Cisco Explorer 4700 Installation Guide Page 59

  • Download
  • Add to my manuals
  • Print
  • Page
    / 648
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 58
4-9
Device Manager Guide, Cisco ACE 4700 Series Application Control Engine Appliance
OL-26645-02
Chapter 4 Configuring Virtual Contexts
Configuring Virtual Contexts
Load
Balancing
Load-balancing attributes allow you to:
Configure virtual servers, real servers, and server
farms for load balancing.
Establish the predictor method and return code
checking.
Implement sticky groups for session persistence.
Configure parameter maps to combine related
actions for policy maps.
Load-balancing configuration options include:
Virtual servers
Real servers
Server farms
Health monitoring
Sticky attributes
Parameter maps
Secure KAL-AP
Dynamic Workload Scaling (admin context only)
Load Balancing Overview, page 5-1
Configuring Virtual Servers, page 5-2
Configuring Server Farms, page 6-18
Configuring Health Monitoring for Real
Servers, page 6-41
Configuring Sticky Groups, page 7-11
Configuring Parameter Maps, page 8-1
Configuring Secure KAL-AP, page 6-70
Configuring Dynamic Workload Scaling,
page 6-14
SSL SSL configuration options allow you to:
Import and export SSL certificates and keys.
Set up SSL parameter maps and chain group
parameters.
Generate certificate signing requests for
submission to a certificate authority.
Authenticate peer certificates.
Configure certificate revocation lists for use
during client authentication.
Configure an Online Certificate Status Protocol
(OCSP) service to define the host server for
certificate revocation checks using OCSP.
Configuring SSL, page 9-1
Using SSL Certificates, page 9-6
Using SSL Keys, page 9-11
Generating CSRs, page 9-27
Configuring SSL Parameter Maps, page 9-19
Configuring SSL Chain Group Parameters,
page 9-25
Configuring SSL Proxy Service, page 9-28
Configuring SSL Authentication Groups,
page 9-32
Configuring SSL OCSP Service, page 9-30
Configuring CRLs for Client Authentication,
page 9-33
Security Security configuration options allow you to create
access control lists, set ACL attributes, resequence
ACLs, delete ACLs, and configure object groups.
Configuring Virtual Context Expert Options,
page 4-79
Creating ACLs, page 4-59
Configuring Object Groups, page 4-70
Table 4-2 ACE Appliance and Virtual Context Configuration Options (continued)
Configuration
Subset Description Related Topics
Page view 58
1 ... 58 59 60 ... 648

Comments to this Manuals

No comments