Administration Guide vA4(1.0), Cisco ACE 4700 Series Application Control Engine Appliance
Index
Downloads: This chapterpdf (PDF - 307.0KB) The complete bookPDF (PDF - 6.82MB) | Feedback

Index

Table Of Contents

A - B - C - D - F - G - H - I - K - L - M - N - P - Q - R - S - T - U - V - W - X -

Index

A

ACE

boot configuration 1-25

capturing packet information 4-40

configuration checkpoint and rollback service 4-45

configuration files, loading from remote server 4-7

configuration files, saving 4-1

console connection 1-3

date and time, configuring 1-14

Flash memory, reformatting 4-50

inactivity timeout 1-12

information, displaying 5-1

licenses, managing 3-1

logging in 1-6

message-of-the-day banner 1-12

MIBs 7-5

naming 1-10

password, changing administrative 1-5, 1-8

password, changing CLI account 1-9

password, changing www user 1-5

redundant configuration 6-1

remote access 2-1

restarting 1-29

setting up 1-1

setup script 1-4

shutting down 1-31

SNMP 7-1

terminal settings 1-22

username, changing 1-8

using file system 4-9

Admin

user 1-6, 8-6

alias IP address 6-11

B

backup

archive file 4-25

defaults 4-26

directory structure 4-25

errors, displaying 4-36

guidelines and limitations 4-25

naming conventions 4-25

overview 4-23

procedure 4-27

status, displaying 4-35

uses 4-24

boot configuration

BOOT environment variable 1-26, 4-15

boot method 1-25

configuration register, setting boot method 1-25

displaying 1-27

ignoring startup-configuration file 1-27

modifying 1-25

BOOT environment variable, setting 1-26, 4-15

boot method, setting 1-25

C

capturing packets 4-41

copying buffer 4-43, 4-45

checkpoint, configuration

creating 4-45

deleting 4-46

displaying 4-49

rolling back to 4-47

class map

Layer 3 and 4, creating for management traffic 8-8

Layer 3 and 4, for SNMP 7-47

remote management 2-5

SNMP management traffic 7-47

XML 8-8

clearing

ICMP statistics 5-12

CLI

account password, changing 1-9

saving session 1-4

user management of SNMP 7-3

clock

daylight saving time, setting 1-18

NTP server, sychronizing ACE system clock 1-20

setting 1-14

timezone, setting 1-15

communities, SNMP 7-34

configurational examples

redundancy 6-42

SNMP 7-58

configuration checkpoint and rollback service

creating configuration checkpoint 4-45

deleting configuration checkpoint 4-46

displaying checkpoint information 4-49

rolling back configuration 4-47

using 4-45

configuration command failures

displaying bulk synchronization 6-29

configuration files

clearing startup file 4-6

copying to disk0 file system 4-3

displaying 4-4

loading from remote server 4-7

merging startup with running 4-4

saving 4-1

saving in Flash memory 4-2

saving to remote server 4-2

configuration register

setting boot method 1-25

configuration synchronization

overview 6-4

SSL certs and keys 6-19, 6-21

console

connection to ACE 1-3

contact, SNMP 7-35

context

directly accessing with SSH 2-20

copying

configuration files 4-2, 4-3

core dumps 4-38

files 4-10

files from remote server 4-15

files to remote server 4-14

licenses 4-12

packet capture buffer 4-12

scripted probe files 4-13

software image 4-15

copyright, displaying 5-3

core dumps 4-37

clearing core directory 4-39

copying 4-38

deleting 4-40

D

date and time

configuring 1-14

daylight saving time setting 1-18

time zone setting 1-15

daylight saving time setting 1-18

default user

admin 1-6, 8-6

dm 1-6, 8-6

www 1-6, 8-6

demo license, replacing with permanent license 3-7

Device Manager GUI, enabling connectivity 1-4

directory

copying files 4-11

creating in disk0 4-17

deleting from disk0 4-18

listing files 4-20

disk0

creating new directory in 4-17

deleting directory in 4-18

moving files in 4-18

overview 4-10

uncompressing files in 4-16

untarring files in 4-17

display attributes, terminal 1-22

displaying

copyright 5-3

FT bulk synchronization configuration command failures 6-29

FT group information 6-30

FT peer information 6-34

FT statistics 6-36

FT tracking information 6-38

hardware information 5-2

ICMP statistics 5-12

information on ACE 5-1

memory statistics 6-34

NTP statistics and information 1-31

process status 5-8

redundancy history 6-33

system information 5-10

system processes 5-5

technical support information 5-14

dm user 1-6, 8-6

DTD

accessing 8-18

overview 8-4

F

failover

forcing 6-18

stateful 6-3

failure detection 6-22

host or gateway 6-23

interface 6-26

overview 6-22

fault tolerance

See redundancy

file system

copying files from remote server 4-15

copying files to directory 4-11

copying files to remote server 4-14

copying image to remote server 4-15

copying licenses 4-12

copying packet capture buffer 4-12

copying scripted probe files to 4-13

creating new directory in disk0 4-17

deleting directory in disk0 4-18

deleting files 4-19

listing files 4-20

moving files in disk0 4-18

overview 4-10

saving show command output to file 4-22

uncompressing files in disk0 4-16

untarring files in disk0 4-17

using ACE 4-9

Flash memory

file system overview 4-10

reformatting 4-50

saving configuration files in 4-2

FT group

configuring 6-14

displaying information 6-30

modifying 6-16

FT peer

configuring 6-12

displaying information 6-34

FT tracking, displaying information 6-38

FT VLAN 6-4, 6-9

G

gateway failure detection

See failure detection

GRUB bootloader 1-28, 1-30

H

hardware information, displaying 5-2

host failure detection

See failure detection

HTTP

return codes between server and client 8-3

HyperTerminal

launching 1-3

saving session 1-4

I

ICMP

clearing statistics 5-12

displaying statistics 5-12

enabling messages to the ACE 2-19

image

BOOT environment variable 1-26

copying to remote server 4-15

inactivity timeout 1-12

interface failure detection

See failure detection

IP address

alias 6-11

K

key

generating for license 3-5

pair for SSH host 2-16

L

Layer 3 and 4 policy map

for management traffic 8-11

SNMP, creating 7-48

Layer 3 and Layer 4 class map

management traffic, creating for 8-8

SNMP, creating for 7-47

licenses

backing up 3-12, 3-13

copying 4-12

copying to ACE 3-5

displaying configuration and statistics 3-14

generating key 3-5

installing 3-6

list of available 3-1

managing 3-1

ordering upgrade license 3-5

removing 3-8

replacing demo with permanent 3-7

location, SNMP 7-36

logging

into ACE 1-6

M

management access

Layer 3 and 4 traffic 8-11

SSH, configuring 2-15

Telnet 2-14

message-of-the-day banner 1-12

MIBs 7-5

monitoring

See SNMP

moving files in disk0 4-18

N

naming the ACE 1-10

notifications

error messages 7-40

IETF standard, enabling 7-41

options 7-41

SLB 7-40

SNMP 7-25, 7-37, 7-40

SNMP, enabling 7-39

SNMP host, configuring 7-37

SNMP license manager 7-40

types 7-40

virtual context change 7-40

NTP server

NTP peer associations, configuring 1-20

NTP server associations, configuring 1-20

overview 1-20

statistics and information, viewing 1-31

synchronizing ACS 1-20

P

packet buffer 4-40

capturing packets 4-41

copying capture buffer 4-12, 4-43, 4-45

password

Admin password, changing for CLI account 1-5

changing administrative 1-8

changing CLI account 1-9

www user password, changing for CLI account 1-5

peer

See FT peer

ping, enabling 2-19

policy map

Layer 3 and 4, for management traffic 8-11

Layer 3 and 4, for SNMP 7-48

remote access 2-8

remote access policy map, applying 2-10, 2-12

SNMP management traffic 7-48

XML 8-11

processes

displaying 5-5

displaying status of 5-8

Q

quick start

remote access 2-3

R

redundancy 6-1

configuration command failures, displaying 6-29

configuration examples 6-42

configuration requirements 6-5

configuration synchronization overview 6-4

configuring 6-9

failure detection and tracking 6-22

forcing failover 6-18

FT group, configuring 6-14

FT group information, displaying 6-30

FT peer, configuring 6-12

FT peer information, displaying 6-34

FT statistics, displaying 6-36

FT tracking information, displaying 6-38

FT VLAN 6-4

FT VLAN, configuring 6-9

history, displaying 6-33

memory statistics, displaying 6-34

overview 6-1

protocol 6-2

software upgrade or downgrade 6-5

stateful failover 6-3

statistics, clearing 6-40

synchronizing 6-19

synchronizing SSL certs and keys 6-21

task flow 6-7

reformatting Flash memory 4-50

remote access

class map, creating 2-5

enabling 2-1

network management traffic services, configuring 2-4

policy map 2-8, 2-10, 2-12

quick start 2-3

SSH, configuring 2-15

Telnet 2-14

terminating user session 2-19

remote server

copying files from 4-15

copying files to 4-14

copying image to 4-15

copying scripted probefiles to 4-13

loading configuration files from 4-7

saving configuration files to 4-2

restarting ACE 1-29

restore

defaults 4-26

errors, displaying 4-36

guidelines and limitations 4-25

overview 4-23

procedure 4-29

status, displaying 4-36

uses 4-24

retrieving user context through the Admin context IP address when using SNMP 7-44

rollback service

See configuration checkpoint and rollback service

running configuration

copying to disk0 file system 4-3

merging with startup 4-4

saving to startup configuration file 4-2

viewing 4-4

S

scripted probe files, copying 4-13

service policy

SNMP management policy map, applying 7-51, 7-52, 8-13, 8-14

session

maximum number for SSH 2-15

SSH information, showing 2-22, 2-23

Telnet information, showing 2-22, 2-23

terminating SSH or Telnet 2-19

to ACE 1-6

setting up ACE 1-1

setup script

configuring ACE 1-4

Device Manager GUI, enabling connectivity 1-4

show command

enabling the exchange of output in XML 8-15

saving output to file 4-22

viewing hardware and software configuration information 5-1

shutting down ACE 1-31

Simple Network Management Protocol

See SNMP

SNMP

AAA integration 7-3

agents, communication 7-2

agents, overview 7-2

class map, creating 7-47

CLI user management 7-3

communities 7-34

configuration examples 7-58

configuring the engine ID 7-45

contact 7-35

IETF standard 7-41

linkDown trap 7-41

linkUp trap 7-41

location 7-36

management traffic, configuring 7-46

managers, communication 7-2

managers, overview 7-2

MIBs 7-5

MIB table and object support 7-14

notifications 7-37

overview 7-1

policy map, creating 7-48

retrieving user context through the Admin context IP address 7-44

service policy 7-51, 7-52, 8-13, 8-14

statistics 7-53

task flow 7-30

traps 7-25

traps and informs 7-3

unmasking community and community security name OIDs 7-42

users, configuring 7-31

VLAN interface, assigning 7-43

software licenses

See licenses

SSH 2-15

directly accessing a user context 2-20

host key pairs 2-16

management access 2-15

maximum sessions 2-15

RSA key 2-17

showing session information 2-22, 2-23

terminating session 2-19

version 2-6

SSL

certificates and keys, synchronizing 6-21

startup configuration

copying to disk0 file system 4-3

ignoring 1-27

merging with running 4-4

saving to remote server 4-2

updating with running configuration 4-2

viewing 4-4

stateful failover 6-3

statistics

FT 6-36

FT, clearing 6-41

license 3-14

memory 6-34

redundancy history, clearing 6-41

SNMP 7-53

stopping ACE 1-31

synchronizing

configuration 6-4

SSL certs and keys 6-19

synchronizing redundant configurations 6-19

system information, displaying 5-10

system processes

displaying 5-5

displaying status of 5-8

T

task flow

redundancy 6-7

SNMP 7-30

XML 8-6

technical support information, displaying 5-14

Telnet

management access, configuring 2-14

showing information 2-22, 2-23

terminating session 2-19

terminal settings

configuring 1-22

display attributes 1-22

virtual terminal line settings 1-24

time, setting 1-14

time zone setting 1-15

tracking

See failure detection

traps, SNMP 7-3, 7-25

U

uncompressing files in disk0 4-16

untarring files in disk0 4-17

upgrade license 3-5

user

configuring for SNMP 7-31

user context

accessing by SNMP through the Admin context IP address 7-44

directly accessing with SSH 2-20

username

changing 1-8

V

virtual terminal line settings 1-24

VLANs

for SNMP traps 7-43

FT VLAN for redundancy 6-4, 6-9

volatile file system 4-10

W

www user 1-6, 8-6

X

XML

class map, creating 8-8

DTD, accessing 8-18

DTD, overview 8-4

example of CLI command and XML equivalent 8-20

HTTP and HTTPS support 8-2

HTTP return codes 8-3

management traffic, configuring 2-7, 8-7

overview 8-1

policy map, creating 8-11

show command output 8-15

task flow 8-6