Cisco Explorer 4700 Installation Guide Page 170

  • Download
  • Add to my manuals
  • Print
  • Page
    / 648
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 169
5-34
Device Manager Guide, Cisco ACE 4700 Series Application Control Engine Appliance
OL-26645-02
Chapter 5 Configuring Virtual Servers
Configuring Virtual Servers
Source Address Indicates that this rule is to use a client source IP address to establish match conditions.
If you select this method:
1. In the Source Address field, enter the source IP address of the client. Enter the IP address in
dotted-decimal notation (for example, 192.168.11.2).
2. In the Netmask field, select the subnet mask to apply to the source IP address.
SSL
Note The SSL option does not apply to the ACE NPE software version (see the “Information
About the ACE No Payload Encryption Software Version” section on page 1-2).
Defines load balancing decisions based on the specific SSL cipher or cipher strength. Enables the
ACE to load balance client traffic to different server farms based on the SSL encryption level
negotiated with the ACE during SSL termination.
If you select this method:
1. In the SSL Cipher Match Type field, select the match type. Options are as follows:
Equal To—Specifies an SSL cipher for the load balancing decision.
Less Than—Specifies SSL cipher strength for the load balancing decision.
2. If you selected Equal To, in the Cipher Name field specify an SSL cipher for the load
balancing decision. The possible values are as follows:
RSA_EXPORT1024_WITH_DES_CBC_SHA
RSA_EXPORT1024_WITH_RC4_56_MD5
RSA_EXPORT1024_WITH_RC4_56_SHA
RSA_EXPORT_WITH_DES40_CBC_SHA
RSA_EXPORT_WITH_RC4_40_MD5
RSA_WITH_3DES_EDE_CBC_SHA
RSA_WITH_AES_128_CBC_SHA
RSA_WITH_AES_256_CBC_SHA
RSA_WITH_DES_CBC_SHA
RSA_WITH_RC4_128_MD5
RSA_WITH_RC4_128_SHA
3. If you selected Less Than, in the Specify Minimum Cipher Strength field specify a
non-inclusive minimum SSL cipher bit strength. For example, if you specify a cipher strength
value of 128, any SSL cipher that was no greater than 128 would hit the traffic policy. If the
SSL cipher was 128-bit or greater, the connection would miss the policy.
The possible values are as follows:
128—128-bit strength
168—168-bit strength
256—256-bit strength
56—56-bit strength
Table 5-9 Layer 7 HTTP/HTTPS Load-Balancing Rule Match Configuration (continued)
Match Condition Description
Page view 169
1 ... 169 170 171 ... 648

Comments to this Manuals

No comments