defined policy map, configured with a
previously created policy-map command. The name can be a
maximum of 64 alphanumeric characters.
Usage Guidelines This command requires the interface feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Note the following when creating a service policy:
• Policy maps, applied globally in a context, are internally applied on all interfaces existing in the
context.
• You can apply the policy in an input direction only.
• A policy activated on an interface overwrites any specified global policies for overlapping
classification and actions
• The ACE allows only one policy of a specific feature type to be activated on a given interface.
Examples To specify an interface VLAN and apply the Layer 3 and Layer 4 SLB policy map to the VLAN:
host1/C1(config)# interface vlan50
host1/C1(config-if)# mtu 1500
host1/C1(config-if)# ip address 172.20.1.100 255.255.0.0
host1/C1(config-if)# service-policy input L4SLBPOLICY
To globally apply the Layer 3 and Layer 4 SLB policy map to the entire context:
host1/C1(config)# service-policy input L4SLBPOLICY
(config) shared-vlan-hostid
To configure a specific bank of MAC addresses for an ACE, use the shared-vlan-hostid command. Use
the no form of this command to remove a configured bank of MAC addresses.
shared-vlan-hostid number
no shared-vlan-hostid
Syntax Description number Bank of MAC addresses that the ACE uses. Enter a number from 1 to
16.
Usage Guidelines This command requires the interface feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
When contexts share a VLAN, the ACE assigns a different MAC address to the VLAN on each context.
The MAC addresses reserved for shared VLANs are 0x001243dc6b00 to 0x001243dcaaff, inclusive. All
ACE appliances derive these addresses from a global pool of 16k MAC addresses. This pool is divided
into 16 banks, each containing 1,024 addresses. An ACE supports only 1,024 shared VLANs, and would
use only one bank of MAC addresses out of the pool.
By default, the bank of MAC addresses that the ACE uses is randomly selected at boot time. However,
if you configure two ACE appliances in the same Layer 2 network and they are using shared VLANs,
the ACEs may select the same address bank and use the same MAC addresses. To avoid this conflict,
you need to configure the bank that the ACEs will use.
To remove the configured bank of MAC addresses, use the no vlan-hostid command. For example, enter:
host1/Admin(config)# no shared-vlan-hostid
Syntax Description community_name SNMP community name for this system. Enter an unquoted text string
with no space and a maximum of 32 alphanumeric characters.
group group_name (Optional) Identifies the role group to which the user belongs. Enter an
unquoted text string with no space and a maximum of 32 alphanumeric
characters.
Note Only network monitoring operations are supported through the
ACE implementation of SNMP. In this case, all SNMP users are
automatically assigned the system-defined default group of
Network-Monitor. For details on creating users, refer to the Cisco
Application Control Engine Module Virtualization Configuration
Guide.
ro (Optional) Allows read-only access for this community.
Usage Guidelines This command has no user role restrictions. For details about role-based access control (RBAC) and user
roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
After you create or modify a community, all SNMP devices assigned to that community as members have
the same access rights (as described in RFC 2576). The ACE supports read-only access to the MIB tree
for devices included in this community. The read-only community string allows a user to read data values
but prevents that user from modifying modify the data.
SNMP communities are applicable only for SNMPv1 and SNMPv2c. SNMPv3 requires user
configuration information such as specifying the role group that the user belongs to, authentication
parameters for the user, authentication password, and message encryption parameters.
Examples To specify an SNMP community called SNMP_Community1, which is a member of the user group, with
read-only access privileges for the community, enter:
host1/Admin(config)# snmp-server community SNMP_Community1 group Network-Monitor
no snmp-server contact
Syntax Description contact_information SNMP contact information for this system. Enter the
contact_information argument as a quoted text string with a
maximum of 240 alphanumeric characters including spaces. If the
string contains more than one word, enclose the string in quotation
marks (“ ”). You can include information on how to contact the
person; for example, a phone number or an e-mail address.
Usage Guidelines This command has no user role restrictions. For details about role-based access control (RBAC) and user
roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
You can specify only one contact name per SNMP system.
Syntax Description notification_type (Optional) Type of notification to enable. If no type is specified, the
ACE sends all notifications. Specify one of the following keywords:
• license—Sends SNMP license manager notifications. This
keyword appears only in the Admin context.
• slb—Sends server load-balancing notifications. When you
specify the slb keyword, you can specify a notification_option
value.
• snmp—Sends SNMP notifications. When you specify the snmp
keyword, you can specify a notification_option value.
• syslog—Sends error message notifications (Cisco Syslog MIB).
Specify the level of messages to be sent with the logging history
command.
• virtual-context—Sends virtual context change notifications.
This keyword appears only in the Admin context.
notification_option (Optional) One of the following SNMP notifications to enable:
• When you specify the snmp keyword, specify the
authentication, coldstart, linkdown, or linkup keyword to
enable SNMP notifications. This selection generates a
notification if the community string provided in SNMP request
is incorrect, or when a VLAN interface is either up or down. The
coldstart keyword appears only in the Admin context.
• When you specify the slb keyword, specify the real or vserver
keyword to enable server load-balancing notifications. This
selection generates a notification if one of the following occurs:
– The real server changes state (up or down) due to such
occurrences as user intervention, ARP failures, and probe
failures.
– The virtual server changes state (up or down). The virtual
server represents the servers behind the content switch in the
ACE to the outside world and consists of the following
attributes: destination address (can be a range of IP
addresses), protocol, destination port, incoming VLAN.
Usage Guidelines This command has no user role restrictions. For details about role-based access control (RBAC) and user
roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
The notification types used in the snmp-server enable traps command all have an associated MIB
object that globally enables or disables them. However, not all of the notification types available in the
snmp-server host command have notificationEnable MIB objects, so some of the notification types
cannot be controlled using the snmp-server enable traps command.
To configure the ACE to send the SNMP notifications, specify at least one snmp-server enable traps
command. To enable multiple types of notifications, you must enter a separate snmp-server enable
traps command for each notification type and notification option. If you enter the command without any
keywords, the ACE enables all notification types and traps.
The snmp-server enable traps command is used with the snmp-server host command. The
snmp-server host command specifies which host receives the SNMP notifications. To send
notifications, you must configure at least one SNMP server host.
Examples To enable the ACE to send server load-balancing traps to the host myhost.cisco.com using the
community string public, enter:
host1/Admin(config)# snmp-server host myhost.cisco.com
host1/Admin(config)# snmp-server community SNMP_Community1 group Network-Monitor
host1/Admin(config)# snmp-server enable traps slb real
Syntax Description host_address IP address of the host (the targeted recipient). Enter the address in
dotted-decimal IP notation (for example, 192.168.11.1).
community-string_username SNMP community string or username with the notification operation
to send. Enter an unquoted text string with no space and a maximum
of 32 alphanumeric characters.
informs Sends SNMP inform requests to the identified host, which allows for
manager-to-manager communication. Inform requests can be useful
when you need more than one NMS in the network.
traps Sends SNMP traps to the identified host. An agent uses a trap to tell
the NMS that a problem has occurred. The trap originates from the
agent and is sent to the trap destination, as configured within the
agent itself. The trap destination is typically the IP address of the
NMS.
version Specifies the version of SNMP used to send the traps. SNMPv3 is the
most secure model because it allows packet encryption with the priv
keyword.
1 Specifies SNMPv1. This option is not available for use with SNMP
inform requests. SNMPv1 has one optional keyword (udp-port) that
specifies the port UDP port of the host to use. The default is 162.
2c Specifies SNMPv2C. SNMPv2C has one optional keyword
(udp-port) that specifies the port UDP port of the host to use. The
default is 162.
3 Specifies SNMPv3. SNMPv3 has three optional keywords (auth, no
auth, or priv).
auth (Optional) Enables Message Digest 5 (MD5) and Secure Hash
Algorithm (SHA) packet authentication.
noauth (Optional) Specifies the noAuthNoPriv security level.
priv Enables Data Encryption Standard (DES) packet encryption
(privacy).
Usage Guidelines This command has no user role restrictions. For details about role-based access control (RBAC) and user
roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
no snmp-server location
Syntax Description location Physical location of the system. Enter a text string with a maximum
of 240 alphanumeric characters including spaces. If the string
contains more than one word, enclose the string in quotation marks
(“ ”).
Usage Guidelines This command has no user role restrictions. For details about role-based access control (RBAC) and user
roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
You can specify only one location per SNMP system.
Usage Guidelines This command has no user role restrictions. For details about role-based access control (RBAC) and user
roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
By default, the ACE sends the Cisco implementation of linkUp and linkDown traps to the NMS. The
ACE sends the Cisco Systems IF-MIB variable bindings that consist of ifIndex, ifAdminStatus,
ifOperStatus, ifName, ifType, clogOriginID, and clogOriginIDType. You can configure the ACE to send
the IETF standards-based implementation for linkUp and linkDown traps (as outlined in RFC 2863).
The Cisco var-binds are sent by default. To receive RFC 2863-compliant traps, you must specify the
snmp-server trap link ietf command.
Examples To configure the linkUp and linkDown traps to be compliant with RFC 2863, enter:
host1/Admin(config)# snmp-server trap link ietf
Syntax Description number Number of the VLAN interface that is the trap source address
contained in the SNMP v1 trap PDU. Enter a value from 2 to 4094 for
an existing VLAN interface.
Usage Guidelines This command has no user role restrictions. For details about role-based access control (RBAC) and user
roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
Note the following operating considerations for the snmp-server trap-source vlan number command:
• If you do not configure the snmp-server trap-source command, the ACE takes the source IP
address from the internal routing table, which is dependant on the destination host address where
the notification is to be sent.
• If you specify a VLAN number of an interface that does not have a valid IP address, the ACE fails
in sending notifications for SNMP v1 traps.
Examples To specify vlan 50 as the VLAN interface that is trap source address contained in the SNMP v1 trap
PDU, enter:
host1/Admin(config)# snmp-server trap-source vlan 50
To remove the specified VLAN interface that is trap source address contained in the SNMP v1 trap PDU,
enter:
host1/Admin(config)# no snmp-server trap-source
snmp-server user user_name [group_name] [auth {md5 | sha} password1 [localizedkey | priv
{password2 | aes-128 password2}]]
no snmp-server user user_name [group_name] [auth {md5 | sha} password1 [localizedkey | priv
{password2 | aes-128 password2}]]
Syntax Description user_name Username. Enter an unquoted text string with no space and a
maximum of 24 alphanumeric characters.
group_name (Optional) User role group to which the user belongs. Enter an
unquoted text string with no space and a maximum of 32
alphanumeric characters. SNMP access rights are organized by
groups. Each group in SNMP is similar to a role through the CLI. The
group_name is defined by the role configuration mode command.
auth (Optional) Sets authentication parameters for the user.
Authentication determines that the message is from a valid source.
md5 Specifies the HMAC Message Digest 5 (MD5) encryption algorithm
for user authentication.
sha Specifies the HMAC Secure Hash Algorithm (SHA) encryption
algorithm for user authentication.
password1 User authentication password. Enter an unquoted text string with no
space and a maximum of 130 alphanumeric characters. The ACE
automatically synchronizes the SNMP authentication password as
the password for the CLI user.
localizedkey (Optional) Specifies that the password is in a localized key format for
security encryption.
priv (Optional) Specifies encryption parameters for the user. The priv
option and the aes-128 option indicate that this privacy password is
for generating a 128-bit AES key.
aes-128 (Optional) Specifies the 128-byte Advanced Encryption Standard
(AES) algorithm for privacy. AES is a symmetric cipher algorithm and
is one of the privacy protocols for SNMP message encryption. It
conforms with RFC 3826.
password2 Encryption password for the user. The AES priv password can have a
minimum of eight alphanumeric characters. If the passphrases are
specified in clear text, you can specify a maximum of 64
alphanumeric characters. If you use the localized key, you can
specify a maximum of 130 alphanumeric characters. Spaces are not
allowed.
Usage Guidelines This command has no user role restrictions. For details about role-based access control (RBAC) and user
roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
To assign multiple roles to a user, enter multiple snmp-server user commands.
User configuration through the snmp-server user command is applicable only for SNMPv3; SNMPv1
and SNMPv2c use a community string match for user authentication.
The ACE synchronizes the interactions between a user created with the username command and the
same user specified using the snmp-server user command; updates made to a user configuration in the
ACE CLI are automatically reflected in the SNMP server. For example, when you delete a user, the user
is automatically deleted from both the SNMP server and the CLI. In addition, user-role mapping changes
are synchronized in SNMP and CLI.
Only network monitoring operations are supported through the ACE implementation of SNMP where all
SNMP users are automatically assigned to the system-defined default group of Network-Monitor.
Syntax Description dsa Generates the DSA key pair for the SSH version 2 protocol.
rsa Generates the RSA key pair for the SSH version 2 protocol.
rsa1 Generates the RSA1 key pair for the SSH version 1 protocol.
bits (Optional) Number of bits for the key pair. For DSA, enter an integer
from 768 to 2048. For RSA and RSA1, enter an integer from 768 to
4096. The greater the number of bits that you specify, the longer it
takes to generate the key. The default is 768.
force (Optional) Forces the generation of a DSA or RSA key even when
previous keys exist. If the SSH key pair option is already generated
for the required version, use the force option to overwrite the
previously generated key pair.
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
Before you generate the key, set the hostname and the domain name. These settings are used in the key.
The global administrator performs the key generation in the Admin context. All contexts associated with
the ACE share the common key. There is only a single host-key pair.
If you are the administrator or another user authorized in the Admin context, use the changeto command
in exec mode to move to the Admin context. An administrator can perform all allowable functions within
the Admin context.
Ensure that you have an SSH host key pair with the appropriate version before you enable the SSH
service. The SSH service accepts three types of key pairs for use by SSH versions 1 and 2. Generate the
SSH host key pair according to the SSH client version used.
no ssh maxsessions
Syntax Description max_sessions Maximum number of concurrent SSH sessions allowed for the
associated context. The range is from 1 to 4 SSH sessions per user
context and from 1 to 16 SSH sessions for the Admin context. The
defaults are 4 (user context) and 16 (Admin context).
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
The ACE supports a total maximum of 256 concurrent SSH sessions.
Examples To set the maximum number of concurrent SSH sessions in the Admin context to 3, enter:
host1/Admin(config)# ssh maxsessions 3
To revert to the default of 16 SSH sessions for the Admin context, enter:
host1/Admin(config)# no ssh maxsessions
Syntax Description pservice_name Name of the SSL proxy service. Enter the proxy service name as an
alphanumeric string from 1 to 64 characters.
Usage Guidelines This command requires the SSL feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
When you create a SSL proxy service, the CLI prompt changes to the ssl-proxy configuration mode,
where you define the following SSL proxy service attributes:
• Certificate
• Key pair
• Chain group
• Parameter map
For information about the commands in SSL proxy configuration mode, see the “SSL Proxy
Configuration Mode Commands” section.
Syntax Description http-cookie name1 Specifies that the ACE learn the cookie value from the HTTP header
of the client request or from the Set-Cookie message from the server.
Enter a unique identifier for the cookie as an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
name2 Unique identifier of the sticky group. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines This command requires the sticky feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To use the stickiness feature, you must allocate a minimum percentage of system resources to stickiness.
Otherwise, the feature will not work. For more information about allocating resources, see the Cisco
4700 Series Application Control Engine Appliance Virtualization Configuration Guide.
For information about the commands in sticky cookie configuration mode, see the “Sticky Cookie
Configuration Mode Commands” section.
Syntax Description name1 Unique identifier of the sticky group. Enter an HTTP header name as
an unquoted text string with no spaces and a maximum of 64
alphanumeric characters. Alternatively, you can select one of the
following standard headers:
• Accept
• Accept-Charset
• Accept-Encoding
• Accept-Language
• Authorization
• Cache-Control
• Connection
• Content-MD5
• Expect
• From
• Host
• If-Match
• Pragma
• Referer
• Transfer-Encoding
• User-Agent
• Via
See the Cisco 4700 Series Application Control Engine Appliance
Server Load-Balancing Configuration Guide for a definition of each
standard header.
name2 Unique identifier of the sticky group. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines This command requires the sticky feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To use the stickiness feature, you must allocate a minimum percentage of system resources to stickiness.
Otherwise, the feature will not work. For more information about allocating resources, see the Cisco
4700 Series Application Control Engine Appliance Virtualization Configuration Guide.
For information about the commands in sticky header configuration mode, see the “Sticky Header
Configuration Mode Commands” section.
Syntax Description netmask Network mask that the ACE applies to the IP address. Enter a
network mask in dotted-decimal notation (for example,
255.255.255.0).
address {both | destination | Specifies the IP address used for stickiness. Enter one of the
source} following options after the address keyword:
• both—Specifies that the ACE use both the source IP address and
the destination IP address to stick the client to a server.
• destination—Specifies that the ACE use the destination address
specified in the client request to stick the client to a server. You
typically use this keyword in caching environments.
• source—Specifies that the ACE use the client source IP address
to stick the client to a server. You typically use this keyword in
web application environments.
name Unique identifier of the sticky group. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines This command requires the sticky feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To use the stickiness feature, you must allocate a minimum percentage of system resources to stickiness.
Otherwise, the feature will not work. For more information about allocating resources, see the Cisco
4700 Series Application Control Engine Appliance Virtualization Configuration Guide.
For information about the commands in sticky IP configuration mode, see the “Sticky IP Configuration
Mode Commands” section.
Examples To create a sticky group that uses IP address stickiness based on both the source IP address and the
destination IP address, enter:
host1/Admin(config)# sticky ip-netmask 255.255.255.0 address both GROUP1
host1/Admin(config-sticky-ip)#
Syntax Description minutes Length of time in minutes that the ACE skips a nonresponsive
TACACS+ server for transaction requests. Enter an integer from 0 to
1440 (24 hours). The default is 0.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The dead-time interval starts when the server does not respond to an authentication request transmission.
When the server responds to a probe access-request packet, the ACE retransmits the authentication
request to the server.
Using this command causes the ACE to mark as dead any TACACS+ servers that fail to respond to
authentication requests. This action avoids the wait for the request to time out before trying the next
configured server. The ACE skips a TACACS+ server that is marked as dead by additional requests for
the duration of minutes.
Examples To globally configure a 15-minute dead time for TACACS+ servers that fail to respond to authentication
requests, enter:
host1/Admin(config)# tacacs-server deadtime 15
Syntax Description ip_address IP address for the TACACS+ server. Enter the address in dotted-decimal IP
notation (for example, 192.168.11.1).
key (Optional) Enables an authentication key for communication between the
ACE and the daemon running on the TACACS+ server.
shared_secret Key used to authenticate communication between the TACACS+ client and
server. The shared secret must match the one configured on the TACACS+
server. Enter the shared secret as a case-sensitive string with no spaces with
a maximum of 63 alphanumeric characters.
0 (Optional) Configures a key specified in clear text (indicated by 0) to
authenticate communication between the TACACS+ client and server.
7 (Optional) Configures a key specified in encrypted text (indicated by 7) to
authenticate communication between the TACACS+ client and server.
port port_number (Optional) Specifies the TCP destination port for communicating
authentication requests to the TACACS+ server. By default, the TACACS+
authentication port is 1812 (as defined in RFC 2138 and RFC 2139). If your
TACACS+ server uses a port other than 1812, use the port keyword to
configure the ACE for the appropriate port before starting the TACACS+
service. The port_number argument specifies the TACACS+ port number.
Enter an integer from 1 to 65535.
timeout seconds (Optional) Specifies the time interval that the ACE waits for the TACACS+
server to reply to an authentication request. Enter an integer from 1 to 60.
The default is 1 second.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The key shared_secret text string must match the encryption key used on the TACACS+ server. This key
overrides the global setting of the (config) tacacs-server key command. If you do not specify a key, the
global value is used. TACACS+ keys are always stored in encrypted form in persistent storage. The
running configuration also displays keys in encrypted form.
For the specified server, the timeout keyword used with the tacacs-server host command overrides the
global setting assigned using the (config) tacacs-server timeout command.
By default, the ACE waits 1 second for the TACACS+ server to reply to an authentication request before
it declares a timeout and attempts to contact the next server in the group. If all servers in the group are
unavailable for authentication and accounting, the ACE tries the local database if you configure the
database as the local fallback method by entering the (config) aaa authentication login or the (config)
aaa accounting default commands
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The key is a text string that must match the encryption key used on the TACACS+ server. TACACS+ keys
are always stored in encrypted form in persistent storage on the ACE. This global key will be applied to
those TACACS+ servers in a named server group for which a shared secret is not individually configured
using the (config) tacacs-server host command.
Syntax Description seconds Timeout value in seconds. Valid entries are from 1 to 60 seconds. The
default is 1 second.
Usage Guidelines This command requires the AAA feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
no telnet maxsessions
Syntax Description sessions Maximum number of concurrent Telnet sessions allowed for the associated
context. The range is from 1 to 4 Telnet sessions per user context and from
1 to 16 Telnet sessions for the Admin context. The defaults are 4 (user
context) and 16 (Admin context).
Usage Guidelines This command requires the Admin user role. For details about role-based access control (RBAC) and
user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
The ACE supports a total maximum of 256 concurrent Telnet sessions.
Examples To set the maximum number of concurrent Telnet sessions to 3 in the Admin context, enter:
host1/Admin(config)# telnet maxsessions 3
To revert to the default of 16 Telnet sessions for the Admin context, enter:
host1/Admin(config)# no telnet maxsessions
no timeout xlate
Syntax Description seconds Time in seconds that the ACE waits to free the Xlate slot after it becomes
idle. Enter an integer from 60 to 2147483. The default is 10800 seconds (3
hours).
Usage Guidelines This command requires the NAT feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To reset the NAT idle timeout to the default value of 10800 seconds (3 hours), enter:
host1/Admin(config)# no timeout xlate
(config) username
To change the default username and password, use the username command. Use the no form of this
command to remove the username from the configuration.
username name1 [password [0 | 5] {password}] [expire date] [role name2 {domain name3 name4
. . . namen}]
no username name1 [password [0 | 5] {password}] [expire date] [role name2 {domain name3
name4 . . . namen}]
Syntax Description name1 Identifier of the user that you are creating. Enter an unquoted text string
with no spaces and a maximum of 24 alphanumeric characters.
password (Optional) Indicates that a password follows.
0 (Optional) Specifies a clear text password.
5 (Optional) Specifies an MD5-hashed strong encryption password.
password Password in clear text, encrypted text, or MD5 strong encryption,
depending on the numbered option that you enter. If you do not enter a
numbered option, the password is in clear text by default. If you enter the
password keyword, you must enter a password. Enter a password as an
unquoted text string with a maximum of 64 alphanumeric characters. The
ACE supports the following special characters in a password:
,./=+-^@!%~#$*()
Note that the ACE encrypts clear text passwords in the running-config.
expire date (Optional) Specifies the expiration date of the user account. Enter the
expiration date in the format yyyy-mm-dd.
role name2 (Optional) Specifies an existing role that you want to assign to the user.
domain name3 name4 Specifies the domains in which the user can operate. You can enter multiple
. . . namen domain names up to a maximum of 10, including default-domain.
Usage Guidelines This command requires the context Admin user role. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
If you do not assign a role to a new user, the default role is Network-Monitor. For users that you create
in the Admin context, the default scope of access is the entire device. For users that you create in other
contexts, the default scope of access is the entire context. If you need to restrict a user’s access, you must
assign a role-domain pair. For more information about creating users, see the Cisco 4700 Series
Application Control Engine Appliance Virtualization Configuration Guide.
Syntax Description list_name Name assigned to the action list. Enter a unique name as an unquoted
text string with a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the loadbalance feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
The action-list type command allows you to configure a series of statements. An action list groups a
series of individual functions that apply to a specific type of application acceleration and optimization
operation. After you enter this command, the system enters the corresponding action list configuration
mode.
After you configure the action list, you associate it with a specific statement in a Layer 7 HTTP
optimization policy map. The Layer 7 optimization HTTP policy map activates an optimization HTTP
action list that allows you to configure the specified optimization actions.
(config-actlist-optm) appscope
To enable AppScope performance monitoring by the optional Cisco AVS 3180A Management Station
for use with the ACE, use the appscope command. Use the no form of this command to disable the
AppScope function from the action list.
appscope
no appscope
Usage Guidelines The statistical log contains an entry for each ACE optimization request to the server and is used for
statistical analysis by the optional Cisco AVS 3180A Management Station. The ACE collects statistical
log and sends it to the Cisco AVS 3180A Management Station for loading into the database. For details
about the use of the Cisco AVS 3180A Management Station for database, management, and reporting
features for the ACE optimization functionality, including AppScope reporting, see the Cisco 4700
Series Application Control Engine Appliance Application Acceleration and Optimization Configuration
Guide.
To control the AppScope features that measure application acceleration and optimization performance,
use the appscope commands in parameter map optimization configuration mode. See the “Parameter
Map Optimization Configuration Mode Commands” section for details.
To specify the host (the syslog server on the Management Station) that receives the syslog messages sent
by the ACE, use the logging host configuration command. See the (config) logging host command. This
command allows you to identify the IP address of the Management Station that will be used as the syslog
server. You can specify that the host uses either UDP or TCP to send messages to the syslog server.
(config-actlist-optm) cache
To enable cache optimization for the corresponding URLs, use the cache command. Use the no form of
this command to disable the cache function from the action list.
Syntax Description dynamic Enables Adaptive Dynamic Caching for the corresponding URLs, even if the
expiration settings in the response indicate that the content is dynamic. The
expiration of cache objects is controlled by the cache expiration settings based on the
time or server load (performance assurance).
forward Enables the cache forward feature for the corresponding URLs. This keyword allows
the ACE to serve the object from its cache (static or dynamic) even when the object
has expired if the maximum cache TTL time period has not yet expired (set using the
cache ttl command in parameter map optimization mode). At the same time, the ACE
sends an asynchronous request to the origin server to refresh its cache of the object.
Usage Guidelines You define the ACE cache object key, cache freshness, and cache request/response policy settings by
configuring the cache and cache-policy commands in parameter map optimization configuration mode.
See “Parameter Map Optimization Configuration Mode Commands” section for details.
Examples For example, to enable the cache forward feature for the corresponding URLs, enter:
host1/Admin(config)# action-list type optimization http ACT_LIST1
host1/Admin(config-actlist-optm)# cache forward
(config-actlist-optm) delta
To enable delta optimization to condense corresponding URLs, use the delta command. Use the no form
of this command to disable delta optimization from the action list.
delta
no delta
dynamic etag
no dynamic etag
(config-actlist-optm) flashforward
To enable FlashForward for the corresponding URLs and to transform embedded objects, use the
flashforward command. Use the no form of this command to disable FlashForward from the action list.
flashforward
no flashforward
(config-actlist-optm) flashforward-object
To enable FlashForward static caching for the corresponding URLs, use the flashforward-object
command. Use the no form of this command to disable FlashForward static caching from the action list.
flashforward-object
no flashforward-object
Syntax Description]] group_name Name that you assign to the chain group. Enter the chain group name as an
alphanumeric string from 1 to 64 characters.
Usage Guidelines This command requires the SSL feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
A chain group specifies the certificate chains that the ACE sends to its peer during the handshake
process. A certificate chain is a hierarchical list of certificates that includes the subject’s certificate, the
root CA certificate, and any intermediate CA certificates. You include a chain group in the handshake
process by configuring the SSL proxy-service with the chain group (see the (config) ssl-proxy service
command).
The ACE supports the following certificate chain group capabilities:
• A chain group can contain up to nine certificate chains.
• Each context on the ACE can contain up to eight chain groups.
• The file size of an individual certificate or chain group must not exceed 8192 bytes.
(config-chaingroup) cert
To add certificate files to a chain group, use the cert command. Use the no form of the command to
remove a certificate file from a chain group.
cert cert_filename
no cert cert_filename
Syntax Description cert_filename Name of an existing certificate file stored on the ACE. Enter an unquoted text string
with no spaces and a maximum of 40 alphanumeric characters. To display a list of
available certificate files, use the do show crypto files command.
Usage Guidelines It is not necessary to add the certificates in any type of hierarchical order because the device verifying
the certificates determines the correct order.
The ACE supports the following certificate chain group capabilities:
• A chain group can contain up to nine certificate chains.
• Each context on the ACE can contain up to eight chain groups.
• The file size of an individual certificate or chain group must not exceed 8192 bytes.
Examples To add the certificate files MYCERTS.PEM, MYCERTS_2.PEM, and MYCERTS_3.PEM to the chain
group, enter:
host1/Admin(config-chaingroup)# cert MYCERTS.PEM
host1/Admin(config-chaingroup)# cert MYCERTS_2.PEM
host1/Admin(config-chaingroup)# cert MYCERTS_3.PEM
To remove the certificate file MYCERTS_2.PEM from the chain group, enter:
host1/Admin(config-chaingroup)# no cert MYCERTS_2.PEM
Syntax Description match-all | (Optional) Determines how the ACE evaluates Layer 3 and Layer 4 network traffic
match-any when multiple match criteria exist in a class map. The class map is considered a
match if the match commands meet one of the following conditions:
• match-all —(Default) Traffic being evaluated must match all of the match
criteria listed in the class map (typically, match commands of different types).
• match-any—Traffic being evaluated must match one of the match criteria
listed in the class map (typically, match commands of the same type).
map_name Name assigned to the Layer 3 and Layer 4 class map. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The features required in your user role to execute a specific class map configuration command is
described in the “Usage Guidelines” section of the command. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The ACE supports a system-wide maximum of 8192 class maps.
Examples To create a Layer 3 and Layer 4 class map named L4VIP_CLASS to identify the network traffic that can
pass through the ACE for server load balancing, enter:
host1/Admin(config)# class-map match-all L4VIP_CLASS
host1/Admin(config-cmap)#
(config-cmap) description
To provide a brief summary about a Layer 3 and Layer 4 class map, use the description command. Use
the no form of the command to remove the Layer 3 and Layer 4 class map description from the class map.
description text
no description
Syntax Description text Description about a Layer 3 and Layer 4 class map. Enter a
description as an unquoted text string with a maximum of
240 alphanumeric characters.
Usage Guidelines This command has no user role restrictions. For details about role-based access control (RBAC) and user
roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
Examples To add a description that the class map is to filter network traffic based on the source IP address, enter:
host1/Admin(config)# class-map L4_SOURCE_IP_CLASS
host1/Admin(config-cmap)# description match on source IP address of incoming traffic
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 255 as the line number.
You can enter no line_number to delete long match commands
instead of entering the entire line. The line numbers do not dictate a
priority or sequence for the match statements.
name Previously created access list identifier. Enter an unquoted text string
with a maximum of 64 characters.
Usage Guidelines This command has no user role restrictions. For details about role-based access control (RBAC) and user
roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration
Guide.
A single class map can have multiple match access-list commands. You can combine multiple match
access-list, match source-address, match destination-address, and match port commands in a class
map.
See the Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide for
details about the creating access control lists in the ACE.
Examples To specify that the class map is to match on the access control list INBOUND, enter:
host1/Admin(config)# class-map match-any L4_FILTERTRAFFIC_CLASS
host1/Admin(config-cmap)# match access-list INBOUND
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 255 as the line number.
You can enter no line_number to delete long match commands
instead of entering the entire line. The line numbers do not dictate a
priority or sequence for the match statements.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
You can include only one match any command within a class map, and you cannot combine the match
any command with other types of match commands in a class map because the match criteria will be
ignored.
Examples To specify that the class map is to match on any network traffic, enter:
host1/Admin(config)# class-map match-any L4_MATCHANYTRAFFIC_CLASS
host1/Admin(config-cmap)# match any
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 255 as the line number.
You can enter no line_number to delete long match commands
instead of entering the entire line. The line numbers do not dictate a
priority or sequence for the match statements.
ip_address Destination IP address. Enter the IP address in dotted-decimal
notation (for example, 192.168.11.1).
mask (Optional) Subnet mask entry in dotted-decimal notation (for
example, 255.255.255.0).
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
A single class map can have multiple match destination-address commands. You can combine multiple
match destination-address, match access-list, match source-address, and match port commands in
a class map.
An entry of 0.0.0.0 0.0.0.0 indicates a wildcard match for any destination IP address and subnet mask.
Examples To specify that the class map is to match on the destination IP address 172.16.20.1 255.255.0.0, enter:
host1/Admin(config)# class-map L4_DEST_IP_CLASS
host1/Admin(config-cmap)# match destination-address 172.16.20.1 255.255.0.0
[line_number] match port {tcp | udp} {any | eq {port_number} | range port1 port2}
no [line_number] match port {tcp | udp} {any | eq {port_number} | range port1 port2}
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual match
commands. Enter an integer from 2 to 255 as the line number. You can enter no
line_number to delete long match commands instead of entering the entire line. The
line numbers do not dictate a priority or sequence for the match statements.
tcp | udp Specifies the protocol: TCP or UDP.
any Specifies that any TCP or UDP port number can match the specified value.
eq port_number Specifies that the TCP or UDP port number must match the specified value. Enter an
integer from 0 to 65535. A value of 0 instructs the ACE to include all ports.
Alternatively, you can enter the name of a well-known TCP or UDP port as follows:
• TCP port—Specify one of the following names or well-known port numbers:
– domain—Specifies the Domain Name Service (53)
– ftp—Specifies the File Transfer Protocol (21)
– ftp-data—Specifies the File Transfer Protocol Data (20)
– http—Specifies the Hypertext Transfer Protocol (80)
– https—Specifies the HTTP over SSL protocol (443)
– irc—Specifies the Internet Relay Chat protocol (194)
– matip-a—Specifies the Matip Type A protocol (350)
– nntp—Specifies the Network News Transport Protocol (119)
– pop2—Specifies the Post Office Protocol v2 (109)
– pop3—Specifies the Post Office Protocol v3 (110)
– rtsp—Specifies the Real Time Streaming Protocol (554)
– smtp—Specifies the Simple Mail Transfer Protocol (25)
– telnet—Specifies the Telnet protocol (23)
– www—Specifies the World Wide Web (80)
• UDP port—Specify one of the following protocols:
– domain—Specifies the Domain Name Service (53)
– wsp—Specifies the Connectionless Wireless Session Protocol (9200)
– wsp-wtls—Specifies the Secure Connectionless WSP (9202)
– wsp-wtp—Specifies the Connection-based WSP (9201)
– wsp-wtp-wtls—Specifies the Secure Connection-based WSP (9203)
range port1 Specifies a port range to use for the TCP or UDP port. Valid port ranges are from 0
port2 to 65535. A value of 0 (for port1and port2) instructs the ACE to match all ports.
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
A single class map can have multiple match port commands. You can combine multiple match port,
match access-list, match source-address, and match destination-address commands in a class map.
Examples To specify that the class map is to match on TCP port number 23 (Telnet client), enter:
host1/Admin(config)# class-map L4_TCPPORT_CLASS
host1/Admin(config-cmap)# match port tcp eq 23
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 255 as the line number.
You can enter no line_number to delete long match commands
instead of entering the entire line. The line numbers do not dictate a
priority or sequence for the match statements.
ip_address Source IP address of the client. Enter the IP address in
dotted-decimal notation (for example, 192.168.11.1).
mask Subnet mask of the client entry in dotted-decimal notation (for
example, 255.255.255.0).
Usage Guidelines This command has no user role feature restrictions. For details about role-based access control (RBAC)
and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
A single class map can have multiple match source-address commands. You can combine multiple
match source-address, match access-list, match destination-address, and match port commands in
a class map.
An entry of 0.0.0.0 0.0.0.0 indicates a wildcard match for any source IP address and subnet mask.
Examples To specify that the class map match on the source IP address 192.168.11.2 255.255.255.0, enter:
host1/Admin(config)# class-map http type loadbalance match-any L7SLBCLASS
host1/Admin(config-cmap-http-lb)# match source-address 192.168.11.2 255.255.255.0
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 255 as the line number.
You can enter no line_number to delete long match commands
instead of entering the entire line. The line numbers do not dictate a
priority or sequence for the match statements.
vip_address VIP server IP address of the ACE, specified in dotted-decimal format
(for example, 192.168.1.2).
netmask (Optional) Subnet mask for the VIP address, specified in
dotted-decimal format (for example, 255.255.255.0).
protocol_number (Optional) Number of an IP protocol. Enter an integer from 1 to 255
that represents the IP protocol number.
any Specifies the wildcard value that allows connections from any IP
protocol.
tcp | udp Specifies the protocol: TCP or UDP.
any Specifies the wildcard value for the TCP or UDP port number. With
any used in place of either the eq or range values, packets from any
incoming port match.
eq port_number Specifies that the TCP or UDP port number must match the specified
value. Enter an integer from 0 to 65535. A value of 0 instructs the
ACE to include all ports. Alternatively, you can enter the name of a
well-known TCP port or a well-known UDP port as follows:
• TCP port—Specify one of the following names or well-known
port numbers:
– domain—Specifies the Domain Name Service (53)
– ftp—Specifies the File Transfer Protocol (21)
– ftp-data—Specifies the File Transfer Protocol Data (20)
– http—Specifies the Hypertext Transfer Protocol (80)
– https—Specifies the HTTP over SSL protocol (443)
– irc—Specifies the Internet Relay Chat protocol (194)
– matip-a—Specifies the Matip Type A protocol (350)
– nntp—Specifies the Network News Transport Protocol
(119)
– pop2—Specifies the Post Office Protocol v2 (109)
– pop3—Specifies the Post Office Protocol v3 (110)
– rtsp—Specifies the Real Time Streaming Protocol (554)
– smtp—Specifies the Simple Mail Transfer Protocol (25)
– telnet—Specifies the Telnet protocol (23)
– www—Specifies the World Wide Web (80)
• UDP port—Specify one of the following protocols:
– domain—Specifies the Domain Name Service (53)
– wsp—Specifies the Connectionless Wireless Session
Protocol (9200)
– wsp-wtls—Specifies the Secure Connectionless WSP (9202)
– wsp-wtp—Specifies the Connection-based WSP (9201)
– wsp-wtp-wtls—Specifies the Secure Connection-based
WSP (9203)
range port1 port2 Specifies a port range to use for the TCP or UDP port. Valid port
ranges are from 0 to 65535. A value of 0 (for port1and port2)
instructs the ACE to match all ports.
Usage Guidelines This command requires the VIP feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
You can specify multiple match virtual-address commands within a class map.
The match virtual-address command cannot be combined with other types of match commands.
See the Cisco 4700 Series Application Control Engine Appliance Server Load-Balancing Configuration
Guide for details about configuring the ACE to perform server load balancing.
Examples To specify that the class map L4VIPCLASS matches traffic destined to VIP address 192.168.1.10 and
TCP port number 80, enter:
host1/Admin(config)# class-map L4VIPCLASS
host1/Admin(config-cmap)# match virtual-address 192.168.1.10 tcp port eq 80
Syntax Description match-any Determines how the ACE inspects FTP request commands when
multiple match criteria exist in a class map. The FTP request
commands being inspected must match only one of the match criteria
listed in the class map.
map_name Name assigned to the Layer 7 FTP command request class map. Enter
an unquoted text string with no spaces and a maximum of
64 alphanumeric characters.
Usage Guidelines The commands in this mode require the inspect feature in your user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Examples To create a Layer 7 class map named FTP_INSPECT_L7CLASS that performs FTP command
inspection, enter:
host1/Admin(config)# class-map type ftp inspect match-any FTP_INSPECT_L7CLASS
host1/Admin(config-cmap-ftp-insp)#
(config-cmap-ftp-insp) description
To provide a brief summary about the Layer 7 File Transfer Protocol (FTP) command inspection class
map, use the description command. Use the no form of the command to remove the description from
the class map.
description text
no description text
Syntax Description text Description about the class map. Enter an unquoted text string with a
maximum of 240 alphanumeric characters.
Examples To add a description that the class map is to perform FTP command inspection, enter:
host1/Admin(config-cmap-ftp-insp)# description FTP command inspection of incoming traffic
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
ftp_command FTP command in the class map to be subjected to FTP inspection by
the ACE. The possible FTP commands are as follows:
• appe—Append to a file.
• cd—Change to the specified directory.
• cdup—Change to the parent of the current directory.
• dele—Delete a file at the server side.
• get—Retrieve a file.
• help—Help information from the server.
• mkd—Create a directory.
• put—Store a file.
• rmd—Remove a directory.
• rnfr—Rename from.
• rnto—Rename to.
• site—Specify the server-specific command.
• stou—Store a file with a unique name.
• syst—Get system information.
Usage Guidelines You can specify multiple match request-method commands within a class map.
Examples To specify FTP_INSPECT_L7CLASS as the name of a class map and identify that at least one FTP
inspection command in the class map must be satisfied for the ACE to indicate a match, enter:
(config)# class-map type ftp inspect match-any FTP_INSPECT_L7CLASS
host1/Admin(config-cmap-ftp-insp)# match request-method cdup
host1/Admin(config-cmap-ftp-insp)# match request-method get
host1/Admin(config-cmap-ftp-insp)# match request-method stou
host1/Admin(config-cmap-ftp-insp)# match request-method put
Syntax Description match-all | match-any (Optional) Determines how the ACE performs the deep packet
inspection of HTTP traffic when multiple match criteria exist in a
class map. The class map is considered a match if the match
commands meet one of the following conditions:
• match-all —(Default) Specifies that network traffic needs to
satisfy all of the match criteria (implicit AND) to match the
Layer 7 HTTP deep packet inspection class map. The match-all
keyword is applicable only for match statements of different
HTTP deep packet inspection types. For example, specifying a
match-all condition for URL, HTTP header, and URL content
statements in the same class map is valid. However, specifying a
match-all condition for multiple HTTP headers with the same
names or multiple URLs in the same class map is invalid.
• match-any—Specifies that network traffic needs to satisfy only
one of the match criteria (implicit OR) to match the Layer 7
HTTP deep packet inspection class map. The match-any
keyword is applicable only for match statements of the same
Layer 7 HTTP deep packet inspection type. For example, the
ACE does not allow you to specify a match-any condition for
URL, HTTP header, and URL content statements in the same
class map but does allow you to specify a match-any condition
for multiple URLs, multiple HTTP headers, or multiple URL
content statements with different names in the same class map.
map_name Name assigned to the Layer 7 HTTP deep packet inspection class
map. Enter an unquoted text string with no spaces and a maximum of
64 alphanumeric characters.
Usage Guidelines The commands in this mode require the inspect feature in your user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Examples To create a Layer 7 class map named HTTP_INSPECT_L7CLASS that performs HTTP deep packet
inspection, enter:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS
host1/Admin(config-cmap-http-insp)#
(config-cmap-http-insp) description
To provide a brief summary about the Layer 7 HTTP inspection class map, use the description
command. Use the no form of the command to remove the description from the class map.
description text
no description
Syntax Description text Description about the class map. Enter an unquoted text string with a
maximum of 240 alphanumeric characters.
Examples To add a description that the class map is to perform HTTP deep packet inspection, enter:
host1/Admin(config-cmap-http-insp)# description HTTP protocol deep inspection of incoming
traffic
Syntax Description [line_number] (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
expression Content expression contained within the HTTP entity body. The
range is from 1 to 255 alphanumeric characters. For a list of the
supported characters that you can use in regular expressions, see
Table 2-4.
offset number (Optional) Provides an absolute offset where the content expression
search string starts. The offset starts at the first byte of the message
body, after the empty line (CR, LF, CR, LF) between the headers and
the body of the message. The offset value is from 1 to 4000 bytes.
Examples To specify a content expression contained within the entity body sent with an HTTP request, enter:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS
host1/Admin(config-cmap-http-insp)# match content .*newp2psig
[line_number] match content length {eq bytes | gt bytes | lt bytes | range bytes1 bytes 2}
no [line_number] match content length {eq bytes | gt bytes | lt bytes | range bytes1 bytes 2}
Syntax Description [line_number] (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
eq bytes Specifies a value for the content parse length in an HTTP message
received by the ACE. Based on the policy map action, the ACE allows
or denies messages with a content length size equal to the specified
value. Valid entries are from 1 to 65535 bytes.
gt bytes Specifies a minimum value for the content parse length in an HTTP
message received by the ACE. Based on the policy map action, the
ACE allows or denies messages with a content length size greater
than the specified value. Valid entries are from 1 to 65535 bytes.
lt bytes Specifies a maximum value for the content parse length in an HTTP
message received by the ACE. Based on the policy map action, the
ACE allows or denies messages with a content length size less than
the specified value. Valid entries are from 1 to 65535 bytes.
range bytes1 bytes Specifies a size range for the content parse length in an HTTP
message received by the ACE. Based on the policy map action, the
ACE allows or denies messages with a content length size within this
range. The range is from 1 to 65535 bytes.
Examples To identify content parse length in an HTTP message that can be received by the ACE, enter:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS
host1/Admin(config-cmap-http-insp)# match content length eq 3495
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
header_name Name of the HTTP header to match (for example,
www.example1.com.) The range is from 1 to 64 alphanumeric
characters.
Note The header_name argument cannot include the colon in the
name of the HTTP header; the ACE rejects the colon as an
invalid token.
Usage Guidelines The ACE supports the use of regular expressions for matching. Expressions are stored in a header map
in the form header-name: expression. Header expressions allow spaces, provided that the spaces are
escaped or quoted. Table 2-4 lists the supported characters that you can use in regular expressions.
Convention Description
.* Zero or more characters.
. Exactly one character.
\. Escaped character.
\xhh Any ASCII character as specified in two-digit hex notation.
() Expression grouping.
Bracketed range [for Matches any single character from the range.
example, 0-9]
A leading ^ in a range Does not match any character in the range; all other characters represent
[^charset] themselves.
(expr1 | expr2) OR of expressions.
(expr)* 0 or more of expressions.
(expr)+ 1 or more of expressions.
(expr{m,n} Matches the previous item between m and n times; valid entries are from 1
to 255.
(expr{m} Matches the previous item exactly m times; valid entries are from 1 to 255.
(expr{m,} Matches the previous item m or more times; valid entries are from 1 to 255.
\a Alert (ASCII 7).
\b Backspace (ASCII 8).
\f Form-feed (ASCII 12).
\n New line (ASCII 10).
\r Carriage return (ASCII 13).
\t Tab (ASCII 9).
\v Vertical tab (ASCII 11).
\0 Null (ASCII 0).
.\\ Backslash.
Examples To filter on content and allow HTTP headers that contain the expression html, enter:
host1/Admin(config)# class-map type http inspect match-all L7_CLASSFLTRHTML1
host1/Admin(config-cmap-http-insp)# match header accept header-value html
[line_number] match header length {request | response} {eq bytes | gt bytes | lt bytes | range
bytes1 bytes 2}
no [line_number] match header length {request | response} {eq bytes | gt bytes | lt bytes | range
bytes1 bytes 2}
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
request Specifies the size of the HTTP header request message that can be
received by the ACE.
response Specifies the size of the HTTP header response message sent by the
ACE.
eq bytes Specifies a value for the entity body in an HTTP message received by
the ACE. Based on the policy map action, the ACE allows or denies
messages with an entity body size equal to the specified value. Valid
entries are from 1 to 65535 bytes.
gt bytes Specifies a minimum value for the entity body in an HTTP message
received by the ACE. Based on the policy map action, the ACE allows
or denies messages with an entity body size greater than the specified
value. Valid entries are from 1 to 65535 bytes.
lt bytes Specifies a maximum value for the entity body in an HTTP message
received by the ACE. Based on the policy map action, the ACE allows
or denies messages with an entity body size less than the specified
value. Valid entries are from 1 to 65535 bytes.
range bytes1 bytes 2 Specifies a size range for the entity body in an HTTP message
received by the ACE. Based on the policy map action, the ACE allows
or denies messages with a entity body size within this range. The
range is from 1 to 65535 bytes.
Examples To specify that the class map match on HTTP traffic received with a length less than or equal to
3600 bytes in the entity body of the HTTP message, enter:
(config)# class-map type http inspect HTTP_INSPECT_L7CLASS
host1/Admin(config-cmap-http-insp)# match header length request eq 3600
Syntax Description [line_number] (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
mime_type The MIME type message. The ACE includes a predefined list of
MIME types, such as image\Jpeg, text\html, application\msword,
audio\mpeg. Choose whether only the MIME types included in this
list are permitted through the ACE firewall or whether all MIME
types are acceptable. The default behavior is to allow all MIME
types.
The following lists the supported MIME types:
• application\msexcel
• application\mspowerpoint
• application\msword
• application\octet-stream
• application\pdf
• application\postscript
• application\x-gzip
• application\x-java-archive
• application\x-java-vm
• application\x-messenger
• application\zip
• audio\*
• audio\basic
• audio\midi
• audio\mpeg
• audio\x-adpcm
• audio\x-aiff
• audio\x-ogg
• audio\x-wav
• image \*
• image\gif
• image\jpeg
• image\png
• image\tiff
• image\x-3ds
• image\x-bitmap
• image\x-niff
• image\x-portable-bitmap
• image\x-portable-greymap
• image\x-xpm
• text\*
• text\css
• text\html
• text\plain
• text\richtext
• text\sgml
• text\xmcd
• text\xml
• video\*
• video\flc
• video\mpeg
• video\quicktime
• video\sgi
• video\x-fli
Usage Guidelines To define MIME-type messages in addition to what is supported under the match header mime-type
command, use the match header command (see the (config-cmap-http-insp) match header
command). For example, to define a match for a new MIME type audio\myaudio, you could enter the
following match statement:
match header Content-type header-value audio\myaudio.
Examples To specify the MIME-type audio\midi and audio\mpeg messages permitted through the ACE, enter:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS
host1/Admin(config-cmap-http-insp)# match header mime-type audio\midi
host1/Admin(config-cmap-http-insp)# match header mime-type audio\mpeg
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
im Defines the instant messaging application category. The ACE checks
for the Yahoo Messenger instant messaging application.
p2p Defines the peer-to-peer application category. The applications
checked include Kazaa and Gnutella.
tunneling Defines the tunneling application category. The applications checked
include HTTPort/HTTHost, GNU httptunnel, GoToMyPC, FireThru,
and Http-Tunnel Client.
Usage Guidelines You can specify multiple match port-misuse commands within a class map. Each match port-misuse
command configures a single application type.
The port misuse application inspection process requires a search of the entity body of the HTTP
message, which may degrade performance of the ACE.
The ACE disables the match port-misuse command by default. If you do not configure a restricted
HTTP application category, the default action by the ACE is to allow the applications without generating
a log.
Examples To identify that peer-to-peer applications are restricted HTTP traffic, enter:
(config)# class-map type http inspect HTTP_INSPECT_L7CLASS
host1/Admin(config-cmap-http-insp)# match port-misuse p2p
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
ext method Specifies an HTTP extension method. If the RFC request messages
do not contain one of the RFC 2616 HTTP request methods, the ACE
verifies whether it is an extension method. The ACE supports the
inspection of the following HTTP request extension methods: copy,
edit, getattr, getattrname, getprops, index, lock, mkdir, move,
revadd, revlabel, revlog, revnum, save, setattr, startrev, stoprev,
unedit, and unlock.
rfc method Specifies an RFC 2616 HTTP request method that you want to
perform an RFC compliance check on. The ACE supports the
inspection of the following RFC 2616 HTTP request methods:
connect, delete, get, head, options, post, put, and trace.
Usage Guidelines You can specify multiple match request-method commands within a class map. Each match
request-method command configures a single request method.
For unsupported HTTP request methods, include the inspect http strict command as an action in the
Layer 3 and Layer 4 policy map.
The ACE disables the match request-method command by default. If you do not configure a request
method, the default action by the ACE is to allow the RFC 2616 HTTP request method without
generating a log.
Examples To identify that the connect, get, head, and index HTTP RFC 2616 protocols are to be used for
application inspection, enter:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS
host1/Admin(config-cmap-http-insp)# match request-method rfc connect
host1/Admin(config-cmap-http-insp)# match request-method rfc get
host1/Admin(config-cmap-http-insp)# match request-method rfc head
host1/Admin(config-cmap-http-insp)# match request-method ext index
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
chunked Transfers the message body as a series of chunks.
compressed Defines the encoding format produced by the common UNIX file
compression program “compress.” This format is an adaptive
Lempel-Ziv-Welch coding (LZW).
deflate Defines the .zlib format defined in RFC 1950 in combination with the
deflate compression mechanism described in RFC 1951.
gzip Defines the encoding format produced by the file compression
program gzip (GNU zip) as described in RFC 1952. This format is a
Lempel-Ziv coding (LZ77) with a 32-bit CRC.
identity Defines the default (identity) encoding, which does not require the
use of transformation.
Usage Guidelines You can specify multiple match transfer-encoding commands within a class map. Each match
transfer-encoding command configures a single application type.
The ACE disables the match transfer-encoding command by default. If you do not configure a
transfer-encoding type, the default action by the ACE is to allow the HTTP transfer-encoding types
without generating a log.
Examples To specify a chunked HTTP transfer encoding type to limit the HTTP traffic that flows through the ACE,
enter:
(config)# class-map type http inspect HTTP_INSPECT_L7CLASS
host1/Admin(config-cmap-http-insp)# match transfer-encoding chunked
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
expression URL or portion of a URL to match. The URL string range is from 1 to
255 characters. Include only the portion of the URL following
www.hostname.domain in the match statement. For a list of the
supported characters that you can use for regular expressions, see
Table 2-4.
Usage Guidelines Include only the portion of the URL that follows www.hostname.domain in the match statement. For
example, in the URL www.anydomain.com/latest/whatsnew.html, include only /latest/whatsnew.html.
To match the www.anydomain.com portion, the URL string can take the form of a URL regular
expression. The ACE supports the use of regular expressions for matching URL strings. For a list of the
supported characters that you can use for regular expressions, see Table 2-4.
The period (.) does not have a literal meaning in regular expressions. Use either brackets ([]) or the
backslash character (\) to match this character. For example, specify www[.]xyz[.]com instead of
www.xyz.com.
Examples To specify that the Layer 7 class map is to match and perform application inspection on a specific URL,
enter:
(config)# class-map type http inspect HTTP_INSPECT_L7CLASS
host1/Admin(config-cmap-http-insp)# match url whatsnew/latest.*
To use regular expressions to emulate a wildcard search to match on any .gif or .html file, enter:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS
host1/Admin(config-cmap-http-insp)# match url .*.gif
host1/Admin(config-cmap-http-insp)# match url .*.html
[line_number] match url length {eq bytes | gt bytes | lt bytes | range bytes1 bytes 2}
no [line_number] match url length {eq bytes | gt bytes | lt bytes | range bytes1 bytes 2}
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
eq bytes Specifies a value for the HTTP URL length received by the ACE.
Based on the policy map action, the ACE allows or denies messages
with an HTTP URL length equal to the specified value. Valid entries
are from 1 to 65535 bytes.
gt bytes Specifies a minimum value value for the HTTP URL length received
by the ACE. Based on the policy map action, the ACE allows or
denies messages with an HTTP URL length greater than the specified
value. Valid entries are from 1 to 65535 bytes.
lt bytes Specifies a maximum value for the HTTP URL length received by the
ACE. Based on the policy map action, the ACE allows or denies
messages with an HTTP URL length less than the specified value.
Valid entries are from 1 to 65535 bytes.
range bytes1 bytes Specifies a size range for the HTTP URL length received by the ACE.
Based on the policy map action, the ACE allows or denies messages
with an HTTP URL length within this range. The range is from 1 to
65535 bytes.
Examples To specify that the class map is to match on a URL with a length equal to 10000 bytes in the request
message, enter:
(config)# class-map type http inspect HTTP_INSPECT_L7CLASS
host1/Admin(config-cmap-http-insp)# match url length eq 10000
Syntax Description match-all | match-any (Optional) Determines how the ACE evaluates Layer 7 HTTP SLB
operations when multiple match criteria exist in a class map. The
class map is considered a match if the match commands meet one of
the following conditions:
• match-all —(Default) Specifies that network traffic needs to
satisfy all of the match criteria (implicit AND) to match the
Layer 7 load-balancing class map. The match-all keyword is
applicable only for match statements of different Layer 7
load-balancing types. For example, specifying a match-all
condition for URL, HTTP header, and URL cookie statements in
the same class map is valid. However, specifying a match-all
condition for multiple HTTP headers or multiple cookies with
the same names or multiple URLs in the same class map is
invalid.
• match-any—Specifies that network traffic needs to satisfy only
one of the match criteria (implicit OR) to match the HTTP
load-balancing class map. The match-any keyword is applicable
only for match statements of the same Layer 7 load-balancing
type. For example, the ACE does not allow you to specify a
match-any condition for URL, HTTP header, and URL cookie
statements in the same class map but does allow you to specify a
match-any condition for multiple URLs, or multiple HTTP
headers or multiple cookies with different names in the same
class map.
map_name Name assigned to the Layer 7 HTTP SLB class map. Enter an
unquoted text string with no spaces and a maximum of
64 alphanumeric characters.
Usage Guidelines The commands in this mode require the loadbalance feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
Examples To create a Layer 7 class map named L7SLB_CLASS that performs server load balancing, enter:
host1/Admin(config)# class-map type http loadbalance match-any L7SLB_CLASS
host1/Admin(config-cmap-http-lb)#
(config-cmap-http-lb) description
To provide a brief summary about the Layer 7 HTTP SLB class map, use the description command. Use
the no form of the command to remove the description from the class map.
description text
no description
Syntax Description text Description about the class map. Enter an unquoted text string with a
maximum of 240 alphanumeric characters.
Examples To add a description that the class map is to perform server load balancing, enter:
host1/Admin(config-cmap-http-lb)# description HTTP LOAD BALANCE PROTOCOL 1
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
name Name of an existing Layer 7 load-balancing class map.
Usage Guidelines The match class map command allows you to combine the use of the match-any and match-all
keywords in the same class map. To combine match-all and match-any characteristics in a class map,
create a class map that uses one match command (either match-any or match-all) and then use this class
map as a match statement in a second class map that uses a different match type.
See the Cisco 4700 Series Application Control Engine Appliance Server Load-Balancing Configuration
Guide for details about configuring the ACE to perform server load balancing.
Examples These examples show how to combine the characteristics of two class maps, one with match-any and
one with match-all characteristics, into a single class map by using the match class-map command.
(config)# class-map type http loadbalance match-all class3
(config-cmap-http-lb)# 100 match http cookie testcookie1 cookie-value 123456
(config-cmap-http-lb)# 200 match http header Host header-value XYZ
(config-cmap-http-lb)# exit
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
name Unique cookie name. Enter an unquoted text string with no spaces
and a maximum of 64 alphanumeric characters.
secondary name Specifies a cookie in a URL string. You can specify the delimiters for
cookies in a URL string using a command in an HTTP parameter
map. For more information, see the “Parameter Map HTTP
Configuration Mode Commands” section.
cookie-value expression Specifies a unique cookie value expression. Enter an unquoted text
string with no spaces and a maximum of 255 alphanumeric
characters. The ACE supports the use of regular expressions for
matching string expressions. For a list of the supported characters
that you can use for matching string expressions, see Table 2-4.
Examples To specify that the Layer 7 class map load balances on a cookie with the name of testcookie1 or
testcookie2, enter:
(config)# class-map type http loadbalance match-any L7SLBCLASS
(config-cmap-http-lb)# 100 match http cookie testcookie1 cookie-value 123456
(config-cmap-http-lb)# 200 match http cookie testcookie2 cookie-value 789987
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
header_name Name of the HTTP header to match (for example,
www.example1.com.) The range is from 1 to 64 alphanumeric
characters.
Note The header_name argument cannot include the colon in the
name of the HTTP header; the ACE rejects the colon as an
invalid token.
header_field Standard HTTP/1.1 header field. Valid selections include
request-header fields, general-header fields, and entity-header field.
The supported selections are as follows:
• Accept—Semicolon-separated list of representation schemes
(content type metainformation values) that will be accepted in
the response to the request.
• Accept-Charset—Character sets that are acceptable for the
response. This field allows clients capable of understanding
more comprehensive or special-purpose character sets to signal
that capability to a server that can represent documents in those
character sets.
• Accept-Encoding—Restricts the content encoding that a user
will accept from the server.
• Accept-Language—ISO code for the language in which the
document is written. The language code is an ISO 3316 language
code with an optional ISO639 country code to specify a national
variant.
• Authorization—Specifies that the user agent wants to
authenticate itself with a server, usually after receiving a 401
response.
Usage Guidelines The ACE supports the use of regular expressions for matching. Expressions are stored in a header map
in the form header-name: expression. Header expressions allow spaces, provided that the spaces are
escaped or quoted. For a list of the supported characters that you can use for regular expressions, see
Table 2-4.
Examples To specify that the Layer 7 class map performs SLB on an HTTP header named Host, enter:
(config)# class-map type http loadbalance L7SLBCLASS
(config-cmap-http-lb)# 100 match http header Host header-value .*cisco.com
To use regular expressions in a class map to emulate a wildcard search to match the header value
expression string, enter:
host1/Admin(config)# class-map type http loadbalance match-any L7SLBCLASS
host1/Admin(config-cmap-http-lb)# 10 match http header Host header-value .*cisco.com
host1/Admin(config-cmap-http-lb)# 20 match http header Host header-value .*yahoo.com
To specify that the Layer 7 class map performs SLB on an HTTP header named Via, enter:
host1/Admin(config)# class-map type http loadbalance match-all L7SLBCLASS
host1/Admin(config-cmap-http-lb)# match http header Via header-value 192.*
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
expression URL, or portion of a URL, to match. Enter a URL string from 1 to
255 alphanumeric characters. Include only the portion of the URL
that follows www.hostname.domain in the match statement. For a list
of the supported characters that you can use for regular expressions,
see Table 2-4.
method name (Optional) Specifies the HTTP method to match. Enter a method
name as an unquoted text string with no spaces and a maximum of
15 alphanumeric characters. The method can either be one of the
standard HTTP 1.1 method names (OPTIONS, GET, HEAD, POST,
PUT, DELETE, TRACE, or CONNECT) or a text string that must be
matched exactly (for example, CORVETTE).
Usage Guidelines Include only the portion of the URL that follows www.hostname.domain in the match statement. For
example, in the URL www.anydomain.com/latest/whatsnew.html, include only /latest/whatsnew.html.
To match the www.anydomain.com portion, the URL string can take the form of a URL regular
expression. The ACE supports the use of regular expressions for matching URL strings. For a list of the
supported characters that you can use for regular expressions, see Table 2-4.
The period (.) does not have a literal meaning in regular expressions. Use either brackets ([]) or the
backslash character (\) to match this character. For example, specify www[.]xyz[.]com instead of
www.xyz.com.
Examples To specify that the Layer 7 class map performs SLB on a specific URL, enter:
host1/Admin(config)# class-map type http loadbalance L7SLBCLASS
host1/Admin(config-cmap-http-lb)# 10 match http url whatsnew/latest.*
To use regular expressions to emulate a wildcard search to match on any .gif or .html file, enter:
host1/Admin(config)# class-map type http loadbalance match-any L7SLBCLASS
host1/Admin(config-cmap-http-lb)# 100 match http url .*.gif
host1/Admin(config-cmap-http-lb)# 200 match http url .*.html
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 1024 as the line
number. You can enter no line_number to delete long match
commands instead of entering the entire line. The line numbers do
not dictate a priority or sequence for the match statements.
ip_address Source IP address of the client. Enter the IP address in
dotted-decimal notation (for example, 192.168.11.2).
netmask (Optional) Subnet mask of the IP address. Enter the netmask in
dotted-decimal notation (for example, 255.255.255.0). The default is
255.255.255.255.
Examples To specify that the class map match on source IP address 192.168.11.2 255.255.255.0, enter:
host1/Admin(config)# class-map http type loadbalance match-any L7SLBCLASS
host1/Admin(config-cmap-http-lb)# 50 match source-address 192.168.11.2 255.255.255.0
Syntax Description match-all | match-any (Optional) Determines how the ACE evaluates Layer 3 and Layer 4
network management traffic when multiple match criteria exist in a
class map. The class map is considered a match if the match
commands meet one of the following conditions.
• match-all —(Default) Traffic being evaluated must match all of
the match criteria listed in the class map (typically, match
commands of different types).
• match-any—Traffic being evaluated must match one of the
match criteria listed in the class map (typically, match
commands of the same type).
map_name Name assigned to the Layer 3 and Layer 4 network management
protocol class map. Enter an unquoted text string with no spaces and
a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the context Admin user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Examples To create a Layer 3 and Layer 4 class map named MGMT-ACCESS_CLASS that classifies the network
management protocols that can be received by the ACE, enter:
host1/Admin# class-map type management match-any MGMT-ACCESS_CLASS
host1/Admin(config-cmap-mgmt)#
(config-cmap-mgmt) description
To provide a brief summary about the Layer 3 and Layer 4 management class map, use the description
command. Use the no form of the command to remove the description from the class map.
description text
no description
Syntax Description text Description about the class map. Enter an unquoted text string with a
maximum of 240 alphanumeric characters.
Examples To add a description that the class map is to allow remote Telnet access, enter:
host1/Admin# class-map type management TELNET-ALLOW_CLASS
host1/Admin(config-cmap-mgmt)# description Allow Telnet access to the ACE
[line_number] match protocol {http | https | icmp | snmp | ssh | telnet | xml-https} {any |
source-address ip_address mask}
no [line_number] match protocol {http | https | icmp | snmp | ssh | telnet | xml-https} {any |
source-address ip_address mask}
Syntax Description line_number (Optional) Line number that allows you to edit or delete individual
match commands. Enter an integer from 2 to 255 as the line number.
You can enter no line_number to delete long match commands
instead of entering the entire line. The line numbers do not dictate a
priority or sequence for the match statements.
http Specifies the Hypertext Transfer Protocol (HTTP).
https Specifies secure (SSL) Hypertext Transfer Protocol (HTTP) for
connectivity with the Device Manager GUI on the ACE.
icmp Specifies the Internet Control Message Protocol (ping).
snmp Specifies the Simple Network Management Protocol (SNMP).
ssh Specifies a Secure Shell (SSH) connection to the ACE.
telnet Specifies a Telnet connection to the ACE.
xml-https Specifies HTTPS as transfer protocol to send and receive XML
documents between the ACE and a Network Management System
(NMS).
any Specifies any client source address for the management traffic
classification.
source-address Specifies a client source host IP address and subnet mask as the
network traffic matching criteria. As part of the classification, the
ACE implicitly obtains the destination IP address from the interface
on which you apply the policy map.
ip_address Source IP address of the client. Enter the IP address in
dotted-decimal notation (for example, 192.168.11.1).
mask Subnet mask of the client entry in dotted-decimal notation (for
example, 255.255.255.0).
Examples To specify that the class map allows SSH access to the ACE from the source IP address 192.168.10.1
255.255.255.0, enter:
host1/Admin# class-map type management SSH-ALLOW_CLASS
host1/Admin(config-cmap-mgmt)# match protocol ssh source-address 192.168.10.1
255.255.255.0
line console
no line console
Usage Guidelines All commands in this mode require the Admin user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
The console port is an asynchronous serial port on the rear panel of the ACE that enables the appliance
to be set up for initial configuration through a standard RS-232 port that uses a 9-pin male D-shell
connector. Any device connected to this port must be capable of asynchronous transmission. Connection
to a terminal requires a terminal emulator to be configured at 9600 baud, 8 data bits, 1 stop bit, and no
parity.
(config-console) databits
To specify the number of data bits per character, use the databits command. Use the no form of the
command to revert to the default setting of 8 data bits.
databits number
no databits number
Syntax Description number Number of data bits per character. Enter an integer from 5 to 8. The default
is 8 data bits.
(config-console) parity
To set the parity for the console connection, use the parity command. Use the no form of the command
to revert to the default setting of none.
Syntax Description even Sets the parity for the console connection to even.
odd Sets the parity for the console connection to odd.
none Sets the parity for the console connection to none. This is the default setting.
Examples To set the parity for the console connection to even, enter:
host1/Admin# config
Enter configuration commands, one per line. End with CNTL/Z
host1/Admin(config)#
host1/Admin(config)# line console
host1/Admin(config-console)# parity even
(config-console) speed
To set the transmit and receive speeds for the serial console, use the speed command. Use the no form
of the command to revert to the default setting of 9600 baud.
speed baud_rate
no speed baud_rate
Syntax Description baud_rate Transmit and receive speeds. Enter an integer between 110 and 115200 baud
(110, 150, 300, 600, 1200, 2400, 4800, 9600, 19200, 28800, 38400, 57600,
or 115200). The default is 9600 baud.
Examples To set the transmit and receive speeds for the serial console to 19,200 baud, enter:
host1/Admin# config
Enter configuration commands, one per line. End with CNTL/Z
host1/Admin(config)#
host1/Admin(config)# line console
host1/Admin(config-console)# speed 19200
(config-console) stopbits
To set the number of stop bits for the console connection, use the stopbits command. Use the no form
of the command to revert to the default setting of 1 stop bit.
stopbits {1 | 2}
no stopbits {1 | 2}
Syntax Description 1 Sets the stop bit to 1. The default is 1 stop bit.
2 Sets the stop bit to 2.
context name
no context name
Syntax Description name Unique identifier of a virtual context. Enter an unquoted text string with no
spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines All commands in this mode require the Admin user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Examples To create a context named C1 and access context configuration mode, enter:
host1/Admin(config)# context C1
host1/Admin(config-context)#
(config-context) allocate-interface
To assign one or more VLAN interfaces to the context, use the allocate-interface command. Use the no
form of the command to remove the VLAN from the context configuration.
Syntax Description vlan number_id Identifies the VLAN to assign to the user context. For the number_id
argument, enter the number of an existing VLAN that you want to
assign to the context as an integer from 1 to 4096.
Usage Guidelines After you allocate the interface to a user context, you can configure the interface in that context.
When a VLAN is shared in multiple contexts, the interfaces must be on the same subnet. However, the
interfaces that share the VLANs will have different MAC addresses. These different MAC addresses on
the same VLAN classify traffic on multiple contexts. No routing can occur across contexts even if you
configure shared VLANs.
The ACE allows you to assign a VLAN number to a user context even if the VLAN has not been assigned
to the ACE. You can configure the VLAN in the user context; however, the VLAN cannot receive traffic
until it is allocated to an Ethernet data port. For more information about assigning interfaces to the ACE,
see the Cisco 4700 Series Application Control Engine Appliance Routing and Bridging Configuration
Guide.
You cannot deallocate a VLAN from a user context if the VLAN is currently in use on that context.
Examples To allocate the VLAN interface identified as 100 to the currently active context, enter:
host1/Admin(config-context)# allocate-interface vlan 100
(config-context) description
To enter a description for a user context, use the description command. Use the no form of the command
to remove the context description from the configuration.
description text
no description
Syntax Description text Description for the user context. Enter a description as an unquoted
text string with a maximum of 240 characters.
(config-context) member
To associate a context with a resource class, use the member command. Use the no form of the command
to remove a context from a resource class.
member class
no member class
Syntax Description class Name of an existing resource class. Enter the class name as an
unquoted text string with a maximum of 64 alphanumeric characters.
Usage Guidelines You can associate a context with only one resource class. If you do not explicitly associate a context with
a resource class, the ACE associates the context with the default resource class.
Syntax Description csr_param_name Name that designates a CSR parameter set. Enter the CSR parameter set name as a
alphanumeric string from 1 to 64 characters.
Usage Guidelines The commands in this mode require the SSL feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
When you specify a CSR parameter set, you define the following distinguished name attributes:
• Common name—See the (config-csr-params) common-name command. This distinguished name
attribute is required.
• Country name—See the (config-csr-params) country-name command. This distinguished name
attribute is required.
• E-mail address—See the (config-csr-params) email command.
• Locality—See the (config-csr-params) locality command.
• Organization name (certificate subject)—See the (config-csr-params) organization-name
command.
• Organization unit—See the (config-csr-params) organization-unit command.
• Serial number—See the (config-csr-params) serial-number command. This distinguished name
attribute is required.
• State—See the (config-csr-params) state command. This distinguished name attribute is required.
If you do not define the required distinguished name attributes, the ACE displays an error message when
you attempt top generate a CSR using the CSR parameter set.
You can create up to eight CSR parameter sets per context.
To generate a Certificate Signing Request (CSR) file using the CSR parameter set, use the crypto
generate csr command in the Exec mode.
(config-csr-params) common-name
To define the common name parameter in the Certificate Signing Request (CSR) parameter set, use the
common-name command. Use the no form of the command to delete an existing common name from
the CSR parameter set.
common-name name
no common-name
Syntax Description name Name that designates the common name in a CSR parameter set. Enter the common
name as an alphanumeric string from 1 to 64 characters.
Usage Guidelines The common name is a required distinguished name attribute. If you do not configure this attribute (and
all other required attributes), the ACE displays an error message when you try to generate a CSR using
the CSR parameter set.
The common name should be the domain name or individual hostname of the Secure Sockets Layer
(SSL) site.
(config-csr-params) country-name
To define the country name parameter in the Certificate Signing Request (CSR) parameter set, use the
country command. Use the no form of the command to delete an existing country name from the CSR
parameter set.
country name
no country
Syntax Description name Name of the country where the Secure Sockets Layer (SSL) site resides. Enter the
country name as an alphanumeric string from 1 to 2 characters.
Usage Guidelines The country name is a required distinguished name attribute. If you do not configure this attribute (and
all other required attributes), the ACE displays an error message when you try to generate a CSR using
the CSR parameter set.
(config-csr-params) email
To define the e-mail address parameter in the Certificate Signing Request (CSR) parameter set, use the
email command. Use the no form of the command to delete an existing e-mail address from the CSR
parameter set.
email address
no email
Syntax Description address Address that designates the site e-mail address in a CSR parameter set. Enter an
unquoted text string with no spaces and a maximum of 40 alphanumeric
characters.
(config-csr-params) locality
To define the locality name parameter in the Certificate Signing Request (CSR) parameter set, use the
locality command. Use the no form of the command to delete an existing locality from the CSR
parameter set.
locality name
no locality
Syntax Description name Name that designates the locality (a county, for example) in a CSR parameter set.
Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric
characters.
(config-csr-params) organization-name
To define the organization name parameter in the Certificate Signing Request (CSR) parameter set, use
the organization-name command. Use the no form of the command to delete an existing organization
name from the CSR parameter set.
organization-name name
no organization-name
Syntax Description name Name that designates the organization in a CSR parameter set. Enter the
organization name as an alphanumeric string from 1 to 64 characters.
(config-csr-params) organization-unit
To define the organization unit parameter in the Certificate Signing Request (CSR) parameter set, use
the organization-unit command. Use the no form of the command to delete an existing organization
unit from the CSR parameter set.
organization-unit unit
no organization-unit
Syntax Description unit Name that designates the unit (within an organization) in a CSR
configuration file. Enter the organization unit as an alphanumeric string from
1 to 64 characters.
(config-csr-params) serial-number
To define the serial number parameter in the Certificate Signing Request (CSR) parameter set, use the
serial-number command. Use the no form of the command to delete an existing serial number from the
CSR parameter set.
serial-number number
no serial-number
Syntax Description number Number that designates the serial number in a CSR parameter set. Enter the serial
number as an alphanumeric string from 1 to 16 characters.
Usage Guidelines The serial number is a required distinguished name attribute. If you do not configure this attribute (and
all other required attributes), the ACE displays an error message when you try to generate a CSR using
the CSR parameter set.
The CA may choose to overwrite the serial number that you provide with its own serial number.
(config-csr-params) state
To define the state name parameter in the Certificate Signing Request (CSR) parameter set, use the state
command. Use the no form of the command to delete an existing state name from the CSR parameter set.
state name
no state
Syntax Description name Name that designates the state or province in a CSR configuration file. Enter an
unquoted text string with no spaces and a maximum of 40 alphanumeric characters.
Usage Guidelines The state name is a required distinguished name attribute. If you do not configure this attribute (and all
other required attributes), the ACE displays an error message when you try to generate a CSR using the
CSR parameter set.
domain name
no domain name
Syntax Description name Unique identifier of a domain in a context. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines All commands in this mode require the context Admin user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
When you create a context, the ACE automatically creates a default domain (default-domain). You can
create a maximum of 63 additional domains per ACE. A domain does not restrict the context
configuration that you can display using the show running-config command. You can still display the
running configuration for the entire context. However, a domain can restrict your access to the
configurable objects within a context because only a limited subset of all the objects available to a
context are added to the domain.
Examples To create a domain named D1 and access domain configuration mode, enter:
host1/Admin(config)# domain D1
host1/Admin(config-domain)#
(config-domain) add-object
To associate a configuration object with a domain, use the add-object command. Use the no form of the
command to remove an object added to the domain.
add-object {access-list {ethertype | extended} name | action-list name | all | class-map name |
interface {bvi number | vlan number} | object-group name | parameter-map name |
policy-map name | probe name | rserver name | script name | serverfarm name | sticky name}
no add-object {access-list {ethertype | extended} name | action-list name | all | class-map name
| interface {bvi number | vlan number} | object-group name | parameter-map name |
policy-map name | probe name | rserver name | script name | serverfarm name | sticky name}
Syntax Description access-list name Specifies an existing access control list that you want to associate with the
domain.
ethertype Specifies an existing EtherType access control list that you want to associate
with the domain.
extended Specifies an existing extended access control list that you want to associate
with the domain.
action-list name Specifies an existing action list that you want to associate with the domain.
all Specifies that all configuration objects in the context are added to the domain.
class-map name Specifies an existing class map for flow classification that you want to
associate with the domain.
interface Specifies an existing interface—either a Bridge Group Virtual Interface or a
VLAN—that you want to associate with the domain.
bvi number Specifies the existing Bridge Group Virtual Interface that you want to
associate with the domain. Enter an integer from 1 to 4094.
vlan number Specifies the existing VLAN that you want to associate with the domain.
Enter an integer from 2 to 4094.
object-group name Specifies an existing object group that you want to associate with the domain.
parameter-map name Specifies an existing parameter map that you want to associate with the
domain.
policy-map name Specifies an existing policy map that you want to associate with the domain.
probe name Specifies an existing real server probe (keepalive) that you want to associate
with the domain.
rserver name Specifies an existing real server that you want to associate with the domain.
script name Specifies an existing script file (created with the ACE TCL scripting
language) that you want to associate with the domain.
serverfarm name Specifies an existing server farm that you want to associate with the domain.
sticky name Specifies an existing sticky group that you want to associate with the domain
to maintain persistence with a server.
name Identifier of the specified object. Enter an unquoted text string with no spaces
and a maximum of 64 alphanumeric characters.
ft group group_id
no ft group group_id
Syntax Description group_id Unique identifier of an FT group. Enter an integer from 1 to 20.
Usage Guidelines All commands in this mode require the Admin user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Examples To create an FT group with a group ID of 1 and access ft-group configuration mode, enter:
host1/Admin(config)# ft group 1
host1/Admin(config-ft-group)#
(config-ft-group) associate-context
To associate a context with a fault-tolerant (FT) group, use the associate-context command. You need
to make this association for each of the two redundant contexts in an FT group. Use the no form of this
command to remove a context from an FT group.
associate-context name
no associate-context name
Syntax Description name Identifier of the context that you want to associate with the FT group.
Enter an unquoted text string with no spaces and a maximum of
64 alphanumeric characters.
Usage Guidelines Before you can remove a context from an FT group, you must first take the group out of service using
the no inservice command. See the (config-ft-group) inservice command.
(config-ft-group) inservice
To place a fault-tolerant (FT) group in service, use the inservice command. Use the no form of this
command to take the FT group out of service.
inservice
no inservice
Usage Guidelines Before you place an FT group in service, be sure that you have associated one or two contexts with the
FT group and properly configured the two peers.
(config-ft-group) peer
To associate a peer ACE with a fault-tolerant (FT) group, use the peer command. Use the no form of this
command to remove the peer association with the FT group.
peer peer_id
no peer peer_id
Syntax Description peer_id Identifier of an existing peer appliance. Enter 1 for the peer ID.
Usage Guidelines The peer designation is used to denote the remote standby member of the FT group. A context in a
redundant configuration can have only one peer context.
Syntax Description number Priority of the FT group on the standby member. Enter an integer
from 1 to 255. The default is 100.
Usage Guidelines Configure a lower priority on the FT group member (context) that you want as the standby member.
Examples To configure the priority of the FT group on the standby appliance with a value of 50, enter:
host1/Admin(config-ft-group)# peer priority 50
(config-ft-group) preempt
To configure preemption after it has been disabled, use the preempt command. Use the no form of this
command to disable preemption.
preempt
no preempt
Usage Guidelines Preemption ensures that the group member with the higher priority always asserts itself and becomes the
active member. By default, preemption is enabled.
If you disable preemption and a member with a higher priority is found after the other member has
become active, the newly elected member becomes the standby member even though it has a higher
priority.
Examples To reenable preemption after its default setting was disabled, enter:
host1/Admin(config-ft-group)# preempt
(config-ft-group) priority
To configure the priority of the active group member, use the priority command. Use the no form of the
command to restore the default priority of 100.
priority number
no priority number
Syntax Description number Priority number for the active group member. Enter an integer from
1 to 255. The default is 100.
Usage Guidelines You must configure the priority of a group on both peer appliances. Configure a higher priority for the
group on the appliance where you want the active member to initially reside.
Examples To set the priority of the FT group on the active member to a value of 150, enter:
host1/Admin(config-ft-group)# priority 150
Syntax Description vlan_id1 Identifier of an existing VLAN that you want to use as the FT VLAN.
Enter an integer from 2 to 4094.
Usage Guidelines All commands in this mode require the System feature in your user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
To remove an FT VLAN from the redundancy configuration, first dissociate it from the FT peer using
the no form of the (config-ft-peer) ft-interface vlan command and then enter the no ft interface vlan
command in configuration mode.
(config-ft-intf) ip
To assign an IP address to the fault-tolerant (FT) VLAN, use the ip command. Use the no form of this
command to remove the IP address from the configuration.
Syntax Description address ip_address Specifies the IP address of the FT VLAN. Enter an IP address in
dotted-decimal notation (for example, 192.168.12.1).
netmask Subnet mask of the FT VLAN. Enter a subnet mask in dotted-decimal
notation (for example, 255.255.255.0).
(config-ft-intf) peer ip
To allow the local member of the fault-tolerant (FT) group to communicate with the remote peer, use the
peer ip command to configure an IP address for the remote peer. Use the no form of this command to
remove the IP address from the peer configuration.
Syntax Description address ip_address Specifies the IP address of the remote peer. Enter an IP address in
dotted-decimal notation (for example, 192.168.12.15).
netmask Subnet mask of the remote peer. Enter a subnet mask in
dotted-decimal notation (for example, 255.255.255.0).
(config-ft-intf) shutdown
To disable the fault-tolerant (FT) VLAN, use the shutdown command. Use the no form of this command
to enable the FT VLAN.
shutdown
no shutdown
Usage Guidelines When you create the FT VLAN, it is disabled by default. Use the no form of this command to enable the
FT VLAN.
ft peer peer_id
no ft peer peer_id
Usage Guidelines All commands in this mode require the Admin user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Syntax Description vlan_id Identifier of an existing VLAN. Enter an integer from 2 to 4094.
(config-ft-peer) heartbeat
To configure the heartbeat interval and count for verification timing between active and standby
fault-tolerant (FT) peers, use the heartbeat command. Use the no form of the command to revert to the
default heartbeat interval and count.
Syntax Description count number Specifies the number of heartbeat intervals that must transpire with
no heartbeat packet received by the standby member before the
standby member determines that the active member is not available.
Enter an integer from 10 to 50. The default is 10 heartbeat intervals.
interval frequency Specifies the time period between heartbeats in milliseconds (ms).
Enter an integer from 100 to 1000 ms. The default is 300 ms.
Usage Guidelines If the standby member of the FT group does not receive a heartbeat packet from the active member, a
time period equal to count number times interval frequency must elapse before a switchover between
the active and standby members can occur.
(config-ft-peer) query-interface
To configure an alternate interface to allow the standby member to determine whether the active member
is down or whether there is a connectivity problem with the fault-tolerant (FT) VLAN, use the
query-interface command. A query interface helps prevent two redundant contexts from becoming
active at the same time for the same FT group. Use the no form of the command to remove the query
interface from the peer configuration.
Syntax Description vlan vlan_id Specifies the identifier of an existing VLAN. Enter an integer from 2
to 4094.
Usage Guidelines Configuring a query interface allows you to assess the health of the active FT group member, but it
increases failover time. You cannot delete a query interface if it is associated with a peer. You must
dissociate the interface from the peer first, and then you can delete the query interface.
Syntax Description name Unique identifier of the tracking process for a gateway or a host.
Enter an unquoted text string with no spaces and a maximum of
64 alphanumeric characters.
Usage Guidelines The commands in this mode require the fault-tolerant feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
Examples To create a process that tracks and detects failures for a gateway or host and accesses FT track host
configuration mode, enter:
host1/Admin(config)# ft track host TRACK_GATEWAY1
host1/Admin(config-ft-track-host)#
To delete the process that tracks and detects failures for a gateway or host, enter:
host1/Admin(config)# no ft track host TRACK_GATEWAY1
Syntax Description number Priority of the probes configured for the gateway or host on the
standby member. Enter a priority value as an integer from 0 to 255.
The default is 0. Higher values indicate higher priorities.
Usage Guidelines The peer command keyword indicates the standby member of an FT group.
Assign a priority value to multiple probes based on the relative importance of the gateway or host that
the probes are tracking. If all the probes go down, the ACE decrements the priority of the FT group on
the standby member by the value of the number argument. If the priority of the FT group on the active
member falls below the priority of the FT group on the standby member, a switchover occurs where the
active member becomes the standby member and the standby member becomes the active member.
Examples To assign a priority for multiple probes on the standby member of an FT group, enter:
host1/Admin(config-ft-track-host)# peer priority 50
To reset the priority of multiple probes on the standby member of an FT group to the default value of 0,
enter:
host1/Admin(config-ft-track-host)# no peer priority 50
Syntax Description name Identifier of an existing probe that you want to associate with a
gateway or host for tracking.
priority number (Optional) Specifies the priority of the probe. Enter an integer from
0 to 255. The default is 0. Higher values indicate higher priorities.
Usage Guidelines The peer command keyword indicates the standby member of an FT group.
Assign a priority value to the probe based on the relative importance of the gateway or host that the probe
is tracking. If the probe goes down, the ACE decrements the priority of the FT group on the standby
member by the value of the number argument. If the priority of the FT group on the active member falls
below the priority of the FT group on the standby member, a switchover occurs where the active member
becomes the standby member and the standby member becomes the active member.
Examples To configure a probe with priority of 15 on the standby member of an FT group, enter:
host1/Admin(config-ft-track-host)# peer probe TCP_PROBE1 priority 15
Syntax Description ip_address IP address of the gateway or host that you want the standby FT group
member to track. Enter the IP address in dotted-decimal notation (for
example, 172.16.27.1).
Usage Guidelines The peer command keyword indicates the standby member of an FT group.
Examples To configure the IP address of a gateway for tracking on the standby member of an FT group, enter:
host1/Admin(config-ft-track-host)# peer track-host 172.16.27.1
To remove the IP address of the tracked gateway from the standby member, enter:
host1/Admin(config-ft-track-host)# no peer track-host 172.16.27.1
(config-ft-track-host) priority
To assign a priority for multiple probes on the active member of a fault-tolerant (FT) group, use the
priority command. Use the no form of this command to reset the multiple-probe priority to the default
value of 10 on the active member.
priority number
no priority number
Syntax Description number Priority of the probes configured for the gateway or host on the active
member. Enter a priority value as an integer from 0 to 255. The
default is 0. Higher values indicate higher priorities.
Usage Guidelines Assign a priority value for multiple probes based on the relative importance of the gateway or host that
the probes are tracking. If all the probes go down, the ACE decrements the priority of the FT group on
the active member by the value of the number argument. If the priority of the FT group on the active
member falls below the priority of the FT group on the standby member, a switchover occurs where the
active member becomes the standby member and the standby member becomes the active member.
Examples To assign a priority for multiple probes on the active member of an FT group, enter:
host1/Admin(config-ft-track-host)# priority 100
To reset the priority of multiple probes on the active member of an FT group to the default value of 0,
enter:
host1/Admin(config-ft-track-host)# no priority 100
(config-ft-track-host) probe
To associate an existing probe with a gateway or host for tracking by the active member of a fault-tolerant
(FT) group, use the probe command. Use the no form of this command to dissociate the tracking probe
from the tracking process on the active member.
Syntax Description name Identifier of an existing probe that you want to associate with a
gateway or host for tracking.
priority number (Optional) Specifies the priority of the probe on the active member of
an FT group. Enter an integer from 0 to 255. The default is 0. Higher
values indicate higher priorities.
Usage Guidelines Assign a priority value to the probe based on the relative importance of the gateway or host that the probe
is tracking. If the probe goes down, the ACE decrements the priority of the FT group on the active
member by the value of the number argument. If the priority of the FT group on the active member falls
below the priority of the FT group on the standby member, a switchover occurs where the active member
becomes the standby member and the standby member becomes the active member.
Examples To configure a probe with a priority of 25 on the active member of an FT group, enter:
host1/Admin(config-ft-track-host)# probe TCP_PROBE1 priority 25
(config-ft-track-host) track-host
To configure the IP address of the gateway or host that you want to track on the active member of a
fault-tolerant (FT) group, use the track-host command. Use the no form of this command to remove the
IP address of the gateway or host from the tracking process on the active member.
track-host ip_address
no track-host ip_address
Syntax Description ip_address IP address of the gateway or host that you want the active FT group
member to track. Enter the IP address in dotted-decimal notation (for
example, 172.16.27.1).
Examples To configure a gateway for tracking on the active member of an FT group, enter:
host1/Admin(config-ft-track-host)# track-host 172.16.27.1
To remove the gateway from the tracking process on the active member, enter:
host1/Admin(config-ft-track-host)# no track-host 172.16.27.1
Syntax Description name Unique identifier of the process that tracks and detects failures for a
critical interface. Enter an unquoted text string with no spaces and a
maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the fault-tolerant feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
Examples To create a process that tracks and detects failures for an interface and access FT track interface
configuration mode, enter:
host1/Admin(config)# ft track interface TRACK_VLAN200
host1/Admin(config-ft-track-interface)#
To delete the process that tracks and detects failures for an interface, enter:
host1/Admin(config)# no ft track interface TRACK_VLAN200
Syntax Description number Priority of the interface tracked by the standby member of a
fault-tolerant (FT) group. Enter an integer from 0 to 255. The default
is 0. Higher values indicate higher priorities.
Usage Guidelines The peer command keyword indicates the standby member of an FT group.
Assign a priority value based on the relative importance of the interface that you are tracking on the
standby member of an FT group. If the tracked interface goes down, the ACE decrements the priority of
the FT group on the standby member by the value of the number argument. If the priority of the FT group
on the active member falls below the priority of the FT group on the standby member, a switchover
occurs where the active member becomes the standby member and the standby member becomes the
active member.
Examples To set a priority of 100 for the interface that you are tracking on the standby member, enter:
host1/Admin(config-ft-track-intf)# peer priority 100
Syntax Description vlan_id Unique identifier of an existing VLAN that you want to track on the
standby member of a fault-tolerant (FT) group. Enter an integer from
2 to 4094.
Usage Guidelines The peer command keyword indicates the standby member of an FT group.
You cannot track the FT VLAN because it is reserved for the redundancy protocol.
Examples To configure the VLAN 200 interface for tracking on the standby member, enter:
host1/Admin(config-ft-track-intf)# peer track-interface vlan 200
(config-ft-track-interface) priority
To assign a priority to the interface that the active member is tracking, use the priority command. Use
the no form of this command to reset the priority of the interface to the default value of 10.
priority number
no priority number
Syntax Description number Priority of the interface tracked by the active member of a
fault-tolerant (FT) group. Enter an integer from 0 to 255. The default
is 0. Higher values indicate higher priorities.
Usage Guidelines Assign a priority value based on the relative importance of the interface that you are tracking on the
active member of an FT group. If the tracked interface goes down, the ACE decrements the priority of
the FT group on the active member by the value of the number argument. If the priority of the FT group
on the active member falls below the priority of the FT group on the standby member, a switchover
occurs where the active member becomes the standby member and the standby member becomes the
active member.
Examples To set a priority of 100 for the interface that you are tracking on the active member of an FT group, enter:
host1/Admin(config-ft-track-intf)# priority 100
Syntax Description vlan_id Unique identifier of an existing VLAN that you want to track on the
active member of a fault-tolerant (FT) group. Enter an integer from 2
to 4094.
Examples To configure the VLAN 200 interface for tracking on the active member, enter:
host1/Admin(config-ft-track-intf)# track-interface vlan 200
Syntax Description bvi Creates a BVI for a bridge group and accesses interface configuration mode
group_number commands for the BVI. The group_number argument is the bridge-group number
configured on a VLAN interface.
gigabitEthernet Specifies one of the four Ethernet ports on the rear panel of the ACE.
slot_number/ • slot_number—The physical slot on the ACE containing the Ethernet ports.
port_number
This selection is always 1, the location of the daughter card in the ACE. The
daughter card includes the four Layer 2 Ethernet ports to perform Layer 2
switching.
• port_number—The physical Ethernet port on the ACE. Valid selections are 1
through 4, which specifies one of the four Ethernet ports (1, 2, 3, or 4)
associated with the slot 1 (daughter card) selection.
port-channel Specifies the channel number assigned to this port-channel interface. Valid values
channel_number are from 1 to 255.
vlan number Assigns the VLAN to the context and accesses interface configuration mode
commands for the VLAN. The number argument is the number for a VLAN
assigned to the ACE.
Usage Guidelines This command requires the interface feature in your user role. In addition, the Ethernet port and
port-channel interface command functions require the Admin user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
The four Ethernet ports provide physical Ethernet ports to connect servers, PCs, routers, and other
devices to the ACE. You can configure the four Ethernet ports to provide an interface for connecting to
10-Mbps, 100-Mbps, or 1000-Mbps networks. Each Layer 2 Ethernet port supports autonegotiate, or
full-duplex or half-duplex operation on an Ethernet LAN, and can carry traffic within a designated
VLAN.
You can group physical ports together on the ACE to form a logical Layer 2 interface called the
EtherChannel (or port-channel). All the ports belonging to the same port-channel must be configured
with same values; for example, port parameters, VLAN membership, trunk configuration. Only one
port-channel in a channel group is allowed, and a physical port can belong to only to a single
port-channel interface.
The ACE supports a maximum of 4,093 VLAN interfaces with a maximum of 1,024 shared VLANs.
The ACE supports a maximum of 4,094 BVI interfaces.
The ACE supports a maximum of 8,192 interfaces per system that include VLANs, shared VLANs, and
BVI interfaces.
Examples To assign VLAN interface 200 to the Admin context and access interface configuration mode, enter:
host1/Admin(config)# interface vlan 200
host1/Admin(config-if)#
(config-if) access-group
To apply an access control list (ACL) to the inbound or outbound direction of a VLAN interface and
make the ACL active, use the access-group command. Use the no form of this command to remove an
ACL from an interface.
Syntax Description input Specifies the inbound direction of the interface to which you want to
apply the ACL.
output Specifies the outbound direction of the interface to which you want
to apply the ACL.
acl_name Identifier of an existing ACL that you want to apply to an interface.
Usage Guidelines You must apply ACLs to a VLAN interface to allow the traffic to pass on an interface. You can apply
one ACL of each type (extended and EtherType) to both directions of the interface. For connectionless
protocols, you need to apply the ACL to the source and destination interfaces if you want traffic to pass
in both directions. For example, you can allow Border Gateway Protocol (BGP) in an ACL in transparent
mode, and you need to apply the ACL to both interfaces.
A bridge-group VLAN supports extended ACLs for IP traffic and EtherType ACLs for non-IP traffic.
For non-IP traffic, you can configure an EtherType ACL. EtherType ACLs support Ethernet V2 frames.
You can configure the ACE to pass one or any of the following non-IP EtherTypes: Multiprotocol Label
Switching (MPLS), IP version 6 (ipv6), and bridge protocol data units (BDPUs).
The output option is not allowed for EtherType ACLs.
To apply an ACL globally to all interfaces in a context, use the (config) access-group command.
Examples To apply an ACL named INBOUND to the inbound direction of an interface, enter:
host1/Admin(config)# interface vlan100
host1/Admin(config-if)# access-group input INBOUND
(config-if) alias
To configure an IP address that is shared between active and standby appliances for a bridge-group
virtual interface (BVI) or VLAN interface, use the alias command. Use the no form of this command
to delete an alias IP address.
Syntax Description ip_address IP address of the interface. Enter the IP address in dotted-decimal
notation (for example, 172.16.27.1).
mask Subnet mask of the interface. Enter the subnet mask in
dotted-decimal notation (for example, 255.255.255.0).
Usage Guidelines You must configure redundancy (fault tolerance) on the ACE for the alias IP address to work. For more
information on redundancy, see the Cisco 4700 Series Application Control Engine Appliance
Administration Guide.
For stealth firewalls, an ACE balances traffic among unique VLAN alias IP address interfaces on another
ACE that provides paths through stealth firewalls. You configure a stealth firewall so that all traffic
moving in both directions across that VLAN moves through the same firewall.
For details about firewall load balancing (FWLB), see the Cisco 4700 Series Application Control Engine
Appliance Server Load-Balancing Configuration Guide.
(config-if) arp
To add a static ARP entry in the ARP table for a VLAN interface, use the arp command. Use the no form
of this command to remove a static ARP entry.
Syntax Description ip_address IP address for an ARP table entry. Enter the IP address in
dotted-decimal notation (for example, 172.16.27.1).
mac_address MAC address for the ARP table entry. Enter the MAC address in
dotted-hexadecimal notation (for example, 00.02.9a.3b.94.d9).
Usage Guidelines Static ARPs for bridged interfaces are configured on the specific interface.
Examples To allow ARP responses from the router at 10.1.1.1 with the MAC address 00.02.9a.3b.94.d9, enter the
following command:
host1/Admin(config)# interface vlan 2
host1/Admin(config-if)# arp 10.1.1.1 00.02.9a.3b.94.d9
To remove a static ARP entry, use the no arp command. For example, enter:
host1/Admin(config-if)# no arp 10.1.1.1 00.02.9a.3b.94.d9
(config-if) bridge-group
To assign the VLAN to a bridge group, use the bridge-group command. Use the no form of this
command to remove the bridge group from the VLAN.
bridge-group number
no bridge-group
Usage Guidelines In bridge mode, you can configure two interface VLANs into a group and bridge packets between them.
All interfaces are in one broadcast domain and packets from one VLAN are switched to the other VLAN.
The ACE bridge mode supports only two L2 VLANs per bridge group. In this mode, VLANs do not have
configured IP addresses.
To enable the bridge-group VLANs, you must configure a bridge-group virtual interface (BVI) that
represents a corresponding bridge group.
(config-if) channel-group
To map the physical Ethernet port to a port channel when configuring Layer 2 EtherChannels, use the
channel-group command. use the no form of the command to remove the channel group assigned to the
Ethernet port.
channel-group channel_number
no channel-group channel_number
Syntax Description channel_number Channel number assigned to this channel group. Valid values are
from 1 to 255.
Usage Guidelines You can group physical ports together on the ACE to form a logical Layer 2 interface called the
EtherChannel (or port-channel). The channel-group command configures the Ethernet port in a
port-channel group and automatically creates the port-channel logical interface.
It is not necessary to configure a port-channel interface before assigning a physical Ethernet port to a
channel group through the channel-group command. A port-channel interface is created automatically
when the channel group receives its first physical interface, if it is not already created.
(config-if) description
To provide a description for a VLAN interface, a bridge-group virtual interface (BVI), an Ethernet port
or a port-channel interface, use the description command. Use the no form of this command to delete
the description.
description text
no description
Syntax Description text Description for the interface. Enter an unquoted text string that
contains a maximum of 240 characters including spaces.
(config-if) duplex
To configure an Ethernet port for full- or half-duplex operation, use the duplex command in interface
configuration mode. The default configuration for an ACE interface is autonegotiate. Use the no form
of this command to revert to autonegotiation operation.
no duplex
Syntax Description full Configures the specified Ethernet port for full-duplex operation,
which allows data to travel in both directions at the same time.
half Configures the specified Ethernet port for half-duplex operation. A
half-duplex setting ensures that data only travels in one direction at
any given time.
Usage Guidelines If you configure the Ethernet port speed to auto on a 10/100/1000-Mbps Ethernet port, both speed and
duplex are autonegotiated. The ACE prevents you from making a duplex setting when you configure the
speed of an Ethernet port to auto. The speed command must be a non-auto setting of 10, 100, or
1000 Mbps to be able to configure the duplex setting for the Ethernet port.
no fragment chain
Syntax Description number Maximum number of fragments that belong to the same packet. Enter an
integer from 1 to 256. The default is 24.
To reset the maximum number of fragments in a packet to the default of 24, enter:
host1/C1(config-if)# no fragment chain
no fragment min-mtu
Syntax Description number Minimum fragment size. Enter an integer from 68 to 9216 bytes. The default
is 576 bytes.
To reset the minimum fragment size to the default value of 576 bytes, enter:
host1/C1(config-if)# no fragment min-mtu
no fragment timeout
Syntax Description seconds Reassembly timeout in seconds. Enter an integer from to 0 to 65535. A
value of 0 instructs the ACE to never time out. The default is 10.
Usage Guidelines The IP reassembly timeout specifies the period of time after which the ACE abandons the fragment
reassembly process if it does not receive any outstanding fragments for the current fragment chain
(fragments that belong to the same packet).
Syntax Description number Unique identifier for the FT VLAN. Valid values are from 2 to 4094.
Usage Guidelines Peer ACE appliances communicate with each other over a dedicated FT VLAN. These redundant peers
use the FT VLAN to transmit and receive heartbeat packets and state and configuration replication
packets.
On both peer ACE appliances, you must configure the same Ethernet port or the same port-channel interface
as the FT VLAN port. For example, if you configure ACE appliance 1 to use Ethernet port 4 as the FT
VLAN port, then be sure to configure ACE appliance 2 to use Ethernet port 4 as the FT VLAN port.
You cannot use this dedicated FT VLAN Ethernet port for normal network traffic; it must be dedicated
for redundancy only.
When you specify an Ethernet port or a port-channel interface as a dedicated FT VLAN, you have the
option to either configure the dedicated VLAN as the only VLAN associated with the Ethernet port or
port-channel interface, or to allocate it as part of a VLAN trunk link (see “(config-if) switchport trunk
allowed vlan”). Note that the ACE automatically includes the FT VLAN in the VLAN trunk link. If you
choose to configure VLAN trunking, it is not necessary for you to assign the FT VLAN in the trunk link
along with the other VLANs.
It is not necessary to create an FT VLAN before designating an Ethernet port or port-channel interface as the
FT VLAN port.
For details on configuring redundant ACE appliances, including an FT VLAN, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
(config-if) icmp-guard
To enable the ICMP security checks in the ACE, use the icmp-guard command. This feature is enabled
by default. Use the no form of this command to disable the ICMP security checks.
icmp-guard
no icmp-guard
Usage Guidelines By default, the ACE provides several ICMP security checks by matching ICMP reply packets with
request packets and using mismatched packets to detect attacks. Also, the ACE forwards ICMP error
packets only if a connection record pertaining to the flow for which the error packet was received exists.
Caution If you disable the ACE ICMP security checks, you may expose your ACE and your data center to
potential security risks. After you enter the no icmp-guard command, the ACE no longer performs
Network Address Translation (NAT) translations on the ICMP header and payload in error packets,
which potentially can reveal real host IP addresses to attackers.
If you want to operate your ACE as a load balancer only, use the no icmp-guard command to disable
the ACE ICMP security checks. You must also disable TCP normalization by using the no
normalization command. For details about operating your ACE for load balancing only, see the Cisco
4700 Series Application Control Engine Appliance Server Load-Balancing Configuration Guide.
Examples To enable the ACE ICMP security checks after you have disabled them, enter:
host1/Admin(config)# interface vlan 200
host1/Admin(config-if)# icmp-guard
(config-if) ip address
To assign an IP address to a bridge-group virtual interface (BVI) or VLAN interface, use the ip address
command. Use the no form of this command to remove an IP address from an interface.
no ip address
Syntax Description address IP address and mask for the interface. Enter an IP address in
dotted-decimal notation (for example, 192.168.12.1).
mask Subnet mask of the interface. Enter the subnet mask in
dotted-decimal notation (for example, 255.255.255.0).
Usage Guidelines When you assign an IP address to an interface, the ACE automatically makes the interface routed.
You must configure static ARP entries for bridged interfaces on the specific interface.
In a single context, you must configure each interface address on a unique subnet; the addresses cannot
overlap. However, the IP subnet can overlap an interface in different contexts.
You must configure a unique IP address across multiple contexts on a shared VLAN. On a nonshared
VLAN, the IP address can be the same.
No routing occurs across contexts even when shared VLANs are configured.
Examples To set the IP address of 192.168.1.1 255.255.255.0 for VLAN interface 200, enter:
host1/Admin(config)# interface vlan 200
host1/Admin(config-if)# ip address 192.168.1.1 255.255.255.0
(config-if) ip df
To configure how the ACE handles an IP packet that has its Don’t Fragment (DF) bit set on a VLAN
interface, use the ip df command. Use the no form of this command to instruct the ACE to ignore the
DF bit.
ip df {clear | allow}
no ip df
Syntax Description clear Clears the DF bit and permits the packet. If the packet is larger than
the next-hop maximum transmission unit (MTU), the ACE fragments
the packet.
allow Permits the packet with the DF bit set. This is the default. If the
packet is larger than the next-hop MTU, the ACE discards the packet
and sends an ICMP unreachable message to the source host.
Usage Guidelines Occasionally, an ACE may receive a packet that has its DF bit set in the IP header. This flag tells network
routers and the ACE not to fragment the packet and to forward it in its entirety.
Usage Guidelines The DHCP relay starts forwarding packets to the DHCP server address specified in the ip dhcp relay
server command for the associated interface or context.
Syntax Description ip_address IP address of the DHCP server. Enter the address in dotted-decimal
IP notation (for example, 192.168.11.1).
Examples To specify the IP address for the DHCP relay server, enter:
host1/Admin(config)# interface vlan 200
host1/Admin(config-if)# ip dhcp relay server 192.168.20.1
(config-if) ip options
To configure how the ACE handles IP options and to perform specific actions when an IP option is set
in a packet for a VLAN interface, use the ip options command. Use the no form of the command to
instruct the ACE to ignore the IP option.
no ip options
Syntax Description allow Allows the packet with the IP options set.
clear Clears the specified option from the packet and allows the packet.
clear-invalid Clears all IP options from the packet if the ACE encounters one or
more invalid or unsupported IP options and allows the packet. This
option is the default.
drop Causes the ACE to discard the packet.
To reset the ACE to its default of clearing all IP options if the appliance encounters one or more invalid
or unsupported IP options, enter:
host1/Admin(config-if)# no ip options
no ip ttl minimum
Syntax Description number Minimum number of hops that a packet can take to reach its destination.
Enter an integer from 1 to 255 seconds.
Usage Guidelines Each router along the packet’s path decrements the TTL by one. If the packet’s TTL equals 0 before the
packet reaches its destination, the packet is discarded.
If the TTL value of the incoming packet is lower than the configured value, the ACE rewrites the TTL
with the configured value. Otherwise, the ACE transmits the packet with its TTL unchanged or discards
the packet if the TTL equals zero.
ip verify reverse-path
no ip verify reverse-path
Usage Guidelines Unicast reverse-path forwarding (URPF) helps to mitigate problems caused by the introduction of
malformed or forged (spoofed) IP source addresses into a network by allowing the ACE to discard IP
packets that lack a verifiable source IP address. This feature enables the ACE to filter both ingress and
egress packets to verify addressing and route integrity. The route lookup is typically based on the
destination address, not the source address.
When you enable URPF, the ACE discards packets if no route is found or if the route does not match the
interface on which the packet arrived.
You cannot use this command when RPF based on the source MAC address for a VLAN interface is
enabled through the (config-if) mac-sticky enable command.
mac-sticky enable
no mac-sticky enable
Usage Guidelines When you use this command to enable the mac-sticky feature, the ACE uses the source MAC address
from the first packet of a new connection to determine the device to send the return traffic. This
guarantees that the ACE sends the return traffic for load-balanced connections to the same device
originating the connection. By default, the ACE performs a route lookup to select the next hop to reach
the client.
This feature is useful when the ACE receives traffic from Layer-2/Layer-3 adjacent stateful devices, like
firewalls and transparent caches, guaranteeing that it sends return traffic to the correct stateful device
that sourced the connection without any requirement for source NAT. For more information on firewall
load balancing, see the Cisco 4700 Series Application Control Engine Appliance Security Configuration
Guide.
You cannot use this command when RPF based on the source IP address for a VLAN interface is enabled
through the (config-if) ip verify reverse-path command.
(config-if) mtu
To specify the maximum transmission unit (MTU) for a VLAN interface, use the mtu command. This
command allows you to set the data size that is sent on a connection. Use the no form of this command
to reset the MTU block size to the default of 1500 for Ethernet interfaces.
mtu bytes
no mtu
Syntax Description bytes Number of bytes in the MTU; valid values are from 64 to 9216 bytes.
The default is 1500.
Usage Guidelines The default MTU is a 1500-byte block for Ethernet interfaces. This value is sufficient for most
applications, but you can pick a lower number if network conditions require it. The ACE fragments
packets that are larger than the MTU value before sending them to the next hop.
Examples To specify the MTU data size of 1000 for an interface, enter:
host1/Admin(config)# interface vlan 200
host1/admin(config-if)# mtu 1000
To reset the MTU block size to the default value of 1500 for Ethernet interfaces, enter:
host1/admin(config-if)# no mtu
(config-if) nat-pool
To create a pool of IP addresses for dynamic Network Address Translation (NAT) for a VLAN interface,
use the nat-pool command. Use the no form of this command to remove a NAT pool from the
configuration.
Syntax Description nat_id Identifier of the NAT pool of global IP addresses. Enter an integer from 1 to
2147483647.
ip_address1 Single IP address, or if also using the ip_address2 argument, the first IP
address in a range of global addresses used for NAT. Enter an IP address in
dotted-decimal notation (for example, 172.27.16.10).
ip_address2 (Optional) Highest IP address in a range of global IP addresses used for
NAT. Enter an IP address in dotted-decimal notation (for example,
172.27.16.109).
netmask mask Specifies the subnet mask for the IP address pool. Enter a mask in
dotted-decimal notation (for example, 255.255.255.0). If you do not specify
a network mask for the global IP addresses in the pool, the ACE, by default,
uses the network mask of the interface to which the pool is attached.
pat (Optional) Specifies that the ACE perform Port Address Translation (PAT)
in addition to NAT.
Usage Guidelines Dynamic NAT uses a pool of global IP addresses that you specify. You can define either a single global
IP address for a group of servers with PAT to differentiate between them or a range of global IP addresses
when using dynamic NAT only. To use a single IP address or a range of addresses, you assign an
identifier to the address pool. You then associate the NAT pool with a global interface.
If a packet egresses an interface that you have not configured for NAT, the ACE transmits the packet
untranslated.
If the ACE runs out of IP addresses in a NAT pool, it can switch over to a PAT rule, if configured. For
example, you can configure the following:
nat-pool 1 10.1.100.10 10.1.100.99 netmask 255.255.255.255
nat-pool 1 10.1.100.100 10.1.100.100 netmask 255.255.255.255 pat
Examples To configure a NAT pool that consists of a range of 100 global IP addresses with PAT, enter:
host1/Admin(config)# interface vlan 200
host1/C1(config-if)# nat-pool 1 172.27.16.10 172.27.16.109 netmask 255.255.255.0 pat
(config-if) normalization
To enable TCP normalization, use the normalization command. This feature is enabled by default. Use
the no form of this command to disable TCP normalization.
normalization
no normalization
Caution If you disable TCP normalization, you may expose your ACE and your data center to potential security
risks. TCP normalization helps protect the ACE and the data center from attackers by enforcing strict
security policies that are designed to examine traffic for malformed or malicious segments.
To operate your ACE for load balancing only, disable TCP normalization by entering the no
normalization command. You must also disable the ACE Internet Control Message Protocol (ICMP)
security checks by using the no icmp-guard command. For details about operating your ACE as a load
balancer only, see the Cisco 4700 Series Application Control Engine Appliance Server Load-Balancing
Configuration Guide.
Examples To enable TCP normalization after you have disabled it, enter:
host1/Admin(config)# interface vlan 200
host1/Admin(config-if)# normalization
no peer ip address
Syntax Description ip_address IP address of the peer appliance. Enter the address in dotted-decimal
IP notation (for example, 192.168.11.1).
mask Subnet mask of the peer appliance. Enter the subnet mask in
dotted-decimal notation (for example, 255.255.255.0).
Command Modes Interface configuration mode for BVI and VLAN interfaces
Admin and user contexts
Usage Guidelines When you configure redundancy, configuration mode on the standby appliance is disabled by default and
changes on an active appliance are automatically synchronized on the standby appliance. However,
interface IP addresses on the active and standby appliances must be unique. To ensure that the addresses
on the interfaces are unique, the interface IP address on the active appliance is synchronized on the
standby appliance as the peer IP address. To configure an interface IP address on the standby appliance,
use the peer ip address command. The peer IP address on the active appliance is synchronized on the
standby appliance as the interface IP address.
You must configure a unique IP address across multiple contexts on a shared VLAN. On a nonshared
VLAN, the IP address can be the same.
Examples To configure an IP address and mask for the peer appliance, enter:
host1/Admin(config)# interface vlan 200
host1/Admin(config-if)# peer ip address 11.0.0.81 255.0.0.0
Usage Guidelines An EtherChannel balances the traffic load across the links in the EtherChannel by reducing part of the
binary pattern formed from the addresses in the frame to a numerical value that selects one of the links
in the channel. EtherChannel load balancing can use MAC addresses or IP addresses, Layer 4 port
numbers, source addresses, destination addresses, or both source and destination addresses.
Use the option that provides the load-balance criteria with the greatest variety in your configuration. For
example, if the traffic on an EtherChannel is going to a single MAC address only and you use the
destination MAC address as the basis of EtherChannel load balancing, the EtherChannel always chooses
the same link in the EtherChannel.
Examples To configure an EtherChannel to balance the traffic load across the links using source or destination IP
addresses, enter:
host1/Admin(config)# interface gigabitEthernet 1/1
host1/Admin(config-if)# port-channel load-balance src-dst-ip
Syntax Description policy_name Name of a previously defined policy map, configured with a
previously created policy-map command. Enter a text string with a
maximum of 64 alphanumeric characters.
Usage Guidelines When you enter the service-policy command in configuration mode, the policy maps that are applied
globally in a context are applied on all interfaces that exist in the context.
A policy activated on an interface overwrites any specified global policies for overlapping classifications
and actions.
The ACE allows only one policy of a specific feature type to be activated on a given interface.
(config-if) shutdown
To disable a bridge-group virtual interface (BVI), Ethernet port, port-channel interface, VLAN interface,
or VLAN trunking, use the shutdown command. Use the no form of this command to enable the
interface.
shutdown
no shutdown
Usage Guidelines When you create an interface, the interface is in the shutdown state (administratively down) until you
enable it. If you disable or reenable the interface within a context, only that context interface is affected.
To enable a bridge-group virtual interface (BVI), Ethernet port, port-channel interface, VLAN interface,
or VLAN trunking, use the no shutdown command in interface configuration mode. This puts the
interface in the Up administrative state.
To disable a bridge-group virtual interface (BVI), Ethernet port, port-channel interface, VLAN interface,
or VLAN trunking, use the shutdown command in interface configuration mode. This puts the interface
in the Down administrative state.
(config-if) speed
To configure the Ethernet port speed for a setting of 10, 100, or 1000 Mbps, use the speed command in
interface configuration mode. The default speed for an ACE interface is autonegotiate. Use the no form
of the command to return to the default Ethernet port speed setting.
no speed
Usage Guidelines By default, the ACE automatically uses the autonegotiate setting for Ethernet port speed and duplex
mode parameters to allow the ACE to negotiate the speed and duplex mode between ports. If you
manually configure the port speed and duplex modes, follow these guidelines:
• The ACE prevents you from making a duplex setting when you configure the speed of an Ethernet
port to auto. The speed command must be a non-auto setting of 10, 100, or 1000 Mbps to be able
to configure the duplex setting for the Ethernet port.
• If you configure an Ethernet port speed to a value other than auto (for example, 10, 100, or
1000 Mbps), ensure that you configure the connecting port to match. Do not configure the
connecting port to negotiate the speed through the auto keyword.
• The ports on both ends of a link must have the same setting. The link will not come up if the port at
each end of the connecting interface has a different setting.
• If you enter the no speed command, the ACE automatically configures both the speed and duplex
settings to auto.
The ACE cannot automatically negotiate interface speed and duplex mode if you configure the
connecting interface to a value other than auto.
If you configure the Ethernet port speed to auto, the ACE automatically sets the duplex mode to auto.
Syntax Description number VLAN number that you want to configure as the IEEE 802.1Q native
VLAN when operating in trunking mode. Valid values are from 1 to
4094. The default is VLAN 1.
Usage Guidelines On the ACE, ports are assigned to a single VLAN. These ports are referred to as access ports and provide
a connection for end users or node devices, such as a router or server. By default, all devices are assigned
to VLAN 1, known as the default VLAN.
You can configure a trunk on a single Ethernet port or on a port-channel interface (EtherChannel).
It is not necessary to create a VLAN interface before configuring an access VLAN. To configure a VLAN
interface and access its mode to configure its attributes, use the interface vlan command in
configuration mode for the context.
When you assign a VLAN as the access port for a specific Ethernet port or port-channel interface, the
VLAN is reserved and cannot be configured as a VLAN trunk. A VLAN access port and a VLAN trunk
cannot coexist for the same Ethernet port or port-channel interface. If you specify both configurations
for the same Ethernet port or port-channel interface, the most recent configuration will overwrite the
older configuration.
Examples To configure VLAN 101 as an access port for Ethernet port 4, enter:
host1/Admin(config)# interface gigabitEthernet 1/4
host1/Admin(config-if)# switchport access vlan 101
Syntax Description vlan_list The allowed VLANs that transmit this interface in tagged format when
in trunking mode. The vlan_list argument can be one of the following:
• Single VLAN number
• Range of VLAN numbers separated by a hyphen
• Specific VLAN numbers separated by commas
Valid entries are 1 through 4094. Do not enter any spaces between the
dash-specified ranges or the comma-separated numbers in the
vlan_list argument.
Usage Guidelines You cannot remove VLAN 1. If you remove VLAN 1 from a trunk, the trunk interface continues to send
and receive management traffic in VLAN 1.
You can selectively allocate individual VLANs to a trunk link. All added VLANs are active on a trunk
link, and as long as the VLAN is available for use, traffic for that VLAN is carried across the trunk link.
It is not necessary to create a VLAN interface before you allocate a VLAN to an Ethernet port or port-channel
interface (EtherChannel). To configure a VLAN interface and access its mode to configure its attributes,
use the interface vlan command in configuration mode for the context.
If you configure a VLAN on a trunk, you cannot configure the VLAN as the access port for a specific
Ethernet port or port-channel interface. A VLAN access port and a VLAN trunk cannot coexist for the
same Ethernet port or port-channel interface. If you specify both configurations for the same Ethernet
port or port-channel interface, the most recent configuration will overwrite the older configuration.
When allocating VLANs to ports, overlapping is not allowed. For example, if you associate VLAN 10
with Ethernet port 1, you cannot associate VLAN 10 with another Ethernet port.
When you specify an Ethernet port or a port-channel interface as a dedicated FT VLAN (see “(config-if)
ft-port vlan”) and you allocate it as part of a VLAN trunk link, the ACE automatically includes the FT
VLAN in the VLAN trunk link. It is not necessary to assign the FT VLAN in the trunk link along with
the other VLANs.
Examples To add VLANs 101, 201, and 250 through 260 to the defined list of VLANs currently set for Ethernet
port 4, enter:
host1/Admin(config)# interface gigabitEthernet 1/4
host1/Admin(config-if)# switchport trunk allowed vlan 101,201,250-260
To remove VLANs 101 through 499 from the defined list of VLANs currently set for Ethernet port 4,
enter:
host1/Admin(config)# interface gigabitEthernet 1/4
host1/Admin(config-if)# no switchport trunk allowed vlan 101-499
Syntax Description number VLAN number that you want to configure as the 802.1Q native
VLAN when operating in trunking mode. Valid values are from 1 to
4094. The default is VLAN 1.
Usage Guidelines You can only have one assigned native VLAN.
The native VLAN is the VLAN that is assigned to all ports in the ACE. By default, all interfaces are in
VLAN 1 on the ACE, and VLAN 1 is the native VLAN. Depending on your network needs, you may
change the native VLAN to be other than VLAN 1.
When configuring 802.1Q trunking, you must match the native VLAN across the link. Because the native
VLAN is untagged, you must keep the native VLAN the same on each side of the trunk line. The native
VLAN must match on both sides of the trunk link for 802.1Q; otherwise, the link will not work.
It is not necessary to create a VLAN interface setting the 802.1Q native VLAN for a trunk. To configure a
VLAN interface and access its mode to configure its attributes, use the interface vlan command in
configuration mode for the context.
When you specify an Ethernet port as a dedicated FT VLAN (see “(config-if) ft-port vlan”), the ACE
automatically includes the FT VLAN in the VLAN trunk link and assigns the FT VLAN as the 802.1Q
native VLAN for the trunk. The ACE prevents you from selecting a different VLAN as the native VLAN.
Examples To specify VLAN 3 as the 802.1Q native VLAN for the trunk, enter:
host1/Admin(config)# interface port-channel 255
host1/Admin(config-if)# switchport trunk native vlan 3
Usage Guidelines All commands in this mode require the AAA feature in your user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
A server group is a list of server hosts. The ACE allows you to configure multiple AAA servers as a
named server group. You group the different AAA server hosts into distinct lists. The ACE searches for
the server hosts in the order in which you specify them within a group. You can configure a maximum
of 100 server groups for each context in the ACE.
You can configure LDAP server groups at any time, but you must enter the aaa authentication login
command to apply the groups to the AAA service.
Syntax Description text User profile. The user profile is an unquoted text string of a maximum of 63 alphanumeric
characters without spaces.
Usage Guidelines The user profile attribute type is a mandatory configuration for an LDAP server group. Without this
setting, the user profile attribute cannot be retrieved by the LDAP server.
The user profile attribute type is a private attribute. In this case, the LDAP server database should use
the same attribute type for the user profile. The LDAP client (the ACE) sends the search request with
this attribute type as the attribute that it wants to download. If the lookup was successful, the search
response contains this attribute value. The attribute value should contain a string that represents the user
role and domain pair for this particular context.
Examples To configure a user profile attribute for the LDAP server group, enter:
host1/Admin(config)# aaa group server ldap LDAP_Server_Group1
host1/Admin(config-ldap)# attribute user-profile usrprof
(config-ldap) baseDN
To configure the base distinguished name (DN) that you want to use to perform search operations in the
LDAP directory tree, use the baseDN command. A baseDN can take a form such as dc=your,dc=domain,
where the base DN uses the DNS domain name as its basis and is split into the domain components. Use
the no form of this command to delete a configured baseDN for the LDAP server group.
baseDN text
no baseDN text
Syntax Description text Distinguished name of the search base. The baseDN name is a quoted text string of a maximum
of 63 alphanumeric characters without spaces.
Usage Guidelines The base DN is a mandatory configuration for an LDAP server group. Without this setting, a user cannot
be authenticated.
Examples To configure the base DN for the LDAP server group, enter:
host1/Admin(config)# aaa group server ldap LDAP_Server_Group1
host1/Admin(config-ldap)# baseDN "dc=sns,dc=cisco,dc=com"
Syntax Description text Search request. The search filter is a quoted text string of a maximum of 63 alphanumeric
characters without spaces.
Usage Guidelines The search filter is a mandatory configuration for an LDAP server group. Without this setting, a user
cannot be authenticated.
The search filter should follow the format defined in RFC 2254. The LDAP client sends the search
request with the configured search filter after replacing the $userid and $contextid with the userid that
the client is trying to authenticate and the associated virtual context name.The ACE allows $userid and
$contextid to be used as placeholders for user ID and context ID.
Examples To configure a search request for the LDAP server group, enter:
host1/Admin(config)# aaa group server ldap LDAP_Server_Group1
host1/Admin(config-ldap)# filter search-user "(&(objectclass=person)
(&(cn=$userid)(cid=$contextid)))"
(config-ldap) server
To specify the IP address of one or more previously configured Lightweight Directory Access Protocol
(LDAP) servers that you want added to or removed from the AAA server group, use the server
command. Use the no form of this command to remove the server from the AAA server group.
server ip_address
no server ip_address
Syntax Description ip_address IP address of the LDAP server. Enter the address in dotted-decimal IP notation (for
example, 192.168.11.1).
Usage Guidelines You can add multiple LDAP servers to the AAA server group by entering multiple server commands
while in this mode. The same server can belong to multiple server groups.
line vty
no line vty
Usage Guidelines The commands in this mode have no user role feature restrictions. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
(config-line) session-limit
T o configure the maximum number of terminal sessions per line, use the session-limit command. Use the
no form of the command to disable a setting for the configured virtual terminal line.
session-limit number
no session-limit number
Syntax Description number Maximum number of terminal sessions per line. Enter an integer from 1 to 251.
optimize
no optimize
Usage Guidelines The commands in this mode require the loadbalance feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
Related Commands
appscope-log
no appscope-log
Usage Guidelines The statistical log file contains an entry for each ACE optimization request to the server and is used for
statistical analysis by the optional Cisco AVS 3180A Management Station. The ACE collects statistical
log data and then sends it to the Management Station for loading into the management station database.
For details about the optional Cisco AVS 3180A Management Station database, management, and
reporting features, including AppScope reporting, see the Cisco 4700 Series Application Control Engine
Appliance Application Acceleration and Optimization Configuration Guide.
To enable the AppScope feature, use the appscope command in action list optimization configuration
mode. See the (config-actlist-optm) appscope command.
For each ACE request, information about the statistical log is written to the statlog.nnn file, where nnn
is a three-digit number. Each entry in the statlog file is written in an XML-like syntax, where each
element is opened with an angle-bracketed tag, and closed with a similar tag, and can contain several
fields with nested elements.
Note Statistical log information from active ACE nodes is carried by the syslog-ng daemon to the Cisco AVS
3180A Management Console and written to a file under the avs-log/syslog/ directory. The file is
<optm-id>_<virtual-context-id>, which is unique across all ACE nodes.
To specify the host (the syslog server on the Management Station) that receives the syslog messages sent
by the ACE, use the logging host configuration command. See the (config) logging host command. This
command allows you to identify the IP address of the Management Station that will be used as the syslog
server. You can specify that the host uses either UDP or TCP to send messages to the syslog server.
Examples To specify that the information about statistical log is to be sent to a Management Station at 192.168.10.1
using TCP, enter:
host1/Admin(config)# optimize
host1/Admin(config-optimize)# appscope-log
host1/Admin(config-optimize)# exit
host1/Admin(config)# logging host 192.168.10.1 tcp
To disable sending information about the statistical log information to an AVS 3180A Management
Station, enter:
host1/Admin(config-optimize)# no appscope-log
(config-optimize) debug-level
To enable HTTP optimization logging and control the maximum level for system log messages sent to
the host (the syslog server on the optional Cisco AVS 3180A Management Station), use the debug-level
command. Use the no form of the command to disable the debug function for HTTP optimization.
debug-level severity_level
no debug-level severity_level
Syntax Description severity_level Maximum level for system log messages sent to a syslog server. The severity level
that you specify indicates that you want syslog messages at that level and messages
lower than that level. For example, if the specified level is 3, the syslog displays level
3, 2, 1, and 0 messages. The severity level that you specify indicates that you want to
log messages at that level and below.
Allowable entries are as follows:
• 0—emergencies (system unusable messages)
• 1—alerts (take immediate action)
• 2—critical (critical condition)
• 3—errors (error message)
• 4—warnings (warning message)
• 5—notifications (normal but significant condition)
• 6—informational (information message)
• 7—debugging (debug messages)
Usage Guidelines The debug-level command limits the HTTP optimization logging messages sent to a syslog server based
on severity.
To specify the host (the syslog server on the optional Management Station) that receives the syslog
messages sent by the ACE, use the logging host configuration command. See the (config) logging host
command. You can specify that the host uses either UDP or TCP to send messages to the syslog server.
Examples To enable HTTP optimization logging and send informational system message logs to the syslog server,
enter:
host1/Admin(config)# debug-level 6
Syntax Description name Name assigned to the parameter map. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the connection feature in your user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
After you create and configure a parameter map, you must associate the parameter map with a policy
map to activate it. For details, see the (config-pmap-c) connection advanced-options command in the
“Policy Map Configuration Mode Commands” section.
(config-parammap-conn) exceed-mss
To configure the ACE to allow segments that exceed the maximum segment size (MSS), use the
exceed-mss command. Use the no form of this command to reset the ACE to its default of discarding
segments that exceed the MSS.
no exceed-mss
Syntax Description allow Permits segments that exceed the maximum segment size.
drop Discards segments that exceed the maximum segment size. This is
the default.
Examples To configure the ACE to allow segments that exceed the MSS, enter:
host1/Admin(config-parammap-conn)# exceed-mss allow
To configure the ACE to discard segments that exceed the MSS, enter:
host1/Admin(config-parammap-conn)# exceed-mss drop
To reset the ACE behavior to the default of discarding segments that exceed the MSS, enter:
host1/Admin(config-parammap-conn)# no exceed-mss allow
(config-parammap-conn) nagle
To enable Nagle’s algorithm, use the nagle command. By default, this command is disabled. Nagle’s
algorithm instructs a sender to buffer any data to be sent until all outstanding data has been
acknowledged or until there is a full segment of data to send. Use the no form of this command to disable
Nagle’s algorithm.
nagle
no nagle
Usage Guidelines Nagle’s algorithm automatically concatenates a number of small buffer messages that are transmitted
over the TCP connection. This process increases throughput by decreasing the number of segments that
need to be sent over the network. However, the interaction between Nagle’s algorithm and the TCP delay
acknowledgment may increase latency in your TCP connection. You should disable Nagle’s algorithm if
you notice delays in your TCP connection.
(config-parammap-conn) random-sequence-number
To enable TCP sequence number randomization, use the random-sequence-number command. This
feature is enabled by default. Use the no form of this command to disable sequence number
randomization.
random-sequence-number
no random-sequence-number
Usage Guidelines Randomizing TCP sequence numbers makes it more difficult for a hacker to guess or predict the next
sequence number in a TCP connection.
(config-parammap-conn) reserved-bits
To configure how an ACE handles segments with the reserved bits set in the TCP header, use the
reserved-bits command. Use the no form of this command to reset the ACE to its default of clearing
reserved bits set in the TCP header of a segment.
no reserved-bits
Syntax Description allow Permits segments with the reserved bits set in the TCP header.
clear Clears the reserved bits in the TCP header and allows the segment.
This is the default.
drop Discards segments with reserved bits set in the TCP header.
Usage Guidelines The six reserved bits in the TCP header are for future use and have a value of 0.
Examples To configure the ACE to allow segments with the reserved bits set in the TCP header, enter:
host1/Admin(config-parammap-conn)# reserved-bits allow
To reset the ACE to its default of clearing reserved bits set in the TCP header of a segment, enter:
host1/Admin(config-parammap-conn)# no reserved-bits allow
no set ip tos
Syntax Description number Packet ToS value. Enter an integer from 0 to 255.
Usage Guidelines The ToS for a packet determines how the network handles the packet and balances its precedence, delay,
throughput, and reliability. This information resides in the IP header.
For details about the ToS byte, see RFCs 791, 1122, 1349, and 3168.
Syntax Description number Delay time for sending an ACK from a client to a server. Enter an
integer from 0 to 400 ms. The default is 200 ms.
Usage Guidelines Delaying the ACK can help reduce congestion by sending one ACK for multiple segments rather than
sending an ACK for each segment.
To reset the ACK delay timer to the default of 200 ms, enter:
host1/Admin(config-parammap-conn)# no set tcp ack-delay
Syntax Description min number1 Specifies the smallest segment size in bytes that the ACE will accept.
Enter an integer from 0 to 65535. The default is 536 bytes. If the ACE
receives a segment smaller than the configured minimum size, the
appliance discards the segment.
max number2 Specifies the largest segment size in bytes that the ACE will accept.
Enter an integer from 0 to 65535. The default is 1380 bytes. If the
ACE receives a segment larger than the configured maximum size,
the appliance discards the segment.
Usage Guidelines The MSS is the largest amount of TCP data that the ACE accepts in one segment. To prevent the
transmission of many smaller segments or very large segments that may require fragmentation, you can
set the minimum and maximum acceptable sizes of the MSS.
Both the host and the server can set the MSS when they first establish a connection. If either maximum
value exceeds the value that you set with the set tcp mss max command, then the ACE overrides the
maximum value and inserts the value that you set. If either maximum value is less than the value that
you set with the set tcp mss min command, then the ACE overrides the maximum value and inserts the
minimum value (the minimum value is actually the smallest maximum allowed). For example, if you set
a maximum value of 1200 bytes and a minimum value of 400 bytes, when a host requests a maximum
value of 1300 bytes, then the ACE alters the packet to request 1200 bytes (the maximum). If another host
requests a maximum value of 300 bytes, then the ACE alters the packet to request 400 bytes (the
minimum).
The default of 1380 bytes allows room for header information so that the total packet size does not
exceed 1500 bytes, which is the default MTU for Ethernet. See the following calculation:
1380 data + 20 TCP + 20 IP + 24 AH + 24 ESP_CIPHER + 12 ESP_AUTH + 20 IP = 1500 bytes
If the host or server does not request an MSS, the ACE assumes that the RFC 793 default value of
536 bytes is in effect.
If you set the MSS to be greater than 1380, packets might become fragmented, depending on the MTU
size (which is 1500 by default for Ethernet). Large numbers of fragments can impact the performance of
the ACE. Setting the minimum size prevents the TCP server from sending many small TCP data packets
to the client and impacting the performance of the server and the network.
Examples To set the minimum acceptable MSS value to 768 bytes and the maximum acceptable MSS value to 1500,
enter:
host1/Admin(config-parammap-conn)# set tcp mss min 768 max 1500
To reset the minimum MSS to the default of 536 bytes and the maximum MSS to the default of 1380,
enter:
host1/Admin(config-parammap-conn)# no set tcp mss
Syntax Description number Number of SYN retries. Enter an integer from 1 to 6. The default is 4.
Examples To set the maximum number of attempts that the ACE takes to transmit a TCP segment to 3, enter:
host1/Admin(config-parammap-conn)# set tcp syn-retry 3
To reset the maximum number of TCP SYN retries to the default of 4, enter:
host1/Admin(config-parammap-conn)# no set tcp syn-retry
Examples To set the TCP timeout for embryonic connections to 24 seconds, enter:
host1/Admin(config-parammap-conn)# set tcp timeout embryonic 24
To reset the TCP half-closed connection timeout to the default of 600 seconds, enter:
host1/Admin(config-parammap-conn)# no set tcp timeout half-closed
Syntax Description number The RTT value. Enter an integer from 0 to 65535. The default is
65535.
Usage Guidelines This command allows you to control how the ACE applies TCP optimizations to packets on a connection
associated with a Layer 7 policy map using the following RTT value:
• For a value of 0, the ACE applies TCP optimizations to packets for the life of a connection
• For a value of 65535 (the default), the ACE performs normal operations (no optimizations) for the
life of a connection
• For values from 1 to 65534, the ACE applies TCP optimizations to packets based on the client RTT
to the ACE as follows:
– If the actual client RTT is less than the configured RTT, the ACE performs normal operations
for the life of the connection
– If the actual client RTT is greater than or equal to the configured RTT, the ACE performs TCP
optimizations on the packets for the life of a connection
TCP optimizations include the following connection parameter-map configuration mode operations:
• Nagle optimization algorithm
• Slowstart connection behavior
• Acknowledgement (ACK) delay timer
• Window-scale factor
• Retry settings
Examples To set the RTT to 0 to apply TCP optimizations to packets for the life of a connection, enter:
host1/Admin(config-parammap-conn)# set tcp wan-optimization rtt 0
To restore the ACE behavior to the default of not optimizing TCP connections, enter:
host1/Admin(config-parammap-conn)# no set tcp wan-optimization rtt
Syntax Description number Window-scale factor. Enter an integer from 0 to 14. The default is 0.
Usage Guidelines The TCP window scaling feature adds support for the Window Scaling option in RFC 1323. We
recommend increasing the window size to improve TCP performance in network paths with large
bandwidth, long-delay characteristics. This type of network is called a long fat network (LFN).
The window scaling extension expands the definition of the TCP window to 32 bits and then uses a scale
factor to carry this 32-bit value in the 16-bit window field of the TCP header. You can increase the
window size to a maximum scale factor of 14. Typical applications use a scale factor of 3 when deployed
in LFNs.
Syntax Description inactivity Specifies the timeout for idle TCP connections.
seconds Time period after which the ACE disconnects idle established
connections. Enter an integer from 0 to 4294967294. A value of 0
specifies that the ACE never time out a TCP connection. Default
settings are as follows:
• ICMP—2 seconds
• TCP—3600 seconds (1 hour)
• UDP—120 seconds (2 minutes)
Usage Guidelines The ACE uses the connection inactivity timer to disconnect established ICMP, TCP, and UDP
connections that have remained idle for the duration of the specified timeout period.
The ACE rounds up the configured timeout value to the nearest 30-second interval.
Examples To specify that the ACE disconnect idle established TCP connections after 2400 seconds, enter:
host1/Admin(config-parammap-conn)# set timeout inactivity 2400
To reset the ICMP, TCP, and UDP inactivity timeout to the default values, enter:
host1/Admin(config-parammap-conn)# no set timeout inactivity
(config-parammap-conn) slowstart
To enable the slow start algorithm, use the slowstart command. This feature is enabled by default. Use
the no form of this command to disable the slow start algorithm.
slowstart
no slowstart
Usage Guidelines The slow start algorithm is a congestion avoidance method in which TCP increases its window size as
ACK handshakes arrive. It operates by observing that the rate at which new segments should be injected
into the network is the rate at which the acknowledgments are returned by the host at the other end of
the connection. For further details about the TCP slow start algorithm, see RFC 3390.
(config-parammap-conn) syn-data
To set the ACE to discard SYN segments with data, use the syn-data command. Use the no form of this
command to reset the ACE to its default of allowing SYN segments that contain data.
no syn-data
Syntax Description allow Permits the SYN segments that contain data and flags them for data
processing. This is the default.
drop Discards the SYN segments that contain data.
Usage Guidelines Occasionally, the ACE may receive a SYN segment that contains data. You can configure the ACE to
either discard the segment or flag the segment for data processing.
Examples To instruct the ACE to discard segments that contain data, enter:
host1/Admin(config-parammap-conn)# syn-data drop
To reset the ACE to its default of allowing SYN segments that contain data, enter:
host1/Admin(config-parammap-conn)# no syn-data
(config-parammap-conn) tcp-options
To specify a range of TCP options not explicitly supported by the ACE, or allow or clear explicitly
supported TCP options specified in a SYN segment, use the tcp-options command. Use the no form of
this command to remove a TCP option range from the configuration or reset the ACE to its default of
clearing the specific TCP options.
Syntax Description range number1 number2 Specifies the TCP options not explicitly supported by the ACE using
a range of option numbers. The arguments are as follows:
• number1—Specifies the lower limit of the TCP option range.
Enter either 6 or 7 or an integer from 9 to 255. See the “Usage
Guidelines” section for the available TCP options.
• number2—Specifies the upper limit of the TCP option range.
Enter 6 or 7 or an integer from 9 to 255. See the “Usage
Guidelines” section for the available TCP options.
allow Allows any segment with the specified option set.
drop Causes the ACE to discard any segment with the specified option set.
selective-ack Allows the ACE to inform the sender about all segments that it
received. The sender needs to retransmit the lost segments, rather
than wait for a cumulative acknowledgement or retransmit segments
unnecessarily. Selective ACK (SACK) can reduce the number of
retransmitted segments and increase throughput under some
circumstances.
timestamp Measures the round-trip time (RTT) of a TCP segment between two
nodes on a network. Time stamps are always sent and echoed in both
directions.
window-scale Allows the ACE to use a window-scale factor that increases the size
of the TCP send and receive buffers. The sender specifies a
window-scale factor in a SYN segment that determines the send and
receive window size for the duration of the connection.
clear Clears the specified option from any segment that has it set and
allows the segment. This is the default action on the explicitly
supported options.
Usage Guidelines Using the tcp-options command, the ACE permits you to allow or clear the following explicitly
supported TCP options specified in a SYN segment:
• Selective Acknowledgement (SACK)
• Time stamp
• Window Scale
You can specify this command multiple times to configure different options and actions. If you specify
the same option with different actions, the ACE uses the order of precedence to decide which action to
use.
The order of precedence for the actions in this command is as follows:
1. Drop
2. Clear
3. Allow
Table 2-5 lists the TCP options not explicitly supported by the ACE.
Table 2-6 lists the TCP options explicitly supported by the ACE.
Examples To allow the segment with the SACK option set, enter:
host1/Admin(config-parammap-conn)# tcp-options selective-ack allow
To reset the behavior of the ACE to the default of clearing the SACK option and allowing the segment,
enter:
host1/Admin(config-parammap-conn)# no tcp-options selective-ack allow
You can specify a range of options for each action. If you specify overlapping option ranges with
different actions, the ACE uses the order of precedence described in the “Usage Guidelines” section to
decide which action to perform for the specified options.
For example, enter:
host1/Admin(config-parammap-conn)# tcp-options range 6 7 allow
host1/Admin(config-parammap-conn)# tcp-options range 9 18 clear
host1/Admin(config-parammap-conn)# tcp-options range 19 26 drop
(config-parammap-conn) urgent-flag
To set the Urgent Pointer policy, use the urgent-flag command. Use the no form of this command to
return to the default setting of clearing the Urgent flag.
no urgent-flag
Syntax Description allow Permits the status of the Urgent flag. This is the default. If the Urgent
flag is set, the offset in the Urgent Pointer that indicates the location
of the urgent data is valid. If the Urgent flag is not set, the offset in
the Urgent Pointer is invalid.
clear Sets the Urgent flag to 0, which invalidates the offset in the Urgent
Pointer.
Usage Guidelines If the Urgent control bit (flag) is set in the TCP header, it indicates that the Urgent Pointer is valid. The
Urgent Pointer contains an offset that indicates the location of the segment that follows the urgent data
in the payload. Urgent data is data that should be processed as soon as possible, even before normal data
is processed. The ACE permits you to allow or clear the Urgent flag. If you clear the Urgent flag, you
invalidate the Urgent Pointer.
The ACE clears the Urgent flag for any traffic above Layer 4. If you have enabled server connection
reuse (see the Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide),
the ACE does not pass the Urgent flag value to the server.
To reset the ACE to its default of allowing the Urgent flag, enter:
host1/Admin(config-parammap-conn)# no urgent-flag
Syntax Description name Name assigned to the parameter map. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the connection feature in your user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
After you create and configure a parameter map, you must associate the parameter map with a policy
map to activate it. For details, see the (config-pmap-c) appl-parameter http advanced-options
command in the “Policy Map Configuration Mode Commands” section.
(config-parammap-http) case-insensitive
To enable case-insensitive matching for HTTP matching only, use the case-insensitive command. With
case-insensitive matching enabled, uppercase and lowercase letters are considered the same. By default,
the ACE CLI is case sensitive. Use the no form of this command to reset the ACE to its default of
case-sensitive HTTP matching.
case-insensitive
no case-insensitive
(config-parammap-http) compress
To define the parameters that the ACE uses when compressing HTTP traffic, use the compress
command. Use the no form of this command to remove the HTTP compression.
Syntax Description mimetype type/subtype Specifies the Multipurpose Internet Mail Extension (MIME) type to
compress. The default is text/.* which includes all text MIME types,
such as text/html, text/plain, and so on.
minimum-size size Specifies the threshold at which compression occurs. The ACE
compresses files that are the specified minimum size or larger. The
default is 512 bytes.
user-agent string Specifies the text string in the request to match. The ACE does not
compress the response to a request when the request contains the
specified user agent string. The default is none.
(config-parammap-http) length-exceed
To configure how the ACE handles URLs or cookies that exceed the maximum parse length, use the
length command. Use the no form of this command to reset the ACE to its default of stopping load
balancing and discarding a packet when its URL or cookie exceeds the maximum parse length.
no length-exceed
Syntax Description continue Specifies that the ACE continue load balancing when the maximum
parse length is exceeded.
drop Specifies that the ACE stop load balancing when the maximum parse
length is exceeded. This is the default.
Usage Guidelines When you specify the continue keyword, the (config-parammap-http) persistence-rebalance
command is disabled if the total length of all cookies, HTTP headers, and URLs exceeds the maximum
parse-length value.
Examples To continue load balancing when the maximum parse length is exceeded, enter:
host1/Admin(config-parammap-http)# length-exceed continue
To reset the ACE to its default of stopping load balancing and discarding a packet when its URL or
cookie exceeds the maximum parse length, enter:
host1/Admin(config-parammap-http)# no length-exceed
(config-parammap-http) persistence-rebalance
To enable the ACE to send a GET request to the real server that was used for the last GET request, use
the persistence-rebalance command. By default, HTTP persistence is disabled. Use the no form of this
command to reset persistence to the default setting of disabled.
persistence-rebalance
no persistence-rebalance
Usage Guidelines With persistence rebalance enabled, when successive GET requests result in load balancing that chooses
the same policy, the ACE sends the request to the real server used for the last GET request. This behavior
prevents the ACE from load balancing every request and recreating the server-side connection on every
GET request, producing less overhead and better performance.
Another effect of persistence rebalance is that header insertion and cookie insertion, if enabled, occur
for every request instead of only the first request.
If a real server is enabled with the NTLM Microsoft authentication protocol, we recommend that you
leave persistence rebalance disabled. NTLM is a security measure that is used to perform authentication
with Microsoft remote access protocols. When a real server is enabled with NTLM, every connection to
the real server must be authenticated; typically, each client user will see a pop-up window prompting for
a username and password. Once the connection is authenticated, all subsequent requests on the same
connection will not be challenged. However, when the server load balancing function is enabled and
configured with persistence rebalance, a subsequent request may point to a different real server causing
a new authentication handshake.
server-conn reuse
no server-conn reuse
Usage Guidelines The ACE maintains a pool of TCP connections that can be reused if the client connection and the server
connection share the same TCP options. For information about how the ACE handles TCP options, see
the Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide. For proper
operation of this feature, follow these TCP server reuse configuration recommendations and restrictions:
• Ensure that the ACE maximum segment size (MSS) is the same as the server MSS.
• Configure Port Address Translation (PAT) on the interface that is connected to the real server. PAT
prevents collisions when a client stops using a server connection and then that connection is reused
by another client. Without PAT, if the original client tries to reuse the original server connection, it
is no longer available. For details about configuring PAT, see the Cisco 4700 Series Application
Control Engine Appliance Security Configuration Guide.
• Configure the same TCP options that exist on the TCP server.
• Ensure that all real servers within a server farm have identical configurations.
Another effect of TCP server reuse is that header insertion and cookie insertion, if enabled, occur for
every request instead of only the first request.
Syntax Description bytes Maximum number of bytes to parse in HTTP content. Enter an
integer from 1 to 65535. The default is 4096 bytes.
To reset the maximum parse length to the default of 4096 bytes, enter:
host1/Admin(config-parammap-http)# no set content-maxparse-length
no set-header maxparse-length
Syntax Description bytes Maximum number of bytes to parse for the total length of all cookies,
HTTP headers, and URLs. Enter an integer from 1 to 65535. The
default is 2048 bytes.
Examples To set the HTTP header maximum parse length to 8192, enter:
host1/Admin(config-parammap-http)# set header-maxparse-length 8192
To reset the HTTP header maximum parse length to the default of 2048 bytes, enter:
host1/Admin(config-parammap-http)# no set header-maxparse-length
no set secondary-cookie-delimiters
Syntax Description text Delimiter string. Enter an unquoted text string with no spaces and a
maximum of four characters. The order of the delimiters in the list
does not matter. The default list of delimiters is /&#+.
Usage Guidelines Cookies and their delimiters appear in GET request lines. In the following example of a GET request
line, the ampersand (&) that appears between name-value pairs is the secondary cookie delimiter. The
question mark (?) begins the URL query and is not configurable.
GET /default.cgi?user=me&hello=world&id=2 HTTP/1.1
Examples To set the delimiter string list to the characters !@#$, enter:
host1/Admin(config-parammap-http)# set secondary-cookie-delimiters !@#$
Syntax Description map_name Enter a unique name as an unquoted text string with a maximum of
64 alphanumeric characters.
Usage Guidelines The commands in this mode require the loadbalance feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
An optimization HTTP parameter map can be optionally specified in an optimization HTTP policy map
to identify the association between an optimization HTTP action list and the parameter map. The
optimization HTTP action list defines what to do, while the optimization HTTP parameter map defines
the specific details about how to accomplish the application acceleration action. For details, see the
“Policy Map Optimization Configuration Mode Commands” section.
Syntax Description value Percentage of all requests (or sessions) to be sampled for
performance with acceleration (optimization) applied. All applicable
optimizations for the class will be performed. Valid values are from
0 to 100 percent. The default is 10 percent. This value plus the
passthru-rate-percent value must not exceed 100.
passthru-rate-percent value Percentage of all requests (or sessions) to be sampled for
performance without optimization. No optimizations for the class
will be performed. Valid values are from 0 to 100 percent. The default
is 10 percent. This value plus the optimize-rate-percent value must
not exceed 100.
Usage Guidelines The statistical log contains an entry for each ACE optimization request to the server and is used for
statistical analysis by the optional Cisco AVS 3180A Management Station. The ACE collects statistical
log and sends it to the Cisco AVS 3180A Management Station for loading into the database. For details
about the use of the Cisco AVS 3180A Management Station for database, management, and reporting
features for the ACE optimization functionality, including AppScope reporting, see the Cisco 4700
Series Application Control Engine Appliance Application Acceleration and Optimization Configuration
Guide.
To control the AppScope features that measure application acceleration and optimization performance,
use the appscope commands in action list optimization configuration mode. See the “Action List
Optimization Configuration Mode Commands” section for details.
To specify the host (the syslog server on the Management Station) that receives the syslog messages sent
by the ACE, use the logging host configuration command. See the (config) logging host command. This
command allows you to identify the IP address of the Management Station that will be used as the syslog
server. You can specify that the host uses either UDP or TCP to send messages to the syslog server.
Examples To specify a percentage of all requests (or sessions) to be sampled for performance with acceleration and
without optimization applied by AppScope, enter:
host1/Admin(config-parammap-optmz)# appscope optimize-rate-percent 50
passthru-rate-percent 50
To revert to the default rate AppScope performance rate settings of 10 percent, enter:
host1/Admin(config-parammap-optmz)# no appscope optimize-rate-percent 50
passthru-rate-percent 50
Syntax Description value Base file anonymity level for the all-user delta optimization method.
Valid values are from 0 to 50. The default is a value of 0 (disables
anonymity).
Usage Guidelines The string can contain a URL regular expression that defines a set of URLs in which URLs that differ
only by their query parameters are to be treated as separate URLs in AppScope reports.
Typically, in an AppScope report organized by URL, matching URLs that differ only in their query
parameters are treated as the same URL and are not listed on separate lines. Use the
request-grouping-string command to specify that all URL variations that are based on query
parameters are to be treated as separate URLs for reporting purposes. Each variation will appear on a
separate line in the report.
For details about the optional Cisco AVS 3180A Management Station database, management, and
reporting features for the ACE optimization functionality, including AppScope reporting, see the Cisco
4700 Series Application Control Engine Appliance Application Acceleration and Optimization
Configuration Guide.
Syntax Description string A regular expression. Enter an unquoted text string with no spaces
and a maximum of 255 alphanumeric characters. Alternatively, you
can enter a text string with spaces provided that you enclose the entire
string in quotation marks (“). The ACE supports the use of regular
expressions for matching string expressions. The “Usage Guidelines”
section lists the supported characters that you can use for matching
string expressions.
parameter_expander_function A parameter expander function that evaluate to strings. The “Usage
Guidelines” section lists the parameter expander functions that you
can use.
Usage Guidelines The key that the ACE uses for any given requesting URL comprises one or more of the following two
components:
• Query parameters—The URL portion after a question mark (?). You can modify query parameters
by using the cache parameter command, which can be used to include selected query parameters,
a cookie value, an HTTP header value, or other values.
• Canonical URL—The URL portion up to a question mark (?). You can modify the canonical URL
by using the cache key-modifier command.
The expanded string that results from the cache key-modifier command replaces the default canonical
URL portion of the cache key. If you do not specify the cache key-modifier command, the canonical
URL is used as the default value for the URL portion of the cache key (there may also be a query
parameter portion).
For details on modifying the cache key, see the Cisco 4700 Series Application Control Engine Appliance
Application Acceleration and Optimization Configuration Guide.
The following table lists the supported characters that you can use for matching string expressions.
Convention Description
. One of any character.
.* Zero or more of any character.
\. Period (escaped).
[charset] Match any single character from the range.
[^charset] Do not match any character in the range. All other characters represent
themselves.
() Expression grouping.
(expr1 | expr2) OR of expressions.
(expr)* 0 or more of expression.
(expr)+ 1 or more of expression.
expr{m,n} Repeat the expression between m and n times, where m and n have a range
of 1 to 255.
expr{m} Match the expression exactly m times. The range for m is from 1 to 255.
expr{m,} Match the expression m or more times. The range for m is from 1 to 255.
\a Alert (ASCII 7).
\b Backspace (ASCII 8).
\f Form-feed (ASCII 12).
\n New line (ascii 10).
\r Carriage return (ASCII 13).
\t Tab (ASCII 9).
\v Vertical tab (ASCII 11).
\0 Null (ASCII 0).
\\ Backslash.
\x## Any ASCII character as specified in two-digit hexadecimal notation.
The following table lists the parameter expander functions that you can use.
Variable Description
$(number) Expands to the corresponding matching subexpression (by number) in
the URL pattern. Subexpressions are marked in a URL pattern using
parentheses (). The numbering of the subexpressions begins with 1 and
is the number of the left-parenthesis “(“ counting from the left. You can
specify any positive integer for the number. $(0) matches the entire
URL. For example, if the URL pattern is ((http://server/.*)/(.*)/)a.jsp,
and the URL that matched it is the following:
http://server/main/sub/a.jsp?category=shoes&session=99999, then the
following are correct:
$(0) = http://server/main/sub/a.jsp
$(1) = http://server/main/sub/
$(2) = http://server/main
$(3) = sub
If the specified subexpression does not exist in the URL pattern, then the
variable expands to the empty string.
$http_query_string() Expands to the value of the whole query string in the URL. For example,
if the URL is
http://myhost/dothis?param1=value1¶m2=value2
then the following is correct:
$http_query_string() = param1=value1¶m2=value2
This function applies to both GET and POST requests.
$http_query_param(query-param-name) Expands to the value of the named query parameter (case sensitive). For
example, if the URL is
this obsolete syntax is also supported:
http://server/main/sub/a.jsp?category=shoes&session=99999
$param(query-param-name)
then the following are correct:
$http_query_param(category) = shoes
$http_query_param(session) = 99999
If the specified parameter does not exist in the query, then the variable
expands to the empty string. This function applies to both GET and
POST requests.
$http_cookie(cookie-name) Evaluates to the value of the named cookie. For example,
$http_cookie(cookiexyz). The cookie name is case sensitive.
$http_header(request-header-name) Evaluates to the value of the specified HTTP request header. In the case
of multivalued headers, it is the single representation as specified in the
HTTP specification. For example, $http_header(user-agent). The HTTP
header name is not case sensitive.
Variable Description
$http_method() Evaluates to the HTTP method used for the request, such as GET or
POST.
Boolean Functions: Evaluates to a Boolean value: True or False, depending on the presence
$http_query_param_present(query-param-name) or absence of the element in the request. The elements are a specific
$http_query_param_notpresent query parameter (query-param-name), a specific cookie (cookie-name),
(query-param-name) a specific request header (request-header-name), or a specific HTTP
$http_cookie_present(cookie-name) method (method-name). All identifiers are case sensitive except for the
$http_cookie_notpresent(cookie-name)
HTTP request header name.
$http_header_present(request-header-name)
$http_header_notpresent(request-header-name)
$http_method_present(method-name)
$http_method_notpresent(method-name)
Syntax Description parameter_expander_function Parameter expander function that evaluates to strings. Use the
forwardslash (/) character when combining multiple parameter
expander functions (for example, cache parameter
$http_cookie(ID)/$http_query_param(category)). The
maximum string value is 255 characters. See the
“(config-parammap-optmz) cache key-modifier” section for a listing
of the parameter expander functions that you can use.
Usage Guidelines The key that the ACE uses for any given requesting URL comprises one or more of the following two
components:
• Query parameters—The URL portion after a question mark (?). You can modify query parameters
by using the cache parameter command, which can be used to include selected query parameters,
a cookie value, an HTTP header value, or other values.
• Canonical URL—The URL portion up to a question mark (?). You can modify the canonical URL
by using the cache key-modifier command.
The cache parameter command specifies an expression that includes one or more parameter expander
functions if you want to modify the parameter portion of the cache key. This command specifies one or
more parameter expander functions that evaluate to strings. These strings are appended to the canonical
URL to form the last portion of the cache key. The parameter expander functions are listed in the
(config-parammap-optmz) cache key-modifier command.
The string specified in the cache parameter command replaces the default query parameter that is used
in the cache key. If you do not specify the cache parameter command, the query parameter portion of
the URL is used as the default value for this portion of the cache key. The canonical URL, possibly
modified by the cache key-modifier command, is the first part of the cache key.
For details on modifying the cache key, see the Cisco 4700 Series Application Control Engine Appliance
Application Acceleration and Optimization Configuration Guide.
Examples To set the value of the query parameter portion of the cache key, enter:
host1/Admin(config-parammap-optmz)# cache parameter $http_query_param (version)
Syntax Description min time Minimum time in seconds that an object without an explicit
expiration time should be considered fresh. The min keyword
specifies the minimum time that the content can be cached for, which
corresponds to the time-to-live value of the content. In the case of a
new item that is valid for three hours, this value would be 3 x 60 x 60
= 10800 seconds. If you perform static caching (the
flashforward-object action), this value should normally be 0. If you
perform dynamic caching (the cache dynamic action) this value
should be set to indicate how long the ACE should cache the page.
Valid values are from 0 to 2147483647 seconds. The default is 0.
max time Maximum time in seconds than an object without an explicit
expiration time should be considered fresh. The max keyword
determines how the ACE handles the case when the object has passed
its cache minimum time-to-live value.Valid values are from 0 to
2147483647 seconds. The default is 300 seconds.
percent value Percent of an object’s age at which an embedded object without an
explicit expiration time is considered fresh. Valid values are from 0
to 100 percent. The default is 0 percent.
Usage Guidelines This command sets the maximum time (max keyword) or the minimum time (min keyword) in seconds that
an object without an explicit expiration time should be considered fresh. The percent keyword sets the
percent of an object's age at which an embedded object without an explicit expiration time is considered fresh.
Examples To specify a minimum time-to-live value of 1000 seconds in which the content can be cached, enter:
host1/Admin(config-parammap-optmz)# cache ttl min 1000
Syntax Description override-all Specifies that all cache request headers are ignored.
override-cache-ctl-no-cache Overrides the Cache-Control: no cache HTTP header from a request.
This keyword is used for a flashforward-object command action
(see the “(config-actlist-optm) flashforward-object” section).
Typically, if there is a cache control request header stating no cache,
the ACE will not cache this object. The override-cache-ctl-no-cache
keyword instructs the ACE to ignore the Cache-Control: no cache
header from the request side.
Examples To instruct the ACE that all cache request headers are ignored, enter:
host1/Admin(config-parammap-optmz)# cache-policy request override-all
Syntax Description override-all Specifies that all cache response headers are ignored.
override-cache-ctl-private Overrides the Cache-Control: private HTTP header from a response.
This keyword is used for a flashforward-object command action
(see the “(config-actlist-optm) flashforward-object” section) and
is equivalent to static object caching. Typically, if there is a cache
control response header stating private, these response headers will
make the object not cacheable. The override-cache-ctl-private
keyword instructs the ACE to ignore the Cache-Control: private
HTTP header from a response.
Examples To instruct the ACE that all cache response headers are ignored, enter:
host1/Admin(config-parammap-optmz)# cache-policy response override-all
(config-parammap-optmz) canonical-url
To specify a string containing a canonical URL regular expression that defines a set of URLs to which
the parameter map applies, use the canonical-url command. Use the no form of the command to delete
the string that contains a canonical URL regular expression.
canonical-url {parameter-expander-function}
no canonical-url {parameter-expander-function}
Syntax Description parameter-expander-function Parameter expander function that evaluates to strings. See the
“(config-parammap-optmz) cache key-modifier” section for a listing
of the parameter expander functions that you can use.
Usage Guidelines At least one URL must be specified using the canonical-url command.
Use the canonical URL function in a parameter map to specify a base file selection policy. The canonical
URL function specifies a regular expression that is used to match a variety of actual URLs. All matched
URLs share a single base file.
The ACE uses the canonical URL feature to modify a parameterized request to eliminate the question
mark (?) and the characters that follow to identify the general part of the URL. This general URL is then
used to create the base file. The ACE uses this feature to map multiple parameterized URLs to a single
canonical URL.
Examples To specify a string that contains a canonical URL regular expression, enter:
host1/Admin(config-parammap-optmz)# canonical-url (1)/http_query_param(category)
To delete the string that contains a canonical URL regular expression, enter:
host1/Admin(config-parammap-optmz)# no canonical-url
(config-parammap-optmz) clientscript-default
To configure the ACE to recognize the scripting language used on delta optimized content pages, either
JavaScript or Visual Basic, use the clientscript-default command. Use the no form of the command to
revert to the default JavaScript scripting language.
Syntax Description javascript Sets the default scripting language to JavaScript (default).
vbscript Sets the default scripting language to Visual Basic.
(config-parammap-optmz) delta
To control the delta optimization mode used by the ACE and to configure the delta optimization
operating parameters on the ACE, use the delta command. Use the no form of the command to revert to
the default all-user delta optimization mode.
Syntax Description all-user Specifies the corresponding URLs are to be delta optimized using the
all-user delta optimization mode. This is the default.
cacheable-content Enables delta optimization of cacheable content. Typically, the ACE
detects cacheable content and prevents its delta optimization.
exclude Defines the cacheable objects that should not be delta optimized.
iframes Specifies that IFrames should not be delta optimized.
mime-type mime-type Specifies the Multipurpose Internet Mail Extension (MIME)-type
messages that should not be delta optimized (such as image/Jpeg,
text/html, application/msword, audio/mpeg).
The following lists the supported mime-types:
• application/msexcel
• application/mspowerpoint
• application/msword
• application/octet-stream
• application/pdf
• application/postscript
• application/\x-gzip
• application/\x-java-archive
• application/\x-java-vm
• application/\x-messenger
• application/\zip
• audio/*
• audio/basic
• audio\midi
• audio/mpeg
• audio/x-adpcm
• audio/x-aiff
• audio/x-ogg
• audio/x-wav
• image/*
• image/gif
• image/jpeg
• image/png
• image/tiff
• image/x-3dsimage/x-bitmap
• image/x-niff
• image/x-portable-bitmap
• image/x-portable-greymap
• image/x-xpm
• text/* text/sgml
• text/xmcd
• text/xml
• video/*
• video/flc
• video/mpeg
• video/quicktime
• video/sgi
• video/x-fli
non-ascii Specifies that non-ASCII data should not to be delta optimized.
Specify this keyword if the content has UTF8 characters. Using this
keyword excludes such UTF8 characters from delta optimization but
the remainder of that page can still have delta optimization.
scripts Specifies that JavaScript should not to be delta optimized.
first-visit Enables delta optimization on the first visit to a web page.
page-size Sets the minimum and maximum page size, in bytes, that can be delta
optimized.
min value Specifies the minimum page size, in bytes, that can be delta
optimized. Valid values are from 1 to 250000 bytes. The default is
1024 bytes.
max value Specifies the maximum page size, in bytes, that can be delta
optimized. Valid values are 1024 to 250000 bytes. The default is
250000 bytes.
per-user Specifies the corresponding URLs are to be delta optimized using the
per-user delta optimization mode.
Usage Guidelines Delta optimization mode specifies whether the web pages to be delta optimized are common to all users
or personalized for individual users, which determines what kind of page deltas are generated by the
ACE.
The ACE supports two delta optimization modes:
• All-user mode
• Per-user mode
In the all-user delta optimization mode, the delta is generated against a single base file that is shared by
all users of the URL. The all-user delta optimization mode is usable in most cases, even in the case of
dynamic personalized content if the structure of a page is common across users. The disk space overhead
is minimal (the disk space requirements are determined by the number of delta optimized pages, not the
number of users).
In the per-user delta optimization mode, when a specific user requests a URL, the delta for the response
is generated against a base file that is created specifically for that user. The per-user delta optimization
mode is useful in situations where the contents of a page (including layout elements) are different for
each user. This mode delivers the highest level of delta optimization. However, a copy of the base page
that is delivered to each user has to be kept in the ACE cache which increases the requirements on disk
space for the ACE cache. The per-user delta optimization mode is useful for content privacy because
base pages are not shared among users.
Examples To specify that the corresponding URLs are to be delta optimized using the per-user delta optimization
mode, enter:
host1/Admin(config-parammap-optmz)# delta per-user
To specify the MIME-type messages that should not be delta optimized, enter:
host1/Admin(config-parammap-optmz)# delta exclude mime-type audio/mpeg
((config-parammap-optmz) expires-setting
To control the period of time that objects in the client’s browser remain fresh, use the expires-setting
command. Use the no form of the command to remove an expiration setting.
Syntax Description cachettl Sets the freshness similar to FlashForwarded objects and uses the
minimum and maximum settings configured by the cache ttl
command (if set). See the “(config-parammap-optmz) cache ttl”
section.
time-to-live seconds The duration that objects in the client’s browser remain fresh. Valid
entries are from 0 to 2147483647 seconds.
unmodified Disables browser object freshness control (default).
Usage Guidelines The expires-setting command instructs the ACE to insert an Expires response header with a time value
for an object. It is not necessary to configure this command when specifying the flashforward command
in an action list because, in this case, the ACE always inserts a long time value in the Expires header for
the transformed object. The expires-setting command is typically used when you are not using
FlashForward but want to achieve the FlashForward affect by making all of the embedded objects
perceived as being fresh by the browser.
Examples To specify that the ACE use the settings configured by the cache ttl command, enter:
host1/Admin(config-parammap-optmz)# expires-setting cachettl
extract meta
no extract meta
Usage Guidelines Request headers that the ACE sends to the origin server for stale embedded objects (indirect GET) may
not be accepted by the origin server and cause errors. In this case, specify direct to prevent this behavior.
FlashForward is disabled by default; you must enable it by specifying the following commands in action
list optimization mode: flashforward and flashforward-object (for embedded objects).
To revert to the default of allowing FlashForward to indirectly refresh embedded objects, enter:
host1/Admin(config-parammap-optmz)# no flashforward refresh-policy
(config-parammap-optmz) ignore-server-content
To specify a comma-separated list of HTTP response codes for which the response body must not be read
(ignored), use the ignore-server-content command. Use the no form of the command to remove one or
more response codes to ignore.
ignore-server-content value
no ignore-server-content value
Syntax Description value The response code as an unquoted text string with a maximum of
64 alphanumeric characters. For example, a response code value of
302 directs the ACE to ignore the response body in the case of a 302
(redirect) response from the origin server.
Syntax Description bytes Maximum number of bytes that are logged for each parameter value
in the parameter summary of a transaction log entry in the statistical
log. If a parameter value is longer than this limit, it is truncated at the
specified parameter limit. Valid values are from 0 to 10,000 bytes.
The default is 100 bytes.
Examples To specify 5000 bytes as the value of the parameter summary, enter:
host1/Admin(config-parammap-optmz)# parameter-summary parameter-value-limit 5000
To revert to the default of 100 bytes as the value of the parameter summary, enter:
host1/Admin(config-parammap-optmz)# no parameter-summary parameter-value-limit
(config-parammap-optmz) post-content-buffer-limit
To set the buffer size of an HTTP POST to a maximum number of kilobytes, use the
post-content-buffer-limit command. Use the no form of the command to revert to the default buffer size
of 40K.
post-content-buffer-limit value
no post-content-buffer-limit value
Syntax Description value The buffer size for POST data for the purpose of logging transaction
parameters in the statistics log. Valid values are 0 to 1000 KB. The
default is 40 KB. Parameters beyond this limit will not be logged by
the ACE.
Usage Guidelines An HTTP POST can send a very large (effectively unlimited) amount of data; in an extreme case, the
client can keep sending a stream of data for the server to handle. In order to parse and inspect the POST
data, the ACE needs to load the data into a buffer in memory.
Two types of standard HTTP form POST operations are as follows (they are distinguished by the value
in the Content-Type header):
• application/x-www-form-urlencoded—This type represents the majority of all HTTP POSTs. This
type is just a standard POST of a webpage form.
• multipart/form-data—This type is much less common. It allows browser users to upload files to a
website or application. For example, if you use a web-based email program, and you want to attach
a file to an e-mail that you are sending, the upload of the file is done using this type. Another usage
(even less common) of this type of HTTP POST is to send binary data (for example, from a custom
browser plug-in, or from a non-browser HTTP client).
(config-parammap-optmz) rebase
To control the rebasing of base files by the ACE, use the rebase command. Use the no form of the
command to revert to a default rebase setting.
Syntax Description delta-percent value Specifies the delta threshold at which rebasing is triggered. This
number represents the size of a page delta relative to the page total
size, expressed as a percentage. Valid values are from 0 to 10000
percent. The default threshold is 50 percent.
flashforward-percent value Specifies a rebase, based on the percent of FlashForwarded URLs in
the response. Rebasing is triggered when the difference between the
percentages of FlashForwarded URLs in the delta response and the
base file exceed the threshold. Valid values are from 0 to 10000
percent. The default is 50 percent. The flashforward-percent
keyword provides a threshold control for rebasing based on the
percent of FlashForwarded URLs in the response. Where the
delta-percent keyword triggers rebasing when the delta response
size exceeds the threshold as a percentage of base file size; the
flashforward-percent keyword triggers rebasing when the
difference between the percentages of FlashForwarded URLs in the
delta response and the base file exceed the threshold.
history-size value Controls how much history is stored before resetting. Once the
sample collection reaches the specified history size, the ACE resets
all rebase control parameters to zero and starts over. Using the
history-size keyword prevents the base file from becoming too rigid.
That is, if a base file has served approximately one million pages,
then it would take another half million unfavorable responses before
the base file can be rebased. Valid values are from 10 to 2147483647
pages. The default value for this parameter is 1000 pages.
modification-cooloff-period Specifies the time, in seconds, after the last modification before
value performing a rebase. Valid values are from 1 to 14400 seconds
(4 hours).The default is 14400 seconds.
reset-period value Specifies the period for performing a meta data refresh Valid values
are from 1 to 900 seconds (15 minutes). The default is 900 seconds.
Usage Guidelines Rebasing refers to the process of updating the base file that is used for generating deltas between
subsequent content retrievals. Because the base content of a site often changes over a period of time, the
size of the generated deltas can grow relatively large. To maintain the effectiveness of the delta
optimization process, the base files are automatically updated as required.
Examples To specify a rebase, based on a percentage of 1000 FlashForwarded URLs in the response, enter:
host1/Admin(config-parammap-optmz)# rebase flashforward-percent 1000
(config-parammap-optmz) request-grouping-string
To define a string to sort requests for AppScope reporting by the optional Cisco AVS 3180A
Management Station, use the request-grouping-string command. Use the no form of the command to
re move a request grouping string.
request-grouping-string string
no request-grouping-string string
Syntax Description string URL regular expression that defines a set of URLs. The string can
contain the parameter expander functions listed in the
(config-parammap-optmz) cache key-modifier section.
Usage Guidelines The string can contain a URL regular expression that defines a set of URLs in which URLs that differ
only by their query parameters are to be treated as separate URLs in AppScope reports.
Typically, in an AppScope report organized by URL, matching URLs that differ only in their query
parameters are treated as the same URL and are not listed on separate lines. Use the
request-grouping-string command to specify that all URL variations that are based on query
parameters are to be treated as separate URLs for reporting purposes. Each variation will appear on a
separate line in the report.
For details about the Cisco AVS 3180A Management Station database, management, and reporting
features for the ACE optimization functionality, including AppScope reporting, see the Cisco 4700
Series Application Control Engine Appliance Application Acceleration and Optimization Configuration
Guide.
Examples To define a string that is used to make the URLs http://server/catalog.asp?region=asia and
http://server/catalog.asp?region=america into two separate reporting categories, enter:
host1/Admin(config-parammap-optmz)# request-grouping-string http_query_param(region)
(config-parammap-optmz) server-header
To define a user-specified string to be sent in the server header for an HTTP response, use the
server-header command in parameter map optimization configuration mode. Use the no form of the
command to delete the server header string.
server-header string
no server-header srting
Syntax Description string A particular string to be included in the server header. Enter a quoted
text string. A maximum of 64 alphanumeric characters are allowed.
Usage Guidelines This command provide you with a method to uniquely tag the context or URL match statement by setting
server header value to a particular string. The server header string can be used in cases where a particular
URL is not being transmitted to the correct target context or the match statement.
(config-parammap-optmz) server-load
To control load-based expiration for the cache, use the server-load command. Use the no form of the
command to revert to a default setting of 20 percent.
Syntax Description trigger-percent value Defines the threshold that triggers a change in the cache TTL. This
keyword enables the ACE to monitor server load in real time and
make intelligent “closed loop” content expiration decisions so that
site performance is maximized and existing hardware resources are
used most efficiently, even during periods of peak traffic load. Valid
values are from 0 to 100 percent. The default is 20 percent.
ttl-change-percent value Defines the percentage by which the cache TTL is increased or
decreased in response to a change in the server load. For example, if
you set this value to 20 and the current TTL for a particular response
is 300 seconds, and if the current server response time exceeds the
trigger threshold, then the cache TTL for the response is raised to
360 seconds (20 percent increase). Valid values are from 0 to 100
percent. The default is 20 percent.
Usage Guidelines Performance assurance with load-based expiration allows an object in the cache to expire (excluding the
natural process of cache pruning). The origin server’s load determines when the object expires.
This type of expiration allows you to dynamically increase the time to live (TTL) of cached responses if
the current response time (average computed over a short time window) from the origin servers is larger
than the average response time (average computed over a longer time window) by a threshold amount.
Similarly, the TTL is dynamically decreased if the reverse holds true. The starting value for the cache
TTL is the cache ttl min value (see the “(config-parammap-optmz) cache ttl” section) or 0 if you do not
specify a value. Moving average-based calculation allows the cache to respond to trends in usage
patterns, smoothing out uncharacteristic spikes.
Syntax Description value Number of UTF-8 characters on a page that constitute a UTF-8
character set page. Valid values are from 1 to 1,000,000 characters. The
default is 5 characters.
Usage Guidelines This threshold adjusts the detection of multibyte UTF-8 character set pages.
Syntax Description name Name assigned to the parameter map. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the connection or SSL feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
After you create and configure an SSL parameter map, you must associate the parameter map with a
policy map to activate it. For details, see the (config-ssl-proxy) ssl advanced-options command in the
“SSL Proxy Configuration Mode Commands” section.
(config-parammap-ssl) cipher
To define each of the cipher suites that you want the ACE to support during a secure session, use the
cipher command. Use the no form of the command to delete a cipher suite from the SSL parameter map.
no cipher cipher_name
Syntax Description cipher_name Name of the cipher suite. See the “Usage Guidelines” section for the
TCP options available for the available cipher suites that the ACE
supports. Enter one of the supported cipher suites from Table 2-7.
The default setting is all.
priority (Optional) Assigns a priority level to the cipher suite. The priority
level represents the preference-for-use ranking of the cipher suite,
with 10 being the most preferred and 1 being the least preferred. By
default, all configured cipher suites have a priority level of 1.
cipher_priority Priority level of the cipher suite. Enter a value from 1 to 10. The
default priority value is 1.
Usage Guidelines Table 2-7 lists the available cipher suites that the ACE supports and indicates which of the supported
cipher suites are exportable from the ACE. Table 2-7 also lists the authentication certificate and
encryption key required by each cipher suite.
Key Exchange
Authentication Algorithm
Cipher Suite Exportable Certificate Used Used
RSA_WITH_RC4_128_MD5 No RSA certificate RSA key exchange
RSA_WITH_RC4_128_SHA No RSA certificate RSA key exchange
RSA_WITH_DES_CBC_SHA No RSA certificate RSA key exchange
RSA_WITH_3DES_EDE_CBC_SHA No RSA certificate RSA key exchange
RSA_EXPORT_WITH_RC4_40_MD5 Yes RSA certificate RSA key exchange
RSA_EXPORT_WITH_DES40_CBC_SHA Yes RSA certificate RSA key exchange
RSA_EXPORT1024_WITH_RC4_56_MD5 Yes RSA certificate RSA key exchange
Key Exchange
Authentication Algorithm
Cipher Suite Exportable Certificate Used Used
RSA_EXPORT1024_WITH_DES_CBC_SHA Yes RSA certificate RSA key exchange
RSA_EXPORT1024_WITH_RC4_56_SHA Yes RSA certificate RSA key exchange
RSA_WITH_AES_128_CBC_SHA No RSA certificate RSA key exchange
RSA_WITH_AES_256_CBC_SHA No RSA certificate RSA key exchange
Repeat the cipher command for each cipher suite that you want to include in the SSL parameter map.
The ACE chooses a cipher suite with the highest priority level from the client list. For SSL termination
applications, the ACE uses the priority level to match cipher suites in the client’s ClientHello handshake
message. For SSL initiation applications, the priority level represents the order in which the ACE places
the cipher suites in its ClientHello handshake message to the server.
The default “all cipher suites” setting works only when you do not configure the SSL parameter map
with any specific ciphers. To return to using the “all cipher suites” setting, you must delete each of the
specifically defined ciphers from the parameter map using the no form of the command.
Examples To add the cipher suite RSA_WITH _AES_128_CBC_SHA and assign it a priority 2 level, enter:
host1/Admin(config-parammap-ssl)# cipher RSA_WITH_AES_128_CBC_SHA priority 2
To delete the cipher suite RSA_WITH _AES_128_CBC_SHA from the SSL parameter map, enter:
host1/Admin(config-parammap-ssl)# no cipher RSA_WITH_AES_128_CBC_SHA
(config-parammap-ssl) version
To specify the versions of Secure Sockets Layer (SSL) and Transport Layer Security (TLS) that the ACE
supports when it uses the SSL proxy parameter map during the handshake process, use the version
command. Use the no form of the command to remove a version from the SSL proxy parameter map.
no version
Syntax Description all Specifies that the ACE supports both SSL (version SSL3) and TLS
(version TLS1). This is the default setting.
ssl3 Specifies that the ACE supports only SSL version SSL3.
tls1 Specifies that the ACE supports only TLS version TLS1.
To remove the version TLS1 from the SSL proxy parameter map, enter:
host1/Admin(config-parammap-ssl)# no version
Syntax Description map_name Name assigned to the Layer 3 and Layer 4 policy map. Enter an
unquoted text string with no spaces and a maximum of
64 alphanumeric characters.
Usage Guidelines The commands in this mode require the loadbalance, inspect, connection, NAT, or SSL feature in your
user role. For details about role-based access control (RBAC) and user roles, see the Cisco 4700 Series
Application Control Engine Appliance Virtualization Configuration Guide.
To perform HTTP load balancing, HTTP deep packet inspection, or FTP command inspection functions,
you associate a previously created Layer 7 policy map within a Layer 3 and Layer 4 policy map to
provide an entry point for the traffic classification. Layer 7 policy maps are considered to be child
policies and can be associated only within a Layer 3 and Layer 4 policy map. Only a Layer 3 and Layer 4
policy map can be activated on a VLAN interface. A Layer 7 policy map cannot be directly applied on
a VLAN (or any) interface. For example, to associate a Layer 7 HTTP load-balancing policy map, you
nest the Layer 7 load-balancing policy map by using the Layer 3 and Layer 4 (config-pmap-c)
loadbalance policy command.
The ACE supports a system-wide maximum of 4096 policy maps.
Examples To create a a Layer 3 and Layer 4 server load balancing (SLB) policy map named L4_SLB_POLICY,
enter:
host1/Admin(config)# policy-map multi-match L4_SLB_POLICY
host1/Admin(config-pmap)#
To create a Layer 3 and Layer 4 application protocol inspection policy map named
L4_HTTP_APP_INSPECTION_POLICY, enter:
host1/Admin(config)# policy-map multi-match L4_HTTP_APP_INSPECTION_POLICY
host1/Admin(config-pmap)#
(config-pmap) class
To associate a Layer 3 and Layer 4 class map with a Layer 3 and Layer 4 policy map, use the class
command. The prompt changes from (config-pmap) to (config-pmap-c). For information on commands in
this mode, see the “Policy Map Class Configuration Mode Commands” section. Use the no form of this
command to remove an associated class map from a policy map.
Syntax Description name1 Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
insert-before name2 (Optional) Places the current named class map ahead of an existing
class map or inline match condition specified by the name2 argument
in the policy-map configuration. The ACE does not save the sequence
reordering as part of the configuration. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
class-default Associates the reserved, well-known class map created by the ACE.
You cannot delete or modify this class. All traffic that fails to meet
the other matching criteria in the named class map belongs to the
default traffic class. If none of the specified classifications matches
the traffic, then the ACE performs the action specified under the class
class-default command. The class-default class map has an implicit
match any statement in it that enables it to match all traffic.
Examples To associate a Layer 3 and Layer 4 class map with a Layer 3 and Layer 4 policy map, enter:
host1/Admin(config)# policy-map multi-match L4_SLB_POLICY
host1/Admin(config-pmap)# class L4_SLB_CLASS
host1/Admin(config-pmap-c)#
(config-pmap) description
To provide a brief summary about the Layer 3 and Layer 4 policy map, use the description command.
Use the no form of the command to remove the description from the class map.
description text
no description
Syntax Description text Description for the policy map. Enter an unquoted text string with a
maximum of 240 alphanumeric characters.
Examples To add a description that the class map is to perform Layer 3 and Layer 4 server load balancing, enter:
host1/Admin(config)# policy-map multi-match L4_SLB_POLICY
host1/Admin(config-pmap)# description Policy map for L3/L4 SLB
Syntax Description name Name of an existing HTTP parameter map. Enter an unquoted text
string with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines This command requires the loadbalance and inspect features in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
Examples To specify the appl-parameter http advanced-options command as an action for the policy map, enter:
host1/Admin(config)# policy-map multi-match L4SLBPOLICY
host1/Admin(config-pmap)# class FILTERHTTP
host1/Admin(config-pmap-c)# appl-parameter http advanced-options http_param_map1
Syntax Description name Name of an existing connection parameter map. Enter an unquoted
text string with no spaces and a maximum of 64 alphanumeric
characters.
Usage Guidelines This command requires the connection feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
For details about configuring a connection parameter map, see the Cisco 4700 Series Application
Control Engine Appliance Security Configuration Guide.
Examples To associate the connection parameter map IP_MAP with a Layer 3 and Layer 4 TCP/IP policy map:
host1/Admin(config)# policy-map multi-match TCPIP_POLICY
host1/Admin(config-pmap)# class TCP_CLASS
host1/Admin(config-pmap-c)# connection advanced-options IP_MAP
(config-pmap-c) inspect
To define the Layer 3 and Layer 4 HTTP deep packet inspection, File Transfer Protocol (FTP) command
inspection, or application protocol inspection policy actions, use the inspect command. Application
inspection involves the examination of protocols such as Domain Name System (DNS), FTP, HTTP,
Internet Control Message Protocol (ICMP), and Real Time Streaming Protocol (RTSP) to verify the
protocol behavior and identify unwanted or malicious traffic that passes through the ACE. Use the no
form of this command to remove an associated class map from a policy map.
inspect {dns [maximum-length bytes]} | {ftp [strict policy policy_map1]} | {http [policy
policy_map2 | url-logging]} | {icmp [error]} | rtsp
no inspect {dns [maximum-length bytes]} | {ftp [strict policy policy_map1]} | {http [policy
policy_map2 | url-logging]} | {icmp [error]} | rtsp
Syntax Description dns Enables DNS query inspection. DNS requires application inspection
so that DNS queries will not be subject to the generic UDP handling
based on activity timeouts. Instead, the UDP connections associated
with DNS queries and responses are torn down as soon as a reply to
a DNS query has been received. The ACE performs the reassembly
of DNS packets to verify that the packet length is less than the
configured maximum length.
maximum-length bytes (Optional) Sets the maximum length of a DNS reply. Valid entries are
from 64 to 65536 bytes. The default is 512 bytes.
ftp Enables FTP inspection. The ACE inspects FTP packets, translates
the address and the port that are embedded in the payload, and opens
up a secondary channel for data.
strict (Optional) Checks for protocol RFC compliance and prevents web
browsers from sending embedded commands in FTP requests. The
strict keyword prevents an FTP client from determining valid
usernames that are supported on an FTP server. When an FTP server
replies to the USER command, the ACE intercepts the 530 reply code
from the FTP server and replaces it with the 331 reply code.
Specifying an FTP inspection policy allows selective command
filtering and also prevents the display of the FTP server system type
to the FTP client. The ACE intercepts the FTP server 215 reply code
and message to the SYST command, and then replaces the text
following the reply code with Xs.
policy policy_map1 Specifies the name assigned to a previously created Layer 7 FTP
command inspection policy map to implement the inspection of
Layer 7 FTP commands by the ACE. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters. Use
the inspect ftp command in policy map class configuration mode to
define the FTP command request inspection policy.
Note If you do not specify a Layer 7 policy map, the ACE performs
a general set of Layer 3 and Layer 4 FTP fixup actions.
Usage Guidelines This command requires the inspect feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
To perform the deep packet inspection of Layer 7 HTTP application traffic by the ACE, you should create
a Layer 7 HTTP deep packet inspection policy using the policy-map type inspect http command (see
the Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide). Nest the
Layer 7 deep packet inspection policy using the Layer 3 and Layer 4 inspect http command. If you do
not specify a Layer 7 HTTP policy map, the ACE performs a general set of Layer 3 and Layer 4 HTTP
fixup actions and internal RFC compliance checks.
To perform checks for protocol RFC compliance and to prevent web browsers from sending embedded
commands in FTP requests, you should create a Layer 7 FTP policy using the policy-map type inspect
ftp command (see the Cisco 4700 Series Application Control Engine Appliance Security Configuration
Guide). Nest the Layer 7 FTP inspection traffic policy using the Layer 3 and Layer 4 inspect ftp
command. If you do not specify a Layer 7 FTP policy map, the ACE performs a general set of Layer 3
and Layer 4 FTP fixup actions.
Examples To specify the inspect http command as an action for an HTTP application protocol inspection policy
map, enter:
host1/Admin(config)# policy-map multi-match HTTP_INSPECT_L4POLICY
host1/Admin(config-pmap)# class HTTP_INSPECT_L4CLASS
host1/Admin(config-pmap-c)# inspect http policy HTTP_DEEPINSPECT_L7POLICY
Syntax Description name Name of an existing Layer 7 SLB policy map. Enter the name as an
unquoted text string with no spaces and a maximum of
64 alphanumeric characters.
Usage Guidelines This command requires the loadbalance feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
The ACE treats all Layer 7 policy maps as child policies, so you must always associate a Layer 7 SLB
policy map with a Layer 3 and Layer 4 SLB policy map.
Examples To reference the Layer 7 L7SLBPOLICY policy map within the Layer 3 and Layer 4 L4SLBPOLICY
policy map, enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap)# class L7SLBCLASS
host1/Admin(config-pmap-c)# serverfarm FARM2
Syntax Description active (Optional) Instructs the ACE to reply to an ICMP request only if the
configured VIP is active. If the VIP is not active and the active option
is specified, the ACE discards the ICMP request and the request times
out.
Usage Guidelines This command requires the loadbalance feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
To complete the configuration when you configure the active option of this command, be sure to
configure a Telnet probe and associate it with the server farm. The probe monitors the health of all the
real servers in the server farm and ensures that the VIP responds with an ICMP ECHO REPLY only if
the server port is active. If the server port is down or unreachable, the probe fails and the VIP stops
responding to the ECHO request. For details about configuring probes, see the Cisco 4700 Series
Application Control Engine Appliance Server Load-Balancing Configuration Guide.
Usage Guidelines This command requires the loadbalance feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Examples To specify the loadbalance vip inservice command as an action for a server load-balancing policy map,
enter:
host1/Admin(config)# policy-map multi-match L4SLBPOLICY
host1/Admin(config-pmap)# class FILTERHTTP
host1/Admin(config-pmap-c)# loadbalance vip oos-arpreply enable
host1/Admin(config-pmap-c)# loadbalance vip inservice
Syntax Description nat dynamic nat_id Refers to a global pool of IP addresses that exists under the VLAN
number. Dynamic NAT translates a group of local source IP addresses
to a pool of global IP addresses that are routable on the destination
network. All packets going from the interface attached to the traffic
policy have their source address translated to one of the available
addresses in the global pool. Enter an integer from 1 to 2147483647.
vlan number Specifies the VLAN number of an existing interface for which you
are configuring NAT. Enter an integer from 2 to 4094.
Usage Guidelines This command requires the NAT feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
If a packet egresses an interface that you have not configured for NAT, the ACE transmits the packet
untranslated.
Examples To specify the nat dynamic command as an action for a dynamic NAT policy map, enter:
host1/Admin(config)# policy-map multi-action NAT_POLICY
host1/Admin(config-pmap)# class NAT_CLASS
host1/Admin(config-pmap-c)# nat dynamic 1 vlan 200
nat static ip_address netmask mask {port1 | tcp eq port2 | udp eq port3} vlan number
no nat static ip_address netmask mask {port1 | tcp eq port2 | udp eq port3} vlan number
Syntax Description ip_address IP address for a single static translation. This argument establishes
the globally unique IP address of a host as it appears to the outside
world. The policy map performs the global IP address translation for
the source IP address specified in the ACL (as part of the class map
traffic classification).
netmask mask Specifies the subnet mask for the IP address. Enter a subnet mask in
dotted-decimal notation (for example, 255.255.255.0).
port1 Global TCP or UDP port for static port redirection. Enter an integer
from 0 to 65535.
tcp eq port2 Specifies a TCP port name or number. Enter an integer from 0 to
65535. A value of 0 instructs the ACE to match any port.
Alternatively, you can enter a protocol keyword that corresponds to a
TCP port number. See the “Usage Guidelines” section for a list of
supported well-known TCP port names and numbers.
udp eq port3 Specifies a UDP port name or number. Enter an integer from 0 to
65535. A value of 0 instructs the ACE to match any port.
Alternatively, you can enter a protocol keyword that corresponds to a
UDP port number. See the “Usage Guidelines” section for a list of
supported well-known UDP port names and numbers.
vlan number Specifies the interface for the global IP address.
Usage Guidelines This command requires the NAT feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Table 2-8 provides a list of supported well-known TCP and UDP port names and numbers.
Examples To specify the nat command as an action for a static NAT and port redirection policy map, enter:
host1/Admin(config)# policy-map multi-action NAT_POLICY
host1/Admin(config-pmap)# class NAT_CLASS
host1/Admin(config-pmap-c)# nat static 192.168.12.15 255.255.255.0 8080 vlan 200
(config-pmap-c) ssl-proxy
To associate the Secure Sockets Layer (SSL) client or server proxy service with the policy map, use the
ssl-proxy command. To remove the SSL proxy service from the policy map, use the no form of this
command.
Syntax Description client Associates an SSL client proxy service with the policy map. This
keyword is available only when building a Layer 7 policy map, where
the ACE acts as an SSL client device.
server Associates an SSL server proxy service with the policy map. This
keyword is available only when building a Layer 2 or Layer 3 policy
map, where the ACE acts as an SSL server device.
ssl_service_name Name of an existing SSL proxy service. Enter the name as an
unquoted text string with no spaces and a maximum of
64 alphanumeric characters.
Usage Guidelines This command requires the SSL feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Examples To associate the SSL proxy service with the policy map, enter:
host1/C1(config-pmap-c)# ssl-proxy server SSL_SERVER_PROXY_SERVICE
host1/C1(config-pmap-c)#
Syntax Description map_name Name assigned to the Layer 7 FTP command request class map. Enter an unquoted
text string with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the inspect feature in your user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
You associate the Layer 7 FTP command request inspection policy map within a Layer 3 and Layer 4
policy map to provide an entry point for the traffic classification. Layer 7 policy maps are considered to
be child policies and can be associated only within a Layer 3 and Layer 4 policy map. Only a Layer 3
and Layer 4 policy map can be activated on a VLAN interface. A Layer 7 policy map cannot be directly
applied on a VLAN (or any) interface.
To associate the Layer 7 FTP inspection policy map, you nest it by using the Layer 3 and Layer 4 inspect
ftp strict command (see the (config-pmap-c) inspect command).
(config-pmap-ftp-ins) class
To associate a Layer 7 File Transfer Protocol (FTP) inspection class map with a Layer 7 FTP inspection
policy map, use the class command. The prompt changes from (config-pmap-ftp-ins) to
(config-pmap-ftp-ins-c). For information on commands in this mode, see the “Policy Map FTP Inspection
Class Configuration Mode Commands” section. Use the no form of this command to remove an
associated class map from a policy map.
class name
no class name
Syntax Description name Name of a previously defined Layer 7 FTP command inspection class
map configured with the class-map command. Enter an unquoted
text string with no spaces and a maximum of 64 alphanumeric
characters.
Examples To associate a Layer 7 FTP inspection class map with a Layer 7 FTP inspection policy map, enter:
host/Admin(config)# policy-map type inspect ftp first-match FTP_INSPECT_L7POLICY
host/Admin(config-pmap-ftp-ins)# class FTP_INSPECT_L7CLASS
host1/Admin(config-pmap-ftp-ins-c)#
(config-pmap-ftp-ins) description
To provide a brief summary about the Layer 7 File Transfer Protocol (FTP) command inspection policy
map, use the description command. Use the no form of the command to remove the description from
the class map.
description text
no description text
Syntax Description text Description for the policy map. Enter an unquoted text string with a
maximum of 240 alphanumeric characters.
Examples To add a description that the policy map is to perform FTP command inspection, enter:
host1/Admin(config-pmap-ftp-ins)# description FTP command inspection of incoming traffic
no match name
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
ftp_command FTP command in the class map to be subjected to FTP inspection by
the ACE. The FTP commands are as follows:
• appe—Appends to a file.
• cd—Change to the specified directory.
• cdup—Changes to the parent of the current directory.
• dele—Deletes a file at the server side.
• get—Retrieves a file.
• help—Retrieves Help information from the server.
• mkd—Creates a directory.
• put—Stores a file.
• rmd—Removes a directory.
• rnfr—Renames from.
• rnto—Renames to.
• site—Specifies the server-specific command.
• stou—Stores a file with a unique name.
• syst—Gets system information.
Usage Guidelines The match command identifies the FTP command that you want filtered by the ACE.
You can specify multiple match request-method commands within a class map.
Examples To add an inline match command to a Layer 7 FTP command policy map, enter:
host/Admin(config-pmap-ftp-ins)# match FTP_REQUEST_MATCH request-method mkdir
host/Admin(config-pmap-ftp-ins-m)#
(config-pmap-ftp-ins-c) deny
To deny the FTP request commands specified in the class map by resetting the FTP session, use the deny
command. Use the no form of the command to return to the default state and permit all FTP request
commands to pass.
deny
no deny
Examples To instruct the ACE to deny the FTP request commands specified in the Layer 7 FTP inspection class
map by resetting the FTP session, enter:
host1/Admin(config)# policy-map type inspect ftp first-match FTP_INSPECT_L7POLICY
host1/Admin(config-pmap-ftp-ins)# class FTP_INSPECT_L7CLASS
host1/Admin(config-pmap-ftp-ins-c)# deny
(config-pmap-ftp-ins-c) mask-reply
To instruct the ACE to mask the reply to the FTP SYST command by filtering sensitive information from
the command output, use the mask-reply command. Use the no form of the command to disable the
masking of the system reply to the FTP SYST command.
mask-reply
no mask-reply
Usage Guidelines The mask-reply command is applicable only to the FTP SYST command and its associated reply. The
SYST command is used to find out the FTP server’s operating system type.
Examples To instruct the ACE to mask the reply to the FTP SYST command, enter:
host1/Admin(config)# policy-map type inspect ftp first-match FTP_INSPECT_L7POLICY
host1/Admin(config-pmap-ftp-ins)# class FTP_INSPECT_L7CLASS
host1/Admin(config-pmap-ftp-ins-c)# mask-reply
(config-pmap-ftp-ins-m) deny
To deny the FTP request commands specified in the inline match command by resetting the FTP session,
use the deny command. By default, the ACE allows all FTP commands to pass. Use the no form of the
command to return to the default state and permit all FTP request commands to pass.
deny
no deny
Examples To instruct the ACE to deny the FTP request commands specified in the Layer 7 FTP inspection class
map by resetting the FTP session, enter:
host1/Admin(config)# policy-map type inspect ftp first-match FTP_INSPECT_L7POLICY
host/Admin(config-pmap-ftp-ins)# match FTP_REQUEST_MATCH request-method mkdir
host/Admin(config-pmap-ftp-ins-m)# deny
(config-pmap-ftp-ins-m) mask-reply
To instruct the ACE to mask the system’s reply to the FTP SYST command by filtering sensitive
information from the command output, use the mask-reply command. Use the no form of the command
to disable the masking of the system reply to the FTP SYST command.
mask-reply
no mask-reply
Usage Guidelines The mask-reply command is applicable only to the FTP SYST command and its associated reply. The
SYST command is used to find out the FTP server’s operating system type.
Examples To instruct the ACE to mask the system’s reply to the FTP SYST command, enter:
host1/Admin(config)# policy-map type inspect ftp first-match FTP_INSPECT_L7POLICY
host/Admin(config-pmap-ftp-ins)# match FTP_REQUEST_MATCH request-method syst
host/Admin(config-pmap-ftp-ins-m)# mask-reply
Syntax Description map_name Name assigned to the Layer 7 HTTP deep packet inspection policy map. Enter an
unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the inspect feature in your user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
You associate the Layer 7 HTTP deep packet inspection policy map within a Layer 3 and Layer 4 policy
map to provide an entry point for the traffic classification. Layer 7 policy maps are considered to be child
policies and can only be associated within a Layer 3 and Layer 4 policy map. Only a Layer 3 and Layer
4 policy map can be activated on a VLAN interface. A Layer 7 policy map cannot be directly applied on
a VLAN (or any) interface.
To associate the Layer 7 HTTP inspection policy map, you nest it by using the Layer 3 and Layer 4
inspect http command (see the (config-pmap-c) inspect command).
Examples To create a Layer 7 HTTP deep packet inspection policy map, enter:
host/Admin(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY
host/Admin(config-pmap-ins-http)#
(config-pmap-ins-http) class
To associate a Layer 7 HTTP inspection class map with a Layer 7 HTTP inspection policy map, use the
class command. The prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-c). For
information on commands in this mode, see the “Policy Map Inspection HTTP Class Configuration Mode
Commands” section. Use the no form of this command to remove an associated class map from a policy
map.
Syntax Description name1 Name of a previously defined Layer 7 HTTP inspection class map
configured with the class-map command. Enter an unquoted text
string with no spaces and a maximum of 64 alphanumeric characters.
insert-before name2 (Optional) Places the current class map ahead of an existing class
map or inline match condition specified by the name2 argument in the
policy map configuration. The ACE does not save the sequence
reordering as part of the configuration.
class-default Associates a reserved, well-known class map created by the ACE.
You cannot delete or modify this class. All traffic that fails to meet
the other matching criteria in the named class map belongs to the
default traffic class. If none of the specified classifications matches
the traffic, then the ACE performs the action specified under the class
class-default command. The class-default class map has an implicit
match any statement in it that enables it to match all traffic.
Note By default, all matches are applied to both HTTP request and
response messages, but the class class-default command is
applied only to HTTP requests.
Examples To associate a Layer 7 HTTP inspection class map with a Layer 7 HTTP inspection policy map, enter:
host/Admin(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# class HTTP_INSPECT_L7CLASS
host1/Admin(config-pmap-ins-http-c)#
(config-pmap-ins-http) description
To provide a brief summary about the Layer 7 HTTP inspection policy map, use the description
command. Use the no form of the command to remove the description from the class map.
description text
no description
Syntax Description text Description for the policy map. Enter an unquoted text string with a
maximum of 240 alphanumeric characters.
Examples To add a description that the policy map is to perform HTTP deep packet inspection, enter:
host1/Admin(config-pmap-ins-http)# description HTTP protocol deep inspection of incoming
traffic
no match name
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
expression Content expression contained within the HTTP entity body. The
range is from 1 to 255 alphanumeric characters. See the “Usage
Guidelines” section for a list of the supported characters that you can
use in regular expressions.
offset number (Optional) Provides an absolute offset where the content expression
search string starts. The offset starts at the first byte of the message
body, after the empty line (CR, LF, CR, LF) between the headers and
the body of the message. The offset value is from 1 to 4000 bytes.
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines When you use the match content command, you access the policy map inspection HTTP match
configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m).
You can then specify the actions that the ACE should take when network traffic matches the specified
inline match command. For information on commands in this mode, see the “Policy Map Inspection HTTP
Match Configuration Mode Commands” section.
The ACE supports regular expressions for matching. Expressions are stored in a header map in the form
header-name: expression. Header expressions allow spaces, if the spaces are escaped or quoted.
Table 2-9 lists the supported characters that you can use in regular expressions.
Convention Description
.* Zero or more characters.
. Exactly one character.
\. Escaped character.
\xhh Any ASCII character as specified in a two-digit hex notation.
() Expression grouping.
Bracketed range [for Matches any single character from the range.
example, 0-9]
A leading ^ in a range Does not match any character in the range; all other characters represent
[^charset] themselves.
(expr1 | expr2) OR of expressions.
(expr)* 0 or more of expressions.
(expr)+ 1 or more of expressions.
(expr{m,n} Matches the previous item between m and n times; valid entries are from 1
to 255.
(expr{m} Matches the previous item exactly m times; valid entries are from 1 to 255.
(expr{m,} Matches the previous item m or more times; valid entries are from 1 to 255.
\a Alert (ASCII 7).
\b Backspace (ASCII 8).
\f Form-feed (ASCII 12).
\n New line (ASCII 10).
\r Carriage return (ASCII 13).
\t Tab (ASCII 9).
\v Vertical tab (ASCII 11).
\0 Null (ASCII 0).
.\\ Backslash.
Examples To specify a content expression contained within the entity body sent with an HTTP request, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# match MATCH1 content .*newp2psig
host1/Admin(config-pmap-ins-http-m)
match name content length {eq bytes | gt bytes | lt bytes | range bytes1 bytes 2} [insert-before
map_name]
no match name
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
eq bytes Specifies a value for the content parse length in an HTTP message
received by the ACE. Based on the policy map action, the ACE allows
or denies messages with a content length equal to the specified value.
Valid entries are from 1 to 65535 bytes.
gt bytes Specifies a minimum value for the content parse length in an HTTP
message received by the ACE. Based on the policy map action, the
ACE allows or denies messages with a content length greater than the
specified value. Valid entries are from 1 to 65535 bytes.
lt bytes Specifies a maximum value for the content parse length in an HTTP
message received by the ACE. Based on the policy map action, the
ACE allows or denies messages with a content length less than the
specified value. Valid entries are from 1 to 65535 bytes.
range bytes1 bytes Specifies a size range for the content parse length in an HTTP
message received by the ACE. Based on the policy map action, the
ACE allows or denies messages with a content length within this
range. The range is from 1 to 65535 bytes.
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines Messages that meet the specified criteria will be either allowed or denied based on the Layer 7 HTTP
deep packet inspection policy map action.
When you use the match content length command, you access the policy map inspection HTTP match
configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m).
You can then specify the actions that the ACE should take when network traffic matches the specified
inline match command. For information on commands in this mode, see the “Policy Map Inspection HTTP
Match Configuration Mode Commands” section.
Examples To define application inspection decisions in the HTTP content up to the configured maximum content
parse length, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# match MATCH2 content length eq 3495
host1/Admin(config-pmap-ins-http-m)
no match name
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines When you use the match content-type-verification command, you access the policy map inspection
HTTP match configuration mode and the prompt changes from (config-pmap-ins-http) to
(config-pmap-ins-http-m). You can then specify the actions that the ACE should take when network
traffic matches the specified inline match command. For information on commands in this mode, see the
“Policy Map Inspection HTTP Match Configuration Mode Commands” section.
This inline match condition limits the MIME types in HTTP messages allowed through the ACE. It
verifies that the header MIME-type value is in the internal list of supported MIME types and that the
header MIME type matches the actual content in the data or entity body portion of the message. If they
do not match, the ACE performs either the permit or reset policy map action.
The MIME-type HTTP inspection process searches the entity body of the HTTP message, which may
degrade performance of the ACE.
Examples To verify the content MIME-type messages with the header MIME type, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# match MATCH3 content-type-verification
host1/Admin(config-pmap-ins-http-m)
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
header_name Name of the HTTP header to match (for example,
www.example1.com). The range is from 1 to 64 alphanumeric
characters.
Note The header_name argument cannot include the colon in the
name of the HTTP header; the ACE rejects the colon as an
invalid token.
header_field Standard HTTP/1.1 header field. Valid selections include
request-header fields, general-header fields, and entity-header fields.
Selections also include two lower-level header-matching commands:
“length” and “mime-type.” The supported selections are as follows:
• Accept—Semicolon-separated list of representation schemes
(content type metainformation values) that will be accepted in
the response to the request.
• Accept-Charset—Character sets that are acceptable for the
response. This field allows clients capable of understanding
more comprehensive or special-purpose character sets to signal
that capability to a server that can represent documents in those
character sets.
Usage Guidelines When you use the match header command, you access the policy map inspection HTTP match
configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m).
You can then specify the actions that the ACE should take when network traffic matches the specified
inline match command. For information on commands in this mode, see the “Policy Map Inspection HTTP
Match Configuration Mode Commands” section.
The ACE supports the use of regular expressions for matching. Expressions are stored in a header map
in the form header-name: expression. Header expressions allow spaces if the spaces are escaped or
quoted. For a list of supported characters that you can use in regular expressions, see the “Usage
Guidelines” section for the (config-pmap-ins-http) match content command.
Examples To filter on the content and allow HTTL headers that contain the expression html, enter:
host1/Admin(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# match MATCH4 header accept header-value html
host1/Admin(config-pmap-ins-http-m)
match name header length {request | response} {eq bytes | gt bytes | lt bytes | range bytes1 bytes
2} [insert-before map_name]
no match name
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
request Specifies the size of the HTTP header request message that can be
received by the ACE.
response Specifies the size of the HTTP header response message sent by the
ACE.
eq bytes Specifies a value for the entity body in an HTTP message received by
the ACE. Based on the policy map action, the ACE allows or denies
messages with an entity body size equal to the specified value. Valid
entries are from 1 to 65535 bytes.
gt bytes Specifies a minimum value for the entity body in an HTTP message
received by the ACE. Based on the policy map action, the ACE allows
or denies messages with an entity body size greater than the specified
value. Valid entries are from 1 to 65535 bytes.
lt bytes Specifies a maximum value for the entity body in an HTTP message
received by the ACE. Based on the policy map action, the ACE allows
or denies messages with an entity body size less than the specified
value. Valid entries are from 1 to 65535 bytes.
range bytes1 bytes 2 Specifies a size range for the entity body in an HTTP message
received by the ACE. Based on the policy map action, the ACE allows
or denies messages with a entity body size within this range. The
range is from 1 to 65535 bytes.
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines When you use the match header length command, you access the policy map inspection HTTP match
configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m).
You can then specify the actions that the ACE should take when network traffic matches the specified
inline match command. For information on commands in this mode, see the “Policy Map Inspection HTTP
Match Configuration Mode Commands” section.
Examples To specify that the policy map match on HTTP traffic received with a length less than or equal to
3600 bytes in the entity body of the HTTP message, enter:
host1/Admin(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY
host1/Admin(config-pmap-http-insp)# match MATCH4 header length request eq 3600
host1/Admin(config-pmap-ins-http-m)
no match name
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
mime_type MIME type. The ACE includes a predefined list of MIME types, such
as image\Jpeg, text\html, application\msword, or audio\mpeg.
Choose whether only the MIME types included in this list are
permitted through the ACE firewall or whether all MIME types are
acceptable. The default behavior is to allow all MIME types.
The supported MIME types are as follows:
• application\msexcel
• application\mspowerpoint
• application\msword
• application\octet-stream
• application\pdf
• application\postscript
• application\x-gzip
• application\x-java-archive
• application\x-java-vm
• application\x-messenger
• application\zip
• audio\*
• audio\basic
• audio\midi
• audio\mpeg
• audio\x-adpcm
• audio\x-aiff
• audio\x-ogg
• audio\x-wav image \*
• image\gifimage\jpeg
• image\png
• image\tiff
• image\x-3ds
• image\x-bitmap
• image\x-niff
• image\x-portable-bitmap
• image\x-portable-greymap
• image\x-xpm
• text\*
• text\css
• text\html
• text\plain
• text\richtext
• text\sgml
• text\xmcd
• text\xml
• video\*
• video\flc
• video\mpeg
• video\quicktime
• video\sgi
• video\x-fli
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines When you use the match header mime-type command, you access the policy map inspection HTTP
match configuration mode and the prompt changes from (config-pmap-ins-http) to
(config-pmap-ins-http-m). You can then specify the actions that the ACE should take when network
traffic matches the specified inline match command. For information on commands in this mode, see the
“Policy Map Inspection HTTP Match Configuration Mode Commands” section.
MIME-type validation extends the format of Internet mail to allow non-US-ASCII textual messages,
nontextual messages, multipart message bodies, and non-US-ASCII information in message headers.
Examples To specify that the policy map permits MIME-type audio/midi messages through the ACE, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# match MATCH5 header mime-type audio\midi
host1/Admin(config-pmap-ins-http-m)#
no match name
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
im Defines the instant messaging application category. The ACE checks
for the Yahoo Messenger instant messaging application.
p2p Defines the peer-to-peer application category. The applications
checked include Kazaa and Gnutella.
tunneling Defines the tunneling application category. The applications checked
include HTTPort/HTTHost, GNU httptunnel, and FireThru.
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines The policy map detects the misuse of port 80 (or any other port running HTTP) for tunneling protocols
such as peer-to-peer (p2p) applications, tunneling applications, and instant messaging.
When you use the match port-misuse command, you access the policy map inspection HTTP match
configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m).
You can then specify the actions that the ACE should take when network traffic matches the specified
inline match command. For information on commands in this mode, see the “Policy Map Inspection HTTP
Match Configuration Mode Commands” section.
The port misuse application inspection process searches the entity body of the HTTP message, which
may degrade performance of the ACE.
The ACE disables the match port-misuse command by default. If you do not configure a restricted
HTTP application category, the default action by the ACE is to allow the applications without generating
a log.
Examples To specify that the policy map identifies peer-to-peer applications as restricted HTTP traffic, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# match MATCH6 port-misuse p2p
host1/Admin(config-pmap-ins-http-m)#
no match name
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
ext method Specifies an HTTP extension method. If the RFC request messages
does not contain one of the RFC 2616 HTTP request methods, the
ACE verifies if it is an extension method. The ACE supports the
inspection of the following HTTP request extension methods: copy,
edit, getattr, getattrname, getprops, index, lock, mkdir, move,
revadd, revlabel, revlog, revnum, save, setattr, startrev, stoprev,
unedit, and unlock.
rfc method Specifies an RFC 2616 HTTP request method that you want to
perform an RFC compliance check. The ACE supports the inspection
of the following RFC 2616 HTTP request methods: connect, delete,
get, head, options, post, put, and trace.
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines When you use the match request-method command, you access the policy map inspection HTTP match
configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m).
You can then specify the actions that the ACE should take when network traffic matches the specified
inline match command. For information on commands in this mode, see the “Policy Map Inspection HTTP
Match Configuration Mode Commands” section.
For unsupported HTTP request methods, include the inspect http strict command as an action in the
Layer 3 and Layer 4 policy map (see (config-pmap-c) inspect command).
The ACE disables the match request-method command by default. If you do not configure a request
method, the default action by the ACE is to allow the RFC 2616 HTTP request method without
generating a log.
Examples To specify that the policy map identifies the index HTTP RFC 2616 protocol for application inspection,
enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# match MATCH7 request-method ext index
host1/Admin(config-pmap-ins-http-m)#
no match name
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Examples When you use the match strict-http command, you access the policy map inspection HTTP match
configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m).
You can then specify the actions that the ACE should take when network traffic matches the specified
inline match command. For information on commands in this mode, see the “Policy Map Inspection HTTP
Match Configuration Mode Commands” section.
To configure the policy map to ensure that the internal compliance checks verify message compliance
with the HTTP RFC standard, RFC 2616, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# match MATCH8 strict-http
host1/Admin(config-pmap-ins-http-m)#
no match name
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
transfer-encoding Specifies the HTTP transfer-encoding type for the class map. The
coding_types possible values for coding_types are as follows:
• chunked—Message body transferred as a series of chunks.
• compress—Encoding format produced by the common UNIX
file compression program “compress.” This format is an adaptive
Lempel-Ziv-Welch coding (LZW).
• deflate—.zlib format defined in RFC 1950 with the deflate
compression mechanism described in RFC 1951.
• gzip—Encoding format produced by the file compression
program gzip (GNU zip) as described in RFC 1952. This format
is a Lempel-Ziv coding (LZ77) with a 32-bit CRC.
• identity—Default (identity) encoding, which does not require
the use of transformation.
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines When you use the match transfer-encoding command, you access the policy map inspection HTTP
match configuration mode and the prompt changes from (config-pmap-ins-http) to
(config-pmap-ins-http-m). You can then specify the actions that the ACE should take when network
traffic matches the specified inline match command. For information on commands in this mode, see the
“Policy Map Inspection HTTP Match Configuration Mode Commands” section.
The transfer-encoding general-header field indicates the type of transformation, if any, that has been
applied to the HTTP message body to safely transfer it between the sender and the recipient. When an
HTTP request message contains the configured transfer-encoding type, the ACE performs the configured
action in the policy map.
Each match transfer-encoding command configures a single application type.
The ACE disables the match transfer-encoding command by default.
Examples To configure the policy map to specify a chunked HTTP transfer encoding type to limit the HTTP traffic
that flows through the ACE, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# match MATCH9 transfer-encoding chunked
host1/Admin(config-pmap-ins-http-m)#
no match name
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
expression URL, or portion of a URL, to match. The URL string range is from 1
to 256 characters. Include only the portion of the URL that follows
www.hostname.domain in the match statement.
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines When you use the match url command, you access the policy map inspection HTTP match configuration
mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m). You can then
specify the actions that the ACE should take when network traffic matches the specified inline match
command. For information on commands in this mode, see the “Policy Map Inspection HTTP Match
Configuration Mode Commands” section.
Include only the portion of the URL that follows www.hostname.domain in the match statement. For
example, in the URL www.anydomain.com/latest/whatsnew.html, include only /latest/whatsnew.html.
To match the www.anydomain.com portion, the URL string can take the form of a URL regular
expression. The ACE supports the use of regular expressions for matching. For a list of the supported
characters that you can use in regular expressions, see the “Usage Guidelines” section for the
(config-pmap-ins-http) match content command.
The period (.) does not have a literal meaning in regular expressions. Use either brackets ([]) or the
backslash (\) character to match this symbol. For example, specify www[.]xyz[.]com instead of
www.xyz.com.
Examples To configure the policy map to define application inspection decisions based on a URL, enter
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# match MATCH_URL url whatsnew/latest.*
host1/Admin(config-pmap-ins-http-m)#
match name url length {eq bytes | gt bytes | lt bytes | range bytes1 bytes 2} [insert-before
map_name]
no match name
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
eq bytes Specifies a value for the HTTP URL length received by the ACE.
Based on the policy map action, the ACE allows or denies messages
with an HTTP URL length equal to the specified value. Valid entries
are from 1 to 65535 bytes.
gt bytes Specifies a minimum value for the HTTP URL length received by the
ACE. Based on the policy map action, the ACE allows or denies
messages with an HTTP URL length greater than the specified value.
Valid entries are from 1 to 65535 bytes.
lt bytes Specifies a maximum value for the HTTP URL length received by the
ACE. Based on the policy map action, the ACE allows or denies
messages with an HTTP URL length less than the specified value.
Valid entries are from 1 to 65535 bytes.
range bytes1 bytes Specifies a size range for the HTTP URL length received by the ACE.
Based on the policy map action, the ACE allows or denies messages
with an HTTP URL length within this range. The range is from 1 to
65535 bytes.
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines When you use the match url length command, you access the policy map inspection HTTP match
configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m).
You can then specify the actions that the ACE should take when network traffic matches the specified
inline match command. For information on commands in this mode, see the “Policy Map Inspection HTTP
Match Configuration Mode Commands” section.
Examples To specify that the policy map is to match on a URL with a length less than or equal to 10,000 bytes in
the request message, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# match MATCH10 url length eq 10000
host1/Admin(config-pmap-ins-http-m)#
(config-pmap-ins-http-c) permit
To allow the specified HTTP traffic to be received by the ACE if it passes the HTTP deep packet
inspection match criteria specified in the class map, use the permit command. Use the no form of the
command to disallow the specified HTTP traffic to be received by the ACE.
permit
no permit
Usage Guidelines By default, HTTP inspection allows traffic that does not match any of the configured Layer 7 HTTP deep
packet inspection matches. You can modify this behavior by including the class class-default command
with the reset action to deny the specified Layer 7 HTTP traffic. In this case, if none of the class matches
configured in the Layer 7 HTTP deep packet inspection policy map are hit, the class-default action will
be taken by the ACE. For example, you can include a class map to allow the HTTP GET method and use
the class class-default command to block all of the other requests.
Note By default, all matches are applied to both HTTP request and response messages, but the class
class-default command is applied only to HTTP requests.
Examples To allow the specified HTTP traffic to be received by the ACE if the class map match criteria in class
map L7HTTP_CHECK are met, enter:
host1/Admin(config)# policy-map inspect http all-match HTTP_DEEPINSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# class L7HTTP_CHECK
host1/Admin(config-pmap-ins-http-c)# permit
(config-pmap-ins-http-c) reset
To deny the specified HTTP traffic by sending a TCP reset message to the client or server to close the
connection, use the reset command. Use the no form of the command to allow the specified HTTP traffic
to be received by the ACE.
reset
no reset
Examples To deny the specified HTTP traffic to be received by the ACE if the class map match criteria in class map
L7HTTP_CHECK are met, enter:
host1/Admin(config)# policy-map inspect http all-match HTTP_DEEPINSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# class http_check
host1/Admin(config-pmap-ins-http-c)# reset
(config-pmap-ins-http-m) permit
To allow the specified HTTP traffic to be received by the ACE if it passes inspection of the match criteria
in an inline match condition, use the permit command. Use the no form of the command to disallow the
specified HTTP traffic to be received by the ACE.
permit
no permit
Usage Guidelines The default of the ACE is to permit HTTP traffic. For example, if a policy map explicitly permits the
HTTP GET method, other methods such as PUT will also be permitted. Only an explicit deny through
the reset command is capable of dropping traffic.
Examples To allow the specified HTTP traffic to be received by the ACE if the match criteria are met, enter:
host1/Admin(config)# policy-map inspect http all-match HTTP_DEEPINSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# match MATCH5 transfer-encoding chunked
host1/Admin(config-pmap-ins-http-m)# permit
(config-pmap-ins-http-m) reset
To deny the specified HTTP traffic by sending a TCP reset message to the client or server to close the
connection, use the reset command. Use the no form of the command to allow the specified HTTP traffic
to be received by the ACE.
reset
no reset
Examples To deny the specified HTTP traffic to be received by the ACE if the match criteria are met, enter:
host1/Admin(config)# policy-map inspect http all-match HTTP_DEEPINSPECT_L7POLICY
host1/Admin(config-pmap-ins-http)# match MATCH5 transfer-encoding chunked
host1/Admin(config-pmap-ins-http-m)# reset
Syntax Description map_name Name assigned to the Layer 7 SLB policy map. Enter an unquoted text string with no
spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the loadbalance feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
You associate the Layer 7 load balancing policy map within a Layer 3 and Layer 4 policy map to provide
an entry point for the traffic classification. Layer 7 policy maps are considered to be child policies and
can be associated only within a Layer 3 and Layer 4 policy map. Only a Layer 3 and Layer 4 policy map
can be activated on a VLAN interface. A Layer 7 policy map cannot be directly applied on a VLAN (or
any) interface.
To associate the Layer 7 load-balancing policy map, you nest it by using the Layer 3 and Layer 4
(config-pmap-c) loadbalance policy command.
(config-pmap-lb) class
To associate a Layer 7 server load balancing (SLB) class map with a Layer 7 SLB policy map, use the
class command. The prompt changes from (config-pmap-lb) to (config-pmap-lb-c). For information on
commands in this mode, see the “Policy Map Load Balancing Class Configuration Mode Commands”
section. Use the no form of this command to remove an associated class map from a policy map.
Syntax Description name1 Name of a previously defined Layer 7 SLB class map configured with
the class-map command. Enter an unquoted text string with no
spaces and a maximum of 64 alphanumeric characters.
insert-before name2 (Optional) Places the current named class map ahead of an existing
class map or inline match condition specified by the name2 argument
in the policy map configuration. The ACE does not save the sequence
reordering as part of the configuration.
class-default Reserved, well-known class map created by the ACE. You cannot
delete or modify this class. All traffic that fails to meet the other
matching criteria in the named class map belongs to the default traffic
class. If none of the specified classifications matches the traffic, then
the ACE performs the action specified under the class class-default
command. The class-default class map has an implicit match any
statement in it that enables it to match all traffic.
Examples To associate a Layer 7 SLB class map with a Layer 7 SLB policy map, enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# class L7LOADBALNCE_CLASS
(config-pmap-lb) description
To provide a brief summary about the Layer 7 server load balancing (SLB) policy map, use the
description command. Use the no form of the command to remove the description from the class map.
description text
no description
Syntax Description text Description for the policy map. Enter an unquoted text string with a
maximum of 240 alphanumeric characters.
Examples To add a description that the policy map is to perform server load balancing, enter:
host/Admin(config-pmap-lb)# description HTTP LOAD BALANCE PROTOCOL 1
match name1 http cookie {name2 | secondary name3} cookie-value expression [insert-before
map_name]
Syntax Description name1 Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
name2 Unique cookie name. Enter an unquoted text string with no spaces
and a maximum of 63 alphanumeric characters.
secondary name3 Specifies a cookie in a URL string. You can specify the delimiters for
cookies in a URL string using a command in an HTTP parameter
map.
cookie-value expression Specifies a unique cookie value expression. Enter an unquoted text
string with no spaces and a maximum of 255 alphanumeric
characters. The ACE supports regular expressions for matching
string expressions. For a list of supported characters that you can use
for matching string expressions, see the “Usage Guidelines” section
for the (config-pmap-ins-http) match content command.
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines When you use the match http cookie command, you access the policy map load balancing match
configuration mode and the prompt changes from (config-pmap-lb) to (config-pmap-lb-m). For
information on commands in this mode, see the “Policy Map Load Balancing Match Configuration Mode
Commands” section.
The ACE performs regular expression matching against the received packet data from a particular
connection based on the cookie expression. You can configure a maximum of five cookie names per VIP.
The ACE supports regular expressions for matching string expressions. For a list of supported characters
that you can use for matching string expressions, see the “Usage Guidelines” section for the
(config-pmap-ins-http) match content command.
For details on defining a list of ASCII-character delimiter strings that you can use to separate the cookies
in a URL string, see the Cisco 4700 Series Application Control Engine Appliance Server
Load-Balancing Configuration Guide.
Examples To specify that the Layer 7 SLB policy map load balances on a cookie with the name of testcookie1,
enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host/Admin(config-pmap-lb)# match MATCH2 http cookie testcookie1 cookie-value 123456
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
header_name Name of the HTTP header to match (for example,
www.example1.com.) The range is from 1 to 64 alphanumeric
characters.
Note The header_name argument cannot include the colon in the
name of the HTTP header; the ACE rejects the colon as an
invalid token.
header_field A standard HTTP/1.1 header field. Valid selections include
request-header fields, general-header fields, and the entity-header
field. The supported selections are the following:
• Accept—Semicolon-separated list of representation schemes
(content type metainformation values) that will be accepted in
the response to the request.
• Accept-Charset—Character sets that are acceptable for the
response. This field allows clients capable of understanding
more comprehensive or special-purpose character sets to signal
that capability to a server that can represent documents in those
character sets.
• Accept-Encoding—Restricts the content encoding that a user
will accept from the server.
• Accept-Language—ISO code for the language in which the
document is written. The language code is an ISO 3316 language
code with an optional ISO639 country code to specify a national
variant.
• Authorization—Specifies that the user agent wants to
authenticate itself with a server, usually after receiving a 401
response.
header-value expression Specifies the header value expression string to compare against the
value in the specified field in the HTTP header. The range is from 1
to 255 alphanumeric characters. For a list of supported characters that
you can use in regular expressions, see the “Usage Guidelines”
section for the (config-pmap-ins-http) match content command.
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines When you use the match http header command, you access the policy map load balancing match
configuration mode and the prompt changes from (config-pmap-lb) to (config-pmap-lb-m). For
information on commands in this mode, see the “Policy Map Load Balancing Match Configuration Mode
Commands” section.
The ACE supports regular expressions for matching. Expressions are stored in a header map in the form
header-name: expression. Header expressions allow spaces if the spaces are escaped or quoted. For a list
of supported characters that you can use in regular expressions, see the “Usage Guidelines” section for
the (config-pmap-ins-http) match content command.
Examples To specify that the Layer 7 SLB policy map load balances on an HTTP header named Host, enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# match match3 http header Host header-value .*cisco.com
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
expression URL, or portion of a URL, to match. Enter a URL string from 1 to
255 alphanumeric characters. Include only the portion of the URL
that follows www.hostname.domain in the match statement. For a list
of supported characters that you can use in regular expressions, see
the “Usage Guidelines” section for the (config-pmap-ins-http)
match content command.
method name (Optional) Specifies the HTTP method to match. Enter a method
name as an unquoted text string with no spaces and a maximum of
15 alphanumeric characters. The method can either be one of the
standard HTTP 1.1 method names (OPTIONS, GET, HEAD, POST,
PUT, DELETE, TRACE, or CONNECT) or a text string that must be
matched exactly (for example, PROTOPLASM).
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines When you use the match http url command, you access the policy map load balancing match
configuration mode and the prompt changes from (config-pmap-lb) to (config-pmap-lb-m). For
information on commands in this mode, see the “Policy Map Load Balancing Match Configuration Mode
Commands” section.
Include only the portion of the URL that follows www.hostname.domain in the match statement. For
example, in the URL www.anydomain.com/latest/whatsnew.html, include only /latest/whatsnew.html.
To match the www.anydomain.com portion, the URL string can take the form of a URL regular
expression. For a list of supported characters that you can use in regular expressions, see the “Usage
Guidelines” section for the (config-pmap-ins-http) match content command.
The period (.) does not have a literal meaning in regular expressions. Use either brackets ([]) or the
backslash (\) character to match this symbol. For example, specify www[.]xyz[.]com instead of
www.xyz.com.
Examples To specify that the Layer 7 SLB policy map load balances on a specific URL, enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# match match3 http url whatsnew/latest.*
To use regular expressions to emulate a wildcard search to match on any .gif file, enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# match match3 http url .*.gif
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
ip_address Source IP address of the client. Enter the IP address in
dotted-decimal notation (for example, 192.168.11.1).
mask Subnet mask of the client entry in dotted-decimal notation (for
example, 255.255.255.0).
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines When you use the match source-address command, you access the policy map load balancing match
configuration mode and the prompt changes from (config-pmap-lb) to (config-pmap-lb-m). For
information on commands in this mode, see the “Policy Map Load Balancing Match Configuration Mode
Commands” section.
Examples To specify that the Layer 7 SLB policy map matches on source IP address 192.168.10.1 255.255.0.0,
enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# match match3 source-address 192.168.10.1 255.255.0.0
(config-pmap-lb-c) compress
To instruct the ACE to compress and encode packets that match a Layer 7 SLB policy map, use the
compress command. Use the no form of this command to disable HTTP compression.
Syntax Description deflate Specifies the deflate compression method as the method to use when
the client browser supports both deflate and gzip compression
methods.
gzip Specifies the gzip compression method as the method to use when the
client browser supports both deflate and gzip compression methods.
Usage Guidelines The compress command option displays only when you associate an HTTP-type class map with a policy
map.
When a client request specifies deflate or gzip encoding in the Accept-Encoding field, the ACE uses
either deflate or gzip to compress and encode the response content to the client. If both encoding formats
are specified in the Accept-Encoding field, the response from the ACE will be encoded according to the
compress default-method command in the Layer 7 SLB policy map.
HTTP compression is intended primarily for text-based content types. For example, the following are
text-based content types:
• text/html
• text/plain
• text/xml
• text/css
• application/x-javascript
By default, the ACE supports HTTP compression at rates of 100 megabits per second (Mbps). Installing
an optional HTTP compression license allows you to increase this value to a maximum of 1 Gbps. See
the Cisco 4700 Series Application Control Engine Appliance Administration Guide for information on
ACE licensing options.
When you enable HTTP compression, the ACE compresses the packets using the following default
compression parameter values:
• Multipurpose Internet Mail Extension (MIME) type—All text formats (text/.*)
• Minimum content length size—512 bytes
• User agent exclusion—No user agent is excluded
You can create an HTTP parameter map to modify the compression parameters that the ACE uses (see
the “Parameter Map Connection Configuration Mode Commands” section).
Examples To enable compression and specify gzip as the HTTP compression method when both formats are
included in the Accept-Encoding client request, enter, enter:
host1/Admin(config-pmap-lb-c)# compress default-method gzip
(config-pmap-lb-c) drop
To instruct the ACE to discard packets that match a particular load-balancing criteria in the class map,
use the drop command. Use the no form of this command to reset the ACE to its default of accepting
packets from the policy map.
drop
no drop
Examples To instruct the ACE to discard packets that match a particular load-balancing criteria in the class map,
enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# class L7SLBCLASS
host1/Admin(config-pmap-lb-c)# drop
(config-pmap-lb-c) forward
To instruct the ACE to forward requests that match a particular policy map without performing load
balancing on the request, use the forward command. Use the no form of this command to reset the ACE
to its default of load balancing packets from the policy map.
forward
no forward
Examples To instruct the ACE to forward requests that match a particular policy map without performing load
balancing on the request, enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# class L7SLBCLASS
host1/Admin(config-pmap-lb-c)# forward
(config-pmap-lb-c) insert-http
To specify the name and value of a generic header field that you want the ACE to insert in the HTTP
header, use the insert-http command. Use the no form of this command to delete the HTTP header name
and value from the policy map.
Syntax Description name Name of the generic header field that you want the ACE to insert in
the HTTP header. Enter an unquoted text string with no spaces and a
maximum of 64 alphanumeric characters.
header-value expression Specifies the header-value expression string to insert in the specified
field in the HTTP header. Enter a text string with a maximum of
512 alphanumeric characters. See the Cisco 4700 Series Application
Control Engine Appliance Server Load-Balancing Configuration
Guide for details.
Usage Guidelines To identify a client whose source IP address has been mapped to another IP address using NAT, you can
instruct the ACE to insert a generic header and string value in the client HTTP request. (For information
about NAT, see the Cisco 4700 Series Application Control Engine Appliance Security Configuration
Guide.)
For the name argument, you can specify any custom header name that you want, subject to the maximum
character length. You can also enter any of the predefined header names described for the
(config-pmap-lb) match http header command, regardless of whether that header name already exists
in the client request header. The ACE does not overwrite any existing header information in the client
request.
You can enter a maximum of 512 bytes of data for the header expression. If you enter more than
512 bytes, the ACE does not insert the header name and expression in the client request.
You can also specify the following special header-value expressions by using the following special
parameter values:
• %is—Inserts the source IP address in the HTTP header.
• %id—Inserts the destination IP address in the HTTP header.
• %ps—Inserts the source port in the HTTP header.
• %pd—Inserts the destination port in the HTTP header.
For Microsoft Outlook Web Access (OWA), specify the field name as HTTP_FRONT_END_HTTPS
with a value of ON.
If either TCP server reuse or persistence rebalance is enabled, the ACE inserts a header in every client
request.
Examples For example, to specify the insert-http command as an action in the Layer 7 load-balancing policy map,
enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# class L7SLBCLASS
host1/Admin(config-pmap-lb-c)# insert-http Host header-value www.cisco.com
(config-pmap-lb-c) serverfarm
To load balance a client request for content to a server farm, use the serverfarm command. Server farms
are groups of networked real servers that contain the same content and reside in the same physical
location. Use the no form of this command to remove the server-farm action from the Layer 7
load-balancing policy map.
Syntax Description name1 Unique identifier of the server farm. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
backup name2 (Optional) Designates an existing server farm as a backup server farm
if the original server farm becomes unavailable. Enter the name of an
existing server farm that you want to designate as a backup server
farm. Enter an unquoted text string with no spaces and a maximum
of 64 alphanumeric characters.
sticky (Optional) Specifies that the sticky group associated with the policy
and applied to the primary server farm configured in that policy is
also applied to the backup server farm. See the Cisco 4700 Series
Application Control Engine Appliance Server Load-Balancing
Configuration Guide for details.
aggregate-state (Optional) Specifies that the state of the specified server farm is tied
to the state of all the real servers in that server farm and in the backup
server farm if configured. The ACE declares the primary server farm
down if all real servers in the primary server farm and all real servers
in the backup server farm are down.
Usage Guidelines If all servers in the server farm fail and you do not configure a backup server farm, the ACE sends a reset
(RST) to a client in response to a content request.
When you specify the sticky option, the ACE sends requests from the same client to the same configured
real server in the primary server farm. If all real servers in the primary server farm fail, the ACE sends
client requests to the backup server farm. If the primary server farm is sticky and you configured the
sticky option, the backup server farm also becomes sticky. When the real server in the primary server
farm becomes available again, the backup server farm continues to service existing connections. The
ACE sends new connections from the same client to the backup server farm if it is sticky; otherwise, the
ACE sends new connections to the primary server farm.
Examples To specify the serverfarm command as an action in the load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# class L7SLBCLASS
host1/Admin(config-pmap-lb-c)# serverfarm FARM2 backup FARM3 sticky
Syntax Description value IP DSCP value. Enter an integer from 0 to 63. The default is 0.
Usage Guidelines For details about the ToS byte, see RFC 791, RFC 1122, RFC 1349, and RFC 3168.
Examples The following example specifies the set ip tos command as a QoS action in the Layer 7 load-balancing
policy map. All packets that satisfy the match criteria of L7SLBCLASS are marked with the IP DSCP
value of 8. How packets marked with the IP DSCP value of 8 are treated is determined by the network
configuration.
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# class L7SLBCLASS
host1/Admin(config-pmap-lb-c)# set ip tos 8
Syntax Description name Name of an existing SSL proxy service. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines For more information about configuring SSL, see the Cisco 4700 Series Application Control Engine
Appliance SSL Configuration Guide.
Examples To associate an SSL proxy service with a Layer 7 load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# class L7SLBCLASS
host1/Admin(config-pmap-lb-c)# ssl-proxy client SSL_SERVER_PROXY_SERVICE
(config-pmap-lb-c) sticky-serverfarm
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm,
use the sticky-serverfarm command. Use the no form of this command to remove a sticky group from
the policy map.
sticky-serverfarm name
no sticky-serverfarm name
Syntax Description name Name of an existing sticky group. Enter an unquoted text string with
no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines For information about sticky groups, see the Cisco 4700 Series Application Control Engine Appliance
Server Load-Balancing Configuration Guide.
Examples To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm,
enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# class L7SLBCLASS
host1/Admin(config-pmap-lb-c)# sticky-serverfarm STICKY_GROUP1
(config-pmap-lb-m) drop
To instruct the ACE to discard packets that match a particular load-balancing criteria in an inline match
command, use the drop command. Use the no form of this command to reset the ACE to its default of
accepting packets from the policy map.
drop
no drop
Examples To instruct the ACE to discard packets that match a particular load-balancing criteria in the class map,
enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# match MATCH_SLB1 http header Host header-value .*cisco.com
host1/Admin(config-pmap-lb-m)# drop
(config-pmap-lb-m) forward
To instruct the ACE to forward requests that match a particular policy map without performing load
balancing on the request, use the forward command. Use the no form of this command to reset the ACE
to its default of load balancing packets from the policy map.
forward
no forward
Examples To instruct the ACE to forward requests that match a particular policy map without performing load
balancing on the request, enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# match MATCH_SLB1 http header Host header-value .*cisco.com
host1/Admin(config-pmap-lb-m)# forward
(config-pmap-lb-m) insert-http
To specify the name and value of an HTTP header for Layer 7 load balancing, use the insert-http
command. Use the no form of this command to delete the HTTP header name and value from the policy
map.
Syntax Description name Name of the generic header field that you want the ACE to insert in
the HTTP header. Enter an unquoted text string with no spaces and a
maximum of 64 alphanumeric characters.
header-value expression Specifies the header-value expression string to insert in the specified
field in the HTTP header. Enter a text string with a maximum of
255 alphanumeric characters. See the Cisco 4700 Series Application
Control Engine Appliance Server Load-Balancing Configuration
Guide for details.
Usage Guidelines To identify a client whose source IP address has been mapped to another IP address using NAT, you can
instruct the ACE to insert a generic header and string value in the client HTTP request. (For information
about NAT, see the Cisco 4700 Series Application Control Engine Appliance Security Configuration
Guide.)
For the name argument, you can specify any custom header name that you want, subject to the maximum
character length. You can also enter any of the predefined header names described for the
(config-pmap-lb) match http header command, regardless of whether that header name already exists
in the client request header. The ACE does not overwrite any existing header information in the client
request.
You can also specify the following special header-value expressions using the following special
parameter values:
• %is—Inserts the source IP address in the HTTP header.
• %id—Inserts the destination IP address in the HTTP header.
• %ps—Inserts the source port in the HTTP header.
• %pd—Inserts the destination port in the HTTP header.
For Microsoft Outlook Web Access (OWA), specify the field name as HTTP_FRONT_END_HTTPS
with a value of ON.
With either TCP server reuse or persistence rebalance enabled, the ACE inserts a header in every client
request.
Examples For example, to specify the insert-http command as an action in the Layer 7 load-balancing policy map,
enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# match MATCH_SLB1 http header Host header-value .*test.com
host1/Admin(config-pmap-lb-m)# insert-http Host header-value .*cisco.com
The header name and value will appear in the HTTP header as:
Host: www.cisco.com
(config-pmap-lb-m) serverfarm
To load-balance a client request for content to a server farm, use the serverfarm command. Server farms
are groups of networked real servers that contain the same content and reside in the same physical
location. Use the no form of this command to remove the server-farm action from the Layer 7 load
balancing policy map.
Syntax Description name1 Unique identifier of the server farm. Enter an unquoted text string
with no spaces and a maximum of 64 characters.
backup name2 (Optional) Designates an existing server farm as a backup server farm
if the original server farm becomes unavailable. Enter the name of an
existing server farm that you want to designate as a backup server
farm. Enter an unquoted text string with no spaces and a maximum
of 64 characters.
sticky (Optional) Specifies that the sticky group associated with the policy
and applied to the primary server farm configured in that policy is
also applied to the backup server farm. See the Cisco 4700 Series
Application Control Engine Appliance Server Load-Balancing
Configuration Guide for details.
aggregate-state (Optional) Specifies that the state of the specified server farm is tied
to the state of all the real servers in that server farm and in the backup
server farm if configured. The ACE declares the primary server farm
down if all real servers in the primary server farm and all real servers
in the backup server farm are down.
Usage Guidelines If all servers in the server farm fail and you do not configure a backup server farm, the ACE sends a reset
(RST) to a client in response to a content request.
When you specify the sticky option, the ACE sends requests from the same client to the same configured
real server in the primary server farm. If all real servers in the primary server farm fail, the ACE sends
client requests to the backup server farm. If the primary server farm is sticky and you configured the
sticky option, the backup server farm also becomes sticky. When the real server in the primary server
farm becomes available again, the backup server farm continues to service existing connections. The
ACE sends new connections from the same client to the backup server farm if it is sticky; otherwise, the
ACE sends new connections to the primary server farm.
Examples To specify the serverfarm command as an action in the load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# match MATCH_SLB1 source-address 192.168.11.2 255.255.255.0
host1/Admin(config-pmap-lb-m)# serverfarm FARM2 backup FARM3 sticky
Syntax Description value IP DSCP value. Enter an integer from 0 to 63. The default is 0.
Usage Guidelines For details about the ToS byte, see RFC 791, RFC 1122, RFC 1349, and RFC 3168.
Examples To specify the set ip tos command as a QoS action in the Layer 7 load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# match MATCH_SLB1 http header Via header-value 192.*
host1/Admin(config-pmap-lb-m)# set ip tos 8
Syntax Description name Name of an existing SSL proxy service. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines For more information about configuring SSL, see the Cisco 4700 Series Application Control Engine
Appliance SSL Configuration Guide.
Examples To associate an SSL proxy service with a Layer 7 load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# match MATCH_SLB1 http header Host header-value .*cisco.com
host1/Admin(config-pmap-lb-m)# ssl-proxy client SSL_SERVER_PROXY_SERVICE
(config-pmap-lb-m) sticky-serverfarm
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm,
use the sticky-serverfarm command. Use the no form of this command to remove a sticky group from
the policy map.
sticky-serverfarm name
no sticky-serverfarm name
Syntax Description name Name of an existing sticky group. Enter an unquoted text string with
no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines For information about sticky groups, see the Cisco 4700 Series Application Control Engine Appliance
Server Load-Balancing Configuration Guide.
Examples To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm,
enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY
host1/Admin(config-pmap-lb)# match MATCH_SLB1 source-address 192.168.11.2 255.255.255.0
host1/Admin(config-pmap-lb-m)# sticky-serverfarm STICKY_GROUP1
Syntax Description map_name Name assigned to the Layer 3 and Layer 4 network management
policy map. Enter an unquoted text string with no spaces and a
maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the context Admin user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Examples To create a Layer 3 and Layer 4 network traffic management policy map, enter:
host1/Admin(config)# policy-map type management first-match L4_REMOTE_MGMT_ALLOW_POLICY
host1/Admin(config-pmap-mgmt)#
(config-pmap-mgmt) class
To associate a Layer 3 and Layer 4 management protocol class map with a Layer 3 and Layer 4 traffic
management policy map, use the class command. The prompt changes from (config-pmap-mgmt) to
(config-pmap-mgmt-c). For information on commands in this mode, see the “Policy Map Management
Class Configuration Mode Commands” section. Use the no form of this command to remove an
associated class map from a policy map.
Syntax Description name1 Name of a previously defined Layer 3 and Layer 4 management
protocol class map configured with the class-map command. Enter
an unquoted text string with no spaces and a maximum of 64
alphanumeric characters.
insert-before name2 (Optional) Places the current class map ahead of an existing class
map or inline match condition specified by the name2 argument in the
policy map configuration. The ACE does not save the sequence
reordering as part of the configuration. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
class-default Reserved, well-known class map created by the ACE. You cannot
delete or modify this class. All traffic that fails to meet the other
matching criteria in the named class map belongs to the default traffic
class. If none of the specified classifications matches the traffic, then
the ACE performs the action specified under the class class-default
command. The class-default class map has an implicit match any
statement in it enabling it to match all traffic.
(config-pmap-mgmt) description
To provide a brief summary about the Layer 3 and Layer 4 management protocol policy map, use the
description command. Use the no form of the command to remove the description from the class map.
description text
no description
Syntax Description text Description for the policy map. Enter an unquoted text string with a
maximum of 240 alphanumeric characters.
Examples To add a description that the policy map is to allow remote Telnet access, enter:
host1/Admin(config-pmap-mgmt)# description Allow Telnet access to the ACE
(config-pmap-mgmt-c) deny
To deny the specified IP network management protocol, use the deny command. Use the no form of the
command to allow the specified IP network management protocol to be received by the ACE.
deny
no deny
Examples To deny the specified IP network management protocol by the ACE, enter:
host1/Admin(config-pmap-mgmt)# class SSH_CLASS
host1/Admin(config-pmap-mgmt-c)# deny
(config-pmap-mgmt-c) permit
To allow the IP network management protocols listed in the associated Layer 3 and Layer 4 management
class map to be received by the ACE, use the permit command. Use the no form of the command to
disallow the specified IP network management protocols to be received by the ACE.
permit
no permit
Examples To permit the specified IP network management protocol by the ACE, enter:
host1/Admin(config-pmap-mgmt)# class SSH_CLASS
host1/Admin(config-pmap-mgmt-c)# permit
Syntax Description map_name Name assigned to the Layer 7 optimization HTTP policy map. Enter
an unquoted text string with no spaces and a maximum of 64
alphanumeric characters.
Usage Guidelines The commands in this mode require the loadbalance feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
Examples To create a Layer 7 optimization HTTP policy map named L7OPTIMIZATION_POLICY, enter:
host/Admin(config)# policy-map type optimization http first-match L7OPTIMIZATION_POLICY
host/Admin(config-pmap-optmz)#
(config-pmap-optmz) class
To associate a Layer 7 SLB class map with a Layer 7 optimization HTTP policy map, use the class
command. The prompt changes from (config-pmap-optmz) to (config-pmap-optmz-c). For information
on commands in this mode, see the “Policy Map Optimization Class Configuration Mode Commands”
section. Use the no form of this command to remove an associated class map from a policy map.
Syntax Description name1 Name of a previously defined Layer 7 SLB class map configured with
the class-map command. Enter an unquoted text string with no
spaces and a maximum of 64 alphanumeric characters.
insert-before name2 (Optional) Places the current class map ahead of an existing class
map or inline match condition specified by the name2 argument in the
policy map configuration. The ACE does not save the sequence
reordering as part of the configuration. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
class-default Reserved, well-known class map created by the ACE. You cannot
delete or modify this class. All traffic that fails to meet the other
matching criteria in the named class map belongs to the default traffic
class. If none of the specified classifications matches the traffic, then
the ACE performs the action specified under the class class-default
command. The class-default class map has an implicit match any
statement in it that enables it to match all traffic.
(config-pmap-optmz) description
To provide a brief summary about the Layer 7 optimization HTTP policy map, use the description
command. Use the no form of the command to remove the description from the class map.
description text
no description
Syntax Description text Description for the policy map. Enter an unquoted text string with a
maximum of 240 alphanumeric characters.
Examples To add a description that the policy map is to perform delta optimization, enter:
host1/Admin(config-pmap-optmz)# description This policy map performs delta optimization
match name1 http cookie {name2 | secondary name3} cookie-value expression [insert-before
map_name]
Syntax Description name1 Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
name2 A unique cookie name. Enter an unquoted text string with no spaces
and a maximum of 63 alphanumeric characters.
secondary name3 Specifies a cookie in a URL string. You can specify the delimiters for
cookies in a URL string using a command in an HTTP parameter
map.
cookie-value expression Specifies a unique cookie value expression. Enter an unquoted text
string with no spaces and a maximum of 255 alphanumeric
characters. The ACE supports regular expressions for matching
string expressions. For a list of supported characters that you can use
for matching string expressions, see the “Usage Guidelines” section
for the (config-pmap-ins-http) match content command.
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines When you use the match http cookie command, you access the policy map optimization match
configuration mode and the prompt changes from (config-pmap-optmz) to (v-m). For information on the
load-balancing commands in this mode, see the “Policy Map Load Balancing Match Configuration Mode
Commands” section.
The ACE performs regular expression matching against the received packet data from a particular
connection based on the cookie expression. You can configure a maximum of five cookie names per VIP.
The ACE supports regular expressions for matching string expressions. For a list of supported characters
that you can use for matching string expressions, see the “Usage Guidelines” section for the
(config-pmap-ins-http) match content command.
For details on defining a list of ASCII-character delimiter strings that you can use to separate the cookies
in a URL string, see the Cisco 4700 Series Application Control Engine Appliance Server
Load-Balancing Configuration Guide.
Examples To specify that the Layer 7 optimization policy map load balances on a cookie with the name of
testcookie1, enter:
host/Admin(config)# policy-map type optimization http first-match L7OPTIMIZATION_POLICY
host/Admin(config-pmap-optmz)# match MATCH2 http cookie testcookie1 cookie-value 123456
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
header_name Name of the HTTP header to match (for example,
www.example1.com.) The range is from 1 to 64 alphanumeric
characters.
Note The header_name argument cannot include the colon in the
name of the HTTP header; the ACE rejects the colon as an
invalid token.
header_field A standard HTTP/1.1 header field. Valid selections include
request-header fields, general-header fields, and the entity-header
field. Selections also include two lower-level header-matching
commands: “length” and “mime-type.” The supported selections are
the following:
• Accept—Specifies a semicolon-separated list of representation
schemes (content type metainformation values) that will be
accepted in the response to the request.
Usage Guidelines The ACE performs regular expression matching against the received packet data from a particular
connection based on the HTTP header expression.
When you use the match http header command, you access the policy map optimization match
configuration mode and the prompt changes from (config-pmap-optmz) to (config-pmap-optmz-m). For
information on the load-balancing commands in this mode, see the “Policy Map Load Balancing Match
Configuration Mode Commands” section.
The ACE supports regular expressions for matching. Expressions are stored in a header map in the form
header-name: expression. Header expressions allow spaces, if the spaces are escaped or quoted. For a
list of supported characters that you can use in regular expressions, see the “Usage Guidelines” section
for the (config-pmap-ins-http) match content command.
Examples To specify that the Layer 7 optimization policy map load balances on an HTTP header named Host,
enter:
host/Admin(config)# policy-map type optimization http first-match L7OPTIMIZATION_POLICY
host1/Admin(config-pmap-optmz)# match match3 http header Host header-value .*cisco.com
Syntax Description name Name assigned to the inline match command. Enter an unquoted text
string with no spaces. The length of the inline match statement name
plus the length of the policy map name with which it is associated
cannot exceed a total maximum of 64 alphanumeric characters. For
example, if the policy map name is L7_POLICY (nine characters), an
inline match statement name under this policy cannot exceed 55
alphanumeric characters (64 - 9 = 55).
expression URL, or portion of a URL, to match. Enter a URL string from 1 to
255 alphanumeric characters. Include only the portion of the URL
that follows www.hostname.domain in the match statement. For a list
of supported characters that you can use in regular expressions, see
the “Usage Guidelines” section for the (config-pmap-ins-http)
match content command.
method name (Optional) Specifies the HTTP method to match. Enter a method
name as an unquoted text string with no spaces and a maximum of
15 alphanumeric characters. The method can either be one of the
standard HTTP 1.1 method names (OPTIONS, GET, HEAD, POST,
PUT, DELETE, TRACE, or CONNECT) or a text string that must be
matched exactly (for example, PROTOPLASM).
insert-before map_name (Optional) Places the inline match command ahead of an existing
class map in the policy map configuration.
Usage Guidelines The ACE performs regular expression matching against the received packet data from a particular
connection based on the HTTP URL string.
When you use the match http url command, you access the policy map optimization match
configuration mode and the prompt changes from (config-pmap-optmz) to (config-pmap-optmz-m). For
information on the load-balancing commands in this mode, see the “Policy Map Load Balancing Match
Configuration Mode Commands” section.
Include only the portion of the URL that follows www.hostname.domain in the match statement. For
example, in the URL www.anydomain.com/latest/whatsnew.html, include only /latest/whatsnew.html.
To match the www.anydomain.com portion, the URL string can take the form of a URL regular
expression. For a list of supported characters that you can use in regular expressions, see the “Usage
Guidelines” section for the (config-pmap-ins-http) match content command.
The period (.) does not have a literal meaning in regular expressions. Use either brackets ([]) or the
backslash (\) character to match this symbol. For example, specify www[.]xyz[.]com instead of
www.xyz.com.
Examples To specify that the Layer 7 optimization policy map load balances on a specific URL, enter:
host/Admin(config)# policy-map type optimization http first-match L7OPTIMIZATION_POLICY
host1/Admin(config-pmap-optmz)# match match3 http url whatsnew/latest.*
To use regular expressions to emulate a wildcard search to match on any .gif file, enter:
host/Admin(config)# policy-map type optimization http first-match L7OPTIMIZATION_POLICY
host1/Admin(config-pmap-optmz)# match match3 http url .*.gif
(config-pmap-optmz-c) action
To perform a specific set of application acceleration actions, use the action command. The Layer 7
optimization HTTP policy map activates the use of an optimization HTTP action list to configure the
specified application acceleration and optimization actions. See Cisco 4700 Series Application Control
Engine Appliance Application Acceleration and Optimization Configuration Guide for details on
creating an optimization HTTP action list. Use the no form of the command to remove the action list
from the policy map.
Syntax Description list_name Unique name of an existing action list as an unquoted text string with
a maximum of 64 alphanumeric characters. The action command
groups the application acceleration functions associated with the
specified action list that apply to a specific type of operation.
parameter map_name (Optional) Specifies optimization-related commands that pertain to
application acceleration performed by the ACE. A parameter map
groups the application acceleration functions that adjust or control
the actions specified in an associated action list. The map_name
argument specifies a unique name of an existing parameter map as an
unquoted text string with a maximum of 64 alphanumeric characters.
Usage Guidelines Optionally, you can specify an optimization HTTP parameter list in an optimization HTTP policy map
to identify the association between the action list and the parameter map. The optimization HTTP action
list defines what to do while the optimization HTTP parameter map defines the specific details about
how to accomplish the application acceleration action. Refer to Cisco 4700 Series Application Control
Engine Appliance Application Acceleration and Optimization Configuration Guide for details on
creating an optimization HTTP parameter map.
Examples To associate an existing action list with an existing parameter map to control the actions in the Layer 7
HTTP optimization policy map, enter:
host/Admin(config)# policy-map type optimization http first-match L7OPTIMIZATION_POLICY
host1/Admin(config-pmap-optmz)# class L7SLBCLASS
host1/Admin(config-pmap-optmz-c)# action ACT_LIST1 parameter OPTIMIZE_PARAM_MAP
To remove the action list from the Layer 7 HTTP optimization policy map, enter:
host1/Admin(config-pmap-optmz-c)# no action ACT_LIST1 parameter OPTIMIZE_PARAM_MAP
(config-pmap-optmz-m) action
To perform a specific set of application acceleration actions, use the action command. The Layer 7
optimization HTTP policy map activates the use of an optimization HTTP action list to configure the
specified application acceleration optimization actions. Refer to the Cisco 4700 Series Application
Control Engine Appliance Application Acceleration and Optimization Configuration Guide for details
on creating an optimization HTTP action list. Use the no form of the command to remove the action list
from the policy map.
Syntax Description list_name Unique name of an existing action list as an unquoted text string with
a maximum of 64 alphanumeric characters. The action command
groups the application acceleration functions associated with the
specified action list that apply to a specific type of operation.
parameter map_name (Optional) Specifies optimization-related commands that pertain to
application acceleration performed by the ACE. A parameter map
groups the application acceleration functions that adjust or control
the actions specified in an associated action list. The map_name
argument specifies a unique name of an existing parameter map as an
unquoted text string with a maximum of 64 alphanumeric characters.
Usage Guidelines Optionally, you can specify an optimization HTTP parameter list in an optimization HTTP policy map
to identify the association between the action list and the parameter map. In this case, the optimization
HTTP action list defines what to do while the optimization HTTP parameter map defines the specific
details about how to accomplish the application acceleration action. Refer to the Cisco 4700 Series
Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide
for details on creating an optimization HTTP parameter map.
Examples To associate an existing action list with an existing parameter map to control the match command action
in the Layer 7 HTTP optimization policy map, enter:
host/Admin(config)# policy-map type optimization http first-match L7OPTIMIZATION_POLICY
host1/Admin(config-pmap-optmz)# match match3 http url .*.gif
host1/Admin(config-pmap-optmz-m)# action ACT_LIST1 parameter OPTIMIZE_PARAM_MAP
To remove the action list from the Layer 7 HTTP optimization policy map, enter:
host1/Admin(config-pmap-optmz-m)# no action ACT_LIST1 parameter OPTIMIZE_PARAM_MAP
Syntax Description probe_type Type of probe to configure. The probe type determines what the probe sends
to the server. Enter one of the following types:
• dns—Sends a request to a DNS server that gives it a configured domain
(by default, the domain is www.cisco.com). To determine if the server
is up, the ACE must receive one of the configured IP addresses for that
domain.
• echo {tcp | udp}—Sends a specified string to the server and compares
the response with the original string. You must configure the string that
needs to be echoed. If the response string matches the original string,
the server is marked as passed. If you do not configure a string, the
probe behaves like a TCP or UDP probe and you must do one of the
following:
– If the probe uses a TCP connection, use the tcp keyword to
configure TCP attributes.
– If the probe uses a UDP connection, use the udp keyword to
configure UDP attributes.
Usage Guidelines This command requires the probe feature in your user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
Examples To define a TCP probe named PROBE, and access its mode, enter:
host1/Admin(config)# probe tcp PROBE1
host1/Admin(config-probe-tcp)#
To delete the TCP probe named PROBE1 for TCP and access its mode, enter:
host1/Admin(config)# probe tcp PROBE1
Command Modes ECHO TCP, Finger, FTP, HTTP, HTTPS, IMAP, POP, SMTP, TCP, and Telnet probe configuration
modes
Admin and user contexts
Examples To terminate a TCP connection by sending a RST for a TCP probe, enter:
host1/Admin(config-probe-tcp)# connection term forced
(config-probe-probe_type) credentials
To configure the credentials for username and password authentication of a probe to access a server, use
the credentials command. For a Remote Authentication Dial-In User Service (RADIUS) probe, a shared
secret may also be required. For an Internet Message Access Protocol (IMAP) probe, you can provide a
mailbox username. Use the no form of this command to remove the credentials from the configuration.
For HTTP, HTTPS, and POP probes, the syntax is as follows:
For HTTP, HTTPS, IMAP, POP, and RADIUS probes, the syntax is as follows:
no credentials
Syntax Description username User identifier used for authentication. Enter an unquoted text string
with a maximum of 64 alphanumeric characters.
password (Optional except for RADIUS and IMAP probes) Password used for
authentication. Enter an unquoted text string with a maximum of
64 alphanumeric characters.
mailbox name (IMAP probe) Specifies the user mailbox name from which to
retrieve e-mail for an IMAP probe. Enter an unquoted text string with
a maximum of 64 alphanumeric characters.
secret shared_secret (RADIUS probe) Specifies the password used for the MD5 hash
encryption algorithm. Enter an unquoted text string with a maximum
of 64 alphanumeric characters.
Command Modes HTTP, HTTPS, IMAP, POP, and RADIUS probe configuration modes
Admin and user contexts
Examples To configure the username ENG1 and a password TEST for an HTTP probe, enter:
host1/Admin(config-probe-http)# credentials ENG1 TEST
(config-probe-probe_type) description
To provide a description for a probe, use the description command. Use the no form of this command
to remove the description for the probe.
description text
no description
Syntax Description text Description for the probe. Enter a text string with a maximum of
240 alphanumeric characters.
Examples To configure a description THIS PROBE IS FOR TCP SERVERS for a TCP probe, enter:
host1/Admin(config-probe-tcp)# description THIS PROBE IS FOR TCP SERVERS
To remove the description THIS PROBE IS FOR TCP SERVERS for a TCP probe, enter:
host1/Admin(config-probe-tcp)# no description
(config-probe-probe_type) domain
To configure the domain name that the probe sends to the server to resolve, use the domain command.
Use the no form of this command to remove the domain.
domain name
no domain
Syntax Description name Domain that the probe sends to the DNS server. Enter an unquoted text
string with a maximum of 255 alphanumeric characters.
Usage Guidelines The DNS probe sends a domain name for the DNS server to resolve. By default, the probe uses the
www.cisco.com domain.
Syntax Description ip_address IP address expected from the DNS server in response to the DNS
probe request for a domain. Enter a unique IPv4 address in
dotted-decimal notation (for example, 192.168.12.15).
Usage Guidelines A DNS probe sends a request for a domain to a DNS server. The ACE uses the IP address specified in
the expect address command to decide whether to pass or fail the DNS probe for the server based on
the server response.
no expect
no expect regex
Syntax Description string Expected response string from the probe destination. Enter an unquoted text string
with no spaces. If the string includes spaces, enclose the string in quotes. The string
can be a maximum of 255 alphanumeric characters.
offset number (Optional) Sets the number of characters into the received message or buffer where
the probe starts searching for the defined expression. Enter a number from 1 to 4000.
Command Modes Finger, HTTP, HTTPS, TCP, and UDP probe configuration modes
Admin and user contexts
Usage Guidelines When you configure a probe to expect a string from a server, it searches the response for a configured
string. If the ACE finds the expected string, the server is marked as passed. If you do not configure an
expected string, the ACE ignores the server response.
If you configure the expect regex command for TCP probes, you must configure the send-data
command. Otherwise, the probe performs a connection open and close without checking the response
from the server.
Syntax Description min_number Single status code or the lower limit of a range of status codes. Enter
an integer from 0 to 999.
max_number Upper limit of a range of status codes. Enter an integer from 0 to 999.
When configuring a single code, reenter the min_number value.
Command Modes FTP, HTTP, HTTPS, and SMTP probe configuration modes
Admin and user contexts
Usage Guidelines You can specify multiple status code ranges with this command by entering the command with different
ranges one at a time. Both the min_number and the max_number values can be any integer between 0 and
999 if the max_number is greater than or equal to the min-number. When the min_number and
max_number values are the same, the ACE uses a single status code number.
When the ACE receives a response from the server, it expects a status code to mark a server as passed.
By default, there are no status codes configured on the ACE. If you do not configure a status code, any
response code from the server is marked as failed.
Examples To configure an expected status code of 200 that indicates that the HTTP request was successful, enter:
host1/Admin(config-probe-http)# expect status 200 200
To configure multiple ranges of expected status codes from 200 to 202 and 204 to 205, configure each
range separately. Enter:
host1/Admin(config-probe-http)# expect status 200 202
host1/Admin(config-probe-http)# expect status 204 205
To remove a range of expected status codes, enter the range of 200 to 202, enter:
host1/Admin(config-probe-http)# no expect status 200 202
To remove multiple ranges of expected status codes, you must remove each range separately. If you have
set two different ranges (200 to 202 and 204 to 205), enter:
host1/Admin(config-probe-http)# no expect status 200 202
host1/Admin(config-probe-http)# no expect status 204 205
(config-probe-probe_type) faildetect
Before the ACE marks a server as failed, it must detect that probes have failed a consecutive number of
times. By default, when three consecutive probes have failed, the ACE marks the server as failed. To
configure this number of failed probes, use the faildetect command. Use the no form of this command
to reset the number of probe retries to its default.
faildetect retry-count
no faildetect
Syntax Description retry_count Consecutive number of failed probes before marking the server as
failed. Enter a number from 1 to 65535. The default is 3.
Examples To configure the number of failed probes at 5 before declaring the server as failed for a TCP probe, enter:
host1/Admin(config-probe-tcp)# faildetect 5
(config-probe-probe_type) hash
To configure the ACE to dynamically generate the MD5 hash value or manually configure the value, use
the hash command. By default, no hash value is configured on the ACE. Use the no form of this
command to configure the ACE to no longer compare the referenced hash value to the computed hash
value.
hash [value]
no hash
Syntax Description value (Optional) The MD5 hash value that you want to manually configure. Enter the MD5 hash
value as a hexadecimal string with exactly 32 characters (16 bytes).
Usage Guidelines If you do not use this command to configure the hash value, the ACE does not calculate a hash value on
the HTTP data returned by the probe.
When you enter this command with no argument, the ACE generates the hash on the HTTP data returned
by the first successful probe. If subsequent HTTP server hash responses match the generated hash value,
the ACE marks the server as passed. If a mismatch occurs due to changes to the HTTP data, the probe
fails and the show probe ... detail command displays an MD5 mismatch error in the Last disconnect
error field.
To clear the reference hash and have the ACE recalculate the hash value at the next successful probe,
change the URL or method by using the request method command.
The server response must include the Content-Length header for the hash command to function.
Otherwise, the probe does not attempt to parse the hash value.
You can configure the hash command on a probe using the HEAD method, however there is no data to
hash and has no effect causing the probe to always succeed.
Examples To configure the ACE to generate the hash on the HTTP data returned by the first successful probe, enter:
host1/Admin(config-probe-http)# hash
To configure the ACE to no longer compare the referenced hash value to the computed hash value, enter:
host1/Admin(config-probe-http)# no hash
(config-probe-probe_type) header
To configure an HTTP header or multiple header fields for the HTTP probe, use the header command.
Use the no form of this command to remove an HTTP header field from the probe configuration.
no header field_name
Syntax Description field_name Identifier for a standard header field. Enter a text string with a maximum of
64 alphanumeric characters. If the header field includes spaces, enclose its string with
quotes. You can also enter one of the following header keywords:
• Accept—Accept request header
• Accept-Charset—Accept-Charset request header
• Accept-Encoding—Accept-Encoding request header
• Accept-Language—Accept-Language request header
• Authorization—Authorization request header
• Cache-Control—Cache-Control general header
• Connection—Connection general header
• Content-MD5—Content-MD5 entity header
• Expect—Expect request header
• From—From request header
• Host—Host request header
• If-Match—If-Match request header
• Pragma—Pragma general header
• Referer—Referer request header
• Transfer-Encoding—Transfer-Encoding general header
• User-Agent—User-Agent request header
• Via—Via general header
field-value Value assigned to the header field. Enter a text string with a maximum of
255 alphanumeric characters. If the value string includes spaces, enclose the string with
quotes.
Usage Guidelines You can configure multiple header fields for each probe in your configuration.
Examples To configure the Accept-Encoding HTTP header with a field value of identity, enter:
host1/Admin(config-probe-http)# header Accept-Encoding header-value identity
To remove the header with the Accept-Encoding field name from the probe, enter:
host1/Admin(config-probe-http)# no header Accept-Encoding
(config-probe-probe_type) interval
To change the time interval between probes, use the interval command. The time interval between
probes is the frequency that the ACE sends probes to the server marked as passed. Use the no form of
this command to reset the default time interval of 120 seconds.
interval seconds
no interval
Syntax Description seconds Time interval in seconds. Enter a number from 2 to 65535. The
default is 120.
(config-probe-probe_type) ip address
To override the destination address that the probe uses, use the ip address command. By default, the
probe uses the IP address from the real server or server farm configuration for the destination IP address.
Use the no form of this command to reset the default of the probe.
no ip address
Syntax Description ip_address Destination IP address. The default is the IP address from the real
server or server farm configuration. Enter a unique IPv4 address in
dotted-decimal notation (for example, 192.168.12.15).
routed (Optional) Routes the address according to the ACE internal routing
table.
Command Modes All probe-type configuration modes except scripted probe configuration mode
Admin and user contexts
To reset the default of the probe using the IP address from the real server or server farm configuration,
enter:
host1/Admin(config-probe-tcp)# no ip address
no nas ip address
Syntax Description ip_address NAS IP address. Enter a unique IPv4 address in dotted-decimal
notation (for example, 192.168.12.15). By default, if a NAS address
is not configured for the Remote Authentication Dial-In User Service
(RADIUS) probe, the ACE uses the IP address associated with the
outgoing interface as the NAS address.
Usage Guidelines If a NAS address is not configured for the RADIUS probe, the ACE performs a route lookup on the
RADIUS server IP address.
(config-probe-probe_type) open
To configure the time interval for a connection to be established through a TCP 3-way handshake, use
the open command. By default, when the ACE sends a probe, it waits 10 seconds to open and establish
the connection with the server. Use the no form of this command to reset its default of 10 seconds.
open timeout
no open
Syntax Description timeout Time in seconds. Enter an integer from 1 to 65535. The default is 10.
Command Modes Echo TCP, Finger, FTP, HTTP, HTTPS, IMAP, POP, scripted, SMTP, TCP, and Telnet probe
configuration mode
Admin and user contexts
Examples To configure the wait time interval to 25 seconds for a TCP probe, enter:
host1/Admin(config-probe-tcp)# open 25
(config-probe-probe_type) passdetect
To configure the time interval to send a probe to a failed server and the number of probes to mark the
server as passed, use the passdetect command. Use the no form of this command to reset the default of
waiting 300 seconds before sending out a probe to a failed server and marking a server as passed if it
receives 3 consecutive successful responses.
Syntax Description interval seconds Specifies the wait time interval in seconds. Enter a number from 2 to
65535. The default is 300.
count number Specifies the number of successful probe responses from the server.
Enter a number from 1 to 65535. The default is 3.
Command Modes All probe-type configuration modes except scripted probe configuration mode
Admin and user contexts
Usage Guidelines After the ACE marks a server as failed, it waits a period of time and then sends a probe to the failed
server. When the ACE receives a number of consecutive successful probes, it marks the server as passed.
By default, the ACE waits 300 seconds before sending out a probe to a failed server and marks a server
as passed if it receives 3 consecutive successful responses.
To configure five success probe responses from the server before declaring it as passed, enter:
host1/Admin(config-probe-tcp)# passdetect count 5
(config-probe-probe_type) port
To configure the port number that the probe uses, use the port command. Use the no form of this
command to reset the port number based on the probe type.
port port-number
no port
Syntax Description port-number Port number for the probe. Enter an integer from 1 to 65535.
Command Modes All probe-type configuration modes except ICMP probe configuration mode
Admin and user contexts
Usage Guidelines Table 2-10 lists the default port numbers for each probe type.
To reset the port number to its default, in this case, port 80 for an HTTP probe, enter:
host1/Admin(config-probe-HTTP)# no port
(config-probe-probe_type) receive
To configure the time period that the ACE expects to receive a server response to the probe, use the
receive command. Use the no form of this command to reset its default of 10 seconds.
receive seconds
no receive
Syntax Description seconds Time to wait in seconds. Enter an integer from 1 to 65535. The
default is 10.
Usage Guidelines By default, when the ACE sends a probe, it expects a response within a time period of 10 seconds. For
example, for an HTTP probe, the timeout period is the number of seconds to receive an HTTP reply for
a GET or HEAD request. If the server fails to respond to the probe, the ACE marks the server as failed.
Examples To configure the timeout period for a response at 5 seconds for a TCP probe, enter:
host1/Admin(config-probe-TCP)# receive 5
To reset the time period to receive a response from the server to its default of 10 seconds, enter:
host1/Admin(config-probe-TCP)# no receive
no request
Syntax Description command Request command for the probe. Enter a text string with a maximum
of 32 alphanumeric characters with no spaces.
Examples To configure the last request command for an IMAP probe, enter:
host1/Admin(config-probe-imap)# request command last
Syntax Description get Configures the HTTP GET request method to direct the server to get
the page. This method is the default.
head Configures the HTTP HEAD request method to direct the server to
get only the header for the page.
url path Specifies the URL string used by the probe. Enter an alphanumeric
string with a maximum of 255 characters. The default path is forward
slash (/).
Usage Guidelines If you do not configure a URL, the probe behaves as a TCP probe.
Examples To configure the HEAD HTTP method and the /digital/media/graphics.html URL used by an HTTP
probe, enter:
host1/Admin(config-probe-http)# request method head url /digital/media/graphics.html
To reset the HTTP method for the probe of GET with a URL of “/”, enter:
host1/Admin(config-probe-http)# no request method head url /digital/media/graphics.html
(config-probe-probe_type) script
To specify the script name and the arguments to be passed to a scripted probe, use the script command.
Use the no form of this command to remove the script and its arguments from the configuration.
no script
Syntax Description script_name Name of the script. Enter an unquoted text string with no spaces and
a maximum of 255 alphanumeric characters.
script_arguments (Optional) Data sent to the script. Enter a text string with a maximum
of 255 alphanumeric characters including spaces and quotes.
Separate each argument by a space. If a single argument contains
spaces, enclose the argument string in quotes.
Usage Guidelines Scripted probes run probes from a configured script to perform health probing. You can also configure
arguments that are passed to the script. Before you can associate a script file with a probe, you must copy
and load the script on the ACE. For information on TCL scripts, see the Cisco 4700 Series Application
Control Engine Appliance Administration Guide.
Examples To configure the script name of PROBE-SCRIPT and arguments of double question marks (??), enter:
host1/Admin(config-probe-scrptd)# script PROBE-SCRIPT ??
To remove the script and its arguments from the configuration, enter:
host1/Admin(config-probe-scrptd)# no script
(config-probe-probe_type) send-data
To configure the ASCII data that the probe sends when the ACE connects to the server, use the
send-data command. Use the no form of this command to remove the data from the configuration.
send-data expression
no send-data
Syntax Description expression ASCII data that the probe sends. Enter an unquoted text string with
no spaces and a maximum of 255 alphanumeric characters.
Command Modes ECHO, Finger, TCP, and UDP probe configuration modes
Admin and user contexts
Usage Guidelines If you do not configure the send-data command for a UDP probe, the probe sends one byte, 0x00.
no ssl cipher
Syntax Description RSA_ANY Specifies that any of the RSA cipher suites from those allowed on the ACE
is accepted from the server. This is the default.
cipher_suite RSA cipher suite that the probe expects from the back-end server. Enter one
of the following keywords:
RSA_WITH_RC4_128_MD5
RSA_WITH_RC4_128_SHA
RSA_WITH_DES_CBC_SHA
RSA_WITH_3DES_EDE_CBC_SHA
RSA_EXPORT_WITH_RC4_40_MD5
RSA_EXPORT_WITH_DES40_CBC_SHA
RSA_EXPORT1024_WITH_RC4_56_MD5
RSA_EXPORT1024_WITH_DES_CBC_SHA
RSA_EXPORT1024_WITH_RC4_56_SHA
RSA_WITH_AES_128_CBC_SHA
RSA_WITH_AES_256_CBC_SHA
Examples To configure the HTTPS probes with the RSA_WITH_RC4_128_SHA cipher suite, enter:
host1/Admin(config-probe-https)# ssl cipher RSA_WITH_RC4_128_SHA
To reset the default of the HTTPS probes accepting any RSA cipher suite, enter:
host1/Admin(config-probe-https)# ssl cipher RSA_ANY
no ssl version
Usage Guidelines The version in the ClientHello message sent to the server indicates the highest supported version.
Syntax Description group_name Group of RADIUS servers. The server group name is a maximum of 64 alphanumeric
characters.
Usage Guidelines The commands in this mode require the AAA feature in your user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
A server group is a list of server hosts. The ACE allows you to configure multiple AAA servers as a
named server group. You group the different AAA server hosts into distinct lists. The ACE searches for
the server hosts in the order in which you specify them within a group. You can configure a maximum
of 100 server groups for each context in the ACE.
You can configure server groups at any time, but you must enter the aaa authentication login or the aaa
accounting default command to apply them to the AAA service.
(config-radius) deadtime
To specify a dead-time interval for the Remote Authentication Dial-In User Service (RADIUS) server
group, use the deadtime command. Use the no form of this command to reset the RADIUS server group
dead-time request to its default of 0.
deadtime minutes
no deadtime minutes
Syntax Description minutes Length of time that the ACE skips a nonresponsive RADIUS server for transaction requests.
Valid entries are from 0 to 1440 (24 hours). The default is 0.
Usage Guidelines Use of the deadtime command causes the ACE to mark as dead any RADIUS servers that fail to respond
to authentication requests. Entering this command prevents the wait for the request to time out before
trying the next configured server. The ACE skips a RADIUS server that is marked as dead by additional
requests for the duration of minutes.
During the dead-time interval, the ACE sends probe access-request packets to verify that the RADIUS
server is available and can receive authentication requests. The dead-time interval starts when the server
does not respond to an authentication request transmission. When the server responds to a probe
access-request packet, the ACE retransmits the authentication request to the server.
Examples To globally configure a 15-minute dead-time interval for RADIUS servers that fail to respond to
authentication requests, enter:
host1/Admin(config) aaa group server radius RADIUS_Server_Group1
host1/Admin(config-radius)# deadtime 15
(config-radius) server
To specify the IP address of one or more previously configured Remote Authentication Dial-In User
Service (RADIUS) servers that you want added to or removed from a server group, use the server
command. Use the no form of this command to remove the RADIUS server from the AAA server group.
server ip_address
no server ip_address
Syntax Description ip_address IP address of the RADIUS server. Enter the address in dotted-decimal IP notation (for
example, 192.168.11.1).
Usage Guidelines You can add multiple RADIUS servers to the AAA server group by entering multiple server commands
in this mode. The same server can belong to multiple server groups.
no rserver name
Syntax Description name Unique identifier of the real server. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
host (Optional) Specifies that the real server is a typical server that
provides web services and content.
Usage Guidelines The commands in this mode require the rserver feature in your user role unless otherwise specified. For
details about role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application
Control Engine Appliance Virtualization Configuration Guide.
(config-rserver-host) conn-limit
To configure the maximum and minimum number of connections that you want to allow for a host real
server, use the conn-limit command. Use the no form of this command to reset the maximum number
of connections and the minimum connection threshold for a real server to the default of 4294967295.
no conn-limit max
Syntax Description max maxconns Specifies the maximum number of connections allowed for this real
server. Enter an integer from 2 to 4294967295. The default is
4294967295.
min minconns Specifies the connection threshold below which the real server will
start accepting connections again after the number of connections
exceeds the configured maximum number of connections. Enter an
integer from 2 to 4294967295. The default is minconns equal to
maxconns.
Usage Guidelines Use this command to specify the maximum number of connections and the minimum connection
threshold for a real server. The minconns value must be less than or equal to the maxconns value. When
the number of connections to a real server reaches the maxconns value, the ACE stops sending
connections to that server and assigns it a state of OUTOFSERVICE. The ACE uses the minconns value
as a threshold for load balancing to start accepting connections again after the maxconns limit is reached.
Examples To configure the maximum number of connections and the minimum connection threshold for a real
server, enter:
host1/Admin(config-rserver-host)# conn-limit max 65535 min 40000
To reset the maximum number of connections and the minimum connection threshold for a real server
to the default of 4294967295, enter:
host1/Admin(config-rserver-host)# no conn-limit
(config-rserver-host) description
To configure a description for a real server, use the description command. Use the no form of this
command to remove the real server description from the configuration.
description text
no description
Syntax Description text User-defined description of the real server and related information.
Enter an unquoted text string with a maximum of 240 alphanumeric
characters.
(config-rserver-host) inservice
To place a real server in service, use the inservice command in real server host configuration mode. Use
the no form of this command to gracefully shut down a real server.
inservice
no inservice
Usage Guidelines This command requires the real-inservice feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Use the no form of this command to shut down a real server gracefully for maintenance or software
upgrades. When you enter this command, the ACE tears down all non-TCP connections. For TCP
connections, the ACE allows existing connections to end before taking the server out of service. No new
connections are allowed. To place the real server back in service, use the inservice command.
The ACE resets all SSL connections to a particular real server when you enter the no inservice command
for that server.
(config-rserver-host) ip address
To configure an IP address for a real server, use the ip address command in real server host configuration
mode. Use the no form of this command to remove the real server IP address from the configuration.
ip address ip-address
no ip address
Syntax Description ip-address IP address for the real server of type host. Enter an IP address in
dotted-decimal notation (for example, 192.168.12.6).
Usage Guidelines Use this command to provide a unique IP address for a real server. The address that you choose must not
be a VIP of an existing virtual server.
(config-rserver-host) probe
To configure a probe to monitor the health of a real server, use the probe command. Use the no form of
this command to remove the probe from the real server.
probe probe-name
no probe probe-name
Syntax Description probe-name Identifier of an existing probe that you want to assign to a real server
to monitor its health. Enter an unquoted text string with no spaces and
a maximum of 64 alphanumeric characters.
Usage Guidelines You can associate multiple probes with each real server.
(config-rserver-host) weight
To configure the capacity of a real server in relation to other servers in a server farm, use the weight
command. The weight value that you specify for a server is used in the weighted round-robin and
least-connections predictor load-balancing methods. Use the no form of this command to reset the real
server weight to the default.
weight number
no weight
Syntax Description number Weight value assigned to a real server in a server farm. This value is
used in the weighted round-robin and least-connections predictor
load-balancing algorithms. Enter an integer from 0 to 100. The
default is 8.
Usage Guidelines To specify different weight values for a real server in a server farm, you can assign multiple IP addresses
to the server. You can also use the same IP address of a real server with different port numbers.
Server weights take effect only when there are open connections to the servers. When there are no
sustained connections to any of the servers, the leastconns predictor method behaves like the roundrobin
method.
Syntax Description name Unique identifier of the real server. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines All commands in this mode require the Real feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
(config-rserver-redir) conn-limit
To configure the maximum and minimum (optional) number of connections that you want to allow for a
real server, use the conn-limit command. Use the no form of this command to reset the maximum
number of connections and the minimum connection threshold for a real server to the default of
4294967295.
no conn-limit max
Syntax Description max max-conns Specifies the maximum number of connections allowed for this real
server. Enter an integer from 2 to 4294967295.
min min-conns Specifies the connection threshold below which the real server will
start accepting connections again after the number of connections
exceeds the configured maximum number of connections. Enter an
integer from 2 to 4294967295. The default is minconns equal to
maxconns.
Usage Guidelines Use this command to specify the maximum number of connections and the minimum connection
threshold for a real server. The minconns value must be less than or equal to the maxconns value. When
the number of connections to a real server reaches the maxconns value, the ACE stops sending
connections to that server and assigns it a state of OUTOFSERVICE. The ACE uses the minconns value
as a threshold for load balancing to start accepting connections again after the maxconns limit is reached.
Examples To configure the maximum number of connections and the minimum connection threshold for a real
server, enter:
host1/Admin(config-rserver-redir)# conn-limit maxconns 65535 minconns 40000
To reset the maximum number of connections and the minimum connection threshold for a real server
of type redirect to the default of 4294967295, enter:
host1/Admin(config-rserver-redir)# no conn-limit
(config-rserver-redir) description
To configure a description for a real server, use the description command. Use the no form of this
command to remove the real server description from the configuration.
description text
no description
Syntax Description text User-defined description of the real server and related information.
Enter an unquoted text string with a maximum of 240 alphanumeric
characters.
Usage Guidelines Use this command to provide a unique description for the real server with a maximum of 240 characters.
(config-rserver-redir) inservice
To place a real server in service, use the inservice command. Use the no form of this command to remove
the real server from service.
inservice
no inservice
Usage Guidelines This command requires the real-inservice feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
Use the no form of this command to shut down a real server gracefully for maintenance or software
upgrades. When you enter this command, the ACE tears down all non-TCP connections. For TCP
connections, the ACE allows existing connections to end before taking the server out of service. No new
connections are allowed. To place the real server back in service, use the inservice command.
(config-rserver-redir) webhost-redirection
To configure the relocation URL string used for redirection, use the webhost-redirection command. You
can configure a port number to redirect a request in the relocation string. Use the no form of this
command to remove the real server redirection URL string from the configuration.
no webhost-redirection
Syntax Description relocation_string URL string used to redirect requests to another server. Enter an
unquoted text string with no spaces and a maximum of
255 alphanumeric characters. The redirection string supports the
following special characters:
• %h—Inserts the hostname from the request Host header
• %p—Inserts the URL path string from the request
Usage Guidelines Enter this command only on a real server that you have configured as a redirection server.
resource-class name
no resource-class name
Syntax Description name Name assigned to the new resource class. Enter an unquoted text
string with no spaces and a maximum of 64 alphanumeric characters.
You can also use the resource class called default.
Usage Guidelines The commands in this mode require the Admin user role. For details about role-based access control
(RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance Virtualization
Configuration Guide.
After you create and configure the class, use the (config-context) member command in context
configuration mode to assign a context to the class.
Examples To create a resource-class called RC1 and enter resource configuration mode, enter:
host1/C1(config)# resource-class RC1
host1/C1(config-resource)
(config-resource) limit-resource
To limit system resources for all members of a resource class, use the limit-resource command. Use the
no form of this command to restore the default resource settings for all resources or individual resources
for all members (contexts) of a resource class.
minimum number Specifies the lowest acceptable value. Enter an integer from 0.00 to
100.00 percent (two-decimal places of granularity). The number
argument specifies a percentage value for all contexts that are
members of the class. When used with the rate keyword, the number
argument specifies a value per second.
maximum {equal-to-min | Specifies the maximum resource value: either the same as the
unlimited} minimum value or no limit.
Usage Guidelines You can limit all resources or individual resources for all members (contexts) of a resource class. For
example, you can limit only concurrent connections, probes, or sticky table entries.
For details about the system resource maximum values when you use the limit-resource command, see
the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide
To use the stickiness feature, you must configure a minimum limit for sticky resources. For more
information, see the Cisco 4700 Series Application Control Engine Appliance Server Load-Balancing
Configuration Guide.
If you lower the limits for one context (context A) to increase the limits of another context (context B),
you may experience a delay in the configuration change because the ACE will not lower the limits of
context A until the resources are no longer being used by the context.
The limit that you set for individual resources when you use the limit-resource command overrides the
limit that you set for all resources when you use the limit-resource all command.
Examples To allocate 20 percent of all resources (minimum and maximum) to all member contexts of the resource
class, enter:
(config-resource)# limit-resource all minimum 20% maximum equal-to-min
To restore resource allocation to the default of 0 percent minimum and 100 percent maximum for all
resources to all member contexts, enter:
(config-resource)# no limit-resource all
role name
no role name
Syntax Description name Identifier associated with a user role. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the context Admin user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
If you do not assign a user role to a new user, the default user role is Network-Monitor. For users that
you create in the Admin context, the default scope of access is the entire device. For users that you create
in other contexts, the default scope of access is the entire context. If you need to restrict a user’s access,
you must assign a role-domain pair using the (config) username command.
(config-role) description
To enter a description for the role, use the description command. Use the no form of the command to
remove the role description from the configuration.
description text
no description
Syntax Description text Description for the role. Enter a description as an unquoted text string
with a maximum of 240 alphanumeric characters.
Examples This example shows how to provide an additional description about a role:
host1/C1(config-role)# description DEFINES TECHNICIAN ROLE
(config-role) rule
To assign privileges on a per-feature basis to a role, use the rule command. You can limit the features
that a user has access to and the commands that the user can enter for that feature by configuring rules
for roles. Use the no form of the command to remove the rule from a user role.
rule number {{permit | deny} {create | modify | debug | monitor} [feature {AAA | access-list |
config-copy | connection | dhcp | fault-tolerant | inspect | interface | loadbalance | nat | pki
| probe | real-inservice | routing | rserver | serverfarm | sticky | syslog | vip}]}
no rule number {{permit | deny} {create | modify | debug | monitor} [feature {AAA | access-list
| config-copy | connection | dhcp | fault-tolerant | inspect | interface | loadbalance | nat | pki
| probe | real-inservice | routing | rserver | serverfarm | sticky | syslog | vip}]}
Syntax Description number Identifier of the rule and order of precedence. Enter a unique integer from 1
to 16. The rule number determines the order in which the ACE applies the
rules, with a higher-numbered rule applied after a lower-numbered rule.
permit Allows the role to perform the operations defined by the rest of the command
keywords.
deny Disallows the role to perform the operations defined by the rest of the
command keywords.
create Specifies commands for the creation of new objects or the deletion of
existing objects (includes modify, debug, and monitor commands).
debug Specifies commands for debugging problems (includes monitor
commands).
modify Specifies commands for modifying existing configurations (includes debug
and monitor commands).
monitor Specifies commands for monitoring resources and objects (show
commands).
feature (Optional) Specifies a particular ACE feature for which you are configuring
this rule. The available features are listed below.
AAA Specifies commands for authentication, authorization, and accounting.
access-list Specifies commands for access control lists (ACLs). Includes ACL
configuration, class maps for ACLs, and policy maps that contain ACL class
maps.
config-copy Specifies commands for copying the running-config to the startup-config,
startup-config to the running-config, and copying both config files to the
Flash disk (disk0:) or a remote server.
connection Specifies commands for network connections.
dhcp Specifies commands for Dynamic Host Configuration Protocol (DHCP).
fault-tolerant Specifies commands for redundancy.
inspect Specifies commands for packet inspection used in data-center security.
interface Specifies all interface commands.
loadbalance Specifies commands for load balancing (including the application
acceleration and optimization functions). Allows adding a load-balancing
action in a policy map.
Examples To configure a rule that allows a role to create and configure real servers, enter:
host1/C1(config-role)# rule 1 permit create rserver
no serverfarm name
Syntax Description host (Optional) Specifies a server farm of mirrored real servers that
provide web content or services.
name Unique identifier of the server farm. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the server-farm feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
(config-sfarm-host) description
To configure the description of a server farm, use the description command. Use the no form of this
command to delete the description of a server farm.
description text
no description
Syntax Description text Text description of a server farm. Enter an unquoted text string with
a maximum of 240 alphanumeric characters.
(config-sfarm-host) failaction
To configure the action that the ACE takes if a real server goes down, use the failaction command. Use
the no form of this command to reset the ACE to its default of taking no action when a server fails.
failaction purge
no failaction
Syntax Description purge Specifies that the ACE remove the connections to a real server if that
real server in the server farm fails after you configure this command.
The module sends a reset (RST) both to the client and to the server
that failed.
Usage Guidelines If you do not configure this command, the ACE takes no action if a server in a server farm fails. This
feature is required for stateful firewall load balancing (FWLB). For details about FWLB, see the Cisco
4700 Series Application Control Engine Appliance Server Load-Balancing Configuration Guide.
If you do not configure this command, the ACE takes no action when a server fails. To clear connections
to servers that have failed prior to entering the failaction command, use the clear conn command.
Examples To instruct the ACE to remove connections from a failed server in the server farm, enter:
host1/Admin(config-sfarm-host)# failaction purge
To reset the ACE to its default of taking no action if a real server fails, enter:
host1/Admin(config-sfarm-host)# no failaction
(config-sfarm-host) predictor
To configure the load-balancing algorithm for the server farm, use the predictor command. To remove
the load-balancing algorithm, use the no form of this command.
no predictor
Syntax Description roundrobin Selects the next servers in the list of real servers.
leastconns Selects the server with the least number of connections.
slowstart time (Optional) Specifies that the connections to the real server are in a
slow-start mode for the specified duration. For the time argument,
enter an integer from 1 to 65535. where 1 is the fastest ramp-up value.
hash address Selects the server using a hash value based on the source and
destination IP addresses.
source (Optional) Selects the server using a hash value based on the source
IP address.
destination (Optional) Selects the server using a hash value based on the
destination IP address.
netmask (Optional) Bits in the IP address to use for the hash. If not specified,
the default is 255.255.255.255.
hash cookie cookie-name Selects the server using a hash value based on the specified cookie
name. For the cookie-name argument, enter a cookie name from 1 to
64 alphanumeric characters.
hash header header-name Selects the server using a hash value based on the header name. Enter
a header name from 1 to 64 alphanumeric characters or enter one of
the following standard headers:
• Accept
• Accept-Charset
• Accept-Encoding
• Accept-Language
• Authorization
• Cache-Control
• Connection
• Content-MD5
• Expect
• From
• Host
• If-Match
• Pragma
• Referrer
• Transfer-Encoding
• User-Agent
• Via
hash url Selects the server using a hash value based on the requested URL.
Use this predictor method to load balance cache servers. Cache
servers perform better with the URL hash method because you can
divide the contents of the caches evenly if the traffic is random
enough. In a redundant configuration, the cache servers continue to
work even if the active ACE switches over to the standby ACE. For
information about configuring redundancy, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
begin-pattern text (Optional) Specifies the beginning pattern of the URL and the pattern
string to parse. You cannot configure different beginning and ending
patterns for different server farms that are part of the same traffic
classification. Enter an unquoted text string with no spaces and a
maximum of 255 alphanumeric characters for each pattern that you
configure. If you want to match a URL that contains spaces, you must
use \x20 for each space character.
end-pattern text (Optional) Specifies the ending pattern of the URL and the pattern
string to parse. You cannot configure different beginning and ending
patterns for different server farms that are part of the same traffic
classification. Enter an unquoted text string with no spaces and a
maximum of 255 alphanumeric characters for each pattern that you
configure. If you want to match a URL that contains spaces, you must
use \x20 for each space character.
Usage Guidelines Use this command to define the load-balancing algorithm used in choosing a real server in the server
farm. If you do not specify the predictor command, the default algorithm is roundrobin. Using the no
form of this command changes the configured predictor algorithm to the default algorithm.
Note The only time that the sequence of servers starts over at the beginning (with the first server) is when there
is a configuration or server state change (for example, a probe failure).
If you configure the leastconns predictor, you can use a slowstart mechanism (ramp-up) to avoid
sending a high rate of new connections to the servers that have just been put in service. The real server
with the fewest number of active connections will get the next connection request for the server farm
with the leastconns predictor. The ramp-up stops when the duration timer that you specify expires.
Server weights take effect only when there are open connections to the servers. When there are no
sustained connections to any of the servers, the leastconns predictor method behaves like the roundrobin
method.
Examples To specify the leastconns load-balancing algorithm for the server farm, enter:
host1/Admin(config-sfarm-host)# predictor leastconns
(config-sfarm-host) probe
Use probes to monitor the health of real servers in a server farm. To associate a probe with a server farm,
use the probe command. Use the no form of this command to dissociate a probe from a server farm.
probe probe-name
no probe probe-name
Syntax Description probe-name Identifier of an existing probe that you want to associate with a server
farm. Enter an unquoted text string with no spaces and a maximum
of 64 alphanumeric characters.
Usage Guidelines The probe must already exist. (To create a probe, see the (config) probe command.) You can associate
multiple probes of the same or different protocols with each server farm.
(config-sfarm-host) retcode
To associate a return code map for HTTP return error code checking with a server farm, use the retcode
command. Use the no form of this command to dissociate a return code.
Syntax Description number1 Minimum value for an HTTP return error code. Enter an integer from
100 to 599. The minimum value must be less than or equal to the
maximum value.
number2 Maximum value for an HTTP return error code. Enter an integer from
100 to 599. The maximum value must be greater than or equal to the
minimum value.
check Associates actions for HTTP return-code checking with the server
farm.
count Increments the number of return error codes received.
Usage Guidelines You can configure one return code or one return code range for each server farm. If a server farm already
has a return code associated with it, specifying a new return code overwrites the existing association.
Examples To associate a return code range from 100 to 400 with a server farm, enter:
host1/Admin(config-sfarm-host)# retcode 100 400 check count
To dissociate a return code range from a server farm, enter:
host1/Admin(config-sfarm-host)# no retcode
(config-sfarm-host) rserver
To associate one or more existing host real servers with a server farm and access serverfarm host real
server configuration mode, use the rserver command. The CLI prompt changes to
(config-sfarm-host-rs). For information on commands in serverfarm host real server configuration mode,
see the “Serverfarm Host Real Server Configuration Mode Commands” section. Use the no form of this
command to dissociate the real server from the server farm.
Syntax Description name Unique identifier of the real server. Enter an unquoted text string with
no spaces and a maximum of 64 alphanumeric characters.
port (Optional) Port number used for the real server Port Address
Translation (PAT). Enter an integer from 1 to 65535.
Usage Guidelines The real server must already exist. To create a real server, see the (config) rserver command. You can
associate a maximum of 16,384 real servers with a server farm.
If you choose not to assign a port number for the real server association with the server farm, the default
behavior by the ACE is to automatically assign the same destination port that was used by the inbound
connection to the outbound server connection. For example, if the incoming connection to the ACE is a
secure client HTTPS connection, the connection is typically made on port 443. If you do not assign a
port number to the real server, the ACE will automatically use port 443 to connect to the server, which
results in the ACE making a clear-text HTTP connection over port 443. In this case, you would typically
define an outbound destination port of 80, 81, or 8080 for the backend server connection.
(config-sfarm-host) transparent
To prevent the Network Address Translation (NAT) of the ACE VIP address to the server IP address, use
the transparent command. Use the no form of this command to reset the ACE to its default of using
NAT to translate the VIP address to the server IP address.
transparent
no transparent
Usage Guidelines Use this command in firewall load balancing (FWLB) when you configure the insecure and secure sides
of the firewall as a server farm. For details about FWLB, see the Cisco 4700 Series Application Control
Engine Appliance Server Load-Balancing Configuration Guide.
Examples To prevent the NAT of the ACE VIP address to the server IP address, enter:
host1/Admin(config-sfarm-host)# transparent
To reset the ACE to its default of using NAT to translate the VIP address to the server IP address, enter:
host1/Admin(config-sfarm-host)# no transparent
no rserver name
Syntax Description name Unique identifier of the real server. Enter an unquoted text string with
no spaces and a maximum of 64 alphanumeric characters.
port (Optional) Port number used for the real server Port Address
Translation (PAT). Enter an integer from 1 to 65535.
Usage Guidelines The commands in this mode require the server-farm feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
The real server must already exist. To create a real server, see the (config) rserver command. You can
associate a maximum of 16,384 real servers with a server farm.
(config-sfarm-host-rs) backup-rserver
To configure a backup real server for a real server in a server farm, use the backup-rserver command.
If a real server associated with a server farm becomes unavailable, the Application Control Engine
Service Module directs flows to the configured backup real server. Use the no form of this command to
remove a backup real server from the configuration.
no backup-rserver
Syntax Description name Unique identifier of an existing real server that you want to configure
as a backup server in a server farm. Enter an unquoted text string with
no spaces and a maximum of 64 alphanumeric characters.
port (Optional) Port number used for the backup real server Port Address
Translation (PAT). Enter an integer from 0 to 65535.
Usage Guidelines The real server used as a backup server must already exist. To create a real server, see the (config)
rserver command.
(config-sfarm-host-rs) conn-limit
To configure the maximum and minimum number of connections that you want to allow for a host real
server in a server farm, use the conn-limit command. Use the no form of this command to reset the limits
for the real server maximum connections and minimum connections to the default of 4294967295.
no conn-limit
Syntax Description max maxconns Specifies the maximum number of connections allowed for this real
server. Enter an integer from 2 to 4294967295. The default is
4294967295.
min minconns Specifies the connection threshold below which the real server will
start accepting connections again after the number of connections
exceeds the configured maximum number of connections. Enter an
integer from 2 to 4294967295. The default is minconns equal to
maxconns.
Usage Guidelines Use this command to specify the maximum number of connections and the minimum connection
threshold for a host real server in a server farm. The minconns value must be less than or equal to the
maxconns value. The ACE uses the minconns value as a threshold to start accepting connections again
after the maxconns limit is exceeded.
Examples To configure the maximum number of connections and the minimum connection threshold for a host real
server, enter:
host1/Admin(config-sfarm-host-rs)# conn-limit max 65535 min 40000
To reset the maximum number of connections and the minimum connection threshold for a host real
server to the default of 4294967295, enter:
host1/Admin(config-sfarm-host-rs)# no conn-limit
(config-sfarm-host-rs) inservice
To place a real server associated with a server farm in service, use the inservice command. Use the no
form of this command to take a real server out of service.
inservice [standby]
no inservice
Syntax Description standby (Optional) Used with backup real servers, specifies that a backup real
server remain inactive unless the primary real server fails. If the
primary fails, the backup server becomes active and starts accepting
connections.
Usage Guidelines To start load balancing connections to a real server in a server farm, you must place the real server in
service by using the inservice command.
You can modify the attributes of a real server in a server farm without taking the server out of service.
Use the inservice standby command on a primary real server to provide graceful shutdown when you
have sticky configured. This command instructs the ACE to perform the following actions:
• Tear down existing non-TCP connections to the server.
• Allow current TCP connections to complete.
• Allow new sticky connections for existing server connections that match entries in the sticky
database.
• Load balance all new connections (other than the matching sticky connections in this list) to the
other servers in the server farm.
• Eventually take the server out of service.
(config-sfarm-host-rs) probe
To configure a probe to monitor the health of a host real server in a host server farm, use the probe
command. Use the no form of this command to remove the probe from the real server.
probe probe-name
no probe probe-name
Syntax Description probe-name Identifier of an existing probe that you want to assign to a real server
to monitor its health. Enter an unquoted text string with no spaces and
a maximum of 64 alphanumeric characters.
Usage Guidelines You can associate multiple probes with each real server.
(config-sfarm-host-rs) weight
To configure the capacity of a real server in relation to other servers in a server farm, use the weight
command. The weight value that you specify for a server is used in the weighted round-robin and
least-connections predictor load-balancing methods. Use the no form of this command to reset the real
server weight to the default.
weight number
no weight
Syntax Description number Weight value assigned to a real server in a server farm. This value is
used in the weighted round-robin and least-connections predictor
load-balancing algorithms. Enter an integer from 0 to 100. The
default is 8.
Usage Guidelines Servers with a higher configured weight value have a higher priority with respect to connections than
servers with a lower weight. For example, a server with a weight of 5 would receive five connections for
every one connection received by a server with a weight of 1.
To specify different weight values for a real server in a server farm, you can assign multiple IP addresses
to the server. You can also use the same IP address of a real server with different port numbers.
Server weights take effect only when there are open connections to the servers. When there are no
sustained connections to any of the servers, the leastconns predictor method behaves like the roundrobin
method.
Syntax Description name Unique identifier of the server farm. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the server-farm feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
(config-sfarm-redirect) description
To configure the text description of a server farm, use the description command. Use the no form of this
command to delete the description of a server farm.
description text
no description
Syntax Description text Text description of a server farm. Enter an unquoted text string with
a maximum of 240 alphanumeric characters.
(config-sfarm-redirect) failaction
To configure the action that the ACE takes if a real server goes down, use the failaction command. Use
the no form of this command to reset the ACE to its default of taking no action when a server fails.
failaction purge
no failaction
Syntax Description purge Specifies that the ACE remove the connections to a real server if that
real server in the server farm fails. The appliance sends a reset (RST)
both to the client and to the server that failed.
Usage Guidelines If you do not configure this command, the ACE takes no action if a server in a server farm fails. This
feature is required for stateful firewall load balancing (FWLB). For details about FWLB, see the Cisco
4700 Series Application Control Engine Appliance Server Load-Balancing Configuration Guide.
Examples To instruct the ACE to remove connections from a failed server in the server farm, enter:
host1/Admin(config-sfarm-redirect)# failaction purge
To reset the ACE to its default of taking no action if a real server fails, enter:
host1/Admin(config-sfarm-redirect)# no failaction
(config-sfarm-redirect) predictor
To configure the load-balancing algorithm for the server farm, use the predictor command. Use the no
form of this command to remove the load-balancing algorithm.
no predictor
Syntax Description roundrobin Selects the next servers in the list of real servers based on server
weight.
leastconns Selects the server with the least number of connections.
slowstart time (Optional) Used with the leastconns predictor. Specifies that the
connections to the real server be in a slow-start mode for the duration
indicated by the time value. Enter an integer from 1 to 65535.
hash address Selects the server using a hash value based on the source and
destination IP addresses.
source (Optional) Selects the server using a hash value based on the source
IP address.
destination (Optional) Selects the server using a hash value based on the
destination IP address.
netmask (Optional) Bits in the IP address to use for the hash. If not specified,
the default is 255.255.255.255.
hash cookie name Selects the server using a hash value based on the cookie name. Enter
a cookie name from 1 to 64 alphanumeric characters.
hash header name Selects the server using a hash value based on the header name. Enter
a header name from 1 to 64 alphanumeric characters or enter one of
the following standard headers:
• Accept
• Accept-Charset
• Accept-Encoding
• Accept-Language
• Authorization
• Cache-Control
• Connection
• Content-MD5
• Expect
• From
• Host
• If-Match
• Pragma
• Referrer
• Transfer-Encoding
• User-Agent
• Via
hash url Selects the server using a hash value based on the requested URL.
Use this predictor method to load balance cache servers. Cache
servers perform better with the URL hash method because you can
divide the contents of the caches evenly if the traffic is random
enough. In a redundant configuration, the cache servers continue to
work even if the active ACE switches over to the standby ACE. For
information about configuring redundancy, see the Cisco 4700 Series
Application Control Engine Appliance Administration Guide.
begin-pattern text (Optional) Specifies the beginning pattern of the URL and the pattern
string to parse. You cannot configure different beginning and ending
patterns for different server farms that are part of the same traffic
classification. Enter an unquoted text string with no spaces and a
maximum of 255 alphanumeric characters for each pattern that you
configure. If you want to match a URL that contains spaces, you must
use \x20 for each space character.
end-pattern text (Optional) Specifies the ending pattern of the URL and the pattern
string to parse. You cannot configure different beginning and ending
patterns for different server farms that are part of the same traffic
classification. Enter an unquoted text string with no spaces and a
maximum of 255 alphanumeric characters for each pattern that you
configure. If you want to match a URL that contains spaces, you must
use \x20 for each space character.
Usage Guidelines Use this command to define the load-balancing algorithm used in choosing a real server in the server
farm. If you do not specify the predictor command, the default algorithm is roundrobin. Using the no
form of this command changes the configured predictor algorithm to the default algorithm.
The hash methods do not recognize the weight for the real servers. The weight assigned to the real
servers is used only in the roundrobin and leastconns predictor methods. To create different weights
for real servers, you can list multiple IP addresses of the cache server in the server farm. You can also
use the same IP address with a different port number.
The only time that the sequence of servers starts over at the beginning (with the first server) is when there
is a configuration or server state change (for example, a probe failure).
If you configure the leastconns predictor, you can use a slowstart mechanism (ramp-up) to avoid
sending a high rate of new connections to the servers that have just been put in service. The real server
with the fewest number of active connections will get the next connection request for the server farm
with the leastconns predictor. The ramp-up stops when the duration timer that you specify expires.
Examples To specify the leastconns load-balancing algorithm for the server farm, enter:
host1/Admin(config-sfarm-redirect)# predictor leastconns slowstart 300
(config-sfarm-redirect) rserver
To associate one or more existing redirect real servers with a server farm and access serverfarm redirect
real server configuration mode, use the rserver command. The CLI prompt changes to
(config-sfarm-redirect-rs). For information on commands in serverfarm redirect real server
configuration mode, see the “Serverfarm Redirect Real Server Configuration Mode Commands” section.
Use the no form of this command to dissociate the real server from the server farm.
Syntax Description name Unique identifier of the real server. Enter an unquoted text string with
no spaces and a maximum of 64 alphanumeric characters.
port (Optional) Port number used for the real server Port Address
Translation (PAT). Enter an integer from 1 to 65535.
Usage Guidelines The real server must already exist. To create a real server, see the (config) rserver command. You can
associate a maximum of 16,384 real servers with a server farm.
rserver name
no rserver name
Syntax Description name Unique identifier of the real server. Enter an unquoted text string with
no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the server-farm feature in your user role. For details about
role-based access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide.
The redirect real server must already exist. To create a real server, see the (config) rserver redirect
command. You can associate a maximum of 16,384 real servers with a server farm.
(config-sfarm-redirect-rs) backup-rserver
To configure a backup real server for a real server in a server farm, use the backup-rserver command.
If a real server associated with a server farm becomes unavailable, the ACE directs flows to the
configured backup real server. Use the no form of this command to remove a backup real server from
the configuration.
backup-rserver name
no backup-rserver
Syntax Description name Unique identifier of an existing real server that you want to configure
as a backup server in a server farm. Enter an unquoted text string with
no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The real server used as a backup server must already exist. To create a redirect real server, see the
(config) rserver redirect command.
(config-sfarm-redirect-rs) conn-limit
To configure the maximum and minimum number of connections that you want to allow for a redirect
real server in a server farm, use the conn-limit command. Use the no form of this command to reset the
real server maximum connections and minimum connections threshold to the default of 4294967295.
no conn-limit
Syntax Description max maxconns Specifies the maximum number of connections allowed for this real
server. Enter an integer from 2 to 4294967295. The default is
4294967295.
min minconns Specifies the connection threshold below which the real server will
start accepting connections again after the number of connections
exceeds the configured maximum number of connections. Enter an
integer from 2 to 4294967295. The default is minconns equal to
maxconns.
Usage Guidelines Use this command to specify the maximum number of connections and the minimum connection
threshold for a redirect real server in a server farm. The minconns value must be less than or equal to the
maxconns value. The ACE uses the minconns value as a threshold to start accepting connections again
after the maxconns limit is exceeded.
Examples To configure the maximum number of connections and the minimum connection threshold for a redirect
real server, enter:
host1/Admin(config-sfarm-redirect-rs)# conn-limit max 65535 min 40000
To reset the maximum number of connections and the minimum connection threshold for a redirect real
server to the default of 4294967295, enter:
host1/Admin(config-sfarm-redirect-rs)# no conn-limit
(config-sfarm-redirect-rs) inservice
To place a real server associated with a server farm in service, use the inservice command. Use the no
form of this command to take a real server out of service.
inservice [standby]
no inservice
Syntax Description standby (Optional) Used with backup real servers, specifies that a backup real
server remain inactive unless the primary real server fails. If the
primary fails, the backup server becomes active and starts accepting
connections.
Usage Guidelines To start load-balancing connections to a real server in a server farm, you must place the real server in
service by using the inservice command.
You can modify the attributes of a real server in a server farm without taking the server out of service.
Use the inservice standby command on a primary real server to provide graceful shutdown when you
have sticky configured. This command instructs the ACE to perform the following actions:
• Tear down existing non-TCP connections to the server.
• Allow current TCP connections to complete.
• Allow new sticky connections for existing server connections that match entries in the sticky
database.
• Load balance all new connections (other than the matching sticky connections in this list) to the
other servers in the server farm.
• Eventually take the server out of service.
(config-sfarm-redirect-rs) weight
To configure the capacity of a real server in relation to other servers in a server farm, use the weight
command. The weight value that you specify for a server is used in the weighted round-robin and
least-connections predictor load-balancing methods. Use the no form of this command to reset the real
server weight to the default.
weight number
no weight
Syntax Description number Weight value assigned to a real server in a server farm. This value is
used in the weighted round-robin and least-connections predictor
load-balancing algorithms. Enter an integer from 0 to 100. The
default is 8.
Usage Guidelines Servers with a higher configured weight value have a higher priority with respect to connections than
servers with a lower weight. For example, a server with a weight of 5 would receive five connections for
every one connection received by a server with a weight of 1.
To specify different weight values for a real server in a server farm, you can assign multiple IP addresses
to the server. You can also use the same IP address of a real server with different port numbers.
Server weights take effect only when there are open connections to the servers. When there are no
sustained connections to any of the servers, the leastconns predictor method behaves like the roundrobin
Syntax Description pservice_name Name of the SSL proxy service. Enter the proxy service name as a
alphanumeric string from 1 to 64 characters in length.
Usage Guidelines The commands in this mode require the SSL feature in your user role. For details about role-based access
control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
When you create a SSL proxy service, the CLI changes to the SSL proxy configuration mode, where you
define the following SSL proxy service attributes:
• Certificate—See the (config-ssl-proxy) cert command.
• Chain group—See the (config-ssl-proxy) chaingroup command.
• Key pair—See the (config-ssl-proxy) key command.
• Parameter map—See the (config-ssl-proxy) ssl advanced-options command.
(config-ssl-proxy) cert
To specify the certificate that the ACE uses during the Secure Sockets Layer (SSL) handshake to prove
its identity, use the cert command. Use the no form of the command to delete a certificate file from the
SSL proxy service.
cert cert_filename
no cert cert_filename
Syntax Description name Name of an existing certificate file loaded on the ACE. To display a list of available
certificate files, use the do show crypto files command.
Usage Guidelines The public key embedded in the certificate that you select must match the public key in the key pair file
that you select. To verify that the public keys in the two files match, use the crypto verify command in
the Exec mode.
To delete the certificate in the certificate file MYCERT.PEM from the SSL proxy service, enter:
host1/Admin(config-ssl-proxy)# no cert MYCERT.PEM
(config-ssl-proxy) chaingroup
To specify the certificate chain group that the ACE sends to its peer during the Secure Sockets Layer
(SSL) handshake, use the chaingroup command. Use the no form of the command to delete a certificate
chain group from the SSL proxy service.
chaingroup group_name
no chaingroup group_name
Usage Guidelines The ACE includes the certificate chain with the certificate that you specified for the SSL proxy service.
Examples To configure the ACE SSL proxy service to send the certificate chain group MYCHAINGROUP to its
peer during the SSL handshake, enter:
host1/Admin(config-ssl-proxy)# chaingroup MYCHAINGROUP
To delete the certificate chain group MYCHAINGROUP from the SSL proxy service, enter:
host1/Admin(config-ssl-proxy)# no chaingroup MYCHAINGROUP
(config-ssl-proxy) key
To specify the key pair that the ACE uses during the Secure Sockets Layer (SSL) handshake for data
encryption, use the key command. Use the no form of the command to delete a private key from the SSL
proxy service.
key key_filename
no key key_filename
Syntax Description key_filename Name of an existing key pair file loaded on the ACE.
Usage Guidelines The public key in the key pair file that you select must match the public key embedded in the certificate
that you select. To verify that the public keys in the two files match, use the crypto verify command in
the Exec mode.
Examples To specify the private key in the key pair file MYKEY.PEM for the SSL proxy service, enter:
host1/Admin(config-ssl-proxy)# key MYKEY.PEM
To delete the private key in the key pair file MYKEY.PEM from the SSL proxy service, enter:
host1/Admin(config-ssl-proxy)# no key MYKEY.PEM
Examples To associate the parameter map PARAMMAP_SSL with the SSL proxy service, enter:
host1/Admin(config-ssl-proxy)# ssl advanced-options PARAMMAP_SSL
To remove the association of an SSL parameter map PARAMMAP_SSL with the SSL proxy service,
enter:
host1/Admin(config-ssl-proxy)# no ssl advanced-options PARAMMAP_SSL
Syntax Description name1 Cookie value from the HTTP header of the client request or from the
Set-Cookie message from the server. Enter a unique identifier for the
cookie with a maximum of 64 alphanumeric characters.
name2 Unique identifier of the sticky group. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the sticky feature in your user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
You can create a maximum of 4096 sticky groups in the ACE.
By default, the maximum number of bytes that the ACE parses to check for a cookie, HTTP header, or
URL is 2048. If a cookie, HTTP header, or URL exceeds the default value, the ACE drops the packet
and sends a RST (reset) to the client browser. You can increase the number of bytes that the ACE parses
using the (config-parammap-http) set header-maxparse-length command in HTTP parameter-map
configuration mode.
You can also change the default behavior of the ACE when a cookie, header, or URL exceeds the
maximum parse length using the (config-parammap-http) length-exceed command in HTTP
parameter-map configuration mode.
Syntax Description browser-expire (Optional) Allows the client’s browser to expire a cookie when the
session ends.
Usage Guidelines With cookie insertion enabled, the ACE inserts the cookie in the Set-Cookie header of the response from
the server to the client. The ACE selects a cookie value that identifies the original server from which the
client received a response. For subsequent connections of the same transaction, the client uses the cookie
to stick to the same server.
With either TCP server reuse or or persistence rebalance enabled, the ACE inserts a cookie in every client
request. See the (config-parammap-http) server-conn reuse or (config-parammap-http)
persistence-rebalance commands.
Syntax Description offset number1 Specifies the portion of the cookie that the ACE uses to stick the
client on a particular server by indicating the bytes to ignore starting
with the first byte of the cookie. Enter an integer from 0 to 3999. The
default is 0, which indicates that the ACE does not exclude any
portion of the cookie.
length number2 (Optional) Specifies the length of the portion of the cookie (starting
with the byte after the offset value) that the ACE uses for sticking the
client to the server. Enter an integer from 1 to 4000. The default is
4000.
Usage Guidelines An HTTP-cookie value may change over time with only a portion remaining constant throughout a
transaction between the client and a server. You can configure the ACE to use the constant portion of a
cookie to make persistent connections to a specific server.
The ACE stores cookie offset and length values in the sticky table.
The offset and length can vary from 0 to 4000 bytes. If the cookie value is longer than the offset but
shorter than the offset plus the length of the cookie, the ACE sticks the connection based on that portion
of the cookie that starts with the byte after the offset value and ends with the byte specified by the offset
plus the length. The total of the offset and the length cannot exceed 4000 bytes.
To remove the cookie offset and length from the configuration, enter:
host1/Admin(config-sticky-cookie)# no cookie offset 3000 length 1000
no cookie secondary
Syntax Description name Name of the secondary cookie. Enter a cookie name as an unquoted
text string with no spaces and a maximum of 64 alphanumeric
characters.
Usage Guidelines You can configure an alternative cookie name that appears in the URL string of the web page on the
server. The ACE uses this cookie to maintain a sticky connection between a client and a server and adds
a secondary entry in the sticky table.
replicate sticky
no replicate sticky
Usage Guidelines If you are using redundancy, you can configure the ACE to replicate HTTP-cookie sticky table entries
on the standby ACE so that, if a switchover occurs, the new active ACE can maintain existing sticky
connections.
The timer of a sticky table entry on the standby ACE is reset everytime the entry is synchronized with
the active ACE entry. Thus, the standby sticky entry may have a lifetime up to twice as long as the active
entry. However, if the entry expires on the active ACE or a new real server is selected and a new entry is
created, the old entry on the standby ACE is replaced.
Examples To instruct the ACE to replicate HTTP-cookie sticky table entries on the standby ACE, enter:
host1/Admin(config-sticky-cookie)# replicate sticky
To restore the ACE to its default of not replicating HTTP-cookie sticky table entries, enter:
host1/Admin(config-sticky-cookie)# no replicate sticky
(config-sticky-cookie) serverfarm
To complete a sticky group configuration, you must configure a server farm entry for the group. To
configure a server farm entry for a sticky group, use the serverfarm command. Use the no form of this
command to dissociate a server farm from a sticky group.
no serverfarm
Syntax Description name1 Identifier of an existing server farm that you want to associate with
the sticky group. You can associate one server farm with each sticky
group. Enter a name as an unquoted text string with no spaces and a
maximum of 64 alphanumeric characters.
backup name2 (Optional) Specifies the keyword and identifier of a backup server
farm. If the primary server farm is down, the ACE uses the configured
backup server farm. Once clients are stuck to a backup server farm,
they remain stuck to the backup even if the primary server farm
becomes active again. Enter a name as an unquoted text string with
no spaces and a maximum of 64 alphanumeric characters.
sticky (Optional) Specifies that the backup server farm is sticky.
aggregate-state (Optional) Specifies that the state of the primary server farm is tied
to the state of all the real servers in that server farm and in the backup
server farm, if configured. The ACE declares the primary server farm
down if all real servers in the primary server farm and all real servers
in the backup server farm are down.
Examples To associate a server farm with a sticky group and specify a sticky backup server farm, enter:
host1/Admin(config-sticky-cookie)# serverfarm SFARM1 backup BKUP_SFARM2 sticky
aggregate-state
Syntax Description sequence_number (Optional) Sequence number for a static cookie entry.
value Cookie string value. Enter an unquoted text string with no spaces and
a maximum of 255 alphanumeric characters. Alternatively, you can
enter a text string with spaces provided that you enclose the string in
quotation marks (“).
rserver name Specifies the hostname of an existing real server. Enter an unquoted
text string with no spaces and a maximum of 64 alphanumeric
characters.
number (Optional) Port number of the real server. Enter an integer from 1 to
65535.
Usage Guidelines You can configure the ACE to use static cookies from entries based on cookie values and, optionally, real
server names and ports. Static cookie values remain constant over time.
You can configure multiple static cookie entries, but only one unique real-server name can exist for a
given static cookie value. When you configure a static entry, the ACE enters it into the sticky table
immediately. You can create a maximum of 4096 static sticky entries in the ACE.
(config-sticky-cookie) timeout
To specify the duration for sticky connections between a client and a real server to persist, use the
timeout command. Use the no form of this command to reset the sticky timeout to the default of 1440
minutes.
Syntax Description sticky-time Length of time in minutes that the ACE appliance remembers the last
real server to which a client made a sticky connection. Enter an
integer from 0 to 65535. The default timeout value is 1440 minutes
(24 hours).
activeconns Specifies that a sticky entry is timed out when the timer expires even
if there are active connections associated with the sticky entry.
Usage Guidelines If a client initiates a new connection before the timer expires and the request matches the same server
load balancing (SLB) policy as the previous connection, the ACE appliance load balances the client to
the same server that was used to service the previous request.
Examples To specify the duration for sticky connections between a client and a real server to persist, enter:
host1/Admin(config-sticky-cookie)# timeout activeconns
To restore the ACE to its default of not timing out HTTP-cookie sticky entries if active connections exist
for those entries, enter:
host1/Admin(config-sticky-cookie)# no timeout activeconns
Syntax Description name1 HTTP header name. Enter an unquoted text string with no spaces and
a maximum of 64 alphanumeric characters. Alternatively, you can
enter one of the standard headers described in the “Usage
Guidelines” section.
name2 Unique identifier of the sticky group. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the sticky feature in your user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
You can create a maximum of 4096 sticky groups in the ACE.
By default, the maximum number of bytes that the ACE parses to check for a cookie, HTTP header, or
URL is 2048. If a cookie, HTTP header, or URL exceeds the default value, the ACE drops the packet
and sends a RST (reset) to the client browser. You can increase the number of bytes that the ACE parses
using the set header-maxparse-length command in HTTP parameter-map configuration mode.
You can also change the default behavior of the ACE when a cookie, header, or URL exceeds the
maximum parse length using the length-exceed command in HTTP parameter-map configuration mode.
Table 2-11 lists and describes the standard HTTP header names.
Syntax Description offset number1 Specifies the portion of the HTTP header that the ACE uses to stick
the client on a particular server by indicating the bytes to ignore
starting with the first byte of the HTTP header. Enter an integer from
0 to 31. The default is 0, which indicates that the ACE does not
exclude any portion of the header.
length number2 (Optional) Specifies the length of the portion of the HTTP header
(starting with the byte after the offset value) that the ACE uses for
sticking the client to the server. Enter an integer from 1 to 32. The
default is 32.
Usage Guidelines The ACE stores header offset and length values in the sticky table.
You can configure the ACE to use a portion of an HTTP header to make persistent connections to a
specific server. To define the portion of the HTTP header that you want the ACE to use, you specify
HTTP-header offset and length values. The offset and length can vary from 0 to 32 bytes. The ACE sticks
the connection based on that portion of the HTTP header that starts with the byte after the offset value
and ends with the byte specified by the offset plus the length. The total of the offset and the length cannot
exceed 32 bytes.
To remove the HTTP-header offset and length values from the configuration, enter:
host1/Admin(config-sticky-header)# no header offset 3000 length 1000
replicate sticky
no replicate sticky
Usage Guidelines If you are using redundancy, you can configure the ACE to replicate HTTP-header sticky table entries
on the standby ACE so that, if a switchover occurs, the new active ACE can maintain existing sticky
connections.
The timer of a sticky table entry on the standby ACE is reset everytime the entry is synchronized with
the active ACE entry. Thus, the standby sticky entry may have a lifetime up to twice as long as the active
entry. However, if the entry expires on the active ACE or a new real server is selected and a new entry is
created, the old entry on the standby ACE is replaced.
Examples To instruct the ACE to replicate HTTP-header sticky table entries on the standby ACE, enter:
host1/Admin(config-sticky-header)# replicate sticky
To restore the ACE to its default of not replicating HTTP-header sticky table entries, enter:
host1/Admin(config-sticky-header)# no replicate sticky
(config-sticky-header) serverfarm
To complete a sticky group configuration, you must configure a server farm entry for the group. To
configure a server farm entry for a sticky group, use the serverfarm command. Use the no form of this
command to dissociate a server farm from a sticky group.
no serverfarm
Syntax Description name1 Identifier of an existing server farm that you want to associate with
the sticky group. You can associate one server farm with each sticky
group. Enter a name as an unquoted text string with no spaces and a
maximum of 64 alphanumeric characters.
backup name2 (Optional) Specifies the keyword and identifier of a backup server
farm. If the primary server farm is down, the ACE uses the configured
backup server farm. Once clients are stuck to a backup server farm,
they remain stuck to the backup even if the primary server farm
becomes active again. Enter a name as an unquoted text string with
no spaces and a maximum of 64 alphanumeric characters.
sticky (Optional) Specifies that the backup server farm is sticky.
aggregate-state (Optional) Specifies that the state of the primary server farm is tied
to the state of all the real servers in that server farm and in the backup
server farm, if configured. The ACE declares the primary server farm
down if all real servers in the primary server farm and all real servers
in the backup server farm are down.
Examples To associate a server farm with a sticky group and specify a sticky backup server farm, enter:
host1/Admin(config-sticky-header)# serverfarm SFARM1 backup BKUP_SFARM2 sticky
aggregate-state
Syntax Description sequence_number (Optional) Sequence number for a static cookie entry.
value Header string value. Enter an unquoted text string with no spaces and
a maximum of 255 alphanumeric characters. Alternatively, you can
enter a text string with spaces provided that you enclose the string in
quotation marks (“").
rserver name Specifies the hostname of an existing real server. Enter an unquoted
text string with no spaces and a maximum of 64 alphanumeric
characters.
number (Optional) Port number of the real server. Enter an integer from 1 to
65535.
Usage Guidelines You can configure the ACE to use static headers from entries based on header values and, optionally, real
server names and ports. Static header values remain constant over time.
You can configure multiple static header entries, but only one unique real-server name can exist for a
given static header value. When you configure a static entry, the ACE enters it into the sticky table
immediately. You can create a maximum of 4096 static sticky entries in the ACE.
(config-sticky-header) timeout
To specify the duration for sticky connections between a client and a real server to persist, use the
timeout command. Use the no form of this command to reset the sticky timeout to the default of
1440 minutes.
Syntax Description sticky-time Length of time in minutes that the ACE appliance remembers the last
real server to which a client made a sticky connection. Enter an
integer from 1 to 65535. The default timeout value is 1440 minutes
(24 hours).
activeconns Specifies that sticky entries are timed out when the timer expires even
if there are active connections.
Usage Guidelines If a client initiates a new connection before the timer expires and the request matches the same server
load balancing (SLB) policy as the previous connection, the ACE appliance load balances the client to
the same server that was used to service the previous request.
Examples To specify the duration for sticky connections between a client and a real server to persist, enter:
host1/Admin(config-sticky-header)# timeout activeconns
To restore the ACE to its default of not timing out HTTP-header sticky entries if active connections exist
for those entries, enter:
host1/Admin(config-sticky-header)# no timeout activeconns
Syntax Description netmask Network mask that the ACE applies to the IP address. Enter a
network mask in dotted-decimal notation (for example,
255.255.255.0).
address {source | destination Specifies the IP address used for stickiness. Enter one of the
| both} following keywords:
• source—Specifies that the ACE use the client source IP address
to stick the client to a server. You use this keyword in web
application environments.
• destination—Specifies that the ACE use the destination address
specified in the client request to stick the client to a server. You
use this keyword in caching environments.
• both—Specifies that the ACE use both the source IP address and
the destination IP address to stick the client to a server.
name Unique identifier of the sticky group. Enter an unquoted text string
with no spaces and a maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the sticky feature in your user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
You can create a maximum of 4096 sticky groups in the ACE.
Examples To create a sticky group that uses IP address stickiness based on both the source IP address and the
destination IP address, enter:
host1/Admin(config)# sticky ip netmask 255.255.255.0 address both GROUP1
host1/Admin(config-sticky-ip)#
replicate sticky
no replicate sticky
Usage Guidelines If you are using redundancy, you can configure the ACE to replicate IP address sticky table entries on
the standby ACE so that, if a switchover occurs, the new active ACE can maintain existing sticky
connections.
The timer of a sticky table entry on the standby ACE is reset everytime the entry is synchronized with
the active ACE entry. Thus, the standby sticky entry may have a lifetime up to twice as long as the active
entry. However, if the entry expires on the active ACE or a new real server is selected and a new entry is
created, the old entry on the standby ACE is replaced.
Examples To instruct the ACE to replicate IP address sticky table entries on the standby ACE, enter:
host1/Admin(config-sticky-ip)# replicate sticky
To restore the default of the ACE to not replicate IP address sticky table entries, enter:
host1/Admin(config-sticky-ip)# no replicate sticky
(config-sticky-ip) serverfarm
To complete a sticky group configuration, you must configure a server farm entry for the group. To
configure a server farm entry for a sticky group, use the serverfarm command. Use the no form of this
command to dissociate a server farm from a sticky group.
no serverfarm
Syntax Description name1 Identifier of an existing server farm that you want to associate with
the sticky group. You can associate one server farm with each sticky
group. Enter a name as an unquoted text string with no spaces and a
maximum of 64 alphanumeric characters.
backup name2 (Optional) Specifies the keyword and identifier of a backup server
farm. If the primary server farm is down, the ACE uses the configured
backup server farm. Once clients are stuck to a backup server farm,
they remain stuck to the backup even if the primary server farm
becomes active again. Enter a name as an unquoted text string with
no spaces and a maximum of 64 alphanumeric characters.
sticky (Optional) Specifies that the backup server farm is sticky.
aggregate-state (Optional) Specifies that the state of the primary server farm is tied
to the state of all the real servers in that server farm and in the backup
server farm, if configured. The ACE declares the primary server farm
down if all real servers in the primary server farm and all real servers
in the backup server farm are down.
Examples To associate a server farm with a sticky group and specify a sticky backup server farm, enter:
host1/Admin(config-sticky-ip)# serverfarm SFARM1 backup BKUP_SFARM2 sticky aggregate-state
If you configured the sticky group with the destination option, the syntax of this command is as follows:
If you configured the sticky group with the both option, the syntax of this command is as follows:
Syntax Description source ip-address Specifies that the static entry is based on the source IP address. Enter
an IP address in dotted-decimal notation (for example,
192.168.12.15).
rserver name Specifies that the static entry is based on the real server name. Enter
the name of an existing real server as an unquoted text string with no
spaces and a maximum of 64 alphanumeric characters.
number (Optional) Port number of the real server. Enter an integer from 1 to
65535.
destination ip-address Specifies that the static entry is based on the destination IP address.
Enter an IP address in dotted-decimal notation (for example,
172.16.27.3).
Usage Guidelines You can configure static sticky table entries based on the source IP address, the destination IP address,
or the real server name and port. Static sticky-IP values remain constant over time and you can configure
multiple static entries. When you configure a static entry, the ACE enters it into the sticky table
immediately. You can configure a maximum of 4096 static sticky entries in the ACE.
Examples To configure a static sticky entry based on the source IP address, the destination IP address, and the
server name and port number, enter:
host1/Admin(config-sticky-ip)# static client source 192.168.12.15 destination 172.16.27.3
rserver SERVER1 2000
(config-sticky-ip) timeout
To configure an IP address sticky timeout, use the timeout minutes command. Use the no form of this
command to reset the sticky timeout to the default of 1440 minutes (24 hours).
Syntax Description sticky-time Length of time in minutes that the ACE appliance remembers the last
real server to which a client made a sticky connection. Enter an
integer from 1 to 65535. The default timeout value is 1440 minutes
(24 hours).
activeconns Specifies that sticky entries are timed out when the timer expires even
if there are active connections.
Usage Guidelines The sticky timeout specifies the period of time that the ACE keeps (if possible) the IP address sticky
information for a client connection in the sticky table after the latest client connection terminates. The
ACE resets the sticky timer for a specific sticky-table entry each time that the appliance opens a new
connection or receives a new HTTP GET on an existing connection matching that entry. High connection
rates may cause the sticky table entries to age out prematurely.
By default, the ACE ages out a sticky table entry when the timeout for that entry expires and no active
connections matching that entry exist. To specify that the ACE time out IP address sticky table entries
even if active connections exist after the sticky timer expires, use the timeout activeconns command.
To specify that the ACE time out IP address sticky table entries even if active connections exist after the
sticky timer expires, enter:
host1/Admin(config-sticky-ip)# timeout activeconns
To restore the ACE to its default of not timing out IP address sticky entries if active connections exist,
enter:
host1/Admin(config-sticky-ip)# no timeout activeconns
Syntax Description group_name Name assigned to the group of TACACS+ servers. The server group name is a
maximum of 64 alphanumeric characters.
Usage Guidelines The commands in this mode require the AAA feature in your user role. For details about role-based
access control (RBAC) and user roles, see the Cisco 4700 Series Application Control Engine Appliance
Virtualization Configuration Guide.
A server group is a list of server hosts. The ACE allows you to configure multiple AAA servers as a
named server group. You group the different AAA server hosts into distinct lists. The ACE searches for
the server hosts in the order in which you specify them within a group. You can configure a maximum
of 100 server groups for each context in the ACE.
You can configure server groups at any time, but you must enter the aaa authentication login or the aaa
accounting default commands to apply the groups to the AAA service.
(config-tacacs+) deadtime
To specify a dead-time interval for the TACACS+ server group, use the deadtime command. Use the no
form of this command to reset the TACACS+ server group dead-time request to the default of 0.
deadtime minutes
no deadtime minutes
Syntax Description minutes Length of time that the ACE skips a nonresponsive TACACS+ server for transaction
requests. Valid entries are from 0 to 1440 (24 hours). The default is 0.
Usage Guidelines During the dead-time interval, the ACE sends probe access-request packets to verify that the TACACS+
server is available and can receive authentication requests. The dead-time interval starts when the server
does not respond to an authentication request transmission. When the server responds to a probe
access-request packet, the ACE retransmits the authentication request to the server.
Use of the deadtime command causes the ACE to mark as dead any TACACS+ servers that fail to
respond to authentication requests. Using this command prevents the wait for the request to time out
before trying the next configured server. The ACE skips a TACACS+ server that is marked as dead by
additional requests for the duration of minutes.
Examples To globally configure a 15-minute dead-time for TACACS+ servers that fail to respond to authentication
requests, enter:
host1/Admin(config-tacacs+)# deadtime 15
(config-tacacs+) server
To specify the IP address of one or more previously configured TACACS+ servers that you want added
to or removed from a AAA server group, use the server command. Use the no form of this command to
remove the TACACS+ server from the AAA server group.
server ip_address
no server ip_address
Syntax Description ip_address IP address of the TACACS+ server. Enter the address in dotted-decimal IP notation (for
example, 192.168.11.1).
Usage Guidelines You can add multiple TACACS+ servers to the AAA server group by entering multiple server commands
in this mode. The same server can belong to multiple server groups.
(config) logging device-id 2-235 (config) snmp-server trap link ietf 2-288
(config) logging enable 2-236 (config) snmp-server trap-source vlan 2-289
(config) logging facility 2-237 (config) snmp-server user 2-290
(config) logging fastpath 2-238 (config) ssh key 2-292
(config) logging history 2-239 (config) ssh maxsessions 2-294
(config) logging host 2-240 (config) ssl-proxy service 2-295
(config) logging message 2-242 (config) sticky http-cookie 2-296
(config) logging monitor 2-244 (config) sticky http-header 2-297
(config) logging persistent 2-246 (config) sticky ip-netmask 2-299
(config) logging queue 2-247 (config) tacacs-server deadtime 2-301
(config) logging reject-newconn 2-250 (config) tacacs-server host 2-302
(config) logging standby 2-251 (config) tacacs-server key 2-304
(config) logging timestamp 2-252 (config) tacacs-server timeout 2-305
(config) logging trap 2-253 (config) telnet maxsessions 2-306
(config) login timeout 2-232 (config) timeout xlate 2-307
(config) ntp 2-254 (config) username 2-308
(config) optimize 2-256
(config) parameter-map type 2-194, 2-257
Console Configuration Mode
(config) policy-map 2-259
Commands 2-372
(config) probe 2-262
(config) radius-server attribute nas-ipaddr 2-264 (config-console) databits 2-373
(config) radius-server deadtime 2-265 (config-console) parity 2-374
(config) radius-server host 2-266 (config-console) speed 2-375
(config) radius-server key 2-269 (config-console) stopbits 2-376
(config) radius-server retransmit 2-270
(config) radius-server timeout 2-271
Context Configuration Mode
(config) rate-limit 2-248
Commands 2-377
(config) resource-class 2-272
(config) role 2-273 (config-context) allocate-interface 2-379
Policy Map Class Configuration Mode Policy Map Inspection HTTP Class
Commands 2-538 Configuration Mode Commands 2-588
Policy Map FTP Inspection Match Policy Map Load Balancing Class
Configuration Mode Commands 2-557 Configuration Mode Commands 2-605
(config-pmap-lb) match http cookie 2-597 (config-pmap-optmz) match http cookie 2-631
(config-pmap-lb) match http header 2-599 (config-pmap-optmz) match http header 2-632
(config-pmap-lb) match http url 2-602 (config-pmap-optmz) match http url 2-635