Page 1
Cisco 4700 Series Application Control Engine Appliance Administration Guide Software Version A1(7) November 2007 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-11157-01...
Configuring a Message-of-the-Day Banner 1-13 Configuring the Time, Date, and Time Zone 1-15 Setting the System Time and Date 1-15 Setting the Time Zone 1-16 Adjusting for Daylight Saving Time 1-19 Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 4
Creating a Layer 3 and Layer 4 Remote Access Policy Map Creating a Layer 3 and Layer 4 Policy Map for Network Management Traffic Received by the ACE Defining a Layer 3 and Layer 4 Policy Map Description 2-10 Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 5
Replacing a Demo License with a Permanent License Removing a License Removing an Appliance Performance Throughput License 3-10 Removing an SSL TPS License 3-10 Removing a Virtualization Context License 3-10 Removing an HTTP Compression Performance License 3-13 Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 6
4-38 Defining Layer 7 Classifications for HTTP Server Load Balancing 4-39 Defining Layer 7 Classifications for HTTP Deep Packet Inspection 4-41 Defining Layer 7 Classifications for FTP Command Inspection 4-42 Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 7
Example of a Traffic Policy Configuration 4-68 Viewing Class Maps, Policy Maps, and Service Policies 4-71 Displaying Class Map Configuration Information 4-71 Displaying Policy Map Configuration Information 4-71 Displaying Service Policy Configuration Information 4-72 Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 8
5-23 Moving Files 5-23 Deleting Files 5-24 Displaying File Contents 5-25 Saving show Command Output to a File 5-26 Viewing and Copying Core Dumps 5-27 Copying Core Dumps 5-28 Cisco 4700 Series Application Control Engine Appliance Administration Guide viii OL-11157-01...
Page 9
Displaying Process Status Information and Memory Resource Limits 6-11 Displaying System Information 6-14 Displaying ICMP Statistics 6-16 Displaying Technical Support Information 6-17 Configuring Redundant ACE Appliances C H A P T E R Overview of Redundancy Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 10
Forcing a Failover 7-24 Synchronizing Redundant Configurations 7-25 Configuring Tracking and Failure Detection 7-28 Overview of Tracking and Failure Detection 7-28 Configuring Tracking and Failure Detection for a Host or Gateway 7-29 Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 11
Displaying the Redundancy Internal Software History 7-47 Displaying Memory Statistics 7-47 Displaying Peer Information 7-47 Displaying FT Statistics 7-51 Displaying FT Tracking Information 7-54 Clearing Redundancy Statistics 7-58 Clearing FT Statistics 7-58 Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 12
Creating a Layer 3 and Layer 4 Policy Map for SNMP Network Management Traffic Received by the ACE 8-42 Specifying a Layer 3 and Layer 4 Traffic Class with the Traffic Policy 8-43 Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 13
Enabling the Display of Raw XML Request show Command Output in XML Format 9-24 Accessing the ACE DTD File 9-27 Upgrading Your ACE Software A P P E N D I X Overview of Upgrading ACE Software Cisco 4700 Series Application Control Engine Appliance Administration Guide xiii OL-11157-01...
Page 14
Configuring the Configuration Register to Autoboot the Boot Variable Verifying the Boot Variable and Configuration Register A-10 Reloading the ACE A-10 Displaying Software Image Information A-11 N D E X Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 15
Preface This guide provides instructions for the administration of the Cisco 4700 Series Application Control Engine (ACE) appliance. It describes how to perform administration tasks on the ACE, including initial setup, establish remote access, manage software licenses, configure class maps and policy maps, manage the ACE software, configure SNMP, configure redundancy, configure the XML interface, and upgrade your ACE software.
ACE. Chapter 2, Enabling Describes how to configure remote access to the Cisco Remote Access to the 4700 Series Application Control Engine (ACE) appliance by establishing a remote connection using the Secure Shell (SSH) or Telnet protocols.
Page 17
CLI query and reply data in XML format to meet different specific business needs. Appendix A, Describes how to upgrade the software on your ACE. Upgrading Your ACE Software Cisco 4700 Series Application Control Engine Appliance Administration Guide xvii OL-11157-01...
Manager GUI Quick Configuration Note Cisco 4700 Series Describes how to operate your ACE in a single Application Control context or in multiple contexts. Engine Appliance Virtualization Configuration Guide Cisco 4700 Series Application Control Engine Appliance Administration Guide xviii OL-11157-01...
Page 19
Describes the configuration of the application Application Control acceleration and optimization features of the ACE. Engine Appliance It also provides an overview and description of Application Acceleration those features. and Optimization Configuration Guide Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 20
ACE. Cisco 4700 Series Provides an alphabetical list and descriptions of all Application Control CLI commands by mode, including syntax, Engine Appliance options, and related commands. Command Reference Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks. font Terminal sessions and information the system displays screen are in font. screen Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 22
Means possible physical harm or equipment damage. A warning describes an Warning action that could cause you physical harm or damage the equipment. For additional information about CLI syntax formatting, see the Cisco 4700 Series Application Control Engine Appliance Command Reference. Cisco 4700 Series Application Control Engine Appliance Administration Guide...
For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html...
Page 24
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Cisco 4700 Series Application Control Engine Appliance Administration Guide xxiv OL-11157-01...
Page 25
“This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”. The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptography-related. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 26
The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License]. Cisco 4700 Series Application Control Engine Appliance Administration Guide xxvi OL-11157-01...
Page 27
Shutting Down the ACE For details on assigning VLANs to the ACE, configuring VLAN interfaces on the ACE, and configuring a default or static route on the ACE, see the Cisco 4700 Series Application Control Engine Appliance Routing and Bridging Configuration Guide.
Use a straight-through cable to connect the switch to a DTE device, such as a terminal or a PC. For instructions on connecting a console cable to your ACE appliance, see the Cisco Application Control Engine Appliance Hardware Installation Guide.
VLAN on the ACE through one of its Gigabit Ethernet ports. The primary intent of the setup script is to simplify connectivity to the Device Manager GUI (as described in the Cisco 4700 Series Application Control Engine Appliance Device Manager GUI Quick Configuration Guide)
Page 30
Press the power button on the front of the ACE and the boot process occurs. See Step 2 the Cisco Application Control Engine Appliance Hardware Installation Guide for details. At the login prompt, log into the ACE by entering the login username and Step 3 password.
Page 31
ALL extended permit ip any any class-map type management match-any remote_access match protocol xml-https any match protocol icmp any match protocol telnet any match protocol ssh any match protocol http any match protocol https any Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 32
(yes/no) [n]:, enter one of the following replies: Type y to save the running-configuration to the startup-configuration file. • Type n to bypass saving the running-configuration to the • startup-configuration file. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
You can configure the ACE to provide a higher level of security for users accessing the ACE. For information about configuring user authentication for login access, see the Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide. Cisco 4700 Series Application Control Engine Appliance Administration Guide...
Page 34
For software versions A1(8.0a) and higher, you must change the default Admin Caution password if you have not already done so. Otherwise, you will be able to log in to the ACE only through the console port. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
If you do not change the administrative password, security on your ACE can be compromised because the administrative password is configured to be the same for every ACE shipped from Cisco Systems. For software versions A1(8.0a) and higher, you must change the default Admin Caution password if you have not already done so.
ACE. You must have access to the ACE through the console port to be able to reset the password for the Admin user back to the factory-default value of admin. Only the Admin context is accessible through the console port. Note Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-10 OL-11157-01...
Page 37
The boot process continues as normal and you are able to enter the admin password at the login prompt. Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-11 OL-11157-01...
The minutes argument specifies the length of time that a user can be idle before the ACE terminates the session. Valid entries are from 0 to 60 minutes. A value of 0 instructs the ACE never to timeout. The default is 5 minutes. Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-12 OL-11157-01...
The ACE appends each line to the end of the existing banner. If the text is empty, the ACE adds a carriage return (CR) to the banner. Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-13...
Page 40
To replace a banner or a line in a multi-line banner, use the no banner motd command before adding the new lines. To display the configured banner message, use the show banner motd command in Exec mode as follows: host1/Admin# show banner motd Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-14 OL-11157-01...
For example, to specify a time of 1:38:30 and a date of October 7, 2007, enter: host1/Admin# clock set 01:38:30 7 October 2007 Tues Oct 7 01:38:30 PST 2007 Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-15 OL-11157-01...
ACST—Australian Central Standard Time as UTC +9.5 hours – AKST—Alaska Standard Time as UTC –9 hours – AST—Atlantic Standard Time as UTC –4 hours – BST—British Summer Time as UTC +1 hour – Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-16 OL-11157-01...
Page 43
Eastern Europe Time, as UTC +2 hours EEST Eastern Europe Summer Time, as UTC +3 hours Greenwich Mean Time, as UTC Irish Summer Time, as UTC +1 hour Moscow Summer Time as UTC +4 hours Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-17 OL-11157-01...
Page 44
Alaska Standard Time as UTC –9 hours AKDT Alaska Standard Daylight Saving Time as UTC –8 hours Hawaiian Standard Time as UTC –10 hours Australia Central Standard Time as UTC +9.5 hours Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-18 OL-11157-01...
PDT) to be displayed when summer time is in effect. See Table 1-1 for the list the common time zone acronyms used for the daylight_timezone_name argument. start_week end_week—The week, ranging from 1 through 5. • Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-19 OL-11157-01...
Page 46
Pacific 1 Sun Apr 02:00 5 Sun Oct 02:00 60 To remove the clock summer-time setting, use the no form of this command. For example, enter: host1/Admin(config)# no clock summer-time Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-20 OL-11157-01...
Cisco 4700 Series Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide), and you plan to use an optional Cisco AVS 3180A Management Console with multiple ACE nodes, we strongly recommend that you synchronize the system clock of each ACE node with an NTP server.
ACE system clock to be synchronized by a time • server. You can specify multiple associations. ip_address2—IP address of the time server that provides the clock • synchronization. Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-22 OL-11157-01...
Listing of all associated peers • The syntax of this command is as follows: show ntp {peer-status | peers | statistics [io | local | memory | peer ip_address] Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-23 OL-11157-01...
Page 50
The stratum Poll The poll interval (in seconds) Reach The status of the reachability register (see RFC-1305) in octal Delay The latest delay (in microseconds) Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-24 OL-11157-01...
Page 51
Current number of unavailable client-receive buffers Low water refills Total number of times buffers were added, which also indicates the number of times there have been low memory resources during buffer creation Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-25 OL-11157-01...
Page 52
ACE due to an invalid packet format. Packets processed Number of NTP packets received and processed by the ACE. Bad authentication Number of packets not verified as authentic. Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-26 OL-11157-01...
Page 53
Time Last Received Time that the last NTP response was received. Time Until Next Send Length of time until the next send attempt. Reachability Change The reachability status for the peer. Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-27 OL-11157-01...
I/O statistics for local devices • memory—Clears I/O statistics for memory • For example, to clear the NTP statistics for all peers, enter: host1/Admin# clear ntp statistics all-peers Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-28 OL-11157-01...
Page 55
For example, to clear the NTP statistics for the local devices, enter: host1/Admin# clear ntp statistics local For example, to clear the NTP statistics for memory, enter: host1/Admin# clear ntp statistics memory Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-29 OL-11157-01...
Valid entries are from 0 to 511. The default is 24 lines. A selection of 0 instructs the ACE to scroll continuously (no pausing). Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-30 OL-11157-01...
Page 57
• session. To enable the various levels of syslog messages to the terminal, use the logging monitor command (see the Cisco 4700 Series Application Control Engine Appliance System Message Guide for details). session-timeout minutes—Specifies the inactivity timeout value in minutes •...
The range • is from 5 to 8. The default is 8 data bits. Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-32 OL-11157-01...
Page 59
The optional connected keyword displays the physical connection status. For example, to display the configured console settings, enter: host1/Admin# show line console line Console: Speed: 9600 bauds Databits: 8 bits per byte Stopbits: 1 bit(s) Parity: none Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-33 OL-11157-01...
Page 60
The vty_name argument specifies the name of the VTY session. Enter a maximum of 64 characters for the name of the virtual terminal. For example, to close a specified vty session, enter: host1/Admin# clear line vty vty1 Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-34 OL-11157-01...
ACE. Upon startup, the ACE loads the startup-configuration file stored in the Flash memory (nonvolatile memory) to the running-configuration file stored in RAM (volatile memory). Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-35 OL-11157-01...
Page 62
Perform one of the following actions: Press enter to boot the selected software version. • Type e to edit the commands before booting. • Type c to access a command line. • Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-36 OL-11157-01...
“Warning: file found but it is not a valid boot image” displays. For example, to set the BOOT environment variable, enter: host1/Admin(config)# boot system image:c4710ace-mz.3.0.0_AB0_0.488.bin Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-37 OL-11157-01...
GRUB bootloader. See the “Setting the Boot Method from the Configuration Register” section. Reboot the ACE. See the “Restarting the ACE” section. Upon reboot, the ACE boots to the GRUB bootloader. Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-38 OL-11157-01...
Page 65
This may take some time, Please wait ..PCI test loop , count 0 PCI path is ready Starting services... Starting sysmgr processes.. Please wait...Done!!! switch login: admin Password: admin Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-39 OL-11157-01...
Page 66
Would you like to enter the basic configuration dialog (yes/no):no Cisco Application Control Software (ACSW) TAC support: http://www.cisco.com/tac Copyright (c) 1985-2007 by Cisco Systems, Inc. All rights reserved. The copyrights to certain works contained herein are owned by other third parties and are used and distributed under license.
This command will reboot the system Save configurations for all the contexts. Save? [yes/no]: yes Generating configuration..running config of context Admin saved Perform system reload. [yes/no]: [yes] yes Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-41 OL-11157-01...
Exec mode to store the current configuration in Flash memory. If you fail to save your configuration changes, the ACE reverts to its previous settings upon restart. Cisco 4700 Series Application Control Engine Appliance Administration Guide 1-42 OL-11157-01...
C H A P T E R Enabling Remote Access to the This chapter describes how to configure remote access to the Cisco 4700 Series Application Control Engine (ACE) appliance by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols. It also describes how to configure the ACE to provide direct access to a user context from SSH.
C1 host1/C1# The rest of the examples in this table use the Admin context, unless otherwise specified. For details on creating contexts, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide. Enter configuration mode.
Page 71
(Optional) Configure the maximum number of Telnet sessions allowed for each context. host1/Admin(config)# telnet maxsessions 3 (Optional) Configure the maximum number of SSH sessions allowed for each context. host1/Admin(config)# ssh maxsessions 3 Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
This section provides an overview on creating a class map, policy map, and service policy for remote network access. For detailed information on creating class maps, policy maps, and service policies, see Chapter 4, Configuring Class Maps and Policy Maps. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Configuring Remote Network Management Traffic Services Telnet and SSH remote access sessions are established to the ACE on a per context basis. For details on creating users and contexts, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide.
For example, to specify a description that the class map is to allow remote Telnet access, enter: host1/Admin(config)# class-map type management TELNET-ALLOW_CLASS host1/Admin(config-cmap-mgmt)# description Allow Telnet access to the Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
SSH remote shell functionality provided in SSH Version 1 and supports DES and 3DES ciphers. The configuration of SSH sessions is described in the “Configuring SSH Management Sessions” section. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 76
SSH-ALLOW_CLASS host1/Admin(config-cmap-mgmt)# match protocol ssh source-address 172.16.10.0 255.255.255.254 To deselect the specified network management protocol match criteria from the class map, enter: host1/Admin(config-cmap-mgmt)# no match protocol ssh source-address 172.16.10.0 255.255.255.254 Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
When you use this command, you will access policy map management configuration mode. For example, to create a Layer 3 and Layer 4 network traffic management policy map, enter: host1/Admin(config)# policy-map type management first-match REMOTE_MGMT_ALLOW_POLICY host1/Admin(config-pmap-mgmt)# Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 78
This command enters the policy map management class configuration mode. The syntax of this command is as follows: class {name1 [insert-before name2] | class-default} Cisco 4700 Series Application Control Engine Appliance Administration Guide 2-10 OL-11157-01...
Page 79
To specify the class-default class map for the Layer 3 and Layer 4 traffic policy, enter: host1/Admin(config-pmap-mgmt)# class class-default host1/Admin(config-pmap-mgmt-c)# To remove a class map from a Layer 3 and Layer 4 policy map, enter: host1/Admin(config-pmap-mgmt)# no class L4_REMOTE_ACCESS_CLASS Cisco 4700 Series Application Control Engine Appliance Administration Guide 2-11 OL-11157-01...
For example, to create a policy map that restricts an ICMP connection by the ACE, enter: host1/Admin(config)# policy-map type management first-action ICMP_RESTRICT_POLICY host1/Admin(config-pmap-mgmt)# class ICMP-ALLOW_CLASS host1/Admin(config-pmap-mgmt-c)# deny Cisco 4700 Series Application Control Engine Appliance Administration Guide 2-12 OL-11157-01...
For example, to globally apply the remote access policy map to all of the VLANs associated with a context, enter: host1/Admin(config)# service-policy input REMOTE_MGMT_ALLOW_POLICY To detach the remote access traffic policy from an interface, enter: host1/Admin(config-if)# no service-policy input REMOTE_MGMT_ALLOW_POLICY Cisco 4700 Series Application Control Engine Appliance Administration Guide 2-13 OL-11157-01...
Page 82
(applied to an interface) as an unquoted text string with a maximum of 64 alphanumeric characters. detail—(Optional) Displays a more detailed listing of policy map statistics • and status information. Cisco 4700 Series Application Control Engine Appliance Administration Guide 2-14 OL-11157-01...
Telnet to connect to that IP address. This capability allows you to specify a particular context when accessing the ACE. For details on creating users and contexts, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide.
SSH to connect to that IP address. This capability allows you to specify a particular context when accessing the ACE. For details on creating users and contexts, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide.
The number of bits specified for each key pair ranges from 768 to 4096. To generate the SSH private key and the corresponding public key for use by the SSH server, use the ssh key command in configuration mode. Cisco 4700 Series Application Control Engine Appliance Administration Guide 2-17 OL-11157-01...
Page 86
See Chapter 1, Setting Up the ACE, for details on setting a hostname and to the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide for details on configuring a domain. For example, to generate an RSA1 key pair in the Admin context, enter:...
Service policy to activate the policy map, attach the traffic policy to an • interface or globally on all interfaces, and specify the direction in which the policy should be applied. Cisco 4700 Series Application Control Engine Appliance Administration Guide 2-19 OL-11157-01...
Page 88
To allow ICMP messages to pass through the ACE, configure an ICMP ACL to permit or deny network connections based on the ICMP type (for example, echo, echo-reply, or unreachable). See the Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide for details.
Step 2 traffic classified for it by entering the following command: host1/Admin(config-context)# allocate-interface vlan 100 See the Cisco 4700 Series Application Control Engine Appliance Routing and Bridging Configuration Guide. Generate the SSH host key pair by entering the following command:...
Page 90
For example, assign an IP address to the interface and reenable the interface within the context with the no shutdown command. See the Cisco 4700 Series Application Control Engine Appliance Routing and Bridging Configuration Guide. Create an SSH remote management policy and apply the associated service policy...
4 match protocol icmp any policy-map type management first-match L4_REMOTE-MGT_POLICY class L4_REMOTE-MGT_CLASS permit interface vlan 50 ip address 192.168.1.1 255.255.255.0 access-group input ACL1 service-policy input L4_REMOTE-MGT_POLICY no shutdown ssh key rsa1 1024 force Cisco 4700 Series Application Control Engine Appliance Administration Guide 2-23 OL-11157-01...
The optional context_name argument specifies the name of the context for which you want to view specific Telnet session information. The context_name argument is case sensitive. For example, enter: host1/Admin# show telnet Cisco 4700 Series Application Control Engine Appliance Administration Guide 2-24 OL-11157-01...
Page 93
The optional context_name argument specifies the name of the context for which you want to view the maximum number of Telnet sessions. The context_name argument is case sensitive. For example, enter: host1/Admin# show telnet maxsessions Maximum Sessions Allowed is 4 Cisco 4700 Series Application Control Engine Appliance Administration Guide 2-25 OL-11157-01...
To display the maximum number of enabled SSH sessions, use the show ssh maxsessions command in Exec mode. Only context administrators can view SSH session information associated with a particular context. Cisco 4700 Series Application Control Engine Appliance Administration Guide 2-26 OL-11157-01...
Page 95
# show ssh key ************************************** could not retrieve rsa1 key information ************************************** rsa Keys generated:Tue May 8 19:37:17 2007 ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEA4v4DQ8aNl482qDTRju9G07hEIxCgTWanPm+WOCU1ki QNd5ZwA50CBAJSfIIIB4iED6iQbhOkbXSneCvTb5mVoish2wvJrETpIDIeGxxh/jWVsU/M eBbA/7o5tv gCeT6p7pGF5oUNYFP0OeZ9BiIWDc4jBmYEQLEqJHPrMhSFE= bitcount:1024 fingerprint: f5:55:00:18:bc:af:41:74:b6:bc:aa:8e:46:31:74:4f ************************************** Cisco 4700 Series Application Control Engine Appliance Administration Guide 2-27 OL-11157-01...
C H A P T E R Managing ACE Software Licenses This chapter describes how to manage the software licenses for your Cisco 4700 Series Application Control Engine (ACE) appliance. It contains the following major sections: Available ACE Licenses •...
Ordering separate license options. • Table 3-1 summarizes the contents of the available license bundles. Table 3-2 provides a list of the default and upgrade ACE appliance licensing options. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 99
2 Gbps throughput. Virtualization Default 1 admin/5 user contexts. ACE-AP-VIRT-020 1 admin/20 user contexts. Default 1000 TPS. ACE-AP-SSL-05K-K9 5000 TPS. ACE-AP-SSL-07K-K9 7500 TPS. ACE-AP-SSL-UP1-K9 Upgrade from 5000 TPS to 7500 TPS. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 100
Etag • ACE demo licenses are available through your Cisco account representative. A demo license is valid for only 60 days. At the end of this period, you must update the demo license with a permanent license to continue to use the ACE software.
Table 3-2 using any of the available Step 1 Cisco ordering tools on cisco.com. When you receive the Software License Claim Certificate from Cisco, follow the Step 2 instructions that direct you to the following Cisco.com website: http://www.cisco.com/go/license Enter the Product Authorization Key (PAK) number found on the Software Step 3 License Claim Certificate as your proof of purchase.
Copying a License File to the ACE Copying a License File to the ACE When you receive the software license key e-mail from Cisco Systems, you must copy the attached license file to a network server. Then use the copy command in Exec mode from the Admin context to copy the file from the network server to disk0: on the ACE.
To install a license file for an SSL 5000 TPS license, enter: host1/Admin# license install disk0:ACE-AP-SSL-05K-K9.lic To install a license file for a 20 context license, enter: host1/Admin# license install disk0:ACE-AP-VIRT-020.lic Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
[path/]permanent_filename—Filename for the permanent license file that • you copied onto the ACE. demo_filename—Filename for the demo license file that the permanent • license file is replacing. For example, enter: host1/Admin# license update disk0:ACE-AP-VIRT-020.lic ACE-AP-VIRT-020-DEMO.lic Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Before removing any virtual context license, save the Admin running configuration and the user context running configurations to a remote server. For more information, see the “Removing a Virtualization Context License” section. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Table 3-3 VIrtual Context License Removal Results of license Current number of contexts Applicable licenses removal 5 (default) Not applicable — ACE-AP-VIRT-020 5 contexts Cisco 4700 Series Application Control Engine Appliance Administration Guide 3-10 OL-11157-01...
Page 107
The ACE displays the following messages and prompt: Clearing license ACE-AP-VIRT-020.lic: SERVER this_host ANY VENDOR cisco INCREMENT ACE-AP-VIRT-020 cisco 1.0 permanent 1 \ VENDOR_STRING=<count>1</count> HOSTID=ANY \ NOTICE="<LicFileID>20051103151315824</LicFileID><LicLineID>1</LicLineI D> \ <PAK></PAK>" SIGN=86A13B1EA2F2 Cisco 4700 Series Application Control Engine Appliance Administration Guide 3-11 OL-11157-01...
Page 108
Retrieve the modified Admin running configuration from the remote server. For Step 6 example, to copy the R-CONFIG-ADM Admin running configuration from the TFTP server, enter: host1/Admin# copy tftp://192.168.1.2/R-CONFIG-ADM running-config Cisco 4700 Series Application Control Engine Appliance Administration Guide 3-12 OL-11157-01...
ACE is capable of only five connections per second. For more information on the application acceleration and optimization capabilities of the ACE and configuring these capabilities, see the Cisco 4700 Series Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide.
For example, to untar the mylicenses.tar file on disk0:, enter: host1/Admin# untar disk0:mylicenses.tar For information on installing the license, see the “Installing a New or Upgrade License File” section. Cisco 4700 Series Application Control Engine Appliance Administration Guide 3-15 OL-11157-01...
Entering the show license command without any options and arguments displays all installed ACE license files and their contents. For example, to display a list of the current installed licenses, enter host1/Admin# show license brief ACE-AP-VIRT-020.lic ACE-AP-OPT-LIC-K9.lic ACE-AP-SSL-10K-K9.lic Cisco 4700 Series Application Control Engine Appliance Administration Guide 3-16 OL-11157-01...
Page 113
If the license is permanent, this field displays never. Comments Licensing errors, if any. You can also view the ACE license by using the show version command in Exec mode on the ACE. Cisco 4700 Series Application Control Engine Appliance Administration Guide 3-17 OL-11157-01...
Page 114
Chapter 3 Managing ACE Software Licenses Displaying License Configurations and Statistics Cisco 4700 Series Application Control Engine Appliance Administration Guide 3-18 OL-11157-01...
Page 115
This chapter describes how to configure class maps and policy maps to provide a global level of classification for filtering traffic received by or passing through the Cisco 4700 Series Application Control Engine (ACE) appliance. You create traffic policies and attach these policies to one or more VLAN interfaces associated with the ACE to apply feature-specific actions to the matching traffic.
Layer 4 traffic classifications or Layer 7 protocol classifications. Creating a policy map by using the policy-map command, which refers to the class maps and identifies a series of actions to perform based on the traffic match criteria. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 117
(application protocol inspection). The figure also illustrates how the ACE associates the various components of the class map and policy map configuration with each other. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 118
Associates the Layer 7 FTP inspection class map HTTP_INSPECT_L4POLICY and specifies one or more of the following actions: Service policy applies policy Deny map to a specific VLAN Mask-reply interface Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Packets that fail to meet any of the matching criteria are classified as members of the default traffic class if one is specified. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Previously created traffic class map or, optionally, the class-default class map • One or more of the individual Layer 3 and Layer 4 or Layer 7 policies that • specify the actions (functions) to be performed by the ACE Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 121
When there are multiple instances of actions of the same type configured in a policy map, the ACE performs the first action encountered of the same type that has a match. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 122
The policy lookup order of the ACE is as follows: Access control (permit or deny a packet) Permit or deny management traffic TCP/UDP connection parameters Load balancing based on a virtual IP (VIP) Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
For example, to specify an interface VLAN and apply multiple service policies to the VLAN, enter: host1/Admin(config)# interface vlan 50 host1/Admin(config-if)# ip address 172.16.1.100 255.255.255.0 host1/Admin(config-if)# service-policy input L4_HTTP_SLB_POLICY host1/Admin(config-if)# service-policy input L4_MGMT_POLICY Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
C1 host1/C1# The rest of the examples in this table use the Admin context, unless otherwise specified. For details on creating contexts, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide. Enter configuration mode.
Page 125
INBOUND (Optional) Specify a source IP address and subnet mask as a matching criteria in the class map. host1/Admin(config-cmap)# match source-address 192.168.10.1 255.255.255.0 Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-11 OL-11157-01...
Page 126
C1 host1/C1# The rest of the examples in this table use the Admin context, unless otherwise specified. For details on creating contexts, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide. Enter configuration mode.
Page 127
(Optional) Configure the class map to identify the IP network management traffic received by the ACE. host1/Admin(config-cmap-mgmt)# match protocol ssh source-address 192.168.10.1 255.255.255.0 host1/Admin(config-cmap-mgmt)# match protocol telnet source-address 192.168.10.1 255.255.255.0 host1/Admin(config-cmap-mgmt)# match protocol icmp source-address 192.168.10.1 255.255.255.0 host1/Admin(config-cmap-mgmt)# exit Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-13 OL-11157-01...
Page 128
C1 host1/C1# The rest of the examples in this table use the Admin context, unless otherwise specified. For details on creating contexts, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide. Enter configuration mode.
Page 129
HTTP protocol deep inspection of incoming traffic host1/Admin(config-cmap-http-insp)# match header length request eq 256 host1/Admin(config-cmap-http-insp)# match header Host header-value .mycompanyexample.com host1/Admin(config-cmap-http-insp)# match url length eq 10000 host1/Admin(config-cmap-http-insp)# exit Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-15 OL-11157-01...
Page 130
Layer 3 and Layer 4 traffic policy map and to apply the policy to one or all of the VLAN interfaces associated with the context. Each step includes the CLI command required to complete the task. Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-16 OL-11157-01...
Page 131
C1 host1/C1# The rest of the examples in this table use the Admin context, unless otherwise specified. For details on creating contexts, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide. Enter configuration mode.
Page 132
Layer 3 and Layer 4 network management policy map and to apply the policy to one or all of the VLAN interfaces associated with the context. Each step includes the CLI command required to complete the task. Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-18 OL-11157-01...
Page 133
C1 host1/C1# The rest of the examples in this table use the Admin context, unless otherwise specified. For details on creating contexts, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide. Enter configuration mode.
Page 134
VLAN interfaces in the same context. host1/Admin(config)# interface vlan 50 host1/Admin(config-if)# ip address 192.168.1.100 255.255.0.0 host1/Admin(config-if)# service-policy input L4_MGMT_POLICY (Optional) Save your configuration changes to Flash memory. host1/Admin(config)# exit host1/Admin# copy running-config startup-config Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-20 OL-11157-01...
Page 135
C1 host1/C1# The rest of the examples in this table use the Admin context, unless otherwise specified. For details on creating contexts, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide. Enter configuration mode.
Page 136
(Optional) Create and configure a Layer 7 policy map that enables FTP command inspection. host1/Admin(config) # policy-map type inspect ftp first-match FTP_INSPECTION_L7_POLICY host1/Admin(config-pmap-ftp-ins)# description FTP command inspection of incoming traffic host1/Admin(config-pmap-ftp-ins)# class FTP_INSPECT_L7_CLASS host1/Admin(config-pmap-ftp-ins-c)# match request-method stou host1/Admin(config-pmap-ftp-ins-c)# deny Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-22 OL-11157-01...
Page 137
VLAN interfaces in the same context. host1/Admin(config)# interface vlan 50 host1/Admin(config-if)# ip address 192.168.1.100 255.255.0.0 host1/Admin(config-if)# service-policy input L4_SLB_POLICY (Optional) Save your configuration changes to Flash memory. host1/Admin(config)# exit host1/Admin# copy running-config startup-config Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-23 OL-11157-01...
• Defining TCP/UDP Port Number or Port Range Match Criteria • Defining the Source IP Address and Subnet Mask Match Criteria • Defining the VIP Address Match Criteria • Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-24 OL-11157-01...
The default setting is to meet all of the match criteria (match-all) in a class map. map_name—Name assigned to the class map. Enter an unquoted text string • with no spaces and a maximum of 64 alphanumeric characters. Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-25 OL-11157-01...
Page 140
This command is intended to define a 3-tuple flow of VIP address, protocol, and port as matching criteria for server load balancing. Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-26 OL-11157-01...
For example, to specify a description that the class map is to filter network traffic to the server, enter: host1/Admin(config)# class-map HTTP_APP_PROTOCOL_INSPECTION_CLASS host1/Admin(config-cmap)# description HTTP inspection of incoming traffic To remove the description from the class map, enter: host1/Admin(config-cmap)# no description Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-27 OL-11157-01...
When a packet matches an entry in an ACL, and if it is a permit entry, the ACE allows the matching result. If it is a deny entry, the ACE blocks the matching result. Refer to the Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide for details about creating ACLs in the ACE.
The line numbers do not dictate a priority or sequence for the match statements. • ip_address—Destination IP address. Enter the IP address in dotted-decimal notation (for example, 192.168.11.1). mask—Subnet mask entry in dotted-decimal notation (for example, • 255.255.255.0). Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-29 OL-11157-01...
TCP or UDP port number. With any • used in place of either the eq or range values, packets from any incoming port match. Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-30 OL-11157-01...
The line numbers do not dictate a priority or sequence for the match statements. ip_address—Source IP address of the client. Enter the IP address in • dotted-decimal notation (for example, 192.168.11.1). Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-31 OL-11157-01...
VIPs for server load balancing. See the Cisco 4700 Series Application Control Engine Appliance Server Load-Balancing Configuration Guide for details about configuring the ACE to perform server load balancing.
Page 147
Mapping of Airline Traffic over Internet Protocol (MATIP) Type A nntp Network News Transport Protocol (NNTP) pop2 Post Office Protocol (POP) v2 pop3 Post Office Protocol (POP) v3 Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-33 OL-11157-01...
Page 148
L4_SLB_VIP_CLASS host1/Admin(config-cmap)# match virtual-address 192.168.1.10 tcp port eq 80 To remove the VIP match statement from the class map, enter: host1/Admin(config-cmap)# no match virtual-address 192.168.1.10 tcp port eq 80 Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-34 OL-11157-01...
ACE evaluates multiple match statements operations when multiple match criteria exist in a class map. The syntax of this command is: class-map type management [match-all | match-any] map_name Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-35 OL-11157-01...
Page 150
172.16.10.0 255.255.255.0 host1/Admin(config-cmap-mgmt)# match protocol ssh any To remove a Layer 3 and Layer 4 network management class map from the ACE, enter: host1/Admin(config)# no class-map type management match-any MGMT-ACCESS_CLASS Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-36 OL-11157-01...
HTTPS as transfer protocol to send and receive XML • documents between the ACE and a Network Management System (NMS). any—Specifies any client source address for the management traffic • classification. Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-37 OL-11157-01...
Defining Layer 7 Classifications for HTTP Server Load Balancing • Defining Layer 7 Classifications for HTTP Deep Packet Inspection • Defining Layer 7 Classifications for FTP Command Inspection • Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-38 OL-11157-01...
Page 153
Layer 7 HTTP load-balancing class map. The syntax of this command is: class-map type http loadbalance [match-all | match-any] map_name Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-39 OL-11157-01...
Page 154
HTTP server load balancing configuration mode. For details on specifying the match criteria for a HTTP server load-balancing class map, see the Cisco 4700 Series Application Control Engine Appliance Server Load-Balancing Configuration Guide. Cisco 4700 Series Application Control Engine Appliance Administration Guide...
URL content statements in the same class map is valid. However, specifying a match-all condition for multiple HTTP headers with the same names or multiple URLs in the same class map is invalid. Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-41 OL-11157-01...
When you use the class-map type ftp inspect command, you will access class map FTP inspection configuration mode. For details on specifying the match criteria for the FTP command inspection class map, see the Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide.
Specifying a Layer 3 and Layer 4 Traffic Class With the Traffic Policy • • Specifying Layer 3 and Layer 4 Policy Actions Using Parameter Maps in a Layer 3 and Layer 4 Policy Map • Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-43 OL-11157-01...
For example, to create a Layer 3 and Layer 4 network traffic management policy map, enter: host1/Admin(config)# policy-map type management first-match L4_MGMT_POLICY host1/Admin(config-pmap-mgmt)# To remove a network traffic management policy map from the ACE, enter: host1/Admin(config)# no policy-map type management first-match L4_MGMT_POLICY Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-44 OL-11157-01...
To provide a brief summary about the Layer 3 and Layer 4 policy map, use the description command in policy map configuration mode. The syntax of this command is: description text Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-45 OL-11157-01...
To manually insert the class map ahead of a previously specified class map, use the class command with the insert-before keyword. However, the ACE does not save this reordering as part of the configuration. Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-46 OL-11157-01...
Use the deny command in policy map class configuration mode to refuse the • remote network management protocols listed in the class map to be received by the ACE. Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-47 OL-11157-01...
Page 162
Optimization Configuration Guide Secure Sockets Layer Cisco 4700 Series Application Chapter 3, Configuring SSL Termination (SSL) security Control Engine Appliance SSL and Chapter 4, Configuring SSL Initiation services Configuration Guide Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-48 OL-11157-01...
• connection-related parameters pertaining to TCP normalization, termination, and server re-use as well as IP normalization, fragmentation, and reassembly. See the Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide for details. • parameter-map type http—Configures advanced HTTP behavior for HTTP load-balanced connections.
To specify the SSL session parameters that the ACE uses in an SSL proxy service, you can create an SSL parameter map. Use the parameter-map type ssl command to specify SSL termination parameters. Refer to the Cisco 4700 Series Application Control Engine Appliance SSL Configuration Guide for details.
HTTP inspection configuration mode. The ACE attempts to match a packet against all classes in the policy map and executes the actions of all matching classes associated with the policy map. Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-51 OL-11157-01...
Page 166
For example, to create a Layer 7 load-balancing policy map, enter: host1/Admin(config)# policy-map type loadbalance first-match L4_SLB_POLICY host1/Admin(config-pmap-lb)# To remove a policy map from the ACE, enter: host1/Admin(config)# no policy-map type loadbalance first-match L4_SLB_POLICY Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-52 OL-11157-01...
To specify actions for multiple match statements, use a class map as described in Note “Specifying a Layer 7 Traffic Class with the Traffic Policy” section. The syntax for an inline match command is: match name match_statement [insert-before map_name] Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-53 OL-11157-01...
For example, to specify an existing class map in the Layer 7 policy map, enter: host1/Admin(config-pmap-lb)# class L7_SLB_SERVER_CLASS host1/Admin(config-pmap-lb-c)# To remove a class map from a Layer 7 policy map, enter: host1/Admin(config-pmap-lb)# no class L7_SLB_SERVER_CLASS Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-54 OL-11157-01...
ACE document and chapter as outlined in Table 4-10. Table 4-10 defines the associated actions for the different Layer 7 application policies based on the function of the Layer 7 policy map. Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-55 OL-11157-01...
L4_SLB_POLICY host1/Admin(config-if)# service-policy input REMOTE_MGMT_ALLOW_POLICY For example, to globally apply multiple service policies to all VLANs associated with the context, enter: host1/Admin(config)# service-policy input L4_SLB_POLICY host1/Admin(config)# service-policy input REMOTE_MGMT_ALLOW_POLICY Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-58 OL-11157-01...
Page 173
A policy activated on a VLAN interface overwrites any specified global • policies for overlapping classification and actions. The ACE allows only one policy of a specific feature type to be activated on • a VLAN interface. Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-59 OL-11157-01...
Filters a subset of the HTTP traffic using a content filtering rule that permits • the following packet types: With an HTTP header length of 255 or less – Without the string “BAD” included in the URL – Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-60 OL-11157-01...
Page 175
255 or less by entering the following commands: host1/Admin(config)# class-map type http inspect match-all L7_FLTRHTML1_CLASS host1/Admin(config-cmap-http-insp)# match header accept header-value html host1/Admin(config-cmap-http-insp)# match header length request eq Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-61 OL-11157-01...
Page 176
Apply the completed policies to interface VLAN 50 by entering the following Step 5 commands: host1/Admin(config)# interface vlan 50 host1/Admin(config-if)# ip address 172.16.1.100 255.255.255.0 host1/Admin(config-if)# service-policy input L4_MGMT_POLICY host1/Admin(config-if)# service-policy input L4_FILTER_POLICY Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-62 OL-11157-01...
Create a Layer 7 server load-balancing policy by entering the following commands: host1/Admin(config)# policy-map type loadbalance first-match L7_SLB_POLICY host1/Admin(config-pmap-lb)# class SPORTS-MAP_CLASS host1/Admin(config-pmap-lb-c)# serverfarm SPORTS-SERVER host1/Admin(config-pmap-lb-c)# exit host1/Admin(config-pmap-lb)# class NEWS-MAP_CLASS host1/Admin(config-pmap-lb-c)# serverfarm NEWS-SERVER host1/Admin(config-pmap-lb-c)# exit Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-63 OL-11157-01...
Page 178
HTTP_PARAMETER_MAP host1/Admin(config-pmap-c)# exit host1/Admin(config-pmap)# exit host1/Admin(config)# Apply the completed policies to interface VLAN 10 by entering the following Step 7 commands: host1/Admin(config)# interface VLAN 10 host1/Admin(config-if)# service-policy input L4_SLB_POLICY Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-64 OL-11157-01...
Step 2 protocol, and port as matching criteria for server load balancing by entering the following commands: host1/Admin(config)# class-map L4_SLBVIP_CLASS host1/Admin(config-cmap)# match virtual-address 192.168.5.10 tcp port host1/Admin(config-cmap)# exit host1/Admin(config)# Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-66 OL-11157-01...
Page 181
TCP_MAP host1/Admin(config-pmap-c)# exit host1/Admin(config-pmap)# exit host1/Admin(config)# Apply the completed policies to interface VLAN 10 by entering the following Step 5 commands: host1/Admin(config)# interface VLAN 10 host1/Admin(config-if)# service-policy input L4_SLB_POLICY Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-67 OL-11157-01...
Exec mode. For example, enter: host1/Admin# show running-config policy-map Generating configuration..policy-map type management first-match REMOTE_MGMT_ALLOW class SSH-ALLOW permit class TELNET-ALLOW permit policy-map type loadbalance first-match L4_SLB_policy class L4_SLB_class Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-71 OL-11157-01...
(applied to an interface). For example, to clear the statistics for the policy map REMOTE_MGMT_POLICY that is currently in service, enter: host1/Admin# clear service-policy REMOTE_MGMT_POLICY Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-72 OL-11157-01...
Page 187
Status of the ICMP error function for ICMP application protocol inspection: Enabled or Disabled. Nat Dynamic NAT pool identifier with the configured interface VLAN. VIP Route Metric Not applicable for the ACE appliance. Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-73 OL-11157-01...
Page 188
Number of packets received from clients. Client Byte Number of bytes received from clients. Count Server Pkt Count Number of packets received from servers. Server Byte Number of bytes received from servers. Count Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-74 OL-11157-01...
Page 189
Applicable to only the FTP SYST command and its associated reply. Total Total number of packets dropped due to an error in the Dropped On match. Error TotalLogged Total number of errors logged. Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-75 OL-11157-01...
Page 190
Chapter 4 Configuring Class Maps and Policy Maps Viewing Class Maps, Policy Maps, and Service Policies Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-76 OL-11157-01...
C H A P T E R Managing the ACE Software This chapter describes how to manage the software running on the Cisco 4700 Series Application Control Engine (ACE) appliance and contains the following sections: Saving Configuration Files • Loading Configuration Files from a Remote Server •...
Page 192
Copying the Configuration File to the disk0: File System • Merging the Startup-Configuration File with the Running-Configuration File • Viewing Configuration Files • Viewing User Context Running-Config Files from the Admin Context • Clearing the Startup-Configuration File • Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Admin context. You should save changes to the Admin context startup-configuration file; the Admin context startup-configuration file contains all configurations that are used to create each user context. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
• optionally, the renamed configuration file. sftp://[username@]server/path[/filename]—Specifies the SFTP network • server and, optionally, the renamed configuration file. tftp://server[:port]/path[/filename]—Specifies the TFTP network server and, • optionally, the renamed configuration file. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
To save the contents of the startup-configuration file to the disk0: file system, use • the copy startup-config disk0: command in Exec mode. The syntax for the command is: copy {running-config | startup-config} disk0:[path/]filename Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
The syntax for the command is: copy startup-config running-config For example, enter: host1/Admin# copy startup-config running-config Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Displays the list of contexts configured on the ACE. The • ACE also displays the resource class (member) assigned to each context. The context keyword works only from within the Admin context. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 198
10 extended permit ip any any rserver type host real1 address 16.1.1.102 inservice rserver type host real2 address 16.1.1.103 inservice rserver type host real3 address 16.1.1.105 Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 199
Admin member default username admin password 5 $1$faXJEFBj$TJR1Nx7sLPTi5BZ97v08c/ role Admin domain default-domain username www password 5 $1$UZIiwUk7$QMVYN1JASaycabrHkhGcS/ role Admin domain de fault-domain snmp-server user www Network-Monitor snmp-server user admin Network-Monitor Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Copy the contents of the existing running-configuration file to the • startup-configuration file by using the copy running-config startup-config command. See the “Saving the Configuration File in Flash Memory” section Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-10 OL-11157-01...
To check connectivity to the remote server, use the ping or traceroute command in Exec mode. See the Cisco 4700 Series Application Control Engine Appliance Routing and Bridging Configuration Guide for details on how to use the ping and traceroute commands.
The volatile: directory provides temporary storage; files in temporary storage are erased when the ACE reboots. The Admin context supports all four file systems in the ACE. The user context supports only the disk0: and volatile: file systems. Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-12 OL-11157-01...
• image:—Displays the contents of the image: file system. • volatile:—Displays the contents of the volatile: file system. • directory/—(Optional) Contents of the specified directory. • Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-13 OL-11157-01...
Page 204
Mar 14 21:23:33 2007 0x401_vsh_log.8249.tar.gz 262711 Mar 15 21:22:18 2007 0x401_vsh_log.15592.tar.gz 250037 Mar 15 18:35:27 2007 0x401_vsh_log.16296.tar.gz Usage for core: filesystem 1847296 bytes total used 64142336 bytes free 65989632 bytes available Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-14 OL-11157-01...
For example, to copy the file called SAMPLEFILE to the MYSTORAGE directory in the disk0: file system, enter: host1/Admin# copy disk0:samplefile disk0:MYSTORAGE/SAMPLEFILE Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-15 OL-11157-01...
To copy an existing packet capture buffer to the disk0: file system, use the copy capture command in Exec mode. The syntax for the command is: copy capture capture_name disk0:[path/]destination_name Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-16 OL-11157-01...
(for example, a packet capture buffer file, ACE licenses in .tar format, or a system message log). Use the dir disk0: command to view the files available in the disk0: file system. Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-17 OL-11157-01...
Page 208
The default selection of bin should be sufficient in all cases when copying files to a remote FTP server. For example, to save a core dump file to a remote FTP server, enter: host1/Admin# copy core:0x401_vsh_log.8249.tar.gz ftp://192.168.1.2 Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-18 OL-11157-01...
File already exists, do you want to overwrite?[y/n]: [y] y Enter username[]? user1 Enter the file transfer mode[bin/ascii]: [bin] Password: Passive mode on. Hash mark printing on (1024 bytes/hash mark). Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-19 OL-11157-01...
SFTP network • server and, optionally, the renamed software system image. tftp://server[:port]/path[/filename]—Specifies the TFTP network server and, • optionally, the renamed software system image. Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-20 OL-11157-01...
For example, to unzip a compressed series of probe script files residing in the disk0: file system, enter: host1/Admin# gunzip disk0:PROBE_SCRIPTS.gz Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-21 OL-11157-01...
Creating a New Directory To create a directory in the disk0: file system of Flash memory, use the mkdir disk0: command in Exec mode. The syntax for this command is: mkdir disk0:[path/]directory Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-22 OL-11157-01...
Exec mode. If a file with the same name already exists in the destination directory, that file is overwritten by the moved file. To view the files available in the disk0: file system, use the dir disk0: command. Note Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-23 OL-11157-01...
• system (for example, a packet capture buffer file or system message log). You can optionally provide a path to a file in directory in the disk0: file system. Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-24 OL-11157-01...
RFC 1321 and is useful for data security and integrity. For example, to display the contents of a file residing in the current directory, enter: host1/Admin# show file disk0:myfile md5sum 3d8e05790155150734eb8639ce98a331 Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-25 OL-11157-01...
ACE • Flash memory. volatile:—Specifies that the destination is the volatile: file system on the • ACE. [path/][filename]—(Optional) Path and filename to the disk0: or volatile: file • system. Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-26 OL-11157-01...
Exec mode. The core: file system is available only from the Admin context. Core dump information is for Cisco Technical Assistance Center (TAC) use only. Note If the ACE becomes unresponsive, you can view the dump information in the core through the show cores command.
Prompts you for the server information if you do not provide the information • with the command. Copies the file to the root directory of the destination file system if you do not • provide path information. Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-28 OL-11157-01...
The filename argument specifies the name of a core dump file located in the core: file system. For example, to delete the file 0x401_VSH_LOG.25256.TAR.GZ from the core: file system, enter: host1/Admin# delete core:0x401_VSH_LOG.25256.TAR.GZ Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-29 OL-11157-01...
To trace the packets for a specific context, use the changeto Exec command to enter the specified context and then use the capture command. Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-30 OL-11157-01...
Page 221
To capture application acceleration and optimization traffic bound for the Note optional Cisco AVS 3180A Management Station interface, use the all keyword. This keyword captures all the traffic on all interfaces. You can then transfer the packet capture file to a remote machine to be scanned for traffic that is specific to the Management Station interface.
Specify a text string from 1 to 80 alphanumeric characters. If you do not provide the optional path, the ACE copies the file to the root directory on the disk0: file system. Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-32 OL-11157-01...
For all types of received packets, the console display is in tcpdump format. For example, to display captured packet information for packet capture buffer CAPTURE1, enter: host1/Admin# show capture CAPTURE1 Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-33 OL-11157-01...
This section contains the following topics: Creating a Configuration Checkpoint • Deleting a Configuration Checkpoint • Rolling Back a Running Configuration • Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-37 OL-11157-01...
Exec mode. Before you use this command, make sure that you want to delete the checkpoint. When you enter this command, the ACE removes the checkpoint from Flash memory. The syntax of this command is: checkpoint delete name Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-38 OL-11157-01...
{all | detail name} The options and arguments are: all—Displays a list of all existing checkpoints • detail name—Displays the running configuration of the specified checkpoint • Cisco 4700 Series Application Control Engine Appliance Administration Guide 5-39 OL-11157-01...
We recommend that you use the format flash command to reformat the ACE Caution Flash memory only under the guidance and supervision of Cisco Technical Assistance Center (TAC). The ACE uses the third extended file system (ext3) as the base file system. The...
Page 231
FTP, SFTP, or TFTP server. See the Cisco 4700 Series Application Control Engine Appliance SSL Configuration Guide for details on how to use the crypto export command to export SSL certificate and key pair files to a remote FTP, SFTP, or TFTP server.
Page 232
Import SSL certificate files and key pair files into the associated context using • by the crypto import command (see the Cisco 4700 Series Application Control Engine Appliance SSL Configuration Guide). Cisco 4700 Series Application Control Engine Appliance Administration Guide...
Viewing ACE Hardware and Software Configuration Information This chapter describes how to view Cisco 4700 Series Application Control Engine (ACE) appliance hardware and software configuration information. The ACE CLI provides a comprehensive set of show commands in Exec mode that you can use to gather ACE hardware and software configuration information.
Note display internal system-level hardware show output for use by trained Cisco personnel as an aid in debugging and troubleshooting the ACE. See the Cisco 4700 Series Application Control Engine Appliance Command Reference for background information about those show commands.
Cisco Application Control Software (ACSW) TAC support: http://www.cisco.com/tac Copyright (c) 1985-2007 by Cisco Systems, Inc. All rights reserved. The copyrights to certain works contained herein are owned by other third parties and are used and distributed under license.
The syntax of this command is: show inventory [raw] The optional raw keyword displays information about each component in the ACE. For example, to display the ACE hardware inventory details, enter: host1/Admin # show inventory Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
The optional temperature keyword displays the temperature thresholds and the alarm status of temperature sensors. For example, to display the status and alarm states of the temperature sensors in the ACE, enter: host1/Admin # show environment Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
The keywords, arguments, and options are: cpu—Displays CPU information for the Intel Pentium processor. • log—Displays information about process logs. • details—Displays process log information for all process identifiers. • Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 239
--More-- Table 6-4 describes the fields in the show processes command output. The show processes command displays summary CPU information for the Intel Pentium processor. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 240
Number of times a process has been started. Terminal that controls the process. A “—” usually means a daemon is not running on any particular tty. Process Name of the process. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 241
Status of whether the process exited normally Stack Status of whether a stack trace is in the log Core Status of whether a core file exists Log-create-time Time when the log file was generated Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 242
Virtual memory addresses where the code, data heap, and stack of the process are located. Process identifier. Service access point. UUID Universal unique identifier of the Intel Pentium processor Cisco 4700 Series Application Control Engine Appliance Administration Guide 6-10 OL-11157-01...
Table 6-9 Field Descriptions for the show terminal internal info Command Field Description Process Information Name Name of the executable that started the process. Cisco 4700 Series Application Control Engine Appliance Administration Guide 6-11 OL-11157-01...
Page 244
Identifier of the group the process belongs to (four element list). FDSize Process file descriptor size. Groups Total number of groups. VmSize Total amount of virtual memory used by the process (in kBytes). Cisco 4700 Series Application Control Engine Appliance Administration Guide 6-12 OL-11157-01...
Page 245
Maximum size (in kbytes) of the data segment for a process. File size Maximum size (in blocks) of files created by the shell. Max locked memory aximum size (in kbytes) which a process may lock into memory. Cisco 4700 Series Application Control Engine Appliance Administration Guide 6-13 OL-11157-01...
ID in hexadecimal format. The range is 0x0 to 0xffffffff. • list—Specifies all error IDs. • • internal—Specifies a series of internal system-level commands for use by trained Cisco personnel only. Cisco 4700 Series Application Control Engine Appliance Administration Guide 6-14 OL-11157-01...
Page 247
Memory usage Total memory, used memory, free memory, memory used for buffers, and memory used for cache in KB. Buffers and cache are also included in the used memory statistics. Cisco 4700 Series Application Control Engine Appliance Administration Guide 6-15 OL-11157-01...
ACE Echo Request Number of ICMP echo request messages transmitted or received by the ACE Echo Reply Number of ICMP echo reply messages transmitted or received by the ACE Cisco 4700 Series Application Control Engine Appliance Administration Guide 6-16 OL-11157-01...
Use the show terminal command to view the configured terminal size. After obtaining the output of this command, reset your terminal length as required (see Chapter 1, Setting Up the ACE). Cisco 4700 Series Application Control Engine Appliance Administration Guide 6-17 OL-11157-01...
Page 250
`show version` Cisco Application Control Software (ACSW) TAC support: http://www.cisco.com/tac Copyright (c) 1985-2007 by Cisco Systems, Inc. All rights reserved. The copyrights to certain works contained herein are owned by other third parties and are used and distributed under license.
Page 251
0 days 18 hours 59 minute(s) 49 second(s) `show clock` Tue Mar 20 10:13:57 UTC 2007 `show inventory` NAME: "chassis", DESCR: "ACE 4710 Application Control Engine Appliance" PID: ACE-4710-K9 , VID: , SN: 2061 --More-- Cisco 4700 Series Application Control Engine Appliance Administration Guide 6-19 OL-11157-01...
Page 252
TFTP network server and • optional file name. For example, to send the output of the show tech-support command to a remote FTP server, enter: host1/Admin# tac-pac ftp://192.168.1.2/tac-output_10-7-07.gz Cisco 4700 Series Application Control Engine Appliance Administration Guide 6-20 OL-11157-01...
C H A P T E R Configuring Redundant ACE Appliances This chapter describes how to configure the Cisco 4700 Series Application Control Engine (ACE) appliance for redundancy, which provides fault tolerance for the stateful switchover of flows. It contains the following major sections: Overview of Redundancy •...
Each peer appliance can contain one or more fault-tolerant (FT) groups. Each FT group consists of two members: one active context and one standby context. For more information about contexts, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide. An FT group has a unique group ID that you assign.
Page 255
ACEs. You always configure the active and the standby contexts on different ACEs. Figure 7-1 Even Distribution of Contexts B’ # redundant groups A’ C’ D’ # redundant groups A’ B’ Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 256
(context). With a single context, the ACE supports active-backup redundancy and each group member is an Admin context. For details about configuring contexts, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide.
Network Address Translation (NAT) table based on information synchronized • with the connection record • All Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) connections not terminated by the ACE Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Communications over the switchover link include the following data: Redundancy protocol packets • State information replication data • Configuration synchronization information • Heartbeat packets • Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
2G ACE appliance to the 1G ACE appliance. See the Cisco 4700 Series Application Control Engine Appliance Administration Guide for details about the available ACE software licenses. The ACE automatically replicates the active configuration on the standby member using a process called configuration synchronization (config sync).
VLAN interface should be in the same subnet, but different IP addresses. For more information about configuring VLAN interfaces, see the Cisco 4700 Series Application Control Engine Appliance Routing and Bridging Configuration Guide. Redundancy Configuration Quick Start...
Page 261
C1 host1/C1# The rest of the examples in this table use the Admin context, unless otherwise specified. For details on creating contexts, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide. Enter configuration mode.
Page 262
150 host1/Admin(config-ft-track-intf)# exit (Optional) Enable autosynchronization of the running- and/or startup-configuration file from the active to the standby context. host1/Admin(config)# ft auto-sync running-config host1/Admin(config)# ft auto-sync startup-config Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-10 OL-11157-01...
Page 263
(Optional) Save your configuration changes to Flash memory. host1/Admin(config)# exit host1/Admin# copy running-config startup-config (Recommended) Verify your redundancy configuration by using the following commands in Exec mode: host1/Admin# show running-config ft host1/Admin# show running-config interface Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-11 OL-11157-01...
Note to either configure the dedicated VLAN as the only VLAN associated with the Ethernet port or to include it as part of a VLAN trunk link (see the Cisco 4700 Series Application Control Engine Appliance Routing and Bridging Configuration Guide). Note that the ACE automatically includes the FT VLAN in the VLAN trunk link.
After you create the FT VLAN, you must assign an IP address to the VLAN. To assign an IP address to the VLAN, use the ip command in FT interface configuration mode. The syntax of this command is: ip address ip_address netmask Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-13 OL-11157-01...
For example, to configure an IP address on the remote peer, enter: host1/Admin(config-ft-intf)# peer ip address 192.168.12.15 255.255.255.0 To remove an IP address from the remote peer, enter: host1/Admin(config-ft-intf)# no peer ip address 192.168.12.15 255.255.255.0 Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-14 OL-11157-01...
For example, to configure an alias IP address, enter: host1/Admin(config)# interface vlan 100 host1/Admin(config-if)# alias 192.168.12.15 255.255.255.0 To remove an alias IP address, enter: host1/Admin(config-if)# no alias 192.168.12.15 255.255.255.0 Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-15 OL-11157-01...
“Configuring an FT VLAN” section. To associate an FT VLAN with a peer, use the ft-interface command in FT peer configuration mode. The syntax of this command is: ft-interface vlan vlan_id Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-16 OL-11157-01...
For example, to set the heartbeat count to 20, enter: host1/Admin(config-ft-peer)# heartbeat count 20 To reset the heartbeat count to the default of 10, enter: host1/Admin(config-ft-peer)# no heartbeat count Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-17 OL-11157-01...
You cannot delete a query interface if it is associated with a peer. You must Note disassociate the interface from the peer first, and then you can delete the interface. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-18 OL-11157-01...
FT group configuration mode. You need to make this association for both redundant contexts in an FT group. The syntax of this command is: associate-context name Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-19 OL-11157-01...
The group member with the higher priority becomes the active member. To ensure that the member with the higher priority always becomes the active member, use the preempt command, which is enabled by default. For details, see “Configuring Preemption” section. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-20 OL-11157-01...
Enter an integer from 1 to 255. The default is 100. Configure a lower priority on the FT group member that you want to be the standby member. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-21 OL-11157-01...
If you disable preemption by using the no preempt command and a member with Note a higher priority is found after the other member has become active, the electing member becomes the standby member even though it has a higher priority. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-22 OL-11157-01...
Place the FT group back in service by using the inservice command. You can modify the priority, peer priority, and preempt command values Note without taking the FT group out of service. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-23 OL-11157-01...
For example, to cause a failover from the active appliance to the standby appliance of FT group1, enter: host1/Admin# ft switchover 1 This command will cause card to switchover (yes/no)? [no] yes host1/Admin# Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-24 OL-11157-01...
If a license mismatch occurs between the two ACEs in a redundant configuration, Note the auto-sync command is automatically disabled and a syslog message is generated. The syntax of this command is: ft auto-sync {running-config | startup-config} Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-25 OL-11157-01...
Page 278
FT group when the standby context is in the STANDBY_COLD state. Doing so may cause the standby context running-configuration file to overwrite the active context running-configuration file. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-26 OL-11157-01...
Page 279
For more information about importing and exporting certs and keys, see the Cisco 4700 Series Application Control Engine Appliance SSL Configuration Guide. To return the standby context to the STANDBY_HOT state in this case, ensure...
You can configure the unit priority associated with tracked items to be greater than 0. This option allows you to fine tune the switchover scenario so that a switchover occurs when either all or any of the tracked objects fails. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-28 OL-11157-01...
Configuring a Probe on the Standby Member for Host Tracking • Configuring a Priority on the Standby Member for Multiple Probes • Example of a Tracking Configuration for a Gateway • Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-29 OL-11157-01...
FT group member to track. Enter the IP address in dotted-decimal notation (for example, 192.168.12.101). For example, to track the gateway located at 192.168.12.101, enter: host1/Admin(config-ft-track-host)# track-host 192.168.12.101 Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-30 OL-11157-01...
Configuring a Probe on the Active Member for Host Tracking Configure one or more probes on the active FT group member to track the health of the gateway or host. For details about creating probes, see the Cisco 4700 Series Application Control Engine Appliance Server Load-Balancing Configuration Guide.
FT group member to track. Enter the IP address in dotted-decimal notation (for example, 172.16.27.1). For example, to track the gateway located at 172.16.27.1, enter: host1/Admin(config-ft-track-host)# peer track-host 172.16.27.1 Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-32 OL-11157-01...
Configuring a Probe on the Standby Member for Host Tracking Configure one or more probes on the standby member to track the health of the gateway or host. For details about creating probes, see the Cisco 4700 Series Application Control Engine Appliance Server Load-Balancing Configuration Guide.
To configure tracking on the standby member, use the peer commands described in the “Configuring a Probe on the Standby Member for Host Tracking” and the “Configuring a Priority on the Standby Member for Multiple Probes” sections. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-34 OL-11157-01...
Note you cannot configure the FT VLAN for tracking. For example, enter: host1/Admin(config)# ft track interface TRACK_VLAN100 To remove the interface-tracking process, enter: host1/Admin(config)# no ft track interface TRACK_VLAN100 Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-35 OL-11157-01...
Page 288
FT group on the standby member, a switchover occurs. For example, enter: host1/Admin(config-ft-track-intf)# priority 50 To reset the interface priority on the active member to the default value of 0, enter: host1/Admin(config-ft-track-intf)# no priority 50 Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-36 OL-11157-01...
Page 289
For example, enter: host1/Admin(config-ft-track-intf)# peer priority 25 To reset the interface priority on the standby member to the default value of 0, enter: host1/Admin(config-ft-track-intf)# no peer priority 25 Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-37 OL-11157-01...
An FT group that is associated with the Admin context. • A critical tracking and failure detection process for an interface. • The redundancy configuration appears in bold in the example. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-38 OL-11157-01...
Page 291
192.168.1.2 255.255.255.0 no shutdown ft peer 1 ft-interface vlan 200 heartbeat interval 300 heartbeat count 10 ft group 1 peer 1 priority 200 associate-context Admin inservice Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-39 OL-11157-01...
Page 292
Configuring Redundant ACE Appliances Example of a Redundancy Configuration ft track interface TRACK_VLAN100 track-interface vlan 100 peer track-interface vlan 200 priority 50 peer priority 5 ip route 0.0.0.0 0.0.0.0 192.168.83.1 Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-40 OL-11157-01...
To display redundancy statistics per context, use the show ft group command in Exec mode. The syntax of this command is: show ft group {brief | {[group_id]{detail | status | summary}}} Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-41 OL-11157-01...
Page 294
Field Descriptions for the show ft group Command Output Field Description FT Group FT group identifier. Configured Status Configured state of the FT group. Possible states are the in-service or out-of-service states. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-42 OL-11157-01...
Page 295
The ACE enters this mode just before you reboot the appliance and is used primarily when you upgrade the ACE software. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-43 OL-11157-01...
Page 296
The active peer context receives a notification to send a snapshot of the current state information for all applications to the standby context. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-44 OL-11157-01...
Page 297
Startup Cfg Sync Current status of config sync for the startup-config. For Status example: Startup configuration sync is disabled. No. of Contexts Number of contexts associated with the FT group. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-45 OL-11157-01...
ACE Object Types in the IDMAP Table Object Type Object Name REAL ID RSERVER ID SERVERFARM ID POLICY ID STICKY GROUP ID IF ID CONTEXT ID For example, enter: host1/Admin# show ft idmap Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-46 OL-11157-01...
Displaying Peer Information To display peer information, use the show ft peer command in Exec mode. The syntax of this command is: show ft peer peer_id {detail | status | summary} Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-47 OL-11157-01...
Page 300
FSM_PEER_STATE_PEER_IPADDR—Peer IP address is missing. Waiting for the peer IP address to be configured. FSM_PEER_STATE_START_HB—Peer configuration is complete. Starting the heartbeat to see if there is a peer device. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-48 OL-11157-01...
Page 301
Possible errors are version mismatch, license mismatch, or failure to establish a TCP connection to the peer. A syslog message appears with more detailed information. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-49 OL-11157-01...
Page 302
Total number of bytes that the local ACE sent to the peer. Rx Packets Total number of packets that the local ACE received from the peer. Rx Bytes Total number of bytes that the local ACE received from the peer. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-50 OL-11157-01...
The group_id argument displays additional load-balancing statistics (LB statistics) for the specified group. For example, enter: host1/Admin# show ft stats 1 Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-51 OL-11157-01...
Page 304
Number of times that the local ACE sent a Peer Up message Events Sent to the remote ACE. Num of Peer Number of times that the local ACE sent a Peer Down Down Events message to the remote ACE. Sent Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-52 OL-11157-01...
Page 305
ACE received from the remote ACE. Packets Received Number of Number of times that the remote ACE sent packets to the Receive local ACE, but the local ACE failed to receive them. Failures Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-53 OL-11157-01...
Field Descriptions for the show ft track Command Output Field Description FT Group FT group identifier. Status Configured state of the FT group. Possible states are the in-service or out-of-service state. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-54 OL-11157-01...
Page 307
The ACE enters this mode just before you reboot the appliance and is used primarily when you upgrade the ACE software. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-55 OL-11157-01...
Page 308
The active peer context receives a notification to send a snapshot of the current state information for all applications to the standby context. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-56 OL-11157-01...
Page 309
Number of times that the active member of the FT group switched over to the standby member. Probe Count Number of probes associated with a TRACK_HOST process. Probes Down Number of failed probes. Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-57 OL-11157-01...
Config Controller debug log • ha_dp_mgr—Clears the HA (redundancy) dataplane manager debug log • ha_mgr—Clears the HA (redundancy) manager debug log • For example, enter: host1/Admin# clear ft history cfg_cntlr Cisco 4700 Series Application Control Engine Appliance Administration Guide 7-58 OL-11157-01...
Configuring SNMP This chapter describes how to configure Simple Network Management Protocol (SNMP) to query the Cisco 4700 Series Application Control Engine (ACE) appliance for Cisco Management Information Bases (MIBs) and to send event notifications to a network management system (NMS).
Managers and Agents SNMP Manager and Agent Communication • SNMP Traps and Informs • SNMPv3 CLI User Management and AAA Integration • Supported MIBs and Notifications • SNMP Limitations • Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
ACE maintains a database of values for each definition. Browsing a MIB entails issuing an SNMP get request from the NMS. You can use any SNMPv3, MIB-II compliant browser to receive SNMP traps and browse MIBs. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
NMS to frequently poll (gather information through a get operation) the managed devices. For details on MIB objects and SNMP notifications supported by the ACE, see the “Supported MIBs and Notifications” section. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
The list of variable bindings associated with a notification is included in the notification definition in the MIB. For standard MIBs, Cisco has enhanced some notifications with additional variable bindings that further clarify the cause of the notification.
User-based Security Model (USM) for message security and role-based access control. SNMP v3 user management can be centralized at the authentication and accounting (AAA) server level (as described in the Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide). This centralized user management allows the ACE SNMP agent to use the user authentication service of a AAA server.
OID values are listed as follows: Product Name (PID)/entPhysicalVendorType ACE4710-K9 cevChassisACE4710K9 {cevChassis 610} Power Supply cevPowerSupplyAC345 {cevPowerSupply 190} CPU fan cevFanACE4710K9CpuFan {cevFan 91} DIMM fan cevFanACE4710K9DimmFan {cevFan 92} PCI fan cevFanACE4710K9PciFan {cevFan 93} Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 318
ACE appliance chassis. It provides sufficient information to correctly map the containment of these entities within the ACE. The ENTITY-MIB is supported only in the Admin context. The ENTITY-MIB is described in RFC 4133. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 319
SNMPv1 and SNMPv2c. SNMPv3 requires user configuration information such as specifying the role group that the user belongs to, authentication parameters for the user, the authentication password, and message encryption parameters. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 320
SNMP parameters, or a particular transport end point may be associated with several sets of SNMP parameters. The SNMP-TARGET-MIB is described in RFC 3413. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-10 OL-11157-01...
Page 321
The SNMP-USER-BASED-SM-MIB is described in RFC 3414. User configuration is applicable only Note for SNMPv3; SNMPv1 and SNMPv2c use a community string match for user authentication. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-11 OL-11157-01...
Page 322
Configuration settings (settings for all the • AAA servers instrumented in one instance of this MIB). AAA server group configuration. • Application-to-AAA function-to-server • group mapping configuration. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-12 OL-11157-01...
Page 323
A condenser is a software accelerator that applies several optimization techniques to accelerate Web application access. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-13 OL-11157-01...
Page 324
Admin context. In this case, the CISCO-IF-EXTENSION-MIB supports all the interfaces for Admin contexts, while each individual user context supports only VLAN and BVI interfaces. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-14 OL-11157-01...
Page 325
Any change to the filters in the cippfIpFilterTable or the profile in the cippfIpProfileTable affects all the attached interfaces. The IP protocol is described in RFC 791. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-15 OL-11157-01...
Page 326
Telnet protocols and to send other requests (such as SNMP or FTP). This MIB contains tables that allow you to create or delete virtual contexts and assigning interfaces and interface ranges to virtual contexts. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-16 OL-11157-01...
Page 327
• cslbxStatsTimedOutConnections • CISCO-SLB-HEALTH- CISCO-SLB-HEALTH- Acts as an extension to the Cisco server MON-MIB MON-CAPABILITY load-balancing MIB (CISCO-SLB-MIB). It provides tables for the probe configuration. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-17 OL-11157-01...
Page 328
Configures and monitors system log (syslog) CAPABILITY management parameters for the ACE. Use this MIB to set up syslog servers and set logging severity levels. Syslog is described by RFC 3164. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-18 OL-11157-01...
Page 329
SNMPv2. The management protocol, CAPABILITY SNMPv2, provides for the exchange of messages that convey management information between the agents and the management stations. The SNMPv2-MIB is described in RFC 3418. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-19 OL-11157-01...
Page 330
This notification is sent for situations such as ARP failures, probe failures, and so on. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-20 OL-11157-01...
Page 331
This notification is sent for situations such as ARP failures, probe failures, and so on. No separate Note cesRealServerStateChange notifications are sent for each real server that listens on this rserver. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-21 OL-11157-01...
Page 332
• slbVServerStateChangeDescr • slbVServerClassMap • slbVServerPolicyMap • The ciscoSlbVServerStateChange is specified in the CISCO-SLB-MIB. clogMessageGenerated CISCO-SYSLOG-MIB ACE generated one or more syslog messages. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-22 OL-11157-01...
Page 333
Admin context. In this case, the linkUp and link Down notifications support all the interfaces for Admin contexts, while each individual user context supports only VLAN and BVI interfaces. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-23 OL-11157-01...
SNMP MIB Tables with More Than One String Index MIB Name Table Sting Indices CISCO-ENHANCED- cesRserverProbeTable cesRserverName, SLB-MIB.my cesRserverProbeName CISCO-ENHANCED-SLB- cesServerFarmRserverTable slbServerFarmName, MIB.my cesRserverName CISCO-SLB-EXT-MIB.my cslbxServerFarmProbeFarmName cslbxServerFarmProbeFarmName, cslbxServerFarmProbeProbeName CISCO-SLB-HEALTH- cslbxProbeHeaderCfgTable cslbxProbeHeaderProbeName, MON-MIB.my cslbxProbeHeaderFieldName Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-24 OL-11157-01...
C1 host1/C1# The rest of the examples in this table use the Admin context, unless otherwise specified. For details on creating contexts, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide. Enter configuration mode.
Page 336
50 host1/Admin(config-if)# ip address 172.16.10.0 255.255.255.254 host1/Admin(config-if)# service-policy input SNMP-ALLOW_POLICY host1/Admin(config-if)# exit (Optional) Save your configuration changes to Flash memory. host1/Admin(config)# exit host1/Admin# copy running-config startup-config Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-26 OL-11157-01...
Each group in SNMP is similar to a role when accessed from the CLI. The groupname is defined by the role configuration mode command, as described in the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide.
Page 338
Note implementation of SNMP. In this case, all SNMP users are automatically assigned the system-defined default group of Network-Monitor. For details on creating users, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide. auth—(Optional) Sets authentication parameters for the user. Authentication •...
Use the snmp-server community command in configuration mode to create or modify SNMP community names and access privileges. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-29 OL-11157-01...
Page 340
Note implementation of SNMP. In this case, all SNMP users are automatically assigned the system-defined default group of Network-Monitor. For details on creating users, refer to the Cisco Application Control Engine Module Virtualization Configuration Guide. ro—(Optional) Allows read-only access for this community.
(“ ”). For example, to specify SNMP system location information, enter: host1/Admin(config)# snmp-server location “Boxborough MA” To remove the specified SNMP system location information, enter: host1/Admin(config)# no snmp-server location Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-31 OL-11157-01...
The keywords, arguments, and options are as follows: • host_address—The IP address of the host (the targeted recipient). Enter the address in dotted-decimal IP notation (for example, 192.168.11.1). Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-32 OL-11157-01...
Page 343
192.168.1.1 traps version 2c SNMP_Community1 udp-port 500 To remove the specified host, use the no form of the command. For example: host1/Admin(config)# no snmp-server host 192.168.1.1 traps version 2c SNMP_Community1 udp-port 500 Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-33 OL-11157-01...
SNMP license manager notifications. This keyword – appears only in the Admin context. slb—Sends server load-balancing notifications. When you specify the – slb keyword, you can specify a notification_option value. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-34 OL-11157-01...
Page 345
For example, to enable the ACE to send server load-balancing traps to the host at IP address 192.168.1.1 by using the community string public, enter: host1/Admin(config)# snmp-server host 192.168.1.1 host1/Admin(config)# snmp-server community SNMP_Community1 group Network-Monitor host1/Admin(config)# snmp-server enable traps slb real Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-35 OL-11157-01...
Enabling the IETF Standard for SNMP linkUp and linkDown Traps By default, the ACE sends the Cisco implementation of linkUp and linkDown traps to the NMS. The ACE sends the Cisco Systems IF-MIB variable bindings, which consists of ifIndex, ifAdminStatus, ifOperStatus, ifName, ifType, clogOriginID, and clogOriginIDType.
SNMP v1 trap PDU, enter: host1/Admin(config)# snmp-server trap-source vlan 50 To remove the specified VLAN interface that is trap source address contained in the SNMP v1 trap PDU, enter: host1/Admin(config)# no snmp-server trap-source Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-37 OL-11157-01...
Chapter 4, Configuring Class Maps and Policy Maps. SNMP remote access sessions are established to the ACE per context. For details on creating contexts and users, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide. This section contains the following topics: •...
Page 349
The default setting is to meet all of the match criteria (match-all) in a class map. map_name—Name assigned to the class map. Enter an unquoted text string • with no spaces and a maximum of 64 alphanumeric characters. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-39 OL-11157-01...
Access the class map management configuration mode to specify the description command. The syntax of this command is as follows: description text Use the text argument to enter an unquoted text string with a maximum of 240 alphanumeric characters. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-40 OL-11157-01...
IP address from the interface on which you apply the policy map. • ip_address—Source IP address of the client. Enter the IP address in dotted-decimal notation (for example, 192.168.11.1). Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-41 OL-11157-01...
The map_name argument specifies the name assigned to the Layer 3 and Layer 4 network management policy map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-42 OL-11157-01...
The ACE does not save the sequence reordering as part of the configuration. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-43 OL-11157-01...
Page 354
ACE. Use the deny command in policy map class configuration mode to refuse the • SNMP management protocols listed in the class map to be received by the ACE. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-44 OL-11157-01...
For example, to specify an interface VLAN and apply the SNMP management policy map to a VLAN, enter: host1/Admin(config)# interface vlan 50 host1/Admin(config-if)# ip address 172.20.1.100 255.255.0.0 host1/Admin(config-if)# service-policy input SNMP_MGMT_ALLOW_POLICY Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-45 OL-11157-01...
Page 356
(applied to an interface) as an unquoted text string with a maximum of 64 alphanumeric characters. detail—(Optional) Displays a more detailed listing of policy map statistics • and status information. Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-46 OL-11157-01...
The SNMP configuration appears in bold in the example. access-list ACL1 line 10 extended permit ip any any rserver host SERVER1 ip address 192.168.252.245 inservice rserver host SERVER2 Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-47 OL-11157-01...
Page 358
L7_LB-SF_MAX-CONN_POLICY class L7_INDEX-HTML_CLASS serverfarm SFARM1 class L7_URL*_CLASS serverfarm SFARM2 policy-map multi-match L4_VIP_POLICY class L4_MAX-CONN-VIP_105_CLASS loadbalance vip inservice loadbalance policy L7_LB-SF_MAX-CONN_POLICY loadbalance vip icmp-reply appl-parameter http advanced-options PERSIST-REBALANCE Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-48 OL-11157-01...
Page 359
Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-49 OL-11157-01...
SNMP packets received by the ACE input Bad SNMP Number of packets with an invalid SNMP version versions Unknown Number of SNMP packets with an unknown community community name name Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-50 OL-11157-01...
Page 361
SNMP user Auth Authentication of a packet without encryption Priv Authentication of a packet with encryption Group User role group to which the user belongs Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-51 OL-11157-01...
Page 362
Row status Status of whether the Row status for the SNMP group is active or inactive Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-52 OL-11157-01...
Page 363
String that identifies the name of the SNMP user Auth Authentication of a packet without encryption Priv Authentication of a packet with encryption Group User role group to which the user belongs Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-53 OL-11157-01...
Page 364
Chapter 8 Configuring SNMP Displaying SNMP Statistics Cisco 4700 Series Application Control Engine Appliance Administration Guide 8-54 OL-11157-01...
Configuring the XML Interface This chapter describes how to use Extensible Markup Language (XML) to remotely configure a Cisco 4700 Series Application Control Engine (ACE) appliance from a network management station (NMS). Any command that you can configure from the ACE CLI can be configured remotely from a NMS by exchanging XML documents over HTTP or secure HTTP (HTTPS).
ACE software, the www user will be disabled and you will not be able to use XML to remotely configure an ACE until you change the default www user password. See Chapter 2, Configuring Virtualization, in the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide for details on changing a user account password.
Page 367
Admin user role. A network management station (NMS), such as the CiscoWorks Hosting Solution Engine (HSE), can connect to the ACE and push new configurations to it over HTTP or HTTPS. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Description Created Accepted Non-Authoritative Information Partial Content Moved Permanently Found Bad Request Unauthorized (credentials required, but not provided) Forbidden (illegal credentials submitted; syslog also generated) Not Found (“/xml-config” not specified) Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
“Enabling the Display of Raw XML Request show Command Output in XML Format” section for details. For details on the show command output supported in XML format, consult the ace_appliance.dtd file. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 372
= host. address-type is valid only when type=host. name length is 1 to 32. webhost-redirection is valid only if type=redirect. --> Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
For example, to specify an interface VLAN and apply multiple service policies to the VLAN, enter: host1/Admin(config)# interface vlan50 host1/Admin(config-if)# ip address 192.168.10.1 255.255.0.0 host1/Admin(config-if)# service-policy input MGMT_XML-HTTPS_POLICY host1/Admin(config-if)# exit host1/Admin(config)# exit Cisco 4700 Series Application Control Engine Appliance Administration Guide 9-11 OL-11157-01...
Page 376
(Optional) Enable the display of raw XML request show command output in XML format. True XML responses always automatically appear in XML format. Note host1/Admin# xml-show on (Optional) Save your configuration changes to Flash memory. host1/Admin# copy running-config startup-config Cisco 4700 Series Application Control Engine Appliance Administration Guide 9-12 OL-11157-01...
HTTP or HTTPS sessions are established to the ACE per context. For details on creating contexts and users, see the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide. This section contains the following topics: •...
64 alphanumeric characters. The class name is used for both the class map and to configure a policy for the class in the policy map. Cisco 4700 Series Application Control Engine Appliance Administration Guide 9-14 OL-11157-01...
For example, to specify a description that the class map is to allow HTTPS access, enter: host1/Admin(config)# class-map type management match-all XML-HTTPS-ALLOW_CLASS host1/Admin(config-cmap-mgmt)# description Allow HTTPS as the XML transfer protocol Cisco 4700 Series Application Control Engine Appliance Administration Guide 9-15 OL-11157-01...
The https keyword specifies secure (SSL) Hypertext Transfer Protocol Note (HTTP) for connectivity with the Device Manager GUI on the ACE any—Specifies any client source address for the management traffic • classification. Cisco 4700 Series Application Control Engine Appliance Administration Guide 9-16 OL-11157-01...
ACE use the policy-map type management command in configuration mode. The ACE executes the action for the first matching classification. The ACE does not execute any additional actions. Cisco 4700 Series Application Control Engine Appliance Administration Guide 9-17 OL-11157-01...
Layer 3 and Layer 4 traffic class, configured with the class-map command, to associate traffic to the traffic policy. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Cisco 4700 Series Application Control Engine Appliance Administration Guide 9-18 OL-11157-01...
Page 383
To specify the class-default class map for the Layer 3 and Layer 4 traffic policy, enter: host1/Admin(config-pmap-mgmt)# class class-default host1/Admin(config-pmap-mgmt-c)# To remove a class map from a Layer 3 and Layer 4 policy map, enter: host1/Admin(config-pmap-mgmt)# no class XML-HTTPS-ALLOW_CLASS Cisco 4700 Series Application Control Engine Appliance Administration Guide 9-19 OL-11157-01...
VLAN interface. Specifying a policy map in the configuration mode applies the policy to all of the VLAN interfaces associated with a context. Cisco 4700 Series Application Control Engine Appliance Administration Guide 9-20 OL-11157-01...
Page 385
To detach the XML HTTPS management policy from an interface, enter: host1/Admin(config-if)# no service-policy input MGMT_XML-HTTPS_POLICY To globally detach the XML HTTPS management policy from all VLANs associated with a context, enter: host1/Admin(config)# no service-policy input MGMT_XML-HTTPS_POLICY Cisco 4700 Series Application Control Engine Appliance Administration Guide 9-21 OL-11157-01...
Page 386
Displays a more detailed listing of policy map statistics • and status information. The ACE updates the counters that the show service-policy command displays Note after the applicable connections are closed. Cisco 4700 Series Application Control Engine Appliance Administration Guide 9-22 OL-11157-01...
Page 387
(applied to an interface) as an unquoted text string with a maximum of 64 alphanumeric characters. For example, to clear the statistics for the policy map MGMT_XML-HTTPS_POLICY that is currently in service, enter: host1/Admin# clear service-policy MGMT_XML-HTTPS_POLICY Cisco 4700 Series Application Control Engine Appliance Administration Guide 9-23 OL-11157-01...
1 and 4095 for vlan and 8191 for bvi. --> <!ENTITY % show-interface "interface-type (vlan | bvi) #IMPLIED interface-number CDATA #IMPLIED” > The XML representation of the show interface command appears as follows: <show_interface interface-type='vlan' interface-number='10'/> Cisco 4700 Series Application Control Engine Appliance Administration Guide 9-24 OL-11157-01...
Page 390
For example, to enable the display of raw XML request show command output in XML format from the CLI, enter: host1/Admin# xml-show on To return to displaying CLI show command output in regular CLI output, enter: host1/Admin# xml-show off Cisco 4700 Series Application Control Engine Appliance Administration Guide 9-26 OL-11157-01...
You can choose to either open the ace_appliance.dtd file or save it to your computer. To access the ace_appliance.dtd file from the Cisco ACE appliance Management Step 4 page, perform the following procedure: Specify the HTTP or secure HTTP (HTTPS) address of your ACE in the address...
Page 392
Enter your username and password in the fields provided, and then click OK. The Cisco ACE appliance Management page appears. Click the link under the Resources column of the Cisco ACE appliance Management page to access the ace_appliance.dtd file. You can choose to either open the ace_appliance.dtd file or save it to your computer.
C H A P T E R Upgrading Your ACE Software This appendix provides information to upgrade your Cisco 4700 Series Application Control Engine (ACE) appliance. It contains the following major sections: Overview of Upgrading ACE Software • Software Upgrade Quick Start •...
ACE software, you will only be able to log in to the ACE through the console port. Chapter 1, Setting Up the ACE for details on changing the admin account password. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Extensible Markup Language (XML) to remotely configure an ACE until you change the default www user password. See Chapter 2, Configuring Virtualization, in the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide for details on changing a user account password. In this case, the user would be www.
ACE. For example, to copy the image with the name c4710ace-t1k9-mz.A1_7.bin using FTP, enter: host1/Admin# copy ftp://server1/images/c4710ace-t1k9-mz.A1_7.bin image: Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 397
Verify the boot variable was synchronized to ACE-2 by entering the following command on ACE-2: host1/Admin# show bootvar BOOT variable = "disk0:/c4710ace-t1k9-mz.A1_7.bin; disk0:/c4710ace-mz.3.0.0_AB0_0.488.bin" Configuration register is 0x1 Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
Page 398
Save configurations for all the contexts. Save? [yes/no]: [yes] Enter the show ft group detail command to verify that ACE-1 is in the ACTIVE state and ACE-2 is in the STANDBY_HOT state. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
ACE, enter: host1/Admin# copy ftp://server1/images/c4710ace-t1k9-mz.A1_7.bin image: To set the boot variable and configure the ACE to autoboot this image, see the “Configuring the ACE to Autoboot the Software Image” section. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
For example, to set the boot variable with the c4710ace-t1k9-mz.A1_7.bin image, enter: host1/Admin(config)# boot system image:c4710ace-t1k9-mz.A1_7.bin Use the no boot system image: command to unset the previously configured boot variable. Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
For details about the different settings of the config-register command, refer to Chapter 1, Setting Up the ACE. For example, to set the register to 0x1 to boot the system image, enter: host1/Admin(config)# config-register 0x1 Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01...
To reload the ACE, use the reload command in the Admin context from the Exec mode. The syntax for this command is: reload For example, enter: host1/Admin# reload This command will reboot the system Save configurations for all the contexts. Save? [yes/no]: [yes] Cisco 4700 Series Application Control Engine Appliance Administration Guide A-10 OL-11157-01...
For example, enter: host1/Admin# show version TAC support: http://www.cisco.com/tac Copyright (c) 1985-2007 by Cisco Systems, Inc. All rights reserved. The copyrights to certain works contained herein are owned by other third parties and are used and distributed under license. Some parts of this software are covered under the GNU Public License.
Page 404
Chapter A Upgrading Your ACE Software Displaying Software Image Information Cisco 4700 Series Application Control Engine Appliance Administration Guide A-12 OL-11157-01...
Page 406
Layer 3 and 4, creating for management traffic 4-35, 9-14 account password, changing 1-10 Layer 3 and 4, creating for network saving session traffic 4-25 user management of SNMP Cisco 4700 Series Application Control Engine Appliance Administration Guide IN-2 OL-11157-01...
Page 407
5-10 core dumps 5-27 loading from remote server 5-11 clearing core directory 5-29 merging startup with running copying 5-28 saving deleting 5-29 saving in Flash memory Cisco 4700 Series Application Control Engine Appliance Administration Guide IN-3 OL-11157-01...
Page 408
5-23 overview moving files in 5-23 overview 5-12 uncompressing files in 5-21 untarring files in 5-22 environment display attributes, terminal 1-30 boot environment variable, setting 1-37 displaying Cisco 4700 Series Application Control Engine Appliance Administration Guide IN-4 OL-11157-01...
Page 409
FT peer copying packet capture buffer 5-16 associating with FT group 7-20 creating new directory in disk0 5-22 associating with FT VLAN 7-16 deleting directory in disk0 5-23 configuring 7-16 Cisco 4700 Series Application Control Engine Appliance Administration Guide IN-5 OL-11157-01...
Page 410
See failure detection HTTP deep packet inspection class map generating for license 4-41 load balancing class map pair for SSH host 4-39 2-17 return codes between server and client HyperTerminal Cisco 4700 Series Application Control Engine Appliance Administration Guide IN-6 OL-11157-01...
Page 411
4-16 generating key SNMP, creating 8-42 installing specifying traffic class 2-10, 4-46 list of available using parameter maps 4-49 managing Layer 7 class map ordering upgrade license Cisco 4700 Series Application Control Engine Appliance Administration Guide IN-7 OL-11157-01...
Page 412
4-49 password changing administrative naming the ACE 1-12 changing CLI account 1-10 notifications peer error messages 8-35 See FT peer IETF standard, enabling 8-36 ping, enabling 2-19 options 8-35 Cisco 4700 Series Application Control Engine Appliance Administration Guide IN-8 OL-11157-01...
Page 413
Layer 3 and 4 quick start for network query interface for FT peer 7-18 traffic 4-16 quick start Layer 3 and 4 SLB 4-48 Layer 3 and 4 class map for management traffic 4-12 Cisco 4700 Series Application Control Engine Appliance Administration Guide IN-9 OL-11157-01...
Page 414
7-16 remote server FT peer information, displaying 7-47 copying files from 5-19 FT statistics, displaying 7-51 copying files to 5-17 FT tracking information, displaying 7-54 copying image to 5-20 Cisco 4700 Series Application Control Engine Appliance Administration Guide IN-10 OL-11157-01...
Page 415
Layer 3 and 4 policy map, applying to VLAN class map, creating 8-39 interface 4-58 CLI user management overview communities 8-29 remote access policy map, applying 2-13 configuration examples 8-47 Cisco 4700 Series Application Control Engine Appliance Administration Guide IN-11 OL-11157-01...
Page 416
SNMP 8-50 stopping ACE 1-42 configuring synchronizing 2-16 directly accessing a user context configuration 2-21 host key pairs redundant configurations 2-17 7-25 management access system information, displaying 2-16 6-14 Cisco 4700 Series Application Control Engine Appliance Administration Guide IN-12 OL-11157-01...
Page 417
4-58 See failure detection volatile file system 5-12 traps, SNMP 8-5, 8-20 www user 1-7, 9-1 uncompressing files in disk0 5-21 untarring files in disk0 5-22 upgrade license upgrading Cisco 4700 Series Application Control Engine Appliance Administration Guide IN-13 OL-11157-01...
Page 418
HTTP and HTTPS support HTTP return codes management traffic, configuring 2-8, 9-13 overview policy map, creating 9-17 quick start 9-11 sample configuration service policy 9-20 show command output 9-24 Cisco 4700 Series Application Control Engine Appliance Administration Guide IN-14 OL-11157-01...
Need help?
Do you have a question about the ACE-4710-K9 and is the answer not in the manual?
Questions and answers