Server Load-Balancing Guide vA1(7), Cisco ACE 4700 Series Application Control Engine Appliance
Index
Downloads: This chapterpdf (PDF - 384.0KB) The complete bookPDF (PDF - 5.81MB) | Feedback

Index

Table Of Contents

A - B - C - D - E - F - G - H - I - K - L - M - N - P - Q - R - S - T - U - V - W -

Index

A

asymmetric routing 1-7

B

backup

server, configuring 2-29

server farm, configuring 2-32, 3-36

server farm, sticky 5-6

C

case sensitivity matching 3-42

cipher suite, configuring for HTTPS probes 4-23

class map

configuration example 3-62

configuring 3-1

description, entering 3-50

Layer 7 SLB 3-11

overview of SLB traffic policies 3-2

SLB, configuring 3-49

use with real servers 2-2

compression

content types supported 3-32

HTTP parameter map 3-43

Layer 7 SLB policy action 3-31, 3-43

Layer 7 SLB policy action, excluding specific files/MIME types for HTTP compression 3-21

configurational examples

HTTP cookie stickiness 5-29

HTTP header stickiness 5-42

IP address stickiness 5-16

probe 4-39

real server 2-13

server fams 2-33

SLB traffic policy 3-62

standard firewall 6-32, 6-34

stealth firewall 6-36, 6-38

connection

clearing for real servers 2-40

displaying for real servers 2-38

displaying for server farms 2-43

failure, specifying server farm action 2-19

termination, TCP 4-12

connection keepalive. See HTTP persistence rebalance

cookie

client 5-4

configuring stickiness 5-18

insertion 5-25

length 3-45, 5-26

match criteria 3-13

maximum bytes to parse 3-45

offset 5-25

sticky client identification 5-4

credentials (mailbox), configuring for IMAP probes 4-32

D

database entries

sticky, clearing 5-49

sticky, displaying 5-46

delimiters, URL 3-44

destination IP address 2-24, 2-39, 2-44, 3-2, 3-35, 5-3, 5-8, 5-11, 5-14, 6-3

destination server status code, configuring for SMTP probes 4-30

differentiated services code point. See DSCP

displaying

probe configurations 4-40

real server configurations 2-35

server farm configurations 2-41

stickiness configuration 5-46

DNS

probes, configuring 4-27

domain

name, configuring for DNS probes 4-28

DSCP 3-39

E

Echo probes, configuring 4-15

e-commerce

applications, sticky requirements 5-3

using stickiness 5-2

F

Finger probes, configuring 4-16

firewall

configuration examples 6-32

configurations, displaying 6-32

configurations, supported 6-3

disabling NAT 2-33

load balancing 6-1, 6-3, 6-6, 6-18

overview 6-1

standard configurational diagram 6-4

standard firewall configuration 6-32, 6-34

stealth configurational diagram 6-5

stealth firewall configuration 6-36, 6-38

traffic distribution 6-3

types 6-2, 6-3

FTP probes, configuring 4-25

G

graceful server shutdown 2-2, 2-32, 4-12

H

hash load-balancing methods

address 1-2, 2-24

cookie 1-2, 2-24

header 1-2, 2-24

url 1-2, 2-25

header insertion 3-34

health monitoring

configuring 4-1

real servers 2-7

HTTP

compression 3-31, 3-43

persistence rebalance 3-47

probes, configuring 4-17, 4-18

request method, configuring for probes 4-20

return error code checking 2-26

statistics, clearing 3-74

statistics, displaying 3-67, 3-71

URL match criteria 3-20

URL match criteria, excluding for HTTP compression 3-21

HTTP cookie

length 5-26

match criteria 3-13

offset 5-26

stickiness 5-18

HTTP header

insertion 3-34

length 3-45

match criteria 3-16

maximum bytes to parse 3-45

stickiness 5-31

sticky client identification 5-5

HTTP parameter map

case sensitivity matching 3-42

compression 3-43

configuring 3-41

maximum bytes to parse 3-45

maximum parse length exceeded 3-45

persistence rebalance 3-47

statistics, displaying 3-67

TCP server reuse 3-47

URL delimiters 3-44

HTTPS

cipher suite for probes 4-23

probes, configuring 4-23

I

ICMP

probes, configuring 4-11

IMAP probes, configuring 4-31

interfaces

applying Layer 3 and Layer 4 policy to 3-59

interval, configuring for probes 4-7

IP address

configuring destination for probes 4-6

configuring stickiness 5-8

destination 2-24, 2-39, 2-44, 3-2, 3-35, 5-3, 5-8, 5-11, 5-14, 6-3, 6-12, 6-26

entering for real servers 2-7

expected for DNS probes 4-28

match criteria 3-23

source 2-24, 2-38, 2-44, 3-23, 3-34, 3-35, 5-3, 5-8, 5-11, 5-14, 5-47, 6-3, 6-8, 6-20

sticky client identification 5-4

sticky configuration requirements 5-7

virtual 2-7, 2-33, 3-34, 3-49, 3-50, 3-53, 3-58, 5-45, 6-9, 6-15, 6-21, 6-22, 6-29

K

keepalives. See probes

L

Layer 3 and Layer 4 class map

associating with policy map 3-54

configuring 3-49

overview 3-2

Layer 3 and Layer 4 policy map

SLB, configuring 3-53

Layer 3 and Layer 4 SLB policy actions

connection parameter map, associating with Layer 3 and Layer 4 policy map 3-57

enabling a VIP for load balancing 3-58

enabling VIP reply to ICMP request 3-58

HTTP parameter map, associating with Layer 3 and Layer 4 policy map 3-56

Layer 7 policy map, associating with Layer 3 and Layer 4 policy map 3-56

specifying 3-55

Layer 3 and Layer 4 SLB traffic policy configuration quick start 3-8

Layer 7 class map

associating with Layer 7 policy map 3-29

configuration quick start 3-4

configuring 3-11

HTTP cookie 3-13

HTTP header 3-16

HTTP URL 3-20

HTTP URL, excluding specific files/MIME types for HTTP compression 3-21

nesting 3-24

overview of SLB traffic policies 3-2

source IP address 3-23

Layer 7 policy map

configuration quick start 3-4

configuring 3-26

defining inline match statements 3-27

Layer 7 class map association 3-29

Layer 7 SLB policy actions

associating with Layer 3 and Layer 4 SLB policy 3-41

compress packets 3-32

discarding requests 3-33

forwarding requests 3-34

HTTP compression 3-31, 3-43

HTTP compression, excluding specific files/MIME types 3-21

HTTP header insertion 3-34

IP differentiated services code point 3-39

load balancing to server farm 3-36

SSL proxy service 3-40

sticky server farm 3-39

leastconns, load-balancing method 1-2, 2-22

load balancing

configurational diagram 3-3

configuring real servers and server farms 2-1

configuring traffic policies 3-1

definition 1-1

enabling a VIP 3-58

firewall 6-1, 6-3, 6-6, 6-18

hash address 1-2, 2-24

hash cookie 1-2, 2-24

hash header 1-2, 2-24

hash url 1-2, 2-25

leastconns 1-2, 2-22

operating ACE exclusively for 1-7

overview 1-1

predictor method 2-21

roundrobin 1-2, 2-22

standard firewall 6-6

statistics, displaying 3-66

stealth firewall 6-18

M

mailbox, configuring for IMAP probes 4-32

match criteria

HTTP cookie 3-13

HTTP header 3-16

HTTP URL 3-20

HTTP URL, excluding for HTTP compression 3-21

nested HTTP class map 3-24

single match statement 3-27

source IP address 3-23

MD5 hash value, configuring for probes 4-22

method

IMAP probes 4-33

POP3 probes 4-34

Multipurpose 3-21

N

NAS address, configuring for RADIUS probes 4-36

NAT, disabling 2-33

Network Access Server, configuring for RADIUS probes 4-36

P

parameter map

case sensitivity matching 3-42

configuring 3-41

HTTP compression 3-43

HTTP statistics, displaying 3-67

maximum bytes to parse 3-45

maximum parse length exceeded 3-45

persistence rebalance 3-47

TCP server reuse 3-47

URL delimiters 3-44

password credentials

IMAP probes 4-32

POP3 probes 4-34

RADIUS probes 4-35

persistence rebalance 3-47

policy map

associated class map 3-54

configuration example 3-62

configuring 3-1

Layer 3 and Layer 4 3-53

Layer 7 3-26

POP3 probe, configuring 4-33

port

number, configuring for probes 4-6

predictor

hash address 1-2, 2-24

hash cookie 1-2, 2-24

hash header 1-2, 2-24

hash url 1-2, 2-25

leastconns 1-2, 2-22

roundrobin 1-2, 2-22

probe

active, defining 4-3

active script file statistics, displaying A-23

associating with server farms 2-20, 2-29

clearing statistics 4-47

configuration example 4-39

configurations, displaying 4-40

configuring 4-2, 4-5

configuring for real servers 2-7

configuring for scripts A-9

description, entering 4-5

DNS 4-27

DNS domain name 4-28

DNS expected IP address 4-28

Echo 4-15

Finger 4-16

FTP 4-25

FTP server status code 4-26

global scripted probe statistics, displaying A-22

HTTP 4-17

HTTP header fields 4-18

HTTP MD5 hash value 4-22

HTTP request method 4-20

HTTPS 4-23

HTTP server status code 4-20

ICMP 4-11

IMAP 4-31

IMAP credentials 4-32

IMAP mailbox 4-32

IMAP request method 4-33

IP destination address 4-6

POP3 4-33

POP3 credentials 4-34

POP3 request method 4-34

port number 4-6

RADIUS 4-35

RADIUS credentials 4-35

RADIUS NAS address 4-36

retry count 4-8

scripted 4-37

scripted, debugging A-25

scripted probe information, displaying A-19, A-20

scripting quick start A-3

scripting using TCL A-2

script name 4-38

script-writing example A-18

SMTP 4-29

SMTP destination server status code 4-30

SSL cipher suite 4-23

SSL version 4-25

statistics, clearing 4-47

statistics, displaying 4-40

status code 4-30

TCP connection termination 4-12

TCP type 4-11

Telnet 4-27

threshold 4-8

time interval 4-7

timeout for a response 4-10

TLS version 4-25

types 2-20

UDP 4-14

wait interval 4-8, 4-9

wait period 4-8

writing scripts for A-10

Q

quick start

HTTP-cookie stickiness configuration 5-20

HTTP-header stickiness configuration 5-32

IP address stickiness configuration 5-8

Layer 3 and Layer 4 SLB traffic policy configuration 3-8

Layer 7 Traffic Policy Configuration 3-4

probe scripting A-3

Standard FWLB Configuration for ACE A 6-7

Standard FWLB Configuration for ACE B 6-11

Stealth FWLB Configuration for ACE A 6-19

Stealth FWLB Configuration for ACE B 6-25

R

RADIUS probes, configuring 4-35

real servers

associating with server farm 2-27

backup, configuring 2-29

behavior 2-2

checking health 2-7

clearing connections 2-40

clearing statistics 2-40

configuration examples 2-13

configuration quick start 2-4

configuring 2-1

configuring probes for 2-7

configuring weight (connection capacity) 2-11, 2-28

configuring weight for in server farm 2-28

creating 2-5

displaying configurations and statistics 2-35

displaying connections 2-38

entering description for 2-6

entering IP address 2-7

graceful shutdown 2-2, 2-32, 4-12

managing 2-2

overview 2-2

placing in service 2-12, 2-31

redirecting client requests 2-9

setting connection limits 2-8, 2-30

shutting down, gracefully 2-2, 2-32, 4-12

request methods

configuring for IMAP probes 4-33

configuring for POP3 probes 4-34

retry count, configuring for probes 4-8

roundrobin, load-balancing predictor 1-2, 2-22

routing

asymmetric 1-7

S

scripted probes

configuring 4-37

script name 4-38

scripts

active script file statistics, displaying A-23

configuring probes for A-9

copying A-6

copying and loading A-5

debugging A-25

displaying script file contents A-25

environment variables A-15

exit codes A-16

global scripted probe statistics, displaying A-22

information, displaying A-19, A-20

loading A-8

overview A-2

probe script example A-18

reloading modified A-9

removing from memory A-8

sample A-7

script probe array A-15

supported commands A-11

unzipping A-7

writing for health monitoring A-10

server farms

assigning backup server 2-29

associating probes for 2-20, 2-29

associating real servers for use with 2-27

backup, configuring 2-32, 3-36

clearing statistics 2-45

configuration examples 2-33

configuration quick start 2-16

configuring 2-1

creating 2-18

disabling NAT 2-33

displaying configurations 2-41

displaying connections 2-43

displaying statistics 2-41

enabling load balancing for 3-36

entering description for 2-19

HTTP return error code checking, configuring 2-26

overview 2-2, 2-15

placing real servers in service 2-31

predictor method 2-21

real server weight, configuring 2-28

setting real server connection limits 2-30

sorry 3-37

specifying failure action 2-19

sticky, configuring 3-39

sticky backup 5-6

server load balancing

configurational diagram 3-3

configuration example 3-62

configuring Layer 3 and Layer 4 policy map 3-53

configuring Layer 7 class map 3-11

configuring Layer 7 policy map 3-26

configuring traffic policies 3-1

definition 1-1

operating ACE exclusively for 1-7

overview 1-1

statistics, displaying 3-66

server reuse 3-47

server shutdown, graceful 2-32, 4-12

service policy

applying to an interface 3-59

shared secret credentials, configuring for RADIUS probes 4-35

shutdown, graceful server 4-12

SLB. See server load balancing

SMTP probes, configuring 4-29

sorry server. See backup server

sorry server farm 3-37

source IP address 2-24, 2-38, 2-44, 3-23, 3-34, 3-35, 5-3, 5-8, 5-11, 5-14, 5-47, 6-3, 6-8, 6-20

SSL

proxy service, specifying 3-40

version, configuring for probes 4-25

standard firewall

diagram, configurational 6-4

example, configurational 6-32, 6-34

load balancing, configuring 6-6

quick start 6-7, 6-11

statistics

active script files, displaying A-23

HTTP, clearing 3-74

HTTP, displaying 3-71

HTTP parameter map, displaying 3-67

load-balancing, displaying 3-66

probes, clearing 4-47

probes, displaying 4-40

real servers, clearing 2-40

real servers, displaying 2-35

scripted probes, displaying A-22

server farms, clearing 2-45

server farms, displaying 2-41

sticky, clearing 5-48

sticky, displaying 5-46

sticky database, displaying 5-46

status code, configuring for SMTP probes 4-30

stealth firewall

diagram, configurational 6-5

example, configurational 6-36, 6-38

load balancing, configuring 6-18

quick start 6-19, 6-25

stickiness

database entries, clearing 5-49

displaying information 5-46

HTTP cookie 5-18

HTTP cookie configuration example 5-29

HTTP header 5-31

HTTP header configuration example 5-42

IP address configuration example 5-16

IP addresses, configuring 5-8

quick start, HTTP-cookie configuration 5-20

quick start, HTTP-header stickiness configuration 5-32

quick start, IP address sticky configuration 5-8

SLB traffic policy, configuring 5-44

statistics, clearing 5-48

statistics, displaying 5-46

stickiness (HTTP-cookie)

associating server farm with sticky group 5-28

configuration example 5-29

cookie insertion, enabling 5-25

cookie length, configuring 5-25

cookie offset, configuring 5-25

quick start 5-20, 5-32

replicate HTTP-cookie sticky table entries, enabling 5-24

secondary cookie, configuring 5-26

server farm entry, configuring 5-28

static cookie, configuring 5-27

sticky group, creating 5-22

timeout, configuring 5-23

timeout for active connections, configuring 5-23

stickiness (HTTP-header)

associating server farm with sticky group 5-41

configuration example 5-42

cookie length, configuring 5-39

cookie offset, configuring 5-39

replicate HTTP-header sticky table entries, enabling 5-38

server farm sticky group, configuring 5-41

static HTTP-header, configuring 5-40

sticky group, creating 5-34

timeout, configuring 5-37

timeout for active connections, configuring 5-38

stickiness (IP address)

associating server farm with sticky group 5-15

configuration example 5-16

quick start 5-8

replicate IP-address sticky table entries, enabling 5-13

requirements 5-7

server farm sticky group, configuring 5-15

static IP-address table entries, configuring 5-14

sticky IP group, creating 5-11

timeout, configuring 5-12

timeout for active connections, configuring 5-12

sticky

configuration examples 5-16, 5-29, 5-42

cookies for client identification 5-4

database entries, clearing 5-49

database entries, displaying 5-46

displaying information 5-46

e-commerce application requirements 5-3

groups 5-3

HTTP header for client identification 5-5

IP address for client identification 5-4

methods 5-3

overview 5-2

purpose 5-2

statistics, clearing 5-46

statistics, displaying 5-46

table 5-5

T

TCL

copying and loading scripts A-5

copying scripts A-6

environment variables A-15

exit codes A-16

loading scripts A-8

reloading modified scripts A-9

removing scripts from memory A-8

scripts overview A-2

supported script commands A-11

unzipping scripts A-7

TCP

connection termination 4-12

probe, configuring 4-11

server reuse, configuring 3-47

Telnet

probes, configuring 4-27

threshold, configuring for probes 4-8

timeout period, configuring for probe response 4-10

TLS version, configuring for probes 4-25

Toolkit Command Language. See TCL. A-1

traffic, distribution across firewalls 6-1, 6-3

traffic classification process 3-2

traffic policies

configurational diagram 3-3

configuration example 3-62

configuring 3-1

configuring for stickiness 5-44

overview 3-2

U

UDP

probe, configuring 4-14

URL

delimiters, defining 3-44

length 3-45

maximum bytes to parse 3-45

username

credentials, configuring 4-32, 4-34, 4-35

V

VIP

defining match criteria 3-50, 5-45, 6-9, 6-21, 6-22

disabling translation 2-33

enabling for load balancing 3-58, 6-15, 6-29

reply to ICMP request 3-58

virtual IP address. See VIP

W

wait interval, configuring for probes 4-8, 4-9

wait period, configuring for probes 4-8

weight, setting for real servers 2-11, 2-28

weighted roundrobin. See roundrobin