Administration Guide vA4(2.0), Cisco ACE 4700 Series Application Control Engine Appliance
Index
Downloads: This chapterpdf (PDF - 306.0KB) The complete bookPDF (PDF - 6.78MB) | Feedback

Index

Table Of Contents

A - B - C - D - F - G - H - I - K - L - M - N - P - Q - R - S - T - U - V - W - X -

Index

A

ACE

boot configuration 1-25

capturing packet information 3-41

configuration checkpoint and rollback service 3-46

configuration files, loading from remote server 3-7

configuration files, saving 3-1

console connection 1-3

date and time, configuring 1-14

Flash memory, reformatting 3-51

inactivity timeout 1-11

information, displaying 4-1

licenses, managing 2-1

logging in 1-6

message-of-the-day banner 1-12

MIBs 6-5

naming 1-10

password, changing administrative 1-5, 1-8

password, changing CLI account 1-9

password, changing www user 1-5

redundant configuration 5-1

remote access 2-1

restarting 1-29

setting up 1-1

setup script 1-4

shutting down 1-31

SNMP 6-1

terminal settings 1-22

username, changing 1-8

using file system 3-10

Admin

user 1-6, 7-6

alias IP address 5-11

B

backup

archive file 3-25

defaults 3-27

directory structure 3-25

errors, displaying 3-37

guidelines and limitations 3-26

naming conventions 3-25

overview 3-24

procedure 3-27

status, displaying 3-35

uses 3-24

boot configuration

BOOT environment variable 1-26, 3-15

boot method 1-25

configuration register, setting boot method 1-25

displaying 1-27

ignoring startup-configuration file 1-27

modifying 1-25

BOOT environment variable, setting 1-26, 3-15

boot method, setting 1-25

C

capturing packets 3-41

copying buffer 3-43, 3-45

checkpoint, configuration

creating 3-46

deleting 3-47

displaying 3-50

rolling back to 3-48

class map

Layer 3 and 4, creating for management traffic 7-8

Layer 3 and 4, for SNMP 6-50

remote management 2-5

SNMP management traffic 6-50

XML 7-8

clearing

ICMP statistics 4-13

CLI

account password, changing 1-9

saving session 1-4

user management of SNMP 6-3

clock

daylight saving time, setting 1-18

NTP server, sychronizing ACE system clock 1-20

setting 1-14

timezone, setting 1-15

communities, SNMP 6-37

configurational examples

redundancy 5-41

SNMP 6-62

configuration checkpoint and rollback service

creating configuration checkpoint 3-46

deleting configuration checkpoint 3-47

displaying checkpoint information 3-50

rolling back configuration 3-48

using 3-46

configuration command failures

displaying bulk synchronization 5-29

configuration files

clearing startup file 3-6

copying to disk0 file system 3-4

displaying 3-5

loading from remote server 3-7

merging startup with running 3-4

saving 3-1

saving in Flash memory 3-2

saving to remote server 3-2

configuration register

setting boot method 1-25

configuration synchronization

overview 5-4

SSL certs and keys 5-19, 5-21

console

connection to ACE 1-3

contact, SNMP 6-38

context

directly accessing with SSH 2-20

copying

configuration files 3-2, 3-4

core dumps 3-39

files 3-10

files from remote server 3-15

files to remote server 3-14

licenses 3-12

packet capture buffer 3-12

scripted probe files 3-13

software image 3-16

copyright, displaying 4-3

core dumps 3-38

clearing core directory 3-40

copying 3-39

deleting 3-40

D

date and time

configuring 1-14

daylight saving time setting 1-18

time zone setting 1-15

daylight saving time setting 1-18

default user

admin 1-6, 7-6

dm 1-6, 7-6

www 1-6, 7-6

demo license, replacing with permanent license 2-5

Device Manager GUI, enabling connectivity 1-4

directory

copying files 3-11

creating in disk0 3-18

deleting from disk0 3-19

listing files 3-21

disk0

creating new directory in 3-18

deleting directory in 3-19

moving files in 3-19

overview 3-10

uncompressing files in 3-17

untarring files in 3-18

display attributes, terminal 1-22

displaying

copyright 4-3

FT bulk synchronization configuration command failures 5-29

FT group information 5-30

FT peer information 5-33

FT statistics 5-35

FT tracking information 5-37

hardware information 4-2

ICMP statistics 4-13

information on ACE 4-1

memory statistics 5-33

NTP statistics and information 1-32

process status 4-7

redundancy history 5-32

system information 4-10

system processes 4-4

technical support information 4-14

dm user 1-6, 7-6

DTD

accessing 7-18

overview 7-4

F

failover

forcing 5-18

stateful 5-3

failure detection 5-22

host or gateway 5-23

interface 5-26

overview 5-22

fault tolerance

See redundancy

file system

copying files from remote server 3-15

copying files to directory 3-11

copying files to remote server 3-14

copying image to remote server 3-16

copying licenses 3-12

copying packet capture buffer 3-12

copying scripted probe files to 3-13

creating new directory in disk0 3-18

deleting directory in disk0 3-19

deleting files 3-20

listing files 3-21

moving files in disk0 3-19

overview 3-10

saving show command output to file 3-23

uncompressing files in disk0 3-17

untarring files in disk0 3-18

using ACE 3-10

Flash memory

file system overview 3-10

reformatting 3-51

saving configuration files in 3-2

FT group

configuring 5-14

displaying information 5-30

modifying 5-16

FT peer

configuring 5-12

displaying information 5-33

FT tracking, displaying information 5-37

FT VLAN 5-4, 5-9

G

gateway failure detection

See failure detection

GRUB bootloader 1-28, 1-30

H

hardware information, displaying 4-2

host failure detection

See failure detection

HTTP

return codes between server and client 7-3

HyperTerminal

launching 1-3

saving session 1-4

I

ICMP

clearing statistics 4-13

displaying statistics 4-13

enabling messages to the ACE 2-19

image

BOOT environment variable 1-26

copying to remote server 3-16

inactivity timeout 1-11

interface failure detection

See failure detection

IP address

alias 5-11

K

key

generating for license 2-3

pair for SSH host 2-16

L

Layer 3 and 4 policy map

for management traffic 7-11

SNMP, creating 6-53

Layer 3 and Layer 4 class map

management traffic, creating for 7-8

SNMP, creating for 6-50

licenses

backing up 2-9, 2-10

copying 3-12

copying to ACE 2-4

displaying configuration and statistics 2-11

generating key 2-3

installing 2-4

list of available 2-1

managing 2-1

ordering upgrade license 2-3

replacing demo with permanent 2-5

location, SNMP 6-39

logging

into ACE 1-6

M

management access

Layer 3 and 4 traffic 7-11

SSH, configuring 2-15

Telnet 2-14

message-of-the-day banner 1-12

MIBs 6-5

monitoring

See SNMP

moving files in disk0 3-19

N

naming the ACE 1-10

notifications

error messages 6-43

IETF standard, enabling 6-45

options 6-44

SLB 6-43

SNMP 6-28, 6-40, 6-43

SNMP, enabling 6-42

SNMP host, configuring 6-40

SNMP license manager 6-43

types 6-43

virtual context change 6-43

NTP server

NTP peer associations, configuring 1-20

NTP server associations, configuring 1-20

overview 1-20

statistics and information, viewing 1-32

synchronizing ACS 1-20

P

packet buffer 3-41

capturing packets 3-41

copying capture buffer 3-12, 3-43, 3-45

password

Admin password, changing for CLI account 1-5

changing administrative 1-8

changing CLI account 1-9

www user password, changing for CLI account 1-5

peer

See FT peer

ping, enabling 2-19

policy map

Layer 3 and 4, for management traffic 7-11

Layer 3 and 4, for SNMP 6-53

remote access 2-8

remote access policy map, applying 2-10, 2-12

SNMP management traffic 6-53

XML 7-11

processes

displaying 4-4

displaying status of 4-7

Q

quick start

remote access 2-3

R

redundancy 5-1

configuration command failures, displaying 5-29

configuration examples 5-41

configuration requirements 5-5

configuration synchronization overview 5-4

configuring 5-9

failure detection and tracking 5-22

forcing failover 5-18

FT group, configuring 5-14

FT group information, displaying 5-30

FT peer, configuring 5-12

FT peer information, displaying 5-33

FT statistics, displaying 5-35

FT tracking information, displaying 5-37

FT VLAN 5-4

FT VLAN, configuring 5-9

history, displaying 5-32

memory statistics, displaying 5-33

overview 5-1

protocol 5-2

software upgrade or downgrade 5-5

stateful failover 5-3

statistics, clearing 5-39

synchronizing 5-19

synchronizing SSL certs and keys 5-21

task flow 5-7

reformatting Flash memory 3-51

remote access

class map, creating 2-5

enabling 2-1

network management traffic services, configuring 2-4

policy map 2-8, 2-10, 2-12

quick start 2-3

SSH, configuring 2-15

Telnet 2-14

terminating user session 2-19

remote server

copying files from 3-15

copying files to 3-14

copying image to 3-16

copying scripted probefiles to 3-13

loading configuration files from 3-7

saving configuration files to 3-2

restarting ACE 1-29

restore

defaults 3-27

errors, displaying 3-37

guidelines and limitations 3-26

overview 3-24

procedure 3-29

status, displaying 3-36

uses 3-24

retrieving user context through the Admin context IP address when using SNMP 6-47

rollback service

See configuration checkpoint and rollback service

running configuration

copying to disk0 file system 3-4

merging with startup 3-4

saving to startup configuration file 3-2

viewing 3-5

S

scripted probe files, copying 3-13

service policy

SNMP management policy map, applying 6-55, 6-56, 7-13, 7-14

session

maximum number for SSH 2-15

SSH information, showing 2-22, 2-23

Telnet information, showing 2-22, 2-23

terminating SSH or Telnet 2-19

to ACE 1-6

setting up ACE 1-1

setup script

configuring ACE 1-4

Device Manager GUI, enabling connectivity 1-4

show command

enabling the exchange of output in XML 7-15

saving output to file 3-23

viewing hardware and software configuration information 4-1

shutting down ACE 1-31

Simple Network Management Protocol

See SNMP

SNMP

AAA integration 6-3

agents, communication 6-2

agents, overview 6-2

class map, creating 6-50

CLI user management 6-3

communities 6-37

configuration examples 6-62

configuring the engine ID 6-48

contact 6-38

IETF standard 6-45

linkDown trap 6-45

linkUp trap 6-45

location 6-39

management traffic, configuring 6-49

managers, communication 6-2

managers, overview 6-2

MIBs 6-5

MIB table and object support 6-15

notifications 6-40

overview 6-1

policy map, creating 6-53

retrieving user context through the Admin context IP address 6-47

service policy 6-55, 6-56, 7-13, 7-14

statistics 6-57

task flow 6-33

traps 6-28

traps and informs 6-3

unmasking community and community security name OIDs 6-46

users, configuring 6-34

VLAN interface, assigning 6-46

software licenses

See licenses

SSH 2-15

directly accessing a user context 2-20

host key pairs 2-16

management access 2-15

maximum sessions 2-15

RSA key 2-17

showing session information 2-22, 2-23

terminating session 2-19

version 2-6

SSL

certificates and keys, synchronizing 5-21

startup configuration

copying to disk0 file system 3-4

ignoring 1-27

merging with running 3-4

saving to remote server 3-2

updating with running configuration 3-2

viewing 3-5

stateful failover 5-3

statistics

FT 5-35

FT, clearing 5-40

license 2-11

memory 5-33

redundancy history, clearing 5-41

SNMP 6-57

stopping ACE 1-31

synchronizing

configuration 5-4

SSL certs and keys 5-19

synchronizing redundant configurations 5-19

system information, displaying 4-10

system processes

displaying 4-4

displaying status of 4-7

T

task flow

redundancy 5-7

SNMP 6-33

XML 7-6

technical support information, displaying 4-14

Telnet

management access, configuring 2-14

showing information 2-22, 2-23

terminating session 2-19

terminal settings

configuring 1-22

display attributes 1-22

virtual terminal line settings 1-24

time, setting 1-14

time zone setting 1-15

tracking

See failure detection

traps, SNMP 6-3, 6-28

U

uncompressing files in disk0 3-17

untarring files in disk0 3-18

upgrade license 2-3

user

configuring for SNMP 6-34

user context

accessing by SNMP through the Admin context IP address 6-47

directly accessing with SSH 2-20

username

changing 1-8

V

virtual terminal line settings 1-24

VLANs

for SNMP traps 6-46

FT VLAN for redundancy 5-4, 5-9

volatile file system 3-10

W

www user 1-6, 7-6

X

XML

class map, creating 7-8

DTD, accessing 7-18

DTD, overview 7-4

example of CLI command and XML equivalent 7-20

HTTP and HTTPS support 7-2

HTTP return codes 7-3

management traffic, configuring 2-7, 7-7

overview 7-1

policy map, creating 7-11

show command output 7-15

task flow 7-6