Serveriron Adx: Graphical User Interface Guide
Serveriron Adx: Graphical User Interface Guide
23 January 2012
ServerIron ADX
Graphical User Interface Guide
Document History
ServerIron ADX Graphical User Interface 53-1002412-01 New document January 2012
Guide
Contents
In this chapter
• Related documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
• Objectives. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
• How to use this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
• Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
• Documentation feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
• Requesting technical support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Related documentation
The following Brocade documents supplement the information in this guide and can be located at
http://www.brocade.com/ethernetproducts.
• ServerIron ADX Advanced Server Load Balancing Guide
• ServerIron ADX Security Guide
• ServerIron ADX Server Load Balancing Guide
• ServerIron ADX Switch and Router Guide
• ServerIron ADX Administration Guide
Objectives
This guide is intended to provide instructions for configuring, monitoring, and managing ADX device
using the web interface.
Document conventions
This section describes text formatting conventions and important notice formats used in this
document.
Text formatting
The narrative-text formatting conventions that are used are as follows:
Notes
The following notice statements are used in this manual.
NOTE
A note provides a tip, guidance, or advice, emphasizes important information, or provides a
reference to related information.
ATTENTION
An Attention statement indicates potential damage to hardware or data.
Documentation feedback
Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and
completeness of this document. However, if you find an error or an omission, or you think that a
topic needs further development, we want to hear from you. Forward your feedback to:
documentation@brocade.com
Provide the title and version number of the document and as much detail as possible about your
comment, including the topic heading and page number and your suggestions for improvement.
In this chapter
• System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
• Starting the ADX web interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
• Configuring basic settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
• Setting up secure web access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
System requirements
The ADX web interface is a browser-based interface that allows you to configure, monitor, and
maintain an ADX device. The interface can be used for creating a new configuration, modifying an
existing configuration, monitoring the traffic on a device, maintaining the logs, managing software
images and licenses, retrieving technical support information.
Supported hardware
The following hardware platforms are supported for this release:
• ServerIron ADX 1000
• ServerIron ADX 4000
• ServerIron ADX 10000
Supported software
To access the web interface for all the platforms, your device requires the following software:
• Supported application—Adobe Flash Player 10.2 or later
• Supported browsers:
- Internet Explorer 8.0 or later
- Google Chrome
- Mozilla Firefox
NOTE
Other browsers that support Adobe Flash Player 10.2 may also work but have not been validated
with this system.
NOTE
The default user name is admin and default password is brocade. After logging in, you must
change the default password to ensure security. The password must contain alphanumeric
characters.
NOTE
You have three attempts to log in to the web interface. If all three login attempts fail, you will be
locked out for 30 minutes. During the locked out period, you cannot log in even if you provide
the correct password.
The home page of the ADX web interface is displayed. To terminate a session at any time, click
Logout on the login bar in the top right corner.
NOTE
The management port supports IPv4 addresses only. The IP address configuration procedure is the
same for both HTTP and HTTPS.
The steps below vary depending on whether you are running switch code or router code on the ADX
device.
3. Configure a static route (the default route cannot point to the management port).
ServerIronADX(config-if-mgmt-1)# ip route 10.54.1.0/24 1.1.1.254
4. Write to memory.
ServerIronADX# write memory
.Write startup-config in progress.
.Write startup-config done.
ServerIronADX#
3. Assign an IP address.
ServerIronADX(config-if-mgmt-1)# ip address 1.1.1.1/24
ServerIronADX(config-if-mgmt-1)# exit
4. Configure a static route (the default route cannot point to the management port).
ServerIronADX(config)# ip route 10.54.1.0/24 1.1.1.254
5. Write to memory.
ServerIronADX# write memory
.Write startup-config in progress.
.Write startup-config done.
ServerIronADX#
For more information about configuring the management port, refer to the ServerIron ADX
Administration Guide.
Importing SSL digital certificates and private key files from CLI
To import a digital certificate from the Trivial File Transfer Protocol (TFTP) server, enter the following
command.
ServerIronADX(config)# ip ssl certificate-data-file tftp <ip address>
<certificate file-name>
To import a private key from TFTP server, enter the following command.
ServerIronADX(config)# ip ssl private-key-file tftp <ip address> <key file-name>
After you have imported the digital certificate, enter the following command to enable HTTPS
access.
ServerIronADX(config)# crypto-ssl certificate generate
NOTE
Imported certificates must be no larger than 4096 bits.
NOTE
Only the private keys that are unencrypted with the file size of 512 or 1024 bits are supported.
Enabling HTTPS
To enable HTTPS access, use the following command.
ServerIronADX# web-management https
ServerIronADX# web-management soap-service
If you login through HTTPS, the system prompts you for certificate verification. Click Yes to login to
the device.
To verify that the web access is enabled correctly, use one of the following methods.
• For HTTP access, enter http://<IP address> in the address bar of the browser.
Example http://1.1.1.1
• For HTTPS access, enter https://<IP address> in the address bar of the browser.
Example https://1.1.1.1
In this chapter
• Web interface overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
• Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
• Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Layout
The web interface of the ADX device is illustrated, as shown in Figure 1.
1 2 3 4 5 6 7
• Login bar—-Includes information regarding your login session along with the links to get
additional help.
The following options are displayed on the login bar:
- Hostname—Host name and the model of the device.
- User—Username that was used to log in to the device.
- Context—Context corresponding to the username.
- Role—Role of the user.
- Help—Link to the Brocade ADX Community website.
- Log out—Ends the current session and returns to the login page.
• Task bar—Includes tabs for each of the primary GUI tasks.
The following tabs are displayed on the task bar.
- Dashboard—Displays a summary of the system and its state along with the information
about the traffic flowing through the device.
- Configure—Allows you to configure the ADX features on the device.
- Monitor—Displays detailed statistics and status information for the device.
- Maintain—Provides the ability to manage licenses, upload software, reboot the device, and
retrieve information for technical support
• Menu bar—Allows you to navigate to specific subsections within a primary tab. The menu bar is
currently displayed when Dashboard, Configure, and Monitor tabs are selected.
The following options are available from the menu bar depending on the primary tabs selected.
- System—Displays information related to the system status and configurations including
system settings, system limits, high availability, and user management.
- Network—Displays information related to the network status or configurations including
interface and routing information.
- Traffic—Displays information related to the traffic status or configurations including virtual
servers, real servers, real server groups, and scripts.
- Security—Displays information related to the security status or configurations including
Access Control Lists (ACLs), Secure Socket Layer (SSL), Distributed Denial of Service
(DDoS) protection.
• Sidebar—Provides the basic navigation within a given task and subsection allowing you to view
or configure the various entities within the selected task.
• Main page—Displays the fields associated with the item that you have selected in the sidebar.
- Control bar—Displays the buttons associated with the operations permitted on the current
page along with status information about the most recent action taken.
- Page tab—Is displayed each time an entity is created or modified or additional details must
be configured for the current page. To close a page tab, click the Close button in the top
corner of the respective tab.
- Button bar—Is displayed when additional parameters must be configured for the feature.
Click the respective buttons to provide the information.
- Red asterisk (*)—Indicates a required field.
Navigation
From the task bar, select a primary task (tab) you want to perform. Selecting the tab displays the
related subsections in the menu bar. When you select a subsection, the related entities are
displayed in the sidebar. By default, the system is set to open the first entity in the sidebar and
displays its related fields in the main page.
Getting guidance
The web interface provides help throughout the web interface.
To get help in the web interface, move the cursor over the fields for which you want more
information. The tooltip displays field-specific information to assist you when entering configuration
data. For example, the System Overall Health field tooltip displays “The health of the entire Device
called based on various factors including Temperature, Fan Status, Memory and CPU utilization on
all BPs and MPs”.
In this chapter
• Dashboard overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
• System view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
• Traffic view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Dashboard overview
The Dashboard is the first tab in the ADX web interface. You can use the dashboard to monitor the
health and performance of the system based on statistical counters specific to the device or to the
traffic flowing through the device.
From the menu bar, you can click to view either System or Traffic menu. The System dashboard
provides a summary of the entire system and includes device information such as CPU utilization,
memory utilization, throughput, and system state. The Traffic dashboard provides a summary of the
virtual servers (VIPs) and real servers configured on the device and the related traffic information
such as connections per second, average response times per service and overall traffic
distribution. By default, the ADX web interface displays the System dashboard after you log in.
Both the System and Traffic dashboards have six panes that can be viewed, hidden, resized, and
reorganized. The information in the dashboard is automatically updated based on the autorefresh
interval that you set. By default, the autorefresh interval is set to 30 seconds. You can change the
autorefresh time interval by selecting an interval option from the Auto Refresh list. To disable
autorefresh, you can select the On Demand option from the list.
You can view the counters in the dashboard in either graphical or tabular format based on your
preference. To change the format, click the graph or table icon in the top corner of selected pane.
NOTE
Graphical view is restricted only to some of the panels in the dashboard.
For more information on the icons, refer to Chapter 9, “Monitoring Overview”. You can also view
more detailed information about the Dashboard counters by clicking the Details link located at the
bottom of each pane. This link directs you to the corresponding detailed counters under the
Monitor tab.
You can customize the dashboard panels using the following methods:
• Use the drag and drop operation to reorganize the panels to the desired area on the
dashboard.
• In graphical view, select or clear the check box next to the corresponding legend to view or hide
a line that represent a legend on the graph.
• Click the maximize or minimize button at the top right of the panel to maximize or minimize the
panels.
• Click the arrow next to the each individual header column to sort the data in ascending or
descending order.
System view
The System dashboard displays various system information including general summary,
throughput, log messages, established connections, and sessions.
To view the System dashboard, select the Dashboard tab in the task bar and click System on the
menu bar. The System dashboard page is displayed, as shown in Figure 2.
FIGURE 2 System dashboard
Traffic view
The Traffic dashboard displays network traffic information including traffic distribution, sessions
and connections for service, and service response time.
To view the Traffic dashboard, select the Dashboard tab in the task bar and click Traffic on the
menu bar.
The Traffic dashboard page is displayed, as shown in Figure 3.
FIGURE 3 Traffic dashboard
This section describes the Configure features, and includes the following chapters:
• Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
• System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
• Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
• Traffic Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
• Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Configuration Overview 4
In this chapter
• Navigating the configuration tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
• Saving the configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
New Allows you to create a new instance of the currently selected entity.
Edit Allows you to modify the attributes of the currently selected entity.
Delete Allows you to delete a configured entity from the ADX device. All nested
configurations within the deleted configured entity are also discarded.
Common icons
The main page displays the common icons on the top right corner for all the configuration tasks.
Table 2 describes the icons displayed on the main page.
Filter Allows you to filter the data currently displayed in the Summary page. Click
the Filter icon and select the criteria from the Filter Criteria list to filter the
data.
Auto refresh Refreshes the current page based on the most recent changes made to
the running configuration. Includes an option to set the interval at which
you want the page has to auto refreshed.
Save Saves the running configuration to the startup configuration.
System Settings 5
In this chapter
• General settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
• High Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
• User management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
General settings
After you login to the web interface, you can configure the basic system information to identify your
device in the network and set the system limits to control the memory usage.
NOTE
All the configuration changes performed in the web interface are stored in the running configuration.
Click the Save icon to save the running configuration to the startup configuration.
For more information on the basic system settings, refer to the ServerIron ADX Switch and Router
Guide.
You can use the links under Quick Links to helpful Tasks, to navigate to real servers, virtual servers,
health checks, and content switching policy configurations.
NOTE
Any change to the system limits requires you to reboot the ADX device for these changes to take
effect. It is recommended to save the running configuration to the startup configuration to preserve
the changes across reboot. For more details on how to reboot the system, refer to “Restarting the
System” on page 191.
For more information on setting the system limits, refer the ServerIron ADX Switch and Router
Guide and ServerIron ADX Security Guide.
Click View Configuration to review the configuration that is currently running on the ADX device. To
save a local copy of the running configuration to a text file, click Download Configuration.
High Availability
High Availability (HA) is a system design and service implementation that prevents downtime and
ensures uninterrupted service.
HA overview
To configure the HA feature on the ADX device, the setup requires two ADX devices, where one
device must be active and the other device must be in the standby mode. The active device
accepts connections and manages servers, and the standby device monitors the active device. If
the active device fails to accept connections, the standby device takes over the active device
functions. The HA for Server Load Balancing (SLB) consists of the following modes:
• Hot standby—This mode requires a setup of two ADX devices, where one device is always active
and the other device is always in the standby mode. The chassis devices support the hot
standby mode.
• Symmetric—This mode requires a setup of two ADX devices, where both the devices can
receive SLB traffic and both are active for the same VIP (virtual server).
NOTE
You can enable only one of the HA modes on the device.
For more information on high availability, refer to the ServerIron ADX Server Load Balancing Guide.
NOTE
Hot standby is supported only in switch code.
To configure hot standby on the device that runs switch code, perform the following steps within the
Configure Tab.
1. Click System on the menu bar.
2. From the sidebar, select High Availability.
3. Select Hot Standby. The Hot Standby page is displayed, as shown in Figure 8.
FIGURE 8 Configuring hot standby
NOTE
Symmetric active-active mode is supported in both switch code and router code.
NOTE
The active-active port is used to synchronize NAT, syn-proxy, and other non-SLB related sessions.
The Summary page displays the list of configured VIP groups, 30 entries at a time. Each entry in the
list includes the name of the group, configured interface, and the number of VIPs in that group.
3. Click New at the bottom of the VIP Groups page.
The VIP Group - new page tab is displayed, as shown in Figure 12.
FIGURE 12 Configuring a VIP group
NOTE
Click Add All to add all the VIPs entries in the available list to the selected list. Also, you can
delete the VIPs from the selected list, by clicking Remove or Remove All.
• Interface: Select an interface that you want to include in the VIP group.
• Virtual Interface: Enter the number of virtual interfaces. The range is from 1 through 64.
The default value is 1.
NOTE
The device will consider either the interface details or virtual interface details. If you
provide the interface details, then the virtual interface will not be considered.
• Associate VRRP-E VRID: Enter the VRRP-E VRID number that must be associated with the
VIP group. The range is from 1 through 10. The default value is 1.
5. Click Apply to save your entries.
Click Reset to revert the configuration to the previous configured values.
To modify the configured VIP group entry, in the Summary table, select an entry and click Edit or
double-click the entry. Click Delete to delete a VIP group configuration.
For more information on the VIP groups, refer to the ServerIron ADX Server Load Balancing Guide.
User management
User management allows restricting or authorizing system access for the users based on their
context. You can view the user name, role and context associated with the logged in user in the
login bar, as shown in Figure 13.
FIGURE 13 Viewing user management information
The Users page displays the list of configured user accounts. Each entry in the list includes the
user name, user type, associated role template and context.
3. Click New at the bottom of the Summary page.
The User - new page tab is displayed, as shown in Figure 15.
FIGURE 15 Creating a user
NOTE
The options in the Role Based Settings tab are enabled only when you click Role Based
User type. For more information on the configuration of role-based user, refer to “Assigning
user role” on page 31.
• Change Password: Select the Yes check box to change the password.
• Password: Enter the password with a minimum of eight characters. The password is always
masked to ensure security.
• Confirm Password: Enter the password again for confirmation.
• Password Expiry Time (days): Enter the number of days for the password validity. The range
is from 1 through 365 days. The default is 90 days.
5. Click Apply to save your entries.
Click Reset to revert the configuration to the previous configured values.
To modify the configured user information, in the Summary table, select an entry and click Edit or
double-click the entry. You can also delete a user by clicking Delete.
NOTE
You cannot delete the user currently logged in to the device.
• Default Context: Select the context that has to be associated with the user by default.
• Role Template: Select the role template that is to be associated with the user.
• Under Context/Role Mappings, enter the following information:
New Context Name: Select a context name that you want to assign to the user.
Role: Select a role that you want to assign to the user.
Click Add.
The context names along with their respective roles are displayed in the table.
NOTE
To delete a context-role mapping entry from the table, select an entry from the table and
click Delete. Click Delete All to delete all the entries.
Creating contexts
After login, the user is automatically associated with the configured context or default context. To
edit the context-related configurations, the user must be associated with that context. Within a
context, a user can be a manager, operator, or viewer of the context-related configurations. A user
can navigate to different contexts by selecting the context name in the login bar.
To create a context on the device, perform the following steps within the Configure tab.
1. Click System on the menu bar.
2. From the sidebar, select User Management, and then select Contexts.
The Contexts page is displayed, as shown in Figure 17
FIGURE 17 Creating context
3. Enter the context name, for example, Finance in the Context Name field.
4. Click Add.
The context name is displayed in the Current Contexts table.
To delete a context configuration, select an entry from the Current Contexts table and click
Delete.
NOTE
A context cannot be deleted if it is referenced.
For more information on creating the contexts, refer to the ServerIron ADX Administration Guide.
The Role Templates page displays the list of configurated role templates, 30 entries at a time. Each
entry includes role template name, role, default context, and its active status.
3. Click New at the bottom of the Role Templates page.
The Role Template - new page tab is displayed, as shown in Figure 19.
FIGURE 19 Creating role template
NOTE
To delete a context-role mapping from the table, select an entry from the table and click Delete.
Click Delete All to delete all the entries.
Network Settings 6
In this chapter
• Configuring network interfaces and IP addresses . . . . . . . . . . . . . . . . . . . . 35
• Configuring static routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
• Configuring source IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
• Configuring VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
The Summary page displays a list of configured IP interfaces. Each entry in the list includes the
interface ID, MAC address, interface name, status, and type.
3. Select an interface from the Summary page and click Edit.
NOTE
The Speed, Duplex, and FlowControl fields are enabled only if you disable the auto-negotiation
feature.
• Speed: Click 10M, 100M, 1G, or 10G to set the speed for the port.
• Duplex: Click Half or Full to set the duplex mode for the port.
• FlowControl: Click the Enable check box to deactivate flow control. By default, the flow
control is enabled.
5. Click Apply to save your entries.
Click Reset to revert the configuration to the previous configured values.
For more information on the network interfaces, refer to the ServerIron ADX Switch and Router
Guide.
NOTE
To delete an IP address entry, select an IP address entry from the table and click Delete.
For more information on the IP addresses configuration, refer to the ServerIron ADX Switch and
Router Guide.
3. Select an interface from the table and perform one of the following actions:
• Click Enable at the bottom of the Summary page to enable the interface.
• Click Disable to disable the interface.
For more information on enabling or disabling an interface, refer to the ServerIron ADX Switch and
Router Guide.
The Summary page displays the list of configured static routes. Each entry in the list includes the
destination network, subnet mask, gateway, metric, and distance information.
3. Click New at the bottom of the Summary page.
The Static Route - new page tab is displayed, as shown in Figure 25.
FIGURE 25 Configuring static route
• Gateway: For IPv4, click either the IP Address or Interface field to provide the information.
For IPv6, enter the information for both IP Address and Interface.
IP Address—The IP address of the gateway.
Interface—The interface of the gateway.
• Metric: Enter the value for comparing two routes for the same destination in the IP route
table. The range is from 1 through 16. The default metric is 1.
• Distance: Enter the distance value for comparing a route with routes from other route
sources to the same destination before adding the route in the IP route table. The range is
from 1 through 255. The default value is 1.
5. Click Apply to save the entries.
Click Reset to revert the configuration to the previous configured values.
To modify the configured static route information, in the Summary table, select an entry and
click Edit or double-click the entry. You can also delete a configuration by clicking Delete.
For more information on the static routes, refer to the ServerIron ADX Switch and Router Guide.
The Summary page displays the list of configured source IP addresses. Each entry in the list
includes IP address, subnet, default gateway, and the source port for the real servers.
3. Click New at the bottom of the Summary page.
The Source IPs - new page tab is displayed, as shown in Figure 27.
FIGURE 27 Configuring source NAT IP
NOTE
The Source Port Range field is enabled only when you select the IP type as Source NAT IP
• Allocate Source Port per Real Server: Select the check box to if you want to allocate the
source port on the real server.
5. Click Apply to save your entries.
Click Reset to revert the configuration to the previous configured values.
To delete the configured source IP address information, select an entry from the Summary
table and click Delete.
For more information on the source NAT IP, refer to the ServerIron ADX Security Guide.
The Summary page displays the list of configured source NAT IP addresses. Each entry in the list
includes IP address, subnet, default gateway, and the source port for the real servers.
3. Click New at the bottom of the Summary page.
The Source NAT IPs - new page tab is displayed, as shown in Figure 29.
FIGURE 29 Configuring source NAT IP
Configuring VLANs
You can configure two types of Virtual Local Area Networks (VLANs); port-based VLANs and IP
subnet VLANs. To configure VLAN on the device, perform the following steps within the Configure
tab.
1. Click Network on the menu bar.
2. From the sidebar, select VLAN.
The Summary page displays a list of configured VLANs. Each entry in the list includes VLAN name,
router interface, VLAN ports, and the associated spanning tree status.
3. Click New at the bottom of the Summary page.
The VLAN - new page tab is displayed, as shown in Figure 31.
FIGURE 31 Configuring a VLAN
• Router Interface: Select the Use check box for the routing interface to locally route the IP
packets from an IP subnet VLAN to the port-based VLAN on the same router. The range is
from 1 through 64. The default value is 24.
• Spanning Tree: Select the Enable check box to enable the spanning tree on the VLAN to
detect and eliminate logical loops in the network.
5. Under Port Members, do the following tasks:
• Tag: Select the check box only if a port connecting the devices is a member of one or more
port-based VLAN.
• Select the ports from the Available Ports list and click Add to add the ports to the Selected
Ports list.
NOTE
To remove a port from the Selected Ports list, click Remove. To remove all the ports from the
selected list, click Remove All.
Traffic Settings 7
In this chapter
• Global traffic settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
• Virtual servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
• Real servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
• Health checks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
• Content switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
• OpenScript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
NOTE
The OID Entry ID and Max Value options are enabled only when you select the load balancing
predictor algorithms as Dynamically weighted Direct and Dynamic Weighted Reverse.
• OID Entry ID: Enter the SNMP request entry identification number that represents the
weight of the real server. The range is from 1 through 255.
• Max Value: Enter the maximum value for the dynamic weighting. The range is from 0
through 4,294,967,295.
• Reassign Threshold: Enter the SYN ACK threshold that specifies the number of contiguous
unacknowledged SYN ACKs accumulated for a real server, before determining that the real
server is inactive.The range is from 6 through 4,000. The default is 20.
• TCP Age: Specify the number of minutes the device allows a TCP connection to remain
inactive before closing the connection. The range is from 2 through 60 minutes. The
default is 30 minutes.
• UDP Age: Specify the number of minutes the device allows a UDP connection to remain
inactive before closing the connection. The range is from 2 through 60 minutes. The
default is 5 minutes.
• Sticky Age: Specify the number of minutes a sticky server connection can remain inactive
before aging out. The range is from 2 through 60 minutes. The default is 5 minutes.
• Clock Scale: Enter a value to adjust the clock scale for configurations that require TCP or
UDP timeouts longer than the maximum value. The range is from 1 through 24. The default
is 1. For example, when you set the clock scale to 2, then a TCP age of 60 minutes would
be equivalent to 120 minutes.
• Source NAT: Select to Enable check box to globally enable the source NAT on the real
servers.
• Enable TCP Syn NAK Threshold: Select the Enable check box to allow the TCP SYN NAK
threshold feature for a real server.
• TCP Syn NAK Threshold: Enter the SYN NAK threshold that specifies the number of
contiguous unacknowledged SYN NAKs accumulated for a real server, before determining
that the server is inactive. The range is from 6 through 4,000. The default value is 20.
• Packet Fragmentation: Select the Enable check box to configure a port to fragment the
packets that exceeds default size.
• VIP Protection: Select the Enable check box to deny traffic that is destined to a VIP port
that is not defined under a VIP.
• Fast Stateless: Select the Enable check box, so that the device uses the information
gathered during setup of the session to identify an optimized processing path and
forwards the packets to pass through the stateless ports.
4. Click Apply to save your entries.
Click Reset to revert the configuration to the previous configured values.
For more information on global settings, refer to the ServerIron ADX Server Load Balancing Guide.
Virtual servers
A virtual server allows you to manage application server resources by handling the changing traffic
requirements without disrupting the service to the end-users.
The Configure Virtual Servers page displays a list of the virtual servers that are configured in the
device. Each entry in the list includes virtual server name, IP address of the virtual server, virtual
server port, predictor, and the status.
3. Click New at the bottom of the Configure Virtual Server page.
The Configure Virtual Server - new page tab is displayed, as shown in Figure 34.
FIGURE 34 Configuring virtual server
• Admin State: Click the Enable check box to disable the virtual server. By default, admin
state is enabled.
• Load Balancing Predictor: Select a load balancing algorithm from the list to determine the
load distribution among real servers; for example, Weighted Round Robin.
• OID Entry ID: Enter the SNMP object ID value that represents the weight of the real server.
• Max Value: Enter the maximum value for the dynamic weighting. The range is from 0
through 4,294,967,295.
• Under Symmetric, provide the following information:
Priority: Enter the value to set the priority level for the virtual server. The device with
higher priority will be the active device while the standby device will have lower priority.
The range is from 1 through 255.
Dynamic Priority: Enter the value to automatically adjust the priority of the virtual
server application to a lower value, if the application fails a health check. The range is
from 1 through 255.
Symmetric Active: Select the Enable check box to configure a device pair as an true
active-active pair in Server Load Balancing (SLB).
5. Click Advanced to configure the advanced parameters on the virtual server.
The Advanced tab is displayed, as shown in Figure 35.
FIGURE 35 Configuring advanced parameters
• UDP Age: Specify the number of minutes the device allows a UDP connection to remain
inactive before closing the connection. The range is from 2 through 60 minutes. The
default value is 5 minutes.
• Sticky Age: Specify the number of minutes a sticky server connection can remain inactive
before aging out. The range is from 2 through 60 minutes. The default value is 5 minutes.
• Under VIP Route Health Injection, provide the following information:
Advertise VIP Route: Select the Enable check box to advertise a route in the network
containing the virtual server, even if the virtual server is unavailable. Select the Inject
always check box for route injection to occur always.
Subnet Length: Enter the subnet mask length as an index number. The range is from 1
through 32.
7. Click Apply to save your entries.
Click Reset to revert the configuration to the previous configured values.
To modify the configured virtual server information, in the summary table, select an entry and
click Edit or double-click the entry. Click Delete to delete a virtual server configuration.
For more information on configuring virtual servers, refer to the ServerIron ADX Server Load
Balancing Guide.
The Configure Virtual Server Ports page displayed a list of configured virtual server ports. Each
entry in the list includes port name, runtime state, protocol, backup, and heath check status.
4. Click New at the bottom of the Configure Virtual Server Ports page. The Basic tab is displayed,
as shown in Figure 37.
FIGURE 37 Configuring virtual server ports
• UDP Age: Specify the number of minutes the device allows an UDP connection to remain
inactive before closing the connection. The range is from 2 through 60 minutes. The
default is 5 minutes. Select the UDP Fast Age and UDP Normal Age check boxes based on
the requirement.
6. Click the Stickiness tab to enable a sticky connection on the TCP or UDP virtual server port.
The Stickiness tab is displayed, as shown in Figure 38.
FIGURE 38 Configuring stickiness parameters
• Sticky Based on Subnet: Click Enable to send all requests originating from a given subnet
to the same real server.
Subnet Mask: Enter the subnet mask that is used for the stickiness.
• No Stickness: Click Enable to disable stickiness on the virtual server port.
8. Click Advanced tab to configure the advanced parameters for the virtual server port. The
Advanced tab is displayed, as shown in Figure 39.
FIGURE 39 Configuring advanced parameters
4. Select the VIPs or ports you want to bind from the Available RS-Ports list and click Bind to move
them to the Bound RS-Ports list.
To unbind the ports, select the ports you want to unbind from the Bound RS-Ports list and click
Unbind. To bind or unbind all the ports, click Bind All or Unbind All.
For more information on binding virtual server ports, refer to the ServerIron ADX Server Load
Balancing Guide.
3. Select a virtual server from the Configure Virtual Servers page and perform one of the
following actions:
• Click Enable at the bottom of the Configure Virtual Servers page to enable the virtual
server.
• Click Disable to disable the virtual server.
For more information on enabling or disabling virtual servers, refer to the ServerIron ADX Server
Load Balancing Guide.
Real servers
Real servers are the actual application servers that handles all the client service requests.
The Configure Real Servers page displays a list of all the configured real servers. Each entry in the
list includes the real server name, IP address, port, and status.
3. Click New at the bottom of the Configure Real Servers page.
The Configure Real Sever - new page tab is displayed. By default, Basic configuration tab is
displayed, as shown in Figure 43.
FIGURE 43 Configuring real server basic parameters
4. Click New at the bottom of the Configure Real Server Ports page.
To modify the configured real server ports, in the summary table, select an entry and click Edit
or double-click the entry. You can also delete a configuration by clicking Delete.
For more information on configuring real server ports, refer to the ServerIron ADX Server Load
Balancing Guide.
• Bringup Intervals: Enter the Layer 4 and Layer 7 bringup intervals to enable the health
check policy during initial bringup of the server in seconds. The range is from 1 through
255 seconds.
7. Under Specific settings to HTTP, enter the following information:
• URL: Enter the URL name to specify whether the HTTP health check performs a GET or
HEAD request while customizing the Layer 7 information sent with the health check.
• Status Codes: Enter the status code for the four groups to change the HTTP status codes
that the device accepts as valid responses. The range is from 100 through 999.
• Content Match: Select the content match from the list to attach a match list for an HTTP
content verification health check to the real server.
• Health Check Type: Click one of the following options:
Simple—To perform the simple health check.
Complete—To perform the complete health check.
8. Click Apply to save your entries.
Click Reset to revert the configuration to the previous configured values.
To modify the configured real server ports, in the summary table, select an entry and click Edit
or double-click the entry. You can also delete a configuration by clicking Delete.
For more information on configuring health check on real servers ports, refer to the ServerIron ADX
Server Load Balancing Guide.
3. Select a real server from the list and click one of the following buttons at the bottom of the
Configure Real Servers page:
• Click Enable at the bottom of the Configure Real Servers page to enable the real server.
• Click Disable to disable the real server.
For more information on enabling or disabling real servers, refer to the ServerIron ADX Server Load
Balancing Guide.
The Server Groups page displays a list of configured real server groups. Each entry in the list
includes name of the group, ports added, bound virtual server and ports, and number of real
servers.
3. Click New at the bottom of the Server Groups page.
The Configure Real Server - new page tab is displayed, as shown in Figure 51.
FIGURE 51 Configuring real server
Health checks
The ADX device uses Layer 3, and Layer 4 or Layer 7 health checks to verify the availability of real
servers and the applications on the real servers.
• L4 Check Only: Select the Enable check box for Layer 4 checks.
• Health Check Protocol: Optionally, select the protocol and the port for health check from
the list.
• Session Synchronization: Select the Enable check box to enable session synchronization
for the port in high availability designs.
• Retries: Enter the number of retries. The range is from 1 through 5. The default is 2.
6. Click Apply to save your entries.
Click Reset to revert the configuration to the previous configured values.
To modify the configured port profiles, in the summary table, select an entry and click Edit or
double-click the entry. You can also delete a configuration by clicking Delete. However, you
cannot edit or delete port profiles if they are in use.
For more information on configuring port profiles, refer to the ServerIron ADX Server Load
Balancing Guide.
TABLE 3 Protocols
Protocol Function Your Action
DNS Specifies the DNS Under Settings for DNS, provide the following information:
protocol to be checked • Zone: Enter the name of the Domain Name System (DNS) zone
on the traffic passes that sends a Source-of-Authority (SOA) request for the zone
through the port. name.
• Address Query: Enter a domain name that a device has to be
requested from the real server.
HTTP Specifies the HTTP Under Settings for HTTP, provide the following information:
protocol to be checked • URL: Enter the URL page name to perform a HEAD request.
on the traffic passes • Status Codes: Enter four HTTP status code ranges for the device
through the port. to accept as valid responses, if the health check reply contains a
code within the specified range.
• Content Match List: Select a match list that can be attached for
an HTTP content verification health check to the real server.
• Health Check Type: Select one of the following:
• Simple—To perform the simple health check.
• Complete—To perform the complete health check.
LDAP Specifies the LDAP Under Settings for LDAP, provide the following information:
protocol to be checked • Version: Click one of the following options:
on the traffic passes • v2—Specify the Lightweight Directory Access Protocol
through the port. (LDAP) version as 2.
• v3—Specify the LDAP version as 3.
• User Name: Enter the user name that must be allowed to query
the LDAP server.
• Password: Enter the password for the user name.
• Base DN: Enter the base distinguished name (unique identifier
for each entry) of the LDAP.
RADIUS Specifies the RADIUS Under Settings for RADIUS, provide the following information:
protocol to be checked • User Name: Enter an authentication user name on the server.
on the traffic passes • Password: Enter an authentication password on the server
through the port. • Key: Enter an authentication key on the server.
• NAS IP Address: Enter the IP address of the Network Access
Server (NAS) that is connected to the RADIUS server.
• NAS Port: Enter the port of the NAS.
SSL Specifies the SSL Under Settings for SSL, provide the following information:
protocol to be checked • URL: Enter the URL page name to perform a HEAD request.
on the traffic passes • Status Codes: Enter up to four SSL status code ranges for the
through the port. device to accept as valid responses, if the health check reply
contains a code within the specified range.
• Content Match List: Select a match list that can be attached for
an SSL content verification health check to the real server.
• Health Check Type: Select one of the following:
• Simple—To perform the simple health check.
• Complete—To perform the complete health check.
For more information on configuring port policies, refer to the ServerIron ADX Server Load
Balancing Guide.
The Element Heath Check - new page is displayed, as shown in Figure 60.
FIGURE 60 Configuring element health check.
• Health Check State: Select the Enable check box to enable health check. By default, the
health check is enabled.
• Health Check Interval: Specifies the interval at with the ADX device should perform the
health check. Enter the health check interval in seconds. The range is from 1 through 120
seconds. The default is 5 seconds. For SSL, the range is from 5 through 120 seconds.
• Retries: Specifies the number of retries that the ADX device should perform the health
check before concluding that the application has failed the health check. Enter the
number of retries. The range is from 1 through 5. The default is 3.
• L7 Health Check: Select the check box to allow the ADX device to perform the L7 health
check.
• Port: Specifies the port name and the application port number. Select a port name from
the list. The port value is displayed in the field next to the list.
NOTE
For the unknown port, select Custom from the list and enter the port number.
• Content Check: Allows the ADX device to perform the content verification health checks for
ports that do not use one of the well-known port numbers recognized by the ADX device.
Select the Content Check check box to enable content verification health checks.
• Protocol: Select the protocol from the list. The port value is displayed in the field next to the
list.
5. Click Apply to save your entries.
Click Reset to revert the configuration to the previous configured values.
To modify the configured element health checks, in the summary table, select an entry and
click Edit or double-click the entry. You can also delete a configuration by clicking Delete.
However, you cannot edit or delete health check policies if they are in use.
For more information on configuring element health checks, refer to the ServerIron ADX Server
Load Balancing Guide.
The Boolean Health Check - new page is displayed, as shown in Figure 61.
FIGURE 61 Configuring boolean health check
• String Ends With: Specifies the string that should match with the string present at the end
of response sent by the real server. Select String Ends With, and enter the string in the
Ends String field.
• Select Simple String Match and enter the following details:
Matches: Enter the string.
Logging: Select the Enable check box.
• Select Compound String Match and enter the following details:
Starts With: Enter the string that must match with the beginning string of response
sent by the real server.
Ends With: Enter the string that must match with the string present at the end text of
the of response sent by the real server.
Logging: Select the Enable check box to enable logging when the selection criteria is
met.
6. Click Add to add a rule.
The added rule is displayed in the Added Rules table. You can click Delete to delete the rule
from the table.
7. Repeat step 5 to step 6 to define additional match conditions.
8. Click Apply to save your entries.
Click Reset to revert the configuration to the previous configured values.
The configured match list is displayed in the Match Lists table. Select the match list policy in
the table and click Edit or double-click the entry to modify the match list. Also, click Delete to
delete the match list from the table.
For more information on configuring match lists, refer to the ServerIron ADX Server Load Balancing
Guide.
Content switching
Content switching allows the ADX device to make forwarding decisions about HTTP traffic based on
information in a URL, cookie, SSL session ID, or XML content. In addition, Layer 7 content switching
allows the device to make forwarding decisions about HTTP traffic by analyzing information
contained within the traffic.
In addition, the device can perform content rewrite on the server responses. In other words, the
device can not only modify requests in the forward direction, but also the responses in reverse
direction.
The device also provides protection against distributed denial of service attacks such as Domain
Name System (DNS) amplification attacks. The device can be configured to forward, drop or rate
limit DNS traffic based on DNS query name, DNS query type, and DNS recursion flag.
1. Create rules—Define a request rule or response rule to identify specific application data within
a request or a response.
2. Create policies—Create a request policy or response policy to specify multiple rules and the
desired actions to be taken when the traffic matches the rule.
3. Binding policies—Apply the created policy to a virtual server port.
To create a content switching policy on the device, perform the following steps within the Configure
tab.
1. Click Traffic on the menu bar.
2. From the sidebar, select Content Switching.
The steps to provision the Layer 7 Content Switching (CSW) policy page are displayed, as
shown in Figure 64.
FIGURE 64 Content switching summary
The page provides a brief step-by-step instructions for creating a request rule and policy for
incoming traffic and response rule and policy for outgoing traffic.
Creating rules
You can create a request and response rules for the device to process the incoming and outgoing
traffic.
The Request Rules page displays the list of the configured request rules for incoming traffic.
3. Click New on the bottom of the Request Rules page.
The Request Rule - new page tab is displayed, as shown in Figure 66.
FIGURE 66 Creating a request rule
URL Allows the device to make Under the Settings for URL Rule, provide the following information:
a load-balancing decision • Operator: Select one of the following operators from the list:
based on the contents of - Prefix—To match if the URL string begins with the
the URL string in an specified prefix.
incoming packet. - Suffix—To match if the URL string begins with the
specified suffix.
- Pattern—To match if the specified pattern exists anywhere
within the URL string.
- Equals—To match if the URL string is equal to the
specified value.
- Exists—To match if a URL string exists in the incoming
packet.
- Search—To match if the URL string contains any one of
the specified values.
• Value: Enter a value that has to match with the URL string.
HTTP Allows the device to make Under the Settings for HTTP Cookie Rule, provide the following
Cookie a load-balancing decision information:
based on the contents of • Operator: Select one of the following operators from the list:
the cookie header field in - Prefix—To match if the HTTP cookie begins with the
an incoming packet. specified prefix.
- Suffix—To match if the HTTP cookie begins with the
specified suffix.
- Pattern—To match if the specified pattern exists anywhere
within the HTTP cookie.
- Equals—To match if the HTTP cookie is equal to the
specified value.
- Exists—To match if a HTTP cookie exists in the incoming
packet.
- Search—To match if the HTTP cookie contains any one of
the specified values.
• Value: Enter a value that has to match with the HTTP cookie.
HTTP Allows the device to make Under Settings for HTTP Header Rule, provide the following
Header a load balancing decision information:
based on the contents of • Header Type: Click one of the following:
an HTTP header field in - Well Known HTTP Header: Select a well known header
an incoming packet. using which you want the ADX device to make a load
balancing decision.
- User Defined Header: Specify a header field using which
you want the ADX device to make a load balancing
decision.
• Operator: Select one of the following operators from the list:
- Prefix—To match if the HTTP header field begins with the
specified prefix.
- Suffix—To match if the HTTP header field begins with the
specified suffix.
- Pattern—To match if the specified pattern exists anywhere
within the HTTP header field.
- Equals—To match if the HTTP header field is equal to the
specified value.
- Exists—To match if the HTTP header field exists in the
incoming packet.
- Search—To match if the HTTP header field contains any
one of the specified values.
• Value: Enter a value that has to match with the HTTP header
field.
HTTP Allows the device to make Under the Settings for HTTP Method Rule, select one of the
Method a load balancing decision following HTTP methods from the HTTP Method list. The HTTP
based on the HTTP method can be:
method in an incoming GET,HEAD,POST,OPTIONS,PUT,DELETE,TRACE,PROPFIND,MOVE,CO
packet. NNECT,BDELTE,PROPPATCH,COPY,LOCK,UNLOCK,MKCOL,BCOPY,B
MOVE,POLL,SUBSCRIBE,SEARCH,BPROPPATH,RPC_OUT_DATA, and
RPC_IN_DATA.
HTTP Allows the ADX to make a Under the Settings for HTTP Version Rule, Select the version of the
Version load balancing decision HTTP from the HTTP Version list. The version can be:
based on the HTTP 1.0 or 1.1.
version of an incoming
packet.
XML TAG Allows the device to make Under the Setting for XML Tag Rule, provide the following
a load balancing decision information:
based on the contents of • XML Tag Name: Enter the name of the XML tag.
an XML tag in an • Operator: Select one of the following operators from the list:
incoming packet. - Prefix—To match if the XML tag begins with the specified
prefix.
- Suffix—To match if the XML tag begins with the specified
suffix.
- Pattern—To match if the specified pattern exists anywhere
within the XML tag.
- Equals—To match if the XML tag is equal to the specified
value.
- Exists—To match if the XML tag exists in the incoming
packet.
- Search—To match if the XML tag contains any one of the
specified values.
• Value: Enter a value that has to match with the XML tag.
TCP Allows the device to make Under the Settings for TCP Content Rule, provide the following
Content a load balancing decision information:
based on the TCP content • Operator: Select one of the following operators from the list:
in an incoming packet, - Prefix—To match if the TCP content begins with the
depending upon the port specified prefix.
type. You can define up to - Suffix—To match if the TCP content begins with the
520 unique TCP rules. specified suffix.
- Pattern—To match if the specified pattern exists anywhere
within the TCP content.
- Equals—To match if the TCP content is equal to the
specified value.
- Exists—To match if the TCP content exists in the incoming
packet.
- Search—To match if the TCP content contains any one of
the specified values.
• Value: Enter a value that has to match with the TCP content.
• Offset: Enter the value from where to begin scanning.
UDP Allows the device to make Under the Settings for UDP Content Rule, provide the following
Content a load balancing decision information:
based on the UDP • Operator: Select one of the following operators from the list:
content in an incoming • Prefix—To match if the UDP content begins with the
packet, depending upon specified prefix.
the port type. You can • Suffix—To match if the UDP content begins with the
define up to 520 unique specified suffix.
UDP rules. • Pattern—To match if the specified pattern exists anywhere
within the UDP content.
• Equals—To match if the UDP content is equal to the
specified value.
• Exists—To match if the UDP content exists in the incoming
packet.
• Search—To match if the UDP content contains any one of
the specified values.
• Value: Enter a value that has to match with the UDP content.
• Offset: Enter the value from where to begin scanning.
DNS DPI Allows the ADX device to Under the Settings for DNS DPI Rule, provide the following
perform a deep packet information:
scan and then classify • Query Type: Specifies the DNS query type to match on.
DNS requests based on • Query Name: specifies the name of the DNS query type to
the following: query type, match on.
query name, RD flag or • Recursion Desired (RD): Select the check box to allow the
the DNS security device to classify the DNS requests based on the RD flag set in
extensions (DNSSEC) OK the packet.
bit in the EDNS0 header. • Security (DNSSEC): Select the check box to allow the device to
classify DNS requests based on the DNSSEC bit set in the
packet.
Nested Allows you to combine Under the Settings for Nested Rule, provide the following
rules with logical information:
operators to create • Build or directly input the expression:
nested rules. Up to four 1 Select a rule from the Rule list
rules can be combined in 2 Select an operator AND or OR from the Operator list.
single role.
NOTE: Under the NOT column, select the check box next to the rule
that you want to exclude from the nested rules.
3 Repeat the step 1 and step 2 to add more rules to the nested
rule.
You can also directly enter the expression of the nested rule in the
Input Expression field.
• Select the master rule from the Master Rule list.
NOTE: If a master rule is not specified, the default master in the
first rule is the nested rule.
Response Allows the device to inspect the Under the Settings for Response Status Code Rule,
Status response based on the code enter the code range in the Status Code Range to
Code found in the response. inspect a response only if the code is within the
specified range.
Response Allows the device to inspect the • Header Type: Click one of the following:
Header response based on the contents - Well Known HTTP Header: Select a well
of an HTTP header field in the known header using which you want the
response. ADX device to make a load balancing
decision.
- User Defined Header: Specify a header
field using which you want the device to
make a load balancing decision.
• Operator: Select one of the following operators
from the list:
- Prefix—To match if the HTTP header field
begins with the specified prefix.
- Suffix—To match if the HTTP header field
begins with the specified suffix.
- Pattern—To match if the specified pattern
exists anywhere within the HTTP header
field.
- Equals—To match if the HTTP header field
is equal to the specified value.
- Exists—To match if the HTTP header field
exists in the incoming packet.
- Search—To match if the HTTP header field
contains any one of the specified values.
• Value: Enter a value that has to match with the
HTTP header field.
Response Allows the device to inspect the Under the Settings for Response Body Rule, provide
Body response based on the string in the following information:
the response body. • Operator: Select one of the following operators
from the list:
- Prefix—To match if the HTTP response body
field begins with the specified prefix.
- Suffix—To match if the HTTP response body
begins with the specified suffix.
- Pattern—To match if the specified pattern
exists anywhere within the response body.
- Equals—To match if the response body is
equal to the specified value.
- Exists—To match if the response body
exists in the incoming packet.
- Search—To match if the response body
contains any one of the specified values.
• Value: Enter a value that has to match with the
response body.
To modify the configured response rules, in the summary table, select an entry and click Edit or
double-click the entry. You can also delete a configuration by clicking Delete.
For more information on configuring content switching rules, refer to the ServerIron ADX Server
Load Balancing Guide.
Creating policies
You can associate content switching rules to a policy (request or response) that defines how the
device process the traffic.
The Request Policy - new page tab is displayed, as shown in Figure 70.
FIGURE 70 Creating request policy
HTTP Allows the device to make Under Rule-Action List, select the rule name from the Rule Name
load balancing decisions list and select one of the following option in the Action list:
about HTTP traffic based • Forward: Allows the device to forward packets matching a
on information in a URL, specified rule to a specified real server or server group. Click
cookie, or SSL session ID. one of the following options and provide the following
information:
- Group ID: Enter the server group ID. The range is from 0
through 1023.
- Server ID: Enter the real server ID. The range is from
1024 through 2047.
• Persist: Allows the device to send requests with similar
content to the same server when the specified rule is
matched. Provide the following information:
- Offset: Specify the offset in bytes from the end of the
matched string.
- Length: Enter the length of the persist string in bytes or
enter the substring with which the persist string ends in
the End Delimiter field.
- Persist Method: Select one of the persist methods from
the list. The methods are Hash to Bucket, Group ID or
Server ID, Hash to Group ID, Server Name, Server Alias
Name, and Secondary.
• Redirect: Allows the device to redirect a request to an
alternate domain, URL, or port when the specified rule is
matched. Provide the following information:
- Redirect Domain: Enter the domain name to which the
ADX device to redirect a request.
- Redirect URL: Enter the domain name to which the ADX
device to redirect a request.
- Redirect Port: Enter the port name to which the ADX
device to redirect a request.
• Reply-Error: Allows the device to send a 403 error code page
back to the client when the specified rule is matched.
• Reset-Client: Allows the device to send a TCP reset to the
client, which abruptly terminates the connection.
• Rewrite: Allows the device to insert a header, client IP
address, client certificate, and insert, delete, or replace a
string or cookie into the HTTP requests. Select the rewrite
option and select an option from the Rewrite Object list:
- Cookie: Allows the device to insert a cookie into an HTTP
response when a specified rule is matched.
- Header: Allows the device to insert a header into the
HTTP requests or responses from a virtual server.
- Client IP: Allows the device to insert the client IP address
into the HTTP requests received on a virtual server that
matches a content switching rule you define.
- Client Certificate: Allows the device to insert a client
certificate into the HTTP requests received on a virtual
server that matches a content switching rule you define.
- Custom String: Allows the device to delete a string or
portion of a string from the incoming client request.
DNS Allows the ADX device to Under Rule-Action List, select a rule name from the Rule Name list
provide DNS attack and click one of the following options for Action.
protection to VIP traffic. • Redirect: Allows the ADX device to redirect any packets that
This protection is provided match the filter to a server or server group. Select one of the
by performing a deep following options:
packet scan and then - Group ID: Enter the server group ID. The range is from 0
classifying DNS requests through 1023.
based on the query type, - Server ID: Enter the real server ID. The range is from
query name, RD flag or the 1024 through 2047.
DNSSEC “OK” bit in the • Rate: Allows the ADX device to direct the rate limit packets
EDNS0 header. that match the filter based on the following values:
Based on this - Monitor Interval: Enter the monitoring window in 100 ms
classification, the following unit.
actions can be taken either
individually or in
- Hold-down Period: Enter the length of hold down period
in minutes.
combination: forward
traffic to a specific server
- Connection Rate: Enter a threshold for the number of
global TCP connections per second that are expected on
group, drop packets, log
the device.
events or rate limit DNS
traffic from the identified • Drop: Directs the device to drop any packets that match the
client. filter.
Other Allows the device to make a Under the Rule-Action List, select the rule name from the Rule
Protocols load balancing decision Name list and select one of the options from the Action list:
based on the traffic of • Begin Delimiter: Specifies to set this rule to be the beginning
other protocols. delimiter.
• End Delimiter: Specifies to set this rule to be the ending
delimiter.
• Forward: Allows the device to forward packets that matches a
specified rule to a specified real server or server group.
- Group ID: Enter the server group ID. The range is from 0
through 1023.
- Server ID: Enter the real server ID. The range is from
1024 through 2047.
• Persist: Allows the device to send requests with similar
content to the same server when the specified rule is
matched. When a rule is matched, the device uses the
content that matched the rule to select a server or server
group to send the packet. Provide the following information:
• Offset: Enter the offset in bytes from the end of the
matched string.
• Length: Enter the length of the persist string in bytes.
• End Delimiter: Enter the substring with which the persist
string ends.
• Persist Hash to Bucket: Select the check box to hash the
persist string to a hashing bucket.
• Goto: Allows the matched pattern to be forwarded to another
policy as input and an evaluation to be performed. Provide
the following information:
- Go to this policy: Select the request policy from the list.
• Reset-Client: Allows the device to send a TCP reset to the
client, which abruptly terminates the connection.
• Rewrite: Allows the device to rewrite the matched string with a
pattern that you specify.
• Select the Log check box to write a message to system log when the specified rule is
matched, and specify the log format.
• Click Add to create a rule-action list.
The rule-actions list is displayed in the table. Select a rule in the table and click Remove to
delete the rule and the action from the list. Click the UP or DOWN button to arrange the
rule-action list in desired order.
5. Click Apply to save your entries.
Click Reset to revert the configuration to the previous configured values.
HTTP Header Allows the feature to be used Provide the following information:
in an SSL-Offload environment • HTTP Response Status Code rules: Select the status
when the real servers send code rules from the Available list and click Add to
redirect messages to the move the rules to the Selected list. The code rule
incoming clients. identifies the response packets on which Layer 7
policy should act upon.
• HTTP Response Header Name and String Rule: Select
a rule from the list to identify an HTTP response
header name and the string that needs to be
rewritten.
• Old String Value: Enter the value that defines the
string to be replaced, if the string can be found in the
URL defined by the content switching rule.
• New String Value: Enter the value with which the old
string is to be replaced.
• Offset: Enter the offset in bytes from the end of the
matched string.
• Length: Enter the length of the persist string in bytes.
HTTP Body Allows to be used when a web Provide the following information:
site wants a upgrade to • Where to change the response: Click one of the
SSL-Offload. following options:
- HTTP Request Rule: Select a request rule to be
acted upon.
- HTTP Response Rule: Select a response rule to
be acted upon.
• HTTP Response Body String Rule: Select the rule that
defines string to be matched in the response body.
• Old String Value: Enter the value that defines the
string to be replaced, if the string can be found in the
URL defined by the content switching rule.
• New String Value: Enter the value with which the old
string is to be replaced.
• Offset: Enter the offset in bytes from the end of the
matched string.
• Length: Enter the length of the persist string.
• Ignore Case: Select the check box if you want the policy to be case insensitive.
• Click Add to add the rule.
The new Layer 7 response policy is added to the policy table. You can click Remove to delete a
rule from the policy.
4. Click Apply to save your entries.
Click Reset to revert the configuration to the previous configured values.
For more information on configuring content switching policies, refer to the ServerIron ADX Server
Load Balancing Guide.
Binding policies
After creating the content switching policies, you must apply the policy to the incoming and
outgoing traffic by binding the policy to the virtual server ports.
4. Select the VIPs to bind with the request policy from the Available VS-Ports list and click Bind to
move them to the Bound VS-Ports list.
To unbind the VIPs or ports, select the ports you want to unbind from the Bound VS-Ports list
and click Unbind. To unbind all the ports, click Unbind All.
4. Select the virtual servers to bind with the request policy from the Available VS-Ports list and
click Bind to move them to the Bound VS-Ports list.
To unbind the VIPs or ports, select the ports you want to unbind from the Bound VS-Ports list
and click Unbind. To unbind all the ports, click Unbind All.
For more information on binding content switching policies, refer to the ServerIron ADX Server Load
Balancing Guide.
OpenScript
OpenScript provides a Perl-based scripting environment to create event-driven configurations that
can adapt to a real-time network environment. The OpenScript environment allows you to create
new configurations using scripts written in Perl to obtain traffic information from the ADX device,
and make changes to the device, and then respond through changes in operation.
Creating scripts
To create an OpenScript on the device, perform the following steps within the Configure tab.
1. Click Traffic on the menu bar.
2. From the sidebar, select OpenScripts.
The Configure Scripts page is displayed, as shown in Figure 75.
FIGURE 75 Scripts summary
Binding scripts
The script binding operation compiles the script unconditionally and enables packet processing on
a specified server port or server.
To bind a virtual server port to a script profile on the device, perform the following steps within the
Configure tab.
1. Click Traffic on the menu bar.
2. From the sidebar, select OpenScripts.
3. Select an entry from the Configure Scripts page and click Bindings.
The Script Profiles - new page tab is displayed, as shown in Figure 79.
FIGURE 79 Configuring script profile
Security Settings 8
In this chapter
• SSL certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
• SSL profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
• Access Control Lists. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
SSL certificates
The Secure Sockets Layer (SSL) protocol provides security and privacy between client and server
over the Internet. SSL supports server and client certificate verification, and negotiates encryption
keys and authenticates the server before data is exchanged by the high-level applications. SSL on
the ADX device provides hardware-accelerated encryption and decryption services to the clients.
The SSL “handshake” is a key concept in the SSL protocol. The handshake involves server
authentication and an optional client certificate verification. In server authentication, the server
sends its certificate and the cipher preferences to a client that has made a request. The client then
generates a master key, encrypts it with the public key of the server, and returns the encrypted
master key to the server.
• Key Length: Click 512, 768, 1024, or 2048 bits to set the length of the SSL key. The
default length is 1024.
• Save Key As File Name: Enter the filename (without space) that used to store the
generated SSL certificate.
6. Click Generate Key File.
Click Clear to clear all the entries in the fields.
• Country: Enter the name of your country; for example, US. Only two characters are allowed.
5. Click Generate Request.
Click Clear to clear all the entries in the fields.
SSL profiles
An SSL profile is a group of settings that allows the device to manage the application-specific SSL
traffic. The basic function of an SSL profile is to offload certificate validation and verification tasks.
You can create an SSL profile with all the related parameters, and associate the profile to the SSL
port on a virtual server.
• Select the cipher suites you want in the Available Ciphers list and click Add to add to the
Selected Ciphers list, to control the security strength of the SSL handshakes.
5. Click Certificates tab to specify additional options under the SSL profile.
The Certificates page is displayed, as shown in Figure 90.
FIGURE 90 Certificates configuration
2. Select a profile you want to edit from the list or click New to create a new profile.
3. Provide the following information:
• Profile Name: Enter the name of the TCP profile.
• Nagle Algorithm: Select the check box to enable Nagle algorithm that is used to address
the problem when an application generates several small bytes of data at a time.
• Delayed ACK Algorithm: Select the check box to send few acknowledgement (ACKs) per
data segment using a TCP delayed ACK mechanism.
• PUSH Bit: Select the check box to enable PUSH flag in all the outgoing data packets except
when emptying the TCP transmit queue.
• Transmit Queue Size: Enter the size of the TCP transmit queue.
• Receive Queue Size: Enter the size of the TCP receive queue.
4. Click Apply to create a TCP profile.
Click Reset to revert the configuration to the previous configured values.
3. Click Bind SSL Profiles at the bottom of SSL Profile Bindings page.
The Add Profile Bindings page is displayed, as shown in Figure 94.
FIGURE 94 Adding profile bindings
4. Under Bind VIP Port to a Profile, select one of the SSL mode:
• If you select Terminate, enter the following information:
Server Profile: Select an SSL profile from the list.
TCP Profile: Select a TCP profile from the list.
• If you select Proxy, enter the following information:
Client SSL Profile: Select an SSL profile from the list for client certificate verification.
Server SSL Profile: Select an SSL profile from the list for server certificate verification.
5. Click Apply to save your entries.
Click Reset to revert the configuration to the previous configured values.
NOTE
Optionally, you can also bind a real server port to a virtual server port.
For more information on binding the SSL profiles, refer to the ServerIron ADX Security Guide.
3. Click New IPv4 Standard ACL at the bottom of the ACLs page.
The ACL IPv4 Standard - new page is displayed, as shown in Figure 98.
FIGURE 98 Configuring ACL
3. Click New IPv4 Extended ACL at the bottom of the ACL Summary page.
The ACL IPv4 Extended - new page is displayed, as shown in Figure 99.
FIGURE 99 Configuring extended ACL
NOTE
The Source IP field is enabled if you select the Source IP option.
NOTE
The Destination IP field is enabled if you select the Destination IP option.
NOTE
The Source IP field is enabled if you select the Source IP option.
NOTE
The Source Host field is enabled if you select the Source Host option.
NOTE
The Destination IP field is enabled if you select the Destination IP option.
• Port Match: Click one of the following options to specify a comparison operator for the TCP
or UDP port number. This option is enabled only when you specify TCP or UDP as the IP
protocol in Protocol Match.
None: The policy does not apply any comparison operator for the TCP or UDP port
number.
Greater than: The policy applies to TCP or UDP port numbers greater than the port
number or name you enter.
Less than: The policy applies to TCP or UDP port numbers that are less than the port
number or name you enter.
Equal: The policy applies to TCP or UDP port name or number you enter.
Not equal: The policy applies to all TCP or UDP port numbers except the port number
or name you enter.
Range: The policy applies to all TCP or UDP port numbers that are between the first
and second port number or name you enter. Enter the range in the Port Match field.
The range is from 0 through 65,535.
• Remark: Enter the remark.
7. Click Apply to save your entries.
Click Reset to revert the configuration to the previous configured values.
For more information on the IPv6 ACLs, refer to the ServerIron ADX Security Guide.
This section describes the Monitor features, and includes the following chapters:
• Monitoring Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
• Viewing System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
• Viewing Network Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
• Viewing Traffic Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
• Viewing Security Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Monitoring Overview 9
In this chapter
• Navigating the monitoring tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
There are common icons that are displayed on the top right corner of all the main pages within the
Monitor tab. Table 8 describes the icons displayed on the main page.
Filter Allows you to filter the data in the Summary page. Click the Filter icon and
select the criteria from the Filter Criteria list.
Auto refresh Refresh the configuration page based on the changes made to the
configuration. Select the interval at which the page has to refreshed.
In this chapter
• System summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
• System log entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
System summary
You can monitor the percentage of CPU utilization and memory currently used by the device, and
other hardware, software, module-related information in the Summary page.
To view the system summary information, perform the following steps within the Monitor tab.
1. Click System on the menu bar.
2. From the sidebar, select Summary.
The Summary page is displayed, as shown in Figure 102.
FIGURE 102 Summary page
The Summary page contains four panes. The Overview pane is displayed, as shown in Figure 103.
FIGURE 103 Viewing the overview pane
System Overall Health Displays the overall health of the device calculated based on various factors including
temperature, fan status, memory, and CPU utilization on all Barrel Processors (BP)
and Management Processor (MP). The overall health status can be one of the
following:
• Critical - Indicates the health status of the device is critical, if the temperature
on the processors, fan speed, CPU and memory usage exceeds 90%.
• Warning - Indicates the health status of the device is warning, if the temperature
on the processors, fan speed, CPU and memory usage are in the warning limit.
• Clear - Indicates the health status of the device is clear.
CPU Utilization
Pkts In (Bps) Displays the total number of packets received by the device, in bits per second.
Pkts Out (Bps) Displays the total number of packets transmitted by the device, in bits per second.
Time
Power Supply Displays the status of the power supply, which can be one of the following:
• Not Connected - Indicates the non-availability of the power supply for the unit.
• OK - Indicates the presence of power supply for the unit.
Fan
Status Displays the status of the fan. The fan status can be one of the following:
• OK
• Stopped
• Stopped PWM100
• PWM Outbound
• Failed
• Bad Power
• Not Present
• I2C Access
Speed Displays the speed of the fan. The fan operate at the following speeds:
• Low - Indicates the speed is low (50% of the maximum RPM).
• Medium - Indicates the speed is medium (75% of the maximum RPM).
• Medium High - Indicates the speed is medium high (90% of the maximum RPM).
• High - Indicates the speed is high (100% of the maximum RPM).
RPM Displays the rotations made by the fan, in revolution per minute.
Disk Space
Image Displays the image types installed on the device. The image types are as
follows:
• Running - Indicates the current image running on the device.
• Primary - Indicates the image that is set as primary.
• Secondary - Indicates the image that is set as secondary.
• Boot - Displays the boot version of the device.
Version Displays the release version of the software running on the device.
Image Name Displays the name of the image.
Build Type Displays the type of the build loaded in the device. The build type are as follows:
• Router - Indicates the type of the build is router.
• Switch - Indicates the type of the build is switch.
Build Date Displays the date on which the image is built.
Temperature
Module Displays the module name. The module can be one of the following:
• MP - Indicates the module is a MP.
• BP - Indicates the module is a BP.
Current Temperature Displays the current temperature on the respective modules, in degree Celsius.
Warning Limit Displays the temperature threshold that has been set as the warning limit.
Shutdown Limit Displays the temperature threshold that has been set as the shutdown limit.
Modules
For more information on system summary, refer to the ServerIron ADX Administration Guide.
Timestamp Displays the date and time when the entry was logged.
Severity Displays the severity of the event occurring on the device. The severity can be one
of the following:
• Alert
• Critical
• Debugging
• Emergency
• Error
• Informational
• Notification
• Warning
Messages Displays the log message.
The list displays up to 30 syslog entries. You can navigate to view the next or previous set of syslog
entries by clicking Next or Previous at the bottom of the Summary page.
To save a local copy of all the system logs on the server, click Download Logs.
The logs can be filtered based on severity or message and also the logs can be downloaded in a
text file. To save the filtered logs, click Download Logs. Click the Filter icon and select the criteria in
the Filter Criteria lis to filter the logs.
In this chapter
• Interface statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
• IP statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
• ARP cache statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
• MAC statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Interface statistics
To display statistics for all the interfaces configured on the device, perform the following steps
within the Monitor tab.
1. Click Network on the menu bar.
2. From the sidebar, select Interface.
The Interface page is displayed, as shown in Figure 108.
FIGURE 108 Interface statistics
The Interface page displays all the interfaces configured on the device in tabular format.
Table 14 describes the fields available in the Interface page.
A new Interface Details page tab with detailed statistics is displayed, as shown in Figure 109.
Alternatively, to view the interface details in the graphical format, click Graph. To switch the
view between tabular and graphical format, click the Details or Graph on top right corner of the
Interface Details page.
FIGURE 109 Displaying the interface details
Attributes
Bit Rate Displays the number of bits received and transmitted per load interval on the
selected interface.
Packet Rate Displays the number of packets received and transmitted per load interval on
the selected interface.
Utilization% Displays the percentage utilization of the selected interface for receiving and
transmitting information.
Bytes Displays the number of bytes received and transmitted on the selected
interface.
Packets Displays the number of packets received and transmitted on the selected
interface.
Unicast Packets Displays the number of unicast packets received and transmitted on the
selected interface.
Broadcast Packets Displays the number of broadcast packets received and transmitted on the
selected interface.
Multicast Packets Displays the number of multicast packets received and transmitted on the
selected interface.
Errors
Errors Received Displays the total number of errors received on the selected interface.
Errors Transmitted Displays the total number of errors transmitted by the selected interface.
Collisions Received Displays the total number of collisions received on the selected interface.
Collisions Transmitted Displays the total number of collisions transmitted by the selected interface.
Runt Packets Received Displays the total number of runt packets received on the selected interface.
Giant Packets Received Displays the total number of giant packets received on the selected interface.
Received Packets Ignored Displays the number of received packets ignored on the selected interface.
CRC Errors Received Displays the total number of Cycle Redundancy Check (CRC) errors received on
the selected interface.
Frame Errors Received Displays the total number of frame errors received on the selected interface.
IP Address(es) Displays the IP address of the interface.
For more information on interface details, refer to the ServerIron ADX Switch and Router Guide.
IP statistics
To view the IP statistics, perform the following steps within the Monitor tab.
1. Click Network on the menu bar.
2. From the sidebar, select IP.
The IP page is displayed, as shown in Figure 110. To view the IP statistics in the graphical
format, click Graph. To switch the view between tabular and graphical format, click the Details
or Graph on top right corner of the IP page.
FIGURE 110 Displaying the IP traffic
The total and the individual counts of IPv4 and IPv6 packets for the statistic types are displayed.
Table 16 describes the fields available in the statistics of IP page.
TABLE 16 IP fields
Field Description
Statistics Type
Sent Displays the total number of IP packets originated and sent by the
device.
Forwarded Displays the total number of IP packets received by the device and
forwarded to other devices.
Reassembled Displays the total number of fragmented IP packets that the device
reassembled.
Delivered Displays the total number of IP packets delivered to upper level by
the device.
Fragmented Displays the total number of IP packets fragmented by the device
to accommodate the MTU of this device or another device.
Fragments Received Displays the total number of fragments received by the device.
Output Fragments Displays the total number of output fragments created by the
device.
Rawout Displays the total number of raw IP packets generated by the
device.
Bad Header Displays the total number of IP packets dropped by the device due
to bad packet header.
Bad Version Displays the total number of IP packets dropped by the device due
to wrong IP version.
Bad Scope Displays the total number of IP packets dropped by the device due
to scope error.
Bad Options Displays the total number of IP packets dropped by the device due
to error in processing of options.
Fragments Dropped Displays the total number of fragments dropped by the device.
Fragments Timed Out Displays the total number of fragments timed out.
Overflow Fragments Displays the total number of fragments that exceeded the limit.
Can Not Fragment Displays the total number of IP packets the device could not
fragment.
Too Short Displays the total number of too short IP packets dropped by the
device.
Too Small Displays the total number of dropped packets that did not have
enough data.
Too Many Header Displays the total number of packets discarded by the device due
to too many headers.
No Route Displays the total number of packets dropped by the device
because of no route to destination.
Not Member Displays the total number of packets dropped by the device
because the packet was not part of the multicast group.
Unknown Protocols Displays the total number of packets dropped by the device
because of unrecognized protocol.
Other Errors Displays the total number of packets dropped by the device due to
other error types.
For more information on IP statistics, refer to the ServerIron ADX Switch and Router Guide.
ICMP Statistics
To view the Internet Control Message Protocol (ICMP) sent and received information, perform the
following steps within the Monitor tab.
1. Click Network on the menu bar.
2. From the sidebar, select IP, and then select ICMP.
The ICMP page is displayed, as shown in Figure 111. By default, Received Messages tab is
displayed in the ICMP page, which provides information on the messages received by the
device. Click the Sent Messages or Sent Error Messages tab to view the messages or error
messages sent by the device. To view the ICMP statistics in the graphical format, click Graph.
To switch the view between tabular and graphical format, click the Details or Graph on top right
corner of the ICMP page. The total and the individual counts of IPv4 and IPv6 messages for the
statistics types are displayed.
FIGURE 111 Displaying the ICMP traffic
IGMP Membership Red Displays the total number of IGMP membership red messages
received/sent by the device.
Packet Too Big Error Displays the total number of ICMPv6 packet too big error messages
received/sent by the device.
Packet Too Short Error Displays the total number of ICMPv6 packet too short error
messages received/sent by the device.
Bad Code Error Displays the total number of ICMPv6 bad code error messages
received/sent by the device.
Bad Checksum Error Displays the total number of ICMPv6 bad checksum error
messages received/sent by the device.
Bad Length Error Displays the total number of ICMPv6 bad length error messages
received/sent by the device.
Bad Hop Count Error Displays the total number of ICMPv6 bad hop count error
messages received/sent by the device.
ND Too Many Options Error Displays the total number of ICMPv6 neighbor discover too many
options error messages received/sent by the device.
The ICMP Sent Error Messages tab is displayed, as shown in Figure 112.
FIGURE 112 Displaying the ICMP sent error messages
Table 18 describes the fields available in the ICMP Sent Error Messages tab.
Destination Unreachable Displays the total number of ICMPv6 destination unreachable error
messages sent by the device.
Beyond Scope Displays the total number of ICMPv6 messages sent by the device
which are beyond the scope of source address.
Address Unreachable Displays the total number of ICMPv6 messages sent by the device
with address unreachable.
Port Unreachable Displays the total number of ICMPv6 messages sent by the device
with port unreachable.
Packet Too Big Displays the total number of ICMPv6 packets too big error
messages sent by the device.
Time Exceeded Displays the total number of ICMPv6 messages sent by the device
which exceeded time in transit.
Time Exceed Reassembly Displays the total number of ICMPv6 messages sent by the device
for which reassembly time exceeded.
Header Field Parameter Problem Displays the total number of ICMPv6 messages sent by the device
with erroneous header field.
Next Header Parameter Problem Displays the total number of ICMPv6 messages sent by the device
with unrecognized next header type.
Options Error Displays the total number of ICMPv6 messages sent by the device
with options error.
Redirect Error Displays the total number of ICMPv6 messages sent by the device
with redirect errors.
Admin Error Displays the total number of ICMPv6 messages sent by the device
with admin errors.
Unknown Displays the total number of ICMPv6 messages sent by the device
with unknown errors.
For more information on IP statistics, refer to the ServerIron ADX Switch and Router Guide.
TCP statistics
To view the TCP statistics on the device, perform the following steps within the Monitor tab.
1. Click Network on the menu bar.
2. From the sidebar, select IP, and then select TCP.
The TCP page is displayed, as shown in Figure 113. The total and the individual counts of IPv4
and IPv6 packets for the statistic types are displayed. To view the TCP statistics in the graphical
format, click Graph. To switch the view between tabular and graphical format, click the Details
or Graph on top right corner of the TCP page.
FIGURE 113 Displaying the TCP traffic
Active Open Connections Displays the number of TCP connections opened by the device by
sending a TCP SYN.
Passive Open Connections Displays the number of TCP connections opened by the device in
response to connection requests received from other devices.
Active Reset Connections Displays the number of TCP connections reset occurred on the
device at the other end of the connection as a result of sending a
TCP reset message to the device.
Passive Reset Connections Displays the number of TCP connections reset occurred when the
device at the other end of the connection sent a TCP reset
message.
Received Segments Displays the number of TCP segments received by the device.
Sent Segments Displays the number of TCP segments sent by the device.
Retransmitted Segments Displays the number of segments that the device retransmitted
before the device at the other end of the connection had
acknowledged receipt of the segment.
For more information on TCP statistics, refer to the ServerIron ADX Switch and Router Guide.
UDP statistics
To view the UDP statistics on the device, perform the following steps within the Monitor tab.
1. Click Network on the menu bar.
2. From the sidebar, select IP, and then select UDP.
The UDP page is displayed, as shown in Figure 114. The total and the individual counts of IPv4
and IPv6 packets for the statistic types are displayed. To view the UDP statistics in the
graphical format, click Graph. To switch the view between tabular and graphical format, click
the Details or Graph on top right corner of the UDP page.
FIGURE 114 Displaying the UDP traffic
For more information on UDP statistics, refer to the ServerIron ADX Switch and Router Guide.
The ARP page displays both the statistics and cache information. The ARP Cache table shows IP to
MAC address association.
NOTE
The ARP page also displays the management port statistics.
Statistics
Type Displays the type of the ARP entry. The type can be one of the
following:
• Dynamic - Indicates the device is learned from an incoming
packet.
• Static - Indicates the device loaded the entry from the static
ARP table when the device was connected to other device.
Age (sec) Displays the number of seconds the entry has remained unused. If
this value reaches the ARP aging period, the entry is removed from
the cache
The ARP Cache page displays a list of all cache information in table. Each cache includes IP and
MAC address, port, type and age of the cache. Click Next or Previous to navigate the list or select
First or Last to jump to the most recent or least recent entries respectively.
You can filter the information displayed in the ARP cache table using the Filter icon in the top right
corner of the main page. Click the icon to view the filtering panel and search the information based
on the Filter Criteria.
For more information on ARP statistics, refer to the ServerIron ADX Switch and Router Guide.
MAC statistics
To view all the MAC addresses learned or configured on the device, perform the following steps
within the Monitor tab.
1. Click Network on the menu bar.
2. From the sidebar, select MAC.
The MAC page is displayed as shown in Figure 116.
FIGURE 116 Displaying the MAC statistics
The MAC page displays the Layer 2 MAC table information. The table shows the association
between a MAC address and a system port.
Table 22 describes the fields available in the MAC page.
Click Next or Previous to navigate the list or select First or Last to jump to the most recent or least
recent entries respectively.
You can filter the information displayed in the MAC table using the Filter icon in the top right corner
of the main page. Click the Filter icon and select the criteria from the Filter Criteria list to filter the
information.
For more information on MAC statistics, refer to the ServerIron ADX Switch and Router Guide.
In this chapter
• Global traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
• Virtual servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
• Real servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
• Content switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
• OpenScript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
• Session Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Global traffic
To display the global traffic statistics on the device, perform the following steps within the Monitor
tab.
1. Click Traffic on the menu bar.
2. From the sidebar, select Global Traffic.
The Global Traffic page is displayed, as shown in Figure 117.
FIGURE 117 Displaying the global traffic
Session Traffic
New Session Syncs Sent Displays the new synchronized packets sent for new sessions.
New Session Syncs Received Displays the new synchronized packets received for new sessions.
Sessions Removed Displays the number of sessions removed from the delete queue.
Sessions in Delete Queue Displays the number of sessions in the delete queue.
FWD Sessions Not Found Displays the number of forward sessions that are not found.
Sessions Force Deleted Displays the number of sessions that were forcedly deleted.
Duplicate Sessions Displays the number of duplicate sessions.
Server Traffic
Client to Server (Pkts) Displays the number of packets sent from clients to servers.
Server to Client (Pkts) Displays the number of packets sent from servers to clients.
Aged Sessions Displays the number of TCP and UDP sessions that are closed by
the device due to aged out.
Old Connections Displays the number of old connections.
FWD To Non-Static FID Displays the number of forward to non-static FID.
Dropped VIP Pings Displays the number of dropped virtual server (VIP) ping packets.
Unsuccessful Connections Displays the number of unsuccessful connections.
Server Resets Displays the number of server resets.
Dropped Packets
VPort Not Found Displays the number of unsuccessful virtual-port searches using an
improved (faster) method.
VPort Found Displays the number of successful virtual port searches using an
improved (faster) method.
Forward FIN Displays the number of client-to-sever FIN packets passing through
a non-optimized path.
Reverse FIN Displays the number of client-to-server FIN packets sent using an
improved (faster) method.
SLB SYN Displays the number of SLB SYN packets sent using an improved
(faster) method.
TCP Traffic
Current Connection Rate Displays the rate of TCP traffic per second, including TCP SYN DoS
attack traffic.
Current TCP Attack Rate Displays the rate of TCP DoS attacks per second.
Peak Connection Rate Displays the peak rate of TCP traffic per second, encountered on
the device.
Peak TCP Attack Rate Displays the peak rate of TCP DoS attacks per second,
encountered on the device.
Virtual servers
You can view the summary and detailed statistics of all the configured virtual servers and ports.
Virtual servers
To view the virtual server statistics on the device, perform the following steps within the Monitor
tan.
3. Select a configuration from the Virtual Servers page and click Details to view the detailed
statistics of that virtual server. Also, you can double click a configuration for which you want to
view the detailed statistics.
A new Virtual Server Details page tab is displayed, as shown in Figure 119. To view the
interface details in the graphical format, click Graph. To switch the view between tabular and
graphical format, click the Details or Graph on top right corner of the Virtual Server Details
page.
FIGURE 119 Displaying the virtual server details
Table 25 describes the fields available in the Virtual Server Details page.
Symmetric State Displays the state of the virtual server. The status can be one of the
following:
• Active - Indicates the virtual server is in active mode.
• Standby - Indicates the virtual server is in standby mode.
Symmetric Priority Displays the sym-priority that is associated with the virtual server.
# of Missed Keepalives Displays the number of missed Layer 4 or MAC PDUs.
# of Active Transitions Displays the number of times the device has changed the state
from standby mode to active mode.
# of Backup Transitions Displays the number of times the device has changed the state
from active mode to standby mode.
Total Connections Displays the total number of connections on the virtual server.
Transmitted Packets Displays the total number of packets transmitted by the virtual
server.
Received Packets Displays the total number of packets received by the virtual server.
VIP RHI Admin State Displays the admin status of the virtual server Route Health
Injection (RHI). The admin status can be one of the following:
• Enabled
• Disabled
VIP RHI State Displays the health of the virtual server. The health status can be
one of the following:
• Healthy - Indicates the virtual server is healthy.
• Not healthy - Indicates the virtual server is not healthy.
NOTE: If a virtual server port is not bound to any real server port,
then its health is not used to determine the health of the
virtual server.
A new All Virtual Server Ports page is displayed, as shown in Figure 120
FIGURE 120 Displaying the virtual server ports
Table 26 describes the fields available in the Virtual Server Ports page.
A new Virtual Server Port Details page tab is displayed, as shown in Figure 119. To view the
port details in the graphical format, click Graph. To switch the view between tabular and
graphical format, click the Details or Graph on top right corner of the Virtual Server Port Details
page.
FIGURE 121 Displaying the virtual server port details
The Virtual Server Port Details page displays a table that lists the real servers that are bound to the
virtual server port.
Table 25 describes the fields available in the Virtual Server Port Details page.
Virtual Server Name Displays the name of the virtual server bound to this port.
Virtual Server Port Displays the name of the virtual server port.
Virtual Server IP Address Displays the IP address of the virtual server bound to this port.
Sticky Displays the state of the sticky in the virtual server port. The status
can be one of the following:
• No
• Yes
Status Displays the runtime health of the virtual server port. The status
can be one of the following:
• Enabled
• Disabled
Admin State Displays the admin state of the virtual server port. The status can
be one of the following:
• Enabled
• Disabled
Concurrent Displays the state of the concurrent sessions that are additionally
opened. The states can be one of the following:
• No
• Yes
DSR Displays the state of the Direct Server Return (DSR) in the virtual
server port. The states can be one of the following:
• No
• Yes
Current Connections Displays the current connections open on the virtual server port.
Peak Connections Displays the highest number of connections reached by the port
over a period of time.
Total Connections Displays the total number of connections on this port.
Real Servers bound to this Virtual Server Port
Name Displays the name of the real server to which the port is bound.
Port Displays the name of the real server port.
Status Displays the status of the port on the real server. The status can be
one of the following:
• Enabled
• Disabled
Admin State Displays the admin state of the real server port. The status can be
one of the following:
• Enabled
• Disabled
Current Connections Displays the number of client connections currently on the server.
Current Connection Rate Displays the number of client connections rate currently on the
virtual server port.
Rx Packets Displays the number of packets the device has received from the
server.
Tx Packets Displays the number of packets the device has sent to the server.
For more information on virtual server statistics, refer to the ServerIron ADX Server Load Balancing
Guide.
Real servers
You can view the summary and detailed statistics of all the configured real servers and ports.
Real server
To display the real server statistics on the device, perform the following steps within the Monitor
tab.
1. Click Traffic on the menu bar.
2. From the sidebar, select Real Servers.
The real server page displays the summary of the statistics for the real server.
Table 28 describes the fields available in the Real Servers page.
The Real Server Details page is displayed, as shown in Figure 123. To view the real server
details in the graphical format, click Graph. To switch the view between tabular and graphical
format, click the Details or Graph on top right corner of the Real Server Details page.
FIGURE 123 Displaying the real server details
Table 29 describes the fields available in the Real Server Details page.
Table 30 describes the fields available in the Real Server Ports page.
Received Packets Displays the number of packets received by the real server ports.
Transmitted Packets Displays the number of packets transmitted by the real server
ports.
The Real Server Port Details page displays a table that lists the real servers that are bound to the
virtual server port.
Table 25 describes the fields available in the Real Server Port Details page.
Real Server Port Displays the name of the real server port.
Real Server Name Displays the name of the real server bound to this port.
Real Server IP Address Displays the IP address of the real server.
Reassign Count Displays the number of times the device has reassigned the
connection to another server in the rotation because the server
that is in use has not responded to two contiguous TCP SYNs from
the client.
Status Displays the runtime health of the virtual server port. The status
can be one of the following:
• Enabled
• Disabled
Admin State Displays the admin state of the virtual server port. The status can
be one of the following:
• Enabled
• Disabled
Received Packets Displays the total number of packets received on the port.
Transmit Packets Displays the total number of packets transmitted by the port.
Received Bytes Displays the total number of bytes received on the port.
Transmit Bytes Displays the total number of bytes transmitted by the port.
Peak Connections Displays the highest number of connections reached by the server
over a period of time.
Current Connections Displays the number of client connections currently on the real
server port.
Total Connections Displays the total number of client connections on the server since
the device was last booted.
Virtual Servers bound to this Real Server Port
For more information on real server statistics, refer to the ServerIron ADX Server Load Balancing
Guide.
Content switching
You can view the summary of all the Layer 7 content switching rules and policies configured on the
device.
Rule Name Displays the rule name associated with the CSW policy.
Action Type Display the action performed by the device based on the incoming
packet.
Flag Displays the information about the actions of the rule.
Hit Count Displays the number of times the rule is matched.
4. Click DNS DPI Policy tab to view the statistics of the DNS DPI policies and the rules associated
with each policy. Select the policy from the table to view the rules associated with this policy.
Table 33 describes the fields available in the DNS DPI policy tab.
Bind Count Displays the number of DNS policies bound to the virtual server
port.
Rules for <Policy name> Policy
Rule Name Displays the rule name associated with the CSW policy.
Action Display the action performed by the device based on the incoming
packet.
Hit Count Displays the number of times the rule is matched.
Rate Limit Displays the number of transactions received from any one IP
address.
Session Statistics
Server RST To TCP SYN Displays the number of times the server sent the RST packets to
TCP SYN packets.
Sent RST To Client Displays the number of times the device sent RST packets to client.
URL Not Found Displays the number of times the URL string was not found.
URL Not Complete Displays the number of times the URL string was not complete.
Cookie Not Found Displays the number of times the cookie header was not found.
Cookie Not Complete Displays the number of times the cookie header was not complete.
Total Memory Allocated Displays the total number of allocation times of memory slots used
for content rewrites.
Total Memory Freed Displays the total number of freed times of memory slots used for
content rewrites.
Memory Allocation Failure Displays the number of failures that occurred while allocating
memory for content rewrites.
Memory Used Now Displays the number of memory slots that are currently used for
content rewrites.
Content Rewrites in HTTP Responses
Cookies Inserted Displays the total number of cookies inserted in HTTP responses.
Cookies Insertion Errors Displays the number of errors that occurred when inserting cookies
in HTTP responses.
Headers Inserted Displays the total number of headers inserted in HTTP responses.
Headers Insertion Errors Displays the number of errors that occurred when inserting
headers in HTTP responses.
Content Rewrites in HTTP Requests
Cookies Deleted Displays the total number of cookies deleted in HTTP requests.
Cookies Deletion Errors Displays the number of error that occurred when deleting the
cookies in HTTP requests.
Cookies Destroyed Displays the number of cookies destroyed during HTTP requests.
Cookies Destroyed Errors Displays the number of error that occurred while destroying the
cookies in HTTP requests.
Client IP Headers Inserted Displays the total number of client IP headers inserted in HTTP
requests.
Client IP Headers Insertion Errors Displays the number of errors that occurred when inserting client
IP headers in HTTP requests.
Headers Inserted Displays the total number of headers inserted in HTTP requests.
Headers Insertion Errors Displays the number of errors that occurred when inserting
headers in HTTP requests.
OpenScript
To view the OpenScript statistics, perform the following steps within the Monitor tab.
1. Click Traffic on the menu bar.
2. From the sidebar, select OpenScript.
Basic Details
Script Bytes Displays the total number of bytes for the script.
Last Updated Displays the time at which the last update was performed.
Current Connections Displays the current connections open on the server.
Current Connection Rate Displays the current connection rate on the server.
Total Connections Displays the total number of connections made by the server.
Connections Failed Displays the total number of connections failed.
Resource Utilization
Session Information
You can view the session summary and also filter the summary table based on your criteria.
Session summary
To display the session summary on the device, perform the following steps within the Monitor tab.
1. Click Traffic on the menu bar.
2. From the sidebar, select Sessions.
The Sessions page is displayed, as shown in Figure 132.
FIGURE 132 Displaying the sessions
The Sessions page displays the summary of the server and client connections, session distribution
on BP, and real servers session.
Table 38 describes the fields available in the Sessions page.
Connections
Total Client to Server Connections Displays the number of connections initiated by client.
Total Server to Client Connections Displays the number of connections initiated by servers.
Total Reassigns Displays the number of unacknowledged TCP SYN-ACKS on all the
real servers combined.
Unsuccessful Connections Displays the number of connection attempts by clients or servers
that were unsuccessful.
Session Distribution across BP
The Session Lookup page displays the search criteria with specific fields. Enter your search criteria
based on your requirement and click Search.
Table 39 describes the fields available in the Sessions Lookup page.
Search Criteria
When you click Search, the session lookup results is displayed in the table. Click Download Session
Details to save the session values. The information in the table are saved in csv format.
NOTE
You must specify a minimum of five search criteria, if the BP ID is not specified in the search criteria.
In this chapter
• DoS protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
• SSL statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
DoS protection
To view the Denial of Service (DoS) attack details, perform the following steps within the Monitor
tab.
1. Click Security on the menu bar.
2. From the sidebar, select DoS Protection.
The DoS Protection page is displayed, as shown in Figure 134.
FIGURE 134 Displaying the DoS protection
The DoS Protection page displays the summary of SYN attack details and other DoS attack details.
Table 40 describes the fields available in the SYN Attacks Details page.
Current Connection Rate (per Displays the rate of all TCP traffic per second, including TCP SYN DoS attacks.
sec)
Peak Connection Rate (per Displays the peak rate of TCP traffic encountered per second.
sec)
Current SYN Attack Rate (per Displays the rate of TCP SYN DoS attacks per second.
sec)
Peak SYN Attack Rate (per sec) Displays the peak rate of TCP SYN attacks encountered per second.
SYN Proxy Software Statistics
SYNs Processed Displays the number of SYNs that have the SYN proxy feature enabled, received
and processed by the software.
SYN ACKs Sent Displays the number of SYN ACKs sent to the client from the software.
Valid ACKs Received Displays the number of valid ACKs received from the client, by the software.
Invalid ACKs Received Displays the number of invalid ACKs received from the client, by the software.
Fragmented Packets Allowed Displays the number of fragmented packets allowed by the software.
Fragmented Packets Dropped Displays the number of fragmented packets dropped by the software.
ACKs Without Data Drop Displays the number of ACKs received without any data drop.
Invalid Vport Packets Displays the number of packets dropped due to invalid port.
SYN Proxy Hardware Statistics
SYNs Processed Displays the number of SYNs that have the SYN-proxy enabled, received and
processed by the hardware.
SYN ACKs Sent Displays the number of SYN ACKs sent to the client from the hardware.
Valid ACKs Received Displays the number of valid ACKs from the client received by the hardware.
Status Displays the configuration status of dynamic SYN proxy feature. If the status is
enabled the filed will display the current SYN attack rate and the SYN attack
threshold.
For more information on SYN attack details, refer to the ServerIron ADX Security Guide.
Table 41 describes the fields available in the Other Attacks Details page.
Statistics
Attack Packets Dropped Displays the total number of attack packets dropped based on individual attack
packet types.
Attack Packets Logged Displays the total number of attack packets logged.
Attack Types
Attack Type Displays the type of the attack. The types can be one of the following:
• XMas Tree
• SYN Fragments
• SYN And FIN Set
• Deny All Fragments
• FIN With No ACK
• ICMP Fragments
• Ping Of Death
• Large ICMP
• Land Attack
• IP Unknown Protocol
• NO TCP Flags
Attack Drop Count Displays the total number of attack packets dropped based on each individual
attack packet types.
Attack Log Count Displays the total number of attack packets logged.
SSL statistics
The Secure Socket Layer (SSL) page has the auto refresh interval option as On Demand. The
information in the SSL page is refreshed when you click the Refresh icon. This page is enabled only
if you installed the appropriate SSL license.
To display the SSL statistics, perform the following steps within the Monitor tab.
1. Click Security on the menu bar.
2. From the sidebar, select SSL.
The SSL page is displayed, as shown in Figure 137.
FIGURE 137 Displaying the SSL.
Statistics
SSL Current Connections Displays the number of SSL connections currently alive.
SSL Attempted Renegotiations Displays the number of SSL renegotiations attempted.
SSL Handshakes Completed Displays the number of SSL handshakes completed.
SSL Handshake Messages Displays the total number of SSL handshake messages in data transfer.
SSL Connections Closed Displays the number of SSL connections closed by the device.
TCP Connections Closed Displays the total number of connections closed by the device.
SSL V2 Rate Limit Displays the rate limiting for v2 SSL traffic set by the end used.
Received SSL Packets Dropped Displays the number of received SSL packets dropped by the device.
Key Exchange Statistics
RSA Private Decrypt Calls Displays the number of RSA private decrypt calls made by the device.
RSA Public Decrypt Calls Displays the number of RSA public decrypt calls made by the device.
RSA Private Encrypt Calls Displays the number of RSA private encrypt calls made by the device.
RSA Public Encrypt Calls Displays the number of RSA public encrypt calls made by the device.
DH Compute Key Calls Displays the number of compute key calls made by the device using the
Diffie Hellman (DH) algorithm.
DH Generate Key Calls Displays the number of generate key calls made by the device using DH
algorithm.
DSA Verify Calls Displays the number of verify calls made by the device using the Digital
Signature Algorithm (DSA).
DSA Sign Calls Displays the number of sign calls made by the device using the DSA.
Hash Statistics
MD5 Raw Hash Calls Displays the number of calls made by the device using Message Digest
(MD5) raw hash algorithm.
SHA1 Raw Hash Calls Displays the number of calls made by the device using Secure Hash
(SHA1) raw hash algorithm.
SSL MAC MD5 Calls Displays the number of SSL calls made by the device using MAC MD5.
TLS MAC MD5 Calls Displays the number of TSL calls made by the device using MAC MD5.
SSL MAC SHA1 Calls Displays the number of SSL calls made by the device using MAC SHA1.
TLS MAC SHA1 Calls Displays the number of TLS calls made by the device using MAC SHA1.
Data Encryption Statistics
Triple DES Calls Displays the number of triple Data Encryption Standard (DES) calls made
by the device.
RC4 Calls Displays the number of RC4 calls made by the device.
SSL alerts
To display the SSL alerts statistics, perform the following steps within the Monitor tab.
1. Click Security on the menu bar.
2. From the sidebar, select SSL, and then select SSL Alerts.
The SSL Alerts page is displayed, as shown in Figure 138.
FIGURE 138 Displaying the SSL alerts
The SSL Alerts page displays the decoded status counter of the fatal and warning alerts received
and transmitted by the device in tabular format.
Table 43 describes the fields available in the SSL Alerts page.
Total Level 2 Alerts Displays the total number of level 2 (Fatal) alerts received and transmitted by
the device.
Unexpected Message Displays the total number of unexpected message alerts received and
transmitted by the device.
Bad Record Mac Displays the total number of bad record MAC alerts received and transmitted
by the device.
Decryption Failed Displays the number of alerts received and transmitted by the device for failed
decryption.
Record Overflow Displays the number of alerts received and transmitted by the device for record
overflow.
Decompression Failure Displays the number of alerts received and transmitted by the device for
decompression failure.
Handshake Failure Displays the number of alerts received and transmitted by the device for
handshake failure.
Illegal Parameter Displays the number of alerts received and transmitted by the device for illegal
parameters.
Unknown CA Displays the number of unknown Certificate Authority (CA) alerts received and
transmitted by the device.
Access Denied Displays the total number of access denied messages received and
transmitted by the device.
Decode Error Displays the number of alerts received and transmitted by the device for
decode error.
Export Restriction Displays the number of alerts received and transmitted by the device for export
restriction.
Protocol Version Displays the number of protocol version alerts received and transmitted by the
device.
Insufficient Security Displays the number of alerts received and transmitted by the device for
insufficient security.
Internal Error Displays the number of alerts received and transmitted by the device for
internal error.
User Cancelled Displays the number of user cancelled alerts received and transmitted by the
device.
Level 1 (Warning) Alerts
Total Level 1 Alert Displays the total number of alerts received and transmitted by the device.
Close Notify Displays the total number of close notify alerts received and transmitted by the
device.
No Certificate Displays the number of alerts received and transmitted by the device for no
certificates.
Bad Certificate Displays the number of alerts received and transmitted by the device for bad
certificates.
Unsupported Certificate Displays the number of alerts received by the device for unsupported
certificates.
Certificate Revoked Displays the number of alerts received and transmitted by the device for
revoked certificates.
Certificate Expired Displays the number of alerts received and transmitted by the device for
expired certificates.
Certificate Unknown Displays the number of alerts received and transmitted by the device for
unknown certificates.
Decrypt Error Displays the number of alerts received and transmitted by the device for
decryption error.
No Renegotiation Displays the number of alerts received and transmitted by the device for no
renegotiation.
SSL profiles
To display the SSL profile statistics, perform the following steps within the Monitor tab.
1. Click Security on the menu bar.
2. From the sidebar, select SSL, and then select SSL Profiles.
The SSL Profiles page is displayed, as shown in Figure 139.
FIGURE 139 Displaying the SSL profiles
Table 45 describes the fields available in the SSL Client Details page.
Connection Statistics
SSL Connection Attempts Displays the number of attempts tried for SSL connect.
SSL Connections Failed Displays the number of attempts failed during SSL connect.
Client Authorization Successful Displays the number of sessions authorized by the client.
Client Authorization Failed Displays the number of sessions failed during client authorization.
SSL Session Reuse Attempts Displays the number of attempts for SSL session reuse.
SSL Session Reuse Failed Displays the number of attempts failed for SSL session reuse.
SSL Close Count Displays the number of SSL sessions closed.
SSL Remote Close Count Displays the number of remote SSL sessions closed.
SSL Reset Count Displays the number of SSL sessions reset.
SSL Remote Reset Count Displays the number of remote SSL sessions reset.
SSL Certificate Verification Statistics
Certificate Verification Successful Displays the number of times the certificate verification was
successful.
Certificate Verification Failed Displays the number of times the certificate verification failed.
Unknown User Displays the number of times the user is identified as unknown
user.
Certificate Verification Signature Failed Displays the number of times the certificate verification signature
failed.
Certificates Expired Displays the number of expired certificates.
Certificates Revoked Displays the number of revoked certificates.
Certificates Not Yet Valid Displays the number of times the certificate was not yet valid.
Certificate Signature Failed Displays the number of times the certificate signature failed.
Issuer Public Key Decode Failed Displays the number of times the decode of issuer public key
failed.
Self Signed Certificates Displays the number of self-signed certificate.
Issuer Certificate Not Found Displays the number of times the issuer certificate was not found.
Certificate Untrusted Displays the number of untrusted certificates.
Certificate Chain Too Long Displays the number of times the certificate chain was too long.
Certificate Not Sent By Peer Displays the number of times the certificate was not sent by peer.
Certificate Revocation List (CRL) Statistics
CRL Load Failed Displays the number of times the CRL load failed.
CRL Signature Failed Displays the number of times the CRL signature failed.
CRL Not Found Displays the number of times the CRL was not found.
CRL Not Yet Valid Displays the number of times the CRL was not yet valid.
CRL Expired Displays the number of times the CRL had expired.
For more information on SSL statistics, refer to the ServerIron ADX Security Guide.
Maintenance III
This section describes the Maintain features, and includes the following chapter:
• Maintenance Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
• Managing Software Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
• License Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
• Restarting the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
• Retrieving System Information for Technical Support. . . . . . . . . . . . . . . . . 195
• Accessing the CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Maintenance Overview 14
In this chapter
• Navigating the maintenance tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
In this chapter
• Uploading the software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
The system continuously polls for the upload complete status. After upload is complete, the
page gets auto refreshed to show the latest information. The system polls for 4 minutes
maximum to server to respond and in case of no response from the server, the system prompts
you to try again.
4. Click Upload and Reboot to reboot the device after uploading the software image to the device.
The system follows the standard upload process. After upload is complete, before rebooting
the device, the system checks the version of the uploaded image. If the image version is lower
than 12.4, the system displays a warning message that the image does not support current
web system and you will lose connectivity to this system after reboot.
If the image version is 12.4 or later, the system checks for the image type and displays a
warning message that you will have to log in again to the system after reboot, if the current
image and the image trying to upload are different.
During device reboot, the system continuously polls for the reboot success status. If the reboot
is successful, the system is reloaded with the current page.
The system polls 3 minutes maximum for the server to respond on the reboot status and in
case of no response, will suggest you to log in again to the system to access the latest
information.
The Software Upload page also displays the information about the software running on the
device. Table 46 describes the fields in the Software Information table.
Image Specifies the running image and image flash on the device, which
can be one of the following:
• Running (P)- Indicates the image is running from primary
flash.
• Running (S) - Indicates the image is running from secondary
flash.
• Primary - Indicates the image is stored in the primary flash.
• Secondary - Indicates the image is stored in the secondary
flash.
• Boot - Indicates the boot image is used to bring up the device
to load the primary or secondary image.
Version Displays the release version of the software image.
Image Name Displays the name of the software image.
Build Type Displays the type of the build running on the device, which can be
one of the following:
• Router - Indicates the device is loaded with the router build.
• Switch - Indicates the device is loaded with the switch build.
Build Date Displays the date on which the image was released.
In this chapter
• System restart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
System restart
To reboot the device, perform the following steps within the Maintain tab.
1. Click Reboot from the menu bar.
The Reboot page is displayed, as shown in Figure 142.
FIGURE 142 Rebooting the device
2. Select Primary or Secondary for image flash. By default, the system is configured to boot from
the primary memory.
3. Select Always reboot using the selected image flash check box to set the selected image flash
as the configured boot image.
4. Select Save Configuration check box to specify if the running configuration must be saved
before reboot.
NOTE
If you select the Always reboot using the selected image flash check box, the Save
Configuration check box is selected and the running configuration is saved automatically.
The application checks for the image version. if the version is lower than 12.4, the application
displays a warning message that the image does not support current web application and you will
lose connectivity to this application after reboot. The application also checks for the build type. If
the build type is different from the current image running on the device, the application displays a
warning message that you will have to re-login to the application after reboot.
During device reboot, the application continuously polls for the reboot success status for 3 minutes
maximum. After reboot is complete, the application is reloaded. If there is no response during
polling, you are warned to re-login to the application to access the latest information.
License Management 17
In this chapter
• License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
License
At the time of purchase, an ADX device is configured with a base license pre-installed. You can
upgrade the device to increase system capacity by purchasing and applying a new software license.
When a license is ordered separately (not pre-installed), an entitlement certificate or e-mail, along
with a transaction key, are issued to the customer by Brocade as proof of purchase. The transaction
key and LID of the Brocade device are used to generate a license key from the Brocade software
licensing portal. The license key is contained within a license file, which can be downloaded to your
local computer and then uploaded to the ADX device.
The following are the license types supported on the device:
• Trial license—A license-controlled feature to run on the device on a temporary basis. A trial
license enables demonstration and evaluation of a licensed feature and can be valid for a
period of 45 days. A licensed feature operating under a trial license has the same
functionality as does a licensed feature operating under a normal license.
• Unlimited license—A license-controlled feature to run on the device indefinitely.
To view the licenses installed in the device, perform the following steps within the Maintain tab.
1. Click License on the menu bar.
The License page is displayed, as shown in Figure 125.
FIGURE 143 Using the license
The License page displays a summary of the active and expired licenses installed on the device.
Table 47 describes the fields in the License page.
Adding a license
To add one or more new licenses on the device, perform the following steps within the Maintain
tab.
1. Click License on the menu bar.
The License page is displayed.
2. Click Add at the bottom of the License page.
A dialog box displays.
Select the license file you want to add from the local directory and click Open to add the license
key.
After the license is added successfully, user is informed that it will be installed when the device is
rebooted next time. The installed license is added in the Installed License (s) table
Deleting a license
To delete a license key from the device, perform the following steps within the Maintain tab.
1. Click License on the menu bar.
2. Select the license from the Installed License (s) table and click Delete to remove a license.
After the license is deleted successfully, user is informed that it will be un-installed when the device
is rebooted next time. The installed license is removed from the Installed License (s) table.
NOTE
You can not delete the base license installed on the device.
For more information on the licenses, refer to the ServerIron ADX Administration Guide.
In this chapter
• Technical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Technical support
The ADX device allows you to view and save the device information that can help the Brocade
Technical support team to troubleshoot your system.
To view the device information, perform the following steps within the Monitor tab.
1. Click Technical Support on the menu bar.
The Technical Support page is displayed, as shown in Figure 144.
FIGURE 144 Technical support
2. Click View Summary to display the summary of device information that can be used by the
technical support team to troubleshoot.
You can download detailed technical device configuration information and view or save it locally for
assistance in troubleshooting issues when working with technical support.
3. Click Download Details to download the detailed information for technical support.
The information can be downloaded in Hypertext Markup Language (HTML) or text format. By
default, the information is downloaded in HTML format. After the information is successfully
downloaded, you can view the information in a separate window or save the file to your local
system.
For more information on technical support, refer to the ServerIron ADX Administration Guide.
In this chapter
• CLI Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
CLI Access
The ADX web interface enables you to run CLI commands to configure the features that are not
supported in the web interface. You can use the CLI access feature available in web interface to run
the CLI commands in a batch to request and change the configuration information on ADX device.
To run CLI commands using the web interface, perform the following steps within the Maintain tab.
1. Click CLI Access from the menu bar.
The CLI Access page is displayed, as shown in Figure 145.
FIGURE 145 CLI Access
NOTE
The users with operator and manager privilege can run the CLI commands from the GUI. If you are
a read-only user. You can only view the CLI Access page.
2. Enter the CLI commands in the field under the Enter a batch of up to 10 CLI commands that
you would like to send to the ADX.
NOTE
The maximum number of CLI Commands that you can run from the web interface is 10.
However, if any command fails to execute, the device will continue to process the remaining
commands and return the response of the commands that are executed.
• Click Send to run the commands on the ADX device and view the response from the ADX
device under Results.
• Click Clear to clear the command entries.
NOTE
The CLI commands will be validated only on the ADX device and not on the client.
NOTE
You can run show, configuration, and copy or paste commands from the web interface.
However, you cannot run the boot and reset commands.
Appendix A A
Troubleshooting
You can troubleshoot the problems that occur in ADX device web interface.
Solution
Verify the following items to resolve this problem:
• Make sure that the following services are enabled on the device:
- Hypertext Transfer Protocol (HTTP)
- Simple Object Access Protocol (SOAP)
- Secure HTTP (HTTPS)
The HTTP and SOAP services are enabled by default. However, to enable HTTPS, ensure that
the device supports SSL and then generate a SSL certificate. The SSL protocol uses digital
certificate and a private-public key pair to establish a secure connection. To enable SOAP
service, run the following command in the CLI.
ServerIronADX# web-management soap-service
• Make sure that the web-management services are enabled in the device. If not, after entering
the privilege mode, run the following command in the CLI to enable the web-management
services.
ServerIronADX# web-management enable
ServerIronADX# web-management http
ServerIronADX# web-management https
ServerIronADX# crypto-ssl certificate generate default_cert
• Make sure that you have installed Flash Player 10.2 or higher in the system. You can download
the Flash Player from www.adobe.com.
• Make sure that you open the web interface using one of the following web browsers: Google
Chrome, Internet Explorer, and Mozilla Firefox web browsers. You can also use other web
browsers such as Safari, Opera and so on to open the web interface if they have flash installed
in the system. However, the ADX web interface has not been validated with these browsers.
Solution
Clear the cache on the web browser and try again. The procedure to clear the browser cache vary
based on Web browsers. Therefore, refer to the respective help documentation to clear the cache.
Solution
• Download the signed framework RSL from the Adobe web site.
• Deploy a local signed framework RSL in case of limited or loss of internet connectivity.