Device Manager GUI Guide vA1(7), Cisco ACE 4700 Series Application Control Engine Appliance
Index
Downloads: This chapterpdf (PDF - 648.0KB) The complete bookPDF (PDF - 11.63MB) | Feedback

Index

Table Of Contents

A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - R - S - T - U - V - W -

Index

A

acceleration

configuring 3-38

configuring globally on ACE 8-9

overview 8-2

traffic policies 8-2

typical configuration flow 8-2

access control, configuring on VLAN interfaces 5-6

account password 1-4

accounts

see also users

user, managing 10-7

ACE appliance

licenses

configuration 2-28

importing 2-24

installing 2-25

managing 2-23

removing 2-26

statistics 2-28

updating 2-27

viewing 2-23

ACE Appliance Device Manager

button descriptions

in monitor screens 1-14

in tables 1-9

icon descriptions

in monitor screens 1-14

in tables 1-9

logging in 1-3

overview 1-5

password, changing

account 1-5

login 1-5

table

buttons 1-14

conventions 1-10

customizing 1-11

icons 1-14

terminology 1-17

ACE appliance server

configuring attributes 10-33

polling, enabling 10-33

statistics 10-32

ACL

configuration overview 2-36

configuring

EtherType attributes 2-38

extended ACL attributes 2-39

for VLANs 5-6

creating 2-37

definition GL-1

deleting 2-43

resequencing 2-42

viewing by context 2-43

action list

configuration options 3-40

configuring 8-3

activate

definition GL-1

real servers 3-73

virtual servers 3-43

adding

domain objects 10-31

domains 10-29

new users 10-8

resource classes 2-32

roles 10-25

admin

changing passwords 10-13

menu options 10-2

Admin context, first virtual context 2-1

administrative distance, definition GL-1

advanced editing mode 1-11

AES, definition GL-1

all-match policy map 7-28

All Virtual Contexts table 2-44

application acceleration

configuring 3-38

configuring globally on ACE 8-9

overview 8-2

traffic policies 8-2

typical configuration flow 8-2

application protocol inspection

class map overview 7-5

DNS 7-7

FTP 7-8

HTTP 7-7

ICMP 7-10

limitations 7-6

NAT and PAT support 7-6

overview 7-5

policy map overview 7-5

protocol inspection overview 7-5

RTSP 7-11

standards 7-6

supported protocols 7-6

ARP

configuring static ARP 5-8

definition GL-1

attributes

BVI interfaces 5-14

connection parameter maps 3-14, 3-86

DNS probes 3-61

Echo-TCP probes 3-61

Echo-UDP probes 3-62

Finger probes 3-62

FTP probes 3-62

health monitoring 3-59

high availability 6-7

HTTP parameter maps 3-12, 3-91

HTTP probes 3-63

HTTPS probes 3-64

IMAP probes 3-66

Layer 3/Layer 4 management class map match conditions 7-17

Layer 3/Layer 4 network traffic policy map actions 7-31

Layer 7 load balancing class map match conditions 7-19

optimization parameter maps 3-93

POP probes 3-67

predictor method 3-53

RADIUS probes 3-67

real servers 3-45

resource classes 2-30

scripted probes 3-68

server farms 3-31, 3-48

SMTP probes 3-69

SNMP 2-15

SSL

certificate export 4-9

certificate import 4-4

for virtual servers 3-19, 3-35

key export 4-11

key pair import 4-6

sticky group 3-81

TCP probes 3-69

Telnet probes 3-69

UDP probes 3-70

virtual contexts 2-6

virtual servers 3-7

VLAN interfaces 5-2

B

bandwidth optimization, configuring 3-38

button descriptions

common buttons 1-8

in monitor screens 1-14

in tables 1-9

BVI, definition GL-1

BVI interfaces

attributes 5-14

configuring 5-14

viewing by context 5-15

C

caution, when allocating resources 2-32

certificate

exporting for SSL 4-9

importing for SSL 4-3

SSL 4-2

certificate chain, definition GL-1

certificate signing request (CSR), definition GL-2

chain group certificate, configuring for SSL 4-14

chain group parameters, configuring for SSL 4-13

changeto command 10-14

changing

account password 1-5

admin password 10-13

login password 1-5

role rules 10-27

user passwords 10-13

class map

configuring 7-12

definition GL-2

deleting 7-12, 7-13

in application protocol inspection process 7-5

match conditions

for deep packet inspection 7-20

for FTP command inspection 7-26

for Layer 7 load balancing 7-18

for management traffic 7-17

for network traffic 7-14

match types 7-14, 7-17, 7-18, 7-20, 7-26

overview 3-1, 7-1, 7-2

use with real servers 3-3

virtual-address match type attributes 7-15

command inspection class maps, setting match conditions 7-26

configuration

high-level flow 1-15

overview 1-15

task overview 1-15

configuration attributes

health monitoring 3-59

high availability 6-7

parameter map

connection 3-14, 3-86

HTTP 3-12, 3-91

optimization 3-93

predictor method 3-53

probe

DNS 3-61

Echo-TCP 3-61

Echo-UDP 3-62

Finger 3-62

FTP 3-62

HTTP 3-63

HTTPS 3-64

IMAP 3-66

POP 3-67

RADIUS 3-67

scripted 3-68

SMTP 3-69

TCP 3-69

Telnet 3-69

UDP 3-70

real server 3-45

server farm 3-31, 3-48

SNMP users 2-17

SSL 3-19, 3-35

sticky group 3-81

sticky type 3-33

syslog 2-9

virtual context system options 2-7

virtual server 3-7

configurations

synchronizing

for high availability 6-5

virtual context 2-45

viewing status 2-45

configuration synchronization 6-4

configuring

acceleration 3-38

ACLs 2-37, 5-6

EtherType 2-38

extended 2-39

resequencing 2-42

action lists 3-40, 8-3

bandwidth optimization 3-38

BVI interfaces 5-14

class maps 7-12, 7-14

DHCP relay 5-10

DNS probe expect address 3-70

gigabit Ethernet interfaces 5-12

health monitoring general attributes 3-59

high availability

groups 6-10, 6-11

host tracking 6-16

interface tracking 6-15

peer host probes 6-18

peers 6-6

synchronization 6-4

tracking and failure detection 6-14

host probes for high availability 6-17

HTTP probe headers 3-71

HTTP retcode maps 3-55

HTTPS probe headers 3-71

latency optimization 3-38

Layer 7 default load balancing 3-36

load balancing

for real servers 3-45

for server farms 3-47

on virtual servers 3-26

sticky groups 3-80

management VLAN 2-2

NAT 3-41, 5-9

optimization 3-38

action lists 3-40

traffic policies 8-6

parameter map

connection 3-85

HTTP 3-91

optimization 3-93, 8-5

PAT 5-9

policy map rules and actions

Layer 3/Layer 4 management traffic policy maps 7-34

Layer 3/Layer 4 network traffic policy maps 7-29

Layer 7 deep packet inspection policy maps 7-40

Layer 7 FTP command inspection policy maps 7-47

Layer 7 HTTP optimization policy maps 7-49

Layer 7 server load-balancing traffic policy maps 7-36

port channel interfaces 5-10

probe expect status 3-72

protocol inspection 3-20

real servers 3-74

resource classes 2-32

server farm predictor method 3-52

shared objects 3-9

SNMP 2-15

communities 2-16

notification 2-20

on virtual contexts 2-15

trap destination hosts 2-19

users 2-17

SSL

chain group parameters 4-13

CSR parameters 4-14

for virtual servers 3-19

parameter map 4-12

parameter map cipher 4-12

proxy service 4-16

static ARP for VLANs 5-8

static routes 5-15

sticky groups 3-33, 3-80

sticky statics 3-84

syslog

logging 2-8

log hosts 2-12

log messages 2-13

log rate limits 2-14

traffic policies 7-1

virtual context 2-1, 2-4, 2-48

expert options 2-44

global policies 2-22

policy maps 7-27

primary attributes 2-7

system attributes 2-6

virtual server

configuration overview 3-4

default Layer 7 load balancing 3-36

Layer 7 load balancing 3-26

NAT 3-41

properties 3-10

protocol inspection 3-20

shared objects 3-9

SSL termination service 3-19

VLAN

interface access control 5-6

interface options 5-5

interface policy maps 5-5

interfaces 5-1

connection parameter map

attributes 3-14, 3-86

configuring 3-85

TCP options 3-90

using 3-85, 3-102

context

configuration options 2-5

configuring 2-4

BVI interfaces 5-14

global policies 2-22

load-balancing services 3-1

primary attributes 2-7

static routes 5-15

VLAN interfaces 5-1

creating 2-2

definition GL-6

deleting 2-48

editing 2-48

modifying 2-48

synchronizing configurations 2-46, 2-47

viewing all 2-44

controlling access to CiscoACE appliance 10-3

conventions

in ACE Appliance Device Manager, table 1-10

radio buttons, dropdown lists 2-4

cookie

client 3-78

sticky client identification 3-78

CPU

monitoring 9-5

CPU usage, monitoring ACE 10-33

creating

ACLs 2-37

diagnostic packages 11-1

domains 10-29

user accounts 10-8

user roles 10-25

virtual contexts 2-2

CSR

configuring parameters 4-14

definition GL-2

generating for SSL 4-16

D

Data Encryption Standard (DES), definition GL-2

deep packet inspection

class maps 7-20

policy map options 7-32

default user 10-5

deleting

ACLs 2-43

active users 10-11

class map in use 7-12

domain objects 10-31

domains 10-31

files off the ACE 11-7

high availability groups 6-14

host probes for high availability 6-18

Lifeline packages 11-4

peer host probes 6-19

resource classes 2-34

role rules 10-27

user accounts 10-10

user roles 10-27

virtual contexts 2-48

DES, definition GL-2

device

using ping 9-13

device management, monitoring 10-2

DFP, definition GL-2

DHCP relay, configuring 5-10

diagnostic tools

file browser 11-4

disk usage, monitoring ACE 10-33

displaying

current user sessions 10-11

list of users 10-8

network domains 10-28

user roles 10-25

users who have a selected role 10-25

distinguished name, definition GL-2

DNS

application protocol support 7-6

configuring protocol inspection 3-20

inspection overview 7-7

DNS probe

attributes 3-61

expect address 3-70

domains

attributes 10-30

creating 10-29

deleting 10-31

displaying 10-28

editing 10-30

guidelines 10-28

managing 10-28

understanding 10-7

downloading

files to ACE 11-5

Dynamic Feedback Protocol (DFP), definition GL-2

E

Echo-TCP probe attributes 3-61

Echo-UDP probe attributes 3-62

e-commerce

applications, sticky requirements 3-77

using stickiness 3-77

editing

domains 10-30

role rules 10-27

user account info 10-10

user roles 10-26

encryption, password

passwords

encrypting user 10-9

error

monitoring, list of polling messages 9-2

Ethernet interfaces, configuring 5-12

event, definition GL-2

event type, definition GL-2

exception, definition GL-2

expert options for virtual contexts 2-44

exporting

SSL

certificates 4-9

key 4-11

key pair 4-10

F

failover 6-2

fault, definition GL-2

fault tolerance

groups 6-1

task overview 6-4

file browser

deleting files 11-7

downloading files 11-5

renaming files 11-6

tasks 11-4

uploading files 11-6

viewing files 11-8

File Transfer Protocol (FTP), definition GL-2

filtering tables 1-11

Finger probe attributes 3-62

first-match policy map 7-27

forcing logouts 10-12

FTP

application protocol support 7-6

configuring protocol inspection 3-20

definition GL-2

inspection overview 7-8

FTP command inspection class map match conditions 7-26

FTP probe attributes 3-62

FTP strict

and RFP standards 7-9

application protocol support 7-6

FT VLAN 6-3

G

getting started

flowchart 1-15

task overview 1-15

global acceleration and optimization 8-9

global policies, configuring for virtual contexts 2-22

GMT 1-13, 9-3

graph

icons for 1-14

maximum number of statistics 1-13

viewing results 1-13

graphs

using GMT 1-13

value delta per time 9-3

guidelines

Lifeline 11-2

guidelines for managing

domains 10-28

user accounts 10-8

user roles 10-14

H

hash load-balancing methods

address 3-3

cookie 3-3

header 3-3

url 3-2

health monitoring

configuring 3-56

for real servers 3-57

general attributes 3-59

overview 3-56

probe types 3-58

TCL scripts 3-56

heartbeat packets 6-2

high availability

clearing

links between ACE appliances 6-8

pairs 6-8

configuration attributes 6-7

configuring

groups 6-10

host probes 6-17

host tracking process 6-16

interface tracking process 6-15

overview 6-1

peer host probes 6-18

peers 6-6

deleting

groups 6-14

host probes 6-18

peer host probes 6-19

failover detection 6-14

importance of synchronizing configurations 6-5

modifying groups 6-11

protocol 6-1

switching over a group 6-13

task overview 6-4

tracking status 6-14

Hot Standby Router Protocol (HSRP), definition GL-3

HSRP, definition GL-3

HTTP

application protocol support 7-6

configuring

parameter maps 3-91

retcode maps 3-55

inspection overview 7-7

parameter map attributes 3-12, 3-91

parameter maps 3-85, 3-91, 3-102

probe attributes 3-63

HTTP/HTTPS

configuring protocol inspection 3-21

protocol inspection conditions and options 3-23

HTTP deep packet inspection class map match conditions 7-20

HTTP header, sticky client identification 3-79

HTTP optimization policy map rules 7-50

HTTP probe, configuring headers 3-71

HTTP protocol inspection

class map match conditions 7-22

policy map rules 7-42

HTTPS probe

attributes 3-64

configuring headers 3-71

I

ICMP

application protocol support 7-6

definition GL-3

inspection overview 7-10

ICMP error, application protocol support 7-6

icon descriptions

in monitor screens 1-14

in tables 1-9

IMAP probe attributes 3-66

importing

ACE licenses 2-24

SSL

certificates 4-3

keys 4-6

installing ACE appliance licenses 2-25

interface

ACE Appliance Device Manager 1-5

definition GL-3

gigabit Ethernet, configuring 5-12

monitoring 9-6

VLAN options, configuring 5-5

Internet Control Message Protocol (ICMP), definition GL-3

IP address, for sticky client identification 3-77

K

key

exporting for SSL 4-11

importing for SSL 4-6

SSL 4-5

key pair, generating 4-7

L

latency optimization, configuring 3-38

Layer 3/Layer 4

management traffic

class map match conditions 7-17

policy map rules and actions 7-34

network traffic class maps, setting match conditions 7-14

network traffic policy maps

action attributes 7-31

setting rules and actions 7-29

Layer 7

configuring load balancing for HTTP/HTTPS 3-26

default load balancing on virtual servers 3-36

FTP command inspection class maps, setting match conditions 7-26

FTP command inspection policy maps, setting rules and actions 7-47

HTTP deep packet inspection class maps, setting match conditions 7-20

HTTP deep packet inspection policy maps, setting rules and actions 7-40

HTTP optimization policy maps, setting rules and actions 7-49

load balancing

rule types 3-28

setting match conditions 3-27

load-balancing class maps, setting match conditions 7-18

load-balancing policy maps, setting rules and actions 7-36

leastconns, load-balancing method 3-2

licenses

importing 2-24

installing 2-25

managing for ACE appliances 2-23

removing 2-26

updating 2-27

viewing information about 2-28

Lifeline

creating a package 11-2

deleting packages 11-4

downloading a package 11-3

guidelines for use 11-2

maximum packages 11-2

load balancing

configuration overview 3-1

configuring

for real servers 3-45

for server farms 3-47

on virtual servers 3-26

sticky groups 3-80

with virtual servers 3-4

definition GL-3

hash address 3-3

hash cookie 3-3

hash header 3-3

hash url 3-2

Layer 7 3-26

leastconns 3-2

monitoring 9-4

predictors 3-2

roundrobin 3-2

load-balancing class maps

Layer 7 7-18

setting match conditions 7-18

logging, syslog levels 2-8

logging in

to ACE Appliance Device Manager 1-3

M

Management Information Base (MIB), definition GL-3

management VLAN, adding 2-2

managing

domains 10-28

real servers 3-73

resource classes 2-29

user accounts 10-7

user roles 10-13

virtual contexts 2-44

virtual servers 3-42

match conditions

configuring for class maps 7-14

for Layer 7 load balancing 3-27

for optimization 3-39

for optimization policy maps 7-50

HTTP optimization 7-50

HTTP protocol inspection 7-22, 7-42

Layer 7 load-balancing class maps 7-18

Layer 7 load-balancing traffic policy maps 7-37

network management class maps 7-17

MD5, definition GL-3

memory usage, monitoring ACE 10-33

menus, understanding 1-7

Message Digest 5 (MD5), definition GL-3

MIB, definition GL-3

MIME types, supported 3-100

modifying

domains 10-30

high availability groups 6-11

real servers 3-74

resource classes 2-33

user accounts 10-10

user roles 10-26

virtual contexts 2-48

monitoring

buttons used in graphs 1-13

CPU statistics 9-5

interfaces 9-6

load balancing 9-4

overview 9-1

prerequisites 9-1

probes 9-10

real servers 9-7

statistics 10-32

viewing results, description 1-13

multi-match policy map 7-28

N

Nagle algorithm and TCP latency 3-14

Name Address Translation

configuring 5-9

definition GL-3

NAT

application protocol inspection support 7-6

configuring 5-9

configuring on virtual servers 3-41

definition GL-3

network management traffic

class map match conditions 7-17

policy maps, configuring rules and actions 7-34

O

object

configuring for virtual servers 3-9

definition GL-4

operational states of real servers 3-76

operations privileges 10-6

optimization

configuration overview 8-6

configuring 3-38

action lists 3-40

globally on ACE 8-9

match conditions 3-39

parameter maps 3-93, 8-5

policy map rules and actions 7-49

traffic policies 8-6

functionality overview 8-2

match condition types 7-50

match criteria 3-39

overview 8-2

parameter map attributes 3-93

parameter maps 3-85, 3-102

traffic policies 8-2

typical configuration flow 8-2

overview

ACL configuration 2-36

admin functions 10-1

application acceleration 8-2

application protocol inspection 7-5

class map 7-1

configuration 1-15

configuration tasks 1-15

load-balancing predictors 3-2

optimization 8-2

optimization traffic policies 8-6

policy map 7-1

real server 3-3

resource classes 2-29

server farm 3-3, 3-4

server health monitoring 3-56

SSL 4-1

stickiness 3-77

sticky table 3-79

traffic policies 7-1

using SSL keys and certificates 4-1

virtual contexts 2-1

virtual server 3-2

P

parameter expander functions 3-99

parameter map

attributes

connection 3-14, 3-86

HTTP 3-12, 3-91

optimization 3-93

configuring

connection 3-85

for SSL 4-12

HTTP 3-91

optimization 3-93, 8-5

types 7-4

using with Layer 3/Layer 4 policy maps 3-85, 3-102, 7-4

viewing list of 3-102

parameter map cipher, configuring for SSL 4-12

parent rows, in screens and tables 1-10

passwords

changing

admin 10-13

passwords, changing

for accounts 1-5

in login screen 1-5

PAT

configuring 5-9

definition GL-4

peers, high availability 6-6

PEM, definition GL-4

ping

definition GL-4

testing 9-13

PKCS, definition GL-4

policy map

all-match 7-28

configuring

in virtual contexts 7-27

on VLAN interfaces 5-5

deep packet inspection options 7-32

first-match 7-27

in application protocol inspection process 7-5

Layer 3/Layer 4

management traffic, setting rules and actions 7-34

network traffic, setting rules and actions 7-29

Layer 7

FTP command inspection, setting rules and actions 7-47

HTTP deep packet inspection, setting rules and actions 7-40

HTTP optimization, setting rules and actions 7-49

Layer 7 load-balancing traffic

configuring rules and actions 7-36

match condition types 7-37

multi-match 7-28

overview 3-1, 7-1, 7-3

polling

enabling 10-33

failed 9-2

not polled error 9-2

timed out 9-2

troubleshooting 9-4

unknown error 9-2

polling error states 9-2

POP probe attributes 3-67

port, definition GL-4

Port Address Translation

configuring 5-9

definition GL-4

port channel interfaces

attributes 5-11

configuring 5-10

predictor

hash address 3-3

hash cookie 3-3

hash header 3-3

hash url 3-2

leastconns 3-2

roundrobin 3-2

predictor method

attributes 3-53

configuring for server farms 3-52

prerequisites

monitoring 9-1

primary attributes

for virtual contexts 2-7

privileges, understanding 10-6

probe

attribute tables 3-60

configuring expect status 3-72

configuring for health monitoring 3-57

DNS 3-61

Echo-TCP 3-61

Echo-UDP 3-62

Finger 3-62

FTP 3-62

HTTP 3-63

HTTPS 3-64

IMAP 3-66

POP 3-67

RADIUS 3-67

scripted 3-68

scripting using TCL 3-56

SMTP 3-69

TCP 3-69

Telnet 3-69

types for real server monitoring 3-58

UDP 3-70

probes

monitoring 9-10

process, for traffic classification 7-2

process uptime, monitoring ACE 10-33

protocol inspection

configuring for virtual servers 3-20

configuring match criteria 3-22

HTTP/HTTPS conditions 3-23

supported protocols 7-6

protocol names and numbers 2-40

proxy service, configuring for SSL 4-16

R

RADIUS probe attributes 3-67

RBAC, definition GL-4

real server

activating 3-73

adding to server farm 3-50

check health 9-10

configuration attributes 3-45

configuring load balancing 3-45

definition GL-4

health monitoring 3-56, 3-57

modifying 3-74

monitoring 9-7

operational states 3-76

overview 3-3

suspending 3-74

viewing all 3-75

Real Time Streaming Protocol (RTSP), definition GL-5

redundancy

configuration requirements 6-4

configuration synchronization 6-4

definition GL-4

FT VLAN 6-3

protocol 6-1

task overview 6-4

removing

ACE appliance licenses 2-26

domains 10-31

rules from roles 10-27

renaming

files on ACE 11-6

resource

allocation constraints 2-29

list of 9-12

required for sticky groups 3-80

viewing usage 9-11

resource class

adding 2-32

allocation constraints 2-29

attributes 2-30

configuring 2-32

definition GL-4

deleting 2-34

managing 2-29

modifying 2-33

overview 2-29

viewing use by contexts 2-35

role

options 10-9

role, definition GL-6

role-based access control

containment overview 10-4

definition GL-4

users 10-7

roles

deleting 10-27

editing 10-26

understanding 10-5

roundrobin, load-balancing predictor 3-2

RSA, definition GL-5

RTSP

application protocol support 7-6

definition GL-5

inspection overview 7-11

restrictions 7-11

rules

changing 10-27

S

screens, understanding 1-7

scripted probe

attributes 3-68

overview 3-56

server

activating

real 3-73

virtual 3-43

managing 3-73

state 9-7

suspending

real 3-74

virtual 3-43

server farm

adding real servers 3-50

configuration attributes 3-31, 3-48

configuring

HTTP return error-code checking 3-55

load balancing 3-47

predictor method 3-52

definition GL-5

health monitoring 3-56

overview 3-3, 3-4

predictor method attributes 3-53

viewing list of 3-52

Server Load Balancer (SLB), definition GL-5

service, definition GL-5

shared object

configuring 3-9

configuring for virtual servers 3-9

when deleting virtual servers 3-9

Simple Message Transfer Protocol (SMTP), definition GL-5

SLB, definition GL-5

SMTP

definition GL-5

probe attributes 3-69

SNMP

configuration attributes 2-15

configuring

communities 2-16

notification 2-20

trap destination hosts 2-19

users 2-17

credentials missing 9-2

setting up for monitoring 9-1

trap destination host configuration 2-19

user configuration attributes 2-17

SNMP protocol

and monitoring 9-1

special characters for matching string expressions 7-52

special configuration file, definition GL-5

SSL

certificate

exporting 4-9

exporting attributes 4-9

importing 4-3

importing attributes 4-4

overview 4-1

using 4-2

configuring

chain group certificates 4-14

chain group parameters 4-13

CSR parameters 4-14

for virtual servers 3-19

parameter map 4-12

parameter map cipher 4-12

proxy service 4-16

exporting

certificates 4-9

key pairs 4-10

keys 4-11

generating

CSR 4-16

key pair 4-7

importing

certificates 4-3

keys 4-6

key

exporting 4-11

importing 4-6

overview 4-1

using 4-5

key pair

exporting 4-10

generating 4-7

importing attributes 4-6

overview 4-1

procedure overview 4-1

SSL certificate, using 4-2

SSL key, using 4-5

static ARP, configuring 5-8

static route

configuring 5-15

viewing by context 5-16

statistics

ACE 10-32

collection 10-32

monitoring 10-32

viewing ACE 10-32

statistics collection 9-9

status

ACE appliance 10-32

stickiness

cookie-based 3-78

HTTP header-based 3-79

IP address-based 3-77

overview 3-77

sticky group 3-79

sticky table 3-79

sticky

cookies for client identification 3-78

definition GL-5

e-commerce application requirements 3-77

groups 3-79

HTTP header for client identification 3-79

IP address for client identification 3-77

overview 3-77

table 3-79

sticky group

configuration attributes 3-33, 3-81

configuring load balancing 3-80

configuring sticky statics 3-84

overview 3-79

required resource allocation 3-80

viewing 3-83

sticky statics, configuring for sticky groups 3-84

sticky table overview 3-79

stopping

active user sessions 10-12

support

See Lifeline 11-2

suspend

definition GL-5

real servers 3-74

virtual servers 3-43

switchover 6-2

synchronization of configuration 6-4

synchronizing

all configurations 2-47

configurations for high availability 6-5

context configurations and high availability 2-46

contexts created in CLI 3-4, 3-6

individual configurations 2-46

virtual context configurations 2-45

virtual servers created in CLI 2-47

syslog

configuration attributes 2-9

configuring

logging 2-8

log hosts 2-12

log messages 2-13

log rate limits 2-14

logging levels 2-8

syslog logging, configuring 2-8

T

table

button descriptions 1-9

conventions 1-10

customizing 1-11

filtering information in 1-11

icon descriptions 1-9

parent rows 1-10

tables

probe attributes 3-60

takeover, forcing in high availability 6-13

task overview, redundancy 6-4

TCL script

health monitoring 3-56

overview 3-56

TCP

connection delays and Nagle 3-14

definition GL-5

options for connection parameter maps 3-90

probe attributes 3-69

Telnet probe attributes 3-69

terminating

active user sessions 10-12

terminology used in ACE Appliance Device Manager 1-17

threshold, definition GL-5

tracking user actions 9-13

traffic class components 7-2

traffic classification process 7-2

traffic policy

components 7-3

configuring 7-1

for application acceleration 8-2

for optimization 8-2

lookup order 7-4

overview 7-1

supported actions 7-2

Transfer Control Protocol (TCP), definition GL-5

troubleshooting

polling 9-4

using file browser 11-4

types of users 10-5

U

UDP probe attributes 3-70

understanding

domains 10-7

operations privileges 10-6

roles 10-5

updating ACE appliance licenses 2-27

uploading

files to ACE 11-6

virtual context configurations 2-47

user role, definition GL-6

users

active session info 10-11

adding new 10-8

assigned 10-5

default 10-5

default role options 10-9

deleting 10-10

deleting active 10-11

deleting roles 10-27

forcing logoffs 10-12

guidelines for managing 10-8

overview 10-7

types of 10-5

understanding privileges 10-6

using

ACLs 2-36

virtual contexts 2-1

V

value delta per time graph 9-3

viewing

ACE appliance licenses 2-23

ACLs by context 2-43

all real servers 3-75

all server farms 3-52

all sticky groups 3-83

all virtual contexts 2-44

all virtual servers 3-44

BVI interfaces by context 5-15

configuration status 2-45

files on the ACE 11-8

license information 2-28

network domains 10-28

parameter maps by context 3-102

polling states in monitoring 9-2

resource class use on contexts 2-35

static routes by context 5-16

virtual server details 3-44

virtual servers 3-43

virtual servers by context 3-43

VLAN interfaces by context 5-5

virtual-address match condition attributes 7-15

virtual context

configuration options 2-4

configuring 2-1

BVI interfaces 5-14

class maps 7-12

expert options 2-44

global policies 2-22

load-balancing services 3-1

management VLAN 2-2

policy maps 7-27

primary attributes 2-7

static routes 5-15

system attributes 2-6

VLAN interfaces 5-1

creating 2-2

definition GL-6

deleting 2-48

managing 2-44

modifying 2-48

overview 2-1

synchronizing configurations 2-45, 2-46

using 2-1

viewing

all contexts 2-44

BVI interfaces 5-15

configuration status 2-45

static routes 5-16

VLANS 5-5

Virtual Local Area Network (VLAN), definition GL-6

virtual server

activating 3-43

additional options 3-5

advanced view properties 3-10

and user roles 3-5

basic view properties 3-17

configuration

methods 3-6

recommendations 3-6

configuration subsets 3-7

configuring 3-4, 3-7

default Layer 7 load balancing 3-36

in ACE Appliance Device Manager 3-4

in CLI 2-47, 3-4, 3-6

Layer 7 load balancing 3-26

NAT 3-41

optimization 3-38

properties 3-10

protocol inspection 3-20

shared objects 3-9

SSL 3-19

definition GL-6

deleting and shared objects 3-9

managing 3-42

minimum configuration 3-4

overview 3-2

recommendations for configuring 3-6

shared objects 3-6, 3-9

SSL attributes 3-19, 3-35

suspending 3-43

synchronizing CLI configurations 2-47

viewing

all 3-44

by context 3-43

details 3-44

servers 3-43

VLAN

configuring

access control 5-6

ACLs 5-6

DHCP relay 5-10

management VLAN 2-2

NAT 5-9

policy maps 5-5

static ARP 5-8

definition GL-6

FT VLAN for redundancy 6-3

interface

access control 5-6

attributes 5-2

configuring 5-1

DHCP relay 5-10

NAT pools 5-9

options 5-5

policy maps 5-5

static ARP 5-8

viewing 5-5

VLAN interfaces

attributes 5-2

configuring 5-1

access control 5-6

for virtual contexts 5-1

options 5-5

policy maps 5-5

viewing by context 5-5

VLAN Trunking Protocol (VTP), definition GL-6

VTP, definition GL-6

VTP domain, definition GL-6

W

Web server, definition GL-6

weight, real server 9-7

weighted roundrobin. See roundrobin