Cisco Explorer 4700 Guide d'installation Page 273

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 648
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 272
6-71
Device Manager Guide, Cisco ACE 4700 Series Application Control Engine Appliance
OL-26645-02
Chapter 6 Configuring Real Servers and Server Farms
Configuring Secure KAL-AP
The Secure KAL-AP table appears.
Step 2 Click Add to configure secure KAL-AP for MD5 encryption of data.
The Secure KAL-AP configuration screen appears.
Step 3 In the IP Address field, enable secure KAL-AP by configuring the IP address for the GSS.
Using dotted-decimal notation (for example, 192.168.11.1), enter the IP address of a specific GSS device
or enter the wildcard value (0.0.0.0) if all GSS devices in the cluster use the same MD5 encryption secret
(see the “Guidelines and Restrictions” section on page 6-70).
In the Hash Key field, enter the MD5 encryption method shared secret between the KAL-AP device and
the ACE. Enter the shared secret as a case-sensitive string with no spaces and a maximum of
31 alphanumeric characters. The ACE supports the following special characters in a shared secret:
, . / = + - ^ @ ! % ~ # $ * ( )
Step 4 Do one of the following:
Click Deploy Now to save your entries. The ACE appliance validates the secure KAL-AP
configuration and deploys it.
Click Cancel to exit this procedure without accepting your entries and to return to the Secure
KAL-AP table.
Click Next to accept your entries.
Related Topics
Creating Virtual Contexts, page 4-2
Setting Match Conditions for Layer 3/Layer 4 Management Traffic Class Maps, page 12-14
Vue de la page 272
1 2 ... 268 269 270 271 272 273 274 275 276 277 278 ... 647 648

Commentaires sur ces manuels

Pas de commentaire