Cisco ACE-4710-K9 Administration Guide - Page 122

class-default, in the ACE load balancing the request to the SFBACKUP server farm.

Page 122 highlights

Class Map and Policy Map Overview Chapter 4 Configuring Class Maps and Policy Maps If none of the classifications specified in policy maps match, then the ACE executes the default actions specified against the class map configured with the class-default keyword (if one is specified). All traffic that fails to meet the other matching criteria in the named class map belongs to the default traffic class. The class map configure with the class-default keyword has an implicit match-any match statement in it and is used to match any traffic classification. For example, with the following classifications for a specific request, the ACE attempts to match the incoming content request with the classification defined in class maps C1, C2, and C3: host1/Admin(config)# policy-map type loadbalance first-match SLB_L7_POLICY host1/Admin(config-pmap-lb)# class C1 host1/Admin(config-pmap-lb-c)# serverfarm SF1 host1/Admin(config-pmap-lb-c)# exit host1/Admin(config-pmap-lb)# class C2 host1/Admin(config-pmap-lb-c)# serverfarm SF2 host1/Admin(config-pmap-lb-c)# exit host1/Admin(config-pmap-lb)# class C3 host1/Admin(config-pmap-lb-c)# serverfarm SF3 host1/Admin(config-pmap-lb-c)# exit host1/Admin(config-pmap-lb-c)# class class-default host1/Admin(config-pmap-lb-c)# serverfarm SFBACKUP If the match criteria satisfies, the ACE load balances a content request to serverfarm SF1; if not, the ACE evaluates the match criteria in class map C2 and class map C3. If the request does not match any of the classifications in class maps C1, C2, or C3, then the class defined with the class-default keyword is guaranteed to match because it contains a match-any match statement in it. This action results in the ACE load balancing the request to the SFBACKUP server farm. The ACE supports flexible class map ordering within a policy map. The ACE executes only the actions for the first matching traffic classification, so the order of class maps within a policy map is very important. The policy lookup order is based on the security features of the ACE. The policy lookup order is implicit, irrespective of the order in which you configure policies on the interface. The policy lookup order of the ACE is as follows: 1. Access control (permit or deny a packet) 2. Permit or deny management traffic 3. TCP/UDP connection parameters 4. Load balancing based on a virtual IP (VIP) Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-8 OL-11157-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418

Chapter 4
Configuring Class Maps and Policy Maps
Class Map and Policy Map Overview
4-8
Cisco 4700 Series Application Control Engine Appliance Administration Guide
OL-11157-01
If none of the classifications specified in policy maps match, then the ACE
executes the default actions specified against the class map configured with the
class-default
keyword (if one is specified). All traffic that fails to meet the other
matching criteria in the named class map belongs to the default traffic class. The
class map configure with the
class-default
keyword has an implicit match-any
match statement in it and is used to match any traffic classification.
For example, with the following classifications for a specific request, the ACE
attempts to match the incoming content request with the classification defined in
class maps C1, C2, and C3:
host1/Admin(config)#
policy-map type loadbalance first-match
SLB_L7_POLICY
host1/Admin(config-pmap-lb)#
class C1
host1/Admin(config-pmap-lb-c)#
serverfarm SF1
host1/Admin(config-pmap-lb-c)#
exit
host1/Admin(config-pmap-lb)#
class C2
host1/Admin(config-pmap-lb-c)#
serverfarm SF2
host1/Admin(config-pmap-lb-c)#
exit
host1/Admin(config-pmap-lb)#
class C3
host1/Admin(config-pmap-lb-c)#
serverfarm SF3
host1/Admin(config-pmap-lb-c)#
exit
host1/Admin(config-pmap-lb-c)#
class class-default
host1/Admin(config-pmap-lb-c)#
serverfarm SFBACKUP
If the match criteria satisfies, the ACE load balances a content request to
serverfarm SF1; if not, the ACE evaluates the match criteria in class map C2 and
class map C3. If the request does not match any of the classifications in class maps
C1, C2, or C3, then the class defined with the
class-default
keyword is guaranteed
to match because it contains a match-any match statement in it. This action results
in the ACE load balancing the request to the SFBACKUP server farm.
The ACE supports flexible class map ordering within a policy map. The ACE
executes only the actions for the first matching traffic classification, so the order
of class maps within a policy map is very important. The policy lookup order is
based on the security features of the ACE. The policy lookup order is implicit,
irrespective of the order in which you configure policies on the interface.
The policy lookup order of the ACE is as follows:
1.
Access control (permit or deny a packet)
2.
Permit or deny management traffic
3.
TCP/UDP connection parameters
4.
Load balancing based on a virtual IP (VIP)