Configuring an Optimization HTTP Action List
|
|
- Jemimah Melton
- 5 years ago
- Views:
Transcription
1 CHAPTER 2 Configuring an Optimization HTTP Action List This chapter describes how to configure an optimization HTTP action list for the Cisco 4700 Series Application Control Engine (ACE) appliance. An action list groups a series of individual application acceleration and optimization functions that apply to a specific type of operation. This section contains the following major sections: Optimization HTTP Action List Configuration Quick Start Creating an Optimization HTTP Action List Enabling AppScope Performance Monitoring Enabling Cache Optimization Enabling Delta Optimization Enabling Dynamic Just-in-Time Object Acceleration Enabling FlashForward Where to Go Next 2-1
2 Optimization HTTP Action List Configuration Quick Start Optimization HTTP Action List Configuration Quick Start Table 2-1 provides a quick overview of the steps required to configure an optimization HTTP action list. Each step includes the CLI command or a reference to the procedure required to complete the task. For a complete description of each feature and all the options associated with the CLI commands, see the sections following Table 2-1. Table 2-1 Optimization HTTP Action List Configuration Quick Start Task and Command Example 1. If you are operating in multiple contexts, observe the CLI prompt to verify that you are operating in the desired context. If necessary, change to the correct context. host1/admin# changeto C1 host1/c1# The rest of the examples in this table use the Admin context unless otherwise specified. For details on creating contexts, see the Cisco 4700 Series Application Control Engine Appliance Administration Guide. 2. Enter global configuration mode. host1/admin# config host1/admin(config)# 3. Create an optimization HTTP action list. host1/admin(config-actlist-optm)# 4. Configure application acceleration and optimization functions in the action list as required. For example, enter: host1/admin(config-actlist-optm)# cache dynamic host1/admin(config-actlist-optm)# cache forward host1/admin(config-actlist-optm)# delta host1/admin(config-actlist-optm)# exit host1/admin(config)# 2-2
3 Optimization HTTP Action List Configuration Quick Start Table 2-1 Optimization HTTP Action List Configuration Quick Start Task and Command Example 5. Create a Layer 7 HTTP optimization policy map to associate an existing action list and parameter map and to configure the specified application acceleration and optimization actions. Refer to Chapter 4, Configuring a Traffic Policy for HTTP Optimization for details. host/admin(config)# policy-map type optimization http first-match L7OPTIMIZATION_POLICY host/admin(config-pmap-optmz)# class L7SLBCLASS host1/admin(config-pmap-optmz-c)# host1/admin(config-pmap-optmz-c)# action ACT_LIST1 parameter OPTIMIZE_PARAM_MAP host1/admin(config-pmap-optmz-c)# exit 6. (Optional) Save your configuration changes to Flash memory. host1/admin# copy running-config startup-config 2-3
4 Creating an Optimization HTTP Action List Creating an Optimization HTTP Action List To create an optimization action map for performing application acceleration, use the action-list type optimization http command in global configuration mode. The syntax of this command is as follows: action-list type optimization http list_name For the list_name argument, enter a unique name as an unquoted text string with a maximum of 64 alphanumeric characters. For example, to create an optimization HTTP action list, enter: host1/admin(config-actlist-optm)# To remove the action list from the configuration, enter: host1/admin(config)# no action-list type optimization http ACT_LIST1 Use one or more of the commands in the sections in this chapter to enable the different application acceleration and optimization functions in the ACE. After you complete the optimization HTTP action list, you create an optimization HTTP parameter map to define the details about how to accomplish the specific actions. For details, see Chapter 3, Configuring an Optimization HTTP Parameter Map. Enabling AppScope Performance Monitoring The optional Cisco AVS 3180A Management Station runs the Management Console that includes database, management, and reporting features, including AppScope reporting, for the ACE optimization functionality. For details on using the optional Cisco AVS 3180A Management Station and on AppScope, see Appendix A, Using the Optional Cisco AVS 3180A Management Station for Reporting. To enable AppScope performance monitoring for use with the ACE, use the appscope command in action list optimization mode. The syntax for the command is as follows: appscope 2-4
5 Enabling Cache Optimization For example, enter: host1/admin(config-actlist-optm)# appscope To disable the AppScope function from the action list, enter: host1/admin(config-actlist-optm)# no appscope You control the AppScope parameters that measure application performance and that sort requests for AppScope reporting purposes. Configure the following commands in parameter map optimization mode: appscope optimize-rate-percent request-grouping-string Refer to Chapter 3, Configuring an Optimization HTTP Parameter Map for details. Enabling Cache Optimization To enable cache optimization for the corresponding URLs, use the cache command in action list optimization mode. For details on the cache function, see Chapter 1, Application Acceleration and Optimization Overview. The syntax for the command is as follows: cache {dynamic forward} dynamic Enables adaptive dynamic caching for the corresponding URLs, even if the expiration settings in the response indicate that the content is dynamic. The expiration of cache objects is controlled by the cache expiration settings based on the time or the server load (performance assurance). 2-5
6 Enabling Cache Optimization forward Enables the cache forward feature for the corresponding URLs. The forward keyword allows the ACE to serve the object from its cache (static or dynamic) even when the object has expired if the maximum cache TTL time period has not yet expired (set by using the cache ttl command in parameter map optimization mode). At the same time, the ACE sends an asynchronous request to the origin server to refresh its cache of the object. Note In order to identify whether to use static or dynamic caching, the cache forward command requires that you specify either the cache dynamic command (dynamic caching) or the flashforward-object command (static caching) to be specified before you specify this command. For example, to enable the cache forward feature for the corresponding URLs, enter: host1/admin(config-actlist-optm)# cache dynamic host1/admin(config-actlist-optm)# cache forward To disable the cache function from the action list, enter: host1/admin(config-actlist-optm)# no cache forward 2-6
7 Enabling Delta Optimization You define the ACE cache object key, cache freshness, and cache request/response policy settings by configuring the following commands in parameter map optimization mode: cache key-modifier cache parameter cache ttl cache-policy request cache-policy response Refer to Chapter 3, Configuring an Optimization HTTP Parameter Map for details. Enabling Delta Optimization To enable delta optimization to condense corresponding URLs, use the delta command in action list optimization mode. For details on delta optimization, see Chapter 1, Application Acceleration and Optimization Overview. The syntax for the command is as follows: delta For example, enter: host1/admin(config-actlist-optm)# delta To disable delta optimization from the action list, enter: host1/admin(config-actlist-optm)# no delta 2-7
8 Enabling Dynamic Just-in-Time Object Acceleration You define the delta optimization mode and parameters by configuring the following commands in parameter map optimization mode: delta all-user delta cacheable-content delta exclude delta first-visit delta page-size delta per-user Refer to Chapter 3, Configuring an Optimization HTTP Parameter Map for details. Enabling Dynamic Just-in-Time Object Acceleration Just-in-time object acceleration enables acceleration of noncacheable embedded objects, which results in improved application response time. This feature eliminates the need for users to download these objects on each request. To enable just-in-time object acceleration for the corresponding URLs, use the dynamic etag command in action list optimization mode. For details on just-in-time object acceleration, see Chapter 1, Application Acceleration and Optimization Overview. The syntax for the command is as follows: dynamic etag For example, enter: host1/admin(config-actlist-optm)# dynamic etag To disable just-in-time object acceleration from the action list, enter: host1/admin(config-actlist-optm)# no dynamic etag 2-8
9 Enabling FlashForward Enabling FlashForward FlashForward object acceleration extends the ACE s bandwidth usage reduction and download acceleration benefits to objects that are embedded within HTML pages. This function combines local object storage with dynamic renaming of embedded objects to enforce object freshness within the parent HTML page. For details on FlashForward, see Chapter 1, Application Acceleration and Optimization Overview. To enable FlashForward for the corresponding URLs and to transform embedded objects, use the flashforward command in action list optimization mode. The syntax for the command is as follows: flashforward For example, enter: host1/admin(config-actlist-optm)# flashforward To disable FlashForward from the action list, enter: host1/admin(config-actlist-optm)# no flashforward To enable FlashForward static caching for the corresponding URLs, use the flashforward-object command in action list optimization mode. The syntax for this command is as follows: flashforward-object For example, enter: host1/admin(config-actlist-optm)# flashforward-object To disable FlashForward static caching from the action list, enter: host1/admin(config-actlist-optm)# no flashforward-object You define the FlashForward refresh policy and threshold control for rebasing by using the following commands in parameter map optimization mode: flashforward refresh-policy rebase flashforward-percent Refer to Chapter 3, Configuring an Optimization HTTP Parameter Map for details. 2-9
10 Where to Go Next Where to Go Next Proceed to Chapter 3, Configuring an Optimization HTTP Parameter Map, to configure an optimization HTTP parameter map on the ACE. This parameter map can be used to adjust or control the application acceleration and optimization functions specified in an action list. 2-10
Action List Modify Configuration Mode Commands
Action List Modify Configuration Mode Commands Chapter 2 CLI Commands Action List Modify Configuration Mode Commands Action list modify configuration mode commands allow you to configure ACE action lists.
More informationConfiguring Traffic Policies for Server Load Balancing
CHAPTER3 Configuring Traffic Policies for Server Load Balancing This chapter describes how to configure the ACE appliance to use classification (class) maps and policy maps to filter and match interesting
More informationConfiguring Global Optimization Settings
CHAPTER 5 Configuring Global Optimization Settings This chapter describes how to configure the global optimization settings on the Cisco 4700 Series Application Control Engine (ACE) appliance. This chapter
More informationConfiguring Traffic Policies for Server Load Balancing
CHAPTER3 Configuring Traffic Policies for Server Load Balancing This chapter describes how to configure the ACE module to use classification (class) maps and policy maps to filter and match interesting
More informationConfiguring the DHCP Relay
CHAPTER 6 This chapter describes how Dynamic Host Configuration Protocol (DHCP) servers provide configuration parameters to DHCP clients. DHCP supplies network settings, including the host IP address,
More informationManaging ACE Software Licenses
CHAPTER 3 This chapter describes how to manage the software licenses for your Cisco 4700 Series Application Control Engine (ACE) appliance. It contains the following major sections: Available ACE Licenses
More informationEnabling Remote Access to the ACE
CHAPTER 3 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. All features described in this chapter are supported with IPv6 unless otherwise
More informationConfiguring Traffic Policies for Server Load Balancing
CHAPTER 3 Configuring Traffic Policies for Server Load Balancing This chapter describes how to configure the Cisco 4700 Series Application Control Engine (ACE) appliance to use classification (class) maps
More informationConfiguring SSL Termination
CHAPTER 3 This chapter describes the steps required to configure a context on the Cisco 4700 Series Application Control Engine (ACE) appliance as a virtual SSL server for SSL termination. It contains the
More informationConfiguring Stickiness
CHAPTER 5 This chapter describes how to configure stickiness (sometimes referred to as session persistence) on an Cisco 4700 Series Application Control Engine (ACE) appliance. It contains the following
More informationConfiguring Network Address Translation
CHAPTER5 Configuring Network Address Translation This chapter contains the following major sections which describe how to configure NAT on the Cisco Application Control Engine (ACE) module: Network Address
More informationConfiguring Application Protocol Inspection
CHAPTER 3 Configuring Application Protocol Inspection This chapter describes how to configure application protocol inspection for the Cisco 4700 Series Application Control Engine (ACE) appliance. Application
More informationRole Configuration Mode Commands
Role configuration mode commands allow you to define various rules for users who are assigned a role and optionally, to describe a role definition. Roles determine the privileges that a user has, the commands
More informationConfiguring System Message Logging
CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records
More informationConfiguring Real Servers and Server Farms
CHAPTER2 Configuring Real Servers and Server Farms Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. All features described in this chapter
More informationConfiguring Real Servers and Server Farms
CHAPTER2 Configuring Real Servers and Server Farms This chapter describes the functions of real servers and server farms in load balancing and how to configure them on the ACE module. It contains the following
More informationManaging ACE Software Licenses
CHAPTER 4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. This chapter describes how to manage the software licenses for your ACE. It contains
More informationCisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide
Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide Software Versions A4(1.0) and A4(2.0) February 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive
More informationBridging Traffic CHAPTER3
CHAPTER3 This chapter describes how clients and servers communicate through the ACE using either Layer 2 (L2) or Layer 3 (L3) in a VLAN configuration. When the client-side and server-side VLANs are on
More informationRelease Note for the Cisco 4700 Series Application Control Engine Appliance
Release Note for the Cisco 4700 Series Application Control Engine Appliance June 9, 2008 Note The most current Cisco documentation for released products is also available on Cisco.com. Contents This release
More informationConfiguring the XML Interface
CHAPTER 9 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. This chapter describes how to use Extensible Markup Language (XML) to remotely
More informationConfiguring End-to-End SSL
CHAPTER5 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. This
More informationManaging the ACE Software
CHAPTER 4 This chapter describes how to manage the software running on the Cisco 4700 Series Application Control Engine (ACE) appliance and contains the following sections: Saving Configuration Files Loading
More informationConfiguring the XML Interface
CHAPTER 8 This chapter describes how to use Extensible Markup Language (XML) to remotely configure a Cisco 4700 Series Application Control Engine (ACE) appliance from a network management station (NMS).
More informationOverview. ACE Appliance Device Manager Overview CHAPTER
1 CHAPTER This section contains the following: ACE Appliance Device Manager, page 1-1 Logging Into ACE Appliance Device Manager, page 1-3 Changing Your Account Password, page 1-4 ACE Appliance Device Manager
More informationConfiguring Role-Based Access Control
5 CHAPTER This chapter describes how to configure role-based access control (RBAC) on the Cisco 4700 Series Application Control Engine (ACE) appliance. It describes how to create a domain and a user, and
More informationConfiguring TCP/IP Normalization and IP Reassembly Parameters
CHAPTER4 Configuring TCP/IP Normalization and IP Reassembly Parameters This chapter describes how to configure TCP/IP normalization and termination parameters to protect your Cisco Application Control
More informationConfiguring Route Health Injection
CHAPTER 11 This chapter describes how to configure route health injection (RHI) for the Cisco Application Control Engine (ACE) module. This chapter contains the following sections: Information About RHI
More informationeigrp log-neighbor-warnings through functions Commands
CHAPTER 12 eigrp log-neighbor-warnings through functions Commands 12-1 eigrp log-neighbor-changes Chapter 12 eigrp log-neighbor-changes To enable the logging of EIGRP neighbor adjacency changes, use the
More informationConfiguring SSL Security
CHAPTER9 This chapter describes how to configure SSL on the Cisco 4700 Series Application Control Engine (ACE) appliance. This chapter contains the following sections: Overview Configuring SSL Termination
More informationConfiguring ARP CHAPTER 5
CHAPTER 5 This chapter describes how the Address Resolution Protocol (ARP) on the Cisco 4700 Series Application Control Engine (ACE) appliance can manage and learn the mapping of IP to Media Access Control
More informationConfiguring Bridged Mode
CHAPTER 13 This chapter describes how to configure the Cisco Application Control Engine (ACE) module to bridge traffic on a single IP subnet. This chapter includes the following topics: Information About
More informationSeminar on. By Sai Rahul Reddy P. 2/2/2005 Web Caching 1
Seminar on By Sai Rahul Reddy P 2/2/2005 Web Caching 1 Topics covered 1. Why Caching 2. Advantages of Caching 3. Disadvantages of Caching 4. Cache-Control HTTP Headers 5. Proxy Caching 6. Caching architectures
More informationUsing Cisco IOS Software
Using Cisco IOS Software This chapter provides helpful tips for understanding and configuring Cisco IOS software using the command-line interface (CLI) It contains the following sections: Understanding
More informationUsing the Command-Line Interface
CHAPTER 1 The Cisco IE 3000 switch is supported by Cisco IOS software. This chapter describes how to use the switch command-line interface (CLI) to configure software features. For a complete description
More informationConfiguring RMON. Understanding RMON CHAPTER
22 CHAPTER This chapter describes how to configure Remote Network Monitoring (RMON) on your switch. RMON is a standard monitoring specification that defines a set of statistics and functions that can be
More informationImplementing SBC Multi-VRF
10 CHAPTER The Session Border Controller (SBC) provides support for multi-vrf (VPN routing and forwarding) on customer edge (CE) devices. This feature provides the capability of suppressing provider edge
More informationConfiguring Health Monitoring
CHAPTER1 This chapter describes how to configure health monitoring on the ACE to track the state of a server by sending out probes. Also referred to as out-of-band health monitoring, the ACE verifies the
More informationACS Trigger Condition Configuration Mode Commands
ACS Trigger Condition Configuration Mode Commands The ACS Trigger Condition Configuration Mode is used to configure Active Charging Service (ACS) trigger conditions. Command Modes Exec > ACS Configuration
More informationConfiguring ARP CHAPTER4
CHAPTER4 This chapter describes how the Address Resolution Protocol (ARP) on the ACE can manage and learn the mapping of IP to Media Access Control (MAC) information to forward and transmit packets. The
More informationAAA Authorization and Authentication Cache
AAA Authorization and Authentication Cache First Published: March 16, 2006 Last Updated: March 1, 2006 The AAA Authorization and Authentication Cache feature allows you to cache authorization and authentication
More informationCommand-Line Interface (CLI) Basics
4 CHAPTER This chapter is intended as a quick reference, not as a step-by-step explanation of the Cisco IOS. The chapter describes basic Cisco IOS software command-line interfaces that you may need to
More informationGetting Started. Getting Started with Your Platform Model. Factory Default Configurations CHAPTER
CHAPTER 2 This chapter describes how to access the command-line interface, configure the firewall mode, and work with the configuration. This chapter includes the following sections: with Your Platform
More informationPolicy Map Class Configuration Mode Commands
Policy Map Class Configuration Mode Commands To configure a service policy in an AppNav or optimization policy map, use the class policy map configuration command. To unconfigure settings, use the no form
More informationUpgrading Your CSS Software
APPENDIX A New software versions are periodically released for the CSS. This appendix provides information on how to upgrade your CSS with a new software release. This appendix contains the following major
More informationCCNA 1 Chapter 2 v5.0 Exam Answers %
CCNA 1 Chapter 2 v5.0 Exam Answers 2015 100% 1. Which two features are characteristics of flash memory? (Choose two.) Flash provides nonvolatile storage. Flash receives a copy of the IOS from RAM when
More informationBuilding and Modifying DNS Rules
CHAPTER 7 This chapter describes how to build and modify Domain Name System (DNS) rules on your GSS network. After you configure your source address lists, domain lists, answers, and answer groups, you
More informationDeployment Guide AX Series with Oracle E-Business Suite 12
Deployment Guide AX Series with Oracle E-Business Suite 12 DG_OEBS_032013.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Prerequisites... 4 3 Oracle E-Business Topology... 5 4 Accessing the AX Series
More informationUsing the Command-Line Interface
CHAPTER 1 The Catalyst 3750 switch is supported by Cisco IOS software. This chapter describes how to use the switch command-line interface (CLI) to configure software features. For a complete description
More informationConfiguring Routes on the ACE
CHAPTER2 This chapter describes how the ACE is considered a router hop in the network when it is in routed mode. In the Admin or user contexts, the ACE supports static routes only. The ACE supports up
More informationConfiguring Network Admission Control
45 CHAPTER This chapter describes how to configure Network Admission Control (NAC) on Catalyst 6500 series switches. With a PFC3, Release 12.2(18)SXF2 and later releases support NAC. Note For complete
More informationPT Activity: Configuring a Zone-Based Policy Firewall (ZPF)
PT Activity: Configuring a Zone-Based Policy Firewall (ZPF) Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 R2 R3 Fa0/1 192.168.1.1 255.255.255.0
More informationUsing the Command-Line Interface
CHAPTER 1 The Cisco Metro Ethernet (ME) 3400E Series Ethernet Access switch is supported by Cisco IOS software. This chapter describes how to use the switch command-line interface (CLI) to configure software
More informationIEEE 802.1X with ACL Assignments
The feature allows you to download access control lists (ACLs), and to redirect URLs from a RADIUS server to the switch, during 802.1X authentication or MAC authentication bypass of the host. It also allows
More informationConfiguring Cisco IOS IP SLAs Operations
CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service
More informationQoS Tunnel Marking for GRE Tunnels
The feature introduces the capability to define and control the quality of service (QoS) for both incoming and outgoing customer traffic on the provider edge (PE) router in a service provider network.
More informationConfiguring Traffic Storm Control
19 CHAPTER This chapter describes how to configure traffic storm control on the NX-OS device. This chapter includes the following sections: Information About Traffic Storm Control, page 19-1 Virtualization
More informationUsing the Command-Line Interface
Information About, page 1 How to Use the CLI to Configure Features, page 5 Information About Command Modes The Cisco IOS user interface is divided into many different modes. The commands available to you
More informationConfiguring WMT Streaming Media Services on Standalone Content Engines
CHAPTER 9 Configuring WMT Streaming Media Services on Standalone Content Engines This chapter provides an overview of the Windows Media Technologies (WMT) streaming and caching services, and describes
More informationConfiguring Port-Based Traffic Control
CHAPTER 18 This chapter describes how to configure port-based traffic control features on the Catalyst 3750 Metro switch. For complete syntax and usage information for the commands used in this chapter,
More informationCCNA 1 Chapter 2 v5.0 Exam Answers 2013
CCNA 1 Chapter 2 v5.0 Exam Answers 2013 1. Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same
More informationConfiguring Switch-Based Authentication
CHAPTER 7 This chapter describes how to configure switch-based authentication on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. This chapter consists
More informationConfiguring Cisco Prime NAM
Cisco SRE NAM has an internal Gigabit Ethernet interface and an external interface. You can use either interface for Prime NAM management traffic such as the NAM web GUI, telnet or ssh, but not both. You
More informationLab Configure Service Object Groups using ASDM
Lab 9.2.3 Configure Service Object Groups using ASDM Objective Scenario In this lab, the students will complete the following tasks: Configure an inbound access control list (ACL) with object groups. Configure
More informationCisco 7500 Series Line Card Configuration Commands
Cisco 7500 Series Line Card Configuration s This chapter contains Cisco IOS software commands used to configure characteristics for Cisco 7500 series line Line cards are any I/O card that can be inserted
More informationCommand-Line Interfaces
CHAPTER 2 This chapter describes the CLIs you use to configure the Catalyst 4500 series switch. This chapter includes the following major sections: Accessing the Switch CLI, page 2-2 Performing Command-Line
More informationCommand-Line Interfaces
CHAPTER 2 This chapter describes the CLIs you use to configure the Catalyst 4500 series switch. This chapter includes the following major sections: Accessing the Switch CLI, page 2-1 Performing Command-Line
More informationCisco IOS Flexible NetFlow Command Reference
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION
More informationCisco IOS Software Basic Skills
APPENDIX A Understanding how to use Cisco IOS software can save you time when you are configuring your router. If you need a refresher, take a few minutes to read this appendix. This appendix contains
More informationA10 Thunder ADC with Oracle E-Business Suite 12.2 DEPLOYMENT GUIDE
A10 Thunder ADC with Oracle E-Business Suite 12.2 DEPLOYMENT GUIDE Table of Contents 1. Introduction... 2 2 Deployment Prerequisites... 2 3 Oracle E-Business Topology... 3 4 Accessing the Thunder ADC Application
More informationQUICK START GUIDE Cisco Internet Streamer CDS
QUICK START GUIDE Cisco Internet Streamer CDS 2.0 2.3 1 Introduction 2 Getting Started 3 Configuring Delivery Services 4 Configuring the Service Router 5 Testing the Web Engine 6 Testing the Windows Media
More informationIOS and Configuration Basics
APPENDIX C This appendix contains basic information about the Cisco Internet Operating System (IOS) software and includes the following sections: Cisco IOS Modes of Operation Getting Context-Sensitive
More informationPacket Classification Using the Frame Relay DLCI Number
Packet Classification Using the Frame Relay DLCI Number The Packet Classification Using the Frame Relay DLCI Number feature allows customers to match and classify traffic on the basis of one or more Frame
More informationHow to Create an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports or TTL Values,
Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports or TTL Values This module describes how to use an IP access list to filter IP packets that contain certain IP Options, TCP
More informationConfiguring Management Access
37 CHAPTER This chapter describes how to access the ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, how to create login banners, and how
More informationAnonymous Reporting and Smart Call Home
This chapter describes how to configure the services. About Anonymous Reporting, page 1 About Smart Call Home, page 2 Guidelines for, page 8 Configure, page 9 Monitoring, page 20 Examples for Smart Call
More informationConfiguring Network Admission Control
CHAPTER 59 This chapter describes how to configure Network Admission Control (NAC) in Cisco IOS Release 12.2SX. Note For complete syntax and usage information for the commands used in this chapter, see
More informationSuperLumin Nemesis. Getting Started Guide. February 2011
SuperLumin Nemesis Getting Started Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
More informationUsing TCL Scripts with the ACE
APPENDIXA You can copy, upload, and execute Toolkit Command Language (TCL) scripts on the ACE. TCL is a widely used scripting language within the networking community. TCL also has large libraries of developed
More informationConfiguring NetFlow Top Talkers using Cisco IOS CLI Commands or SNMP Commands
Configuring NetFlow Top Talkers using Cisco IOS CLI Commands or SNMP Commands This module contains information about and instructions for configuring NetFlow Top Talkers feature. The NetFlow Top Talkers
More informationQoS: Child Service Policy for Priority Class
QoS: Child Service Policy for Priority Class First Published: November, 2006 Last Updated: March 2, 2009 The QoS: Child Service Policy for Priority Class feature allows you to configure a child service
More informationPrerequisites for Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports
Creating an IP Access List to Filter IP Options, TCP Flags, Noncontiguous Ports This module describes how to use an IP access list to filter IP packets that contain certain IP Options, TCP flags, noncontiguous
More informationKing Fahd University of Petroleum & Minerals. Configuration of Routers and Establishing Routed Networks
King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 7 Objectives: Configuration of Routers and Establishing Routed Networks The objective of this experiment
More informationNull Interface Commands
This module provides command line interface (CLI) commands for configuring null interfaces on the Cisco CRS Router. interface null 0, page 2 show controllers null interface, page 3 show interfaces null0,
More informationConfiguring Real Servers and Server Farms
6 CHAPTER This section provides an overview of server load balancing and procedures for configuring real servers and server farms for load balancing on an ACE appliance. When you use the ACE CLI to configure
More informationManaging GSS User Accounts Through a TACACS+ Server
CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System
More informationImplementing SBC QoS (Marking)
28 CHAPTER The Session Border Controller (SBC) supports quality of service (QoS) profiles that the integrator s for IP packet marking on the data path. IP packet marking is used in the SBC in the following
More informationInstalling CMX 10.5 on Cisco MSE 3375
Installing CMX 10.5 on Cisco MSE 3375 Contents Introduction Prerequisites Requirements Components Used Installation CIMC configuration and KVM launch CMX image installation CMX initial setup CMX node installation
More informationQoS: Time-Based Thresholds for WRED and Queue Limit
QoS: Time-Based Thresholds for WRED and Queue Limit The QoS: Time-Based Thresholds for WRED and Queue Limit feature allows you to specify the Weighted Random Early Detection (WRED) minimum and maximum
More informationNested Class Map Support for Zone-Based Policy Firewall
Nested Class Map Support for Zone-Based Policy Firewall The Nested Class Map Support for Zone-Based Policy Firewall feature provides the Cisco IOS XE firewall the functionality to configure multiple traffic
More informationConfiguring Local SPAN and ERSPAN
This chapter contains the following sections: Information About ERSPAN, page 1 Licensing Requirements for ERSPAN, page 5 Prerequisites for ERSPAN, page 5 Guidelines and Limitations for ERSPAN, page 5 Guidelines
More informationthrough ftp-map Commands
CHAPTER 12 12-1 email Chapter 12 email To include the indicated email address in the Subject Alternative Name extension of the certificate during enrollment, use the email command in crypto ca trustpoint
More informationManaging GSS Devices from the GUI
CHAPTER 1 This chapter describes how to configure and manage your Global Site Selector Manager (GSSM) and Global Site Selector (GSS) devices from the primary GSSM graphical user interface. It includes
More informationChapter 6: Network Layer. Introduction to Networks v5.1
Chapter 6: Network Layer Introduction to Networks v5.1 6.0 Introduction 6.1 Network Layer Protocols 6.2 Routing 6.3 Routers 6.4 Configure a Cisco Router 6.5 Summary 2013 Cisco and/or its affiliates. All
More informationConfigurable Queue Depth
This feature allows you to configure (resize) the depth of the packet queues on your network. That is, you can set the maximum number (the depth) of packets that a class queue can hold, which in turn controls
More informationUsing ANM With Virtual Data Centers
APPENDIXB Date: 3/8/10 This appendix describes how to integrate ANM with VMware vcenter Server, which is a third-party product for creating and managing virtual data centers. Using VMware vsphere Client,
More informationChapter 6: Network Layer
Chapter 6: Network Layer Introduction to Networks v5.1 6.0 Introduction 6.1 Network Layer Protocols 6.2 Routing 6.3 Routers 6.4 Configure a Cisco Router 6.5 Summary 2 Upon completion of this section, you
More informationUsing TCL Scripts with the ACE
APPENDIXA You can copy, upload, and execute Toolkit Command Language (TCL) scripts on the ACE. TCL is a widely used scripting language within the networking community. TCL also has large libraries of developed
More informationAvailable Commands CHAPTER
CHAPTER 2 This chapter contains the Cisco IPS 6.2 commands listed in alphabetical order. It contains the following sections:. anomaly-detection load, page 2-4 anomaly-detection save, page 2-5 banner login,
More informationConfiguring the CSS for Device Management
CHAPTER 2 Configuring the CSS for Device Management Before you can use the WebNS Device Management user interface software, you need to perform the tasks described in the following sections: WebNS Device
More information