AX Series™ Advanced Traffic Manager Graphical User Interface Reference
AX Series™ Advanced Traffic Manager Graphical User Interface Reference
b y
D e s i g n
Headquarters
A10 Networks, Inc.
2309 Bering Dr.
San Jose, CA 95131-1125 USA
Tel: +1-408-325-8668 (main)
Tel: +1-408-325-8676 (support - worldwide)
Tel: +1-888-822-7210 (support - toll-free in USA)
Fax: +1-408-325-8666
www.a10networks.com
Corporate Headquarters
A10 Networks, Inc.
2309 Bering Dr.
San Jose, CA 95131-1125 USA
Tel: +1-408-325-8668 (main)
Tel: +1-888-822-7210 (support toll-free in USA)
Tel: +1-408-325-8676 (support direct dial)
Fax: +1-408-325-8666
www.a10networks.com
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
3 of 276
As an alternative to saving the output in a log file captured by your terminal emulation application, you can export the output from the CLI using
the following command:
show techsupport export [use-mgmt-port] url
(For syntax information, see the AX Series CLI Reference.)
4 of 276
P e r f o r m a n c e
b y
D e s i g n
This document focuses on the GUI itself and does not provide extensive
descriptions of AX features. Use this document along with the AX Series
Configuration Guide when configuring the AX device.
Additional information is available for AX Series systems in the following
documents. These documents are included on the documentation CD
shipped with your AX Series system, and also are available on the A10 Networks support site:
AX Series Installation Guide
AX Series Configuration Guide
AX Series CLI Reference
AX Series aFleX Reference
AX Series MIB Reference
AX Series aXAPI Reference
The AX Series is the industrys best performing traffic manager that helps
organizations scale and maximize availability through the worlds most
advanced delivery platform. The AX Series Advanced Core Operating System (ACOS) accelerates and secures critical business applications, provides
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
5 of 276
6 of 276
P e r f o r m a n c e
b y
D e s i g n
Introduction
13
Login.......................................................................................................................................................13
Redirection of HTTP To HTTPS ....................................................................................................16
GUI Features ..........................................................................................................................................16
Mode Tabs and Module Buttons ..................................................................................................16
Menus .............................................................................................................................................18
Main Display Area ..........................................................................................................................18
Global Buttons ...............................................................................................................................19
Save .............................................................................................................................................19
Logout ..........................................................................................................................................19
Help ..............................................................................................................................................19
HA ................................................................................................................................................19
Action Buttons ...............................................................................................................................20
Tabular Displays ............................................................................................................................20
Action Buttons ..............................................................................................................................21
Navigation Controls ......................................................................................................................21
Display Filters ...............................................................................................................................22
Configuration Pages ......................................................................................................................23
Graph Display Options ..................................................................................................................25
Data Refresh ................................................................................................................................25
Time Span ....................................................................................................................................26
Web Timeout ..........................................................................................................................................27
System Partitions ..................................................................................................................................27
Monitor Mode
29
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
7 of 276
P e r f o r m a n c e
b y
D e s i g n
Config Mode
83
Config Modules......................................................................................................................................83
Config Menu Tree...................................................................................................................................84
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
9 of 276
P e r f o r m a n c e
b y
D e s i g n
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
11 of 276
12 of 276
P e r f o r m a n c e
b y
D e s i g n
Introduction
The AX Series GUI enables you to manage the device with a Web browser.
The GUI runs as a Web server on the AX device.
Table 1 lists the browser versions supported by the AX management GUI in
AX Release 2.4.
TABLE 1
Browser
IE 6.0-8.0
Firefox 2.x-3.x
Safari 3.0
Chrome
Windows
Supported
Supported
Not Supported
Not Supported
Linux
N/A
Supported
N/A
N/A
MAC
N/A
N/A
Supported
N/A
The browser used to access the AX GUI must support encryption keys of
128 bits or longer. Beginning in AX Release 2.4.2, shorter encryption keys
(for example, 40 bits) are not supported. The browser also must support
SSLv3 or TLS 1.0. Browsers that support only SSLv2 are not supported.
A screen resolution of at least 1024x768 is recommended.
After upgrading an AX device from a previous release, clear your browser
cache to ensure proper display of the GUI.
Login
To access the GUI:
1. In a Web browser, enter https://ip-addr, where ip-addr is the IP address
of the AX device.
A login dialog appears, as shown in Figure 2.
2. Enter a valid user name and password and click OK.
Default user name: admin
Default password: a10
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
13 of 276
Note:
Login
The AX device has a default admin user name and password. A10 Networks recommends that you change the admin name and password when
you first deploy the switch.
After successful login, the Summary screen is displayed, as shown in
Figure 3. The Summary screen provides a high-level view of the AX configuration and status.
14 of 276
P e r f o r m a n c e
b y
D e s i g n
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
15 of 276
GUI Features
This section describes the display and configuration controls of the GUI.
16 of 276
P e r f o r m a n c e
b y
D e s i g n
After you click a mode tab, it darkens to indicate it is active. The inactive
mode is light. The available module buttons are listed on the left. The active
module shows the down arrow
and its available sub-modules in light
blue beneath its down arrow.
Click sub-module hyperlinks to display information or input fields for that
sub-module. The hyperlink for the selected module is highlighted in red.
Selecting a module button does not automatically select a sub-module
available under the module. The display area continues to contain the
information for the previously selected sub-module until you select a new
sub-module.
Note:
In this document and other AX documents, to indicate the path you use to
navigate to a specific module, sub-module, and menu option, the selection
sequences are shown as follows:
Mode > Module > Sub-Module > Menu
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
17 of 276
FIGURE 5
Menus
The top panel contains the menu bar, to the right of the mode tabs. Menus
change depending on which module and sub-module are currently selected.
Some displays include tables or configuration pages. Others display dropdown menus of actions or of additional options. The active menu bar item is
highlighted in yellow.
Figure 5 on page 18 shows the menu bar for Config > Service > SLB. In this
example, the Server menu option is selected.
18 of 276
P e r f o r m a n c e
b y
D e s i g n
Global Buttons
The banner at the top of the GUI displays the Save, Logout and Help buttons, which are always available from anywhere in the GUI.
FIGURE 6
Save
The Save button saves configuration changes that are in the running configuration to the startup configuration file. When the running configuration
currently has unsaved changes, this button flashes red. Click it to save
changes that have been made since the last save.
Logout
Logout ends the current GUI session. Your login name is shown in parentheses. In this example, the login name is admin.
Help
Clicking the Help button displays context-sensitive online help.
HA
Indicates the current High Availability (HA) status of the AX device:
Active
Standby
Not Configured
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
19 of 276
Action Buttons
Some lists of configuration items, such as the list of real servers, have the
following buttons:
Add Displays a page containing configuration fields for creating a new
item.
Delete Deletes the selected items. Select the checkbox next to each
Note:
ning-config) and re-displays the table that lists the configured items.
Note:
This action does not save configuration changes. To save changes, you
must write them to the startup configuration file. Select the Save option in
the upper right corner of the AX GUI window. (See Save on page 19.)
Cancel Cancels configuration of the new item and re-displays the table
Tabular Displays
Data and configured items are displayed in tables such as the ones shown in
Figure 5 and Figure 7.
20 of 276
P e r f o r m a n c e
b y
D e s i g n
Action Buttons
Most tabular displays for configuration items have the following action buttons:
Add Displays a configuration page to add a new item. (Figure 11 on
action, click on the checkboxes next to the items you want to delete,
then click Delete.
These buttons are located under the table.
A few displays have other action buttons. These are described where applicable in the operational procedures in the AX Series Configuration Guide.
Navigation Controls
If a table has more items than can be displayed in a single page, the GUI
displays page navigation controls.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
21 of 276
The summary buttons (the arrow buttons; start, left, right, and end) provide
browser-like navigation through the pages of table rows.
The numbers in brackets indicate the entry numbers displayed on the current page. The number following the forward slash indicates the total number of entries that match the display criteria (display filters).
The drop-down list specifies how many rows to display on a single page.
You can select one of the following: 50, 10, 20, 100, or Show All. The
default is 50.
Display Filters
Many tables also provide options to filter the display to show only the
entries you want to see. For example, the SLB real server table (shown in
Figure 5 on page 18) allows you to filter based on name, description, or
both. To filter the display:
1. Select the column by which to filter.
2. Enter a search string.
3. Click Find.
To find multiple, similar entries, you can enter the part of the name that is
common for all entries. For example, to display all servers that have rs in
the name, make the selections shown in Figure 9.
FIGURE 9
22 of 276
P e r f o r m a n c e
b y
D e s i g n
Configuration Pages
Configuration pages enable you to enter configuration information. In some
cases, a configuration page is displayed when you select a menu option. For
example, selecting Config > Network > DNS > DNS displays the configuration page shown in Figure 10.
FIGURE 10
In other cases, the menu option displays a list of configured items, such as
the list of configured real servers shown in Figure 5 on page 18. To configure a new server, click the Add button, located under the list of servers. The
server configuration page appears, as shown in Figure 11.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
23 of 276
24 of 276
P e r f o r m a n c e
b y
D e s i g n
Data Refresh
Statistics counters start incrementing from 0 after the most recent reboot or
the most recent clear performed by an administrator.
To refresh the display with the latest counter values, click Refresh.
You also can enable automatic refresh.
For system statistics (Monitor > Overview > Statistics), you can select
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
25 of 276
Time Span
The horizontal (x) axis of each graph shows the time span of the data in the
graph. The same time span is used for all four graphs.
To change the time span, do one of the following:
Select a new span from the pull-down list to the left of the Start Time
field. The spans you can select range from the most recent 30 minutes to
the most recent 30 days.
Use the calendars to select specific start and end dates and times.
26 of 276
P e r f o r m a n c e
b y
D e s i g n
Web Timeout
Web Timeout is used to prevent blockage of admin access caused by users
who do not log off. The timeout counter indicates the amount of time
remaining before the session is automatically closed.
Select Config > System > Settings > Web to view or set the Web Timeout
value in minutes.
Clicking any AX GUI button or menu option also resets the timer.
One minute before a session times out, a timer appears on the left side of the
GUI window, under the Monitor and Config links. You can click the Reset
button under the timer to reset the timer for your GUI session. If you do not
click Reset or another button or menu option before the timer reaches 0, the
session is terminated.
Caution:
After the Web timer expires, the AX device ends the GUI session. No
warning or confirmation message appears. If you are entering configuration information but have not yet clicked OK, the configuration
information is lost.
System Partitions
Role-Based Administration (RBA) allows the AX device to be segmented
into multiple administrative domains called partitions. If RBA is configured, the resources accessible to you in the GUI depend on the privilege
level for the admin account you use to log in:
If you are logged in with an admin account that has Root, Read-Write,
or Read-Only privileges, the resources in the shared partition and all private partitions are displayed by default.
If you are logged in with an admin account that has Partition Write
Admin or Partition Read Admin privileges, the GUI presents only the
resources in the devices shared partition and in your private partition. In
this case, you can view the objects in the shared partition but you cannot
configure them. Depending on your admin privilege level, you can view
only or view and configure the resources in your shared partition.
Resources in other partitions are not accessible.
If you are logged in with an admin account that has Partition RS Opera-
tor privileges, you can view service port statistics for real servers in the
partition, and disable or re-enable real servers and service ports in the
partition. Admins with this access level can not view additional
resources and can not change the view to another partition.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
27 of 276
28 of 276
For more information about this feature, see the Role-Based Administration chapter in the AX Series Configuration Guide.
P e r f o r m a n c e
b y
D e s i g n
Monitor Mode
The Monitor Mode enables you to monitor systems and activities controlled
by the AX device.
Monitor Modules
The Monitor Mode offers the following sub-modules for observing
AX Series network and performance settings and operations.
Overview
Service
Network
System
HA
FIGURE 12
P e r f o r m a n c e
b y
Monitor Mode
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
29 of 276
Interface
Virtual Server
Service Group
Statistics
Performance
Connection
Attack Prevention
LAN
Trunk
Server
VLAN
Health Monitor
Summary
Overview
ACL
Firewall
IPv4 ACL
Firewall Group
IPv6 ACL
ARP
IPv4 ARP
PBSLB
IPv6 Neighbor
Statistics
Client Query
Blacklist/Whitelist
Route
IPv4 Route Table
IPv4 Forwarding
GSLB
IPv6 Forwarding
Site
Zone
Protocol
Admin
aFleX
Admin Session
IP Source NAT
Admin Locked
Pool
Logging
Static NAT
Logging
Show Tech
Application
Proxy
Connection Reuse
Monitor > HA
Persistent
Group
SSL
Status
RAM Caching
FTP
Net
ICMP
Switch
30 of 276
P e r f o r m a n c e
b y
D e s i g n
To display the interface type and IP address for a port, move the mouse
pointer over the ports icon.
Likewise, to display the status of a hard disk, move the mouse pointer over
the icon of the disk.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
31 of 276
System Information
Table 2 describes the types of information shown in this section.
TABLE 2
Field
Serial Number
Current Time
Startup Mode
Software
Version
Advanced Core
OS
On Hard Disk
Description
Serial number of the AX device.
Current system time when the page was displayed.
Image area from which the system image and startup-config
were loaded after the most recent reboot.
System image version that is currently running.
Labels the image location for the system images listed
below.
Software image versions installed on the hard disk.
The image listed on the left is in the primary image area of
the hard disk. The image listed on the right is in the secondary image area.
Software image versions installed on the compact flash.
On Compact
Flash
Firmware
Version
aFleX Engine
Version
Last Config
Saved At
Technical
Support
Device Information
Table 3 describes the types of information shown in this section.
TABLE 3
Field
CPU
Count / Status
CPU
Temperature
32 of 276
Description
Count shows the number of CPUs in the system. The count
includes the Control CPU and the Data CPUs.
Status shows the aggregate status of the CPUs.
Current temperature inside the chassis.
P e r f o r m a n c e
b y
D e s i g n
Field
Disk Usage
Fan Status
Power Supply
Description
Size of the dual hard disk and the amount that contains data.
Operational status of the system fans, and the rotations per
minute (RPMs) of each fan.
Status of the power supplies.
Feature Configuration
Table 4 describes the types of information shown in this section.
TABLE 4
Field
Service Groups
Description
Number of Server Load Balancing (SLB) service groups
configured on the device.
Virtual Servers
Servers
Firewall Group
Firewall Virtual
Servers
Firewall Nodes
GSLB Sites
GSLB Zones
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
33 of 276
aFleX
SSL
Acceleration
High
Availability
Connection
Mirror
34 of 276
P e r f o r m a n c e
b y
D e s i g n
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
35 of 276
Current
Connections
Total
Connections
Packets RX
36 of 276
P e r f o r m a n c e
b y
D e s i g n
Field
Packets TX
Bytes RX
Bytes TX
Description
Total number of packets sent to the firewall virtual server since
the last time statistics were cleared.
Total number of bytes received on the firewall virtual server
since the last time statistics were cleared.
Total number of bytes sent to the firewall virtual server since
the last time statistics were cleared.
System Log
System log entries are displayed at the bottom of the page. By default, the
100 most recent messages can be viewed on this page. All message levels
are displayed by default and the list is refreshed every 10 seconds by
default. The messages are color-coded to indicate the message level.
To change any of these settings:
1. Select Configure > System > Settings.
2. Select Log on the menu bar.
3. Click Status.
4. Change settings, then click OK.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
37 of 276
To move the calendar popup, click on the bottom row of the calendar and
drag it.
2. Select the End Time using the calendar at the end of the End Time field.
Note:
38 of 276
P e r f o r m a n c e
b y
D e s i g n
You also can display these graphs by clicking on Connection Reuse or the
graphics link at the top of the group of connection reuse statistics on the
Summary page.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
39 of 276
Click on a service group name to display statistics for the individual real
service ports in the service group.
Server Displays a row of statistics for each real server. Click on a real
server name to display statistics for the individual real service ports on
the server.
Each page provides the following display control links, located under the
table and above the graph display area:
Select All selects all the rows in the table
Unselect All deselects all the rows in the table
Expand All Expands each row to show its constituents. For example,
clicking this link on the Virtual Server page expands the table to also
show all of the virtual ports on each VIP.
Collapse All Collapses all rows in the table to show only the top-level
40 of 276
P e r f o r m a n c e
b y
D e s i g n
SLB Graphs
If statistical data collection is enabled for an SLB resource, the following
graphs are available for that resource:
Throughput In Bits
Current Connections
Note:
To clear statistics, select the checkboxes next to the items for which you
want to clear the statistics, then click Clear.
Statistics Scope
By default, all configuration items within the selected item are averaged.
For example, if you click on the
icon next to a virtual server name,
graphs that are displayed show the statistics for all virtual service ports in
the virtual server.
To display graphs for an individual configuration item, click on
the
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
41 of 276
To move the calendar popup, click on the bottom row of the calendar and
drag it.
2. Select the End Time using the calendar at the end of the End Time field.
Note:
Field
Name
Description
Name of the virtual server.
Click on this row to display statistics for individual service
ports.
Current
Connections
Total
Connections
Packets Forward
Packets Reverse
Bytes Forward
Bytes Reverse
42 of 276
The icon to the left of the server name or service port number
indicates its status. (For descriptions, see Table 5 on
page 36.)
Current number of connections to the virtual server or individual service.
Total number of connections to the virtual server or individual service since the last time statistics were cleared.
Total number of packets that the virtual server or individual
virtual service received from the client and forwarded to the
server since the last time statistics were cleared.
Total number of packets that the virtual server or individual
virtual service received from the server and reverse-forwarded to the client since the last time statistics were cleared.
Total number of bytes that the virtual server or individual
virtual service received from the client and forwarded to the
server since the last time statistics were cleared.
Total number of bytes that the virtual server or individual
virtual service received from the server and reverse-forwarded to the client since the last time statistics were cleared.
P e r f o r m a n c e
b y
D e s i g n
Field
Statistics
Description
Provides access to statistics. (See SLB Graphs on
page 41.)
(unlabeled)
Field
Name
Description
Name of the service group.
Click on this row to display statistics for individual service
ports.
The icon to the left of the service group name or service port
number indicates its status:
The service group or service is up.
Type
Current
Connections
Total
Connections
Packets Forward
Packets Reverse
Bytes Forward
Bytes Reverse
Statistics
(unlabeled)
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
43 of 276
Field
Name
Description
Name of the real server.
Click on this row to display statistics for individual service
ports.
The icon to the left of the server name or service port number
indicates its status:
The server or service is up.
Current
Connections
Total
Connections
Packets Forward
Packets Reverse
Bytes Forward
Bytes Reverse
Statistics
(unlabeled)
Note:
44 of 276
For dynamically created real servers, this page shows only the first
dynamically created server. To display all dynamically created servers,
use the show slb server command in the CLI.
P e r f o r m a n c e
b y
D e s i g n
Note:
tual server. Click on the firewall virtual server name to display statistics
for the individual virtual firewall ports on the firewall virtual server.
Firewall Node Displays a row of statistics for each firewall. Click on a
firewall name to display statistics for the individual service ports configured on the firewall, if this option was configured.
FWLB Graphs
The following graphs are available on each page:
Throughput In Bits
Current Connections
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
45 of 276
Field
Name
Description
Name of the firewall group.
Current
Connections
Total
Connections
Packets Forward
Packets Reverse
Bytes Forward
Bytes Reverse
46 of 276
P e r f o r m a n c e
b y
D e s i g n
Current
Connections
Total
Connections
Packets Forward
Packets Reverse
Bytes Forward
Bytes Reverse
Description
Name of the firewall virtual server.
Click on the firewall virtual server name to display statistics
for the individual virtual firewall ports on the firewall virtual
server.
Current number of connections to the firewall virtual server.
Total number of connections to the firewall virtual server
since the last time statistics were cleared.
Total number of packets that the firewall virtual server or
individual virtual service received from the client and forwarded to the server since the last time statistics were
cleared.
Total number of packets that the firewall virtual server or
individual virtual service received from the server and
reverse-forwarded to the client since the last time statistics
were cleared.
Total number of bytes that the firewall virtual server or individual virtual service received from the client and forwarded
to the server since the last time statistics were cleared.
Total number of bytes that the firewall virtual server or individual virtual service received from the server and reverseforwarded to the client since the last time statistics were
cleared.
Current
Connections
Total
Connections
P e r f o r m a n c e
b y
Description
Name of the firewall.
Click on a firewall name to display statistics for the individual service ports on the firewall, if this option was configured.
Current number of connections to the firewall.
Total number of connections to the firewall since the last
time statistics were cleared.
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
47 of 276
Description
Total number of packets forwarded to the firewall or individual port since the last time statistics were cleared.
Total number of packets reverse-forwarded from the firewall
or individual port since the last time statistics were cleared.
Total number of bytes forwarded to the firewall or individual
server since the last time statistics were cleared.
Total number of bytes reverse-forwarded from the firewall or
individual port since the last time statistics were cleared.
Server Select
Failures
48 of 276
Description
Group ID.
Number of client connections established to the black/whitelist group and protocol port.
Number of client connections reset due to the Reset action in
a PBSLB policy.
Number of client connections that were dropped due to the
Drop action in a PBSLB policy.
Number of client connections reset because they were over
the connection limit specified in a PBSLB policy.
Number of client connections that were dropped because
they were over the connection limit specified in a PBSLB
policy.
Number of times selection of a real server failed.
P e r f o r m a n c e
b y
D e s i g n
Select the black/white list, specify the IP host or subnet address, and click
Find.
Table 13 describes the columns in this display.
TABLE 13 Monitor > PBSLB > Client Query
Field
IP Address
Service Group
Connections
Limit
Connections
Current
Description
Client IP address.
Service group ID.
Maximum number of new connections allowed.
Current number of active connections.
P e r f o r m a n c e
b y
Description
Name of the black/white list.
Location of the black/white list.
Size of the black/white list.
System time when the black/white list was last updated on
the AX device.
Date and time when the black/white list was downloaded
onto the AX device.
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
49 of 276
Description
GSLB site name.
IP address of the SLB device that is managing the real servers at the site.
IP address of the GSLB service.
Number of times the service IP was selected.
GSLB service port state.
Server
50 of 276
Description
Zone name.
Service type and service name.
Number of DNS queries received for the service.
Number of DNS replies sent to clients for the service.
Number of DNS replies sent to clients by the AX device as a
DNS proxy for the service.
Number of cached DNS replies sent to clients by the AX
device for the service. (This statistic applies only if the DNS
cache option is enabled in the policy.)
Number of DNS replies sent to clients by the AX device as a
DNS server for the service. (This statistic applies only if the
DNS server option is enabled in the policy.)
P e r f o r m a n c e
b y
D e s i g n
Description
Number of DNS replies sent to clients by the AX device to
keep the clients on the same site. (This statistic applies only
if the DNS sticky option is enabled in the policy.)
Description
Name of the aFleX policy.
Type of event used in the aFleX policy.
Total number of times the aFleX policy has been triggered
by the event.
Total number of times the aFleX policy was triggered by the
event by failed.
Total number of times the aFleX policy was triggered by the
event by was aborted.
An aFleX policy can appear in multiple rows in the table. Each row shows
counters for a different event type.
To clear counters for all events listed for an aFleX policy, select at least one
row for the aFleX policy, then click Clear.
To clear counters only for specific events, select the rows for those events,
then click Clear Event.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
51 of 276
Port Usage
Total Used
Total Freed
Failed
Description
IP pool name.
First IP address in the pool.
Last IP address in the pool.
ACLs bound to the pool, and the number of times traffic
matched the ACLs.
To display the ACL list, click on the plus sign.
Number of sessions currently being NATted for the address.
Each session counted here uses a unique TCP or UDP protocol port. ICMP traffic does not cause this counter to increment.
Total number of sessions that have been NATted for the
source address.
Number of NATted sessions that have been terminated, thus
freeing up a port for another session.
Number of dynamic NAT attempts that failed.
52 of 276
Description
Source address bound to a NAT address.
Number of sessions currently being NATted for the address.
Each session counted here uses a unique TCP or UDP protocol port. ICMP traffic does not cause this counter to increment.
P e r f o r m a n c e
b y
D e s i g n
Description
Total number of sessions that have been NATted for the
source address.
Number of NATted sessions that have been terminated, thus
freeing up a port for another session.
P e r f o r m a n c e
b y
Description
Number of currently active connections using the fast-HTTP
proxy.
Total number of connections that have used the fast-HTTP
proxy.
Number of HTTP requests received by the fast-HTTP proxy.
Number of HTTP requests successfully fulfilled (by establishing a connection to a real server).
Number of proxy errors.
Number of times TCP connections with clients were reset.
Number of times TCP connections with servers were reset.
Number of tuple errors.
Number of times the HTTP parser failed to parse a received
HTTP request.
Number of times selection of a real server failed.
Number of forward request failures.
Number of forward request data failures.
Number of retransmitted requests.
Number of request packets received from clients out of
sequence.
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
53 of 276
Description
Number of times initial selection of a real server for an
HTTP request failed (for example, due to a TCP Reset sent
by the server).
Number of times the connection with a server closed prematurely.
Number of connections made with servers.
Number of source NAT failures.
54 of 276
Description
Number of currently active HTTP connections using the
AX Series device as an HTTP proxy.
Total number of HTTP connections that have used the
AX Series device as an HTTP proxy.
Total number of HTTP requests received by the HTTP
proxy.
Number of HTTP requests received by the HTTP proxy that
were successfully fulfilled (by connection to a real server).
Number of proxy errors.
Number of times TCP connections with clients were reset.
Number of times TCP connections with servers were reset.
Number of tuple errors.
Number of times the HTTP parser failed to parse a received
HTTP request.
Number of times selection of a real server failed.
Number of forward request failures.
Number of forward request data failures.
Number of retransmitted requests.
Number of request packets received from clients out of
sequence.
P e r f o r m a n c e
b y
D e s i g n
Description
Number of times initial selection of a real server for an
HTTP request failed (for example, due to a TCP Reset sent
by the server).
Number of times the connection with a server closed prematurely.
Number of connections made with servers.
Number of source NAT failures.
These counters show statistics for HTTP compression, in
bytes.
P e r f o r m a n c e
b y
Description
Number of currently active SMTP connections using the
AX Series device as an SMTP proxy.
Total number of SMTP connections that have used the
AX Series device as an SMTP proxy.
Total number of SMTP requests received by the SMTP
proxy.
Number of SMTP requests received by the AX Series device
that were successfully fulfilled (by connection to a real
server).
Number of proxy errors.
Number of times TCP connections with clients were reset.
Number of times TCP connections with servers were reset.
Number of tuple errors.
Number of times parsing of an SMTP request failed.
Number of times selection of a real server failed.
Number of forward request failures.
Number of forward request data failures.
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
55 of 276
Description
Number of retransmitted requests.
Number of request packets received from clients out of
sequence.
Number of times a request was forwarded to another server
because the current server was failing.
Number of times the connection with a server closed prematurely.
Number of connections made with servers.
Number of source NAT failures.
56 of 276
Description
Number of currently active connections using the AX device
as an SSL proxy.
Total number of connections that have used the AX device as
an SSL proxy.
Number of client errors.
Number of server errors.
Number of times a session was not found.
Number of times no route was available.
Number of times selection or a real server failed.
Number of occurrences of source NAT failure.
P e r f o r m a n c e
b y
D e s i g n
P e r f o r m a n c e
b y
Description
Current number of established TCP connections being handled by the proxy.
Number of connections opened actively.
Number of connections opened passively.
Number of TCP connection attempts that failed.
Total number of TCP packets received by the TCP proxy.
Total number of TCP packets sent by the TCP proxy.
Number of TCP packets retransmitted by the TCP proxy.
Number of TCP Resets received for established connections.
Number of TCP Resets sent by the AX device.
Number of invalid TCP packets received by the AX device.
Number of TCP sockets currently allocated.
Current number of orphan sockets.
Total memory allocated for TCP.
Total RX buffers allocated for TCP.
Total TX buffers occupied by TCP.
Current number of TCP connections in the SYN-SNT state.
Current number of TCP connections in the SYN-RCV state.
Current number of TCP connections in the Fin-Wait-1 state.
Current number of TCP connections in the Fin-Wait-2 state.
Current number of TCP connections in the Time Wait state.
Current number of TCP connections in the Close state.
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
57 of 276
Description
Current number of TCP connections in the Close-Wait state.
Current number of TCP connections in the Last-ACK state.
Current number of TCP connections in the Listening state.
Current number of TCP connections in the Closing state.
Monitor > Service > Application > Proxy > DNS Cache
This page shows proxy statistics for DNS caching.
Table 25 describes the fields on this page.
TABLE 25 Monitor > Service > Application > Proxy > DNS Cache
Field
Total Query
Total Server
Response
Total Cache Hit
Query Not
Passed
Response Not
Passed
Query Encoded
Response
Encoded
Query With
Multiple
Questions
Response With
Multiple
Questions
Total Aged Out
58 of 276
Description
Total number of DNS queries received by the AX device.
Total number of responses form DNS servers received by the
AX device.
Total number of times the AX device was able to use a
cached reply in response to a query.
Number of queries that did not pass a packet sanity check.
Number of responses that did not pass a packet sanity check.
The AX device checks the DNS header and question in the
packet, but does not parse the entire packet.
Number of queries that were not cached because the domain
name in the question was encoded in the DNS query packet.
Number of queries that were not cached because the domain
name in the question was encoded in the DNS response
packet.
Number of queries that were not cached because they contained multiple questions.
Number of responses that were not cached because they contained answers for multiple questions.
Total number of DNS cache entries that have aged out of the
cache.
P e r f o r m a n c e
b y
D e s i g n
Description
Number of new client connections directed to the same
server as previous connections by the persistence feature.
Number of currently active connections that were sent to the
same real server by the persistence feature.
Total number of established connections.
Total number of terminated connections.
Total number of bound connections.
Total number of unbound connections.
Number of connections whose unbinding was delayed.
Number of responses that took too long.
Number of missed responses to HTTP requests.
b y
Description
Number of requests successfully sent to the primary server
selected by URL hashing. The primary server is the one that
was initially selected and then re-used based on the hash
value.
Number of requests that were sent to another server (a secondary server) because the primary server selected by URL
hashing was unavailable.
Number of requests that could not be fulfilled using URL
hashing.
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
59 of 276
Description
Number of requests successfully sent to the same server as
previous requests from the same client, based on source-IP
persistence.
Number of requests that could not be fulfilled by the same
server as previous requests from the same client, based on
source-IP persistence.
Number of requests successfully sent to the same server as
previous requests with the same SSL session ID.
Number of requests that could not be fulfilled by the same
server as previous requests with the same SSL session ID.
Number of requests successfully sent to the same server as
previous requests with the same persistence cookie.
Number of requests that could not be fulfilled by the same
server as previous requests with the same persistence cookie.
Number of requests in which a persistence cookie was not
found.
Source IP
Persistent Fails
SSL SID
Persistent OK
SSL SID
Persistent Fails
Cookie
Persistent OK
Cookie
Persistent Fails
Persistent
Cookie Not
Found
60 of 276
Description
Total number of SSL processing modules on the device.
Number of currently active SSL sessions.
Total number of SSL sessions since the last time statistics
were cleared.
Number of SSL sessions in which the SSL security handshake failed.
Number of times an encryption/decryption failure occurred
for an SSL record.
Amount of memory in use by the SSL processing module.
Number of times an SSL session was terminated due to a
certificate verification failure.
P e r f o r m a n c e
b y
D e s i g n
SSL module n
Number of
Enabled Crypto
Engines
Number of
Available Crypto
Engines
Description
Number of times the encryption processor was unable to
allocate memory.
Number of times the AX software was unable to enqueue an
SSL record to the SSL processor for encryption/decryption.
(Number of times the processor reached its performance
limit.)
ID number of the SSL module to which the following statistics apply.
Number of SSL encryption/decryption processing engines
that are enabled.
Number of SSL encryption/decryption processing engines
that are available on the device.
Monitor > Service > Application > RAM Caching > Details
This page shows statistics for the RAM caching feature.
Table 29 describes the fields on this page.
TABLE 29 Monitor > Service > Application > RAM Caching > Details
Field
Cache Hits
Cache Misses
Memory Used
Bytes Served
Entries Cached
Entries Replaced
Entries Aged Out
Entries Cleaned
Total Requests
Cacheable
Requests
P e r f o r m a n c e
b y
Description
Number of times a requested page was found in the cache
and served from the cache.
Number of times a requested page was not found in the
cache.
Amount of RAM currently used by cached content.
Total number of bytes served from the cache.
Number of objects currently in the cache.
Number of cached items that were removed to make room
for newer entries, per the replacement policy.
Number of entries that were removed because they are older
than their expiration time.
Number of cached objects that have aged out and therefore
been removed from the cache.
Total number of requests received on all virtual server ports
on which caching is configured.
Number of requests that are potentially cacheable.
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
61 of 276
Description
Number of requests with no-cache header directives.
Number of responses with no-cache header directives.
304 Responses
Revalidation
Successes
Revalidation
Failures
Policy URI
nocache
Policy URI
cache
Policy URI
invalidate
Content Too Big
Content Too
Small
Srvr Resp - Cont
Len
Srvr Resp - Chnk
Enc
Srvr Resp - 304
Status
Srvr Resp Other
Cache Resp - No
Comp
Cache Resp Gzip
62 of 276
P e r f o r m a n c e
b y
D e s i g n
Entry create
failures
Description
Number of objects received from the content server that
were compressed using compress.
Compress is the encoding format produced by the common
UNIX file compression program compress (adaptive Lempel-Ziv-Welch coding [LZW]).
Counter used by A10 technical support for troubleshooting.
Monitor > Service > Application > RAM Caching > Objects
This page displays information about cached objects.
Table 30 describes the fields on this page.
TABLE 30 Monitor > Service > Application > RAM Caching > Objects
Field
Host
Object URL
Bytes
Type
Description
Virtual port number on which RAM caching is enabled.
URL from which the cached object was obtained by the AX
device.
Length of the cached object.
Indicates whether the cached object has a Content-Length
header, is compressed, or is chunk-encoded:
CL Content-Length header
CP Compressed
Status
CE Chunk-encoded
Status of the entry:
FR Fresh
ST Stale
IN Incomplete
FA Failed
UN Unknown
Expires in
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
63 of 276
Monitor > Service > Application > RAM Caching > Replacement
This page displays the distribution of requests for cached objects. Distribution is shown for only one RAM caching virtual port at a time. To display
request distribution for a different virtual port, select the virtual server and
port from the Virtual Server and Port drop-down lists.
Table 31 describes the fields on this page.
TABLE 31 Monitor > Service > Application > RAM Caching > Replacement
Field
Frequency
Total
Description
Shows the frequency of requests. Entries listed for 1/256
(one in 256 requests) are the least requested, whereas entries
listed for 128 are the most requested.
Shows the total number of objects for the request frequency.
Monitor > Service > Application > RAM Caching > Memory Usage
This page shows memory-usage statistics for RAM caching.
Table 32 describes the fields on this page.
TABLE 32 Monitor > Service > Application > RAM Caching > Memory Usage
Field
VIP
Port
Memory
Configured
Memory Used
Percent Used
64 of 276
Description
Virtual server name.
Virtual port number.
Size of the RAM cache as specified in the RAM caching
template.
Amount of memory currently in use to store cached objects.
Percentage of the RAM cache that currently contains cached
objects.
P e r f o r m a n c e
b y
D e s i g n
Description
Total number of FTP control sessions load-balanced by the
AX Series device.
Total number of Application Layer Gateway (ALG) packets.
Number of ALG packets that have been retransmitted.
Number of times an FTP control session could not be established because none of the real servers had available connections.
Total number of FTP data sessions load-balanced by the
AX Series device.
Number of times an FTP data session could not be established because none of the real servers had available connections.
b y
Description
Number of IP packets that could not be routed.
Number of TCP Resets sent.
Number of Resets sent for which there was no SYN.
Number of TCP Reset packets the AX device has sent as a
Layer 4 proxy.
Number of TCP Resets sent in response to a TCP ACK
attack.
Number of TCP Reset packets the AX device has sent due to
an aFleX.
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
65 of 276
66 of 276
Description
Number of TCP Reset packets the AX device has sent due to
stale TCP sessions.
Number of TCP Reset packets the AX device has sent as a
TCP proxy.
Number of TCP SYN packets received.
Number of TCP SYN cookies sent.
Number of TCP SYN cookie send attempts that failed.
Number of TCP packets received.
Number of UDP packets received.
Number of times selection of a real server failed.
Number of times a source NAT failure occurred.
Number of times a TCP SYN cookie failure occurred.
Number of times traffic was dropped because the requested
virtual port was not available.
Number of SYN packets dropped.
Number of SYN packets dropped due to a TCP FIN.
Number of SYN packets dropped due to a TCP Reset.
Number of SYN packets dropped due to an ACK.
Number of packets dropped because the server connection
limit has been reached.
Number of connections reset because the server connection
limit had been reached.
Number of packets dropped because the proxy did not have
an available socket.
Number of packets dropped due to an aFleX policy.
Number of sessions that have aged out.
Number of non-SLB TCP packets received by the AX
device.
Number of non-SLB UDP packets received by the AX
device.
Number of SYN packets that have been throttled.
P e r f o r m a n c e
b y
D e s i g n
Description
Number of packets dropped by global ICMP rate limiting.
Number of packets dropped by ICMP rate limiting enabled
on individual interfaces.
Number of packets dropped by ICMP rate limiting enabled
on individual virtual servers.
Total number of packets dropped by ICMP rate limiting.
P e r f o r m a n c e
b y
Description
Number of packets that have been Layer 2 switched.
Number of packets that have been Layer 3 routed.
Number of IPv4 packets that were dropped due to routing
failures.
Number of IPv6 packets that have been Layer 3 routed.
Number of IPv6 packets that were dropped due to routing
failures.
Number of packets that went to a VIP or NAT for processing.
Number of packets dropped due to incorrect protocol length.
Note: A high value for this counter can indicate a packet
length attack.
Number of packets dropped because the corresponding protocol was disabled.
Number of packets dropped because the protocol was
unknown.
Number of packets dropped due to TTL expiration.
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
67 of 276
IP(TCP)
Fragment
Received
IP Fragment
Overlap
IP Fragment
Overload Drops
IP Fragment
Reasm OKs
IP Fragment
Reasm Fails
Anomaly LAN
Attack Drops
Anomaly IP
Option Drops
Anomaly Pingof-Death Drops
Anomaly All
Frag Drops
Anomaly TCP
No Flag Drops
Anomaly SYN
Frag Drops
Anomaly TCP
SYN Fin Drops
Anomaly Any
Drops
68 of 276
Description
Number of packets dropped because the outgoing link was
down.
Packet drops because of source port suppression.
P e r f o r m a n c e
b y
D e s i g n
SYN rate
exceeded Drop
Packet Error
Drops
IPv6 Frag Reasm
OKs
IPv6 Frag Reasm
Fails
IPv6 Frag
Invalid Pkts
Bad Pkt Drop
IP Frag Exceed
Drop
Description
Number of Bridge Protocol Data Units (BPDUs) received.
Number of Bridge Protocol Data Units (BPDUs) sent.
Number of times traffic was not forwarded due to a deny rule
in an Access Control List (ACL).
This counter also includes traffic dropped due to the l3-vlanfwd-disable action in ACL rules.
Number of packets dropped because the TCP SYN threshold
had been exceeded.
Number of packets dropped due to a packet error.
Number of successfully reassembled IPv6 fragments.
Number of IPv6 fragment reassembly failures.
Number of IPv6 fragments that were invalid.
Number of bad packets dropped.
Number of fragmented IP packets that were dropped because
they exceeded the allowed maximum.
P e r f o r m a n c e
b y
Information is shown for the data interfaces only, not the out-of-band
management interface.
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
69 of 276
Statistics Table
Table 37 describes the columns in the table in the upper half of the page.
TABLE 37 Monitor > Network > Interface
Column
IP Address
Speed
Packets
Bytes
Errors
Other Errors
Description
IP address configured on the interface.
Note: If the AX device is deployed in transparent mode, the
individual interface addresses are all 0.0.0.0/0.
Speed and mode (full-duplex or half-duplex) configured on
the interface.
Number of packets received (RX) and transmitted (TX) on
the interface.
Number of bytes received (RX) and transmitted (TX) on the
interface.
Number of receive (RX) or transmission (TX) errors on the
interface.
Number of errors that were not counted in the Error column.
Statistics Graphs
By default, the following graphs are shown in the lower half of the page:
Packet send and receive statistics
Bits per second send and receive statistics
RX and TX error statistics
Other error statistics
The graphs are for the currently selected interface only (by default,
Ethernet 1). To display graphs for a different interface, click on the row of
information for that interface in the table.
You can hide one or more of the graphs by deselecting the checkbox for the
graph. As soon as you deselect or reselect a graph, the GUI refreshes the
page to hide or redisplay the graph.
These selection fields do not affect the display of statistics in the table.
70 of 276
P e r f o r m a n c e
b y
D e s i g n
Note:
2. Select the End Time using the calendar at the end of the End Time field.
Statistics are available for only the most recent 30 days.
Note:
3. Click Go.
Refreshing Statistics
To manually refresh the statistics, click Refresh. To set them to be refreshed
automatically, select the refresh rate from the drop-down list next to the
Refresh button.
Clearing Statistics
To clear statistics, click Clear. The counters are returned to 0 and begin
incrementing again.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
71 of 276
Description
ID assigned to the trunk by the admin who configured it.
Operation status of the trunk, Up or Down.
Ethernet interfaces that are members of the trunk, and the
status of each interface:
config Configuration status, either enabled (green
checkmark) or disabled (red X).
Ports Threshold
Ports Threshold
Timer
72 of 276
P e r f o r m a n c e
b y
D e s i g n
Note:
Note:
Description
IP address of the device.
MAC address of the device.
Indicates whether the entry is static or dynamic.
For dynamic entries, the number of seconds since the entry
was last used.
State of the ARP entry. The state can be one of the following:
Incomplete
Reachable
Stale
Delay
Probe
Failed
No ARP
Permanent
Interface
VLAN ID
P e r f o r m a n c e
b y
None
AX interface through which the device that has the displayed
MAC address and IP address can be reached.
VLAN through which the device that has the MAC address
can be reached.
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
73 of 276
Description
IP address of the device.
MAC address of the device.
Indicates whether the entry is static or dynamic.
For dynamic entries, the number of seconds since the entry
was last used.
State of the ARP entry. The state can be one of the following:
Incomplete
Reachable
Stale
Delay
Probe
Failed
No ARP
Permanent
Interface
VLAN ID
None
AX interface through which the device that has the displayed
MAC address and IP address can be reached.
VLAN through which the device that has the MAC address
can be reached.
74 of 276
Description
Subnet at the other end of the route.
Network mask for the subnet.
P e r f o r m a n c e
b y
D e s i g n
Description
IP address of the router to which the AX device sends traffic
to reach the destination subnet.
AX interface through which traffic is sent to the next hop.
Origin of the route information:
Connected The route is to a directly connected subnet.
OSPF The route came from OSPF.
RIP The route came from RIP.
Static The route was manually configured by an AX
admin.
Description
Subnet at the other end of the route.
IP address of the router to which the AX device sends traffic
to reach the destination subnet.
AX interface through which traffic is sent to the next hop.
Cost of using this entry.
Index number of this FIB entry.
P e r f o r m a n c e
b y
Description
Subnet at the other end of the route.
IP address of the router to which the AX device sends traffic
to reach the destination subnet.
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
75 of 276
Description
AX interface through which traffic is sent to the next hop.
Cost of using this entry.
Index number of this FIB entry.
76 of 276
Description
System time when the management session started.
Name of the AX admin who opened this session.
IP address from which the admin logged in.
Indicates whether the admin currently has write access. Only
one admin can have write access at a time.
Indicates the management type the session is using: CLI,
Web (GUI), or aXAPI.
P e r f o r m a n c e
b y
D e s i g n
Description
Partition to which the admin is assigned.
For admins with Partition Write, Partition Read, or Partition
RS Operator privileges, the partition name is the name of the
private partition to which the admin is assigned.
For admins with Root, Read Write, or Read Only privileges,
the partition name is shared, unless the admin has changed
partitions. (See System Partitions on page 27.)
P e r f o r m a n c e
b y
Description
Name of the AX admin.
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
77 of 276
Description
Privilege level for the account:
Root Allows access to all levels of the system. This is
the only account that can configure other admin accounts.
Super Admin Allows access to all levels of the system.
This account is not the Root account and can be deleted.
This account cannot configure other admin accounts.
Read Only Admin Allows monitoring access to the system but not configuration access. In the CLI, this account
can only access the User EXEC and Privileged EXEC levels, not the configuration levels. In the GUI, this account
cannot modify configuration information.
Partition Write Admin The admin has read-write privileges within the private partition to which the admin is
assigned. The admin has read-only privileges for the
shared partition.
Partition Read Admin The admin has read-only privileges within the private partition to which the admin is
assigned, and read-only privileges for the shared partition.
Partition RS Operator The admin is assigned to a private
partition but has permission only to view service port statistics for real servers in the partition, and to disable or reenable the real servers and their service ports.
Current Partition
Trusted Host
Lockout Time
Scheduled
Unlock
78 of 276
P e r f o r m a n c e
b y
D e s i g n
Monitor > HA
The HA sub-module displays High Availability (HA) information for the
AX device.
P e r f o r m a n c e
b y
Description
ID of the HA group.
Indicates whether this AX device is in Active or Standby
mode.
Priority value assigned to this HA group on this AX device.
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
79 of 276
Description
Indicates whether the other AX device in the HA pair is in
Active or Standby mode.
Note: If the status is Incompatible Version, the AX devices
are running different software versions and the HA feature is
not compatible between the two versions. This message is
normal during upgrade, after one of the AX devices has been
upgraded and before the other device is upgraded. If the
devices are not being upgraded, it is recommended to
upgrade one of the devices so that they both are running the
same software version.
Priority value assigned to this HA group on the other AX
device.
Peer Priority
80 of 276
Description
Shows the number of HA interfaces designated as server
interfaces that are currently up.
Shows the number of HA interfaces designated as router
interfaces that are currently up.
Shows the number of HA hello (heartbeat) packets sent by
this AX device.
Shows the number of HA hello packets received by this AX
device.
Shows the number of HA connection synchronization (session mirroring) packets sent by this AX device.
Shows the number of HA connection synchronization packets received by this AX device.
P e r f o r m a n c e
b y
D e s i g n
Description
Shows HA error statistics:
In Duplicated HA ID Number of incoming HA hello
(heartbeat) packets that had the same HA ID as the HA ID
of this AX device (the local AX device).
In Invalid Group Number of incoming HA hello packets
that had an invalid group ID.
Version Mismatch Number of incoming HA hello packets that had a packet version mismatch.
HA Set ID Mismatch Number of incoming HA hello
packets that had an HA set ID mismatch.
Missed Heartbeat Total number of heartbeat (hello)
packets expected from the peer HA device that were not
received.
HA Ports
Layer 2 Inline
mode
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
81 of 276
82 of 276
P e r f o r m a n c e
b y
D e s i g n
Config Mode
The Config Mode is where you can view and change the configuration of
the AX device.
Config Modules
The Config Mode offers the following sub-modules for setting AX Series
network and performance parameters:
Get Started
Service
Network
System
HA
P e r f o r m a n c e
b y
Config Mode
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
83 of 276
Template
Virtual Server
Firewall
Application
Firewall Group
Service Group
HTTP
Server
PBSLB Policy
Firewall Node
Template
RAM Caching
Server
SMTP
Server Port
SIP
Virtual Server
RTSP
DNS
DNS Proxy
Geo-location
Policy
Service IP
Class List
Connection Reuse
LID
L4
Global
Settings
DDoS Protection
Rate-Limit Log
GSLB
Site
Zone
TCP
Global
UDP
aFleX
Persistent
Cookie Persistence
Destination IP
Persistence
Source IP Persistence
SSL Session ID
Persistence
SSL
Client SSL
Server SSL
TCP Proxy
IP Source NAT
IPv4 Pool
IPv6 Pool
Group
Binding
Interface
NAT Range
Static NAT
Global
SSL Management
Health Monitor
Certificate
Health Monitor
External Program
Data File
Global
PBSLB
84 of 276
P e r f o r m a n c e
b y
D e s i g n
Interface
Settings
Setting
LAN
Web
HA Global
Management
Terminal
HA Inline Mode
Transparent
Log
HA Interface
Virtual
General
Global
Boot
Config Sync
Sync Operation
Action
Trunk
Admin
VLAN
Administrator
VLAN
Partition
MAC
Lockout Policy
Global
External Authentication
ACL
Change Password
Standard
Access Control
Extended
IPv6
Time
ARP
SNMP
IPv4 ARP
Maintenance
IPv6 Neighbor
Upgrade
Global
Backup
Route
Restore
IPv4 Static
IPv6 Static
DNS
ICMP Rate Limiting
BPDU-Fwd-Group
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
85 of 276
For information about the system settings, see the following sections:
Management IP address and default gateway See Config > Net-
on page 236.
SNMP state, community string, and trap state See Config > Sys-
page 242.
Static route See Config > Network > Route on page 235.
86 of 276
P e r f o r m a n c e
b y
D e s i g n
The Health column indicates the health of the virtual servers. Place the
mouse cursor over a health icon for more information.
You can view or edit the configuration of a virtual port directly from the list
of virtual servers. Click on the Edit icon (
) next to the virtual server
name. Clicking on the icon displays a list of the virtual ports configured on
the virtual server. (See Figure 15.) To access the configuration page for a
virtual port, click on the port number.
FIGURE 15
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
87 of 276
Description
Supported Values
General Section
Name
Wildcard
IP address or
CIDR Subnet
or
Access List
Status
ARP Status
Stats Data
88 of 276
Enabled or Disabled
Default: Enabled
Selected or deselected
Default: Deselected; ARP replies are
enabled.
Enabled or Disabled
Default: Enabled
P e r f o r m a n c e
b y
D e s i g n
HA Group
Virtual Server
Template
PBSLB Policy
Template
Description
Description
Automatically disable the virtual server if all its service ports are down.
If OSPF redistribution of the VIP is enabled, this
option also withdraws the route to the VIP in addition to disabling the virtual server.
High Availability (HA) group ID to use for session
backup.
Note: If the HA Group drop-down list does not have
any group IDs, you still need to configure global
HA parameters. See Config > HA > Setting > HA
Global on page 268.
Binds a virtual server template to the virtual server.
Settings in the template are used to configure the
virtual server.
Some of the parameters that can be set using a virtual server template can also be set on the individual
virtual server. In this case, the setting in the template
has lower priority than the setting on the virtual
server.
Binds a PBSLB policy template to the virtual server.
Settings in the template are used to configure IP
limiting for the virtual server.
Note: You also can bind a PBSLB policy template
to individual virtual ports. IP limiting settings in
both templates take effect. Clients must comply
with all IP limiting rules.
Description of the virtual server.
Supported Values
Enabled or Disabled
Default: Disabled
String
Default: None
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
89 of 276
Description
Supported Values
Port
Default: TCP
0-65535
Service Group
90 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Number of concurrent connections allowed on the
virtual service port.
To specify the action to take for new connection
requests after the limit has been reached, select one
of the following:
Supported Values
0-8000000 (one million)
0 means no limit.
Default: Not set
Drop The AX device silently drops the connection and does not send a reset to the client.
Reset The AX device sends a connection reset
to the client.
Use default
server selection
when preferred
method fails
Selected or deselected
Default: Selected
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
91 of 276
Description
3. Default service group. If none of the items
above results in selection of a server, the
default service group is used.
If the configuration uses only one service
group, this is the default service group.
If the configuration uses multiple service
groups, the default service group is the
one that is used if none of the templates
used by the configuration selects another
service group instead.
The first configuration area that matches the client
or VIP (as applicable) is used, and the client request
is sent to a server in the service group that is applicable to that configuration area. For example, if the
client's IP address in a black/white list, the service
group specified by the list is used for the client
request.
Sends replies to clients back through the last hop on
which the request for the virtual port's service was
received.
Sends a TCP reset (RST) to clients if server selection fails. Server selection failure can occur as the
result of any of the following conditions:
Supported Values
Selected or deselected
Default: Selected
Selected or deselected
Default: Deselected
Enabled or Disabled
Default: Disabled
Status
Enabled or Disabled
Default: Enabled
92 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Backs up session information on the Standby AX
device in an HA configuration. When this option is
enabled, sessions remain up even following a
failover.
Supported Values
Enabled or Disabled
Default: Disabled
Direct Server
Return
SYN Cookie
Enabled or Disabled
Default: Disabled; destination NAT is
enabled.
Enabled or Disabled
Default: Disabled
The SACK option is also disabled by
default.
Note: If hardware-based SYN cookies are supported on the AX model you are configuring, use
that version of the feature instead. (See the Traffic
Security Features chapter of the AX Series Configuration Guide.)
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
93 of 276
Source NAT
traffic against
VIP
Description
Enables collection of statistics data for the virtual
port.
Note: Statistical data collection also must be enabled globally. See Config > Service > SLB >
Global > Settings on page 124.
Enables IP NAT support for the virtual port.
Source IP NAT can be configured on a virtual port
in the following ways:
Supported Values
Enabled or Disabled
Default: Enabled
Enabled or Disabled
Default: Disabled
Virtual Server
Port Template
Some of the parameters that can be set using a virtual server port template can also be set on the individual virtual port. In this case, the setting in the
template has lower priority than the setting on the
virtual port.
Access List
Source NAT
Pool
94 of 276
If the same parameter is set in a virtual server template and a virtual server port template, both of them
apply.
Specifies an ACL to use for permitting or denying
traffic on the virtual server port.
Note: Selecting an ACL here permits or denies traffic on the virtual sport. If you are trying to configure
source NAT on the port, use the ACL-SNAT binding fields instead. (See the end of this table.)
IP address pool to use for IP source NAT.
Note: This option uses a single NAT pool for all
source addresses. To select a NAT pool based on
real server subnet, use the ACL-SNAT binding
fields instead. (See the end of this table.)
ID of a configured ACL
Default: Not set
P e r f o r m a n c e
b y
D e s i g n
Template
ACL-SNAT
Binding
Description
Name of an aFleX policy.
Template(s) to use.
Supported Values
Name of an aFleX policy that has been
imported onto the AX device
Default: Not set
Template type: One of the types
described in Config > Service > Template on page 129.
If a template you want to use is not already configured, you can select create from the drop-down
list for the template type to configure a new template of that type. In this case, when you click OK
after configuring the template, you are returned to
the Virtual Server Port page.
Enables source NAT on the virtual port.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
95 of 276
Description
Supported Values
Type
Algorithm
96 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Weighted Least Connection
Selects a server based on a combination of the servers administratively
assigned weight and the number of
connections on the server.
(cont.)
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
97 of 276
Description
Supported Values
Stateless Source IP Only Hash
Balances server load based on a
hash value calculated using the
source IP address only.
(cont.)
Health Monitor
Min Active
Members
In the field that appears next to Min Active Members, enter the minimum number of primary servers
that can still be active (available), before the backup
servers are used. You can specify 1-63. There is no
default.
Selecting the Min Active Members checkbox also
displays the Skip Priority Set checkbox. By default,
if a primary server becomes unavailable, any
remaining primary servers continue to be used. If
you enable the Skip Priority Set option, the AX
device stops using all primary servers if any of them
become unavailable.
98 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Sends a TCP reset (RST) to clients if server selection fails. Server selection failure can occur as the
result of any of the following conditions:
Supported Values
Enabled or Disabled
Default: Disabled
Stats Data
Description
Enabled or Disabled
Default: Enabled
String
Default: None
Server Section
In the Server section, you can add, change, and delete service group members (servers and service ports). You also
can disable or re-enable service ports within the service group. Select the service ports, then click the button for the
action you want to take. For example, to disable a service port, click the checkbox next to the service port to select
the port, then click Disable.
Disabling or re-enabling a service port within a service group applies only to that service group and does not affect
the ports state in other service groups.
IPv4/IPv6
Selects the address type of the server IP address you Depends on the selection made on the
are planning to enter.
System > Settings > Web - Preference
page. (See Config > System > Settings > Web on page 238.)
Server
Adds a real server to the service group.
Name of a configured real server, or a
valid IP address.
You can select a configured server from the dropdown list or enter the server IP address to create a
new one.
Configure the additional settings described below,
and click Add.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
99 of 276
Server Port
Template
Description
Specifies the service port on the server.
Supported Values
Valid protocol port number, 0-65534.
Priority
Stats Data
1-16
Default: 1
Enabled or Disabled
Default: Enabled
Note: Statistical data collection also must be enabled globally. See Config > Service > SLB >
Global > Settings on page 124.
100 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Name
IP Address/Host
The name is not required to be the hostname configured on the real server.
IP address or DNS hostname of the server.
IP address Specify the real IP address of the
server, not the VIP address to which clients will
send requests.
General Section
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
101 of 276
Weight
Health Monitor
Description
Assigns an external IP address to the server. The
external IP address allows a service IP or server that
has an internal IP address to be reached over the
Internet.
Administrative weight of the server, used for
weighted load balancing.
Specifies the Layer 3 health monitor to use for
checking the server health.
Status
If the monitor you want to use is not already configured, you can select create to configure it. In this
case, when you click OK after configuring the monitor, you are returned to this section.
State of the real server.
Connection
Limit
Connection
Resume
Slow Start
Spoofing Cache
Supported Values
IPv4 or IPv6 address
Default: None configured
1-100
Default: 1
Name of a configured health monitor,
or blank (disabled)
Default: Enabled; ping (ICMP)
Enabled or Disabled
Default: Enabled
1-1000000 (one million) connections
Default: 1000000 (one million)
Selected on unselected
Default: unselected (disabled)
102 of 276
P e r f o r m a n c e
b y
D e s i g n
Server Template
Description
Description
Enables collection of statistics data for the server.
Supported Values
Enabled or Disabled
Note: Statistical data collection also must be enabled globally. See Config > Service > SLB >
Global > Settings on page 124.
Binds a server template to server. Settings in the
template are used to configure the server.
Default: Enabled
String
Default: None
Port Section
In the Port section, you can add, change, and delete service ports. Select the service ports, then click the button for
the action you want to take. For example, to disable a service port, click the checkbox next to the service port to
select the port, then click Disable.
Disabling or re-enabling a service port affects all virtual servers that are bound to service groups that use the port.
Port
Protocol port number.
0-65534
Protocol
Note: If you are configuring IP protocol load balancing, specify port 0, which is a wildcard port. For
more information, see the IP Protocol Load Balancing chapter of the AX Series Configuration
Guide.
Layer 4 transport protocol used by the port.
Weight
TCP or UDP
Default: TCP
1-100
Default: 1
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
103 of 276
Description
Maximum number of connections allowed to the
service port. If the connection limit is exceeded, the
AX device stops sending new connections to the
service port. The AX device does not resume sending connections to the service port until one of the
following occurs:
Supported Values
0-1000000
(0 means unlimited.)
Default: 1000000 (one million)
Connection
Resume
Health Monitor
Follow Port
104 of 276
1-1000000
Default: 0
P e r f o r m a n c e
b y
D e s i g n
Description
Binds a server port template to the service port. Settings in the template are used to configure the port.
Supported Values
Configured port template.
Default: default port template.
Stats Data
Enabled or Disabled
Default: Enabled
Note: Statistical data collection also must be enabled globally. See Config > Service > SLB >
Global > Settings on page 124.
set or changed from its default on the individual server or port, the setting in the template takes precedence.
To view and configure server and port templates, select the following
options:
Template > Server
Template > Server Port
Template > Virtual Server
Template > Virtual Server Port
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
105 of 276
Supported Values
106 of 276
P e r f o r m a n c e
b y
D e s i g n
Supported Values
State: Enabled or Disabled
Connection Limit 1-1048575 connections per second
Connection Resume 1-1048575 connections
Default: 8000000 (8 million) connections per second
Connection Resume Maximum number of connections the server can have before the AX
device resumes use of the server.
Connection Rate
Limit
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
107 of 276
Supported Values
State: Enabled or Disabled
From 1-4095 new connections
By One of the following:
Multiplying 2-10
Adding 1-4095 new connections
Every 1-60 seconds
Till 1-65535
Default: Disabled. When you enable
the feature, it has the following
defaults:
From 128 new connections
By Multiplying, 2
Every 10 seconds
Till 4096 concurrent connections
108 of 276
P e r f o r m a n c e
b y
D e s i g n
Minimum TTL
Ratio
Maximum
Dynamic Server
Number
Prefix of
Dynamic Server
Supported Values
1-1440 minutes (one day)
Default: 10 minutes
2-15
Default: 2
1-1023
Default: 255
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
109 of 276
Supported Values
Name
Health Monitor
Weight
110 of 276
P e r f o r m a n c e
b y
D e s i g n
Supported Values
State: Enabled or Disabled
Connection Limit 1-1048575 connections per second
Connection Resume 1-1048575 connections
Default: 8000000 (8 million) connections per second
Connection Resume Maximum number of connections the port can have before the AX device
resumes use of the port.
Connection Rate
Limit
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
111 of 276
Supported Values
State: Enabled or Disabled
From 1-4095 new connections
By One of the following:
Multiplying 2-10
Adding 1-4095 new connections
Every 1-60 seconds
Till 1-65535
Default: Disabled. When you enable
the feature, it has the following
defaults:
From 128 new connections
By Multiplying, 2
Every 10 seconds
Till 4096 concurrent connections
Source NAT
Pool
112 of 276
P e r f o r m a n c e
b y
D e s i g n
DSCP
Inband Health
Check
Supported Values
Enabled or Disabled
Default: Enabled
1-63
Default: Not set
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
113 of 276
Supported Values
Retry counter: 0-7
Reassignments: 0-255
Default: Disabled. When you enable it,
the default number of retries is 2 and
the default number of reassignments
is 25.
Dynamic
Member Priority
114 of 276
P e r f o r m a n c e
b y
D e s i g n
Name
Connection
Limit
Supported Values
Connection Rate
Limit
Logging Generates a log message when a virtual server exceeds its connection limit.
Limits the rate of new connections the AX device is
allowed to send to servers that use this template.
When a real server reaches its connection rate limit,
the AX device stops selecting the server for client
requests.
When you select the Connection Rate Limit checkbox, an entry field appears. Enter the maximum of
new connections allowed on a server. You can specify 1-1048575 connections.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
115 of 276
Supported Values
State: Enabled or Disabled
Normal Rate 1-65535 packets per
second
Normal Rate Maximum number of ICMP packets allowed per second before the AX device
locks up ICMP traffic to the virtual server. When
ICMP traffic is locked up, all ICMP packets are
dropped until the lockup expires.
Lockup Status checkbox Selecting this checkbox displays the Lockup Rate and Lockup Period
fields.
Default: Disabled
Specifying a maximum rate (lockup
rate) and lockup period is optional. If
you do not specify them, lockup does
not occur.
Subnet
Gratuitous ARP
Config > Service > SLB > Template > Virtual Server Port
The Virtual Server Port Template page lists the configured virtual server
port templates. This page is displayed when you click Add or click on a virtual server port template name.
Table 54 lists the virtual server port template parameters you can configure.
116 of 276
P e r f o r m a n c e
b y
D e s i g n
Supported Values
Connection Rate
Limit
Logging Generates a log message when a virtual port exceeds its connection limit.
Limits the rate of new connections the AX device is
allowed to send to virtual ports that use this template. When a virtual port reaches its connection
rate limit, the AX device stops selecting the virtual
port for client requests.
When you select the Connection Rate Limit checkbox, an entry field appears. Enter the maximum of
new connections allowed on a virtual port. You can
specify 1-1048575 connections.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
117 of 276
Supported Values
Enabled or disabled
Default: Disabled
Note:
In the current release, Layer 7 request limiting applies only to the HTTP,
HTTPS, and fast-HTTP virtual port types.
You can apply source IP limiting on a system-wide basis, on individual virtual servers, or on individual virtual ports.
Using class lists, you can configure different classes of clients, and apply a
separate set of IP limits to each class. You also can exempt specific clients
from being limited.
118 of 276
P e r f o r m a n c e
b y
D e s i g n
Note:
IP Address Matching
By default, the AX device matches class-list entries based on the source IP
address of client traffic. Optionally, you can match based on one of the following instead:
Destination IP address Matches based on the destination IP address
header in the HTTP request. You can specify the header when you
enable this option.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
119 of 276
120 of 276
P e r f o r m a n c e
b y
D e s i g n
If the class list contains 100 or more entries, it is recommended to use the
File option.
Note:
A class list can be exported only if you use the File option.
6. Configure the class list entries:
a. Enter the IP address and subnet mask.
For a host entry, use mask 255.255.255.255.
For a wildcard entry, enter IP address 0.0.0.0 and network mask
0.0.0.0.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
121 of 276
Make sure to use the same number when you configure the IP limiting
rule.
c. Click Add.
d. Repeat for each entry.
7. Click OK.
for a client within the limit period. You can specify 1-4294967295 connections. The limit period can be 100-6553500 milliseconds (ms), specified in increments of 100 ms. There is no default.
Request limit Maximum number of concurrent Layer 7 requests
client within the limit period. You can specify 1-4294967295 connections. The limit period can be 100-6553500 milliseconds (ms), specified
in increments of 100 ms. There is no default.
122 of 276
P e r f o r m a n c e
b y
D e s i g n
limit action after the client exceeds a limit. The lockout period is activated when a client exceeds any limit. The lockout period can be 1-1023
minutes. There is no default.
Logging Generates log messages when clients exceed a limit. Logging
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
123 of 276
Supported Values
Settings Section
DSR Health
Check
Graceful
Shutdown
Max Session
Life
124 of 276
Maximum session life for client sessions. The maximum session life controls how long the AX device
maintains a session table entry for a client-server
session after the session ends.
The maximum session life allows time for retransmissions from clients or servers, which can occur if
there is an error in a transmission.
Enabled or Disabled
Default: Disabled
P e r f o r m a n c e
b y
D e s i g n
Stats Data
Supported Values
Disabled or Enabled
On Threshold 0-2147483647 halfopen connections
Off Threshold 0-2147483647 halfopen connections
Default: Disabled
Note: If you leave the On Threshold
and Off Threshold fields blank, SYN
cookies are enabled and are always on
regardless of the number of half-open
TCP connections present on the AX
device.
Enabled or Disabled
Default: Enabled
CPU
Memory
Disk
Interfaces
L7 Request
Accounting
Compression
Block Size
Maximum Size
aFleX
Fast Path
Processing
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
Enabled or Disabled
Default: Disabled
Enabled or Disabled
Default: Disabled
6000-32000 Bytes
Default: 16000
16-256 KB
Default: 32
125 of 276
Supported Values
Enabled or disabled
Default: Disabled
Source NAT
traffic against
VIP
1-1000000 seconds
Default: 300 seconds
Disabled or Enabled
Default: Disabled
126 of 276
P e r f o r m a n c e
b y
D e s i g n
Supported Values
Disabled or Enabled
Default: Disabled
Selected or unselected
thresholds.
Default: unselected
Hardware Buffer
Relief Threshold
System Buffer
Config > Service > SLB > Global > DDoS Protection
The options on this page enable protection against distributed denial-ofservice (DDoS) attacks.
Table 56 lists the DDoS protection options.
All options are supported for IPv4. All options except IP Option are supported for IPv6.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
127 of 276
Description
Enables all the DDoS protection options listed below.
Drops all packets that contain any IP options.
Drops spoofed SYN packets containing the same IP address
as the source and destination, which can be used to launch
an IP land attack.
Drops all jumbo IP packets longer than the maximum valid
IP packet size (65535 bytes), known as ping of death
packets.
Ping-of-Death
Frag
TCP No Flags
TCP SYN Fin
TCP SYN Frag
Out of Sequence
Zero Window
Bad Content
128 of 276
P e r f o r m a n c e
b y
D e s i g n
Supported Values
Remote Local
Logging
Excluding
1-100
Default: 32
1-100000
Default: 15000
Local or Remote
Default: logging to both destinations is
enabled.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
129 of 276
Description
Supported Values
Name
Failover URL
Strict
Transaction
Switching
Forces the AX device to perform the server selection process anew for every HTTP request. Without
this option, the AX device reselects the same server
for subsequent requests (assuming the same server
group is used), unless overridden by other template
options.
Inserts the clients source IP address into HTTP
headers. If you specify an HTTP header name, the
source address is inserted only into headers with
that name.
HTTP Section
Client IP header
insert
Retry HTTP
Request
1-3 retries
Default: Disabled. The AX device
sends the 5xx status code to the client.
When you enable this feature, the
default mode is on HTTP 5xx code,
and the default number of retries is 3.
on HTTP 5xx code for each Does not stop sending client requests to a service port following
reassignment.
Terminate HTTP
1.1 client when
request has
Connection:
close
130 of 276
Enabled or disabled
Default: Disabled. Sessions for noncompliant HTTP 1.1. clients are not
terminated.
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Response
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
131 of 276
Description
Supported Values
URL or Host
URL switching
132 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Selects a service group based on the value in the
Host field of the HTTP header. The selection overrides the service group configured on the virtual
port.
Host Host string to match on. If the host-name
does not match, the service group configured on
the virtual port is used.
Supported Values
Each host string can be all or part of an
IP address or host name.
Default: Not set
URL Hash
First or Last
4-128 bytes
Default: Not set
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
133 of 276
Description
Enables server load awareness.
Note: This option applies only to URL hash switching. This option requires custom configuration on
the real servers. For information, see the AX Series
2.4.3 Release Notes.
Supported Values
Enabled or Disabled
Default: Disabled
HTTPS Rewrite
Compression Section
Note: Compression is supported only for HTTP and HTTPS virtual ports. Compression is not supported for fastHTTP virtual ports.
Compression
Offloads Web servers from CPU-intensive HTTP
Enabled or Disabled
compression operations.
Default: Disabled
Keep Accept
Decoding
Allows the real server to perform the HTTP compression instead of the AX Series device.
Level
Min Content
Length
Content Type
Exclude Content
Type
134 of 276
Enabled or Disabled
Default: Disabled
1-9
Default: 1
0-2147483647 bytes.
Default: 120 bytes
P e r f o r m a n c e
b y
D e s i g n
Description
Explicitly excludes an individual URI from being
compressed.
Supported Values
The URI string can be 1-31 characters.
An HTTP template can exclude up to
10 URI strings.
Config > Service > Template > Application > PBSLB Policy
The PBSLB Policy page displays the configured Policy-Based Routing
(PBSLB) policy templates. This page is displayed when you click Add or
click on a template name.
Table 59 lists the parameters you can configure in RAM Caching templates.
TABLE 59 PBSLB Policy Template Parameters
Parameter
Description
Supported Values
Name
PBSLB
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
135 of 276
Description
c. Optionally, enable logging. To change the logging interval, edit the number in the Period field.
Logging generates messages to indicate that traffic matched the group ID.
d. To generate log messages only when there is a
failed attempt to reach a service group, select Log
Failures only.
e. Click Add. The group settings appear in the
PBSLB list.
f. Repeat the steps above for each group.
3. Select the action to take when traffic exceeds the
limit: Drop or Reset.
Supported Values
Name of a black/white list either created on or imported onto the AX
device. Default: none
Parameters for each group:
Group ID No default
Action Drop, Reset, or a service
group name. Default: Drop
Logging Default: disabled
Period 0-60 minutes. Default: 3
Log Failures Only Default: disabled
Over Limit Action Lockout or
Reset. Default: drop
IP Limiting
(Class List)
(cont.)
136 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Request limit Maximum number of concurrent
Layer 7 requests allowed for a client.
(cont.)
Supported Values
Client IP L3 Source IP, L3 Destination IP, or L7 Header Name. For
L7 Header Name, you can specify
the header name or use the default.
(See below.)
Defaults:
Class list None
Limit ID (LID) None
Connection limit None
Connection-rate limit None
Request limit None
Request-rate limit None
Over-limit action Drop
Lockout period None
Logging Disabled. When logging
is enabled, the default logging
period is 0 (no wait period).
Client IP L3 Source IP. If you
select L7 Header Name, the default
header name is X-Forwarded-For.
Use Destination
IP
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
Enabled or disabled
Default: Disabled. Source traffic is
matched against the black/white list.
137 of 276
Description
Enables overlap matching mode. If there are overlapping addresses in the black/white-list, use this
option to enable the AX device to find the most precise match.
Supported Values
Enabled or disabled
Default: Disabled
Config > Service > Template > Application > RAM Caching
This option displays the configured RAM caching templates.
The RAM Caching and Policy sections are displayed when you click Add or
click on a template name.
Table 60 lists the parameters you can configure in RAM Caching templates.
TABLE 60 RAM Caching Template Parameters
Parameter
Description
Supported Values
Age
138 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Specifies the minimum object size that can be
cached. The AX device will not cache objects
smaller than this size.
Max Content
Size
Replacement
Policy
Accept Reload
Request
Supported Values
0-4194303 bytes (4 MB)
If you specify 0, all objects smaller
than or equal to the maximum content
size can be cached.
Default: 512 bytes
0-4194303 bytes (4 MB)
If you specify 0, no objects can be
cached.
Default: 81920 bytes (80 KB)
Least Frequently Used
Default: Least Frequently Used
Default: Disabled
Cache-Control: no-cache
Cache-Control: max-age=0
Verify Host
Default Policy
No-Cache
Insert Age
Insert Via
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
Default: Disabled
Default: Disabled
(The default action is to cache cacheable objects.)
139 of 276
Description
Supported Values
Policy Section
This section enables you to configure policies for dynamic RAM caching. Dynamic RAM caching policies override and augment standard HTTP behavior.
To configure a cache policy:
1. In the URI field, enter the portion of the URI string to match on.
2. Select Cache from the Action drop-down list. The Duration field appears.
3. By default, the content is cached for the number of seconds specified in the Age field of the RAM Caching section. To override the aging period, specify the number of seconds in the Duration field.
4. Click Add.
To configure a no-cache policy:
1. In the URI field, enter the portion of the URI string to match on.
2.Select No Cache from the Action drop-down list.
3. Click Add.
To configure an invalidate policy:
1. In the URI field, enter the portion of the URI string to match on.
2. Select Invalidate from the Action drop-down list. The Pattern field appears. Enter the portion of the URL string
on which to match. For example, to invalidate /list objects when the URL contains /add, enter /add (without
the quotation marks).
Notes:
If a URI matches the pattern in more than one policy rule, the rule with the most specific match is used.
In the current release, matching is performed based on containment. All URIs that contain the pattern string
match the rule. For example, the following policy matches all URIs that contain the string .jpg and sets the
cache timeout for the matching objects to 7200 seconds: policy uri .jpg cache 7200
Wildcard characters (for example: ? and *) are not supported in RAM Caching policies. For example, if the
string pattern contains *, it is interpreted literally, as the * character.
140 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Name
Supported Values
SMTP Section
STARTTLS
Command
Disabled
Server Domain
Service Ready
Message
Default: Disabled
Any of the following: VRFY, EXPN,
TURN
Default: VRFY, EXPN, and TURN are
enabled
String
Default: mail-server-domain
String
Default: ESMTP mail service ready
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
141 of 276
Description
Supported Values
Description
Name
Supported Values
SIP Section
Header Erase
Header Insert
Header Replace
142 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Name of a configured service group of SIP Registrar servers.
Number of minutes a call can remain idle before the
device terminates it.
Supported Values
Name of a configured service group
1-250 minutes
Default: 30 minutes
ID of an extended ACL.
Default: not set
Server
Keep-Alive
Insert Client IP
Note: If connection reuse is configured, even if client keepalive is disabled, the AX device will
respond to a client SIP ping with a pong.
Specifies how often the AX device sends a SIP ping
on each reusable connection with the SIP server.
The AX device silently drops the servers pong
reply.
Note: For configurations that use a connectionreuse template, if the server does not reply to a SIP
ping within the timeout set in the connection-reuse
template, the AX device closes the connection. (The
connection-reuse timeout is configured by the
Timeout option in the connection-reuse template.)
Inserts an X-Forwarded-For: IP-address:port
header into SIP packets from the client to the SIP
server. The header contains the client IP address and
source protocol port number. The AX device uses
the header to identify the client when forwarding a
server reply.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
5-300 seconds
Default: 30
143 of 276
Description
Specifies the AX response when selection of a SIP
client fails.
Supported Values
The action can be one of the following:
Drop
Select Server
Fail Action
Exclude
Translation Start
Line
144 of 276
Send message
Default: Reset
Exclude
Translation Body
Reset
Enabled or disabled
Default: Disabled. (The virtual IP
address and port are not excluded from
translation.)
Enabled or disabled
Default: Disabled. (The virtual IP
address and port are not excluded from
translation.)
P e r f o r m a n c e
b y
D e s i g n
Description
Disables translation of the virtual IP address and
virtual port within the header of SIP messages.
When you select the checkbox, the Header Name
field appears. Enter the name of the header to
exclude from translation, then click Add.
Note: The AX device will not translate server
addresses or protocol port numbers in the following
headers:
Call-ID header
X-Forwarded-For header
Via headers, except for the top Via header
Supported Values
Valid header name
Default: When a client sends a SIP
request, the request is addressed to the
virtual IP address (VIP) and protocol
port number configured on the AX
device for the SIP servers. The AX
device translates the destination IP
address and port of the request from
the VIP to the real IP address and port
of a SIP server. The AX device does
not change the client IP address or
source protocol port number.
Likewise, when the AX device
receives a SIP packet from a SIP
server, the AX device translates the
source IP address and port from the
servers real IP address and SIP port to
the VIP address and port, then sends
the packet to the client.
By default, the AX device also translates the client IP address and protocol
port number where they are used in
some other parts of the SIP packet.
Description
Supported Values
RTSP Section
Name
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
145 of 276
Description
Service group to which to send requests for a specific URI.
Supported Values
URI and name of a configured service
group
Default: Requests are sent to the service group that is bound to the virtual
port.
Description
Supported Values
DNS Section
Name
Malformed
Query
146 of 276
P e r f o r m a n c e
b y
D e s i g n
ents request. Instead, the AX device frees the connection only after
receiving a response to the request.
SIP over TCP While the AX device is sending a client request on a
Description
Supported Values
Name
Limit Per Server
Smart Flow
Control
Timeout
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
1-3600 seconds
Default: 2400 seconds (40 minutes)
147 of 276
Description
Specifies the number of new reusable connections
to open before beginning to reuse existing connections.
Supported Values
1-1024 connections
Default: 100
Note: This option is applicable only for SIP-overTCP sessions. The option is not applicable to other
types of sessions, such as HTTP sessions.
Note:
The Limit Per Server option is set to a very low value, lower than the
limit-per-server option.
Description
Supported Values
Name
Idle Timeout
TCP Section
148 of 276
P e r f o r m a n c e
b y
D e s i g n
Reset Forward
Reset Receive
Description
Sets the initial TCP window size in SYN ACK
packets to clients. The TCP window size in a SYN
ACK or ACK packet specifies the amount of data
that a client can send before it needs to receive an
ACK.
Supported Values
You can set the initial TCP window
size to 1-65535 bytes.
If the virtual port is one of the service types that is proxied by the AX
device, initial TCP window size
applies to SYN ACKs generated by
the AX device and sent to clients.
By default, the AX device uses the
TCP window size in the clients
SYN. The following service types
are proxied by the AX device: http,
https, fast-http, ssl-proxy, and smtp
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
149 of 276
Description
Supported Values
UDP Section
Name
Idle Timeout
Aging
Immediate aging:
Response Received
Session is terminated within 1 second.
Short aging:
Response Received
Session is terminated within 1 second.
No Response Session is terminated after configured short aging period.
Select another
server if server is
down
Enabled or disabled
Default: Disabled
Config > Service > Template > Persistent > Cookie Persistence
This option displays the configured cookie persistence templates.
The Cookie Persistence section is displayed when you click Add or click on
a template name.
150 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Cookie Name
Domain
Path
Match Type
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
151 of 276
Description
If you select Server, the Scan All Members
checkbox appears. You can select this option to
scan all members bound to the template. This
option is useful in configurations where matchtype Server is used, and where some members
have different priorities or are disabled. For
example, without this option, if you occasionally
lower the priority of members to perform maintenance on them, it is possible that fast-path member selection (enabled when you select Server)
will select the members and send traffic to them
anyway. (For more information about this option,
see the Scan-All-Members Option in Persistence
Templates chapter in the AX Series Configuration Guide.)
Supported Values
You can select one of the following:
Port
Server
With either of these options, the Service Group option can be selected. The
Scan All Members option is valid only
if you select the Server option.
Default: Port, with Service Group and
Scan All Members options disabled
Insert Always
Dont Honor
Conn Rules
Enabled or disabled
Default: Disabled. The AX device
inserts a persistence cookie only if the
client request does not already contain
a persistence cookie inserted by the
AX device, or if the server referenced
by the cookie is unavailable.
Enabled or disabled
Default: Disabled.
Config > Service > Template > Persistent > Destination IP Persistence
This option displays the configured destination-IP persistence templates.
The Destination IP Persistence section is displayed when you click Add or
click on a template name.
152 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Match Type
Granularity of persistence.
Port Traffic to the same destination IP address
and virtual port is always sent to the same real
port. This is the most granular setting.
Server Traffic to a given destination IP address
is always sent to the same real server, for any
service port.
Service Group This option is applicable if you
also plan to use URL switching or host switching.
If you use the Service-group option, URL or host
switching is used for every request to select a service group. The first time URL or host switching
selects a given service group, the load-balancing
method is used to select a real port within the service group. The next time URL or host switching
selects the same service group, the same real port
is used. Thus, service group selection is performed for every request, but once a service
group is selected for a request, the request goes to
the same real port that was selected the first time
that service group was selected.
To use URL switching or host switching, you also
must configure an HTTP template with the Host
Switching or URL Switching option.
(cont.)
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
153 of 276
Timeout
Dont Honor
Conn Rules
Netmask
Description
If you select Server or Service Group, the Scan All
Members checkbox appears. You can select this
option to scan all members bound to the template.
This option is useful in configurations where matchtype Server or Service Group is used, and where
some members have different priorities or are disabled. For example, without this option, if you occasionally lower the priority of members to perform
maintenance on them, it is possible that fast-path
member selection (enabled when you select Server
or Service Group) will select the members and send
traffic to them anyway. (For more information about
this option, see the Scan-All-Members Option in
Persistence Templates chapter in the AX Series
Configuration Guide.)
Number of seconds the mapping of a client source
IP to a real server persists after the last time traffic
from the client is sent to the server.
Ignores connection limit settings configured on real
servers and real ports. This option is useful for
applications in which multiple sessions (connections) are likely to be used for the same persistent
destination IP address.
Specifies the granularity of IP address hashing for
initial server port selection.
You can specify an IPv4 network mask in dotted
decimal notation.
Supported Values
You can select one of the following:
Port
Server
Service Group
The Scan All Members checkbox can
be selected with Server or Service
Group.
Default: Port
154 of 276
P e r f o r m a n c e
b y
D e s i g n
Config > Service > Template > Persistent > Source IP Persistence
This option displays the configured source-IP persistence templates.
The Source IP Persistence section is displayed when you click Add or click
on a template name.
Table 70 lists the parameters you can configure in Source-IP persistence
templates.
TABLE 70 Source-IP Persistence Template Parameters
Parameter
Description
Supported Values
Name
Granularity of persistence.
Port Traffic from a given client to the same virtual port is always sent to the same real port. This
is the most granular setting.
Server Traffic from a given client to the same
VIP is always sent to the same real server, for any
service port requested by the client.
Service Group This option is applicable if you
also plan to use URL switching or host switching.
If you use the Service-group option, URL or host
switching is used for every request to select a service group. The first time URL or host switching
selects a given service group, the load-balancing
method is used to select a real port within the service group. The next time URL or host switching
selects the same service group, the same real port
is used. Thus, service group selection is performed for every request, but once a service
group is selected for a request, the request goes to
the same real port that was selected the first time
that service group was selected.
To use URL switching or host switching, you also
must configure an HTTP template with the Host
Switching or URL Switching option.
(cont.)
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
155 of 276
Timeout
Dont Honor
Conn Rules
Netmask
Description
If you select Server or Service Group, the Scan All
Members checkbox appears. You can select this
option to scan all members bound to the template.
This option is useful in configurations where matchtype Server or Service Group is used, and where
some members have different priorities or are disabled. For example, without this option, if you occasionally lower the priority of members to perform
maintenance on them, it is possible that fast-path
member selection (enabled when you select Server
or Service Group) will select the members and send
traffic to them anyway. (For more information about
this option, see the Scan-All-Members Option in
Persistence Templates chapter in the AX Series
Configuration Guide.)
Number of seconds the mapping of a client source
IP to a real server persists after the last time traffic
from the client is sent to the server.
Note: The timeout for a source-IP persistent session
will not be reset if the timeout in the source-IP persistence template is set to 1 minute. If the timeout is
set to 1 minute, sessions will always age out after 1
minute, even if they are active.
Ignores connection limit settings configured on real
servers and real ports. This option is useful for
applications in which multiple sessions (connections) are likely to be used for the same persistent
client source IP address.
Specifies the granularity of IP address hashing for
server port selection.
Supported Values
You can select one of the following:
Port
Server
Service Group
The Scan All Members checkbox can
be selected with Server or Service
Group.
Default: Port
Enabled or disabled
Default: Disabled.
156 of 276
P e r f o r m a n c e
b y
D e s i g n
Config > Service > Template > Persistent > SSL Session ID Persistence
This option displays the configured SSL session-ID persistence templates.
The SSL Session ID Persistence section is displayed when you click Add or
click on a template name.
Table 71 lists the parameters you can configure in SSL session-ID persistence templates.
TABLE 71 SSL Session-ID Persistence Template Parameters
Parameter
Description
Supported Values
Name
Timeout
Dont Honor
Conn Rules
Config > Service > Template > SSL > Client SSL
This option displays the configured Client SSL templates.
The following configuration sections are displayed when you click Add or
click on a template name.
Client SSL
Client Certificate Check
SSL Cipher
Table 72 lists the parameters you can configure in client SSL templates.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
157 of 276
Description
Supported Values
Certificate Name
Cache Size
Pass Phrase
Confirm Pass
Phrase
158 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Require The AX device requires
the client certificate. This action
requests the client to send its certificate. However, the SSL handshake
does not proceed (it fails) if the client sends a NULL certificate or the
certificate is invalid.
(cont.)
Close Notify
CA Cert Name
Cert-Revocation
List
Sends a close_notify message when an SSL transaction ends, before sending a FIN.
Default: Ignore
Enabled or disabled
Default: disabled
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
159 of 276
Config > Service > Template > SSL > Server SSL
This option displays the configured Server SSL templates.
The following configuration sections are displayed when you click Add or
click on a template name.
Server SSL
SSL Cipher
Table 73 lists the parameters you can configure in Server SSL templates.
TABLE 73 Server SSL Template Parameters
Parameter
Description
Supported Values
CA Cert Name
160 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Name
FIN Timeout
Idle Timeout
Retransmit
Retries
SYN Retries
Time Wait
Receive Buffer
Transmit Buffer
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
1-20
Default: 3
1-20
Default: 5
1-60 seconds
Default: 5 seconds
1-2147483647 bytes
Default: 87380 bytes
1-2147483647 bytes
Default: 16384 bytes
161 of 276
Nagle
Description
Sets the initial TCP window size in SYN ACK
packets to clients. The TCP window size in a SYN
ACK or ACK packet specifies the amount of data
that a client can send before it needs to receive an
ACK.
Supported Values
You can set the initial TCP window
size to 1-65535 bytes.
If the virtual port is one of the service types that is proxied by the AX
device, initial TCP window size
applies to SYN ACKs generated by
the AX device and sent to clients.
By default, the AX device uses the
TCP window size in the clients
SYN. The following service types
are proxied by the AX device: http,
https, fast-http, ssl-proxy, and smtp
162 of 276
P e r f o r m a n c e
b y
D e s i g n
In the Method section, you can select Internal or External. Leave the
method set to Internal if you want to configure a method using method
settings available on the AX device. In this case, select the service type
from the Type drop-down list.
To use an imported script as the method, click External.
Description
Supported Values
Consec Pass
Reqd
Interval
Timeout
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
163 of 276
Description
Force the AX device to wait until all retries are
unsuccessful before marking a server or port Down.
This option is applicable only to some types of
health monitors, such as HTTP health monitors. For
example, this command applies to HTTP health
monitors that expect a string in the server reply. By
default, if the servers HTTP port does not reply to
the first health check attempt with the expected
string, the AX device immediately marks the port
Down.
Supported Values
Selected (enabled) or unselected (disabled)
Default: Disabled
Disable After
Down
Disables the target of a health check if the target fails the health check.
Override IPv6
Override Port
Method
164 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Internal method used for the health monitor.
Supported Values
One of the following:
ICMP
TCP
UDP
HTTP
HTTPS
FTP
SMTP
POP3
SNMP
DNS
RADIUS
LDAP
RTSP
SIP
NTP
Compound
Default: ICMP
Alias Address
HalfOpen
1-65534
Default: 80
False The AX device does respond to
the SYN ACK by sending an ACK.
True The AX device sends a RST
(Reset).
Default: False
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
165 of 276
Description
Supported Values
1-65534
Default: 61
Host
URL
1-65534
Default: 80
String
User
String
Password
Expect
166 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Specifies a response code that indicates the server
status should be changed to Maintenance.
When a servers health status is Maintenance, the
server will accept new requests on existing cookiepersistent or source-IP persistent connections, but
will not accept any other requests.
The Maintenance health status applies to server
ports and service-group members. When a ports
status changes to Maintenance, this change applies
to all service-group members that use the port.
Supported Values
String or response code(s)
Default: Not set
Host
URL
1-65534
Default: 443
String
User
String
Password
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
167 of 276
Maintenance
Code
Description
Specifies a response code or string expected from
the server, in which case this value is also expected.
To specify a range of response codes, use a dash ( - )
between the low and high numbers of the range. Use
commas to delimit individual code numbers or separate ranges. Select Code.
Specifies a response code that indicates the server
status should be changed to Maintenance.
When a servers health status is Maintenance, the
server will accept new requests on existing cookiepersistent or source-IP persistent connections, but
will not accept any other requests.
The Maintenance health status applies to server
ports and service-group members. When a ports
status changes to Maintenance, this change applies
to all service-group members that use the port.
Supported Values
String or response code(s)
Default: The AX device expects
response code 200 (OK).
1-65534
Default: 21
User
String
Password
Domain
168 of 276
1-65534
Default: 25
A10
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
User
Password
1-65534
Default: 110
String
Default: a10
String
Default: a10
Operation
OID
OID requested.
Community
1-65534
Default: 161
Domain /
IP Address
radio button
Domain
IP Address
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
1-65534
Default: 53
Domain or IP Address
Default: Domain
169 of 276
Description
For health checks sent to a domain name, specifies
the record type the responding server is expected to
send in reply to health checks.
Supported Values
One of the following:
A IPv4 address record
CNAME Canonical name record
for a DNS alias
SOA Start of authority record
PTR Pointer record for a domain
name
MX Mail Exchanger record
TXT Text string
AAAA IPv6 address record
Recursion
Expect
Default: A
Enabled or disabled
Default: Enabled
0-15
Default: The expect list is empty, in
which case the AX device expects status code 0 (No error condition).
User
Password
User password.
Default: a10
String
Default: a10
String
Secret
1-65534
Default: 1812
String
Default: a10
SSL
1-65534
Default: 389
Selected or unselected
Default: unselected
170 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Species the Distinguished Name.
Supported Values
String
String
URL
1-65534
Default: 554
Register
TCP
1-65534
Default: 5060
Selected or unselected
Default: unselected
Selected or unselected
Default: unselected
1-65534
Default: 123
Arguments
Server Port
Strings
Default: Not set
1-65534
Default: 0
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
171 of 276
Description
Supported Values
172 of 276
b y
D e s i g n
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
173 of 276
Consec Pass
Reqd
Interval
Timeout
Description
Specifies the Maximum number of times the AX
device will send the same health check to an unresponsive server before determining that the server is
down.
Number of consecutive times the device must pass
the same periodic health check, in order to be
marked Up.
Number of seconds between health check attempt.
A health check attempt consists of the AX device
sending a packet to the server. The packet type and
payload depend on the health monitor type. For
example, an HTTP health monitor might send an
HTTP GET request packet.
Number of seconds the AX Series waits for a reply
to a health check.
Note: This option is not applicable to external
health monitors.
Supported Values
1-5
Default: 3
1-10
Default: 1
1-180 seconds
Default: 5 seconds
1-12 seconds
Default: 5 seconds
174 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
PBSLB Section
Name
Interval
(Remote only)
Use
Management
Port
Protocol
(Remote only)
Host
(Remote only)
Location
(Remote only)
Definition
60 86400 seconds
Default: 300 seconds
Enabled or disabled
Default: Disabled
TFTP
Valid IP address or hostname
(Local only)
Default: None
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
175 of 276
Description
Supported Values
1-31 characters
Health Monitor
Stats Data
Note: Statistical data collection also must be enabled globally. See Config > Service > SLB >
Global > Settings on page 124.
Member Section
In the Member section, you can add, change, and delete firewall nodes. Select the firewall nodes, then click the
button for the action you want to take. For example, to disable a firewall node, click the checkbox next to the firewall node to select it, then click Disable.
Firewall
Adds a firewall to the firewall service group.
Configured firewall node
Priority
176 of 276
P e r f o r m a n c e
b y
D e s i g n
Status
Supported Values
HA Connection
Mirror
HA Group
Firewall Group
TCP Idle
Timeout
Enabled or Disabled
Default: Enabled
Enabled or Disabled
Default: Disabled
1 or 2
Default: not set
Name of a configured firewall group
Default: not set
60-15000 seconds
Default: 300 seconds
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
177 of 276
Source IP
Persistence
Template
Stats Data
Supported Values
60-15000 seconds
Default: 300 seconds
Enabled or Disabled
Default: Enabled
Note: Statistical data collection also must be enabled globally. See Config > Service > SLB >
Global > Settings on page 124.
Port Section
To add a service port to the firewall virtual server, click Add. The Port section appears, where you can configure
the following parameters.
Port
Service port number.
1-65534
Type
Default: 80
One of the following:
TCP
UDP
Default: TCP
Name of a configured firewall group
Firewall Group
Status
If you specify a firewall group at this level, the firewall group specified here takes precedence over the
firewall group specified at the firewall level.
State of the firewall virtual port.
Enabled or Disabled
Default: Enabled
178 of 276
P e r f o r m a n c e
b y
D e s i g n
Idle Timeout
Source IP
Persistence
Template
Stats Data
Supported Values
Enabled or Disabled
Default: Disabled
60-15000 seconds
Default: 300 seconds
Enabled or Disabled
Default: Enabled
Note: Statistical data collection also must be enabled globally. See Config > Service > SLB >
Global > Settings on page 124.
Description
Supported Values
Name
IP Address
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
179 of 276
Description
Applies a configured health monitor to the firewall.
Supported Values
Name of a configured health monitor
Default: The AX device attempts to
use the default Layer 3 method (ping).
However, this default method does not
use the transparent option.
Status
Stats Data
Enabled or Disabled
Default: Enabled
Enabled or Disabled
Default: Enabled
Note: Statistical data collection also must be enabled globally. See Config > Service > SLB >
Global > Settings on page 124.
If this AX device will be the GSLB controller, use all the configuration
pages. If this AX device will be only a site AX device, go to Config >
Service > GSLB > Global on page 201. Enable the Run GSLB as Site
SLB Device option and click OK. Do not configure any other GSLB
parameters.
180 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Proxy Section
Name
IP Address
Status
HA group
Default: Enabled
1 or 2
Default: not set
0-65534
Service Group
Status
HA Connection
Mirror
Enabled or Disabled
Default: Enabled
Enabled or Disabled
Default: Disabled
Connection
Limit
Source NAT
Pool
aFleX
UDP Template
If the template you want to use is not already configured, you can select create to configure it. In
this case, when you click OK after configuring the
template, you are returned to this section.
Default: The AX default UDP template is used. (See the SLB Parameters chapter in the AX Series
Configuration Guide.)
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
181 of 276
Description
Supported Values
File Section
This section enables you to import a geo-location database from an external server. The table at the bottom of the
section lists the geo-location databases that are already on the AX device. The Name column lists the database filename. The Type column indicates whether the database is automatically included with the software (Builtin) or is a
custom database that was imported (Template), in which case the data must be extracted using a CSV template.
To import a geo-location database, select or enter values for the following fields, then click Add.
Protocol
File transfer protocol to use for importing the geoFTP, TFTP, RCP, or SCP
location database. Some or all of the following
fields appear, depending on your selection.
Host
Hostname or IP address of the remote server.
Default: Not set
Port
Protocol port on which the remote server listens for 0-65535
the file transfer protocols traffic.
Configurable only for FTP, for which
Location
User
Password
Template Section
This section enables you to configure a template for extracting the geo-location data from an imported geo-location
database.
Name
Name of the template.
String
Delimiter
IP-From
IP-To
Continent
Country
State
City
182 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Load/Unload Section
This section loads or unloads a geo-location database. Loading a geo-location database makes it the active geolocation database to be used by GSLB. Only one geo-location database can be active.
File
Name of the CSV file.
Name of an imported CSV file
Template
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
183 of 276
Description
Supported Values
General Section
Name
1-31 characters
Metric Section
Metrics in the In Use column are enabled in this policy. Metrics in the Not In Use column are disabled in this policy.
To disable a metric, drag it from the In Use column to the Not In Use column.
To enable a metric, drag it from the Not In Use column to the In Use column.
The metrics in the In Use column are used in the order they are listed in the column, from the top down. To re-order
metrics in either column, drag-and-drop them to the desired location.
Health Check
Service IP addresses that pass their health checks
Enabled or Disabled
are preferred over addresses that do not pass their
Default: Enabled
health checks.
An IP address that fails its health check is not automatically ineligible to be included in the DNS reply
to a client.
Geographic
Round Robin
Enabled or Disabled
Default: Enabled
Enabled or Disabled
Default: Enabled
184 of 276
P e r f o r m a n c e
b y
D e s i g n
Weighted Site
Session Capacity
Description
Service IP addresses with higher weight values are
preferred over addresses with lower weight values.
As a simple example, assume that the weighted-ip
metric is the only enabled metric, or at least always
ends up being the tie breaker. IP address 10.10.10.1
has weight 4 and IP address 10.10.10.2 has
weight 2. During a given session aging period, the
first 4 requests go to 10.10.10.1, the next 2 requests
go to 10.10.10.2, and so on, (4 to 10.10.10.1, then 2
to 10.10.10.2).
Sites with higher weight values are preferred over
sites with lower weight values.
As a simple example, assume that the weighted-site
metric is the only enabled metric, or at least always
ends up being the tie breaker. Site A has weight 4
and site B has weight 2. During a given session
aging period, the first 4 requests go to site A, the
next 2 requests go to site B, and so on, (4 to A, then
2 to B).
Sites that have not exceeded their thresholds for
their respective maximum TCP/UDP sessions are
preferred over sites that have exceeded their thresholds.
Supported Values
Enabled or Disabled
Default: Disabled
Enabled or Disabled
Default: Disabled
Enabled or Disabled
Default: Disabled
Example:
Site As maximum session capacity is 800,000 and
Site Bs maximum session capacity is 500,000. If
the session-capacity threshold is set to 90, then for
Site A the capacity threshold is 90% of 800,000,
which is 720,000. Likewise, the capacity threshold
for Site B is 90% of 500,000, which is 450,000.
Active Servers
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
Enabled or Disabled
Default: Disabled
185 of 276
Description
Sites with faster round-trip times (RTTs) between a
client and the site are preferred over sites with
slower times. The passive RTT is the time between
when the site AX device receives a clients TCP
connection (SYN) and the time when the site AX
device receives acknowledgement (ACK) back
from the client for the connection. Passive RTT
measurements are taken for client addresses in each
/24 subnet range.
Supported Values
Enabled or Disabled
Default: Disabled
Active RTT
Enabled or Disabled
Default: Disabled. When you enable
Active RTT, a site AX device sends 5
DNS requests to the GSLB domains
local DNS. The GSLB AX device
averages the RTT times of the 5 samples.
186 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Sites that are at or below their thresholds of average
new connections per second are preferred over sites
that are above their thresholds.
Load limit Specifies the maximum average
number of new connections per second the site
AX Series can have.
Samples Number of samples for the SLB
device (the site AX device) to collect.
Interval Number of seconds between each sample.
Note: This metric requires the GSLB protocol to be
enabled on both the GSLB controller and the site
AX devices.
Num Session
Supported Values
Enabled or Disabled
Default: Disabled
The load limit can be 1-999999999
(999,999,999).
The number of samples can be 1-8.
The sample interval can be 1-60 seconds.
Defaults:
Load limit not set
Samples 5
Interval 5 seconds
Enabled or Disabled
Default: Disabled
Admin
Preference
Bandwidth Cost
Enabled or Disabled
Default: Disabled
Enabled or Disabled
Default: Disabled
This metric requires an SNMP template. To configure the template, you must use the CLI. See the
Config Commands: Global Server Load Balancing chapter in the AX Series CLI Reference.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
187 of 276
Ordered IP
Description
Service IP addresses with the fewest hits are preferred over addresses with more hits.
Note: This metric requires the GSLB protocol to be
enabled on both the GSLB controller and the site
AX devices.
Service IP addresses are re-ordered in DNS replies
to match the order administratively configured for
the service.
Supported Values
Enabled or Disabled
Default: Disabled
Enabled or Disabled
Default: Disabled
The prioritized list is sent to the next metric for further evaluation. If ordered-ip is the last metric, the
prioritized list is sent to the client.
The ordered list of IP addresses must be configured
for the service.
Active Only
Best Only
Cache
Enabled or Disabled
Default: Disabled.
Enabled or Disabled
Default: Disabled
Enabled or Disabled
Default: Disabled
Enabled or Disabled
Default: Disabled
The aging time can be
1-1,000,000,000 seconds (nearly 32
years).
Default: TTL set by the DNS server in
the reply
CName Detect
188 of 276
P e r f o r m a n c e
b y
D e s i g n
IP Replace
Description
Returns the external IP address configured for a service IP. The external IP address must be configured
on the service IP. This option is disabled by default.
Note: The external IP address must be configured
on the service IP.
Replaces the IP addresses in the DNS reply with the
service IP addresses configured for the service.
Geo-location
Alias
Geo-location
Action
Geo-location
Policy
MX Additional
Server Mode
Supported Values
Enabled or Disabled
Default: Enabled
Enabled or Disabled
Default: Disabled
Enabled or Disabled
Default: Disabled
Enabled or Disabled
Default: Disabled
Enabled or Disabled
Default: Disabled
Enabled or Disabled
Default: Disabled
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
189 of 276
Description
The NS option provides the name server record.
Supported Values
Enabled or Disabled
(cont.)
Default: Disabled
Sticky
TTL
Enabled or Disabled
The aging time can be 1-65535 minutes.
Default: Disabled. The default aging
time is 5 minutes.
Geo-location Section
Match First
Overlap
Global or Policy
Default: Global
Enabled or disabled
Default: Disabled
190 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Service IP Section
Name
IP Address
External IP
Address
Health Monitor
If the monitor you want to use is not already configured, you can select create to configure it. In this
case, when you click OK after configuring the monitor, you are returned to this section.
Note: If you leave the health monitor for a service
left at its default setting (the default ICMP ping
health check), the health checks for the service IP
and its ports are performed within the GSLB protocol.
Status
Enabled or Disabled
Default: Enabled
Port Section
Use this section to add the services to the service IP.
Port
Protocol port number.
0-65535
Protocol
Default: None
TCP or UDP
Health Monitor
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
Default: TCP
Configured health monitor
Default: (default). This is the default
TCP or UDP health monitor.
191 of 276
Description
Supported Values
General Section
Name
Weight
Template
Max Client
192 of 276
1-2147483647
Default: 32768
P e r f o r m a n c e
b y
D e s i g n
Description
Specifies the gateway.
Supported Values
Valid IP address
Default: None
1-255
Default: 3
Default: Not set
Template Section
This section configures a GSLB SNMP template for use with the bw-cost metric.
To configure a template, enter all of the information into the fields, then click Add.
Name
Name of the template.
String of 1-63 characters
User Name
Specifies the SNMPv3 username required for access String
to the SNMP agent on the site AX device.
Community
For SNMPv1 or v2c, specifies the community string String
required for authentication.
Host
Specifies the IP address of the site AX device.
Valid IP address
Port
Specifies the protocol port on which the site AX
0-65534
devices listen for the SNMP requests from the
Default: 161
GSLB AX device.
Version
Specifies the SNMP version running on the site AX v1, v2c, or v3
device.
OID
Specifies the interface MIB object to query on the
Valid OID
site AX device.
Interface
Security-level
Security-engineid
no-auth
auth-priv
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
auth-no-priv
Default: no-auth
193 of 276
Description
Specifies the authentication key.
Supported Values
String of 1-127 characters
Auth-proto
sha or md5
Priv-key
Priv-proto
aes or des
Context-engineid
Context-name
Interval
String
String
1-999 seconds
Default: 3
IP-Server Section
This section adds service IPs to the site. To add a service IP to the site, select the service IP from the drop-down list
and click Add.
Name
Name of the service IP.
Name of a configured service IP
IP Address
IP Address of the service IP.
IP address of the configured service IP
Geo-location Section
This section adds a geo-location database or add manually configured geo-locations.
To add a geo-location database, select it from the leftmost drop-down list next to Geo-location, and click Add.
To add a manually configured geo-location, select up to four nodes from the drop-down lists. Select them from left
to right. After selecting the nodes for a geo-location, click Add.
Name
Geo-location name.
Name of a manually configured geolocation
194 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Options Section
This section configures site settings for the bw-cost (bandwidth cost), active RTT, and passive RTT metrics.
Bandwidth Cost
Configures options for the bandwidth-cost metric:
The following settings are supported:
Active RTT
Limit 0-2147483647
Threshold 0-100
Defaults:
Threshold Not set
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
195 of 276
Description
Range Factor Specifies the maximum percentage a new active-RTT measurement can differ
from the previous measurement. If the new measurement differs from the previous measurement
by more than the allowed percentage, the new
measurement is discarded and the previous measurement is used again.
For example, if the range-factor is set to 25 (the
default), a new measurement that has a value
from 75% to 125% of the previous value can be
used. A measurement that is less than 75% or
more than 125% of the previous measurement
can not be used.
Smooth Factor Blends the new measurement
with the previous one, to smoothen the measurements.
Passive RTT
Supported Values
The following settings are supported:
Aging Time 1-60 minutes
Bind Geoloc Enabled or disabled
Overlap Enabled or disabled
Limit 1-1023
Mask 1-32
Range Factor 1-1000
Smooth Factor 1-100
Defaults:
Aging Time 10 minutes
Bind Geoloc Disabled
Overlap Disabled
Limit 16383 ms
Mask 32
Range Factor 25
Smooth Factor 10
196 of 276
P e r f o r m a n c e
b y
D e s i g n
Supported Values
Zone Section
Name
TTL
TTL Time
Policy
Note: You can use lower case characters and upper case characters. However, since Internet domain names are
case-insensitive, the AX device internally converts all upper case characters
in GSLB zone names to lower case.
Selected or not selected.
Default: not selected
0-1000000 (1 million) seconds.
Default: 10 seconds
Name of a configured GSLB policy
Default: default
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
197 of 276
Supported Values
Service Section
This section adds services to the zone.
Note: The service IPs must already be configured. If you have not already configured them, see Config > Service
> GSLB > Service IP on page 190.
1. Click Add.
2. Enter a name for the service in the Service field.
3. Select the service type from the Port drop-down list.
If the service type is not in the list, select Other to display an input field appears with a port number in it. Edit the
port number to the number for the service.
4. To use a GSLB policy other than the zones policy (the default setting), select the policy from the Policy dropdown list.
5. To specify the action to take for DNS requests or responses, select the action from the Action drop-down list.
(See Action Options on Service Section on page 199.)
6. To configure DNS Address (A) records for the service, use the DNS Address Record section. (See DNS
Address Record Section on page 199.)
7. To configure DNS Mail Exchange (MX) records for the service, use the DNS Address Record section. (See
DNS MX Record Section on page 200.)
8. To configure a Canonical Name (CNAME) record for the service, use the DNS CNAME Record section. (See
DNS CNAME Record Section on page 200.)
9. To configure a Name Server (NS) record for the service, use the DNS NS Record section. (See DNS NS Record
Section on page 200.)
10. To configure a Pointer (PTR) record for the service, use the DNS PTR Record section. (See DNS PTR Record
Section on page 200.)
11. To configure geo-location settings for the service, use the Geo-location section. (See Geo-location Section on
page 200.)
12. Click OK.
The port can be a well-known name recognized by the AX device or a port number from 1 to 65535.
The service name can be 1-31 alphanumeric characters. (For the same reason described for zone names, the AX
device converts all upper case characters in GSLB service names to lower case.)
198 of 276
P e r f o r m a n c e
b y
D e s i g n
Note:
To add an A record:
1. Select the VIP from the VIP Order drop-down list.
2. Select the as-replace option to replace the IP address in DNS replies to
clients. To use this option, you also must enable the DNS IP Replace
option in the GSLB policy.
3. Optionally, select the no-response option to prevent the IP address for
this site from being included in DNS replies to clients.
4. If the GSLB AX device will act as the DNS server for this service IP
address, select Static. To use this option, you also must enable the Server
Mode option in the GSLB policy.
5. To assign a weight to the service, enter the value in the Weight field. If
the weighted-ip metric is enabled in the policy and all metrics before
weighted-ip result in a tie, the service on the site with the highest weight
is selected. The weight can be 1-100. By default, the weight is not set.
6. Click Add.
The VIP addresses are placed in the DNS reply in the order they appear in
this section, starting with the VIP at the top of the list. To re-order the VIP
addresses, select the row for one of the A records and click Move Up or
Move Down.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
199 of 276
200 of 276
P e r f o r m a n c e
b y
D e s i g n
Supported Values
Global Section
Run GSLB as
Site SLB Device
Enabled or Disabled
Default: Disabled
Run GSLB as
Controller
GSLB Protocol
Update Interval
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
Enabled or Disabled
Default: Disabled
1-300 seconds
Default: 30 seconds
201 of 276
Supported Values
For each of these, you can specify
0-1000000.
Defaults:
Active RTT query 200
Active RTT Response 1000
Active RTT Session 32768
Passive RTT Response 1000
Connection Load Response
Unlimited
Response 3600
GSLB Active
RTT
Message 10000
You can specify the following values:
Domain Valid domain name
Retry 0-16
Timeout 1-1023 milliseconds (ms)
Track 15-3600 seconds
Defaults:
Interval 1 second
Retry 3
Sleep 3 seconds
Timeout 1000 ms
Track 60 seconds
202 of 276
P e r f o r m a n c e
b y
D e s i g n
The GSLB protocol is required in order to collect the site information provided for these metrics.
The GSLB protocol is also required for the health-check metric, if the
default health checks are used. If you modify the health checks, the GSLB
protocol is not required.
Note:
global addresses.
To configure dynamic IP Source NAT, you can use the IPv4, IPv6, Group,
Binding, and Interface options.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
203 of 276
configure the ACL first. See Config > Network > ACL on page 228.)
Pool to identify a contiguous range of global addresses into which to
host addresses are translated into global addresses from a pool before
the host traffic is sent to the Internet.
(To set the NAT interfaces, use the Interface page.)
Note:
addresses and global addresses to translate them into, or individual mappings of inside to global addresses.
(To enable static NAT and configure the address mappings, use the
Global and NAT Range pages.)
Inside NAT setting on the interface connected to the inside host.
204 of 276
P e r f o r m a n c e
b y
D e s i g n
host addresses are translated into global addresses from a static mapping
or a range list before the host traffic is sent to the Internet.
(To set the NAT interfaces, use the Interface page.)
Name
Start IP Address
End IP Address
Netmask
Gateway
HA Group
Supported Values
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
205 of 276
Supported Values
HA Group
String
Valid IPv6 address
Valid IPv6 address
96-128
IP address of the next-hop router to use
as the default gateway for NATted traffic.
Number of a configured HA group
Default: Not set
Supported Values
Group Section
Name
IPv4/IPv6
Group Member
String
IPv4 or IPv6
Names of configured pools.
1. Select a configured address pool from the Available Pool drop-down list.
2. Click Add.
206 of 276
P e r f o r m a n c e
b y
D e s i g n
Note:
Supported Values
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
String
IPv4 or IPv6
207 of 276
HA Group
Supported Values
Valid IP address and network mask
(IPv4) or mask length (IPv6)
Valid IP address and network mask
(IPv4) or mask length (IPv6)
1-200000
Default:
1-32
Default: Not set
Supported Values
Valid IP address
Valid IP address
Number of a configured HA group
Default: Not set
208 of 276
P e r f o r m a n c e
b y
D e s i g n
Supported Values
Global Section
PPTP NAT ALG
IP Source NAT
Allow Static
Host
Source NAT
Gateway for L3
Enabled or Disabled
Default: Disabled
Default: Enabled
Enabled or Disabled
Enabled or Disabled
Default: Disabled
SYN Timeout
TCP Timeout
Sets the timeout for TCP sessions that are not ended
normally by a FIN or RST.
UDP Timeout
ICMP Timeout
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
60-300 seconds
The value you enter must be in intervals of 60 seconds.
Default: 60 seconds
60-15000 seconds
The value you enter must be in intervals of 60 seconds.
Default: 300 seconds
60-300 seconds
The value you enter must be in intervals of 60 seconds.
Default: 300 seconds
60-15000 seconds, or Fast
Default: 60 seconds
209 of 276
Supported Values
The AX device only supports certificates and CRLs that are in PrivacyEnhanced Mail (PEM) format. The maximum supported certificate size is
16 KB. You can specify the format when you import the certificate. The
AX device automatically converts the imported certificate into PEM format.
210 of 276
P e r f o r m a n c e
b y
D e s i g n
Note:
7. From the Key drop-down list, select the length (bits) for the key.
8. Click OK. The AX device generates the self-signed certificate and its
key. The new certificate and key appear in the certificate list. The certificate is ready to be used in client-SSL and server-SSL templates.
Generating a Key and CSR for a CA-Signed Certificate
1. Select Config > Service > SSL Management, if not already selected.
2. On the menu bar, select Certificate.
3. Click Create.
4. Enter a name for the certificate.
5. In the Issuer drop-down list, select Certificate Authority, if not already
selected.
This option displays the Pass Phrase and Confirm Pass Phrase fields.
6. Enter the rest of the certificate information in the remaining fields of the
Certificate section.
If you need to create a request for a wildcard certificate, use an asterisk as
the first part of the common name. For example, to request a wildcard certificate for domain example.com and it sub-domains, enter the following
common name: *.example.com
Note:
7. Enter a passphrase.
8. From the Key drop-down list, select the length (bits) for the key.
9. Click OK. The AX device generates the certificate key and the certificate signing request (CSR), and displays the CSR. The CSR is displayed
in the Request Text field.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
211 of 276
If the browser security settings normally block downloads, you may need
to override the setting. For example, in IE, hold the Ctrl key while clicking Download.
b. Click Save.
c. Navigate to the save location.
d. Click Save again.
Note:
Note:
If you are importing a CA-signed certificate for which you used the AX
device to generate the CSR, you do not need to import the key. The key is
automatically generated on the AX device when you generate the CSR.
1. Select Config > Service > SSL Management, if not already selected.
2. On the menu bar, select Certificate. (This option also applies to certificate chain files.)
3. Click Import.
4. In the Name field, enter a name for the certificate or key. This is the
name you will refer to when adding the certificate or key to a client-SSL
or server-SSL template.
5. Select the format of the certificate from the Certificate Format dropdown list.
6. Select the location of the file to be imported:
Local The file is on the PC you are using to run the GUI, or is on a
212 of 276
P e r f o r m a n c e
b y
D e s i g n
Note:
5. Click Save.
6. Navigate to the save location.
7. Click Save again.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
213 of 276
Config > Service > SSL Management > Cert Revocation List
The Cert Revocation List page enables you to manage Certificate Revocation Lists (CRLs).
Importing a CRL
You can locally import a CRL. Place it on the PC that is running the GUI or
CLI session, or onto a PC or file server that be locally reached over the network.
1. Select Config > Service > SSL Management, if not already selected.
2. On the menu bar, select Cert Revocation List.
3. Click Import.
4. Select the location of the file to be imported:
Local The file is on the PC you are using to run the GUI, or is on a
214 of 276
P e r f o r m a n c e
b y
D e s i g n
Note:
5. Click Save.
6. Navigate to the save location.
7. Click Save again.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
215 of 276
Table 94 lists the parameters you can configure on Ethernet data interfaces.
TABLE 94 Ethernet Data Interface Parameters
Parameter
Description
Supported Values
General Section
Status
Enabled or Disabled
Name
Default: Disabled
String up to 63 characters
Speed
Default: None
One of the following:
10M
100M
1G
10G
Auto
Duplex
Default: Auto
Note: All possible options are listed
above. The options that are listed for a
particular interface depend on the
interface type.
One of the following:
Full Full-duplex mode.
Half Half-duplex mode.
Auto The mode is negotiated
based on the mode of the other end
of the link.
Flow Control
Default: Auto
Enabled or Disabled
Default: Disabled. The interface autonegotiates flow control settings with
the other end of the link.
216 of 276
P e r f o r m a n c e
b y
D e s i g n
ICMP Rate
Limiting
Description
Enables software-based switching or routing of
Layer 2/Layer 3 traffic.
Note: This command is applicable only to models
AX 2200, AX 3100, AX 3200, AX 5100, and
AX 5200. The command does not appear in the CLI
on other models.
Configures ICMP rate limiting for the interface, to
protect against denial-of-service (DoS) attacks.
When you select the ICMP Rate Limit Status checkbox, the following configuration fields appear:
Normal Rate Maximum number of ICMP packets allowed per second on the interface. If the AX
interface receives more than the normal rate of
ICMP packets, the excess packets are dropped
until the next one-second interval begins.
Lockup Rate Maximum number of ICMP packets allowed per second before the AX device
locks up ICMP traffic on the interface. When
ICMP traffic is locked up, all ICMP packets are
dropped until the lockup expires.
Supported Values
Enabled or Disabled
Default: Disabled.
IPv4 Section
Note: This section is applicable only if the AX device is deployed in gateway (route) mode. If you are deploying in
transparent (Layer 2) mode, see Config > Network > Interface > Transparent on page 222.
IP Address
IPv4 address of the interface.
Valid IPv4 address
Mask
Network mask for the interface.
Valid IPv4 mask
Secondary IP
Additional IP addresses configured on the interface. None configured
List
Note: The address in the IP Address field is the priAccess List
mary IP address.
Access Control List (ACL) to use to filter inbound
traffic on the interface.
Configured ACL
IPv6 Section
Note: This section is applicable only if the AX device is deployed in gateway (route) mode. If you are deploying in
transparent (Layer 2) mode, see Config > Network > Interface > Transparent on page 222.
IP Address
IPv6 address of the interface.
Valid IPv6 address
Prefix Length
Length of the network prefix.
1-128.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
217 of 276
Link-Local
Description
Automatically configures the link-local address.
Supported Values
Default: Not selected.
Note: If Auto Link-Local and LinkLocal are both unselected, the address
is configured as a global address.
Default: Not selected.
Note: If Auto Link-Local and LinkLocal are both unselected, the address
is configured as a global address.
VIP Section
Allow
Promiscuous
VIP
Enabled or disabled
Default: Disabled
Enabled or disabled
Default: Disabled
HA Section
HA Enabled
Type
Yes or No
Default: No
Router-Interface An upstream
router (and ultimately, clients) can
be reached through the interface.
VLAN
218 of 276
Default: None
Enabled or Disabled
Default: Enabled
VLAN ID
Default: Not set
P e r f o r m a n c e
b y
D e s i g n
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
219 of 276
Table 95 lists the parameters you can configure on the Ethernet management port.
TABLE 95 Ethernet Management Port Parameters
Parameter
Description
Supported Values
General Section
Status
Speed
Enabled or Disabled
Default: Disabled
One of the following:
10M 10 Megabits per second
(Mbs/sec)
100M 100 Megabits per second
(Mbs/sec)
1G 1 Gigabit per second (Gbs/sec)
Auto The interface speed is negotiated based on the speed of the
other end of the link.
Default: Auto
Duplex
220 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Enables 802.3x flow control.
Supported Values
Enabled or Disabled
Default: Disabled. The AX Ethernet
interface auto-negotiates flow control
settings with the other end of the link.
Enabled or Disabled
Default: Disabled. The AX device
attempts to use a route from the main
route table for management connections originated on the AX device.
SNMPD
NTP
RADIUS
TACACS+
SMTP
The AX device has two route tables:
Management route table Contains all static
routes whose next hops are connected to the management interface. The management route table
also contains the route to the device configured as
the management default gateway.
Main route table Contains all routes whose next
hop is connected to a data interface. These routes
are sometimes referred to as data plane routes.
Entries in this table are used for load balancing
and for Layer 3 forwarding on data ports.
This route table also contains copies of all static
routes in the management route table, excluding
the management default gateway route.
For more information, see the Using the Management Interface as the Source for Management Traffic chapter in the AX Series Configuration Guide.
IPv4 Section
IP Address
Mask
Default Gateway
IPv6 Section
IP Address
Prefix Length
Default Gateway
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
221 of 276
Note:
The following configuration sections are displayed when you click on the
Transparent menu option:
IPv4
IPv6
Description
Supported Values
IPv4 Section
IP Address
Mask
Default Gateway
IP Address
Prefix Length
Default Gateway
IPv6 Section
Valid IPv6 address
1-128
Valid IPv6 address
Note:
You must create the VE before you can configure it here. To create a VE,
see Config > Network > VLAN on page 225.
Table 97 lists the parameters you can configure on VE data interfaces.
222 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
IPv4 Section
Status
Enabled or Disabled
Name
Default: Disabled
String up to 63 characters
IP Address
Mask
Secondary IP
List
Default: None
Valid IPv4 address
Valid IPv4 mask
None configured
Access List
ICMP Rate
Limiting
Configured ACL
IPv6 Section
IP Address
Prefix Length
Auto Link-Local
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
223 of 276
Description
Configures the specified address as the link-local
address for the interface. This option overrides the
automatically generated link-local address for the
interface.
Supported Values
Default: Not selected.
Note: If Auto Link-Local and LinkLocal are both unselected, the address
is configured as a global address.
VIP Section
Allow
Promiscuous
VIP
Enabled or disabled
Default: Disabled
Enabled or disabled
Default: Disabled
224 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Trunk Section
Trunk ID
Interface
1-8
Default: None
2-8
Default: Not set
1-300 seconds
Default: 10 seconds
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
225 of 276
Description
Supported Values
VLAN Section
VLAN ID
Interface
1-4094
Default: 1
Ethernet data port names
Default: None
1-128
Default: Not set
Note: To simplify configuration, select
the VE number that corresponds to the
VLAN number.
226 of 276
P e r f o r m a n c e
b y
D e s i g n
Note:
Description
Supported Values
IP Multicast
Packets
Multicast
Packets
Unknown
Unicast Packets
1-65535
Default: Not set
1-65535
Default: Not set
1-65535
Default: Not set
1-65535
Default: Not set
IP Multicast
Packets
Multicast
Packets
Unknown
Unicast Packets
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
1-65535
Default: Not set
1-65535
Default: Not set
1-65535
Default: Not set
1-65535
Default: Not set
227 of 276
228 of 276
P e r f o r m a n c e
b y
D e s i g n
work NAT, select the ACL when configuring the pool. (See Config >
Service > IP Source NAT on page 203.)
To use the ACL permit or block management access, see Config > Sys-
The Standard section is displayed when you click Add or click on an ACL
number.
Table 101 lists the Standard ACL parameters.
TABLE 101 Standard ACL Parameters
Parameter
Supported Values
Standard Section
ID
Remark / Entry
Action
ACL number.
Specifies whether you are configuring an ACL rule
or a remark for the ACL.
Specifies the action to perform on traffic that
matches the ACL:
1-99
Remark or Entry
Default: Deny
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
Default: Disabled
229 of 276
Supported Values
Default: Any
The Extended section is displayed when you click Add or click on an ACL
number.
Table 102 lists the Extended ACL parameters.
TABLE 102 Extended ACL Parameters
Parameter
Supported Values
ID
Remark / Entry
ACL number.
Specifies whether you are configuring an ACL rule
or a remark for the ACL.
Specifies the action to perform on traffic that
matches the ACL:
Extended Section
Action
100-199
Remark or Entry
Default: Deny
230 of 276
P e r f o r m a n c e
b y
D e s i g n
Protocol
Supported Values
Default: Disabled
ICMP
Source Address
Default: ICMP
Default: Any
Source Port
Destination
Address
Destination Port
Default: Any
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
231 of 276
The IPv6 section is displayed when you click Add or click on an ACL number.
Table 103 lists the IPv6 ACL parameters.
TABLE 103 IPv6 ACL Parameters
Parameter
Supported Values
Name
Remark / Entry
ACL name.
Specifies whether you are configuring an ACL rule
or a remark for the ACL.
Specifies the action to perform on traffic that
matches the ACL:
IPv6 Section
Action
String
Remark or Entry
Default: Deny
Protocol
Default: Disabled
232 of 276
P e r f o r m a n c e
b y
D e s i g n
Supported Values
Default: Any
Source Port
Destination
Address
Destination Port
Default: Any
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
233 of 276
Description
Supported Values
IP Address
MAC Address
Interface
VLAN ID
Description
Supported Values
234 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
VLAN for which to add the ARP entry.
Supported Values
VLAN ID
Default: The entry can be used for any
VLAN.
Description
Supported Values
IP Address
Prefix
Netmask
Gateway
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
235 of 276
Description
Supported Values
IP Address
Prefix Length
Forwarding
Router Address
Description
Supported Values
Hostname
DNS Suffix
DNS Section
Primary DNS
Secondary DNS
236 of 276
String
String
Valid IPv4 address
Valid IPv4 address
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Normal Rate
Lockup Rate
Lockup Period
1-16383 seconds
Default: Not set
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
237 of 276
the BPDU is not broadcast to any other members of the same trunk.
To configure a BPDU forwarding group:
1. Select the group number from the BPDU-Fwd-Group drop-down list.
2. Select the interfaces to add to the group.
3. Click >> to add the interfaces to the group.
Description
Language
Supported Values
Web Section
One of the following:
English
Simple Chinese
Japanese
Traditional Chinese
Korean
Default: English
238 of 276
P e r f o r m a n c e
b y
D e s i g n
HTTP Port
Description
Number of minutes a Web management session can
remain idle before it times out and is terminated by
the AX device.
HTTP protocol port number and port state.
Supported Values
0-60 minutes
Default: 10 minutes
To disable the timeout, specify 0.
Enabled or Disabled
1-65535
HTTPS Port
Default: Enabled; 80
Enabled or Disabled
1-65535
Re-direct HTTP
to HTTPS
aXAPI Section
aXAPI Timeout
0-60 minutes.
If you specify 0, sessions never time
out.
Default: 10 minutes
Preference Section
Default IP
Address
IPv4 or IPv6
Default: IPv4
P e r f o r m a n c e
b y
The Reset To Default option also resets the enable password to its
default value (empty no password).
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
239 of 276
Description
Supported Values
Current Enable
Password
0-60 minutes
Default: 10 minutes
Enable Password
Confirm
Password
Columns
Lines
Enable Edit of
Command Line
Enable Control
of Command
History
History Size
Auto Size
240 of 276
P e r f o r m a n c e
b y
D e s i g n
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
241 of 276
tus page
Table 112 lists the system log parameters you can configure.
TABLE 112 Log Parameters
Parameter
Description
Supported Values
Disposition
Output options for each message level. For each message level, you can select which of the following output
options to enable:
Emergency
Buffered Messages are stored in the system log buffer. The GUI system log lists the messages in this
buffer.
Critical
Log Section
Logging
Email Filter
Logging
Email Buffer
Number
Logging
Email Buffer
Time
Facility
Error
Warning
Notification
Information
Log Buffer
Entries
Log Server
Log Server
Port
Alert
242 of 276
Debug
Default: 30000
Any valid IP address or fully-qualified
domain name.
Default: None configured
Any valid protocol port number
Default: 514
P e r f o r m a n c e
b y
D e s i g n
Description
Email addresses to which to send log messages.
Only the message levels for which Email is selected in
the Disposition list are sent to log servers.
Use a single space between each address.
Supported Values
List of up to 10 email addresses. Use
commas to separate the addresses.
Each email address can be a maximum
of 63 characters long.
SMTP
Server
SMTP
Server Port
Mail From
Default: 25
Valid email address
Need
Authentication
Username
Default: disabled
Valid username
Password
Status Section
Level
You also can change the display color for each message
level.
Alert
Emergency
Critical
Error
Warning
Notification
Information
Debug
Default: All are enabled
Refresh
Interval
Entry
Number
Specifies how many log entries can be views on the Status page.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
For default and available colors, display the drop-down lists next to the
message levels.
5-60 seconds
Default: 10 seconds
10-1000 messages
Default: the 100 most recent messages
243 of 276
244 of 276
P e r f o r m a n c e
b y
D e s i g n
Config > System > Settings > Log - Add (Logging Email Filter
FIGURE 17
Config > System > Settings > Log (Logging Email Filter added)
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
245 of 276
Description
Supported Values
Threshold Section
System
Temperature
CPU temperature.
Control CPU
Usage
Default: 68
1-100 percent
Data CPU
Usage
Default: 90 percent
1-100 percent
Memory
Usage
Memory utilization.
Default: 90 percent
1-100 percent
Disk Usage
Default: 95 percent
1-100 percent
Default: 85 percent
1-32767 buffers per 10-second monitoring interval
Buffer Drop
Buffer
Usage
Default: 100
60000-120000 buffers
Default: 90000 buffers
246 of 276
P e r f o r m a n c e
b y
D e s i g n
1024
64 MB
8192
512 MB
32768
2048 MB
Increasing the TFTP block size of the AX device only increases the maximum block size supported by the AX device. The TFTP server also must
support larger block sizes. If the block size is larger than the TFTP server
supports, the file transfer will fail and a communication error will be displayed on the CLI terminal.
If the TFTP block size is larger than the IP Maximum Transmission Unit
(MTU) on any device involved in the file transfer, the TFTP packets will be
fragmented to fit within the MTU. The fragmentation will not increase the
number of blocks; however, it can re-add some overhead to the overall file
transmission speed.
Config > System > Settings > General > Resource Usage
This page enables you to reconfigure the system capacity for certain system
resources.
Table 114 lists the resource capacities you can configure. The supported
values and defaults may differ depending on the AX model.
TABLE 114 Resource Usage Parameters
Parameter
Description
L4 Session
NAT Pool
Address
Client SSL
Template
Connection
Reuse
Template
Fast-TCP
Template
Fast-UDP
Template
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
247 of 276
Description
248 of 276
P e r f o r m a n c e
b y
D e s i g n
without also reloading the system image. (This option also closes all
sessions.)
Shutdown Powers down the AX device.
Reboot Reboots the AX device.
Save Syncs the configuration file (startup-config) with the running-
Description
Login name for the admin.
Privilege level for the account:
Super Admin Allows access to all levels of the system.
This account is not the Root account and can be
deleted. This account cannot configure other admin
accounts. (Only the admin account that has Root privileges can configure other admin accounts.)
Read Only Admin Allows monitoring access to the system but not configuration access. In the CLI, this account
can only access the User EXEC and Privileged EXEC
levels, not the configuration levels. In the GUI, this
account cannot modify configuration information.
(cont.)
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
249 of 276
Description
Privilege level for the account:
(cont.)
Partition Write Admin The admin has read-write privileges within the private partition to which the admin is
assigned. The admin has read-only privileges for the
shared partition.
Partition Read Admin The admin has read-only privileges within the private partition to which the admin is
assigned, and read-only privileges for the shared partition.
Partition RS Operator The admin is assigned to a private partition but has permission only to view service port
statistics for real servers in the partition, and to disable or
re-enable the real servers and their service ports.
Partition
Trusted Host
Lockout Time
Scheduled
Unlock
Status
(unlabeled)
250 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Admin Section
Administrator
Name
Change
Administrator
Password
1-31 characters
1-63 characters
Trusted Host IP
Address
When this option is selected, the Password and Confirm Password fields are displayed. Enter the
admins password into these fields.
Specifies the host or subnet address from which the
admin is allowed to log onto the AX device.
Netmask for
Trusted Host
Privilege
Partition
Status
Valid IP address
Default: 0.0.0.0 (any address allowed)
Valid network mask
Default: 0.0.0.0 (any subnet allowed)
One of the following:
Super Admin
Read Only Admin
Partition Write Admin
Partition Read Admin
Partition RS Operator
Default: Read Only Admin
Enabled or Disabled
Default: Enabled
Enabled or Disabled
Default: Enabled
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
251 of 276
Description
Supported Values
Partition Name
Max aFleX Files
Current Logo
Picture
Partition Section
Change Logo
Picture
1-14 characters
1-128
Default: 32
Supported value: A graphic file
180x60 pixels.
Default: The A10 Networks logo is
used.
252 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Administrator
Lockout after
Lockout Time in
Reset Lockout
after
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
253 of 276
default.)
Local/RADIUS Check AX devices local admin database first. If
254 of 276
Note:
Note:
Unlike other admin accounts, the username admin has Root privileges.
To ensure against accidental lockout from the AX device, admin is
always authenticated using the local database only, regardless of the
authentication order used for other admin usernames.
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Server 1
Valid values:
Authentication 1-65535
Account 1-65535
Retransmit 0-5 retries
Timeout 1-15 seconds
Defaults:
Hostname Hostname or IP address
of the RADIUS server.
Secret and Confirm Secret Not set
Authentication 1812
Account 1813
Retransmit 3 retries
Timeout 3 seconds
See above.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
255 of 276
Description
Supported Values
TACACS+
Server 1
Valid values:
AX device will wait for a reply to an authentication request before resending the request.
Port 1-65535
Timeout 1-12 seconds
Defaults:
Hostname Hostname or IP address
of the RADIUS server.
Secret and Confirm Secret Not set
Port 49
TACACS+
Server 2
Timeout 12 seconds
See above.
This option takes effect only if there are no other open admin sessions
using the same admin name.
256 of 276
P e r f o r m a n c e
b y
D e s i g n
Ethernet
Management
Interface
Enabled
Disabled
Enabled
Enabled
Enabled
Enabled
Ethernet and VE
Data Interfaces
Disabled
Disabled
Disabled
Disabled
Disabled
Enabled
You can enable or disable management access, for individual access types
and interfaces. You also can use an ACL to permit or deny management
access through the interface by specific hosts or subnets.
To change management access settings for interfaces:
1. For each interface (each row), select or de-select the checkboxes for the
access types.
2. To use an ACL to control access, select the ACL from the ACL dropdown list in the row for the interface.
3. After selecting the settings for all the interfaces, click OK.
To reset the access settings to the defaults listed in Table 121, click Reset to
Default.
Notes Regarding Use of ACLs
If you use an ACL to secure management access, the action in the ACL rule
that matches the management traffics source address is used to permit or
deny access, regardless of other management access settings.
For example, if you disable Telnet access to a data interface, but you also
enable access to the interface using an ACL with permit rules, the ACL permits Telnet (and all other) access to the interface, for traffic that matches the
permit rules in the ACL.
If you want certain types of management access to be disabled on an interface, do not use a permit ACL to control management access to the interface.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
257 of 276
Note:
If you use the GUI or CLI to change the AX timezone or system time, the
statistical database is cleared. This database contains general system statistics (performance, and CPU, memory, and disk utilization) and SLB
statistics. For example, in the GUI, the graphs displayed on the Monitor >
Overview page are cleared.
Note:
If the system clock is adjusted while OSPF or RIP is enabled, the routing
protocols may stop working properly. To work around this issue, disable
OSPF and RIP before adjusting the system clock.
Config > System > Time > Time > Date/Time
This page enables you to configure the system time and date. You can use
one of the following methods:
Set the AX device to synchronize with a Network Time Protocol (NTP)
server.
Set the AX device to synchronize with the local system time on the PC
258 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Supported Values
Date/Time Section
Date
Time
Sync Local Time
Automatically
Synchronize
with Internet
Time
Server(NTP)
NTP
1-518400 minutes
Default: 1440 minutes
Config > System > Time > Time > Time Zone
Use this section to select the timezone for the AX device. Select the timezone from the list, then click OK.
Daylight Savings Time (DST) is enabled by default, if applicable to the
selected timezone. To disable DST, select the Disable Daylight Saving Time
checkbox.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
259 of 276
Note:
Note:
You can configure SNMPv1 and v2c settings using the GUI. To configure
SNMPv3 settings, use the CLI.
Table 123 lists the configuration options on the SNMP sections.
Description
Supported Values
General Section
System SNMP
Service
Enabled or Disabled
System Location
Default: Disabled
String
System Contact
Community Section
SNMP Community
Hostname
260 of 276
String
P e r f o r m a n c e
b y
D e s i g n
Description
Restricts the objects that the AX device returns in
response to GET requests. Values are returned only
for the objects within or under the specified OID.
Note: The OID for A10 Networks AX objects is
1.3.6.1.4.1.22610.
Supported Values
Valid OID
Default: Not set (all objects can be
accessed)
Trap Section
Community
IP Address
Default: public
Valid IP address
Port
Version
SNMP Group
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
261 of 276
Description
Enables all Server Load Balancing (SLB) traps.
The SLB group contains the following traps:
Service Down Indicates that an SLB service has
gone down.
Supported Values
Selected (enabled) or unselected (disabled)
Default: Unselected
262 of 276
P e r f o r m a n c e
b y
D e s i g n
Description
Virtual Server Reach Conn-Limit Indicates that
the connection limit configured on a virtual
server has been exceeded.
Supported Values
Selected (enabled) or unselected (disabled)
Default: Unselected
Virtual Server Reach Conn-Rate-Limit Indicates that the connection rate limit configured on
a virtual server has been exceeded.
HA Group
App Buffer Reach Limit Indicates that the configured SLB application buffer threshold has
been exceeded. (See Config > System > Settings
> General > Threshold on page 246.)
Enables all High Availability (HA) traps.
The HA group contains the following traps:
Standby Indicates that the AX device is going
from HA Active mode to Standby mode.
Network Group
System Group
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
263 of 276
Description
Primary Hard Disk Indicates that the primary
Hard Disk has failed or the RAID system has
failed. In dual-disk models, the primary Hard
Disk is the one on the left, as you are facing the
front of the AX chassis.
Supported Values
Selected (enabled) or unselected (disabled)
Default: Unselected
Secondary Hard Disk Indicates that the secondary Hard Disk has failed or the RAID system has
failed. The secondary Hard Disk is the one on the
right, as you are facing the front of the AX chassis.
Note: This trap does not apply to the following
models: AX 2500, AX 2600, AX 3000, AX 5100, or
AX 5200.
High Memory Usage Indicates that the memory
usage has exceeded the configured threshold.
(See Config > System > Settings > General >
Threshold on page 246.)
High Control CPU Usage Indicates that the
control CPU utilization has exceeded the configured threshold. (See Config > System > Settings
> General > Threshold on page 246.)
High Data CPU Usage Indicates that data CPU
utilization has exceeded the configured threshold.
(See Config > System > Settings > General >
Threshold on page 246.)
System High Disk Usage Indicates that hard
disk usage has exceeded the configured threshold. (See Config > System > Settings > General
> Threshold on page 246.)
System Drop Packet Indicates that the system
has dropped more than the configured threshold.
(See Config > System > Settings > General >
Threshold on page 246.)
AX SNMP MIB
Download
Power Supply Indicates that a upper power supply has failed. Contact A10 Networks.
Web link to download the AX Management Information Base (MIB) files.
N/A
264 of 276
P e r f o r m a n c e
b y
D e s i g n
Note:
Note:
Description
Supported Values
Media
Upgrade Section
One of the following:
Hard Disk
Compact Flash
Both
Destination
Reboot
Upgrade from
Specifies whether the AX device will reboot automatically after installing the upgrade.
Specifies whether the image you are installing is
located locally on the PC you are using to access the
GUI, or is located on a remote file server.
Default: Primary
Yes or No
Default: No
Local or Remote
Default: Local
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
265 of 276
Description
Directory path and filename for the image, if locally
stored on the PC you are using.
Supported Values
Valid path and file name
1. Click Browse.
2. Navigate to the image file.
3. Click Open.
4. Click OK.
The following fields are applicable only if you select Remote.
Use
Uses the management interface as the source interManagement
face for the connection to the remote device.
Port
The management route table is used to reach the
Enabled or disabled
Default: Disabled
Protocol
Note: For information about the data and management route tables, see the Using the Management
Interface as the Source for Management Traffic
chapter in the AX Series Configuration Guide.
If you select to upgrade from a remote device, this
field appears. You can use it to specify the file transfer protocol to use.
Host
Port
Location
User
Password
266 of 276
Default: FTP
Valid IP address
Default: Not set
1-65535
Default: Depends on the file transfer
protocol selected
String
Default: Not set
String
Default: Not set
String
Default: Not set
P e r f o r m a n c e
b y
D e s i g n
P e r f o r m a n c e
b y
System Reboot When performing a restore, allow five minutes for the
backup procedure to complete, during which time the system performs a
full reset and will be offline. The actual time may vary depending on system parameters.
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
267 of 276
Config > HA
The HA pages enable you to configure options for High Availability.
Before configuring any HA options, see the High Availability chapter
in the AX Series Configuration Guide for detailed information about how
HA works and how to configure it.
Note:
HA. You need to use both the Global and HA Inline Mode pages to configure Layer 2 HA.
Description
Supported Values
General Section
HA Status
Identifier
HA ID of the AX device. The HA ID uniquely identifies the AX device within the HA pair.
268 of 276
Yes or No
Default: No
1 or 2
Select 1 on one of the AX devices and
select 2 on the other AX device.
P e r f o r m a n c e
b y
D e s i g n
Preempt Status
Description
Set ID of the HA pair this AX is in. The HA set ID
specifies the HA set to which the AX device
belongs. This parameter is applicable to configurations that use multiple AX pairs.
To set this option if needed, use 1 or higher. Use the
same set ID on both AX devices in this HA pair.
If there is only one HA pair in the network, you do
not need to use this option.
Controls whether failovers can be caused by configuration changes to HA priority.
Time Interval
HA Mirroring
IP Address
Timeout Retries
ARP Retry
Supported Values
1-7
Default: Not set
Yes or No
Default: No
1-255 units of 100 ms each
Default: 200 ms (0.2 seconds)
Valid IP address
Default: Not set
2-255
Default: 5
1-255
Default: 4 additional gratuitous ARPs,
for a total of 5
Group Section
Group
Adds the AX device to HA groups and sets the priorities for each group.
In Active-Standby configurations, configure only
one HA group. Use the same group ID on each AX
device.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
269 of 276
Description
Supported Values
Checks the health of gateways and changes HA status if a gateway fails its health check.
VLAN
Description
Supported Values
270 of 276
Yes or No
Default: No
P e r f o r m a n c e
b y
D e s i g n
Description
Specifies the HA interface to use for session synchronization and for management traffic between
the AX devices.
Supported Values
AX Ethernet interface enabled for HA
Default: The AX selects the Active
AX devices preferred HA port as follows:
1. Is a preferred port specified with the
inline configuration, and is the port
up? If so, use the port.
2. If no preferred HA port is specified
in the configuration or that port is
down, the first HA interface that came
up on the AX is used as the preferred
HA port.
Restart Time
L3 Inline Mode
Link Event
Delay
Amount of time the AX device waits before changing the HA state (Up, Partially Up, or Down) in
response to link-state changes on the HA interfaces.
P e r f o r m a n c e
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
271 of 276
Description
Supported Values
VIP Section
Status
HA Status
Type
272 of 276
Default: Disabled
One of the following:
None
Router-Interface
Both
VLAN
Default: Disabled
Enabled or Disabled
Heartbeat
Enabled or Disabled
Note: If the interface is tagged and heartbeat messages are enabled, you must specify the VLAN.
Specifies the VLAN on which heartbeat messages
are enabled.
Server-Interface
Default: None
Enabled or Disabled
Default: Disabled. When enabled,
heartbeat messages are enabled for all
VLANs.
VLAN ID
Heartbeat messages are enabled for all
VLANs. However, if the interface is
tagged and heartbeat messages are
enabled, you must specify the VLAN
ID.
P e r f o r m a n c e
b y
D e s i g n
Note:
Note:
b y
D e s i g n
Document No.: D-030-01-00-0002 - Ver. 2.4.3 6/21/2010
273 of 276
The items listed above that appear in the configuration file are copied to the other AX devices running-config.
Data Files Copies only the SSL certificates and private-key files,
aFleX files, External health heck files, and black/white-list files to
the other AX device
Running-config Copies everything listed for the All option, except
the data files, from this AX devices running-config
Startup-config Copies everything listed for the All option, except
the data files, from this AX devices startup-config
4. Next to Peer Option, select the target for the synchronization:
To Running-config Copies the items selected in step 3 to the other
AX devices running-config
To Startup-config Copies the items selected in step 3 to the other
AX devices startup-config
5. To reload the other AX device after synchronization, select With
Reload. Otherwise, the other AX device is not reloaded following the
synchronization.
Note:
In some cases, reload either is automatic or is not allowed. See the Synchronizing HA Information section in the High Availability chapter of
the AX Series Configuration Guide.
6. Click OK.
274 of 276
P e r f o r m a n c e
b y
D e s i g n
P e r f o r m a n c e
276
b y
D e s i g n
Corporate Headquarters
A10 Networks, Inc.
2309 Bering Dr.
San Jose, CA 95131-1125 USA
Tel: +1-408-325-8668 (main)
Tel: +1-408-325-8676 (support - worldwide)
Tel: +1-888-822-7210 (support - toll-free in USA)
Fax: +1-408-325-8666
www.a10networks.com
276 of 276
P e r f o r m a n c e
b y
D e s i g n