Cisco ACE-4710-K9 Administration Guide - Page 163
Using Parameter Maps in a Layer 3 and Layer 4 Policy Map
View all Cisco ACE-4710-K9 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 163 highlights
Chapter 4 Configuring Class Maps and Policy Maps Configuring a Layer 3 and Layer 4 Policy Map Table 4-9 Layer 3 and Layer 4 Policy Map Actions and Related Documentation (continued) Layer 3 and Layer 4 Policy Map/Actions Connection redundancy Application protocol inspection Static or dynamic NATs IP, TCP, and UDP connection behavior Document Cisco 4700 Series Application Control Engine Appliance Administration Guide (this book) Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide Chapter Chapter 7, Configuring Redundant ACE Appliances Chapter 3, Configuring Application Protocol Inspection Chapter 5, Configuring Network Address Translation Chapter 4, Configuring TCP/IP Normalization and IP Reassembly Parameters Using Parameter Maps in a Layer 3 and Layer 4 Policy Map To combine related actions for TCP, IP, HTTP, or UDP connections in a Layer 3 and Layer 4 policy map, create one or more parameter maps for use with the ACE. The ACE supports the following Layer 3 and Layer 4 parameter map types: • parameter-map type connection map_name-Combines all TCP and IP connection-related parameters pertaining to TCP normalization, termination, and server re-use as well as IP normalization, fragmentation, and reassembly. See the Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide for details. • parameter-map type http-Configures advanced HTTP behavior for HTTP load-balanced connections. See the Cisco 4700 Series Application Control Engine Appliance Server Load-Balancing Configuration Guide for details. • parameter-map type http-Configures advanced HTTP behavior for HTTP deep packet inspection. See the Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide for details. OL-11157-01 Cisco 4700 Series Application Control Engine Appliance Administration Guide 4-49