Catalyst 6500 Series Switch Content
Switching Module with SSL Command
Reference
Software Release 2.1(1)
May, 2005
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Text Part Number: OL-7029-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
match protocol http header (header map submode)2-30
map retcode2-31
match protocol http retcode (return code map submode)2-32
map url2-33
match protocol http url (URL map submode)2-34
module csm2-35
natpool (module CSM submode)2-36
variable (module CSM submode)2-37
owner2-40
billing-info (owner submode)2-41
contact-info (owner submode)2-42
maxconns (owner submode)2-43
policy2-44
client-group (policy submode)2-45
iv
cookie-map (policy submode)2-46
header-map (policy submode)2-47
nat client (policy submode)2-48
serverfarm (policy submode)2-49
set ip dscp (policy submode)2-51
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
OL-7029-01
sticky-group (policy submode)2-52
url-map (policy submode)2-53
probe2-54
address (probe submode)2-56
credentials (probe submode)2-57
description (serverfarm submode)2-58
expect status (probe submode)2-59
failed (probe submode)2-61
header (probe submode)2-62
interval (probe submode)2-63
name (probe submode)2-64
open (probe submode)2-65
port (probe submode)2-66
Contents
receive (probe submode)2-67
recover (probe submode)2-68
request (probe submode)2-69
retries (probe submode)2-70
script (probe submode)2-71
real2-72
backup real (real server submode)2-74
health probe (real server submode)2-75
inservice (real server submode)2-76
maxconns (real server submode)2-77
minconns (real server submode)2-78
redirect-vserver (real server submode)2-79
weight (real server submode)2-80
redirect-vserver2-81
advertise (redirect virtual server submode)2-82
client (redirect virtual server submode)2-83
idle (redirect virtual server submode)2-84
OL-7029-01
inservice (redirect virtual server submode)2-85
replicate csrp (redirect virtual server submode)2-86
ssl (redirect virtual server submode)2-87
virtual (redirect virtual server submode)2-88
vlan (redirect virtual server submode)2-89
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
v
Contents
webhost backup (redirect virtual server submode)2-90
webhost relocation (redirect virtual server submode)2-91
reverse-sticky2-92
script file2-93
script task2-95
serverfarm2-96
bindid (serverfarm submode)2-97
description (serverfarm submode)2-98
failaction (serverfarm submode)2-99
health (serverfarm submode)2-100
nat client (serverfarm submode)2-101
nat server (serverfarm submode)2-102
predictor (serverfarm submode)2-103
probe (serverfarm submode)2-106
retcode-map (serverfarm submode)2-107
show module csm2-108
show module csm arp2-109
show module csm capp2-110
show module csm conns2-112
show module csm dfp2-114
show module csm ft2-116
show module csm map2-117
show module csm memory2-119
show module csm natpool2-120
show module csm owner2-121
show module csm policy2-122
show module csm probe2-123
show module csm probe script2-125
show module csm pvlan2-126
show module csm real2-127
vi
show module csm real retcode2-129
show module csm script2-130
show module csm script task2-131
show module csm serverfarm2-132
show module csm static2-134
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
OL-7029-01
show module csm static server2-135
show module csm stats2-137
show module csm status2-139
show module csm sticky2-140
show module csm tech-script2-142
show module csm tech-support2-143
show modulecsmvariable2-146
show module csm vlan2-148
show module csm vserver redirect2-150
show module csm xml stats2-152
snmp enable traps slb ft2-153
static2-154
real (static NAT submode)2-155
Contents
sticky2-156
cookie offset (sticky submode)2-158
cookie secondary (sticky submode)2-159
header (sticky submode)2-160
static (sticky submode)2-161
vserver2-162
advertise (virtual server submode)2-163
client (virtual server submode)2-164
description (virtual server submode)2-165
domain (virtual server submode)2-166
idle (virtual server submode)2-167
inservice (virtual server submode)2-168
owner (virtual server submode)2-169
parse-length (virtual server submode)2-170
pending (virtual server submode)2-171
persistent rebalance (virtual server submode)2-172
replicate csrp (virtual server submode)2-173
OL-7029-01
reverse-sticky (virtual server submode)2-174
serverfarm (virtual server submode)2-175
slb-policy (virtual server submode)2-177
ssl-sticky (virtual server submode)2-178
status-tracking (virtual server submode)2-179
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
vii
Contents
sticky (virtual server submode)2-180
unidirectional (virtual server submode)2-182
url-hash (virtual server submode)2-183
virtual (virtual server submode)2-184
vlan (virtual server submode)2-187
vlan2-188
alias (VLAN submode)2-189
description (VLAN submode)2-191
gateway (VLAN submode)2-192
ip address (VLAN submode)2-193
route (VLAN submode)2-194
xml-config2-195
client-group (XML submode)2-196
CHAPTER
credentials (XML submode)2-197
inservice (XML submode)2-198
port (XML submode)2-199
vlan (XML submode)2-200
3Commands Specific to the Content Switching Module with SSL3-1
clear ssl-proxy conn3-5
clear ssl-proxy session3-6
clear ssl-proxy stats3-7
crypto ca export pem3-8
crypto ca import pem3-10
crypto ca export pkcs123-12
crypto ca import pkcs123-14
crypto key export rsa pem3-16
crypto key import rsa pem3-18
debug ssl-proxy3-20
do3-23
viii
show ssl-proxy admin-info3-24
show ssl-proxy buffers3-25
show ssl-proxy certificate-history3-26
show ssl-proxy conn3-29
show ssl-proxy crash-info3-32
show ssl-proxy mac address3-34
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
OL-7029-01
show ssl-proxy natpool3-35
show ssl-proxy policy3-36
show ssl-proxy service3-38
show ssl-proxy stats3-40
show ssl-proxy status3-43
show ssl-proxy version3-45
show ssl-proxy vlan3-46
show ssl-proxy vts3-47
snmp-server enable3-48
ssl-proxy crypto selftest3-49
ssl-proxy mac address3-50
ssl-proxy natpool3-51
ssl-proxy pki3-52
Contents
ssl-proxy policy http-header3-54
ssl-proxy policy ssl3-56
ssl-proxy policy tcp3-60
ssl-proxy policy url-rewrite3-63
ssl-proxy pool ca3-65
ssl-proxy service3-66
ssl-proxy service client3-70
ssl-proxy ssl ratelimit3-73
ssl-proxy vlan3-74
standby authentication3-78
standby delay minimum reload3-79
standby ip3-81
standby mac-address3-83
standby mac-refresh3-85
standby name3-86
standby preempt3-87
standby priority3-89
OL-7029-01
standby redirects3-91
standby timers3-93
standby track3-95
standby use-bia3-97
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
ix
Contents
APPENDIX
I
NDEX
AAcronymsA-1
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
x
OL-7029-01
Preface
This preface describes the audience, organization, and conventions of this publication, and provides
information on how to obtain related documentation.
This guide contains the commands available for use with the Cisco Content Switching Module with SSL
(CSM-S). Use this guide with the Catalyst 6500 Series Switch Content Switching Module with SSL
Installation Note and the Catalyst 6500 Series Switch Content Switching Module with SSL Installation
and Configuration Note.
Audience
This publication is for experienced network administrators who are responsible for configuring and
maintaining Catalyst 6500 series switches and network managers who perform any of the following
tasks:
Organization
This publication is organized as follows:
ChapterTitleDescription
Chapter 1Using Content Switching
Chapter 2Content Switching Module with
Chapter 3Commands Specific to the
Appendix AAcronymsLists the acronyms used in this command
• Managing network security
• Configuring firewalls
• Managing default and static routes and TCP and UDP services
Introduces you to the CSM commands,
Module Commands
SSL Commands
Content Switching Module with
SSL
access modes, and common port and
protocol numbers.
Provides detailed descriptions of all CSM
commands in an alphabetical listing.
Provides detailed descriptions of all SSL
commands used by the CSMS in an
alphabetical listing.
reference.
OL-7029-01
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
xi
Conventions
Conventions
This document uses the following conventions:
ConventionDescription
boldface fontCommands, command options, and keywords are in
boldface.
italic fontArguments for which you supply values are in italics.
[ ]Elements in square brackets are optional. Default responses
to system prompts are in square brackets.
{ x | y | z }Alternative keywords are grouped in braces and separated by
vertical bars. Braces can also be used to group keywords
and/or aguments; for example, {interface interface type}.
[ x | y | z ]Optional alternative keywords are grouped in brackets and
separated by vertical bars.
stringA nonquoted set of characters. Do not use quotation marks
around the string or the string will include the quotation
marks.
screen fontTerminal sessions and information the system displays are in
screen font.
boldface screen
font
italic screen
font
^The symbol ^ represents the key labeled Control—for
< >Nonprinting characters, such as passwords are in angle
!, #An exclamation point (!) or a pound sign (#) at the beginning
Information you must enter is in boldface screen font.
Arguments in the screen display for which you supply values
are in
italic screen
font.
example, the key combination ^D in a screen display means
hold down the Control key while you press the D key.
brackets.
of a line of code indicates a comment line.
Preface
xii
Notes use the following conventions:
NoteMeans reader take note. Notes contain helpful suggestions or references to material not covered in
the publication.
Cautions use the following conventions:
Caution Means reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
OL-7029-01
Preface
Related Documentation
For more detailed installation and configuration information for the Content Switching Module with
SSL, refer to the following publications:
• Release Notes for the Catalyst 6500 Series Switch Content Switching Module with SSL
• Catalyst 6500 Series Switch Content Switching Module with SSL Installation Note
• Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
• Regulatory Compliance and Safety Information for the Catalyst 6500 Series Switches
For more detailed installation and configuration information for SSL services, refer to the following
publications:
• Release Notes for Catalyst 6500 Series SSL Services Module Software Release 2.x
• Catalyst 6500 Series Switch SSL Services Module Installation and Verification Note
• Catalyst 6500 Series Switch SSL Services Module Command Reference
• Catalyst 6500 Series Switch SSL Services Module System Messages
Use this document in conjunction with the CSM documentation available online at the following site:
Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several
ways to obtain technical assistance and other technical resources. These sections explain how to obtain
technical information from Cisco Systems.
Cisco.com
You can access the most current Cisco documentation at this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
http://www.cisco.com
You can access international Cisco websites at this URL:
Cisco documentation and additional literature are available in a Documentation DVD package, which
may have shipped with your product. The Documentation DVD is updated regularly and may be more
current than printed documentation. The Documentation DVD package is available as a single unit.
OL-7029-01
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
xiii
Documentation Feedback
Registered Cisco.com users (Cisco direct customers) can order a Cisco Documentation DVD (product
number DOC-DOCDVD=) from the Ordering tool or Cisco Marketplace.
Cisco Ordering tool:
http://www.cisco.com/en/US/partner/ordering/
Cisco Marketplace:
http://www.cisco.com/go/marketplace/
Ordering Documentation
You can find instructions for ordering documentation at this URL:
• Report security vulnerabilities in Cisco products.
• Obtain assistance with security incidents that involve Cisco products.
• Register to receive security information from Cisco.
A current list of security advisories and notices for Cisco products is available at this URL:
http://www.cisco.com/go/psirt
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
OL-7029-01
Preface
If you prefer to see advisories and notices as they are updated in real time, you can access a Product
Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL:
Cisco is committed to delivering secure products. We test our products internally before we release
them, and we strive to correct all vulnerabilities quickly. If you think that you might have identified a
vulnerability in a Cisco product, contact PSIRT:
• Emergencies— security-alert@cisco.com
• Nonemergencies —psirt@cisco.com
TipWe encourage you to use Pretty Good Privacy (PGP) or a compatible product to encrypt any sensitive
information that you send to Cisco. PSIRT can work from encrypted information that is compatible with
PGP versions 2.x through 8.x.
Never use a revoked or an expired encryption key. The correct public key to use in your correspondence
with PSIRT is the one that has the most recent creation date in this public key server list:
In an emergency, you can also reach PSIRT by telephone:
• 1 877 228-7302
• 1 408 525-6532
Obtaining Technical Assistance
For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, Cisco
Technical Support provides 24-hour-a-day, award-winning technical assistance. The Cisco Technical
Support Website on Cisco.com features extensive online support resources. In addition, Cisco Technical
Assistance Center (TAC) engineers provide telephone support. If you do not hold a valid Cisco service
contract, contact your reseller.
Cisco Technical Support Website
The Cisco Technical Support Website provides online documents and tools for troubleshooting and
resolving technical issues with Cisco products and technologies. The website is available 24 hours a day,
365 days a year, at this URL:
OL-7029-01
http://www.cisco.com/techsupport
Access to all tools on the Cisco Technical Support Website requires a Cisco.com user ID and password.
If you have a valid service contract but do not have a user ID or password, you can register at this URL:
http://tools.cisco.com/RPF/register/register.do
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
xv
Obtaining Technical Assistance
NoteUse the Cisco Product Identification (CPI) tool to locate your product serial number before submitting
a web or phone request for service. You can access the CPI tool from the Cisco Technical Support
Website by clicking the Tools & Resources link under Documentation & Tools.Choose Cisco Product
Identification Tool from the Alphabetical Index drop-down list, or click the Cisco Product
Identification Tool link under Alerts & RMAs. The CPI tool offers three search options: by product ID
or model name; by tree view; or for certain products, by copying and pasting show command output.
Search results show an illustration of your product with the serial number label location highlighted.
Locate the serial number label on your product and record the information before placing a service call.
Submitting a Service Request
Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3
and S4 service requests are those in which your network is minimally impaired or for which you require
product information.) After you describe your situation, the TAC Service Request Tool provides
recommended solutions. If your issue is not resolved using the recommended resources, your service
request is assigned to a Cisco TAC engineer. The TAC Service Request Tool is located at this URL:
Preface
http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone.
(S1 or S2 service requests are those in which your production network is down or severely degraded.)
Cisco TAC engineers are assigned immediately to S1 and S2 service requests to help keep your business
operations running smoothly.
To open a service request by telephone, use one of the following numbers:
For a complete list of Cisco TAC contacts, go to this URL:
http://www.cisco.com/techsupport/contacts
Definitions of Service Request Severity
To ensure that all service requests are reported in a standard format, Cisco has established severity
definitions.
Severity 1 (S1)—Your network is “down,” or there is a critical impact to your business operations. You
and Cisco will commit all necessary resources around the clock to resolve the situation.
Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your
business operation are negatively affected by inadequate performance of Cisco products. You and Cisco
will commit full-time resources during normal business hours to resolve the situation.
xvi
Severity 3 (S3)—Operational performance of your network is impaired, but most business operations
remain functional. You and Cisco will commit resources during normal business hours to restore service
to satisfactory levels.
Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or
configuration. There is little or no effect on your business operations.
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
OL-7029-01
Preface
Obtaining Additional Publications and Information
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online
and printed sources.
• Cisco Marketplace provides a variety of Cisco books, reference guides, and logo merchandise. Visit
Cisco Marketplace, the company store, at this URL:
http://www.cisco.com/go/marketplace/
• Cisco Press publishes a wide range of general networking, training and certification titles. Both new
and experienced users will benefit from these publications. For current Cisco Press titles and other
information, go to Cisco Press at this URL:
http://www.ciscopress.com
• Packet magazine is the Cisco Systems technical user magazine for maximizing Internet and
networking investments. Each quarter, Packet delivers coverage of the latest industry trends,
technology breakthroughs, and Cisco products and solutions, as well as network deployment and
troubleshooting tips, configuration examples, customer case studies, certification and training
information, and links to scores of in-depth online resources. You can access Packet magazine at
this URL:
http://www.cisco.com/packet
• iQ Magazine is the quarterly publication from Cisco Systems designed to help growing companies
learn how they can use technology to increase revenue, streamline their business, and expand
services. The publication identifies the challenges facing these companies and the technologies to
help solve them, using real-world case studies and business strategies to help readers make sound
technology investment decisions. You can access iQ Magazine at this URL:
http://www.cisco.com/go/iqmagazine
• Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering
professionals involved in designing, developing, and operating public and private internets and
intranets. You can access the Internet Protocol Journal at this URL:
http://www.cisco.com/ipj
• World-class networking training is available from Cisco. You can view current offerings at
this URL:
http://www.cisco.com/en/US/learning/index.html
OL-7029-01
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
xvii
Obtaining Additional Publications and Information
Preface
xviii
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
OL-7029-01
CHAPTER
1
Using Content Switching Module Commands
This chapter describes how to use the CSM and CSM-S commands and contains the following sections:
• Using the CSM and CSM-S Commands, page 1-1
• Command Modes, page 1-2
NoteExcept where specifically differentiated, the term “Content Switching Module” and its acronym “CSM”
includes both the Content Switching Module and the Content Switching Module with SSL.
The term “Content Switching Module with SSL” and its acronym “CSM-S” are used only where the
information presented is specific to the CSMS.
The term SSL daughter card an SSL termination dauthter card for the CSM that accelerates Secure
Socket Layer (SSL) transactions.
Using the CSM and CSM-S Commands
This section provides a brief introduction to using commands and where to go for more information on
configuring and using your CSM or CSM-S.
You will use these commands for basic tasks:
CommandTask
write memorySaving the configuration
write terminalViewing the configuration
logging buffered debuggingAccumulating system log (syslog) messages
show loggingViewing system log (syslog) messages
clear loggingClearing the message buffer
OL-7029-01
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
1-1
Command Modes
Chapter 1 Using Content Switching Module Commands
With the command-line interface (CLI), you can do the following tasks:
• Check the syntax before entering a command.
Enter a command and press the ? key to view a quick summary, or precede a command with the help
command (help aaa, for example).
• Abbreviate commands.
You can use the config t command to start configuration mode, the write t command statement to
list the configuration, and the write m commmand to write to Flash memory. In most commands,
the show command can be abbreviated as sh. This feature is called command completion.
• Review possible port and protocol numbers at the following Internet Assigned Numbers Authority
• Create your configuration in a text editor, and then cut and paste it into the configuration.
You can paste in a line at a time or the whole configuration. Always check your configuration after
pasting large blocks of text to be sure that all of the text was copied.
For information about how to build your CSM and CSM-S configuration, refer to the Catalyst 6500
Series Content Switching Module Installation and Configuration Note and Catalyst 6500 Series Switch
Content Switching Module with SSL Installation and Configuration Note.
CSM and CSM-S technical documentation is located online at the following websites:
The CSM and CSM-S contain a command set based on Cisco IOS technologies and provides
configurable command privilege modes based on the following command modes:
NoteWhen using these modules on a switch running the Catalyst operating system and Cisco IOS, you must
session to the Mutilayer Switch Feature Card (MSFC) for the router prompt.
• Unprivileged mode
The unprivileged mode allows you to view CSM settings. The unprivileged mode prompt appears
as follows when you first access the CSM:
Router>
• Privileged mode
Any unprivileged mode command will work in privileged mode. Use the enable command to start
the privileged mode from the unprivileged mode as follows:
Router> enable
Password:
Router
1-2
The # prompt is displayed.
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
OL-7029-01
Chapter 1 Using Content Switching Module Commands
Use the exit or end commands to exit privileged mode and return to unprivileged mode as follows:
Router# exit
Logoff
Type help or '?' for a list of available commands.
Router>
Use the disable command to exit privileged mode and return to unprivileged mode as follows:
Router# disable
Router>
• Configuration mode
The configuration mode allows you to change the configuration. All privileged, unprivileged, and
configuration commands are available in this mode. Use the configure terminal command to start
the configuration mode as follows:
Router# configure terminal
Router(config)#
Use the exit or end commands to exit configuration mode and return to privileged mode as follows:
Router(config)# end
Router#
Regular Expressions
Use the disable command to exit configuration mode and return to unprivileged mode as follows:
Router(config)# disable
Router>
• Submodes
When you are in a submode, the prompt changes to:
Router(config-submode_name)#
Regular Expressions
Regular expressions used in commands are based on the UNIX filename specification. You will use
regular expressions in these commands:
• match protocol http cookie (cookie map submode), page -25
• match protocol http header (header map submode), page -30
• match protocol http url (URL map submode), page -34
ExpressionMeaning
“*” Zero or more characters
“?”Exactly one character—the [Ctrl + V] key combination must be entered
“\” Escaped character
“|”Or
Bracketed range (for example, [0–9]) Matching any single character from the range
Leading ^ in a rangeDo not match any in the range
OL-7029-01
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
1-3
Chapter 1 Using Content Switching Module Commands
Regular Expressions
ExpressionMeaning
“.\a” Alert (ASCII 7)
“.\b” Backspace (ASCII 80
“.\f” Form-feed (ASCII 12)
“.\n” Newline (ASCII 10)
“.\r” Carriage return (ASCII 13)
“.\t” Tab (ASCII 9)
“.\v” Vertical tab (ASCII 11)
“.\0” Null (ASCII 0)
“.\\”Backslash
“.\x##” Any ASCII character as specified in two-digit hexadecimal notation
1-4
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
OL-7029-01
CHAPTER
2
Content Switching Module with SSL Commands
This chapter contains an alphabetical listing of the commands necessary to configure the CSM-S. These
commands are unique to server load-balancing (SLB) and Layer 3 switching.
OL-7029-01
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
2-1
arp
arp
Chapter 2 Content Switching Module with SSL Commands
To configure a static ARP entry, use the arp command. To remove the static ARP entry from the
configuration, use the no form of this command.
arp ip_addressmac-address vlan id
no arp ip_address
Syntax Description
DefaultsThis command has no default settings.
Command ModesCSM configuration submode
Command History
ExamplesThis example shows how to configure a static ARP entry:
ip_addressIP address that you want associate with the ARP entry.
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
OL-7029-01
Chapter 2 Content Switching Module with SSL Commands
capp udp
To enter the Content Application Peering Protocol (CAPP) User Datagram Protocol (UDP)
configuration submode, and then enable the CAPP, use the capp udp command. To remove the CAPP
UDP configuration, use the no form of this command.
capp udp
no capp udp
Syntax DescriptionThis command has no arguments or keywords.
DefaultsThis command has no default settings.
Command ModesCSM configuration submode
capp udp
Command History
ReleaseModification
CSM release 2.2(1)This command was introduced.
CSM-S release 1.1(1)This command was introduced.
Usage GuidelinesThe CSM implements only the agent side of the CAPP, not the content router functionality. This feature
provides Global Server Load Balancing (GSLB) when you use the CSM with a Content Services Switch
(CSS), which provides the content router function.
When you enter the CAPP UDP submode, the following commands are available:
• default—Sets a command to its default.
• exit—Saves changes and exits from the subcommand mode; see the “agent (DFP submode)”
command section.
• no—Negates a command or sets the specified command to its defaults.
• options—Sets optional parameters for a specified IP address. see the “options (CAPP UDP
submode)” command section.
• port—Configures the CAPP port. Range is from 1 to 65535. Default is 5002, see the “port (CAPP
UDP submode)” command section.
• secure—Enables encryption, see the “secure (CAPP UDP submode)” command section.
ExamplesThis example shows how to initiate CAPP UDP agent configuration mode and set the CAPP port:
Cat6k-2(config-module-csm)# capp udp
Cat6k-2(config-slb-capp-udp)# port 5002
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
OL-7029-01
2-3
capp udp
Related Commandsport (CAPP UDP submode)
Chapter 2 Content Switching Module with SSL Commands
2-4
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
OL-7029-01
Chapter 2 Content Switching Module with SSL Commands
options (CAPP UDP submode)
To assign session options to an IP address, use the options command in the CAPP UDP submode. To
remove the options for the specified address from the configuration, use the no form of this command.
options ip_address encryption MD5 secret
no options ip_address
options (CAPP UDP submode)
Syntax Description
DefaultsThis command has no default settings.
Command ModesCSM CAPP UDP submode
Command History
Usage GuidelinesThe CSM applies encryption to packets sent to this destination address or when the CSM receives
ip_addressIP address that you want associate with this group of options.
encryption MD5Specifies MD5 authentication.
secretThe string used in encryption and decryption of the MD5 hashing
method. Enter an unquoted text string with a maximum of 31
characters.
ReleaseModification
CSM release 2.2(1)This command was introduced.
CSM-S release 1.1(1)This command was introduced.
datagrams with a matching source IP address.
You can set the IP address to 0.0.0.0 to apply encryption to all incoming and outbound datagrams that
are not specifically configured. The 0.0.0.0 IP address allows you to set a global security configuration
that can be applied to an arbitrary number of peers.
ExamplesThis example shows the application of a specific option set to 10.6.3.21 and a global option set to all
other IP addresses. The CSM encrypts datagrams received from 10.6.3.21 and transmitted to 10.6.3.21
with encryption code mySecret. All other datagrams, received or transmitted, are assigned to the default
encryption secret anotherSecret.
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
OL-7029-01
2-5
port (CAPP UDP submode)
port (CAPP UDP submode)
To set the port number for CAPP UDP connections, use the port command in the CAPP UDP submode.
To remove the port from the configuration, use the no form of this command.
port port_num
no port
Chapter 2 Content Switching Module with SSL Commands
Syntax Description
DefaultsThe no form of this command sets the port to 5002.
Command ModesCSM CAPP UDP submode
Command History
ExamplesThis example shows how to set the port for CAPP connections:
Related Commandscapp udp
port_numSpecifies the UDP port number. Enter a value of 1 to 65535.
ReleaseModification
CSM release 2.2(1)This command was introduced.
CSM-S release 1.1(1)This command was introduced.
Cat6k-2(config-slb-capp-udp)# 50
2-6
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
OL-7029-01
Chapter 2 Content Switching Module with SSL Commands
secure (CAPP UDP submode)
To enable or disable the encryption requirement for inbound CAPP datagrams, use the secure command
in the CAPP UDP submode. This command prevents unauthorized messages from entering the CSM. To
remove the encryption requirement from the configuration, use the no form of this command.
secure
no secure
Syntax DescriptionThis command has no arguments or keywords.
DefaultsThis command has no default settings.
Command ModesCSM CAPP UDP submode
secure (CAPP UDP submode)
Command History
Usage GuidelinesUse the capp udp secure command with the capp udp options command to specify which secure
ExamplesThis example shows how to allow only incoming traffic from 10.6.3.21 encrypted with the encryption
Related Commandscapp udp
ReleaseModification
CSM release 2.2(1)This command was introduced.
CSM-S release 1.1(1)This command was introduced.
messages are accepted. If you use this command without the capp udp options command, the CSM
drops all incoming data.
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
2-7
clear module csm
clear module csm
To force the active CSM to become the standby module, use the clear module csm command.
clear module csm [slot | all] arp-cache ip-address connections [real | vserver] counters ft active
linecard-configuration sticky [1-255 | all]
Chapter 2 Content Switching Module with SSL Commands
Syntax Description
DefaultsThis command has no default settings.
Command ModesPrivileged
slot(Optional) Specifies the CSM location in the switch. Range is from 1
to 9.
all (Optional) Applies to all online CSM modules.
arp-cache ip-addressClears the SLB ARP cache.
connectionsSpecifies connections.
real(Optional) Clears SLB connections for the real servers.
vserver(Optional) Clears SLB connections for a virtual server.
countersClears SLB statistics.
ft activeClears the CSM fault tolerance state to force a failover.
linecard-configuration Clears the configuration database stored in the SLB linecard
sticky Specifies sticky.
1-255 (Optional) Clears the designated sticky group; range is from 1 to 255.
all(Optional) Clears all sticky entries from the sticky database.
Command History
Usage GuidelinesWhen a connection is closed, a reset (RST) is sent to both the client and the server. Counters reset all
Catalyst 6500 Series Switch Content Switching Module with SSL Command Reference
2-8
ReleaseModification
CSM release 3.2(1)This command was introduced.
CSM-S release 1.1(1)This command was introduced.
the CSM statistics information, except for the show mod csm X tech-support counters, which are reset
any time that you run the show command. The linecard-configuration command forces a soft-reset of
the CSM, which erases all existing connections and run-time information. The CSM then reloads its
configuration from Cisco IOS. This process takes about 3 seconds.
The ft active command is used to force the active CSM to the failover state. Fault tolerance preempt
must not be enabled.
OL-7029-01
Loading...
+ 312 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.