|
|
VLAN |
Either accept the automatically incremented entry or enter a different value. Valid entries are integers from 2 to 4094. |
Description |
Enter a brief description for this interface. |
Interface Type |
Select the role of the virtual context in the network topology of the VLAN interface:
- Routed—In a routed topology, the ACE virtual context acts as a router between the client-side network and the server-side network. In this topology, every real server for the application must be routed through the ACE virtual context, either by setting the default gateway on each real server to the virtual contexts server-side VLAN interface address, or by using a separate router with appropriate routes configured between the ACE virtual context and the real servers.
Note A routed VLAN interface can support both IPv4 and IPv6 addresses at the same time.
- Bridged—In a bridged topology, the ACE virtual context bridges two VLANs, a client-side VLAN and a real-server VLAN, on the same subnet using a bridged virtual interface (BVI). In this case, the real server routing does not change to accommodate the ACE virtual context. Instead, the ACE virtual context becomes a “bump in the wire” that transparently handles traffic to and from the real servers.
- Unknown—Choose Unknown if you are unsure of the network topology of the VLAN interface.
|
IP Address |
Enter the IPv4 address assigned to this interface. This address must be a unique IP address that is not used in another context. Duplicate IP addresses in different contexts are not supported. If this interface is only used for IPv6 traffic, entering an IPv4 address is optional. |
Alias IP Address |
Enter the IPv4 address of the alias this interface is associated with. |
Peer IP Address |
Enter the IPv4 address of the remote peer. |
Netmask |
Select the subnet mask to be used. |
Admin Status |
Indicate whether you want the interface to be Up or Down. |
Enable MAC Sticky |
Check the check box to indicate that the ACE appliance is to convert dynamic MAC addresses to sticky secure MAC addresses and add this information to the running configuration. Clear the check box to indicate that the ACE appliance is not to convert dynamic MAC addresses to sticky secure MAC addresses. |
Enable Normalization |
Check the check boxes to indicate that normalization is to be enabled on this interface for IPv4, IPv6, or both. Clear the check box to indicate that normalization is to be disabled on this interface.
Caution Disabling normalization may expose your ACE appliance and network to potential security risks. Normalization protects your networking environment from attackers by enforcing strict security policies that are designed to examine traffic for malformed or malicious segments.
|
Enable IPv6 |
Check the check box to enable IPv6 on this interface. By default, IPv6 is disabled. The interface cannot be in bridged mode. When you enable IPv6, the ACE automatically does the following:
- Configures a link-local address (if not previously configured)
- Performs duplicate address detection (DAD)
Clear the check box to indicate that IPv6 is disabled on this interface. |
IPv6 Global Address |
A global address is an IPv6 unicast address that is used for general IPv6 communication. Each global address is unique across the entire Internet. Therefore, its scope is global. The low order 64 bits can be assigned in several ways, including autoconfiguration using the EUI-64 format. You can configure only one globally unique IPv6 address on an interface. When you configure a global IPv6 address on an interface, the ACE automatically does the following:
- Configures a link-local address (if not previously configured)
- Performs duplicate address detection (DAD) on both addresses
|
IPv6 Address |
To configure an IPv6 global address on an interface, enter a complete IPv6 address with a prefix of 2000::/3 to 3fff::/3. For example, enter 2001:DB8:1::0. Check the EUI-64 box to specify that the low order 64 bits are automatically generated in the IEEE 64-bit Extended Unique Identifier (EUI-64) format specified in RFC 2373. To use EUI-64, the Prefix Length field must be less than or equal to 64 and the host segment must be all zeros. |
Alias IPv6 Address |
When you configure redundancy with active and standby ACEs, you can configure a VLAN interface that has an alias global IPv6 address that is shared between the active and standby ACEs. The alias IPv6 address serves as a shared gateway for the two ACEs in a redundant configuration. You can configure only one alias global IPv6 address on an interface. To configure an IPv6 alias global address, enter a complete IPv6 address with a prefix of 2000::/3 to 3fff::/3. For example, enter 2001:DB8:1::0.
Note You must configure redundancy (fault tolerance) on the ACE for the alias global IPv6 address to work.
|
Peer IPv6 Address |
To configure an IPv6 peer global address, enter a complete IPv6 address with a prefix of 2000::/3 to 3fff::/3. For example, enter 2001:DB8:1::0. Check the EUI-64 box to specify that the low order 64 bits are automatically generated in the IEEE 64-bit Extended Unique Identifier (EUI-64) format specified in RFC 2373. To use EUI-64, the Prefix Length field must be less than or equal to 64 and the host segment must be all zeros.
Note The IPv6 peer global address must be unique across multiple contexts on a shared VLAN.
Check the EUI-64 box to specify that the low order 64 bits are automatically generated in the IEEE 64-bit Extended Unique Identifier (EUI-64) format specified in RFC 2373. To use EUI-64, the Prefix Length field must be less than or equal to 64 and the host segment must be all zeros. |
Prefix Length |
Enter the prefix length for all global addresses to specify how many of the most significant bits (MSBs) are used for the network identifier. Enter an integer from 3 to 127. If you use the optional EUI-64 check box for the global and peer addresses, the prefix must be less than or equal to 64. |
IPv6 Unique-Local Address |
A unique local address is an optional IPv6 unicast address that is used for local communication within an organization and it is similar to a private IPv4 address (for example, 10.10.2.1). Unique local addresses have a global scope, but they are not routable on the internet, and they are assigned by a central authority. All unique local addresses have a predefined prefix of FC00::/7. You can configure only one IPv6 unique local address on an interface. |
IPv6 Address |
To configure a unique local address, enter a complete IPv6 address with an FC00::/7 prefix in the first field. In the second field after the /, enter the prefix length to specify how many of the most significant bits (MSBs) are used for the network identifier. Check the EUI-64 box to specify that the low order 64 bits are automatically generated in the IEEE 64-bit Extended Unique Identifier (EUI-64) format specified in RFC 2373. To use EUI-64, the Prefix Length field must be less than or equal to 64 and the host segment must be all zeros. |
IPv6 Peer Address |
In a redundant configuration, you can configure an IPv6 peer unique local address on the active that is synchronized to the standby ACE. You can configure only one peer unique local IPv6 address on an interface. To configure a peer unique local address, enter a complete IPv6 address with an FC00::/7 prefix in the first field. In the second field after the /, enter the prefix length to specify how many of the most significant bits (MSBs) are used for the network identifier.
Note The IPv6 peer unique local address must be unique across multiple contexts on a shared VLAN.
Check the EUI-64 box to specify that the low order 64 bits are automatically generated in the IEEE 64-bit Extended Unique Identifier (EUI-64) format specified in RFC 2373. To use EUI-64, the Prefix Length field must be less than or equal to 64 and the host segment must be all zeros. |
Prefix Length |
Enter the prefix length for all unique-local addresses to specify how many of the most significant bits (MSBs) are used for the network identifier. Enter an integer from 7 to 127. If you use the optional EUI-64 check box for the global and peer addresses, the prefix must be less than or equal to 64. |
IPv6 Link-Local Address |
By default, when you enable IPv6 or configure a global IPv6 address on an interface, the ACE automatically creates a link local address for it. Every link local address must have a predefined prefix of FE80::/10. You can configure only one IPv6 link local address on an interface. This address always has the prefix of 64. To manually configure the link local address, enter a complete IPv6 address with an FE80::/10 prefix in this field. For example, enter FE80:DB8:1::1. |
IPv6 Peer Link-Local Address |
In a redundant configuration, you can configure an IPv6 peer link local address for the standby ACE. You can configure only one peer link local address on an interface. To configure the peer link local address, enter a complete IPv6 address with an FE80::/10 prefix in this field.
Note The IPv6 peer link local address must be unique across multiple contexts on a shared VLAN.
|
More Settings |
Enable ICMP Guard |
Check the IPv4, IPv6 or both check boxes to indicate that ICMP Guard is to be enabled on the ACE appliance. Clear the check boxes to indicate that ICMP Guard is not to be enabled on ACE appliance.
Caution Disabling ICMP security checks may expose your ACE appliance and network to potential security risks. When you disable ICMP Guard, the ACE appliance no longer performs NAT translations on the ICMP header and payload in error packets, which can potentially reveal real host IP addresses to attackers.
|
Enable DHCP Relay |
Check the IPv4, IPv6 or both check boxes to indicate that the ACE appliance is to accept DHCP requests from clients on this interface and to enable the DHCP relay agent. Clear the check boxes to indicate that the ACE appliance is not to accept DHCP requests or enable the DHCP relay agent. |
Reverse Path Forwarding (RPF) |
Check the IPv4, IPv6 or both check boxes to indicate that the ACE appliance is to discard IP packets if no reverse route is found or if the route does not match the interface on which the packets arrived. Clear the check boxes to indicate that the ACE appliance is not to filter or discard packets based on the ability to verify the source IP address. |
Reassembly Timeout (Seconds) |
Enter the number of seconds that the ACE appliance is to wait before it abandons the fragment reassembly process if it doesn’t receive any outstanding fragments for the current fragment chain (that is, fragments belonging to the same packet).
- For IPv4, valid entries are 1 to 30 seconds. The default is 5.
- For IPv6, valid entries are 1 to 60 seconds. The default is 60.
|
Max. Fragment Chains Allowed |
Enter the maximum number of fragments belonging to the same packet that the ACE appliance is to accept for reassembly. For IPv4 and IPv6, valid entries are 1 to 256. The default is 24. |
Min. Fragment MTU Value |
Enter the minimum fragment size that the ACE appliance accepts for reassembly for a VLAN interface.
- For IPv4, valid entries are 28 to 9216 bytes. The default is 576.
- For IPv6, valid entries are 56 to 9216 bytes. The default is 1280.
|
Action For IP Header Options |
Select the IPv4, IPv6 or both action the ACE appliance is to take when an IP option is set in a packet:
- Allow—Indicates that the ACE appliance is to allow the IP packet with the IP options set.
- Clear—Indicates that the ACE appliance is to clear all IP options from the packet and to allow the packet.
- Clear-Invalid—Indicates that the ACE appliance is to clear the invalid IP options from the packet and then allow the packet. This action is the default for IPv4.
- Drop—Indicates that the ACE appliance is to discard the packet regardless of any options that are set. This action is the default for IPv6.
|
Enable MAC Address Autogenerate |
Allows you to configure a different MAC address for the VLAN interface. |
Min. TTL IP Header Value |
Enter the minimum number of hops a packet is allowed to reach its destination. Valid entries are integers from 1 to 255. This field is applicable for IPv4 and IPv6 traffic. Each router along the packet’s path decrements the TTL by one. If the packet’s TTL reaches zero before the packet reaches its destination, the packet is discarded. |
MTU Value |
Enter number of bytes for Maximum Transmission Units (MTUs). Valid entries are integers from 68 to 9216, and the default is 1500. |
Enable Syn Cookie Threshold Value |
Embryonic connection threshold above which the ACE applies SYN-cookie DoS protection. Valid entries are integers from 1 to 65535. |
Action For DF Bit |
Indicate how the ACE appliance is to handle a packet that has it DF (Don’t Fragment) bit set in the IP header:
- Allow—Indicates that the ACE appliance is to permit the packet with the DF bit set. If the packet is larger than the next-hop MTU, ACE appliance discards the packet and sends an ICMP unreachable message to the source host.
- Clear—Indicates that the ACE appliance is to clear the DF bit and permit the packet. If the packet is larger than the next-hop MTU, the ACE appliance fragments the packet.
The default is Allow. |
ARP Inspection Type |
By default, ARP inspection is disabled on all interfaces, allowing all ARP packets through the ACE. When you enable ARP inspection, the ACE appliance uses the IPv4 address and interface ID (ifID) of an incoming ARP packet as an index into the ARP table. ARP inspection operates only on ingress bridged interfaces. ARP inspection prevents malicious users from impersonating other hosts or routers, known as ARP spoofing. ARP spoofing can enable a “man-in-the-middle” attack. For example, a host sends an ARP request to the gateway router. The gateway router responds with the gateway router MAC address. Note If ARP inspection fails, then the ACE does not perform source MAC validation. The options are as follows:
- N/A—ARP inspection is disabled.
- Flood—Enables ARP forwarding of nonmatching ARP packets. The ACE appliance forwards all ARP packets to all interfaces in the bridge group. This is the default setting. In the absence of a static ARP entry, this option bridges all packets.
- No-flood—Disables ARP forwarding for the interface and drops nonmatching ARP packets. In the absence of a static ARP entry, this option does not bridge any packets.
|
UDP Config Commands |
Select the UDP boost command:
- N/A—not applicable
- IP Destination Hash—Performs destination IP hash during connection.
- IP Source Hash—Performs source IP hash during connection lookup.
|
Secondary IP Groups |
This option appears only when Interface Type is set to Routed. Enter a maximum of four secondary IP groups for the VLAN. The IP, alias IP, and peer IP addresses of each Secondary IP Group should be in the same subnet. Note You cannot configure secondary IP addresses on FT VLANs. To create up to four secondary IP groups for the VLAN, do the following: a. Define one or more of the following secondary IP address types: – IP—Secondary IP address assigned to this interface.The primary address must be active for the secondary address to be active. – AliasIP—Secondary IP address of the alias associated with this interface. – PeerIP—Secondary IP address of the remote peer. – Netmask—Secondary subnet mask to be used. The ACE has a system limit of 1,024 for each secondary IP address type. b. Click Add to selection (right arrow) to add the group to the group display area. c. Repeat Steps 1 and 2 for each additional group. d. (Optional) Rearrange the order in which the groups are listed by selecting one of the group listings in the group display area and click either Move item up in list (up arrow) or Move item down in list (down arrow). Note that the ACE does not care what order the groups are in. e. (Optional) Edit a group or remove it from the list by selecting the desired group in the group display area and click Remove from selection (left arrow). |
Input Policies |
From the Available list, double-click the policy map name that is associated with this VLAN interface or use the right arrow to move it to the Selected list. This policy map is to be applied to the inbound direction of the interface; that is, all traffic received by this interface. If you choose more than one policy map, use the Up and Down arrows to choose the priority of the policy map in the Selected list. These arrows modify the order of the policy maps for new VLANs only; they do not modify the policy map order when editing an existing policy map. |
Input Access Group |
From the Available list, double-click an ACL name for the ACL input access group to be associated with this VLAN interface or use the right arrow to move it to the Selected list. Any ACL group listed in the Selected list specifies that this access group is to be applied to the inbound direction of the interface. |
Output Access Group |
From the Available list, double-click an ACL name for the ACL output access group that is associated with this VLAN interface or use the right arrow to move it to the Selected list. Any ACL group listed in the Selected list specifies that this access group is to be applied to the outbound direction of the interface; that is, all traffic sent by this interface. |
Static ARP Entry (IP/MAC Address) |
For the Static ARP entry, do the following: a. In the ARP IP Address field, enter the IP address. This field accepts IPv4 addresses only. b. In the ARP MAC Address field, enter the hardware MAC address for the ARP table entry (for example, 00.02.9a.3b.94.d9). c. When completed, use the right arrow to move the static ARP entry to the list box. Use the Up and Down arrows to choose the priority of the static ARP entry in the list box. These arrows modify the order of the static ARPs for new VLANs only; they do not modify the static ARP order when editing an existing policy map. |
DHCP Relay Configuration |
Enter the IPv4 address of the DHCP server to which the DHCP relay agent is to forward client requests. Enter the IP address in dotted-decimal notation, such as 192.168.11.2. |
IPv6 Forward Interface VLAN |
Enter the VLAN to forward all received client requests with destination being the IPv6 DHCP address configured in the IPv6 DHCP Relay Configuration field. |
IPv6 DHCP Relay Configuration |
Enter the IPv6 address for the DHCP server where the DHCP relay agent forwards client requests. Select the VLAN when the server address is a link local address.
Note When you enter a DHCPv6 server global IPv6 address, a VLAN is not required.
|
Managed-Config |
Check the check box to indicate that the interface use the stateful autoconfiguration mechanism to configure IPv6 addresses. Clear the check box to indicate that the interface does not use the stateful autoconfiguration mechanism to configure IPv6 addresses. |
Other-Config |
Check the check box to indicate that the interface use the stateful autoconfiguration mechanism to configure parameters other than IPv6 addresses. Clear the check box to indicate that the interface does not use the stateful autoconfiguration mechanism to configure parameters other than IPv6 addresses. |
NS Interval |
The ACE sends neighbor solicitation messages through ICMPv6 on the local link to determine the IPv6 addresses of nearby nodes (hosts or routers). You can configure the rate at which the ACE sends these neighbor solicitation messages. By default, the interval at which the ACE sends NS messages for DAD default is 1000 milliseconds (msecs). To configure the interval, enter an integer from 1000 to 2147483647. |
NS Reachable Time |
The neighbor solicitation reachable time is the time period in milliseconds during which a host considers the peer is reachable after a reachability confirmation from the peer. A reachability confirmation can include neighbor solicitation or advertisement, or any upper protocol traffic. By default, this time period is 0 milliseconds. To configure this time, enter an integer from 0 to 3600000. |
Retransmission time |
By default, the advertised retransmission time is 0 milliseconds. To configure the retransmission time, enter an integer from 0 to 3600000. |
DAD Attempts |
By default, the number of attempts for sending duplicate address detection (DAD) is 1. To configure the DAD attempts, enter an integer from 0 to 255. |
RA Hop Limit |
By default, the hop limit that neighbors should use when originating IPv6 packets is 64. To configure the hop limit in the IPv6 header, enter an integer from 0 to 255. |
RA Lifetime |
The router advertisement (RA) lifetime is the length of time that neighboring nodes should consider the ACE as the default router before they send RS messages again. By default, this length of time is 1800 seconds (30 minutes). To configure the RA lifetime, enter an integer from 0 to 9000. |
RA Interval |
By default, the rate at which the ACE sends RA messages is 600 seconds. To configure the rate, enter an integer from 4 to 1800. This interval must not exceed the RA lifetime. |
Suppress RA |
By default, the ACE automatically responds to RS messages that it receives from neighbors with RA messages that include, for example, the network prefix. You can instruct the ACE to not respond to RS messages. Check the check box to instruct the ACE to not respond to RS messages. The ACE also stops periodic unsolicited RAs that it sends at the RA interval. Clear the check box to reset the default behavior of automatically responding to RS messages. |
IPv6 Routing Prefix Advertisement |
Click the Add button to configure the IPv6 prefixes that the ACE advertises in RA messages on the local link. |
IPv6 Address/Prefix Length |
To configure IPv6 address advertised in the RA messages, enter a complete IPv6 address in the first field. In the second field after the /, enter the prefix length to specify how many of the most significant bits (MSBs) are used for the network identifier. |
No Advertisements |
Check the check box to indicate that the route prefix is not advertised. Clear the check box to indicate that the route prefix is advertised. |
Lifetime |
Configure the prefix lifetime attributes as follows:
– Valid Lifetime—By default, the prefix lifetime is 2592000 seconds (30 days). To configure the prefix lifetime in seconds, enter an integer from 0 to 2147183647. Select Infinite to indicate that the prefix never expires. – Preferred Lifetime—By default, the prefix lifetime is 604800 seconds (10 days).To configure how long an IPv6 address remains preferred in seconds, enter an integer from 0 to 2147183647. This lifetime must not exceed the Valid Lifetime. Select Infinite to indicate that the preferred lifetime never expires.
- Lifetime Expiration Date:
– Valid Month/Day/Year/Time—Valid lifetime expiration date and time. – Preferred Month/Day/Year/Time—Preferred lifetime expiration date and time. Use the drop-down lists to select a day, month, and year. To specify the time, use the hh:mm format. |
Off-link: |
This option appears when you enter a Preferred Lifetime field. Check this check box to indicate that the route prefix is on a different subnet for a router to route to it. Clear the check box to indicate that the route prefix is on the same subnet for a router to route to it. |
No-autoconfig |
This option appears when you enter a Preferred Lifetime field. Check this check box to indicate to the host that it cannot use this prefix when creating an stateless IPv6 address. Clear the check box to indicate to the host that it can use this prefix when creating an stateless IPv6 address. |