Reload a virtual context in ACE

Hi,
is possible to reload one or more virtual contexts in ACE module? Is possible to download checkpoints from ACE to remote server and vice versa?
Thank you

You can't reload a single context, maybe they will change this with a next major. Copying a checkpoint is also not possible imho. So if you delete a context the whole checkpoints are gone.
If you want to do a write erase and reload for a fresh start you have to create an initial "empty" checkpoint and roll back.
Easiest way to create a fresh context and make sure it has the same configuration is copy and paste from a config file but you have to be careful in which order. If you e.g. reference a cert which is not in the store or paste an ssl-proxy into a service policy without the ssl-proxy part configured etc.
But as always maybe someone has even better advice.
Roble

Similar Messages

  • Ssh access into virtual context on the ACE module A(2.2)

    Hello,
    I tried to configure:
    Admin(conf)#context test
    Admin(conf-context)#ssh key rsa1 1024
    but this command ssh is not supported int this newest version. How can I configure the ssh access directly into virtual context on the ACE module??
    Thank you

    Here's a link on how to configure it.
    https://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA3_1_0/configuration/admin/guide/access.html#wp1049450
    Hope that helps.

  • ACE Virtual context -TACACS authentication issue

    Hello All,
    I have configured four context in ACE module.
    I am trying to authenticate individual context through ACS.
    Admin context authentication is working perfectly fine , and it is assigning the role of Admin for all the ACS users.
    But when i am trying to authenticate other context , authentication part is working fine. but the user is not able to do any action other than show commands.
    when i checked the user-account ( show user-account), it is given the role of Network-Admin .
    Admin Context Output:
    user:parvees.m
            roles: Admin
            domain: default-domain
            Context: Admin
    Context ABC output
    user:parvees.m
            roles: Network-Admin
            domain: default-domain
            Context: ABC
    Any help is highly appreciated.
    regards,
    Parvees

    Hi
    ACS shell following command has been added and it worked for me
    shell:ABC ="Admin default-domain"
    this has been repeated for all the domains... and it worked fine
    regards,
    Parvees

  • How many default virtual context counts with ASA 5585 Series

    Hi All:
    I prepare replace FWSM to ASA 5585 Series,but I confuse the default virtual context counts on ASA 5585.
    I used 3 virtual contexts on my old FWSM(1 admin context with 2 contexts).According the ASA configuration guide below.
    http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/mode_contexts.html#wp1188797
    It state the ASA 5585 have default 2 contexts,Does it state the ASA 5585 just have 2 contexts or  1 admin context plus "2" context (3 contexts available)
    thks fot your reply

    Hi,
    To my understanding the ASA with the most default lisence lets you use 2 Security Contexts to your own purposes. Admin context will always be there on the ASA when running in multiple context mode. Its created when you change your ASA from its default mode (single) to "mode multiple".
    In my original post the latter part was just to mention that to my understanding if you use 2 ASAs (almost any model) in failover with a software 8.3 and above the ASA will combine their lisences regarding some values. For example connecting 2 ASAs in Failover which have limit of 2 Security Contexts, they will get combined and the failover will have 4 Security Context limit.
    Atleast that is what I see with the "show version" command and this is also what we have been told by a Cisco employee. Ive also been told that if I for example (running 8.3+ OS) buy a 5 Security Context license for the other unit, It will combine the others base license (2 SC) to the others units new license (5 SC) resulting in the combined Security Context limit of 7.
    This is what Cisco documentation mentions about Active/Standby  and Active/Active Failover Licensing at version 8.3 and above:
    Or you have two ASA 5540 adaptive security  appliances, one with 20 contexts and the other with 10 contexts; the  combined license allows 30 contexts. For Active/Active failover, for example, one unit  can use 18 contexts and the other unit can use 12 contexts, for a total  of 30; the combined usage cannot exceed the failover cluster license.
    I've have had 2 ASA5585-X ASAs combined in A/A Failover running 8.4(2) and they have atleast showed that they have the combined Security Context limit of 4 Security Contexts
    Heres a partial output of the "show version" command on the ASAs in question when they were just out of the box combined in Failover with no other configurations other than running in multiple context mode and management configuration in admin context.
    Licensed features for this platform:Maximum Physical Interfaces       : Unlimited      perpetualMaximum VLANs                     : 1024           perpetualInside Hosts                      : Unlimited      perpetualFailover                          : Active/Active  perpetualVPN-DES                           : Enabled        perpetualVPN-3DES-AES                      : Enabled        perpetualSecurity Contexts                 : 2              perpetualGTP/GPRS                          : Disabled       perpetualAnyConnect Premium Peers          : 2              perpetualAnyConnect Essentials             : Disabled       perpetualOther VPN Peers                   : 10000          perpetualTotal VPN Peers                   : 10000          perpetualShared License                    : Disabled       perpetualAnyConnect for Mobile             : Disabled       perpetualAnyConnect for Cisco VPN Phone    : Disabled       perpetualAdvanced Endpoint Assessment      : Disabled       perpetualUC Phone Proxy Sessions           : 2              perpetualTotal UC Proxy Sessions           : 2              perpetualBotnet Traffic Filter             : Disabled       perpetualIntercompany Media Engine         : Disabled       perpetual10GE I/O                          : Disabled       perpetualFailover cluster licensed features for this platform:Maximum Physical Interfaces       : Unlimited      perpetualMaximum VLANs                     : 1024           perpetualInside Hosts                      : Unlimited      perpetualFailover                          : Active/Active  perpetualVPN-DES                           : Enabled        perpetualVPN-3DES-AES                      : Enabled        perpetualSecurity Contexts                 : 4              perpetualGTP/GPRS                          : Disabled       perpetualAnyConnect Premium Peers          : 4              perpetualAnyConnect Essentials             : Disabled       perpetualOther VPN Peers                   : 10000          perpetualTotal VPN Peers                   : 10000          perpetualShared License                    : Disabled       perpetualAnyConnect for Mobile             : Disabled       perpetualAnyConnect for Cisco VPN Phone    : Disabled       perpetualAdvanced Endpoint Assessment      : Disabled       perpetualUC Phone Proxy Sessions           : 4              perpetualTotal UC Proxy Sessions           : 4              perpetualBotnet Traffic Filter             : Disabled       perpetualIntercompany Media Engine         : Disabled       perpetual10GE I/O                          : Disabled       perpetual
    Though I still suggest confirming all these things from the people/company that youre acquiring the ASA(s) from so you get what youre asking for. Or someone from Cisco could confirm this on these forums.

  • Reuse of context in ACE module

    Hi all, just have a question about som reuse of resources in a ACE module context.  I don't want to make a new context, and can reuse most of the existing configuration in one of my context.  The config is not complex and difficult, but I'm not sure if I can do this.
    The primary goal is to loadbalance 2 webservers with a new vip, new serverfarm, stickygroup, policy-map and different nat-pool.
    Since I haven't decided the ip addresses to be used, they are just xx in the config below.
    The changes I want to implement are in bold.  Will this work for me?
    probe http WEBGUI_D2
    description Probe for http mot webgui
    interval 10
    passdetect interval 10
    passdetect count 1
    request method get url /D2/auth/login.aspx
    expect status 200 302
    header User-Agent header-value "IDENTITY"
    rserver host cwi003
    description content server logon
    ip address 10.163.22.27
    inservice
    rserver host cwi004
    description content server logon
    ip address 10.163.22.28
    inservice
    rserver host cwi503
    description content server logon 2
    ip address 10.163.22.23
    inservice
    rserver host cwi504
    description content server logon 2
    ip address 10.163.22.24
    inservice
    serverfarm host SF_LOGON_D2
    probe WEBGUI_D2
    rserver cwi003 80
       inservice
    rserver cwi004 80
       inservice
    serverfarm host SF_LOGON2_D2
    probe WEBGUI_D2
    rserver cwi503 80
       inservice
    rserver cwi504 80
       inservice
    sticky ip-netmask 255.255.255.255 address source STICKYGROUP1
    timeout 20
    replicate sticky
    serverfarm SF_LOGON_D2
    serverfarm SF_LOGON2_D2
    class-map match-all VS_LOGON_D2
    3 match virtual-address 10.163.22.13 any
    class-map match-all VS_LOGON2_D2
    3 match virtual-address 10.163.22.xx any
    policy-map type loadbalance first-match PM_ONE_ARM_LB
    class class-default
       sticky-serverfarm STICKYGROUP1
    policy-map multi-match PM_ONE_ARM_MULTI_MATCH
    class VS_LOGON_D2
       loadbalance vip inservice
       loadbalance policy PM_ONE_ARM_LB
       nat dynamic 5 vlan 1240
    class VS_LOGON2_D2
       loadbalance vip inservice
       loadbalance policy PM_ONE_ARM_LB
       nat dynamic 6 vlan 1240
    interface vlan 1240
    description Client_server
    ip address 10.163.22.11 255.255.255.0
    peer ip address 10.163.22.12 255.255.255.0
    access-group input INBOUND
    nat-pool 5 10.163.22.14 10.163.22.17 netmask 255.255.255.192 pat
    nat-pool 6 10.163.22.xx 10.163.22.xx netmask 255.255.255.192 pat
    service-policy input PM_ONE_ARM_MULTI_MATCH
    no shutdown
    ip route 0.0.0.0 0.0.0.0 10.163.22.1
    BR
    Geir

    Thanks for your reply.
    Hope I understand you correct.  This sould be the config I need to paste into the existing context.
    rserver host cwi503
      description content server logon 2
      ip address 10.163.22.23
      inservice
    rserver host cwi504
      description content server logon 2
      ip address 10.163.22.24
      inservice
    serverfarm host SF_LOGON2_D2
      probe WEBGUI_D2
      rserver cwi503 80
        inservice
      rserver cwi504 80
        inservice
    sticky ip-netmask 255.255.255.255 address source STICKYGROUP2
       timeout 20
       replicate sticky
       serverfarm SF_LOGON2_D2
    class-map match-all VS_LOGON2_D2
       3 match virtual-address 10.163.22.xx any
    policy-map type loadbalance first-match PM_ONE_ARM_LB2
      class class-default
        sticky-serverfarm STICKYGROUP2
    policy-map multi-match PM_ONE_ARM_MULTI_MATCH
      class VS_LOGON2_D2
        loadbalance vip inservice
        loadbalance policy PM_ONE_ARM_LB2
        nat dynamic 6 vlan 1240
    interface vlan 1240
      nat-pool 6 10.163.22.xx 10.163.22.xx netmask 255.255.255.192 pat
    Br
    Geir

  • Question in regard to management VLAN for each Context in ACE module

    Dear Pros,
    I know this will be a simple questions to answer, and I have searched the forum, but I am not able to find the answer I need.
    1) Does the ACE module require an Management IP address for each Context? Should the same VLAN be applied to each context, with larger size subnet to supply host address?
    2) If it does require that, what IP address should I used for default route in each context.
    I will be utilizing "Bridge Mode" for my application to transition the current network from Foundry to ACE. I will later on apply the "Routed Mode" model.
    Each ACE module will have 3 seperate Context, for a total of 4 including the Admin.
    Any suggestions or if you can point me to location as always will be greatly apprecaited.
    Thanks and best regards.
    Raman Azizian

    Hi,
    you have several options to choose from.
    1. Use Admin context for management
    You can use the Admin context for management. Give it an IP address in your managment VLAN, default route to upstream router, and login and change to contexts from there.
    + Easy and straightforward
    - snmp and syslog are using the ip from each individual context and not the management IP
    2. Use a Large subnet and assign an IP address in each context for management.
    You can configure 1 managment VLAN and assign an IP address to each context in this subnet. Create static routes to the management stations that need to access this management address.
    + each context has its own managment address
    - static routes need to be added
    3. Use your client-side ip address (or BVI) as management address.
    You management traffic will be inline and use the same path as your data. Default route is already configured and also valid for the management.
    + no static routes needed
    - inline management
    Personally, I choose option 1. That is, if the people that need to manage the ACE is the same team.
    If other teams (serverteam for context 1, other serverteam for context 2) need to manage the ACE, than I would choose option 3.
    HTH,
    Dario

  • Virtual context creation on Oracle Application Server

    How do we set up a context in Oracle Application Server? and how to map servlets and jsp to this context?

    Hi,
    I am not sure about your exact needs, but it is the responsibility of the developer to provide a Deployment Descriptor ( an XML File that contains the required mappings - E.g. Web.xml ). You can specify the Context in the Deployment Descriptor & allow the Application Server to pick up the Context.
    You can package your Servlets & JSP in an EAR File ( by specify the required parameters in the Deployment Descriptor ), deploy it to the app server & check it out. You will be able to access your Servlets and the JSP.
    Can you also tell us your exact requirements ?
    Regards,
    Sandeep

  • Can't install ACE 4710 license

    Hi,
    I've tried to installed the license, but is not successful, below are the steps which i've taken to installed the license, with error messages. pls. assist.
    CBJ6-LBDMZ2/Admin# copy tftp://10.2.18.66/ACE20090909090659371.lic disk0:
    Enter the destination filename[]? [ACE20090909090659371.lic]
    Trying to connect to tftp server......
    TFTP get operation was successful
    685 bytes copied
    CBJ6-LBDMZ2/Admin# license install disk0:ACE20090909090659371.lic
    Installing license... failed: Can't install this license with the current count

    CBJ6-LBDMZ2/Admin# show licen
    ACE20090727112500202.lic:
    SERVER this_host ANY
    VENDOR cisco
    INCREMENT ACE-AP-01-LIC cisco 1.0 permanent 1 \
            VENDOR_STRING=1 HOSTID=ANY \
            NOTICE="200907271125002021 \
            1211J5CB363" SIGN=F2E3AFA69526
    I think you have an HW appliance (code: ACE-4710-K9) with one a la carte license ( ACE-AP-01-LIC).
    You bought a Bundle upgrade license, and  this is not compatibly with you current license ( a la carte license).
    To use the  ACE-4710-BUN-UP2= ( 1G Bundle to 2G Bundle Upgrade License) you need to have a bundle product like the
    ACE-4710-1F-K9.
    Check this:
    Table 1     ACE Licensing Bundles
    License Model Description Upgrade Path
    ACE-4710-0.5F-K9
    This license bundle includes the following items:
    •ACE 4710 appliance
    •0.5-Gbps throughput license (ACE-AP-500M-LIC)
    •100-Mbps compression license (ACE-AP-C-100-LIC)
    •100 SSL transactions per second (TPS) license (ACE-AP-SSL-100-K9)
    •5 virtual contexts license (ACE-AP-VIRT-5)
    •Application acceleration license (50 connections) (ACE-AP-OPT-50-K9)
    You have the option to upgrade to the 1-Gbps, 2-Gbps, or 4-Gbps bundle.
    Start the upgrade with ACE-4710-BUN-UP1=.
    ACE-4710-1F-K9
    This license bundle includes the following items:
    •ACE 4710 appliance
    •1-Gbps throughput license (ACE-AP-01-LIC)
    •500-Mbps compression license (ACE-AP-C-500-LIC)
    •5000 SSL TPS license (ACE-AP-SSL-05K-K9)
    •5 virtual contexts license (ACE-AP-VIRT-5)
    •Application acceleration license (50 connections) (ACE-AP-OPT-50-K9)
    You have the option to upgrade to the 2-Gbps or 4-Gbps bundle.
    Start the upgrade with ACE-4710-BUN-UP2=.
    ACE-4710-BAS-2PAK
    This license bundle includes the following items:
    •Two ACE 4710 appliances
    •1-Gbps throughput license (ACE-AP-01-LIC)
    ACE-4710-BAS-2PAK also includes the following default options:
    •1000 SSL TPS
    •100-Mbps compression
    •5 virtual contexts
    •Application acceleration (50 connections)
    You have the option to upgrade to the 2-Gbps or 4-Gbps bundle.
    Start the upgrade with ACE-4710-BUN-UP2=. Two upgrade licenses are  required for upgrading two units of the ACE-4710-BAS-2PAK bundle.
    ACE-4710-2F-K9
    This license bundle includes the following items:
    •ACE 4710 appliance
    •2-Gbps throughput license (ACE-AP-02-LIC)
    •1-Gbps compression license (ACE-AP-C-1000-LIC)
    •7500 SSL TPS license (ACE-AP-SSL-07K-K9)
    •5 virtual contexts license (ACE-AP-VIRT-5)
    •Application acceleration license (50 connections) (ACE-AP-OPT-50-K9)
    You have the option to upgrade to the 4-Gbps bundle.
    Start the upgrade with ACE-4710-BUN-UP3=.
    ACE-4710-4F-K9
    This license bundle includes the following items:
    •ACE 4710 appliance
    •4-Gbps throughput license (ACE-AP-04-LIC)
    •2-Gbps compression license (ACE-AP-C-2000-LIC)
    •7500 SSL TPS license (ACE-AP-SSL-07K-K9)
    •5 virtual contexts license (ACE-AP-VIRT-5)
    •Application acceleration license (50 connections) (ACE-AP-OPT-50-K9)
    This is the highest value bundle.
    ACE-4710-BUN-UP1
    0.5 to 1-Gbps throughput bundle upgrade license
    See the Upgrade Path outlined above.
    ACE-4710-BUN-UP2
    1 to 2-Gbps throughput bundle upgrade license
    See the Upgrade Path outlined above.
    ACE-4710-BUN-UP3
    2 to 4-Gbps throughput bundle upgrade license
    See the Upgrade Path outlined above.
    Table 2     ACE Licensing Options
    Feature License Model Description
    Performance Throughput
    Default
    1-Gbps throughput.
    ACE-AP-500M-LIC
    0.5-Gbps throughput.
    ACE-AP-01-LIC
    1-Gbps throughput.
    ACE-AP-02-LIC
    2-Gbps throughput.
    ACE-AP-04-LIC
    4-Gbps throughput.
    ACE-AP-02-UP1
    Upgrade from 1-Gbps to 2-Gbps throughput.
    ACE-AP-04-UP1
    Upgrade from 1-Gbps to 4-Gbps throughput.
    ACE-AP-04-UP2
    Upgrade from 2-Gbps to 4-Gbps throughput.
    Virtualization
    Default
    1 admin/5 user contexts.
    ACE-AP-VIRT-020
    1 admin/20 user contexts.
    SSL
    Default
    100 TPS.
    ACE-AP-SSL-05K-K9
    5000 TPS.
    ACE-AP-SSL-07K-K9
    7500 TPS.
    ACE-AP-SSL-UP1-K9
    Upgrade from 5000 TPS to 7500 TPS.
    HTTP Compression
    Default
    100-Mbps.
    ACE-AP-C-500-LIC
    500-Mbps.
    ACE-AP-C-1000-LIC
    1-Gbps.
    ACE-AP-C-2000-LIC
    2-Gbps.
    ACE-AP-C-UP1
    Upgrade from 500-Mbps to 1 Gbps.
    ACE-AP-C-UP2
    Upgrade from 500-Mbps to 2 Gbps.
    ACE-AP-C-UP3
    Upgrade from 1 Gbps to 2 Gbps.
    Application Acceleration Feature Pack License
    ACE-AP-OPT-LIC-K9
    Application acceleration and optimization. By default, the ACE performs  up to 50 concurrent connections. With the application acceleration and  optimization software feature pack installed, the ACE can provide  greater than 50 concurrent connections.
    This license increases the operating capabilities of the following features:
    •Delta optimization
    •Adaptive dynamic caching
    •FlashForward
    •Dynamic Etag
    ACE-AP-02-LIC=
    Upgrade Performance License 2   Gbps Spare

  • CSM-S, move to one-arm configuration.

    Hello.
    We  are using a couple of CSM-S with a single subnet bridge and fault  tolerance configuration. Now we are evaluating to move to an one-arm  configuration, so I’m reading some design guides.
    We want to move to this topology because there are some advantages like efficient utilization of resources.
    Because we are serving different areas with different security level I’m looking for best practices also.
    The main question is about security because CSM does not support virtual contexts like ACE.
    Any suggestions?
    Thanks.
    Andrea

    Hello Andrea,
    As you noted, the capability for ACE to be able to keep traffic segregated is much easier to work with than the CSM's.  Basically, you have to utilize both client groups and the VLAN statement under Vservers to be able to keep traffic segregated.  Here is an example:
    module ContentSwitchingModule 4
    vlan 100 client
      ip address 192.168.100.1 255.255.255.0
    vlan 150 client
       ip address 192.168.150.1 255.255.255.0
    vlan 200 client
       ip address 192.168.200.1 255.255.255.0
    vlan 250 client
       ip address 192.168.250.1 255.255.255.0
    natpool POOL-1 192.168.100.2 192.168.250.2 netmask 255.255.255.0
    natpool POOL-2 192.168.150.2 192.168.250.2 netmask 255.255.255.0
    natpool POOL-3 192.168.200.2 192.168.250.2 netmask 255.255.255.0
    natpool POOL-4 192.168.250.2 192.168.250.2 netmask 255.255.255.0
    serverfarm DMZ1
    nat server
    nat client POOL-1
    real 192.168.100.50
      no inservice
    real 192.168.100.51
      inservice
    real 192.168.100.52
      inservice
    serverfarm DMZ2
    nat server
    nat client POOL-2
    real 192.168.150.82
       no inservice
      real 192.168.150.83
       inservice
      real 192.168.150.84
       inservice
    serverfarm DMZ3
    nat server
    nat client POOL-3
    real 192.168.200.75
       no inservice
      real 192.168.200.78
       inservice
      real 192.168.200.90
       inservice
    serverfarm DMZ4
    nat server
    nat client POOL-1
    real 192.168.250.82
       no inservice
      real 192.168.250.83
       inservice
      real 192.168.250.84
       inservice
    vserver DMZ1
      virtual 192.168.100.10 tcp www
      vlan 100
      serverfarm DMZ1
      persistent rebalance
      inservice
    vserver DMZ2
      virtual 192.168.150.10 tcp www
      vlan 150
      serverfarm DMZ2
      persistent rebalance
      inservice
    vserver DMZ3
      virtual 192.168.200.10 tcp www
      vlan 200
      serverfarm DMZ3
      persistent rebalance
      inservice
    vserver DMZ4
      virtual 192.168.250.10 tcp www
      vlan 250
      serverfarm DMZ4
      persistent rebalance
      inservice
    In the above configuration, if any packet comes into vlan 100 destine to 192.168.100.10 on port 80, it can hit the vip.  If the same packet comes into any other vlan, it will not be able to hit the vip.  The "vlan 100" statement under DMZ1 vserver filters the traffic so that only traffic that came into that vlan can hit that specific vserver.
    If you need to do additional filtering, say by source subnet range, you can use client groups to furthur permit/deny traffic at a more granular level.  Here is an example:
    (The access-list is created globally on the 6500 - the access list is then referenced by number in the CSM configuration. ONLY standard access lists can be used!!)
    access-list 2 permit 192.168.0.0 0.0.255.255
    access-list 2 deny   any
    access-list 3 permit 10.10.0.0 0.0.255.255
    access-list 3 deny   any
    policy 192_subnet_filter
      client-group 2
      serverfarm DMZ4
    vserver DMZ4
       virtual 192.168.250.10 tcp www
       vlan 250
      slb-policy 250_subnet_filter
       persistent rebalance
       inservice
    With this configuration, only traffic with a source IP of 192.168.0.0/16 or 10.10.0.0/16 that arrive on vlan 250 will be allowed to hit the vserver. "Client-Group 2" refers to the "Access-list 2" in the global config.
    Note that the serverfarm that used to be under the vserver was removed.  If you leave the serverfarm DMZ4 statement under the vserver along with the slb-policy applied, and traffic that does not match your client group is sent to that serverfarm.  It is another way of filtering traffic out.  If you do not include a fallback serverfarm (like the example above), any traffic that doesn't match the client group is reset.
    Let me know if you have any furthur questions!
    Regards,
    Chris Higgins

  • ACE with multiple context

    hi,
    i've 4 virtual context in my ACE configuration.it's possible to use the same real server in multiple context?2 context are configurated in one-arm mode
    and 2 in bridge mode.
    tks all
    Aghibear

    you could use one context as the default path - selecting this contect as the default gateway.
    Then the other context uses client nat to guarantee that the response comes back.
    I don't know if there is a specific example for what you want to do.
    You can check sample configs from :
    http://docwiki.cisco.com/wiki/Main_Page
    G.

  • Schedule reload on ACE 4710 appliance?

    Is it possible to schedule a reload of an ACE appliance? Can yuo advise cmd's if so. Regards William

    Finally found it in the command reference guide too.
    reload
    To reload the configuration on the ACE, use the reload command.
    reload
    Syntax Description
    This command has no keywords or arguments.
    Command Modes
    Exec
    Admin context only
    http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA3_1_0/command/reference/execmds.html#wp1361286

  • ACE: Virtual Server (VMWARE) running on ACE

    Hello,
    I have 2 servers to do loadbalance. they are running VMWARE, they have 4 servers inside of real server. each vmware server only has 1 port connected to Switch, if I want to balance one of them? how do I do?
    Best Regards

    It shouldn't make any difference whether the servers are real or virtual. The ACE works on IP addresses and VLANs. How you configure the context will depend on your network. You may need to use source NAT or you might be able to just use the network as is. It all depends on how you have configured your network.
    You'll need to balance across real physical servers to maximise resilience though.
    HTH
    Cathy

  • ANM 2.0: one of three ACE contexts couldn't "sync to CLI"

    Hello,
    We are using ANM 2.0 Update A to manage an ACE module running A2(1.2). About a week ago, one of our 3 contexts started showing "Out of sync" in the "CLI sync status" column. I tried to sync the context numerous times; no errors were reported but this particular context was always "out of sync".
    Then this morning I tried a "sync to CLI" operation once more and this time it finally worked! The status is now "in sync".
    I was wondering why this happened, and if anything can be done to prevent it in the future.
    Regards,
    Marc.

    Synchronizing configuration files for the standby ACE requires:
    1. Auditing the standby ACE to confirm that its configuration does not agree with the ANM-maintained configuration data for the ACE. See Synchronizing Virtual Context Configurations, page 3-64.
    2. Uploading the configuration from the standby ACE to the ANM server. See Synchronizing Virtual Context Configurations in the below URL:
    http://www.cisco.com/en/US/docs/net_mgmt/application_networking_manager/1.2/user/guide/UG_virtual_contexts.html#wpxref74705
    3. For an Admin context, uploading configurations on any newly imported user contexts. If new user contexts are not updated, they cannot be managed using ANM.

  • ACE multi context

    Can I have a context in ACE in transparent mode and another context in routed mode.

    you can, but you can't use any of the "bridged" vlans in the routed context.
    Gilles.

  • Disable automatic context reloading in tomcat  on web.xml chaning

    Hi all,
    is there a way to disable automatical reloading of webapp if web.xml is changed?

    It should be enabled in latest tomcat version as I cannot DISABLE it. Reloading on Servlet changing is enbaled by adding reloadable="true" to context-tag in server.xml

Maybe you are looking for