12-High Availability Command Reference

HomeSupportResource CenterNFVH3C VSRH3C VSRTechnical DocumentsReference GuidesCommand ReferencesH3C VSR Series Virtual Services Routers Command References(V7)-R0633-6W50012-High Availability Command Reference
01-Load balancing commands
Title Size Download
01-Load balancing commands 1.44 MB

Contents

Load balancing commands· 1

activate (link group view) 1

activate (server farm view) 1

application-mode enable· 2

argument 3

arp-nd interface (SNAT address pool view) 3

arp-nd interface (virtual server view) 4

auto-alloc address· 5

auto-shutdown recovery-time· 5

bandwidth busy-protection enable (transparent DNS proxy view) 6

bandwidth busy-protection enable (virtual server view) 7

bandwidth busy-rate· 7

bandwidth interface statistics enable· 8

bandwidth weight 9

busy-action· 10

busy-action continue· 10

case-insensitive· 11

check all-packet 11

check-url 12

class· 13

compression level 14

connection-limit max (link group member view) 14

connection-limit max (link view) 15

connection-limit max (real server view) 15

connection-limit max (server farm member view) 16

connection-limit max (virtual server view) 16

connection-sync enable (transparent DNS proxy view) 17

connection-sync enable (virtual server view) 18

content (HTTP content sticky group view) 18

content (HTTP passive sticky group view) 19

content length-threshold· 21

content maxparse-length· 21

content rewrite· 22

cookie (protection rule view) 23

cookie (sticky group view) 24

cookie secondary name· 26

cost 26

cost weight 27

customlog content 27

default dns-server-pool 29

default link-group· 30

default server-farm·· 31

default-class action· 32

description· 32

destination-ip object-group· 33

display loadbalance action· 34

display loadbalance alg· 39

display loadbalance class· 40

display loadbalance connections· 42

display loadbalance dns-cache· 45

display loadbalance dns-proxy· 46

display loadbalance dns-proxy statistics· 47

display loadbalance dns-server 48

display loadbalance dns-server statistics· 51

display loadbalance dns-server-pool 52

display loadbalance external-monitor log· 55

display loadbalance hot-backup statistics· 55

display loadbalance isp· 56

display loadbalance limit-policy· 58

display loadbalance link· 59

display loadbalance link out-interface statistics· 63

display loadbalance link statistics· 64

display loadbalance link-group· 67

display loadbalance policy· 70

display loadbalance probe-template· 71

display loadbalance process-limit 74

display loadbalance protection-policy· 74

display loadbalance proximity· 75

display loadbalance snat-global-policy· 77

display loadbalance snat-pool 78

display loadbalance virtual-server total-statistics· 79

display parameter-profile· 80

display real-server 84

display real-server statistics· 88

display server-farm·· 92

display sticky· 96

display sticky-group· 101

display virtual-server 106

display virtual-server statistics· 112

dns-server (DNS server pool view) 114

dns-server-pool (LB action view) 115

dns-server-pool (DNS server view) 116

encrypt-cookie· 116

env-variables· 117

exceed-mss· 118

external-script 118

fail-action (link group view) 119

fail-action (server farm view) 120

fallback-action close· 120

fallback-action continue· 121

fallback-action response raw-file· 122

fin-wait1 timeout 122

fin-wait2 timeout 123

forward all 123

frequency· 124

header (HTTP header sticky group view) 125

header (HTTP passive sticky group view) 126

header call-id· 127

header delete· 128

header delete request accept-encoding· 129

header exceed-length· 129

header insert 130

header insert response vary· 132

header maxparse-length· 132

header modify per-request 133

header rewrite· 133

header rewrite request url 135

idle-time· 137

inherit vpn-instance disable (link view) 137

inherit vpn-instance disable (real server view) 138

ip· 139

ip address (DNS server view) 140

ip address (ISP view) 140

ip address (real server view) 141

ip address (transparent DNS proxy view) 141

ip mask· 142

ip range· 143

ip source mask· 143

ipv6· 144

ipv6 address (DNS server view) 145

ipv6 address (ISP view) 145

ipv6 address (real server view) 146

ipv6 address (transparent DNS proxy view) 147

ipv6 prefix· 147

ipv6 range· 148

ipv6 source prefix· 148

isp· 149

keepalive idle-timeout 150

keepalive retransmission interval 150

lb-cache-policy· 151

lb-limit-policy· 152

lb-policy (transparent DNS proxy view) 152

lb-policy (virtual server view) 153

limit 154

link (DNS server view) 155

link (link group view) 155

link-group (LB action view) 156

link-group (link view) 157

loadbalance action· 158

loadbalance alg· 158

loadbalance alg all-enable· 159

loadbalance class· 160

loadbalance dns-cache aging-time· 161

loadbalance dns-proxy· 161

loadbalance dns-server 162

loadbalance dns-server-pool 162

loadbalance flow-redirect blade-aggregation· 163

loadbalance isp auto-update enable· 164

loadbalance isp auto-update frequency· 164

loadbalance isp auto-update whois-server 165

loadbalance isp file· 166

loadbalance isp name· 166

loadbalance limit-policy· 167

loadbalance link· 168

loadbalance link-group· 168

loadbalance log enable bandwidth-busy· 169

loadbalance log enable base· 169

loadbalance log enable nat 170

loadbalance policy· 171

loadbalance probe-template· 171

loadbalance process-limit 172

loadbalance protection-policy· 173

loadbalance proximity· 173

loadbalance region· 174

loadbalance schedule-test ip· 175

loadbalance schedule-test ipv6· 177

loadbalance snat-global-policy· 179

loadbalance snat-pool 180

loadbalance test pcre· 180

loadbalance test rewrite· 181

match· 182

match acl 183

match app-group· 184

match class· 185

match content 185

match cookie· 186

match default 187

match destination· 188

match destination domain-name· 189

match domain-name· 190

match header 190

match interface· 191

match isp· 192

match method· 193

match payload· 194

match radius-attribute· 194

match source· 195

match sql 196

match url 197

match user 197

match user-group· 198

match version· 199

match-buffer-end· 200

match-buffer-size· 201

match-buffer-time· 201

max-bandwidth· 202

max-number 203

max-reuse· 204

memory-size· 204

monitor-interval 205

node· 206

override-limit enable· 206

parameter 207

parameter-profile· 208

payload (HTTP/UDP payload sticky group view) 209

payload (UDP passive sticky group view) 210

payload rewrite· 211

pool-size· 212

port (DNS server view) 212

port (real server view) 213

port (transparent DNS proxy view) 214

port (virtual server view) 214

predictor (DNS server pool view) 215

predictor (link group view) 216

predictor (server farm view) 218

prefer-method· 220

priority (DNS server pool member view) 221

priority (DNS server view) 222

priority (link group member view) 222

priority (link view) 223

priority (real server view) 224

priority (server farm member view) 224

priority (SNAT global policy view) 225

probe (DNS server pool member view) 226

probe (DNS server pool view) 227

probe (DNS server view) 227

probe (link group member view) 228

probe (link group view) 229

probe (link view) 230

probe (real server view) 231

probe (server farm member view) 232

probe (server farm view) 232

probe-template (real server view) 233

probe-template (server farm member view) 234

probe-template (server farm view) 235

probe log enable (real server view) 236

probe log enable (server farm member view) 236

protect-action· 237

protected-url 238

protection-action· 238

protection-period· 239

protection-policy· 240

proximity enable (link group view) 241

proximity enable (server farm view) 241

radius-attribute· 242

rate-limit bandwidth (link view) 242

rate-limit bandwidth (real server view) 243

rate-limit bandwidth (virtual server view) 244

rate-limit connection (link group member view) 245

rate-limit connection (link view) 246

rate-limit connection (real server view) 246

rate-limit connection (server farm member view) 247

rate-limit connection (virtual server view) 247

rate-limit http-request 248

readwrite-separation· 248

real-server (server farm view) 249

real-server (system view) 250

rebalance per-request 251

recover-from-auto-shutdown (real server view) 251

recover-from-auto-shutdown (server farm member view) 252

redirect relocation (LB action view) 252

redirect relocation (virtual server view) 253

redirect return-code (LB action view) 253

redirect return-code (virtual server view) 254

reload http-response· 255

request-version all 255

reset loadbalance connections· 256

reset loadbalance dns-cache· 256

reset loadbalance dns-proxy statistics· 257

reset loadbalance dns-server statistics· 257

reset loadbalance hot-backup statistics· 258

reset loadbalance link statistics· 258

reset loadbalance local-dns-server parse-fail-record· 259

reset loadbalance proximity· 259

reset real-server statistics· 260

reset virtual-server statistics· 260

response· 261

route-advertisement enable· 262

router interface· 263

router ip· 264

router ipv6· 264

rst threshold· 265

rtt weight 265

rule (parameter profile view) 266

rule (protection policy view) 267

secondary-cookie delimiters· 267

secondary-cookie start 268

selected-link· 269

selected-server (DNS server pool view) 269

selected-server (server farm view) 270

server-connection reuse· 271

server-farm (LB action view) 272

server-farm (real server view) 273

server-farm (system view) 273

service enable (transparent DNS proxy view) 274

service enable (virtual server view) 274

service object-group· 275

set ip tos (LB action view) 275

set ip tos (parameter profile view) 276

shutdown (link group member view) 277

shutdown (link view) 277

shutdown (real server view) 278

shutdown (server farm member view) 278

skip current-dns-proxy· 279

slow-online (link group view) 279

slow-online (server farm view) 280

slow-shutdown enable (link group member view) 281

slow-shutdown enable (link view) 281

slow-shutdown enable (real server view) 282

slow-shutdown enable (server farm member view) 283

snat enable· 283

snat-mode· 284

snat-pool (link group view) 285

snat-pool (server farm view) 285

snmp-agent trap enable loadbalance· 286

source-ip· 287

source-ip object-group (parameter profile view) 287

source-ip object-group (SNAT global policy view) 288

src-addr-option· 289

ssl session-id· 290

ssl url rewrite· 290

ssl-client-policy (LB action view) 291

ssl-client-policy (virtual server view) 292

ssl-server-policy· 293

statistics-match url 293

status-code· 294

sticky· 295

sticky-group· 295

sticky-over-busy enable· 296

sticky-sync enable (transparent DNS proxy view) 297

sticky-sync enable (virtual server view) 297

success-criteria (DNS server pool member view) 298

success-criteria (DNS server pool view) 299

success-criteria (DNS server view) 300

success-criteria (link group member view) 300

success-criteria (link group view) 301

success-criteria (link view) 302

success-criteria (real server view) 303

success-criteria (server farm member view) 303

success-criteria (server farm view) 304

syn retransmission-timeout 305

tcp connection idle-timeout 305

tcp mss· 306

tcp option insert 307

tcp option remove· 308

tcp window-size· 308

tcp-close· 309

timeout (LB probe template view) 309

timeout (proximity view) 310

timeout (sticky group view) 311

time-wait timeout 312

topology region· 312

translation-mode· 313

transparent enable (link group view) 314

transparent enable (server farm view) 314

ttl weight 315

udp per-packet 315

username· 316

variable· 317

version· 318

virtual ip address· 318

virtual ipv6 address· 319

virtual-server (system view) 320

virtual-server (virtual server pool view) 320

vpn-instance (link view) 321

vpn-instance (real server view) 322

vpn-instance (SNAT global policy view) 322

vpn-instance (transparent DNS proxy view) 323

vpn-instance (virtual server view) 323

vrrp vrid· 324

weight (DNS server pool member view) 325

weight (DNS server view) 325

weight (link group member view) 326

weight (link view) 327

weight (real server view) 327

weight (server farm member view) 328

whois-mntner 328

window-size· 329

zero-window threshold· 330


Load balancing commands

activate (link group view)

Use activate to set the criteria to determine whether a link group is available.

Use undo activate to restore the default.

Syntax

activate lower lower-percentage upper upper-percentage

undo activate

Default

A link group is available when a minimum of one link is available.

Views

Link group view

Predefined user roles

network-admin

Parameters

lower lower-percentage: Specifies the lower percentage value in the range of 1 to 99.

upper upper-percentage: Specifies the upper percentage value in the range of 1 to 99. The upper percentage value must be greater than or equal to the lower percentage value.

Usage guidelines

When the percentage of available links in a primary link group is smaller than the lower percentage value, the primary link group becomes unavailable. Then the backup link group takes over. When the percentage of available links in a primary link group is greater than the upper percentage value, the primary link group becomes available again to process services.

If no backup link group is configured on the virtual server, this configuration does not take effect.

Examples

# Set the lower percentage value to 20 and upper percentage value to 80 for the link group lg.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] activate lower 20 upper 80

activate (server farm view)

Use activate to set the criteria to determine whether a server farm is available.

Use undo activate to restore the default.

Syntax

activate lower lower-percentage upper upper-percentage

undo activate

Default

A server farm is available when a minimum of one real server is available.

Views

Server farm view

Predefined user roles

network-admin

Parameters

lower lower-percentage: Specifies the lower percentage value in the range of 1 to 99. When the percentage of available real servers in the primary server farm is lower than the lower percentage value, the primary server farm becomes unavailable. Then the backup server farm takes over.

upper upper-percentage: Specifies the upper percentage value in the range of 1 to 99. The upper percentage value must be higher than or equal to the lower percentage value. When the percentage of available real servers in the primary server farm is higher than the upper percentage value, the primary server farm becomes available again to process services.

Usage guidelines

If no backup server farm is configured on the virtual server, this configuration does not take effect.

Examples

# Set the lower percentage value to 20 and upper percentage value to 80 for the server farm sf.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] activate lower 20 upper 80

Related commands

default server-farm

application-mode enable

Use application-mode enable to configure a TCP virtual server to operate at Layer 7.

Use undo application-mode enable to restore the default.

Syntax

application-mode enable

undo application-mode enable

Default

A TCP virtual server operates at Layer 4.

Views

TCP virtual server view

Predefined user roles

network-admin

Examples

# Configure TCP virtual server vs to operate at Layer 7.

<Sysname> system-view

[Sysname] virtual-server vs type tcp

[Sysname-vs-tcp-vs] application-mode enable

argument

Use argument to configure user-defined information for a custom-monitoring LB probe template.

Use undo argument to restore the default.

Syntax

argument text

undo argument

Default

No user-defined information is configured for a custom-monitoring LB probe template.

Views

Custom-monitoring LB probe template view

Predefined user roles

network-admin

Parameters

text: Specifies an information text, a case-sensitive string of 1 to 255 characters. The string can contain spaces and cannot contain quotation marks (").

Usage guidelines

When executing the script file used for custom monitoring, the device transfers the information text to the script file as a parameter.

You can configure multiple arguments separated by spaces as the user-defined information.

Examples

# In custom-monitoring LB probe template test_external, configure user-defined information as abc 123 456.

<Sysname> system-view

[Sysname] loadbalance probe-template external-monitor test_external

[Sysname-lbpt-external-monitor-test_external] argument abc 123 456

arp-nd interface (SNAT address pool view)

Use arp-nd interface to specify an interface for sending gratuitous ARP packets and ND packets.

Use undo arp-nd interface to disable an interface from sending gratuitous ARP packets and ND packets.

Syntax

arp-nd interface interface-type interface-number

undo arp-nd interface interface-type interface-number

Default

No interface is specified for sending gratuitous ARP packets and ND packets. No interface can send gratuitous ARP packets or ND packets.

Views

SNAT address pool view

Predefined user roles

network-admin

Parameters

interface-type interface-number: Specifies an interface by its type and number.

Usage guidelines

You can execute this command multiple times to specify multiple interfaces for one SNAT address pool.

Examples

# For SNAT address pool lbsp, specify GigabitEthernet 1/0 as the interface for sending gratuitous ARP packets and ND packets.

<Sysname> system-view

[Sysname] loadbalance snat-pool lbsp

[Sysname-lbsnat-pool-lbsp] arp-nd interface gigabitethernet 1/0

arp-nd interface (virtual server view)

Use arp-nd interface to specify an interface for sending gratuitous ARP packets and ND packets.

Use undo arp-nd interface to disable an interface from sending gratuitous ARP packets and ND packets.

Syntax

arp-nd interface interface-type interface-number

undo arp-nd interface interface-type interface-number

Default

No interface is specified for sending gratuitous ARP packets and ND packets. No interface can send gratuitous ARP packets or ND packets.

Views

Virtual server view

Predefined user roles

network-admin

Parameters

interface-type interface-number: Specifies an interface by its type and number.

Usage guidelines

You can execute this command multiple times to specify multiple interfaces for one virtual server.

Examples

# For virtual server vs3, specify GigabitEthernet 1/0 as the interface for sending gratuitous ARP packets and ND packets.

<Sysname> system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] arp-nd interface gigabitethernet 1/0

auto-alloc address

Use auto-alloc address to enable the device to automatically obtain the IP address of a DNS server.

Use undo auto-alloc address to disable the device from automatically obtaining the IP address of a DNS server.

Syntax

auto-alloc address

undo auto-alloc address

Default

The device is disabled from automatically obtaining the IP address of a DNS server.

Views

DNS server view

Predefined user roles

network-admin

Usage guidelines

This command is mutually exclusive with the ip address and ipv6 address commands.

Before configuring this command, you must configure the router interface command. Otherwise, the IP address of the DNS server cannot be obtained.

If the device obtains multiple DNS server IP addresses, it uses the smallest available IP address.

Examples

# Enable the device to automatically obtain the IP address of DNS server ds1.

<Sysname> system-view

[Sysname] loadbalance dns-server ds1

[Sysname-lb-ds-ds1] auto-alloc address

Related commands

display loadbalance dns-server

auto-shutdown recovery-time

Use auto-shutdown recovery-time to set the automatic recovery time for intelligent monitoring.

Use undo auto-shutdown recovery-time to restore the default.

Syntax

auto-shutdown recovery-time recovery-time

undo auto-shutdown recovery-time

Default

The automatic recovery time is 0 minutes.

Views

Server farm view

Predefined user roles

network-admin

Parameters

recovery-time: Specifies the automatic recovery time in the range of 0 to 15300 minutes. The value of 0 means that a server farm member placed in Auto shutdown state does not automatically recover.

Usage guidelines

Use this command to enable automatic recovery for a real server that is shut down by intelligent monitoring.

If health monitoring is not configured, a recovered real server is set to Unknown state.

If health monitoring is configured and succeeds, a recovered real server is set to Active state. If health monitoring fails, a recovered real server is set to Probe-failed state.

Examples

# Set the automatic recovery time to 5 minutes for server farm sf.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] auto-shutdown recovery-time 5

bandwidth busy-protection enable (transparent DNS proxy view)

Use bandwidth busy-protection enable to enable the link protection feature for a transparent DNS proxy.

Use undo bandwidth busy-protection enable to disable the link protection feature for a transparent DNS proxy.

Syntax

bandwidth busy-protection enable

undo bandwidth busy-protection enable

Default

The link protection feature is disabled for a transparent DNS proxy.

Views

Transparent DNS proxy view

Predefined user roles

network-admin

Usage guidelines

This feature enables a transparent DNS proxy to select a DNS server from the DNS server pool based on the link bandwidth ratio. If the bandwidth ratio of a link exceeds the specified value, the corresponding DNS server is not selected.

If the link bandwidth ratio of all DNS servers in the DNS server pool exceeds the specified value, the link protection feature is automatically disabled. If the link bandwidth ratio of any DNS server drops below the specified value, the link protection feature is automatically enabled, and the corresponding DNS server is selected.

Examples

# Enable the link protection feature for transparent DNS proxy dns-proxy1.

<Sysname> system-view

[Sysname] loadbalance dns-proxy dns-proxy1

[Sysname-lb-dp-udp-dns-proxy1] bandwidth busy-protection enable

Related commands

bandwidth busy-rate (link view)

bandwidth busy-protection enable (virtual server view)

Use bandwidth busy-protection enable to enable the link protection feature.

Use undo bandwidth busy-protection enable to disable the link protection feature.

Syntax

bandwidth busy-protection enable

undo bandwidth busy-protection enable

Default

The link protection feature is disabled.

Views

Virtual server view

Predefined user roles

network-admin

Usage guidelines

The link protection feature takes effect only when bandwidth statistics collection by interfaces is enabled.

Examples

# Enable the link protection feature for the IP-type virtual server vs3.

<Sysname>system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] bandwidth busy-protection enable

Related commands

bandwidth interface statistics enable

bandwidth busy-rate

Use bandwidth busy-rate to set the bandwidth ratio for an LB link.

Use undo bandwidth busy-rate to restore the default.

Syntax

bandwidth [ inbound | outbound ] busy-rate busy-rate-number [ recovery recovery-rate-number ]

undo bandwidth [ inbound | outbound ] busy-rate

Default

The bandwidth ratio is 70.

Views

LB link view

Predefined user roles

network-admin

Parameters

inbound: Specifies the inbound bandwidth ratio.

outbound: Specifies the outbound bandwidth ratio.

busy-rate-number: Specifies bandwidth ratio in the range of 1 to 100.

recovery recovery-rate-number: Specifies bandwidth recovery ratio in the range of 1 to 100. By default, if the bandwidth ratio is greater than 10, the bandwidth recovery ratio equals the bandwidth ratio minus 10; if the bandwidth ratio is smaller than or equal to 10, the bandwidth recovery ratio equals the bandwidth ratio.

Usage guidelines

If the bandwidth of an LB link exceeds the maximum expected bandwidth multiplied by the bandwidth ratio, the LB link is busy and will not be selected. If the bandwidth of the LB link drops below the maximum expected bandwidth multiplied by the bandwidth recovery ratio, the LB link participates in scheduling again.

If you do not specify the inbound or outbound keyword, this command sets the total bandwidth ratio.

The bandwidth ratio equals the current bandwidth divided by the maximum bandwidth of the LB link. If the maximum bandwidth is not limited, the supported maximum bandwidth is used for calculating the bandwidth ratio.

The bandwidth recovery ratio must be smaller than or equal to the bandwidth ratio of an LB link.

This command takes effect only on new sessions and does not take effect on existing sessions.

Examples

# Set the total bandwidth ratio and bandwidth recovery ratio for the LB link lk1 to 90 and 85.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-link1] bandwidth busy-rate 90 recovery 85

Related commands

display loadbalance link

max-bandwidth (link view)

bandwidth interface statistics enable

Use bandwidth interface statistics enable to enable bandwidth statistics collection by interfaces.

Use undo bandwidth interface statistics enable to disable bandwidth statistics collection by interfaces.

Syntax

bandwidth interface statistics enable

undo bandwidth interface statistics enable

Default

Bandwidth statistics collection by interfaces is disabled.

Views

Virtual server view

Predefined user roles

network-admin

Examples

# Enable bandwidth statistics collection by interfaces for the IP-type virtual server vs3.

<Sysname> system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] bandwidth interface statistics enable

bandwidth weight

Use bandwidth weight to set the bandwidth weight for proximity calculation.

Use undo bandwidth weight to restore the default.

Syntax

bandwidth { inbound | outbound } weight bandwidth-weight

undo bandwidth { inbound | outbound } weight

Default

The inbound or outbound bandwidth weight for proximity calculation is 100.

Views

Proximity view

Predefined user roles

network-admin

Parameters

inbound: Specifies the inbound bandwidth weight.

outbound: Specifies the outbound bandwidth weight.

bandwidth-weight: Specifies the bandwidth weight for proximity calculation, in the range of 0 to 255. A larger value indicates a higher bandwidth weight.

Examples

# Set the inbound bandwidth weight for proximity calculation to 200.

<Sysname> system-view

[Sysname] loadbalance proximity

[Sysname-lb-proximity] bandwidth inbound weight 200

# Set the outbound bandwidth weight for proximity calculation to 200.

<Sysname> system-view

[Sysname] loadbalance proximity

[Sysname-lb-proximity] bandwidth outbound weight 200

busy-action

Use busy-action to configure the action to take when a server farm is busy.

Use undo busy-action to restore the default.

Syntax

busy-action { drop | enqueue length length timeout timeout-value | force }

undo busy-action

Default

The default action is drop.

Views

Server farm view

Predefined user roles

network-admin

Parameters

drop: Stops assigning client requests to the server farm.

enqueue: Assigns new client requests to a wait queue.

length length: Specifies the maximum number of client requests allowed in the wait queue, in the range of 1 to 100000. When the queue is full, new client requests are dropped.

timeout timeout-value: Specifies the aging time for the wait queue, in the range of 1 to 60 seconds.

force: Forcibly assigns client requests to all real servers in the server farm.

Usage guidelines

For the drop action, if the LB policy for the server farm contains the action of matching the next rule, the device compares client requests with the next rule. Otherwise, the device drops the client requests.

Examples

# Configure the action to take when a server farm is busy as force.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] busy-action force

busy-action continue

Use busy-action continue to configure the action of matching the next rule when all links or DNS servers are busy.

Use undo busy-action to restore the default.

Syntax

busy-action continue

undo busy-action

Default

The device assigns packets to links or DNS servers regardless of whether they are busy.

Views

Link-generic LB action view

DNS server LB action view

Predefined user roles

network-admin

Examples

# Configure link-generic LB action a1 to match the next rule when all links or DNS servers are busy.

<Sysname> system-view

[Sysname] loadbalance action a1 type link-generic

[Sysname-lba-link-generic-a1] busy-action continue

case-insensitive

Use case-insensitive to disable case sensitivity for matching character strings.

Use undo case-insensitive to restore the default.

Syntax

case-insensitive

undo case-insensitive

Default

Case sensitivity is enabled for matching character strings.

Views

HTTP parameter profile view

Predefined user roles

network-admin

Usage guidelines

This command affects the following content:

·     HTTP header value, HTTP cookie name and value, and URL for matching classes.

·     Header value, URL, and key value used for generating sticky entries for the HTTP header sticky method.

·     Cookie name and value and key value used for generating sticky entries for the cookie get sticky method.

Examples

# Disable case sensitivity for the HTTP-type parameter profile pp1.

<Sysname> system-view

[Sysname] parameter-profile pp1 type http

[Sysname-para-http-pp1] case-insensitive

check all-packet

Use check all-packet to enable checking for all packets.

Use undo check all-packet to restore the default.

Syntax

check all-packet

undo check all-packet

Default

Checking for all packets is disabled.

Views

HTTP cookie sticky group view

HTTP passive sticky group view

Predefined user roles

network-admin

Usage guidelines

If the sticky method is cookie get, use this command to get cookies from all HTTP response packets. If this command is not executed, the device gets only the Set-Cookie from the first response packet of a connection.

If the sticky method is cookie rewrite, use this command to rewrite cookies in all HTTP response packets. If this command is not executed, the device rewrites only the Set-Cookie in the first response packet of a connection.

If the sticky method is cookie insert, use this command to insert cookies to all HTTP response packets. If this command is not executed, the device inserts only the Set-Cookie to the first response packet of a connection.

If the sticky method is HTTP passive, use this command to generate sticky entries from all HTTP response packets. If this command is not executed, the device generates sticky entries only from the first response packet of a connection.

Examples

# Enable checking for all packets in the HTTP cookie sticky group sg3.

<Sysname> system-view

[Sysname] sticky-group sg3 type http-cookie

[Sysname-sticky-http-cookie-sg3] check all-packet

check-url

Use check-url to configure a URL regular expression to match URLs for an HTTP passive LB probe template.

Use undo check-url to remove the URL regular expression configuration.

Syntax

check-url url

undo check-url url

Default

No URL regular expression is configured.

Views

HTTP passive LB probe template view

Predefined user roles

network-admin

Parameters

url: Specifies a URL regular expression, a case-insensitive string of 1 to 255 characters. The string cannot contain question marks (?).

Usage guidelines

If an HTTP request carries one of the specified URLs, the device examines whether a URL error occurs in the HTTP response.

You can configure a maximum of 10 URL regular expressions for one HTTP passive LB probe template.

Examples

# Configure www.abc.com as a matching URL for HTTP passive LB probe template tplt.

<Sysname> system-view

[Sysname] loadbalance probe-template http-passive tplt

[Sysname-lbpt-http-passive-tplt] check-url www.abc.com

class

Use class to specify an LB action for the specified LB class.

Use undo class to delete an LB class.

Syntax

class class-name [ insert-before before-class-name ] action action-name

undo class class-name

Default

No LB action is specified for the LB class.

Views

LB policy view

Predefined user roles

network-admin

Parameters

class-name: Specifies an LB class by its name, a case-insensitive string of 1 to 63 characters.

insert-before before-class-name: Inserts the target class before an LB class (which must already be referenced by the current LB policy), a case-insensitive string of 1 to 63 characters.

action-name: Specifies an LB action by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

This command sets an LB action for packets matching the specified LB class.

You can specify an LB action for different LB classes.

A DNS LB policy can reference DNS LB actions only; a generic LB policy can reference generic LB classes and generic LB actions only. This rule does not apply to HTTP LB policies.

Examples

# Specify the LB action lba1 for the LB class lbc1 in the generic LB policy lbp1, and insert lbc1 before the LB class lbc0.

<Sysname> system-view

[Sysname] loadbalance policy lbp1 type generic

[Sysname-lbp-generic-lbp1] class lbc1 insert-before lbc0 action lba1

compression level

Use compression level to set the compression level for response packets.

Use undo compression level to restore the default.

Syntax

compression level level

undo compression level

Default

The compression level for response packets is 1.

Views

HTTP-compression parameter profile view

Predefined user roles

network-admin

Parameters

level: Specifies the compression level in the range of 1 to 9. A larger value indicates a lower compression speed and a higher compression ratio.

Examples

# Create the HTTP-compression parameter profile pa1, and set the compression level to 6.

<Sysname> system-view

[Sysname] parameter-profile pa1 type http-compress

[Sysname-para-http-compress-pa1] compression level 6

connection-limit max (link group member view)

Use connection-limit max to set the maximum number of connections of a link group member.

Use undo connection-limit max to restore the default.

Syntax

connection-limit max max-number

undo connection-limit max

Default

The maximum number of connections of a link is 0, which means the number is not limited.

Views

Link group member view

Predefined user roles

network-admin

Parameters

max-number: Specifies the maximum number of connections, in the range of 0 to 4294967295. If the value of this argument takes 0, the number is not limited.

Examples

# Set the maximum number of connections of the link group member lk1 to 10000.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] link lk1

[Sysname-lb-lgroup-lg-#member#-lk1] connection-limit max 10000

connection-limit max (link view)

Use connection-limit max to set the maximum number of connections of a link.

Use undo connection-limit max to restore the default.

Syntax

connection-limit max max-number

undo connection-limit max

Default

The maximum number of connections of a link is 0, which means the number is not limited.

Views

Link view

Predefined user roles

network-admin

Parameters

max-number: Specifies the maximum number of connections, in the range of 0 to 4294967295. If the value of this argument takes 0, the number is not limited.

Usage guidelines

This command takes effect only on new sessions and does not take effect on existing sessions.

Examples

# Set the maximum number of connections of the link lk to 10000.

<Sysname> system-view

[Sysname] loadbalance link lk

[Sysname-lb-link-lk] connection-limit max 10000

connection-limit max (real server view)

Use connection-limit max to set the maximum number of connections of a real server.

Use undo connection-limit max to restore the default.

Syntax

connection-limit max max-number

undo connection-limit max

Default

The maximum number of connections of a real server is 0, which means the number is not limited.

Views

Real server view

Predefined user roles

network-admin

Parameters

max-number: Specifies the maximum number of connections, in the range of 0 to 4294967295. If the value of this argument takes 0, the number is not limited.

Usage guidelines

This command takes effect only on new sessions and does not take effect on existing sessions.

Examples

# Set the maximum number of connections of the real server rs to 10000.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] connection-limit max 10000

connection-limit max (server farm member view)

Use connection-limit max to set the maximum number of connections of a server farm member.

Use undo connection-limit max to restore the default.

Syntax

connection-limit max max-number

undo connection-limit max

Default

The maximum number of connections of a link is 0, which means the number is not limited.

Views

Server farm member view

Predefined user roles

network-admin

Parameters

max-number: Specifies the maximum number of connections, in the range of 0 to 4294967295. If the value of this argument takes 0, the number is not limited.

Examples

# Set the maximum number of connections of the server farm member rs1 to 10000.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] real-server rs1 port 80

[Sysname -sfarm-sf-#member#-rs1-port-80] connection-limit max 10000

connection-limit max (virtual server view)

Use connection-limit max to set the maximum number of connections of a virtual server.

Use undo connection-limit max to restore the default.

Syntax

connection-limit max max-number

undo connection-limit max

Default

The maximum number of connections of a virtual server is 0, which means the number is not limited.

Views

Virtual server view

Predefined user roles

network-admin

Parameters

max-number: Specifies the maximum number of connections, in the range of 0 to 4294967295. If the value of this argument takes 0, the number is not limited.

Usage guidelines

This command takes effect only on new sessions and does not take effect on existing sessions.

Examples

# Set the maximum number of connections for the IP-type virtual server vs3 to 10000.

<Sysname> system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] connection-limit max 10000

connection-sync enable (transparent DNS proxy view)

Use connection-sync enable to enable session extension information synchronization for a transparent DNS proxy.

Use undo connection-sync enable to disable session extension information synchronization for a transparent DNS proxy.

Syntax

connection-sync enable

undo connection-sync enable

Default

Session extension information synchronization is disabled for a transparent DNS proxy.

Views

Transparent DNS proxy view

Predefined user roles

network-admin

Usage guidelines

This command can back up session information to ensure service continuity during a master and backup switchover in hot backup mode.

Examples

# Enable session extension information synchronization for the transparent DNS proxy dns_proxy1.

<Sysname>system-view

[Sysname] loadbalance dns-proxy dns-proxy1

[Sysname-lb-dp-udp-dns-proxy1] connection-sync enable

connection-sync enable (virtual server view)

Use connection-sync enable to enable session extension information synchronization for a virtual server.

Use undo connection-sync enable to disable session extension information synchronization for a virtual server.

Syntax

connection-sync enable

undo connection-sync enable

Default

Session extension information synchronization is disabled for a virtual server.

Views

Virtual server view

Predefined user roles

network-admin

Usage guidelines

This command is not supported by the virtual servers of the HTTP type.

Examples

# Enable session extension information synchronization for the IP-type virtual server vs3.

<Sysname>system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] connection-sync enable

content (HTTP content sticky group view)

Use content to configure the HTTP entity sticky method.

Use undo content to delete the HTTP entity sticky method.

Syntax

content [ offset offset ] [ start start-string ] [ end end-string | length length ]

undo content

Default

No sticky methods exist.

Views

HTTP entity sticky group view

Predefined user roles

network-admin

Parameters

offset offset: Specifies the offset value of the entity based on the start of the HTTP packet, in the range of 0 to 1000 bytes. The default is 0.

start start-string: Specifies the regular expression that marks the start of the entity, a case-sensitive string of 1 to 127 characters starting from the offset value. The string cannot contain question marks (?).

end end-string: Specifies the regular expression that marks the end of the entity, a case-sensitive string of 1 to 127 characters starting from the start-string value. The string cannot contain question marks (?).

length length: Specifies the length of the entity, in the range of 0 to 1000 bytes. The default is 0, which indicates all lengths.

Usage guidelines

Use this command to obtain the HTTP entity information used to generate sticky entries based on the offset, start-string, end-string, and length values. The start-string and end-string values are not included in the sticky entry information.

The HTTP entity sticky method applies only to contents within the entity. The HTTP entity sticky method does not apply to chunk and multipart entity content.

The HTTP entity sticky method is not supported by the virtual servers of the fast HTTP type.

Examples

# Configure the HTTP entity sticky method for the HTTP entity sticky group sg2: Starting from the 30th byte of start of the HTTP packet, use the 20-byte HTTP entity with abc as the start string to generate sticky entries.

<Sysname> system-view

[Sysname] sticky-group sg2 type http-content

[Sysname-sticky-http-content-sg2] content offset 30 start abc length 20

content (HTTP passive sticky group view)

Use content to configure the HTTP passive entity sticky method.

Use undo content to delete the HTTP passive entity sticky method.

Syntax

content { get | match } id start start-string { end end-string | length length }

undo content { get | match } id

Default

No sticky methods exist.

Views

HTTP passive sticky group view

Predefined user roles

network-admin

Parameters

get: Obtains the specified string in the HTTP response entity, which is used to generate a sticky entry.

match: Obtains the specified string in the HTTP request entity, which is used to match a sticky entry.

id: Specifies the string ID in the range of 1 to 4.

start start-string: Specifies the regular expression that marks the start of the entity, a case-sensitive string of 1 to 127 characters. The string cannot contain question marks (?).

end end-string: Specifies the regular expression that marks the end of the entity, a case-sensitive string of 1 to 127 characters starting from the start-string value. The string cannot contain question marks (?).

length length: Specifies the length of the entity, in the range of 0 to 1000 bytes. The default is 0, which indicates all lengths.

Usage guidelines

The start-string and end-string values are not included in the sticky entry information.

Both the content get and content match commands are required for an HTTP passive sticky method.

The device obtains the content information of an incoming HTTP request based on the content match command and obtains the content information of an incoming HTTP response based on the content get command. If the content information of the HTTP request matches the content information of the HTTP response, the device generates a sticky entry based on the content information of the HTTP response. Subsequent HTTP requests that match the sticky entry are forwarded according to the sticky entry.

The following rules apply to use of the content match and content get commands:

·     You can execute a maximum of four content get commands and four content match commands for one HTTP passive sticky method.

·     A number of n strings that are obtained based on n content get commands generates 2n-1 strings in ascending order of string IDs. If the string obtained based on the content match command matches any one of these generated strings, the match is successful.

·     A number of n strings that are obtained based on n content match commands combine as one string in ascending order of string IDs.

For example, three content get commands are executed with string IDs 1, 2, and 3. The device obtains three strings a, b, and c in the HTTP response header, generates seven strings a, b, c, ab, ac, bc, and abc, and generates seven sticky entries. Then, three content match commands are executed with string IDs 2, 3, and 4. The device obtains three strings a, b, and c in the HTTP request header and generates one string abc. If the string matches one of the seven strings, the device generates a sticky entry based on the string abc. Subsequent HTTP requests that match the sticky entry are forwarded according to the sticky entry.

Examples

# Configure the HTTP passive sticky method for the HTTP passive sticky group sg2: Obtain the 20-byte HTTP entity string starting with abc in the HTTP response. If the string matches the 20-byte HTTP entity string starting with xxx in the HTTP request, the device generates a sticky entry based on the string obtained from the HTTP response.

<Sysname> system-view

[Sysname] sticky-group sg2 type http-passive

[Sysname-sticky-http-passive-sg2] content get 1 start abc length 20

[Sysname-sticky-http-passive-sg2] content match 1 start xxx length 20

Related commands

display sticky-group

header (HTTP passive sticky group view)

content length-threshold

Use content length-threshold to set the minimum length of HTTP response content for compression.

Use undo content length-threshold to restore the default.

Syntax

content length-threshold length

undo content length-threshold

Default

The minimum length of HTTP response content for compression is 1024 bytes.

Views

HTTP-compression parameter profile view

Predefined user roles

network-admin

Parameters

length: Specifies the minimum length of HTTP response content for compression, in the range of 0 to 4294967295 bytes.

Usage guidelines

If an HTTP response packet contains the Content-Length header, the packet content is compressed only when its length reaches the minimum length of HTTP response content for compression. If the HTTP response packet does not contain the Content-Length header, the configuration does not take effect. The packet content is compressed regardless of its length.

Examples

# Create the HTTP-compression parameter profile http1, and set the minimum length of HTTP response content for compression to 2000 bytes.

<Sysname> system-view

[Sysname] parameter-profile http1 type http-compression

[Sysname-para-http-compression-http1] content length-threshold 2000

content maxparse-length

Use content maxparse-length to set the maximum length of HTTP entities that can be parsed.

Use undo content maxparse-length to restore the default.

Syntax

content maxparse-length length

undo content maxparse-length

Default

The maximum length of HTTP entities that can be parsed is 4096.

Views

HTTP parameter profile view

Predefined user roles

network-admin

Parameters

length: Specifies the maximum length of HTTP entities that can be parsed, in the range of 1 to 65535 bytes.

Usage guidelines

This command is not supported by the virtual servers of the fast HTTP type.

Examples

# Set the maximum length of HTTP entities that can be parsed to 8192 for the HTTP parameter profile pp1.

<Sysname> system-view

[Sysname] parameter-profile pp1 type http

[Sysname-para-http-pp1] content maxparse-length 8192

content rewrite

Use content rewrite to rewrite the content of HTTP responses.

Use undo content rewrite to restore the default.

Syntax

content rewrite value value replace replace-string

undo content rewrite

Default

The content of HTTP responses is not rewritten.

Views

HTTP LB action view

Predefined user roles

network-admin

Parameters

value value: Specifies the HTTP packet content to be rewritten, a case-sensitive string of 1 to 127 characters. The string cannot contain question marks (?).

replace replace-string: Specifies the content after rewrite, a case-sensitive string of 1 to 127 characters.

Usage guidelines

This command applies only to the HTTP response packets in the format of text/*.

The rewrite operation is not performed in either of the following situations:

·     A regular expression is used to match the content before rewrite, and the content before rewrite exceeds 4096 bytes in size.

·     The content after rewrite exceeds 4096 bytes in size.

If you specify the replace-string argument as %[1-9], the matching packet content value will be replaced by the content in the corresponding pair of brackets. For example, if you execute the content rewrite value (Wel)(co)(me) replace %2 command, the content Welcome will be replaced by the content co in the second pair of brackets.

If you execute the content rewrite command multiple times, the most recent configuration takes effect.

Examples

# Create the HTTP LB action named replace, and replace the content 2000::1 in HTTP response packets with 2.3.4.5.

<Sysname> system-view

[Sysname] loadbalance action replace type http

[Sysname-lba-http-replace] content rewrite value 2000::1 replace 2.3.4.5

cookie (protection rule view)

Use cookie to configure a cookie-based protection threshold.

Use undo cookie to restore the default.

Syntax

cookie cookie-name request-threshold threshold

undo cookie

Default

No cookie-based protection threshold is configured.

Views

Protection rule view

Predefined user roles

network-admin

Parameters

cookie-name: Specifies an HTTP cookie by its name, a case-sensitive string of 1 to 63 characters. The cookie name cannot contain brackets ({ }, ( ),[ ], < >), at sign (@), comma (,), semicolon (;), colon (:), backslash (\), quotation mark ("), slash (/), question mark (?), equal sign (=), space character (SP), and horizontal tab (HT). Additionally, the cookie name cannot contain ASCII codes that are less than or equal to 31 and greater than or equal to 127.

request-threshold threshold: Specifies a request threshold in the range of 1 to 4294967295.

Usage guidelines

If the number of times that a user accesses a protected URL exceeds the request threshold during the protection period, the protection action is taken. The device determines whether requests belong to the same user based on the following elements:

·     Cookie—Requests with the same cookie value for the cookie specified in this command belong to the same user.

·     Source IP address—Requests with the same source IP address belong to the same user.

If you configure both a cookie-based request threshold and a source-IP-based request threshold, the protection action is taken when either threshold is exceeded.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# In protection rule 5, configure the cookie name as jsessionid and the request threshold as 2.

<Sysname> system-view

[Sysname] loadbalance protection-policy p1

[Sysname-lbpp-http-p1] rule 5

[Sysname-lbpp-http-p1-rule-5] cookie jsessionid request-threshold 2

Related commands

protected-url

protection-action

protection-period

source-ip

cookie (sticky group view)

Use cookie to configure the HTTP cookie sticky method.

Use undo cookie to restore the default.

Syntax

cookie { get name cookie-name [ offset offset ] [ start start-string] [ end end-string | length length ] | { insert [ domain domain-name ] [ path path ] [ httponly ] [ secure ] | rewrite } [ name cookie-name ] [ httponly ] [ secure ] }

undo cookie { get | insert | rewrite }

Default

No HTTP cookie sticky methods exist.

Views

HTTP cookie sticky group view

Predefined user roles

network-admin

Parameters

get: Specifies the cookie get sticky method that gets the Set-Cookie field in the HTTP response packets sent by the server.

cookie-name: Specifies an HTTP cookie by its name, a case-sensitive string of 1 to 63 characters.

offset offset: Specifies the offset value based on the start of the cookie value, in the range of 0 to 1000 bytes. The default is 0.

start start-string: Specifies the regular expression that marks the start of the cookie, a case-sensitive string of 1 to 127 characters starting from the offset value. The string cannot contain question marks (?).

end end-string: Specifies the regular expression that marks the end of the cookie, a case-sensitive string of 1 to 127 characters starting from the start-string value. The string cannot contain question marks (?).

length length: Specifies the length of the cookie, in the range of 0 to 1000 bytes. The default is 0, which indicates all lengths.

insert: Specifies the cookie insert sticky method that inserts the Set-Cookie field to the HTTP response packets sent by the server.

rewrite: Specifies the cookie rewrite sticky method that rewrites the Set-Cookie field in the HTTP response packets sent by the server.

name cookie-name: Specifies an HTTP cookie by its name, a case-sensitive string of 1 to 63 characters. The default name is X-LB.

domain domain-name: Specifies a domain name indicating the hosts to which the cookie will be sent, a case-sensitive string of 1 to 255 characters. If you do not specify this option, the cookie will be sent to only the host where it is created.

path path: Specifies a path indicating the paths to which the cookie will be sent, a case-sensitive string of 1 to 255 characters. If you do not specify this option, the cookie will be sent to every path (the root directory / applies).

httponly: Specifies that the cookie cannot be accessed by scripts. If you do not specify this keyword, the cookie can be accessed by scripts.

secure: Specifies that the cookie can be transmitted over only HTTPS connections. If you do not specify this keyword, the cookie can be transmitted over any connections.

Usage guidelines

Use the cookie get command to obtain the HTTP cookie information used to generate sticky entries based on the offset, start-string, end-string, and length values. The start-string and end-string values are not included in the sticky entry information.

If the sticky method is cookie rewrite, the Set-Cookie field of the specified cookie must be available in the HTTP response packets sent by the server. The system modifies only the cookie name and value in the Set-Cookie field without modifying other attributes such as Expires.

If the sticky method is cookie insert or cookie rewrite and the timeout timer for sticky entries is 0, the system adds the Expires field after the inserted or rewritten value. If the HTTP response packets sent by the server carry this attribute, the load balancing module does not modify the attribute. Instead, it adds the user-configured Expires information after the value. As a best practice, do not carry any timeout attribute in the Set-Cookie header on the server when you configure the cookie rewrite sticky method.

The domain domain-name option specifies the hosts to which the cookie will be sent. Suppose a client can visit hosts example.com, www.example.com, and www.corp.example.com. If you specify example.com for the domain domain-name option, the client includes the cookie when sending HTTP requests to any one of the three hosts. If you specify www.corp.example.com for the domain domain-name option, the client includes the cookie only when sending HTTP requests to www.corp.example.com.

The path path option limits the scope of the cookie to a set of paths. Suppose a client can visit folders www.example.com/a and www.example.com/b. If you specify www.example.com for the domain domain-name option and /a for the path path option, the client includes the cookie only when sending HTTP requests to www.example.com/a.

The httponly option prevents attackers from obtaining cookie information by using scripts.

The secure option makes sure the cookie is transmitted over an HTTPS connection. For an HTTP connection, the cookie is not transmitted.

Examples

# Configure the cookie get sticky method for the HTTP cookie sticky group sg3: Starting from the 10th byte of start of the HTTP packet, use the 32-byte HTTP cookie named user to generate sticky entries.

<Sysname> system-view

[Sysname] sticky-group sg3 type http-cookie

[Sysname-sticky-http-cookie-sg3] cookie get name user offset 10 length 32

# Configure the cookie insert sticky method for the HTTP cookie sticky group sg3.

<Sysname> system-view

[Sysname] sticky-group sg3 type http-cookie

[Sysname-sticky-http-cookie-sg3] cookie insert

cookie secondary name

Use cookie secondary name to specify the name of the secondary cookie to be searched in the URI.

Use undo cookie secondary name to restore the default.

Syntax

cookie secondary name value

undo cookie secondary name

Default

The name of the secondary cookie to be searched in the URI is not specified.

Views

HTTP cookie sticky group view

Predefined user roles

network-admin

Parameters

value: Specifies the name of the secondary cookie, a case-sensitive token string of 1 to 63 characters excluding brackets ({ }, ( ),[ ], < >), at sign (@), comma (,), semicolon (;), colon (:), backslash (\), quotation mark ("), slash (/), question mark (?), equal sign (=), space character (SP), and horizontal tab (HT). The character string also excludes ASCII codes that are less than or equal to 31 and greater than or equal to 127.

Usage guidelines

This command applies only to the cookie get sticky method. Executing this command enables the system to locate the secondary cookie in the URI when it fails to locate the specified cookie in the HTTP request packet header.

Examples

# Specify the name of the secondary cookie to be searched in the URI as sid for the HTTP cookie sticky group sg3.

<Sysname> system-view

[Sysname] sticky-group sg3 type http-cookie

[Sysname-sticky-http-cookie-sg3] cookie secondary name sid

cost

Use cost to set the link cost for proximity calculation.

Use undo cost to restore the default.

Syntax

cost cost-value

undo cost

Default

The link cost for proximity calculation is 0.

Views

Link view

Predefined user roles

network-admin

Parameters

cost-value: Specifies the link cost for proximity calculation, in the range of 0 to 10240.

Examples

# Set the link cost for proximity calculation to 200 for the link lk1.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] cost 200

cost weight

Use cost weight to set the cost weight for proximity calculation.

Use undo cost weight to restore the default.

Syntax

cost weight cost-weight

undo cost weight

Default

The cost weight for proximity calculation is 100.

Views

Proximity view

Predefined user roles

network-admin

Parameters

cost-weight: Specifies the cost weight for proximity calculation, in the range of 0 to 255. A larger value indicates a higher cost weight.

Examples

# Set the cost weight for proximity calculation to 200.

<Sysname> system-view

[Sysname] loadbalance proximity

[Sysname-lb-proximity] cost weight 200

customlog content

Use customlog content to configure the content to be output by using the fast log output feature.

Use undo customlog content to restore the default.

Syntax

customlog content content-value

undo customlog content

Default

No content is output by using the fast log output feature.

Views

HTTP virtual server view

Predefined user roles

network-admin

Parameters

content-value: Specifies the log content to be output, a case-sensitive string of 1 to 255 characters. To enter multiple variables, separate them by semicolons. The device supports the following variables:

·     %{is}—Source IP address in HTTP requests.

·     %{ps}—Source port number in HTTP requests.

·     %{id}—Destination IP address in HTTP requests.

·     %{pd}—Destination port number in HTTP requests.

·     %{sis}—Source IP address in HTTP responses.

·     %{sps}—Source port number in HTTP responses.

·     %{sid}—Destination IP address in HTTP responses.

·     %{spd}—Destination port number in HTTP responses.

·     %{vsn}—Virtual server name.

·     %{sfn}—Server farm name.

·     %{reqtmstamp}—HTTP request timestamp.

·     %{uri}—HTTP URI.

·     %{ver}—HTTP version number.

·     %{args}—HTTP access parameters.

·     %{method}—HTTP request method.

·     %{xff}—IP address of XFF (X-Forwarded-For).

·     %{ctype}—Content-Type field in HTTP requests.

·     %{clen}—Content-Length field in HTTP requests.

·     %{ref}—Referer header field in HTTP requests.

·     %{ua}—User-Agent header field in HTTP requests.

·     %{host}—Host header field in HTTP requests.

·     %{path}—Path in HTTP requests.

·     %{reqsz}—HTTP request size in bytes.

·     %{reqtm}—HTTP request duration in milliseconds. The duration is from time when the device receives an HTTP request to the time when the device receives the HTTP response.

·     %{rspclen}—Content-Type field in HTTP responses.

·     %{reqsz}—HTTP response size in bytes.

·     %{rsptm}—HTTP response duration in milliseconds. The duration is from the time when the device receives an HTTP response to the time when the device finishes sending out the HTTP response.

·     %{stscode}—HTTP response status code.

·     %{reqbsz}—Body size of HTTP requests, in bytes.

·     %{rspbsz}—Body size of HTTP responses received by the device from the server, in bytes.

·     %{rspsntbsz}—Body size of HTTP responses sent from the device to the client, in bytes.

·     %{cookie_cookie-name—HTTP cookie. The cookie name cannot contain brackets ({ }, ( ),[ ], < >), at sign (@), comma (,), semicolon (;), colon (:), backslash (\), quotation mark ("), slash (/), question mark (?), equal sign (=), space character (SP), and horizontal tab (HT). Additionally, the cookie name cannot contain ASCII codes that are less than or equal to 31 and greater than or equal to 127. You can specify multiple cookies.

Usage guidelines

After you execute this command, the device sends the specified content to the log host by using the fast log output feature.

Before executing this command, you must enable fast log output for load balancing and configure fast log output parameters.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# For HTTP virtual server vs, output the source IP address and source port number in HTTP requests by using the fast log output feature.

<Sysname> system-view

[Sysname] virtual server vs type http

[Sysname-vs-http-vs] customlog content %{is};%{ps}

Related commands

customlog format (Network Management and Monitoring Command Reference)

customlog host (Network Management and Monitoring Command Reference)

default dns-server-pool

Use default dns-server-pool to specify the default (primary) DNS server pool for a transparent DNS proxy.

Use undo default dns-server-pool to restore the default.

Syntax

default dns-server-pool pool-name [ sticky sticky-name ]

undo default dns-server-pool

Default

No default DNS server pool is specified for a transparent DNS proxy.

Views

Transparent DNS proxy view

Predefined user roles

network-admin

Parameters

pool-name: Specifies a primary DNS server pool by its name, a case-insensitive string of 1 to 63 characters.

sticky sticky-name: Specifies a sticky group by its name, a case-insensitive string of 1 to 63 characters. If you do not specify a sticky group, the DNS server pool does not correspond to any sticky group.

Usage guidelines

If you execute the default dns-server-pool command multiple times, the most recent configuration takes effect.

Examples

# Specify the primary DNS server pool dns-pool1 and the sticky group st1 for the transparent DNS proxy dns-proxy1.

<Sysname> system-view

[Sysname] loadbalance dns-proxy dns-proxy1

[Sysname-lb-dp-udp-dns-proxy1] default dns-server-pool dns-pool1 sticky st1

default link-group

Use default link-group to specify the default (primary) link group.

Use undo default link-group to restore the default.

Syntax

default link-group link-group-name [ backup backup-link-group-name ] [ sticky sticky-name ]

undo default link-group

Default

No default link group is specified.

Views

Link-IP virtual server view

Predefined user roles

network-admin

Parameters

link-group-name: Specifies a primary link group by its name, a case-insensitive string of 1 to 63 characters.

backup backup-link-group-name: Specifies a backup link group by its name, a case-insensitive string of 1 to 63 characters.

sticky sticky-name: Specifies a sticky group by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

When the primary link group is available (contains links), the virtual server forwards packets through the primary link group. When the primary link group is not available, the virtual server forwards packets through the backup link group.

Examples

# Specify the primary link group link1, the backup link group link2, and the sticky group sg1 for the link-IP-type virtual server vs3.

<Sysname> system-view

[Sysname] virtual-server vs3 type link-ip

[Sysname-vs-link-ip-vs3] default link-group link1 backup link2 sticky sg1

default server-farm

Use default server-farm to specify the default (primary) server farm.

Use undo default server-farm to restore the default.

Syntax

default server-farm server-farm-name [ backup backup-server-farm-name ] [ sticky sticky-name [ backup backup-sticky-name ] ]

undo default server-farm

Default

No default server farm is specified.

Views

Fast HTTP virtual server view

HTTP virtual server view

IP virtual server view

TCP virtual server view

UDP virtual server view

Predefined user roles

network-admin

Parameters

server-farm-name: Specifies a primary server farm by its name, a case-insensitive string of 1 to 63 characters.

backup backup-server-farm-name: Specifies a backup server farm by its name, a case-insensitive string of 1 to 63 characters.

sticky sticky-name: Specifies a primary sticky group by its name, a case-insensitive string of 1 to 63 characters.

backup backup-sticky-name: Specifies a backup sticky group by its name, a case-insensitive string of 1 to 63 characters. This option is supported only by HTTP virtual servers and RADIUS virtual servers.

Usage guidelines

When the primary server farm is available (contains real servers), the virtual server forwards packets through the primary server farm. When the primary server farm is not available, the virtual server forwards packets through the backup server farm.

If you specify both a primary sticky group and a backup sticky group, the device generates both primary sticky entries and backup sticky entries. If packets do not match primary sticky entries, backup sticky entries will apply.

The device generates backup sticky entries for only the following sticky group combinations:

·     RADIUS-type primary sticky group and port-address-type backup sticky group.

·     HTTP cookie-type primary sticky group and port-address-type backup sticky group.

·     HTTP cookie-type primary sticky group and HTTP passive-type backup sticky group.

Examples

# Specify the primary server farm sf, the backup server farm sfb, and the sticky group sg1 for the IP-type virtual server vs3.

<Sysname> system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] default server-farm sf backup sfb sticky sg1

default-class action

Use default-class action to specify the default LB action.

Use undo default-class to restore the default.

Syntax

default-class action action-name

undo default-class

Default

No default LB action is specified.

Views

LB policy view

Predefined user roles

network-admin

Parameters

action-name: Specifies an LB action by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

This command sets the default LB action for packets that fail to match any LB class.

A DNS LB policy can reference DNS LB actions only; a generic LB policy can reference generic LB actions only. This rule does not apply to HTTP LB policies.

Examples

# Specify the default LB action lba1 for the generic LB policy lbp1.

<Sysname> system-view

[Sysname] loadbalance policy lbp1 type generic

[Sysname-lbp-generic-lbp1] default-class action lba1

description

Use description to configure a description.

Use undo description to restore the default.

Syntax

description text

undo description

Default

No description is configured.

Views

ISP view

LB action view

LB class view

LB policy view

LB connection limit policy view

Parameter profile view

Protection policy view

Real server view

Server farm member view

Server farm view

SNAT address pool view

SNAT global policy view

Sticky group view

Virtual server view

Link group view

Link group member view

Link view

DNS server pool view

DNS server pool member view

DNS server view

Statistics node view

Predefined user roles

network-admin

Parameters

text: Specifies a description, a case-sensitive string of 1 to 127 characters.

Examples

# Configure the description LB action LBA1 for the generic LB action lba1.

<Sysname> system-view

[Sysname] loadbalance action lba1 type generic

[Sysname-lba-generic-lba1] description LB action LBA1

destination-ip object-group

Use destination-ip object-group to specify a destination IP address object group for address translation.

Use undo destination-ip object-group to restore the default.

Syntax

destination-ip object-group object-group-name

undo destination-ip object-group

Default

All packets are translated.

Views

SNAT global policy view

Predefined user roles

network-admin

Parameters

object-group-name: Specifies a destination IP address object group by its name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

If you specify a destination IP address object group, the device performs SNAT on only packets with a matching destination IP address. For information about configuring an IP address object group, see object group configuration in Security Configuration Guide.

Examples

# Specify destination IP address object group obj1 for SNAT global policy sn1.

<Sysname> system-view

[Sysname] loadbalance snat-global-policy sn1

[Sysname-lb-snat-gp-sn1] destination-ip object-group obj1

Related commands

object-group (Security Command Reference)

display loadbalance action

Use display loadbalance action to display LB action information.

Syntax

display loadbalance action [ name action-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name action-name: Specifies an LB action by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays information about all LB actions.

Examples

# Display information about all LB actions.

<Sysname> display loadbalance action

LB action: lba1

  Description:

  Type: Generic

  State: Inactive

  Forward type: Drop

  IP ToS:

  Fallback-action: Disabled

  Busy-action: Force

  TCP payload rewrite:

    Value: QMGR.S01

    Replacement: QMGR.S01%[variable]

    Direction: Request

  TCP payload rewrite:

    Value: QMGR.S01_1

    Replacement: QMGR.S01_2

    Direction: Response

  TCP payload rewrite:

    Value: QMGR.S02_2

    Replacement: QMGR.S01_2

    Direction: Response

 

LB action: lba2

  Description:

  Type: HTTP

  State: Active

  Forward type: Server farm

  Server farm: sf (in use)

  Backup server farm: sfb

  Sticky: sg3

  Backup sticky: sg4

  IP ToS: 20

  Fallback-action: Disabled

  SSL client policy:

  Content rewrite:

    Value:

    Replacement:

  Redirect relocation:

  Redirect return-code: 302

  Header delete:

    Name: ww

    Direction: Request

  Header insert:

    Name: aa

    Value: 1234567890123456789012345678901234567890123456789012345678901234567890

    Direction: Both

  Header insert:

    Name: cc

    Value: dd

    Direction: Request

  Header rewrite:

    Name: ee

    Value: dd

    Replacement: ff

    Direction: Response

  SSL URL rewrite:

    Value: 12

    Clear port: 12

    SSL port: 123

 

LB action: lba3

  Description: sina

  Type: Link-generic

  State: Active

  Forward type: link group

  Link group: lg1 (in use)

  Backup link group: lg2

  Sticky:

  IP ToS:

  Fallback-action: None

 

LB action: lba4

  Description: xx

  Type: DNS

  State: Active

  Forward type: DNS server pool

  DNS server pool: dsp1

  Sticky: st

  IP ToS:

  Fallback-action: Disabled

  Busy-action: Force

 

LB action: lba5

  Description:

  Type: HTTP

  State: Active

  Forward type: Redirect

  IP ToS:

  Fallback-action: Continue

  SSL client policy:

  Content rewrite:

    Value:

    Replacement:

  Redirect relocation: www.h3c.com

  Redirect return-code: 302

 

LB action: lba6

  Description:

  Type: HTTP

  State: Active

  Forward type: Response

  IP ToS:

  Fallback-action: Response

    Raw file name: 301.raw

  SSL client policy:

  Content rewrite:

    Value:

    Replacement:

  Redirect relocation:

  Redirect return-code: 302

  Response file:

    File: index.html

    URL: /index/css

  Response file:

    File name: subsys_intf.js

    URL: /index/subsys

  Response file:

    File name: subsys.js

    URL: /subsys.js

  Response zip file:

    Zip file name: subsys.zip

    Working path: /

Table 1 Command output

Field

Description

LB action

LB action name.

Description

Description for the LB action.

Type

LB action type:

·     DNS.

·     Generic.

·     HTTP.

·     Link-generic.

·     RADIUS.

State

LB action state:

·     Active.

·     Inactive.

Forward type

Packet forwarding mode of the LB action:

·     Drop—Discards packets.

·     Drop(FIN-close)—Closes TCP connections by sending FIN packets (applicable to generic and HTTP LB actions).

·     Drop(RST-close)—Closes TCP connections by sending RST packets (applicable to generic and HTTP LB actions).

·     Forward—Forwards packets.

·     Server farm—Forwards packets through the server farm (applicable to generic, HTTP, and RADIUS LB actions).

·     Link group—Forwards packets through the link group (applicable to link-generic LB actions).

·     DNS server pool—Forwards packets through the DNS server pool (applicable to DNS LB actions).

·     Skip current DNS proxy (applicable to DNS LB actions).

·     Redirect—Redirects packets.

·     Response—Responds to client requests by using a file.

Server farm

Primary server farm name. (in use) indicates the server farm is in use. This field is displayed only when the packet forwarding mode is server farm.

Backup server farm

Backup server farm name. (in use) indicates the server farm is in use. This field is displayed only when the packet forwarding mode is server farm.

Link group

Default link group name. (in use) indicates the link group is in use.

Backup link group

Backup link group name. (in use) indicates the link group is in use.

Sticky

Primary sticky group name. This field is displayed only when the packet forwarding mode is server farm or DNS server pool.

Backup sticky

Backup sticky group name. This field is displayed only when the packet forwarding mode is server farm and the LB action type is HTTP or RADIUS.

IP ToS

ToS field value of IP packets.

Fallback-action

Action taken upon load balancing failure:

·     None—Does not take any action.

·     Continue—Matches the next rule.

·     Response—Responds to client requests by using a file.

·     Drop(FIN-close)—Closes TCP connections by sending FIN packets (applicable to generic and HTTP LB actions).

·     Drop(RST-close)—Closes TCP connections by sending RST packets (applicable to generic and HTTP LB actions).

Busy-action

Action taken upon busyness:

·     Continue—Matches the next rule.

·     Force—Assigns packets to links or DNS servers regardless of whether they are busy.

SSL client policy

SSL client policy name. This field is displayed for HTTP LB actions only.

Content rewrite

HTTP content rewrite configuration:

·     Value—Specifies the HTTP packet content to be rewritten.

·     Replacement—Specifies the content after rewrite.

This field is displayed only for an HTTP-type LB action.

Redirect relocation

Redirection URL. This field is displayed only for HTTP-type LB actions.

Redirect return-code

Status code in the redirection packets. This field is displayed only for HTTP-type LB actions.

Header delete

Deletes the HTTP header.

·     Name—Name of the HTTP packet header.

·     Direction—Specifies HTTP requests, HTTP responses, or both.

This field is displayed only when the header delete command is configured.

Header insert

Inserts the HTTP header.

·     Name—Name of the HTTP packet header.

·     Value—Content of the HTTP packet header.

·     Direction—Specifies HTTP requests, HTTP responses, or both.

This field is displayed only when the header insert command is configured.

Header rewrite

Rewrites the HTTP header.

·     Name—Name of the HTTP packet header.

·     Value—Content of the HTTP packet header to be rewritten.

·     Replacement—Content after rewrite.

·     Direction—Specifies HTTP requests, HTTP responses, or both.

This field is displayed only when the header rewrite command is configured.

SSL URL rewrite

Rewrites the URL in the Location header of HTTP response packets sent by the server.

·     Value—Regular expression for the location header URL.

·     Clear port—HTTP port number to be rewritten.

·     SSL port—SSL port number after rewrite.

This field is displayed only when the ssl url rewrite command is configured.

DNS server pool

DNS server pool name. This field is displayed only when the packet forwarding mode is DNS server pool.

Response file

Responds to client requests by using an uncompressed file.

File name

Name of the uncompressed file.

URL

URL path used to match client requests.

Response zip file

Responds to client requests by using a compressed file.

Zip file name

Name of the compressed file.

Working path

Working path used to match client requests.

Raw file name

Response file used upon load balancing failure.

TCP payload rewrite

Rewrite the TCP payload:

·     Value—Content of the TCP packet header to be rewritten.

·     Replacement—Content after rewrite.

·     Direction—Specifies TCP requests, TCP responses, or both.

This field is displayed only when the payload rewrite command is configured.

 

display loadbalance alg

Use display loadbalance alg to display the ALG status for all protocols.

Syntax

display loadbalance alg

Views

Any view

Predefined user roles

network-admin

network-operator

Examples

# Display the ALG status for all protocols.

<Sysname> display loadbalance alg

LB ALG:

  DNS         : Enable

  FTP         : Enable

  H323        : Disabled

  ICMP-ERROR  : Enable

  ILS         : Disabled

  MGCP        : Disabled

  NBT         : Disabled

  PPTP        : Enable

  RSH         : Disabled

  RTSP        : Enable

  SCCP        : Disabled

  SIP         : Disabled

  SQLNET      : Disabled

  TFTP        : Disabled

  XDMCP       : Disabled

display loadbalance class

Use display loadbalance class to display LB class information.

Syntax

display loadbalance class [ name class-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name class-name: Specifies an LB class by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays information about all LB classes.

Examples

# Display information about all LB classes.

<Sysname> display loadbalance class

LB class: lbc1

  Description:

  Type: HTTP

  Match type: Match-all

  Match rule:

    match 1 source ip address 1.2.3.0 24

    match 2 source ipv6 address 1::2

    match 3 cookie abc value 123

    match 4 header def value 12

    match 5 method ext xde

    match 6 method rfc CONNECT

    match 7 class cla2

    match 8 url 2q3

    match 9 acl ipv4 number 2000

    match 10 acl ipv6 number 2001

    match 11 acl ipv4 name aaa

    match 12 acl ipv6 name bbb

    match 13 isp name isp1

 

LB class: lbc2

  Description:

  Type: Generic

  Match type: Match-any

  Match rule:

    match 1 class cla2

    match 2 source ip address 1.2.23.0 24

    match 3 source ipv6 address 1::12

    match 4 acl ipv4 number 3000

    match 5 acl ipv6 number 3001

    match 6 acl ipv4 name ccc

    match 7 acl ipv6 name ddd

    match 8 isp name isp2

    match 9 payload orcl

 

LB class: lbc3

  Description:

  Type: Link-generic

  Match type: Match-any

  Match rule:

    match 1 class cla3

    match 2 source ip address 1.2.3.0 24

    match 3 source ipv6 address 1::12

    match 4 acl ipv4 number 3002

    match 5 acl ipv6 number 3003

    match 6 acl ipv4 name ccc

    match 7 acl ipv6 name ddd

    match 8 isp name isp2

    match 9 user u1

    match 10 user-group lb-group

    match 11 interface GE1/0

 

LB class: lbc4

  Description:

  Type: DNS

  Match type: Match-any

  Match rule:

    match 1 class cla2

    match 2 source ip address 1.2.3.0 24

    match 3 source ipv6 address 1::12

    match 4 acl ipv4 number 3002

    match 5 acl ipv6 number 3003

    match 6 acl ipv4 name ccc

    match 7 acl ipv6 name ddd

    match 8 destination ip address 1.2.3.0 24

    match 9 destination ipv6 address 1::12

    match 10 domain-name www.h3c.com

 

LB class: lbc5

  Description:

  Type: MySQL

  Match type: Match-any

  Match rule:

    match 1 class cla2

    match 2 source ip address 1.2.3.0 24

    match 3 source ipv6 address 1::12

    match 4 acl ipv4 number 3002

    match 5 acl ipv6 number 3003

    match 6 acl ipv4 name ccc

    match 7 acl ipv6 name ddd

    match 8 sql select

Table 2 Command output

Field

Description

LB class

LB class name.

Description

Description for the LB class.

Type

LB class type:

·     DNS.

·     Generic.

·     HTTP.

·     Link-generic.

·     MySQL.

·     RADIUS.

Match type

Match type for the LB class:

·     Match-all—Requires matching all rules of the LB class.

·     Match-any—Requires matching any rule of the LB class.

Match rule

Match rules for the LB class.

 

display loadbalance connections

Use display loadbalance connections to display information about Layer 7 LB TCP connections.

Syntax

In standalone mode:

display loadbalance connections [ client-side{ ipv4 | ipv6 } [ cs-client-ip ip-address [ cs-client-port port-number ] ] [ cs-server-ip ip-address [ cs-server-port port-number ] ] [ state { closed | close_wait | closing | established | fin_wait_1 | fin_wait_2 | last_ack | listening | syn_received | syn_sent | time_wait } ] ] [ server-side { ipv4 | ipv6 } [ ss-client-ip ip-address [ ss-client-port port-number ] ] [ ss-server-ip ip-address [ ss-server-port port-number ] ] [ state { closed | close_wait | closing | established | fin_wait_1 | fin_wait_2 | last_ack | listening | syn_received | syn_sent | time_wait } ] ] [ verbose ]

In IRF mode:

display loadbalance connections [ client-side{ ipv4 | ipv6 } [ cs-client-ip ip-address [ cs-client-port port-number ] ] [ cs-server-ip ip-address [ cs-server-port port-number ] ] [ state { closed | close_wait | closing | established | fin_wait_1 | fin_wait_2 | last_ack | listening | syn_received | syn_sent | time_wait } ] ] [ server-side { ipv4 | ipv6 } [ ss-client-ip ip-address [ ss-client-port port-number ] ] [ ss-server-ip ip-address [ ss-server-port port-number ] ] [ state { closed | close_wait | closing | established | fin_wait_1 | fin_wait_2 | last_ack | listening | syn_received | syn_sent | time_wait } ] ] [ slot slot-number ] [ verbose ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

client-side: Displays client-side connections.

server-side: Displays server-side connections.

ipv4: Specifies IPv4 connections.

ipv6: Specifies IPv6 connections.

cs-client-ip ip-address: Specifies a client by its IP address on the client side.

cs-client-port port-number: Specifies the port number of the client on the client side, in the range of 0 to 65535. 0 means any port number.

ss-client-ip ip-address: Specifies a client by its IP address on the server side.

ss-client-port port-number: Specifies the port number of the client on the server side, in the range of 0 to 65535. 0 means any port number.

cs-server-ip ip-address: Specifies a server by its IP address on the client side.

cs-server-port port-number: Specifies the port number of the server on the client side, in the range of 0 to 65535. 0 means any port number.

ss-server-ip ip-address: Specifies a server by its IP address on the server side.

ss-server-port port-number: Specifies the port number of the server on the server side, in the range of 0 to 65535. 0 means any port number.

slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays information about Layer 7 LB TCP connections for all member devices. (In IRF mode.)

state { closed | close_wait | closing | established | fin_wait_1 | fin_wait_2 | last_ack | listening | syn_received | syn_sent | time_wait }: Specifies TCP connections by connection state. If you do not specify this parameter, the command displays information about TCP connections in each state.

verbose: Displays detailed information about TCP connections. If you do not specify this keyword, the command displays brief information.

Usage guidelines

If you do not specify any parameters, this command displays information about all Layer 7 LB TCP connections.

Examples

# Display brief information about all Layer 7 LB TCP connections.

<Sysname> display loadbalance connections

Client side:                       State        Server side:                     State

192.168.56.1    <--> 8.8.8.8/80    ESTAB        192.168.56.1   <--> 2.2.2.2/80   ESTB

/50168                                          /1026

Any             <-->Any            CLOSED       192.168.56.1   <--> 2.2.2.2/80   TIMEWT

                                                /1027

Total sessions: 3

# Display detailed information about all Layer 7 LB TCP connections.

<Sysname> display loadbalance connections verbose

Slot 1:

--------------------------------------------------------------------------------

                Client side                     Server side

Client address  12.12.12.12/3032                12.12.12.12/54649

Server address  4.4.44.4/80                     5.5.5.5/80

State           ESTABLISHED                     ESTABLISHED

VPN name        --                              --

Idle time       0 sec

Idle timeout    20 sec

Start time      2018-05-30 16:54:13

 

--------------------------------------------------------------------------------

                Client side                     Server side

Client address  12.12.12.12/2996                Any

Server address  4.4.44.4/80                     Any

State           TIME_WAIT                       N/A

VPN name        --                              --

Idle time       1 sec

Idle timeout    20 sec

Start time      2018-05-30 16:54:12

 

--------------------------------------------------------------------------------

                Client side                     Server side

Client address  12.12.12.12/3251                12.12.12.12/54341

Server address  4.4.44.4/80                     5.5.5.5/80

State           ESTABLISHED                     ESTABLISHED

VPN name        --                              --

Idle time       0 sec

Idle timeout    20 sec

Start time      2018-05-30 16:54:14

Total sessions: 3

Table 3 Command output

Field

Description

State

TCP connection state:

·     LISTEN.

·     SYNSNT—SYN_SENT.

·     SYNRCV—SYN_RECEIVED.

·     ESTB—ESTABLISHED.

·     FINWT1—FIN_WAIT_1.

·     FINWT2—FIN_WAIT_2.

·     CLOWAT—CLOSE_WAIT.

·     CLOSING.

·     LASACK—LAST_ACK.

·     TIMEWT—TIME_WAIT.

·     CLOSED.

For more information about these states, see RFC 793.

Start time

Time when the TCP connection was established.

display loadbalance dns-cache

Use display loadbalance dns-cache to display DNS cache information.

Syntax

In standalone mode:

display loadbalance dns-cache [ domain-name domain-name ]

In IRF mode:

display loadbalance dns-cache [ domain-name domain-name ] [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

domain-name domain-name: Specifies a domain name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays DNS cache information for all domain names.

slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays DNS cache information for all member devices. (In IRF mode.)

Usage guidelines

DNS cache information records mappings between domain names and IP addresses.

Examples

# Display all DNS cache information.

<Sysname> display loadbalance dns-cache

Slot 1:

Domain name: www.aaa.com

Aging time: 20 min

IPv4 addresses: 6.3.5.2

                4.5.6.3

                192.169.41.8

IPv6 addresses: 4:4:4::7

 

Domain name: www.bbb.com

Aging time: 20 min

IPv4 addresses: 5.5.5.5

                3.4.5.9

display loadbalance dns-proxy

Use display loadbalance dns-proxy to display transparent DNS proxy information.

Syntax

display loadbalance dns-proxy [ brief | name dns-proxy-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

brief: Displays brief transparent DNS proxy information. If you do not specify this keyword, the command displays detailed transparent DNS proxy information.

name dns-proxy-name: Specifies a transparent DNS proxy by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays information about all transparent DNS proxies.

Examples

# Display brief information about all transparent DNS proxies.

<Sysname> display loadbalance dns-proxy brief

DNS proxy     State       Type    VPN instance    IP address     Port

dns-proxy1    Active      UDP                     1.2.3.0/24     53

dns-proxy2    Inactive    UDP                     --             5353

 

# Display information about transparent DNS proxy dns-proxy1.

<Sysname> display loadbalance dns-proxy name dns-proxy1

DNS proxy: dns-proxy1

  Type: UDP

  State: Active

  Service state: Enabled

  VPN instance:

  IPv4 address: 1.2.3.0/24

  IPv6 address: --

  Port: 53

  DNS server pool: dns-pool1

  Sticky: st

  LB policy: dns-policy1

  Connection synchronization: Enabled

  Sticky synchronization: Enabled

  Bandwidth busy protection: Disabled

Table 4 Command output

Field

Description

DNS proxy

Transparent DNS proxy name.

Type

Transparent DNS proxy type. Only UDP is supported.

State

Transparent DNS proxy state:

·     Active—The transparent DNS proxy is available.

·     Inactive—The transparent DNS proxy is unavailable for any reason except that the transparent DNS proxy feature is disabled.

·     Inactive (disabled)—The transparent DNS proxy is unavailable because the transparent DNS proxy feature is disabled.

Service state

Transparent DNS proxy state: Enabled or Disabled.

DNS server pool

Default DNS server pool used by the transparent DNS proxy.

Sticky

Sticky group used by the transparent DNS proxy.

Connection synchronization

Session extension information synchronization state: Enabled or Disabled.

Sticky synchronization

Sticky entry synchronization state: Enabled or Disabled.

Bandwidth busy protection

Link protection state: Enabled or Disabled.

 

display loadbalance dns-proxy statistics

Use display loadbalance dns-proxy statistics to display transparent DNS proxy statistics.

Syntax

In standalone mode:

display loadbalance dns-proxy statistics [ name dns-proxy-name ]

In IRF mode:

display loadbalance dns-proxy statistics [ name dns-proxy-name ] [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name dns-proxy-name: Specifies a transparent DNS proxy by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays statistics for all transparent DNS proxies.

slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays transparent DNS proxy statistics for all member devices. (In IRF mode.)

Examples

# Display statistics for the transparent DNS proxy dns-proxy1.

<Sysname> display loadbalance dns-proxy statistics name dns-proxy1

DNS proxy: dns-proxy1

Received requests: 100

Dropped requests: 2

Received responses: 98

Dropped responses: 0

Table 5 Command output

Field

Description

DNS proxy

Transparent DNS proxy name.

Received requests

Number of DNS requests received by the transparent DNS proxy.

Dropped requests

Number of DNS requests dropped by the transparent DNS proxy.

Received responses

Number of DNS responses received by the transparent DNS proxy.

Dropped responses

Number of DNS responses dropped by the transparent DNS proxy.

 

display loadbalance dns-server

Use display loadbalance dns-server to display DNS server information or DNS server pool member information.

Syntax

display loadbalance dns-server [ brief | name dns-server-name ]

display loadbalance dns-server dns-server-pool dns-server-pool-name [ name dns-server-name port port-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

brief: Displays brief DNS server information. If you do not specify this keyword, the command displays detailed DNS server information.

name dns-server-name: Displays detailed information about a DNS server. The dns-server-name argument specifies a DNS server by its name, a case-insensitive string of 1 to 63 characters.

dns-server-pool dns-server-pool-name: Displays information about members of a DNS server pool. The dns-server-pool-name argument specifies a DNS server pool by its name, a case-insensitive string of 1 to 63 characters.

dns-server dns-server-name port port-number: Displays information about a DNS server pool member. The dns-server-name argument specifies a DNS server pool member by its name, a case-insensitive string of 1 to 63 characters. The port-number argument specifies the port number of the DNS server pool member, in the range of 0 to 65535. If you do not specify this option, the command displays information about all members of a DNS server pool.

Usage guidelines

If you do not specify any parameter, the command displays detailed information about all DNS servers.

If the device obtains multiple DNS server IP addresses, it uses the smallest available IP address.

If no health monitoring method is specified, the device determines that all obtained DNS server IP addresses are available. If a health monitoring method is specified, the device determines that only the DNS server IP addresses that pass health monitoring are available.

Examples

# Display brief information about all DNS servers.

<Sysname> display loadbalance dns-server brief

(*) – Auto-alloc address using

DNS server   Address             Port    Link         State         DNS server pool

ds1          10.150.100.100(*)   0       link1        Active        dns_pool

ds2          20.150.100.100      5353    link2        Probe-failed  dns_pool

ds3          --                  0       link3        Inactive      dns_pool

ds4          --(*)               0       link3        Inactive      dns_pool

# Display detailed information about DNS server ds1.

<Sysname> display loadbalance dns-server name ds1

(*) – Auto-alloc address using

dns-server: ds1

  Description:

  State: Active

  Auto-alloc address: Enabled

  IPv4 address: 10.150.100.100(*)

                10.160.100.1

                10.154.60.2

  IPv6 address: --

 

  Port: 0 (port number in original packet)

  Link: link1

  DNS server pool: dns-pool

  Weight: 100

  Priority: 4

  Probe information:

    Probe success criteria: All

    Probe method      State

    t4                Succeeded

# Display information about all members of DNS server pool dsp1.

<Sysname> display loadbalance dns-server dns-server-pool dsp1

DNS server pool: dsp1

  dns-server: ds1

    Description: DNS server 1

    Parent state: Inactive

    State: Inactive

    Port: 0 (port number in original packet)

    Weight: 2

    Priority: 2

    Probe success criteria: All

      Probe method                       State

      icmp                               Failed

 

  dns-server: rs2

    Description: DNS server 2

    Parent state: Inactive

    State: Inactive

    Port: 53

    Weight: 100

    Priority: 4

    Probe information:

      Probe success criteria: All

      Probe method                       State

      DNS                                Failed

Table 6 Command output

Field

Description

DNS server

DNS server name.

Address

IP address of the DNS server. The asterisk (*) indicates that the IP address is automatically obtained and is being used. If all obtained IP addresses are unavailable, this field displays --(*). If no IP address is obtained and no IP address is manually configured, this field displays two hyphens (--).

Link

Link of the DNS server.

Parent state/State

DNS server state/DNS server pool member state:

·     Active—The DNS server is available.

·     Busy—The DNS server is busy. When the DNS server is in Active state and enabled with the link protection feature, this field displays Busy if the maximum expected bandwidth is reached.

·     Inactive—The DNS server is unavailable, because the configuration is not complete or the server is not referenced.

·     Probe-failed—Health monitoring has failed.

·     Unknown—Health monitoring is not configured.

Description

Description for the DNS server.

Auto-alloc address

Whether the device is enabled to automatically obtain the IP address of a DNS server: Disabled or Enabled.

IPv4 address

IPv4 address of the DNS server.

IPv6 address

IPv6 address of the DNS server.

Port

Port number of the DNS server. 0 means the port number in the packet is used.

Weight

Weight of the DNS server.

Priority

Priority of the DNS server.

Probe information

Detailed health monitoring information for the DNS server.

Probe success criteria

Health monitoring success criteria for the DNS server:

·     All—Health monitoring succeeds only when all the specified health monitoring methods succeed.

·     At least—Health monitoring succeeds when a specified minimum number of health monitoring methods succeed.

Probe method

Name of the NQA template used by the health monitoring method.

State

State of the health monitoring method:

·     Failed—Health monitoring has failed.

·     In progress—Health monitoring is in progress.

·     Invalid—Health monitoring is unavailable (because the configuration of the NQA template is not complete), or the DNS server is unavailable.

·     Succeeded—Health monitoring has succeeded.

 

display loadbalance dns-server statistics

Use display loadbalance dns-server statistics to display DNS server statistics or DNS server pool member statistics.

Syntax

In standalone mode:

display loadbalance dns-server statistics [ name dns-server-name ]

display loadbalance dns-server statistics dns-server-pool dns-server-pool-name [ name dns-server-name port port-number ]

In IRF mode:

display loadbalance dns-server statistics [ name dns-server-name ] [ slot slot-number ]

display loadbalance dns-server statistics dns-server-pool dns-server-pool-name [ name dns-server-name port port-number ] [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name dns-server-name: Specifies a DNS server by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays statistics for all DNS servers.

dns-server-pool dns-server-pool-name: Displays statistics for members of a DNS server pool. The dns-server-pool-name argument specifies a DNS server pool by its name, a case-insensitive string of 1 to 63 characters.

dns-server dns-server-name port port-number: Displays statistics for a DNS server pool member. The dns-server-name argument specifies a DNS server pool member by its name, a case-insensitive string of 1 to 63 characters. The port-number argument specifies the port number of the DNS server pool member, in the range of 0 to 65535. If you do not specify this option, the command displays statistics for all members of a DNS server pool.

slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays DNS server statistics for all member devices. (In IRF mode.)

Examples

# Display statistics for the DNS server ds1.

<Sysname> display loadbalance dns-server statistics name ds1

DNS server: ds1

Received requests: 100

Send requests: 98

Dropped requests: 2

Received responses: 98

Send responses: 98

Dropped responses: 0

# Display statistics for all members of DNS server pool dsp1.

<Sysname> display loadbalance dns-server statistics dns-server-pool dsp1

DNS server pool: dsp1

DNS server (port: 20): ds1

Received requests: 100

Dropped requests: 2

Sent responses: 98

Dropped responses: 0

 

DNS server (port: 28): ds2

Received requests: 100

Dropped requests: 0

Sent responses: 100

Dropped responses: 0

Table 7 Command output

Field

Description

DNS server

DNS server name.

Received requests

Number of DNS requests received by the DNS server.

Send requests

Number of DNS requests sent by the DNS server.

Dropped requests

Number of DNS requests dropped by the DNS server.

Received responses

Number of DNS responses received by the DNS server.

Send responses

Number of DNS responses sent by the DNS server.

Dropped responses

Number of DNS responses dropped by the DNS server.

 

display loadbalance dns-server-pool

Use display loadbalance dns-server-pool to display DNS server pool information.

Syntax

display loadbalance dns-server-pool [ brief | name pool-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

brief: Displays brief DNS server pool information. If you do not specify this keyword, the command displays detailed DNS server pool information.

name pool-name: Displays detailed information about a DNS server pool. The pool-name argument specifies a DNS server pool by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

If you do not specify any parameter, the command displays detailed information about all DNS server pools.

Examples

# Display brief information about all DNS server pools.

<Sysname> display loadbalance dns-server-pool brief

Predictor: RR - Round robin, RD - Random,

           BW - Bandwidth, MBW - Max bandwidth,

           IBW - Inbound bandwidth, OBW - Outbound bandwidth,

           MIBW - Max inbound bandwidth, MOBW - Max outbound bandwidth,

           HASH(SIP) - Hash address source IP,

           HASH(DIP) - Hash address destination IP,

           HASH(SIP-PORT) - Hash address source IP-port

DNS server pool    Predictor     Total    Active

dns-pool           RR            3        2

dns-pool1          RR            0        0

dns-pool2          RD            3        0

 

# Display detailed information about DNS server pool dns-pool.

<Sysname> display loadbalance dns-server-pool name dns-pool

DNS server pool: dns-pool

Description:

Predictor: Round robin

Selected server: Enabled

Min servers: 3

  Max servers: 5

Probe information:

  Probe success criteria: At-least 2

  Probe method: t4

Total DNS servers: 3

Active DNS servers: 0

DNS server list:

Name        State         Address          port    Link        Weight   Priority

ds1         Active        10.150.100.100   0       link1       100      4

ds2         Probe-failed  20.150.100.100   5353    link2       100      4

ds3         Inactive      --               0       link3       100      4

Table 8 Command output

Field

Description

Predictor

Scheduling algorithm of the DNS server pool:

·     RR—Weighted round robin algorithm.

·     RD—Random algorithm.

·     BW—Bandwidth algorithm.

·     IBW—Inbound bandwidth algorithm.

·     OBW—Outbound bandwidth algorithm.

·     MBW—Maximum bandwidth algorithm.

·     MIBW—Maximum inbound bandwidth algorithm.

·     MOBW—Maximum outbound bandwidth algorithm.

·     HASH(SIP)—Hash algorithm based on source IP address.

·     HASH(DIP)—Hash algorithm based on destination IP address.

·     HASH(SIP-PORT)—Hash algorithm based on source IP address and port number.

DNS server pool

DNS server pool name.

Total

Total number of DNS servers.

Active

Number of active DNS servers.

Description

Description for the DNS server pool.

Selected server

State of DNS server limit to participate in scheduling: disabled or enabled. If the state is enabled, the following fields are displayed:

·     Min servers—Minimum number of DNS servers that can participate in scheduling.

·     Max servers—Maximum number of DNS servers that can participate in scheduling.

Probe information

Detailed health monitoring information for the DNS server pool.

Probe success criteria

Health monitoring success criteria for the DNS server pool:

·     All—Health monitoring succeeds only when all the specified health monitoring methods succeed.

·     At least—Health monitoring succeeds when a specified minimum number of health monitoring methods succeed.

Probe method

Name of the NQA template used by the health monitoring method.

Total DNS servers

Total number of DNS servers.

Active DNS servers

Number of active DNS servers.

Name

DNS server name.

State

DNS server state:

·     Active—The DNS server is available.

·     Busy—The DNS server is busy. When the DNS server is in Active or Ramp state and enabled with link protection, this field displays Busy if the maximum expected bandwidth is reached.

·     Inactive—The DNS server is unavailable, because the configuration is not complete or the server is not referenced.

·     Probe-failed—Health monitoring has failed.

Address

IP address of the DNS server. The asterisk (*) indicates that the IP address is automatically obtained and is being used. If all obtained IP addresses are unavailable, this field displays --(*). If no IP address is obtained and no IP address is manually configured, this field displays two hyphens (--).

Port

Port number of the DNS server.

Link

Name of the link corresponding to the DNS server.

Weight

Weight of the DNS server.

Priority

Priority of the DNS server.

 

display loadbalance external-monitor log

Use display loadbalance external-monitor log to display the log information for custom monitoring.

Syntax

display loadbalance external-monitor log

Views

Any view

Predefined user roles

network-admin

network-operator

Examples

# Display the log information for custom monitoring.

<Sysname> display loadbalance external-monitor log

The external monitor probe state of (server farm sf, real server rs, port: 3306) template mysql-template changed to successful.

The external monitor probe state of (server farm sf2, real server rs2, port: 3306) template mysql-template changed to failed.

display loadbalance hot-backup statistics

Use display loadbalance hot-backup statistics to display LB hot backup statistics.

Syntax

In IRF mode:

display loadbalance hot-backup statistics [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays LB hot backup statistics for all member devices. (In IRF mode.)

Examples

# Display LB hot backup statistics.

<Sysname> display loadbalance hot-backup statistics

Slot 2:

               TryAdd    TryDel    AckDel    AckOK     AckNO     NotSpt

  StiSnd       1         0         0         0         0         0

  StiRcv       0         0         0         0         0         0

  StiSndFail   0         0         0         0         0         0

  StiRcvFail   0         0         0         0         0         0

  MsgSnd       1         0         0         0         0         0

  MsgRcv       0         0         0         0         0         0

  MsgSndFail   0         0         0         0         0         0

  MsgRcvFail   0         0         0         0         0         0

  MAllocFail   0         0         0         0         0         0

 

  SesBkTotal : 0

  SesBkFail  : 0

  SesResTotal: 0

  SesResFail : 0

  SesUpdate  : 0

Table 9 Command output

Field

Description

TryAdd

Message for adding sticky entries.

TryDel

Message for deleting sticky entries.

AckDel

Message for acknowledging the deletion of sticky entries.

AckOK

Message indicating the sticky entries that can be deleted.

AckNO

Message indicating the sticky entries that cannot be deleted.

NotSpt

Message indicating the unsupported sticky entries.

StiSnd

Number of sent sticky entries.

StiRcv

Number of received sticky entries.

StiSndFail

Number of sticky entry sending failures.

StiRcvFail

Number of sticky entry receiving failures.

MsgSnd

Number of sent messages.

MsgRcv

Number of received messages.

MsgSndFail

Number of message sending failures.

MsgRcvFail

Number of message receiving failures.

MAllocFail

Number of memory application failures.

SesBkTotal

Number of session backups.

SesBkFail

Number of session backup failures.

SesResTotal

Number of session restorations.

SesResFail

Number of session restoration failures.

SesUpdate

Number of session updates.

 

display loadbalance isp

Use display loadbalance isp to display ISP information.

Syntax

display loadbalance isp [ ip ipv4-address | ipv6 ipv6-address | name isp-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

ip ipv4-address: Specifies an IPv4 address. If you do not specify this option, the command displays information about all ISPs.

ipv6 ipv6-address: Specifies an IPv6 address. If you do not specify this option, the command displays information about all ISPs.

name isp-name: Specifies an ISP by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays information about all ISPs.

Examples

# Display information about all ISPs.

<Sysname> display loadbalance isp

(*) - User-defined object

Last successful auto update time: 04:09:00 UTC Fri 03/16/2012

Last auto update time: 04:09:00 UTC Fri 03/16/2012

Last auto update result: Successful

  ISP update count: 1

 

LB ISP: isp1

    Whois maintainer object name:

        MAINT-CHINANET

    Description: ISP1

    IPv4 address/Mask length: --

    IPv6 address/Prefix length: --

 

LB ISP: isp2(*)

    Description:

    IPv4 address/Mask length:

        1.2.3.0/32(*)           1.2.3.4/32              3.3.3.6/32(*)

        192.168.6.131/32(*)     192.168.195.189/32(*)

    IPv6 address/Prefix length:

        1::2/128

        FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF/128(*)

# Display information about the ISP corresponding to the IP address 1.2.3.0.

<Sysname> display loadbalance isp ip 1.2.3.0

ISP name            Source                   IPv4 address/Mask length

isp2                user-set                 1.2.3.0/28

isp2                user-set                 1.2.3.0/29

isp2                user-set                 1.2.3.0/30

isp2                file-load                1.2.3.0/31

                    auto-update

isp2                user-set                 1.2.3.0/32

                    file-load

# Display information about the ISP corresponding to the IPv6 address 1::1234.

<Sysname> display loadbalance isp ipv6 1::1234

ISP name            Source                   IPv6 address/Prefix length

isp2                user-set                 1::1234/126

isp2                user-set                 1::1234/127

isp2                file-load                1::1234/128

Table 10 Command output

Field

Description

(*) - User-defined object

(*) indicates that the ISP information is manually configured. If the ISP information is also imported from a file, (*) is not displayed.

Last successful auto update time

Time of the most recent successful update.

Last auto update time

Time of the most recent update.

Last auto update result

Result of the most recent auto update:

·     Successful.

·     Failed to connect to WHOIS server.

·     Connection failed.

·     Failed to query DNS (which means failed to send DNS requests).

ISP update count

Number of ISPs in the most recent update.

LB ISP

ISP name.

Description

Description for the ISP.

Source

Source of the ISP:

·     user-set—Manually configured.

·     file-load—Imported from a file.

·     auto-update—ISP auto update.

 

display loadbalance limit-policy

Use display loadbalance limit-policy to display LB connection limit policy information.

Syntax

display loadbalance limit-policy [ name policy-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

policy-name: Specifies an LB connection limit policy by its name, a case-insensitive string of 1 to 63 characters.

Examples

# Display information about the LB connection limit policy lptest.

<Sysname> display loadbalance limit-policy name lptest

Limit-policy: lptest

  Description:

  Limit rule:

limit lptest acl 3000 amount 10 10

display loadbalance link

Use display loadbalance link to display LB link information or link group member information.

Syntax

display loadbalance link [ brief | name link-name ]

display loadbalance link link-group link-group-name [ name link-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

brief: Displays brief information about all LB links. If you do not specify this keyword, the command displays detailed LB link information.

name link-name: Displays detailed information about the specified LB link. The link-name argument specifies an LB link name, a case-insensitive string of 1 to 63 characters.

link-group link-group-name: Displays information about members of a link group. The link-group-name argument specifies a link group by its name, a case-insensitive string of 1 to 63 characters.

name link-name: Displays information about a link group member. The link-name argument specifies a link group member by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays information about all members of a link group.

Usage guidelines

If you do not specify the brief keyword or the name link-name option, the command displays detailed information about all LB links.

Examples

# Display brief information about all LB links.

<Sysname> display loadbalance link brief

Link         Router IP/Interface    State        VPN instance     Link group

Lk1          192.168.1.1            Busy         vpn1             lg

Lk2          192.168.2.1            Active       vpn1             lg

Lk3          Dialer0                Inactive     vpn1             lg

# Display detailed information about the LB link lk.

<Sysname> display loadbalance link name lk

Link: lk                                                                       

  Description: lk

  State: Busy

  VPN instance: vpn1 (Inherit)

  Inherit VPN: Enabled

  Router IP: 1.2.3.4

  Router IPv6: --

  Link-group: lg

  Weight: 100

  Priority: 4

  Cost: 0

  Slow-shutdown: Disabled

  Connection limit: 0

  Rate limit:

    Connections: 10000

    Bandwidth: 10000 kbps

    Inbound bandwidth: 5000 kbps

    Outbound bandwidth: 5000 kbps

Bandwidth busy:                                                              

    Max bandwidth: 10000 kbps

    Max inbound bandwidth: 5000 kbps

    Max outbound bandwidth: 5000 kbps

    Busy rate: 80

    Inbound busy rate: 70

    Outbound busy rate: 60

    Busy recovery rate: 60

    Inbound busy recovery rate: 60

    Outbound busy recovery rate: 60

Probe information:

    Probe success criteria: All

    Probe method                    State

t4                              Inactive

 

Link: lk2

  Description: link2

  State: Inactive

  VPN instance: vpn2 (Config)

  Inherit VPN: Disabled

  IPv4 address state: Active

  IPv6 address state: Inactive

  Router interface: Dialer0

  Link group: lg

  Weight: 150

  Priority: 3

  Cost: 100

  Slow shutdown: Enabled

  Connection limit: 10000

  Rate limit:

    Connections: 10000

    Bandwidth: 10000 kbps

    Inbound bandwidth: 5000 kbps

    Outbound bandwidth: 5000 kbps

  Bandwidth busy:

    Max bandwidth: 10000 kbps

    Max inbound bandwidth: 5000 kbps

    Max outbound bandwidth: 5000 kbps

    Busy rate: 80

    Inbound busy rate: 70

    Outbound busy rate: 60

    Busy recovery rate: 60

    Inbound busy recovery rate: 60

    Outbound busy recovery rate: 60

Probe information:

  Probe success criteria: All

  Probe method                    State

  t4                              Inactive

# Display information about all members of link group lg.

<Sysname> display loadbalance link link-group lg

Link group: lg

  Link: lk1

    Description: link 1

    Parent state: Inactive

    State: Inactive

    Weight: 2

    Priority: 2

    Slow shutdown: Disabled

    Connection limit: --

    Connection rate limit: --

    Probe information:

      Probe success criteria: All

      Probe method                       State

      icmp                               Failed

 

  Link: lk2

    Description: link 2

    Parent state: Inactive

    State: Inactive

    Weight: 100

    Priority: 4

    Slow shutdown: Disabled

    Connection limit: --

    Connection rate limit: --

    Probe information:

      Probe success criteria: All

      Probe method                       State

      tcp                                Failed

Table 11 Command output

Field

Description

Link

LB link name.

Router IP/Interface

Gateway IP address or outgoing interface of the LB link.

Parent state/State

LB link state/Link group member state:

·     Active—The LB link is available.

·     Busy—The LB link is busy.

·     Inactive—The LB link is unavailable, because the configuration is not complete, the LB link is not referenced, or the virtual server is not enabled.

·     Probe-failed—Health monitoring has failed.

·     Ramp—Ramp-up phase of slow online.

·     Shutdown—The LB link is shut down.

·     Standby—Standby phase of slow online.

·     Unknown—Health monitoring is not configured.

VPN instance

VPN instance of the LB link.

·     Config—Manually configured.

·     Inherit—Inherited.

Link group

Link group to which the LB link belongs.

Description

Description for the LB link.

Inherit VPN

State of VPN instance inheritance: Enabled or Disabled.

IPv4 address state

IPv4 address state of the LB link:

·     Active—An available IPv4 address is obtained through the outgoing interface of the LB link.

·     Inactive—No available IPv4 address is obtained through the outgoing interface of the LB link.

This field is displayed only if an outgoing interface is specified for an LB link.

IPv6 address state

IPv6 address state of the link:

·     Active—An available IPv6 address is obtained through the outgoing interface of the LB link.

·     Inactive—No available IPv6 address is obtained through the outgoing interface of the LB link.

This field is displayed only if an outgoing interface is specified for an LB link.

Weight

Weight of the LB link.

Priority

Priority of the LB link.

Cost

Cost for proximity calculation.

Slow shutdown

Slow offline state of the LB link:

·     Disabled.

·     Enabled.

Connection limit

Maximum number of connections for the LB link.

Connection rate limit

Maximum number of connections per second for the LB link.

Rate limit

Rate limit of the LB link.

Connections

Maximum number of connections per second for the LB link.

Bandwidth

Maximum bandwidth for the LB link in kbps.

Inbound bandwidth

Maximum inbound bandwidth for the LB link in kbps.

Outbound bandwidth

Maximum outbound bandwidth for the LB link in kbps.

Bandwidth busy

Bandwidth ratio.

Max bandwidth

Maximum expected bandwidth for the LB link in kbps.

Max inbound bandwidth

Maximum inbound expected bandwidth for the LB link in kbps.

Max outbound bandwidth

Maximum outbound expected bandwidth for the LB link in kbps.

Busy rate

Bandwidth ratio for the LB link.

Inbound busy rate

Inbound bandwidth ratio for the LB link.

Outbound busy rate

Outbound bandwidth ratio for the LB link.

Busy recovery rate

Bandwidth recovery ratio for the LB link.

Inbound busy recovery rate

Inbound bandwidth recovery ratio for the LB link.

Outbound busy recovery rate

Outbound bandwidth recovery ratio for the LB link.

Probe information

Detailed health monitoring information for the LB link.

Probe success criteria

Health monitoring success criteria for the LB link:

·     All—Health monitoring succeeds only when all the specified health monitoring methods succeed.

·     At least—Health monitoring succeeds when a specified minimum number of health monitoring methods succeed.

Probe method

Name of the NQA template used by the health monitoring method.

State

State of the health monitoring method:

·     Failed—Health monitoring has failed.

·     In progress—Health monitoring is in progress.

·     Invalid—Health monitoring is unavailable (because the configuration of the NQA template is not complete), or the real server is unavailable.

·     Succeeded—Health monitoring has succeeded.

 

display loadbalance link out-interface statistics

Use display loadbalance link out-interface statistics to display link outbound interface statistics.

Syntax

display loadbalance link out-interface statistics [ name link-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name link-name: Specifies a link by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays outbound interface statistics for all links.

Usage guidelines

If the link outbound interface is a logical interface, the rate statistics are calculated based on the interface traffic.

Examples

# Display outbound interface statistics for the link lk1.

<Sysname> display loadbalance link out-interface statistics name lk1

Loadbalance link: lk1

Input rate: 1524 bps

  Output rate: 90 bps

Table 12 Command output

Field

Description

Loadbalance link

LB link name.

Input rate

Input rate of the outbound interface in bps.

Output rate

Output rate of the outbound interface in bps.

 

display loadbalance link statistics

Use display loadbalance link statistics to display link statistics or link group member statistics.

Syntax

In standalone mode:

display loadbalance link statistics [ name link-name ]

display loadbalance link statistics link-group link-group-name [ name link-name ]

In IRF mode:

display loadbalance link statistics [ name link-name ] [ slot slot-number ]

display loadbalance link statistics link-group link-group-name [ name link-name ] [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name link-name: Specifies a link by its name, a case-insensitive string of 1 to 63 characters. 

link-group link-group-name: Displays statistics for members of a link group. The link-group-name argument specifies a link group by its name, a case-insensitive string of 1 to 63 characters.

name link-name: Displays statistics for a link group member. The link-name argument specifies a link group member by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays statistics for all members of a link group.

slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays link statistics for all member devices. (In IRF mode.)

Examples

# Display statistics for the link lk1.

<Sysname> display loadbalance link statistics name lk1

Loadbalance link: lk1     

  Total connections: 1798

  Active connections: 788

  Max connections: 803

    recorded at 11:02:49 on Tue May 21 2019

  Connections per second: 157

  Max connections per second: 163

    recorded at 11:02:49 on Tue May 21 2019

  Downstream traffic: 333332 bytes

  Upstream traffic: 472054 bytes

  Throughput: 4396 bps

  Inbound throughput: 1214 bps

  Outbound throughput: 3128 bps

  Max throughput: 4564 bps

    recorded at 11:02:49 on Tue May 21 2019

  Max inbound throughput: 1214 bps

    recorded at 11:02:49 on Tue May 21 2019

  Max outbound throughput: 3320 bps

    recorded at 11:02:49 on Tue May 21 2019

  Received packets: 1798

  Sent packets: 0

  Dropped packets: 0

  Packet loss rate: 10

# Display statistics for all members of link group lg.

<Sysname> display loadbalance link statistics link-group lg

Loadbalance link group: lg

  Loadbalance link: lk1

    Total connections: 0

    Active connections: 0

    Max connections: 0

      recorded at 11:02:49 on Tue May 21 2019

    Connections per second: 0

    Max connections per second: 0

      recorded at 11:02:49 on Tue May 21 2019

    Downstream traffic: 0 bytes

    Upstream traffic: 0 bytes

    Throughput: 0 bps

    Inbound throughput: 0 bps

    Outbound throughput: 0 bps

    Max throughput: 0 bps

      recorded at 11:02:49 on Tue May 21 2019

    Max inbound throughput: 0 bps

      recorded at 11:02:49 on Tue May 21 2019

    Max outbound throughput: 0 bps

      recorded at 11:02:49 on Tue May 21 2019

    Received packets: 0

    Sent packets: 0

    Dropped packets: 0

 

  Loadbalance link: lk2

    Total connections: 0

    Active connections: 0

    Max connections: 0

      recorded at 11:02:49 on Tue May 21 2019

    Connections per second: 0

    Max connections per second: 0

      recorded at 11:02:49 on Tue May 21 2019

    Downstream traffic: 0 bytes

    Upstream traffic: 0 bytes

    Throughput: 0 bps

    Inbound throughput: 0 bps

    Outbound throughput: 0 bps

    Max throughput: 0 bps

      recorded at 11:02:49 on Tue May 21 2019

    Max inbound throughput: 0 bps

      recorded at 11:02:49 on Tue May 21 2019

    Max outbound throughput: 0 bps

      recorded at 11:02:49 on Tue May 21 2019

    Received packets: 0

    Sent packets: 0

    Dropped packets: 0

Table 13 Command output

Field

Description

Loadbalance link

Link name.

Total connections

Total number of connections.

Active connections

Number of active connections.

Max connections

Maximum number of connections.

Connections per second

Number of connections per second.

Max connections per second

Maximum number of connections per second.

Downstream traffic

Downstream traffic (in bytes) received by the LB device.

Upstream traffic

Upstream traffic (in bytes) sent by the LB device.

Throughput

Total packet throughput in bps.

Inbound throughput

Inbound packet throughput in bps.

Outbound throughput

Outbound packet throughput in bps.

Max throughput

Maximum packet throughput in bps.

Max inbound throughput

Maximum inbound packet throughput in bps.

Max outbound throughput

Maximum outbound packet throughput in bps.

Received packets

Number of received packets.

Sent packets

Number of sent packets.

Dropped packets

Number of dropped packets.

Packet loss rate

Packet loss ratio of the link.

This field appears only if the packet loss ratio weight is set for proximity calculation.

 

display loadbalance link-group

Use display loadbalance link-group to display link group information.

Syntax

display loadbalance link-group [ brief | name link-group-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

brief: Displays brief information about all link groups. If you do not specify this keyword, the command displays detailed link group information.

name link-group-name: Specifies a link group by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays information about all link groups.

Usage guidelines

If you do not specify any parameters, the command displays detailed information about all link groups.

A link is displayed as unavailable if the link group configuration is not complete, the link group is not referenced, or the virtual server is not enabled. This does not mean that the link is not available.

Examples

# Display brief information about all link groups.

<Sysname> display loadbalance link-group brief

Predictor: RR - Round robin, RD - Random, LC - Least connection,

           BW – Bandwidth, MBW – Max bandwidth,

           IBW – Inbound bandwidth, OBW – Outbound bandwidth,

           MIBW – Max inbound bandwidth, MOBW – Max outbound bandwidth,

           HASH(SIP) - Hash address source IP,

           HASH(DIP) - Hash address destination IP,

           HASH(SIP-PORT) - Hash address source IP-port

NAT/SNAT: Y - Enabled, N - Disabled

 

Link group       Predictor    NAT   SNAT  Total  Active

lg               RR           Y     N     3      3

# Display detailed information about all link groups.

<Sysname> display loadbalance link-group

Link group: lg1

  Description:

  Predictor: Hash address

  Proximity: Disabled

  NAT: Enabled

  SNAT pool:

  Failed action: Keep

  Active threshold: Enabled

    Lower: 80

    Upper: 90

  Slow-online: Enabled

  Standby time: 5s

  Ramp-up time: 10s

  Selected link: Enabled

    Min link: 100

    Max link: 600

  Probe information:

    Probe success criteria: All

    Probe method:

    aaa

    ddd

  Total link: 1

  Active link: 1

  Link list:

  Name             State         VPN instance    Router IP    Weight    Priority

  Link1            Inactive      vpn1            1.2.3.4      4         100

Table 14 Command output

Field

Description

Link group

Link group name.

Description

Description for the link group.

Predictor

Scheduling algorithm of the link group:

·     RR—Weighted round robin algorithm.

·     RD—Random algorithm.

·     LC—Weighted least connection algorithm.

·     BW—Bandwidth algorithm.

·     IBW—Inbound bandwidth algorithm.

·     OBW—Outbound bandwidth algorithm.

·     MBW—Maximum bandwidth algorithm.

·     MIBW—Maximum inbound bandwidth algorithm.

·     MOBW—Maximum outbound bandwidth algorithm.

·     HASH(SIP)—Hash algorithm based on source IP address.

·     HASH(DIP)—Hash algorithm based on destination IP address.

·     HASH(SIP-PORT)—Hash algorithm based on source IP address and port number.

Proximity

Proximity state of the link group:

·     Disabled.

·     Enabled.

NAT

NAT state of the link group:

·     Disabled.

·     Enabled.

SNAT pool

Name of the SNAT address pool referenced by the link group.

Failed action

Fault processing method of the link group:

·     Keep—Keeps existing connections.

·     Reschedule—Redirects connections.

·     Reset—Terminates existing connections.

Active threshold

State of the criteria to determine that the link group is available: disabled or enabled. If the state is enabled, the following fields are displayed:

·     Lower—Lower percentage value.

·     Upper—Upper percentage value.

Slow-online

State of the slow online feature: disabled or enabled. If the state is enabled, the following fields are displayed:

·     Standby time.

·     Ramp-up time.

Selected link

State of link limit to participate in scheduling: disabled or enabled. If the state is enabled, the following fields are displayed:

·     Min server—Minimum number of links that participate in scheduling.

·     Max server—Maximum number of links that participate in scheduling.

Probe success criteria

Health monitoring success criteria for the link group:

·     All—Health monitoring succeeds only when all the specified health monitoring methods succeed.

·     At least X—Health monitoring succeeds when a minimum of X health monitoring methods succeed.

Probe method

Name of the NQA template used by the health monitoring method.

Total link

Total number of links.

Active link

Number of active links.

Name

Link name.

State

Link state:

·     Active—The link is available.

·     Busy—The link is busy. When the link is in Active or Ramp state and enabled with bandwidth statistics collection and link protection, this field displays Busy if the maximum expected bandwidth is reached.

·     Inactive—The link is unavailable, because the configuration is not complete, the link is not referenced, or the virtual server is not enabled.

·     Probe-failed—Health monitoring has failed.

·     Ramp—Ramp-up phase of slow online.

·     Shutdown—The link is shut down.

·     Standby—Standby phase of slow online.

VPN instance

VPN instance of the link.

Router IP

IPv4 and IPv6 addresses of the link.

Weight

Weight of the link.

Priority

Priority of the link.

 

display loadbalance policy

Use display loadbalance policy to display LB policy information.

Syntax

display loadbalance policy [ name policy-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name policy-name: Specifies an LB policy by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays information about all LB policies.

Examples

# Display information about all LB policies.

<Sysname> display loadbalance policy

LB policy: lbp1

  Description:

  Type: Generic

  Class: lbc1

   Action: lba1

  Default action: lba0

 

LB policy: lbp2

  Description:

  Type: HTTP

  Default action:

 

LB policy: lbp3

  Description:

  Type: Link-generic

  Class: lbc3

  Action: lba3

  Default action: lba3

 

LB policy: lbp4

  Description:

  Type: DNS

  Class: lbc4

  Action: lba4

  Default action: lba4

 

LB policy: lbp5

  Description:

  Type: MySQL

  Class: lbc5

  Action: lba5

  Default action: lba5

Table 15 Command output

Field

Description

LB policy

LB policy name.

Description

Description for the LB policy.

Type

LB policy type:

·     DNS.

·     Generic.

·     HTTP.

·     Link-generic.

·     MySQL.

·     RADIUS.

Class

LB class for the LB policy.

Action

LB action for the LB class.

Default class action

Default LB action.

 

display loadbalance probe-template

Use display loadbalance probe-template to display LB probe template information.

Syntax

display loadbalance probe-template [ name template-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name template-name: Specifies an LB probe template by its name, a case-insensitive string of 1 to 32 characters. If you do not specify this option, the command displays information about all LB probe templates.

Examples

# Display information about all LB probe templates.

<Sysname> display loadbalance probe-template

Load balancing probe template: rst1

  Description:

  Type: tcp-rst

  Monitoring interval: 20 sec

  RST threshold: 10

  Protection action: auto-shutdown

 

Load balancing probe template: zero2

  Description:

  Type: tcp-zero-window

  Monitoring interval: 30 sec

  Zero-window threshold: 20

  Protection action: busy

    Probe interval: 30 sec

    Probe times: 3

 

Load balancing probe template: icmp1

  Description:

  Type: icmp

  Timeout: 3 sec

  Frequency: 300

  Load balancing probe template: http1

  Description:

  Type: http-passive

  Monitoring interval: 1 sec

  Abnormal-url threshold: 10000

  Timeout: 30 sec

  URL list:

    aaa

  Status code list:

    404

 

Load balancing probe template: test_external

  Description:

  Type: external-monitor

  External script: http.sh

  Monitoring interval: 5 sec

  Timeout: 6 sec

  Argument: 192.168.1.123

  Environment variable list:

    Name               Value

    Test3              /opt/lib

    Test4              /usr/bin

Table 16 Command output

Field

Description

Load balancing probe template

LB probe template name.

Description

Description for the LB probe template.

Type

LB probe template type:

·     external-monitor—Custom monitoring.

·     http-passive.

·     icmp.

·     tcp-rst.

·     tcp-zero-window.

Monitoring interval

Monitoring time. During the monitoring time, the system counts the number of RST packets or zero-window packets sent by each server farm member in a server farm.

This field is displayed only for a custom-monitoring, HTTP passive, TCP-RST, or TCP zero-window LB probe template.

RST threshold

Maximum number of RST packets a real server can send.

This field is displayed only for a TCP-RST LB probe template.

Zero-window threshold

Maximum percentage of zero-window packets a real server can send.

This field is displayed only for a TCP zero-window LB probe template.

Protection action

Action to take when the RST or zero-window packet threshold is reached: Auto-shutdown or Busy.

This field is displayed only for a TCP-RST or TCP zero-window LB probe template.

Probe interval

Interval to probe the real server in busy state.

This field is displayed only for a TCP-RST or TCP zero-window LB probe template.

Probe times

Maximum number of times for probing the real server in busy state. If the number of probe times is reached, the real server is automatically shut down.

This field is displayed only for a TCP-RST or TCP zero-window LB probe template.

Timeout

Timeout time for probe responses, HTTP responses, or custom monitoring probe packet responses.

This field is displayed only for an ICMP LB probe template, HTTP passive, or custom-monitoring LB probe template.

Frequency

Probe interval for an LB probe template.

This field is displayed only for an ICMP LB probe template or HTTP passive LB probe template.

Abnormal-url threshold

Upper limit of URL error times.

This field is displayed only for an HTTP passive LB probe template.

URL list

List of URLs to check for an HTTP passive LB probe template

This field is displayed only for an HTTP passive LB probe template.

Status code list

List of response status codes to check for an HTTP passive LB probe template

This field is displayed only for an HTTP passive LB probe template.

External script

Script file used by a custom-monitoring LB probe template.

This field is displayed only for a custom-monitoring LB probe template.

Argument

User-defined information for a custom-monitoring LB probe template.

This field is displayed only for a custom-monitoring LB probe template.

Environment variables list

Environment variable list for a custom-monitoring LB probe template.

This field is displayed only for a custom-monitoring LB probe template.

Name

Environment variable name.

This field is displayed only for a custom-monitoring LB probe template.

Value

Environment variable value.

This field is displayed only for a custom-monitoring LB probe template.

 

Related commands

reset real-server statistics

display loadbalance process-limit

Use display loadbalance process-limit to display the maximum number of processes allowed to be started for custom monitoring.

Syntax

display loadbalance process-limit

Views

Any view

Predefined user roles

network-admin

network-operator

Examples

# Display the maximum number processes allowed to be started for custom monitoring.

<Sysname> display loadbalance process-limit

Loadbalance process-limit: 200

display loadbalance protection-policy

Use display loadbalance protection-policy to display the configuration of protection policies.

Syntax

display loadbalance protection-policy [ name policy-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name policy-name: Specifies a protection policy by its name, a case-insensitive string of 1 to 63 characters. If you do not specify a protection policy, this command displays the configuration of all protection policies.

Examples

# Display the configuration of all protection policies.

<Sysname> display loadbalance protection-policy

Policy name: p1

  Description:

  Type: HTTP

  Protection action: verify js

  Rule ID: 3

    URL: /index.php

    Protection period: 2

    Method                     Threshold

    Cookie (Jsessionid)        20

    Source IP                  10

  Rule ID: 5

    URL: /test.php

    Protection period: 20

    Method                     Threshold

    Cookie (A1B2C3D4)          20

Table 17 Command output

Field

Description

Protection action

Protection action:

·     warning—Generates a log message.

·     drop—Drops requests.

·     verify (insert header)—Performs cookie verification by inserting an HTTP header.

·     verify (js)—Performs cookie verification by inserting a JS script.

URL

Protected URL.

Method

Threshold type:

·     Cookie (xxx)—Cookie-based threshold (cookie name).

·     Source IP—- Source-IP-based threshold.

display loadbalance proximity

Use display loadbalance proximity to display proximity entry information.

Syntax

In standalone mode:

display loadbalance proximity [ vpn-instance vpn-instance-name ] [ ip [ ipv4-address ] | ipv6 [ ipv6-address ] ]

In IRF mode:

display loadbalance proximity [ vpn-instance vpn-instance-name ] [ ip [ ipv4-address ] | ipv6 [ ipv6-address ] ] [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you do not specify this option, the command displays proximity entry information for the public network.

ip [ ipv4-address ]: Displays IPv4 proximity entry information. If you specify the ipv4-address argument, this command displays detailed information about the proximity entry corresponding to the IPv4 address. If you do not specify the ipv4-address argument, this command displays brief information about all IPv4 proximity entries.

ipv6 [ ipv6-address ]: Displays IPv6 proximity entry information. If you specify the ipv6-address argument, this command displays detailed information about the proximity entry corresponding to the IPv6 address. If you do not specify the ipv6-address argument, this command displays brief information about all IPv6 proximity entries.

slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays proximity information for all member devices. (In IRF mode.)

Usage guidelines

If you do not specify the vpn-instance, ip, or ipv6 keyword, this command displays brief information about all IPv4 and IPv6 proximity entries.

Examples

# Display brief information about all IPv4 and IPv6 proximity entries for the public network.

<Sysname> display loadbalance proximity

(*) – Real server object

Slot :1

  IPv4 address/Mask length       Timeout     Best link/RTT

  ------------------------------------------------------------

  1.2.3.0/24                     59          lk1/1

  1.2.15.0/24                    58          lk2/2

 

  IPv6 address/Prefix length     Timeout     Best link/RTT

  ------------------------------------------------------------

  11:22::/96                     40          lk1/3

# Display detailed information about the proximity entry corresponding to the IP address 1.2.3.1 for the public network.

<Sysname> display loadbalance proximity ip 1.2.3.1

(*) – Real server object

IPv4 address/Mask length: 1.2.3.0/24

Timeout: 40

Link list/RTT:

  lk1/1

  lk2/3

# Display detailed information about the proximity entry corresponding to the IPv6 address 11:22:: for the VPN instance vpn1.

<Sysname> display loadbalance proximity vpn-instance vpn1 ipv6 11:22::

(*) – Real server object

IPv6 address/Prefix length: 11:22::/96

Timeout: 34

Link list/RTT:

  lk1/2

  lk2/3

Table 18 Command output

Field

Description

Slot

Card for which proximity entry information is displayed.

Timeout

Remaining time of the proximity entries, in seconds.

Link list

Links for the proximity entry. They are listed in descending priority order.

RTT

Network delay for the link in milliseconds.

 

display loadbalance snat-global-policy

Use display loadbalance snat-global-policy to display SNAT global policy information.

Syntax

display loadbalance snat-global-policy [ name policy-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name policy-name: Specifies a SNAT global policy by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays information about all SNAT global policies.

Examples

# Display information about all SNAT global policies.

<Sysname> display loadbalance snat-global-policy

Policy name: lbsnat1

  Description:

  State: Active

  Priority: 0

  VPN instance:

  Source IP object group: src-obj

  Destination IP object group: dst-obj

  Service object group: proto-obj

  Translation mode: snat-pool sp

 

Policy name: lbsnat2

  Description:

  State: Inactive(disable)

  Priority: 0

  VPN instance:

  Source IP object group: src-obj

  Destination IP object group:

  Service object group:

  Translation mode: auto-map

Table 19 Command output

Field

Description

State

State of the SNAT global policy:

·     Active—The SNAT global policy is enabled and available.

·     Inactive—The SNAT global policy is enabled but unavailable.

·     Inactive (disabled)—The SNAT global policy is disabled and unavailable.

display loadbalance snat-pool

Use display loadbalance snat-pool to display SNAT address pool information.

Syntax

display loadbalance snat-pool [ name pool-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name pool-name: Specifies a SNAT address pool by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays information about all SNAT address pools.

Examples

# Display information about all SNAT address pools.

<Sysname> display loadbalance snat-pool

SNAT pool: lbsp1

  Description:

  IPv4 range:

    Start address                       End address

    202.110.10.5                        202.110.10.10

    202.110.20.10                       202.110.20.15

  IPv6 range:

    Start address                       End address

    2002::2                             2002::100

    2002::200                           2002::300

  ARP/ND interfaces:

    GigabitEthernet1/0

    GigabitEthernet3/0

 

SNAT pool: lbsp2

  Description:

  IPv4 range:

    Start address                       End address

    203.110.10.10                       203.110.10.15

  IPv6 range:

    Start address                       End address

    2003::2                             2003::100

  ARP/ND interfaces:

    GigabitEthernet2/0

Table 20 Command output

Field

Description

SNAT pool

SNAT address pool name.

Description

Description for the SNAT address pool.

IPv4 range

IPv4 address range.

IPv6 range

IPv6 address range.

ARP/ND interfaces

Interfaces from which gratuitous ARP packets and ND packets are sent out.

 

display loadbalance virtual-server total-statistics

Use display loadbalance virtual-server total-statistics to display cumulative statistics for all virtual servers.

Syntax

In standalone mode:

display loadbalance virtual-server total-statistics

In IRF mode:

display loadbalance virtual-server total-statistics [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays cumulative statistics for all virtual servers on all member devices. (In IRF mode.)

Usage guidelines

This command displays the cumulative connection statistics for all virtual servers. If you execute the reset virtual-server command for a virtual server, the statistical values are affected.

Examples

# Display cumulative statistics for all virtual servers.

<Sysname> display loadbalance virtual-server total-statistics

Slot 1:

  Total connections: 0

  Active connections: 0

  Connections per second: 0

 

Slot 2:

  Total connections: 0

  Active connections: 0

  Connections per second: 0

Table 21 Command output

Field

Description

Total connections

Total number of connections.

Active connections

Number of active connections.

Connections per second

Number of connections per second.

display parameter-profile

Use display parameter-profile to display parameter profile information.

Syntax

display parameter-profile [ name parameter-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name parameter-name: Specifies a parameter profile by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays information about all parameter profiles.

Examples

# Display information about all parameter profiles.

<Sysname> display parameter-profile

Parameter profile: pp1

  Description:

  Type: IP

  IP ToS: 20

 

Parameter profile: pp2

  Description:

  Type: TCP

  Exceed MSS: Allow

  TCP window size: 65535

  TCP connection idle-timeout: 10

  Time-wait timeout: 5

  Keepalive idle-timeout: 300

  Keepalive retransmission interval: 3

  Keepalive retransmission count: 5

  SYN retransmission-timeout: 5

  Fin-wait1 timeout: 6

  Fin-wait2 timeout: 10

  Src-addr-option:

    Option number: 29

    Encoding: string

  TCP option insert:

    Option number: 28

    Value: src-ip

    Encoding: string

  TCP option remove:

    Option number: 8

  TCP option remove:

    Option number: 5

 

Parameter profile: pp3

  Description:

  Type: HTTP

  Rebalance per request: Enabled

  Server connection reuse: Enabled

  Case insensitive: Enabled

  Header modify per request: Enabled

  Content maximum parse length: 8192

  Header maximum parse length: 8192

  Secondary cookie delimiters: !@#$

  Secondary cookie start: ?

  Encrypted cookie name: cookie1

  Header exceed length: Drop

 

Parameter profile: compress

  Description:

  Type: HTTP compression

  Compression level: 1

  Prefer method: Gzip

  Content length threshold: 1024

  Memory size: 8KB

  Window size: 16KB

  Header Insert: Enabled

  Header Delete: Enabled

  Request version all: Disabled

  Rule 1: Permit url abc

 

Parameter profile: urlstat

  Description:

  Type: HTTP-statistics

  Node: bank1

    Description:

    rule 1 url url1

    rule 2 url url2

  Node: bank2

    Description:

    rule 1 url url3

    rule 2 url url4

  Object group name:

    ObjGrp1

    ObjGrp2

 

Parameter profile: pp4

  Description:

  Type: OneConnect

  Max reuse times: 1000

  Idle time: 10000

  IPv4 source mask length: 24

  IPv6 source prefix length: 120

 

Parameter profile: pp5

  Description:

  Type: TCP-application

  Match-buffer-time: 5

  Match-buffer-size: 4096

  Match-buffer-end: YY

 

Parameter profile: pp6

  Description:

  Type: MySQL

  Pool size: 2000

  Server connection reuse: Enabled

  Max reuse times: 1000

  Idle time: 10000 sec

  IPv4 source mask length: 24

  IPv6 source prefix length: 120

Table 22 Command output

Field

Description

Parameter profile

Parameter profile name.

Description

Description for the parameter profile.

Type

Parameter profile type:

·     IP.

·     HTTP.

·     HTTP-compression.

·     HTTP statistics.

·     MySQL.

·     OneConnect.

·     TCP.

·     TCP-application.

IP ToS

ToS field of the IP packets sent to the server.

Exceed MSS

Action to take on the segments that exceed the MSS in the HTTP requests sent by the client:

·     Allow—Allows the segments to exceed the MSS.

·     Drop—Discards the segments that exceed the MSS.

Rebalance per request

Whether or not to enable load balancing for each HTTP request.

Pool size

Size of the MySQL connection pool.

Server connection reuse

Whether or not to reuse the connection between the LB device and the server.

Header modify per request

Whether or not to perform the insert, delete, or modify operation for the header of each HTTP request or response packet.

Case insensitive

Whether or not to enable case sensitivity for matching character strings.

Content maximum parse length

Maximum length of the HTTP entities that can be parsed.

Header maximum parse length

Maximum length of the HTTP headers that can be parsed.

Secondary cookie delimiters

Delimiters that can separate secondary cookies in URLs.

Secondary cookie start

Start delimiter for secondary cookies in URLs.

Encrypted cookie name

Cookie enabled with encryption.

Header exceed length

Action to take on the HTTP requests or responses when their packet headers exceed the maximum length:

·     Continue—Continues to perform load balancing.

·     Drop—Stops performing load balancing, discards the packet, and terminates the connection.

TCP window size

Maximum local window size for TCP connections.

TCP connection idle-timeout

Idle timeout time for TCP connections, in seconds.

Time-wait timeout

TIME_WAIT state timeout time for TCP connections, in seconds.

Keepalive idle-timeout

Idle timeout time for sending TCP keepalive packets.

Keepalive retransmission interval

Retransmission interval for TCP keepalive packets.

Keepalive retransmission count

Retransmission times for TCP keepalive packets.

SYN retransmission-timeout

Retransmission timeout time for TCP SYN packets

Fin-wait1 timeout

FIN-WAIT-1 state timeout time for TCP connections.

Fin-wait2 timeout

FIN-WAIT-2 state timeout time for TCP connections.

Node

Statistics node name and all URL match rules configured for the statistics node.

Object group name

IP address object groups used by the HTTP statistics parameter profile.

Max reuse times

Maximum number of times a TCP connection can be reused.

Idle time

Idle timeout time for TCP connections, in seconds.

IPv4 source mask length

Mask length for connection reuse.

IPv6 source prefix length

Prefix length for connection reuse.

Match-buffer-time

Buffering period for TCP payload matching, in seconds.

Match-buffer-size

Maximum buffering size for TCP payload matching.

Match-buffer-end

Buffering end string for TCP payload matching.

Src-addr-option

TCP option for SNAT address translation.

Encoding

Encoding mode for the TCP option:

·     binary.

·     string.

TCP option insert

Inserts contents into a TCP option.

Option number

TCP option number

Value

Contents to insert into the TCP option

TCP option remove

Removes a TCP option.

 

display real-server

Use display real-server to display real server information or server farm member information.

Syntax

display real-server [ brief | name real-server-name ]

display real-server server-farm server-farm-name [ name real-server-name port port-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

brief: Displays brief real server information. If you do not specify this keyword, the command displays detailed real server information.

name real-server-name: Displays information about the specified real server. The real-server-name argument specifies a real server name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays information about all real servers.

server-farm server-farm-name: Displays information about members of a server farm. The server-farm-name argument specifies a server farm by its name, a case-insensitive string of 1 to 63 characters.

name real-server-name port port-number: Displays information about a server farm member. The real-server-name argument specifies a server farm member by its name, a case-insensitive string of 1 to 63 characters. The port-number argument specifies the port number of the server farm member, in the range of 0 to 65535. If you do not specify this option, the command displays information about all members of a server farm.

Examples

# Display brief information about all real servers.

<Sysname> display real-server brief

Real server      Address              Port  State     VPN instance     Server farm

rs1              192.168.1.1          0     Active    vpn1             sf

rs2              192.168.1.2          0     Busy                       sf

rs3              192.168.1.3          0     Active                     sf

# Display detailed information about the real server rs.

<Sysname> display real-server name rs

Real server: rs

  Description: Real server RS

  State: Active

  VPN instance:

  Inherit VPN: Enable

  IPv4 address: 1.1.1.1

  IPv6 address: 1001::1

  Port: 0 (port number in original packet)

  Server farm: sf

  Weight: 150

  Priority: 3

  Cost: 100

  Slow shutdown: Enabled

  Connection limit: 10000

  Rate limit:

    Connections: 10000

    Bandwidth: 10000 kbps

    Inbound bandwidth: 5000 kbps

    Outbound bandwidth: 5000 kbps

  Bandwidth busy:

    Max bandwidth: 10000 kbps

    Max inbound bandwidth: 5000 kbps

    Max outbound bandwidth: 5000 kbps

    Busy rate: 80

    Inbound busy rate: 70

    Outbound busy rate: 60

    Busy recovery rate: 60

    Inbound busy recovery rate: 60

    Outbound busy recovery rate: 60

  Probe log: Enabled

  Probe information:

    Dynamic weight: 1

    SNMPDCA busy state: Normal

    Probe success criteria: All

    Probe method                    State

    t4                              Succeeded

    External-monitor method         State

    test_external                   Succeeded

    test_external2                  Succeeded

# Display information about all members of server farm sf.

<Sysname> display real-server server-farm sf

Server farm: sf

  Real server: rs1

    Description: real server 1

    Parent state: Inactive

    State: Inactive

    Port: 2

    Weight: 2

    Priority: 2

    Slow shutdown: Disabled

    Connection limit: --

    Connection rate limit: --

    Probe log: Enabled

    Probe information:

      Probe success criteria: All

      Probe method                       State

      icmp                               Failed

      External-monitor method         State

      test_external                   Succeeded

      test_external2                  Succeeded

 

  Real server: rs2

    Description: real server 2

    Parent state: Inactive

    State: Inactive

    Port: 80

    Weight: 100

    Priority: 4

    Slow shutdown: Disabled

    Connection limit: --

    Connection rate limit: --

    Probe log: Enabled

    Probe information:

      Probe success criteria: All

      Probe method                       State

      tcp                                Failed

    Variable information:

      Variable name: variable

      Variable value: 2

Table 23 Command output

Field

Description

Real server

Real server name.

Address

IPv4 address of the real server.

Port

Port number of the real server. 0 means the port number in the packet is used.

Parent state/State

Real server state/Server farm member state:

·     Active—The real server is available.

·     Busy—The real server is busy. When the real server is in Active or Ramp state and enabled with bandwidth statistics collection and link protection, this field displays Busy if the maximum expected bandwidth is reached.

·     Inactive—The real server is unavailable, because the configuration is not complete, the server is not referenced, or the virtual server is not enabled.

·     Probe-failed—Health monitoring has failed.

·     Ramp—Ramp-up phase of slow online.

·     Shutdown—The real server is shut down.

·     Standby—Standby phase of slow online.

·     Unknown—Health monitoring is not configured.

·     Auto shutdown—The real server is automatically shut down when the RST or zero-window packet threshold is reached or the number of probe times is reached.

VPN instance

VPN instance to which the real server belongs.

Inherit VPN

VPN instance inheritance: Enabled or Disabled.

Server farm

Server farm of the real server.

Description

Description for the real server.

IPv4 address

IPv4 address of the real server.

IPv6 address

IPv6 address of the real server.

Weight

Weight of the real server.

Priority

Priority of the real server.

Cost

Cost for proximity calculation.

Slow shutdown

Slow offline state of the real server:

·     Disabled.

·     Enabled.

Connection limit

Maximum number of connections for the real server.

Connection rate limit

Maximum number of connections per second for the real server.

Rate limit

Rate limit of the real server.

Connections

Maximum number of connections per second for the real server.

Bandwidth

Maximum bandwidth for the real server in kbps.

Inbound bandwidth

Maximum uplink bandwidth for the real server in kbps.

Outbound bandwidth

Maximum downlink bandwidth for the real server in kbps.

Max bandwidth

Maximum expected bandwidth for the real server in kbps.

Max inbound bandwidth

Maximum uplink expected bandwidth for the real server in kbps.

Max outbound bandwidth

Maximum downlink expected bandwidth for the real server in kbps.

Busy rate

Bandwidth ratio for the real server.

Inbound busy rate

Inbound bandwidth ratio for the real server.

Outbound busy rate

Outbound bandwidth ratio for the real server.

Busy recovery rate

Bandwidth recovery ratio for the real server.

Inbound busy recovery rate

Inbound bandwidth recovery ratio for the real server.

Outbound busy recovery rate

Outbound bandwidth recovery ratio for the real server.

Dynamic weight

Dynamic weight calculated by using the dynamic round robin algorithm. This field displays a weight value only if the dynamic round robin algorithm is used. If any other algorithm is used, this field displays two hyphens (--).

SNMPDCA busy state

Busy state obtained by using the dynamic round robin algorithm: Normal or Busy. If the dynamic round robin algorithm is not used, this field displays two hyphens (--).

Probe log

Health monitoring logging state of the real server:

·     Disabled.

·     Enabled.

Probe success criteria

Health monitoring success criteria for the real server:

·     All—Health monitoring succeeds only when all the specified health monitoring methods succeed.

·     At least X—Health monitoring succeeds when a minimum of X health monitoring methods succeed.

Probe method

Name of the NQA template used by the health monitoring method.

State

State of the health monitoring method (custom monitoring or NQA):

·     Failed—Health monitoring has failed.

·     In progress—Health monitoring is in progress.

·     Invalid—Health monitoring is unavailable (because the configuration of the NQA template is not complete), or the real server is unavailable.

·     Succeeded—Health monitoring has succeeded.

External-monitor method

Custom monitoring method.

 

display real-server statistics

Use display real-server statistics to display real server statistics or server farm member statistics.

Syntax

In standalone mode:

display real-server statistics [ name real-server-name ]

display real-server statistics server-farm server-farm-name [ name real-server-name port port-number ]

In IRF mode:

display real-server statistics [ name real-server-name ] [ slot slot-number ]

display real-server statistics server-farm server-farm-name [ name real-server-name port port-number ] [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name real-server-name: Specifies a real server by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays statistics for all real servers.

server-farm server-farm-name: Displays statistics for members of a server farm. The server-farm-name argument specifies a server farm by its name, a case-insensitive string of 1 to 63 characters.

name real-server-name port port-number: Displays statistics for a server farm member. The real-server-name argument specifies a server farm member by its name, a case-insensitive string of 1 to 63 characters. The port-number argument specifies the port number of the server farm member, in the range of 0 to 65535. If you do not specify this option, the command displays statistics for all members of a server farm.

slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays real server statistics for all member devices. (In IRF mode.)

Examples

# Display statistics for the real server rs.

<Sysname> display real-server statistics name rs

Real server: rs

  Total connections: 1798

  Active connections: 788

  Max connections: 803

    recorded at 11:02:49 on Tue May 21 2019

  Connections per second: 157

  Max connections per second: 163

    recorded at 11:02:49 on Tue May 21 2019

  Server input: 333332 bytes

  Server output: 472054 bytes

  Throughput: 4396 bps

  Inbound throughput: 1214 bps

  Outbound throughput: 3128 bps

  Max throughput: 4564 bps

    recorded at 11:02:49 on Tue May 21 2019

  Max inbound throughput: 1214 bps

    recorded at 11:02:49 on Tue May 21 2019

  Max outbound throughput: 3320 bps

    recorded at 11:02:49 on Tue May 21 2019

  Received packets: 1798

  Sent packets: 0

  Dropped packets: 0

  Received requests: 0

  Dropped requests: 0

  Sent responses: 0

  Dropped responses: 0

  Connection failures: 1

  Busy state: Busy

# Display statistics for all members of server farm sf.

<Sysname> display real-server statistics server-farm sf

Server farm: sf

  Real server: rs1

    Total connections: 0

    Active connections: 0

    Max connections: 0

      recorded at 11:02:49 on Tue May 21 2019

    Connections per second: 0

    Max connections per second: 0

      recorded at 11:02:49 on Tue May 21 2019

    Server input: 0 bytes

    Server output: 0 bytes

    Throughput: 0 bps

    Inbound throughput: 0 bps

    Outbound throughput: 0 bps

    Max throughput: 0 bps

      recorded at 11:02:49 on Tue May 21 2019

    Max inbound throughput: 0 bps

      recorded at 11:02:49 on Tue May 21 2019

    Max outbound throughput: 0 bps

      recorded at 11:02:49 on Tue May 21 2019

    Received packets: 0

    Sent packets: 0

    Dropped packets: 0

    Received requests: 0

    Dropped requests: 0

    Sent responses: 0

    Dropped responses: 0

    Connection failures: 0

    RST packets: 50

    Max RST packets: 5000

    RST probe protection times: 3

    Max RST probe protection times: 9

    Zero-window packet rate: 10

    Max zero-window packet rate: 50

    Zero-window probe protection times: 2

    Max zero-window probe protection times: 8

 

  Real server: rs2

    Total connections: 0

    Active connections: 0

    Max connections: 0

      recorded at 11:02:49 on Tue May 21 2019

    Connections per second: 0

    Max connections per second: 0

      recorded at 11:02:49 on Tue May 21 2019

    Server input: 0 bytes

    Server output: 0 bytes

    Throughput: 0 bps

    Inbound throughput: 0 bps

    Outbound throughput: 0 bps

    Max throughput: 0 bps

      recorded at 11:02:49 on Tue May 21 2019

    Max inbound throughput: 0 bps

      recorded at 11:02:49 on Tue May 21 2019

    Max outbound throughput: 0 bps

      recorded at 11:02:49 on Tue May 21 2019

    Received packets: 0

    Sent packets: 0

    Dropped packets: 0

    Received requests: 0

    Dropped requests: 0

    Sent responses: 0

    Dropped responses: 0

    Connection failures: 0

    RST packets: 50

    Max RST packets: 5000

    RST probe protection times: 3

    Max RST probe protection times: 9

    Zero-window packet rate: 10

    Max zero-window packet rate: 50

    Zero-window probe protection times: 2

    Max zero-window probe protection times: 8

    Abnormal URL times: 10

    Max abnormal URL times: 20

Table 24 Command output

Field

Description

Real server

Real server name.

Total connections

Total number of connections.

Active connections

Number of active connections.

Max connections

Maximum number of connections.

Connections per second

Number of connections per second.

Max connections per second

Maximum number of connections per second.

Server input

Traffic (in bytes) received by the server.

Server output

Traffic (in bytes) sent by the server.

Throughput

Total packet throughput in bps.

Inbound throughput

Inbound packet throughput in bps.

Outbound throughput

Outbound packet throughput in bps.

Max throughput

Maximum packet throughput in bps.

Max inbound throughput

Maximum inbound packet throughput in bps.

Max outbound throughput

Maximum outbound packet throughput in bps.

Received packets

Number of received packets.

Sent packets

Number of sent packets.

Dropped packets

Number of dropped packets.

Received requests

Number of received HTTP request packets. This field is displayed only for Layer 7 real servers.

Dropped requests

Number of dropped HTTP request packets. This field is displayed only for Layer 7 real servers.

Sent responses

Number of sent HTTP response packets. This field is displayed only for Layer 7 real servers.

Dropped responses

Number of dropped HTTP response packets. This field is displayed only for Layer 7 real servers.

Connection failures

Number of connection establishment failures.

Busy state

Real server state:

·     --—Unavailable.

·     Normal.

·     Busy.

RST packets

Number of RST packets sent by the real server.

Max RST packets

Maximum number of RST packets sent by the real server.

RST probe protection times

Number of probe times for the RST LB probe template.

Max RST probe protection times

Maximum number of probe times for the RST LB probe template.

Zero-window packet rate

Percentage of zero-window packets sent by the real server.

Max zero-window packet rate

Maximum percentage of zero-window packets sent by the real server.

Zero-window probe protection times

Number of probe times for the zero-window LB probe template.

Max zero-window probe protection times

Maximum number of probe times for the zero-window LB probe template.

Abnormal URL times

Number of URL error times during the current monitoring time

Max abnormal URL times

Maximum number of URL error times.

 

Related commands

reset real-server statistics

display server-farm

Use display server-farm to display server farm information.

Syntax

display server-farm [ brief | name server-farm-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

brief: Displays brief server farm information. If you do not specify this keyword, the command displays detailed server farm information.

name server-farm-name: Displays information about the specified server farm. The server-farm-name argument specifies a server farm name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays information about all server farms.

Examples

# Display brief information about all server farms.

<Sysname> display server-farm brief

Predictor: RR - Round robin, RD - Random, LC - Least connection,

           BW – Bandwidth, MBW – Max bandwidth,

           IBW – Inbound bandwidth, OBW – Outbound bandwidth,

           MIBW – Max inbound bandwidth, MOBW – Max outbound bandwidth,

           HASH(SIP) - Hash address source IP,

           HASH(DIP) - Hash address destination IP,

           HASH(SIP-PORT) - Hash address source IP-port

           LT - Least time, DRR - Dynamic round robin

           CARP(SIP) - CARP address source IP

           CARP(DIP) - CARP address destination IP

           CARP(SIP-PORT) - CARP address source IP-port

           CARP(HTTP) - CARP HTTP payload

           HASH(HTTP) - Hash HTTP payload

NAT/SNAT: Y - Enabled, N - Disabled

 

Server farm       Predictor       NAT  SNAT  Total  Active

sf                RR              Y    N     3      3

# Display detailed information about all server farms.

<Sysname> display server-farm

Server farm: sf1

  Description:

  Predictor: Hash address

  Proximity: Disabled

  NAT: Enabled

  SNAT mode: snat-pool sp

  Failed action: Keep

  Active threshold: Enabled

    Lower: 80

    Upper: 90

  Slow-online: Enabled

  Standby time: 5s

  Ramp-up time: 10s

  Selected server: Enabled

    Min server: 100

    Max server: 600

  Busy action: Enqueue

    Queue length: 11

    Queue timeout: 12

  Probe information:

    Probe success criteria: All

    Probe method:

    aaa

    bbb

    ccc

  TCP RST probe template: aaa

  TCP zero-window probe template: bbb

  HTTP passive probe template: ccc

  Auto-shutdown recovery time: 30

  Total real server: 1

  Active real server: 1

  Real server list:

  Name      State         VPN instance     Address    Port  Weight Priority  LT-weight

  rs1       Inactive                       1.2.3.4    0     4      100       50

  rs2       Auto shutdown                  1.2.3.4    0     4      100       50

Table 25 Command output

Field

Description

Server farm

Server farm name.

Predictor

Scheduling algorithm of the server farm:

·     RR—Weighted round robin algorithm.

·     RD—Random algorithm.

·     LC—Weighted least connection algorithm.

·     BW—Bandwidth algorithm.

·     IBW—Inbound bandwidth algorithm.

·     OBW—Outbound bandwidth algorithm.

·     MBW—Maximum bandwidth algorithm.

·     MIBW—Maximum inbound bandwidth algorithm.

·     MOBW—Maximum outbound bandwidth algorithm.

·     HASH(SIP)—Hash algorithm based on source IP address.

·     HASH(DIP)—Hash algorithm based on destination IP address.

·     HASH(SIP-PORT)—Hash algorithm based on source IP address and port number.

·     LT—Least time algorithm.

·     DRR—Dynamic round robin algorithm.

·     CARP(SIP)—CARP hash algorithm based on source IP address.

·     CARP(DIP)—CARP hash algorithm based on destination IP address.

·     CARP(SIP-PORT)—CARP hash algorithm based on source IP address and port number.

·     CARP(HTTP)—CARP hash algorithm based on HTTP content.

·     HASH(HTTP)—Hash algorithm based on HTTP content.

NAT

NAT state of the server farm:

·     N—Disabled.

·     Y—Enabled.

SNAT

SNAT state of the server farm:

·     N—Disabled.

·     Y—Enabled.

Total

Total number of real servers.

Active

Number of active real servers.

Description

Description for the server farm.

Proximity

Proximity state of the server farm:

·     Disabled.

·     Enabled.

NAT

NAT state of the server farm:

·     Disabled—NAT is not configured.

·     Enabled.

SNAT mode

SNAT translation mode:

·     auto-map—Automatic mapping mode.

·     tcp-option—TCP option mode.

·     snat-pool—SNAT pool mode, which uses the SNAT address pool (specified by its name) to perform address translation.

Failed action

Fault processing method of the server farm:

·     Keep—Keeps existing connections.

·     Reschedule—Redirects connections.

·     Reset—Terminates existing connections.

Active threshold

State of the criteria to determine that the server farm is available: disabled or enabled. If the state is enabled, the following fields are displayed: 

·     Lower—Lower percentage value.

·     Upper—Upper percentage value.

Slow-online

State of the slow online feature: disabled or enabled. If the state is enabled, the following fields are displayed:

·     Standby time.

·     Ramp-up time.

Selected server

State of real server limit to participate in scheduling: disabled or enabled. If the state is enabled, the following fields are displayed:

·     Min server—Minimum number of real servers that participate in scheduling.

·     Max server—Maximum number of real servers that participate in scheduling.

Probe success criteria

Health monitoring success criteria for the real server:

·     All—Health monitoring succeeds only when all the specified health monitoring methods succeed.

·     At least—Health monitoring succeeds when a specified minimum number of health monitoring methods succeed.

Busy action

Action to take when the server farm is busy:

·     Drop.

·     Enqueue.

·     Force.

Queue length

This field is displayed only if the busy action is Enqueue.

Queue timeout

This field is displayed only if the busy action is Enqueue.

Probe method

Name of the NQA template used by the health monitoring method.

Total real server

Total number of real servers.

Active real server

Number of active real servers.

Name

Real server name.

State

Real server state:

·     Active—The real server is available.

·     Busy—The real server is busy. When the real server is in Active or Ramp state and enabled with bandwidth statistics collection and link protection, this field displays Busy if the maximum expected bandwidth is reached.

·     Inactive—The real server is unavailable, because the configuration is not complete, the server is not referenced, or the virtual server is not enabled.

·     Probe-failed—Health monitoring has failed.

·     Ramp—Ramp-up phase of slow online.

·     Shutdown—The real server is shut down.

·     Standby—Standby phase of slow online.

·     Unknown—Health monitoring is not configured.

·     Auto shutdown—The real server is automatically shut down when the RST or zero-window packet threshold is reached or the number of probe times is reached.

Address

IPv4 and IPv6 addresses of the real server.

Port

Port number of the real server.

Weight

Weight of the real server.

Priority

Priority of the real server.

LT-weight

Weight calculated by using the least time algorithm. This field displays a weight value only if the least time algorithm is used. If any other algorithm is used, this field displays two hyphens (--).

TCP RST probe template

TCP-RST LB probe template referenced by the server farm.

This field is displayed only if a TCP-RST LB probe template is referenced.

TCP zero-window probe template

TCP zero-window LB probe template referenced by the server farm.

This field is displayed only if a TCP zero-window LB probe template is referenced.

HTTP passive probe template

HTTP passive LB probe template referenced by the server farm.

This field is displayed only if an HTTP passive LB probe template is referenced.

Auto-shutdown recovery time

Automatic recovery time for intelligent monitoring, in minutes.

 

display sticky

Use display sticky to display sticky entry information.

Syntax

In standalone mode:

display sticky { dns-proxy [ dns-proxy-name ] | virtual-server [ virtual-server-name ] } [ class class-name | default-class | default-dns-server-pool | default-link-group | default-server-farm | read-server-farm | write-server-farm ]

In IRF mode:

display sticky { dns-proxy [ dns-proxy-name ] | virtual-server [ virtual-server-name ] } [ class class-name | default-class | default-dns-server-pool | default-link-group | default-server-farm | read-server-farm | write-server-farm ] [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

dns-proxy dns-proxy-name: Specifies a transparent DNS proxy by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays sticky entry information for all transparent DNS proxies.

virtual-server virtual-server-name: Specifies a virtual server by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays sticky entry information for all virtual servers.

class class-name: Specifies an LB class by its name, a case-insensitive string of 1 to 63 characters.

default-class: Specifies the default LB action.

default-dns-server-pool: Specifies the default DNS server pool.

default-link-group: Specifies the default link group.

default-server-farm: Specifies the default server farm.

read-server-farm: Specifies the read server farm.

write-server-farm: Specifies the write server farm.

slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays sticky entry information for all member devices. (In IRF mode.)

Examples

# Display sticky entry information for all virtual services.

<Sysname> display sticky virtual-server

Virtual server name: vs

  Sticky zone type: Default server farm

  Sticky group name: sg

  Sticky method: HTTP passive

  Timeout: 3600

Sticky entry                     Real server           Expired time Count

--------------------------------------------------------------------------------

name12                           192.168.1.10/0        3600         1

f03aa696c69dfac46ae719b1f53db5a9

name34                           192.168.1.10/0        3600         1

58048c6df1835776d228160224a56942

name56                           192.168.1.10/0        3600         1

1907742e51f5b0d6aef9a70fe1288ff2

Virtual server name: vs1

  Sticky zone type: Class

  Class name: lbc1

  Sticky group name: sg1

  Sticky method: Source IP and port

  Timeout: 60

Sticky entry                      Real server           Expired time Count

-----------------------------------------------------------------------------

192.168.6.206/1566                192.168.6.206/0       53           0

192.168.6.206/1567                192.168.6.206/0       56           0

Virtual server name: vs2

  Sticky zone type: Default class

  Class name:

  Sticky group name: sg2

  Sticky method: Payload

  Cookie domain: test.com

  Cookie path: /test1

  HttpOnly: Enabled

  Secure: Enabled

  Timeout: 60

Sticky entry                     Real server           Expired time Count

------------------------------------------------------------------------------

\12\22\07\07\08\00               81.8.8.3/0            604751       0

7222bd4ace193907d5d6a2bbc37953f3

Virtual server name: vs3

  Sticky zone type: Default server farm

  Class name:

  Sticky group name: sg3

  Sticky method: HTTP version

  Timeout: 60

Sticky entry                      Real server           Expired time Count

-----------------------------------------------------------------------------

1.0                              192.168.6.206/0       109          0

1.1                              192.168.6.206/0       97           0

0.9                              192.168.6.206/0       116          0

Virtual server name: vs4

  Sticky zone type: Read server farm

  Class name:

  Sticky group name: sg6

  Sticky method: Both IP and port

  Timeout: 60

Sticky entry                      Real server          Expired time Count

-----------------------------------------------------------------------------

192.168.56.0/3306                192.168.6.206/0       109          1

Virtual server name: vs6

  Sticky zone type: Write server farm

  Class name:

  Sticky group name: sg6

  Sticky method: Both IP and port

  Timeout: 60

Sticky entry                      Real server          Expired time Count

-----------------------------------------------------------------------------

192.168.56.0/3306                192.168.7.206/0       110          1

Virtual server name: vs5

  Sticky zone type: Default link group

  Class name:

  Sticky group name: sg3

  Sticky method: Both IP and port

  Timeout: 60

Sticky entry                      Link                  Expired time Count

-----------------------------------------------------------------------------

192.168.6.206/2606                Dialer0               57           0

192.168.6.40/80

192.168.6.206/2605                192.168.6.206/0       55           0

192.168.6.40/80

Virtual server name: vs6

  Sticky zone type: Default server farm

  Sticky group name: sg5

  Sticky method: Cookie Insert

  Cookie name: X-LB

  Timeout: 86400

Real server                              Port        Cookie

--------------------------------------------------------------------------------

rs                                       80          2.1.e.5f0fa63c.50

rs1                                      80          2.2.f.e732c79.50

rs1                                      65535       2.3.10.e732c79.ffff

# Display sticky entry information for all transparent DNS proxies.

<Sysname> display sticky dns-proxy

DNS proxy name: dns-proxy1

  Sticky zone type: Default DNS server pool

  Sticky group name: st

  Sticky method: Source IP

  Timeout: 60

Sticky entry               DNS server           Expired time   Count

--------------------------------------------------------------------

192.168.6.206/2606         192.168.6.206/0      57             0

DNS proxy name: dns-proxy2

  Sticky zone type: Class

  Class name: class

  Sticky group name: sg2

  Sticky method: Payload

  Timeout: 60

Sticky entry               DNS server          Expired time   Count

-------------------------------------------------------------------

192.168.6.206/2606         192.168.6.206/0     57             0

DNS proxy name: dns-proxy3

  Sticky zone type: Default class

  Sticky group name: sg3

  Sticky method: Both IP and port

  Timeout: 60

Sticky entry               DNS server         Expired time    Count

-------------------------------------------------------------------

192.168.6.206/2606         192.168.6.206/0    57              0

Table 26 Command output

Field

Description

Sticky zone type

Sticky entry source:

·     Class—Generated by the class and action in the policy referenced by the virtual service.

·     Default class—Generated by the default action in the policy referenced by the virtual service.

·     Default DNS server pool—Generated by the default DNS server pool of the transparent DNS proxy.

·     Default link group—Generated by the default primary or backup link group of the virtual server.

·     Default server farm—Generated by the default primary or backup server farm of the virtual server.

·     Read server farm—Generated by the read server farm of the virtual server.

·     Write server farm—Generated by the write server farm of the virtual server.

Class name

LB class name. The LB class name is displayed only when the sticky entries are generated by the class and action.

Sticky group name

Name of the sticky group that generates the sticky entries.

Sticky method

Sticky method corresponding to the sticky entries:

·     Source IP—Source IPv4 address sticky method.

·     Source IPv6—Source IPv6 address sticky method.

·     Source IP and port—Source IPv4 address + source port sticky method.

·     Source IPv6 and port—Source IPv6 address + source port sticky method.

·     Destination IP—Destination IPv4 address sticky method.

·     Destination IPv6—Destination IPv6 address sticky method.

·     Destination IP and port—Destination IPv4 address + destination port sticky method.

·     Destination IPv6 and port—Destination IPv6 address + destination port sticky method.

·     Both IP—Source IPv4 address + destination IPv4 address sticky method.

·     Both IPv6—Source IPv6 address + destination IPv6 address sticky method.

·     Both IP and port—Source IPv4 address + source port + destination IPv4 address + destination port sticky method.

·     Both IPv6 and port—Source IPv6 address + source port + destination IPv6 address + destination port sticky method.

·     HTTP URL—HTTP URL based sticky method.

·     HTTP header name—HTTP header name based sticky method.

·     HTTP version—HTTP version based sticky method.

·     HTTP host—HTTP host based sticky method.

·     HTTP method—HTTP Request-Method based sticky method.

·     HTTP content—HTTP entity sticky method.

·     Cookie insert—HTTP cookie insert sticky method.

·     Cookie rewrite—HTTP cookie rewrite sticky method.

·     Cookie get—HTTP cookie get sticky method.

·     Payload—HTTP or UDP payload sticky method.

·     HTTP passive—HTTP passive sticky method.

·     Payload passive—UDP payload passive sticky method.

·     TCP payload—TCP payload sticky method.

·     Framed-IP-Address—Sticky method based on the Framed-IP-Address attribute of RADIUS packets.

·     User-Name—Sticky method based on the User-Name attribute of RADIUS packets.

·     Code=attribute-code—Sticky method based on the attribute (specified by attribute-code) of RADIUS packets.

·     SIP Call-ID—Sticky method based on the Call-ID header field of SIP packets.

·     SSL session ID—SSL sticky method based on SSL session ID.

Cookie domain

Domain scope of the cookie. This field is displayed only for the HTTP cookie insert sticky method.

Cookie path

Path scope of the cookie. This field is displayed only for the HTTP cookie insert sticky method.

HttpOnly

HttpOnly attribute of the cookie. This field is displayed only for the HTTP cookie insert or cookie rewrite sticky method.

Secure

Secure attribute of the cookie. This field is displayed only for the HTTP cookie insert or cookie rewrite sticky method.

Timeout

Timeout time of the sticky entries, in seconds.

Sticky entry

Key value corresponding to the sticky entry.

DNS server

IP address and port number of the DNS server.

Real server

IP address and port number of the real server. For the Layer 7 sticky method, if both IPv4 and IPv6 addresses are configured for the real server, both addresses are displayed.

Port

Port number of the real server.

Link

Outbound next hop IP address and port number of the link or outgoing interface of the link.

Expired time

Remaining lifetime of the sticky entry. If the reference count is not 0, the configured value is displayed.

Count

Reference count of the sticky entry.

 

display sticky-group

Use display sticky-group to display sticky group information.

Syntax

display sticky-group [ name group-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name group-name: Specifies a sticky group by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays information about all sticky groups.

Examples

# Display information about all sticky groups.

<Sysname> display sticky-group

Sticky group: sg1

  Description:

  Timeout: 60

  Override limit: Disabled

  Stickiness-over-busyness: Enabled

  Sticky group type: Address-port

    Method: Both IP and port

      Mask: 32

 

Sticky group: sg2

  Description:

  Timeout: 60

  Override limit: Disabled

  Stickiness-over-busyness: Enabled

  Sticky group type: HTTP header

    Method: HTTP header name

      Name: accept-encoding

      Offset: 4

      Start: gzip

      Length: 10

 

Sticky group: sg3

  Description:

  Timeout: 60

  Override limit: Disabled

  Stickiness-over-busyness: Enabled

  Sticky group type: RADIUS

    Method: User-Name

 

Sticky group: sg4

  Description:

  Timeout: 86400

  Override limit: Disabled

  Stickiness-over-busyness: Disabled

  Sticky group type: HTTP cookie

    Method: HTTP cookie insert

      Name: X-LB

      Domain: test.com

      Path: /test1

      HttpOnly: Enabled

      Secure: Enabled

  Check all packets: Disabled

Table 27 Command output

Field

Description

Sticky group

Sticky group name.

Description

Description for the sticky group.

Timeout

Timeout time for sticky entries in seconds. The value Infinite indicates that sticky entries never age out.

Override limit

Whether the feature of ignoring the limits for sessions that match sticky entries is enabled: Enabled or Disabled.

Stickiness-over-busyness

Whether the stickiness-over-busyness feature is enabled: Enabled or Disabled.

Sticky group type

Sticky group type:

·     Address-port—Address and port.

·     HTTP content—HTTP entity.

·     HTTP cookie.

·     HTTP header.

·     HTTP passive.

·     Payload—HTTP or UDP payload.

·     RADIUS.

·     SIP.

·     SSL.

·     UDP passive.

·     TCP payload.

 

Table 28 Detailed information for sticky groups

Sticky group type

Field

Description

Address-port

Method

Sticky method:

·     Source IP—Source IPv4 address sticky method.

·     Source IPv6—Source IPv6 address sticky method.

·     Source IP and port—Source IPv4 address + source port sticky method.

·     Source IPv6 and port—Source IPv6 address + source port sticky method.

·     Destination IP—Destination IPv4 address sticky method.

·     Destination IPv6—Destination IPv6 address sticky method.

·     Destination IP and port—Destination IPv4 address + destination port sticky method.

·     Destination IPv6 and port—Destination IPv6 address + destination port sticky method.

·     Both IP—Source IPv4 address + destination IPv4 address sticky method.

·     Both IPv6—Source IPv6 address + destination IPv6 address sticky method.

·     Both IP and port—Source IPv4 address + source port + destination IPv4 address + destination port sticky method.

·     Both IPv6 and port—Source IPv6 address + source port + destination IPv6 address + destination port sticky method.

Mask

Mask length for the sticky method. This field is displayed only for IPv4 sticky methods.

Prefix

Prefix length for the sticky method. This field is displayed only for IPv6 sticky methods.

HTTP content

Offset

Offset value of the entity based on the start of the HTTP packet.

Start

Regular expression that marks the start of the entity.

End

Regular expression that marks the end of the entity. Either this field or the Length field is displayed, but not both of them.

Length

Length of the entity. Either this field or the End field is displayed, but not both of them.

HTTP cookie

Method

Sticky method:

·     HTTP cookie insert—Cookie insert sticky method.

·     HTTP cookie rewrite—Cookie rewrite sticky method.

·     HTTP cookie get—Cookie get sticky method.

This field is displayed only for the HTTP cookie sticky method.

Name

HTTP cookie name. This field is displayed only for the HTTP cookie sticky method.

Domain

Domain scope of the cookie. This field is displayed only for the HTTP cookie insert sticky method.

Path

Path scope of the cookie. This field is displayed only for the HTTP cookie insert sticky method.

Offset

Offset value based on the start of the cookie value. This field is displayed only for the cookie insert sticky method.

Start

Regular expression that marks the start of the cookie. This field is displayed only for the cookie insert sticky method.

End

Regular expression that marks the end of the cookie. Either this field or the Length field is displayed, but not both of them. This field is displayed only for the cookie insert sticky method.

Length

Length of the cookie. Either this field or the End field is displayed, but not both of them. This field is displayed only for the cookie insert sticky method.

Cookie secondary name

Name of the secondary cookie to be searched in the URI. This field is displayed only for the cookie insert sticky method.

HttpOnly

HttpOnly attribute of the cookie. This field is displayed only for the HTTP cookie insert or cookie rewrite sticky method.

Secure

Secure attribute of the cookie. This field is displayed only for the HTTP cookie insert or cookie rewrite sticky method.

Check all packets

Whether or not to enable checking for all packets.

HTTP header

Method

Sticky method:

·     HTTP host—HTTP host based sticky method.

·     HTTP header name—HTTP header name based sticky method.

·     HTTP method—HTTP Request-Method based sticky method.

·     HTTP URL—HTTP URL based sticky method.

·     HTTP version—HTTP version based sticky method.

This field is displayed only for the HTTP header sticky method.

Name

HTTP header name. This field is displayed only for the HTTP header name based sticky method.

Offset

Offset value of the HTTP header based on the start of the HTTP packet. This field is displayed only for the HTTP host or URL based sticky method.

Start

Regular expression that marks the start of the HTTP header. This field is displayed only for the HTTP host or URL based sticky method.

End

Regular expression that marks the end of the HTTP header. Either this field or the Length field is displayed, but not both of them. This field is displayed only for the HTTP host or URL based sticky method.

Length

Length of the HTTP header. Either this field or the End field is displayed, but not both of them. This field is displayed only for the HTTP host or URL based sticky method.

Payload

Offset

Offset value of the HTTP or UDP payload based on the start of the HTTP packet.

Start

Regular expression that marks the start of the HTTP or UDP payload.

End

Regular expression that marks the end of the HTTP or UDP payload. Either this field or the Length field is displayed, but not both of them. .

Length

Length of the HTTP or UDP payload. Either this field or the End field is displayed, but not both of them.

RADIUS

Method

Sticky method:

·     Framed-IP-Address—Sticky method based on the Framed-IP-Address attribute of RADIUS packets.

·     User-Name—Sticky method based on the User-Name attribute of RADIUS packets.

·     Code=attribute-code—Sticky method based on the attribute (specified by attribute-code) of RADIUS packets.

This field is not displayed if no RADIUS attribute based sticky method is specified.

SIP

Method

Sticky method, which can only be SIP Call-ID (SIP sticky method based on the Call-ID header field of SIP packets).

SSL

Method

Sticky method, which can only be SSL session ID (SSL sticky method based on SSL session ID). This field is displayed only for the SSL sticky method based on SSL session ID.

HTTP passive

Method

Sticky method:

·     HTTP header name—HTTP header name sticky method.

·     HTTP URL—HTTP URL sticky method.

·     HTTP content—HTTP content sticky method.

Get

Obtains the specified string in HTTP responses.

Match

Matches the specified string in HTTP requests.

Name

HTTP header name. This field is displayed only for the HTTP header name based sticky method.

Start

Regular expression that marks the start of the HTTP header.

End

Regular expression that marks the end of the HTTP header. Either this field or the Length field is displayed, but not both of them.

Length

Length of the HTTP header. Either this field or the End field is displayed, but not both of them.

UDP passive

Get

Obtains the specified string in UDP responses.

Match

Matches the specified string in UDP requests.

Start

Regular expression that marks the start of the UDP payload.

End

Regular expression that marks the end of the UDP payload. Either this field or the Length field is displayed, but not both of them.

Length

Length of the UDP payload. Either this field or the End field is displayed, but not both of them.

TCP payload

Offset

Offset value of the TCP payload based on the start of the TCP packet.

Start

Regular expression that marks the start of the TCP payload.

End

Regular expression that marks the end of the TCP payload. Either this field or the Length field is displayed, but not both of them.

Length

Length of the TCP payload. Either this field or the End field is displayed, but not both of them.

 

display virtual-server

Use display virtual-server to display virtual server information.

Syntax

display virtual-server [ brief | name virtual-server-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

brief: Displays brief virtual server information. If you do not specify this keyword, the command displays detailed virtual server information.

name virtual-server-name: Displays information about the specified virtual server. The virtual-server-name argument specifies a virtual server name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays information about all virtual servers.

Examples

# Display brief information about all virtual servers.

<Sysname> display virtual-server brief

Virtual server   State    Type      VPN instance     Virtual address     Port

vs1              Inactive IP        vpn1             192.168.21.148/32   80

                                                     1111:2222:3333:4444

                                                     :5555:6666:7777:888

                                                     8/128

vs2              Active   HTTP                       61.159.4.100/32     8080

vs3              Active   LINK-IP                    51.139.4.100/32     0

vs4              Active   MySQL                      12.139.5.132/32     3306

# Display detailed information about all virtual servers.

<Sysname> display virtual-server

Virtual server: vs

  Description: Virtual server VS

  Type: HTTP

  State: Active

  VPN instance: vpn1

  Virtual IPv4 address: 1.1.1.1/32

  Virtual IPv6 address: 1001::1/128

  Port: 0 (any port)

  Primary server farm: sf (in use)

  Backup server farm: sfb

  Primary sticky: sg3

  Backup sticky: sg4

  LB policy: lbp2

  LB limit-policy:

  TCP parameter profile (client-side): ptc

  TCP parameter profile (server-side): pts

  HTTP parameter profile: pp1

  HTTP-statistics parameter profile: 1

  OneConnect parameter profile: one

  UDP per-packet: Enabled

  Connection limit: 10000

  Rate limit:

    Connections: 10000

    Bandwidth: 10000 kbps

    Inbound bandwidth: 5000 kbps

    Outbound bandwidth: 5000 kbps

  SSL server policy: ssl-server

  SSL client policy: ssl-client

  Redirect relocation:

  Redirect return-code: 302

  VRRP Info:

    VRRP VRID: 1

    Interface: GigabitEthernet1/0

  Sticky: test

  Sticky synchronization: Disabled

  Bandwidth busy protection: Disabled

  Interface bandwidth statistics: Disabled

  Route advertisement: Enabled

  ARP/ND interfaces:

    GigabitEthernet1/0

    GigabitEthernet2/0

  HTTP protection policy: p1

  Customlog content: %{is};%{ps}

 

Virtual server: vstcp

  Description: Virtual server VS

  Type: TCP

  State: Active

  VPN instance: vpn1

  Virtual IPv4 address: 1.1.1.1/32

  Virtual IPv6 address: 1001::1/128

  Port: 8080

  Primary server farm: sf (in use)

  Backup server farm: sfb

  Sticky: sg3

  LB policy: lbp2

  LB limit-policy:

  TCP parameter profile (client-side): ptc

  TCP parameter profile (server-side): pts

  TCP-Application parameter profile: ptapp

  Connection limit: 10000

  Rate limit:

    Connections: 10000

    Bandwidth: 10000 kbps

    Inbound bandwidth: 5000 kbps

    Outbound bandwidth: 5000 kbps

  SSL server policy: ssl-server

  Sticky synchronization: Disabled

  Bandwidth busy protection: Disabled

  Interface bandwidth statistics: Disabled

  Route advertisement: Enabled

  Application-Mode: Enabled

  ARP/ND interfaces:

    GigabitEthernet1/0

    GigabitEthernet2/0

# Display detailed information about the virtual server lk.

<Sysname> display virtual-server name lk

Virtual server: lk

  Description:

  Type: Link-IP

  State: Active

  VPN instance: vpn1

  Virtual IPv4 address: 1.1.1.1/32

  Virtual IPv6 address: 1001::1/128

  Port: 0

  Primary link group: lg1 (in use)

  Backup link group: lg2

  Sticky: sg3

  LB policy: lbp2

  LB limit-policy:

  Connection limit: 10000

  Rate limit:

    Connections: 10000

    Bandwidth: 10000 kbps

    Inbound bandwidth: 5000 kbps

    Outbound bandwidth: 5000 kbps

  Connection synchronization: Disabled

  Sticky synchronization: Disabled

  Bandwidth busy protection: Disabled

  Interface bandwidth statistics: Disabled

  Route advertisement: Disabled

  ARP/ND interfaces:

    GigabitEthernet1/0

# Display detailed information about the virtual server vs4.

<Sysname> display virtual-server name vs4

Virtual server: vs4

  Description: Virtual server VS4

  Type: MySQL

  State: Active

  VPN instance: vpn1

  Virtual IPv4 address: 1.1.1.1/32

  Virtual IPv6 address: 1001::1/128

  Port: 3306

  Primary server farm: sf (in use)

  Backup server farm: sfb

  Sticky: sg3

  LB policy: lbp2

  LB limit-policy:

  MySQL parameter profile: my

  Connection limit: 10000

  Rate limit:

    Connections: 10000

    Bandwidth: 10000 kbps

    Inbound bandwidth: 5000 kbps

    Outbound bandwidth: 5000 kbps

  Sticky synchronization: Disabled

  Bandwidth busy protection: Disabled

  Interface bandwidth statistics: Disabled

  Route advertisement: Enabled

  ARP/ND interfaces:

    GigabitEthernet1/0

    GigabitEthernet1/0

  Version: 5.6

  User list:

    Username: wangping

    Username: liqiang

  Read server farm: rd

  Read sticky group: rsg

  Write server farm: wr

  Write sticky group: wsg

Table 29 Command output

Field

Description

Virtual server

Virtual server name.

State

Virtual server state:

·     Active—The virtual server is available.

·     Inactive—The virtual server is unavailable.

·     Inactive (disabled)—The virtual server is unavailable because the virtual server is disabled.

Type

Virtual server type: Fast HTTP, HTTP, IP, MySQL, RADIUS, TCP, UDP, or link-IP.

VPN instance

Name of the VPN instance to which the virtual server belongs.

Virtual address

IPv4 address and mask of the virtual server.

Port

Port number of the virtual server. 0 means any port.

Description

Description of the virtual server.

Virtual IPv4 address

IPv4 address and mask of the virtual server.

Virtual IPv6 address

IPv6 address and prefix of the virtual server.

Primary server farm

Default primary server farm name. (in use) indicates the server farm is in use.

Backup server farm

Default backup server farm name. (in use) indicates the server farm is in use.

Primary link group

Default primary link group name. (in use) indicates the link group is in use.

Backup link group

Default backup link group name. (in use) indicates the link group is in use.

Primary sticky

Default primary sticky group name.

Backup sticky

Backup sticky group name. This field is displayed only for HTTP and RADIUS virtual servers.

LB policy

LB policy referenced by the virtual server.

HTTP parameter profile

HTTP parameter profile referenced by the virtual server. This field is displayed only if an HTTP parameter profile is configured.

IP parameter profile

IP parameter profile referenced by the virtual server. This field is displayed only if an IP parameter profile is configured.

TCP parameter profile

TCP parameter profile referenced by the virtual server. This field is displayed only if a TCP parameter profile is configured.

TCP parameter profile (client-side)

Client-side TCP parameter profile referenced by the virtual server. This field is displayed only if a client-side TCP parameter profile is configured.

TCP parameter profile (server-side)

Server-side TCP parameter profile referenced by the virtual server. This field is displayed only if a server-side TCP parameter profile is configured.

OneConnect parameter profile

OneConnect parameter profile referenced by the virtual server. This field is displayed only if a OneConnect parameter profile is configured.

HTTP-statistics parameter profile

HTTP statistics parameter profile referenced by the virtual server. This field is displayed only if an HTTP statistics parameter profile is configured.

TCP-Application parameter profile

TCP-application parameter profile referenced by the virtual server. This field is displayed only if a TCP-application parameter profile is configured.

MySQL parameter profile

MySQL parameter profile referenced by the virtual server. This field is displayed only if a MySQL parameter profile is configured.

UDP per-packet

State of the per-packet load balancing for UDP traffic:

·     Disabled.

·     Enabled.

This field is displayed only for UDP virtual servers.

Connection limit

Maximum number of connections of the virtual server.

Rate limit

Rate limit of the virtual server.

Connections

Maximum number of connections per second of the virtual server.

Bandwidth

Maximum bandwidth for the virtual server in kbps.

Inbound bandwidth

Maximum inbound bandwidth for the virtual server in kbps.

Outbound bandwidth

Maximum outbound bandwidth for the virtual server in kbps.

SSL server policy

SSL server policy name. This field is displayed only for HTTP-type virtual servers.

SSL client policy

SSL client policy name. This field is displayed only for HTTP-type virtual servers.

Redirect relocation

Redirection URL. This field is displayed only for HTTP-type virtual servers.

Redirect return-code

Status code in the redirection packets. This field is displayed only for HTTP-type virtual servers.

VRRP VRID

Virtual router ID of the VRRP group bound to the virtual server.

VRRP interface

Interface on which the VRRP group bound to the virtual server is created.

Sticky

Sticky group for the virtual server. This field is displayed only for HTTP-type virtual servers.

Connection synchronization

Session extension information synchronization state: Enabled or Disabled.

This field is not displayed for HTTP-type virtual servers.

Sticky synchronization

Sticky entry synchronization state: Enabled or Disabled.

Bandwidth busy protection

Link protection state: Enabled or Disabled.

Interface bandwidth statistics

Bandwidth statistics collection by interfaces: Disabled or Enabled.

Route advertisement

IP address advertisement for the virtual server: Disabled or Enabled.

Application-Mode

Layer 7 operating mode for the virtual server: Disabled or Enabled.

This field is displayed only for a TCP virtual server.

ARP/ND interfaces

Interfaces from which gratuitous ARP packets and ND packets are sent out.

Version

MySQL database version.

This field is displayed only for a MySQL virtual server.

User list

List of users logged in to the MySQL database.

This field is displayed only for a MySQL virtual server.

Username

Username used to log in to the MySQL database.

This field is displayed only for a MySQL virtual server.

Read server farm

Read server farm referenced by the MySQL virtual server.

This field is displayed only for a MySQL virtual server.

Read sticky group

Sticky group associated with the read server farm.

This field is displayed only for a MySQL virtual server.

Write server farm

Write server farm referenced by the MySQL virtual server.

This field is displayed only for a MySQL virtual server.

Write sticky group

Sticky group associated with the write server farm.

This field is displayed only for a MySQL virtual server.

Customlog content

Content output by using the fast log output feature.

This field is displayed only for an HTTP virtual server.

HTTP protection policy

HTTP protection policy referenced by the virtual server.

 

display virtual-server statistics

Use display virtual-server statistics to display virtual server statistics.

Syntax

In standalone mode:

display virtual-server statistics [ name virtual-server-name ]

In IRF mode:

display virtual-server statistics [ name virtual-server-name ] [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name virtual-server-name: Specifies a virtual server by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command displays statistics of all virtual servers.

slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays virtual server statistics for all member devices. (In IRF mode.)

Examples

# Display statistics for the virtual server vs.

<Sysname> display virtual-server statistics name vs

Virtual server: vs

  Total connections: 979

  Active connections: 618

  Max connections: 661

    recorded at 11:02:49 on Tue May 21 2019

  Connections per second: 146

  Max connections per second: 156

    recorded at 11:02:49 on Tue May 21 2019

  Client input: 333332 bytes

  Client output: 472054 bytes

  Throughput: 4088 bps

  Inbound throughput: 1214 bps

  Outbound throughput: 2874 bps

  Max throughput: 4368 bps

    recorded at 11:02:49 on Tue May 21 2019

  Max inbound throughput: 1214 bps

    recorded at 11:02:49 on Tue May 21 2019

  Max outbound throughput: 3154 bps

    recorded at 11:02:49 on Tue May 21 2019

  Received packets: 979

  Sent packets: 0

  Dropped packets: 0

  Received requests: 0

Table 30 Command output

Field

Description

Virtual server

Virtual server name.

Total connections

Total number of connections.

Active connections

Number of active connections.

Max connections

Maximum number of connections.

Connections per second

Number of connections per second.

Max connections per second

Maximum number of connections per second.

Client input

Traffic (in bytes) received from the client.

Client output

Traffic (in bytes) sent to the client.

Throughput

Total packet throughput in bps.

Inbound throughput

Inbound packet throughput in bps.

Outbound throughput

Outbound packet throughput in bps.

Max throughput

Maximum packet throughput in bps.

Max throughput

Maximum inbound packet throughput in bps.

Max throughput

Maximum outbound packet throughput in bps.

Received packets

Number of received packets.

Sent packets

Number of packets sent by the virtual server to the client.

Dropped packets

Number of dropped packets.

Received requests

Number of received HTTP request packets. This field is displayed only for HTTP-type virtual servers.

Dropped requests

Number of dropped HTTP request packets. This field is displayed only for HTTP-type virtual servers.

Sent responses

Number of sent HTTP response packets. This field is displayed only for HTTP-type virtual servers.

Dropped responses

Number of dropped HTTP response packets. This field is displayed only for HTTP-type virtual servers.

 

Related commands

reset virtual-server statistics

dns-server (DNS server pool view)

Use dns-server to create a DNS server pool member and enter its view, or enter the view of an existing DNS server pool member.

Use undo dns-server to delete a DNS server pool member.

Syntax

dns-server dns-server-name port port-number

undo dns-server dns-server-name port port-number

Default

No DNS server pool members exist.

Views

DNS server pool view

Predefined user roles

network-admin

Parameters

dns-server-name: Specifies a DNS server pool member name, a case-insensitive string of 1 to 63 characters.

port-number: Specifies the port number of the DNS server pool member, in the range of 0 to 65535.

Usage guidelines

You can use one of the following methods to add a member to a DNS server pool:

·     Use the dns-server command in DNS server pool view. H3C recommends using this method.

·     Use the dns-server-pool command in DNS server view.

You cannot use both methods to add a member with the same DNS server name and port number to a DNS server pool.

Examples

# Add DNS server pool member ds1 and enter DNS server pool member view.

<Sysname> system-view

[Sysname] loadbalance dns-server-pool dsp1

[Sysname-lb-dspool-dsp1] dns-server ds1 port 10

[Sysname-lb-dspool-dsp1-#member#-ds1-port-10]

Related commands

dns-server-pool (DNS server view)

dns-server-pool (LB action view)

Use dns-server-pool to specify a DNS server pool for guiding packet forwarding.

Use undo dns-server-pool to restore the default.

Syntax

dns-server-pool pool-name [ sticky sticky-name ]

undo dns-server-pool

Default

No DNS server pool is specified for guiding packet forwarding.

Views

DNS LB action view

Predefined user roles

network-admin

Parameters

pool-name: Specifies a DNS server pool by its name, a case-insensitive string of 1 to 63 characters.

sticky sticky-name: Specifies a sticky group by its name, a case-insensitive string of 1 to 63 characters. If you do not specify a sticky group, the DNS server pool does not correspond to any sticky group.

Usage guidelines

This command is mutually exclusive with the forward all or skip current-dns-proxy command. If you configure one command, the other command (if configured) is automatically cancelled.

Examples

# Specify the DNS server pool dsp and the sticky group sg1 for DNS LB action lba1.

<Sysname> system-view

[Sysname] loadbalance action lba1 type dns

[Sysname-lba-dns-lba1] dns-server-pool dsp sticky st1

Related commands

forward all

dns-server-pool (DNS server view)

Use dns-server-pool to specify a DNS server pool for a DNS server.

Use undo dns-server-pool to restore the default.

Syntax

dns-server-pool pool-name

undo dns-server-pool

Default

A DNS server does not belong to any DNS server pool.

Views

DNS server view

Predefined user roles

network-admin

Parameters

pool-name: Specifies a DNS server pool by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

You can specify a DNS server pool that has not been created.

Examples

# Specify DNS server pool dns-pool1 for DNS server ds1.

<Sysname> system-view

[Sysname] loadbalance dns-server ds1

[Sysname-lb-ds-ds1] dns-server-pool dns-pool1

Related commands

display loadbalance dns-server

encrypt-cookie

Use encrypt-cookie to encrypt a cookie.

Use undo encrypt-cookie to remove the encryption for a cookie.

Syntax

encrypt-cookie name cookie-name key { cipher | simple } string

undo encrypt-cookie name cookie-name

Default

No cookie is encrypted.

Views

HTTP parameter profile view

Predefined user roles

network-admin

Parameters

name cookie-name: Specifies a cookie by its name, a case-sensitive string of 1 to 63 characters.

key: Specifies a key used to encrypt the cookie.

cipher: Specifies a key in ciphertext form.

simple: Specifies a key in plaintext form. For security purposes, the key specified in plaintext form will be stored in ciphertext form.

string: Specifies the key. Its plaintext form is a case-sensitive string of 1 to 31 characters. Its ciphertext form is a case-sensitive string of 1 to 73 characters.

Usage guidelines

After you execute this command, the device encrypts the Set-Cookie field in HTTP responses to prevent personal information from being revealed. When a client request contains an encrypted cookie, the device decrypts the cookie before sending the request to the server.

Examples

# For HTTP parameter profile p1, encrypt cookie cookie1 with encryption key 123456.

<Sysname> system-view

[Sysname] parameter-profile p1 type http

[Sysname-para-http-p1] encrypt-cookie name cookie1 key simple 123456

env-variables

Use env-variables to configure an environment variable for custom monitoring.

Use undo env-variables to delete an environment variable for custom monitoring.

Syntax

env-variables variable-name value variable-value

undo env-variables variable-name

Default

No environment variables are configured for custom monitoring.

Views

Custom-monitoring LB probe template view

Predefined user roles

network-admin

Parameters

variable-name: Specifies the environment variable name, a case-sensitive string of 1 to 63 characters. The name can contain spaces.

value variable-value: Specifies an environment variable value, a case-sensitive string of 1 to 255 characters. The name can contain spaces and cannot contain quotation marks (").

Usage guidelines

You can specify the environment to execute the custom script file by configuring an environment variable.

You can configure a maximum of 16 environment variables.

Examples

# In custom-monitoring LB probe template test_external, configure an environment variable with name env and value /var/tmp.

<Sysname> system-view

[Sysname] loadbalance probe-template external-monitor test_external

[Sysname-lbpt-external-monitor-test_external] env-variables env value /var/tmp

exceed-mss

Use exceed-mss to specify the action to take on the segments that exceed the MSS in the HTTP requests sent by the client.

Use undo exceed-mss to restore the default.

Syntax

exceed-mss { allow | drop }

undo exceed-mss

Default

The device allows the segments to exceed the MSS in the HTTP requests sent by the client.

Views

TCP parameter profile view

Predefined user roles

network-admin

Parameters

allow: Allows the segments to exceed the MSS.

drop: Discards the segments that exceed the MSS.

Examples

# For the TCP parameter profile pp3, specify the drop action for the segments that exceed the MSS in the HTTP requests sent by the client.

<Sysname> system-view

[Sysname] parameter-profile pp3 type tcp

[Sysname-para-tcp-pp3] exceed-mss drop

external-script

Use external-script to specify a script file used for custom monitoring.

Use undo external-script to restore the default.

Syntax

external-script file-name

undo external-script

Default

No script file is specified for custom monitoring.

Views

Custom-monitoring LB probe template view

Predefined user roles

network-admin

Parameters

file-name: Specifies a script file by its name, a case-insensitive string of 1 to 255 characters.

Usage guidelines

The device detects the state of real severs according to the detection contents in the script file.

Before specifying a script file, upload the file to the device.

The device supports specifying only script files with the .py suffix.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# In custom-monitoring LB probe template test_external, use script file test.py for custom monitoring.

<Sysname> system-view

[Sysname] loadbalance probe-template external-monitor test-external

[Sysname-lbpt-external-monitor-test-external] external-script test.py

fail-action (link group view)

Use fail-action to specify the fault processing method for a link group.

Use undo fail-action to restore the default.

Syntax

fail-action { keep | reschedule | reset }

undo fail-action

Default

The fault processing method is to keep existing connections.

Views

Link group view

Predefined user roles

network-admin

Parameters

keep: Keeps the connection with the failed link. Keeping or terminating the connection depends on the timeout mechanism of the protocol.

reschedule: Redirects the connection to another available link in the link group.

reset: Terminates the connection with the failed link by sending RST packets (for TCP packets) or ICMP unreachable packets (for other types of packets).

Usage guidelines

The fault processing method applies when the link that processes packets fails.

Examples

# Specify the fault processing method for the link group lg as reschedule.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] fail-action reschedule

fail-action (server farm view)

Use fail-action to specify the fault processing method for a server farm.

Use undo fail-action to restore the default.

Syntax

fail-action { keep | reschedule | reset }

undo fail-action

Default

The fault processing method is to keep existing connections.

Views

Server farm view

Predefined user roles

network-admin

Parameters

keep: Keeps the connection with the failed real server. Keeping or terminating the connection depends on the timeout mechanism of the protocol.

reschedule: Redirects the connection to another available real server in the server farm.

reset: Terminates the connection with the failed real server by sending RST packets (for TCP packets) or ICMP unreachable packets (for other types of packets).

Usage guidelines

The fault processing method applies when the real server that processes packets fails.

Examples

# Specify the fault processing method for the server farm sf as reschedule.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] fail-action reschedule

fallback-action close

Use fallback-action close to configure the method of closing TCP connections upon failure to find a real server.

Use undo fallback-action to restore the default.

Syntax

fallback-action close { fin | rst }

undo fallback-action

Default

Packets are dropped when no real servers are available for the current LB action.

Views

Generic/HTTP LB action view

Predefined user roles

network-admin

Parameters

fin: Closes TCP connections by sending FIN packets.

rst: Closes TCP connections by sending RST packets.

Usage guidelines

This command enables the device to close TCP connections matching the LB policy by sending FIN or RST packets if the device fails to find a real server according to the LB action.

Examples

# In HTTP LB action a1, configure the method of closing TCP connections by sending RST packets.

<Sysname> system-view

[Sysname] loadbalance action a1 type http

[Sysname-lba-http-a1] fallback-action close rst

fallback-action continue

Use fallback-action continue to match the next rule upon failure to find an available server.

Use undo fallback-action to restore the default.

Syntax

fallback-action continue

undo fallback-action

Default

Packets are dropped when no servers are available for the current LB action.

Views

LB action view

Predefined user roles

network-admin

Usage guidelines

This command enables packets to match the next rule in an LB policy when no servers are available for the current LB action.

Examples

# Match the next rule upon failure to find a real server for the HTTP LB action a1.

<Sysname> system-view

[Sysname] loadbalance action a1 type http

[Sysname-lba-http-a1] fallback-action continue

# Match the next rule upon failure to find a DNS server for the DNS LB action a2.

<Sysname> system-view

[Sysname] loadbalance action a2 type dns

[Sysname-lba-dns-a2] fallback-action continue

fallback-action response raw-file

Use fallback-action response raw-file to specify a response file used upon load balancing failure.

Use undo fallback-action to restore the default.

Syntax

fallback-action response raw-file raw-filename

undo fallback-action

Default

Packets are discarded upon load balancing failure.

Views

HTTP LB action view

Predefined user roles

network-admin

Parameters

raw-filename: Specifies a response file by its name, a case-insensitive string of 1 to 255 characters.

Usage guidelines

This command enables the device to respond to client requests when the device fails to find an available real server or fails to find the response file specified in the response command. The response file specified in the fallback-action response raw-file command must contain a complete HTTP packet and cannot contain only the HTTP content.

The fallback-action response raw-file command and the fallback-action continue command are mutually exclusive.

Examples

# Specify the 301.raw file as the response file used upon load balancing failure.

<Sysname> system-view

[Sysname] loadbalance action a_http type http

[Sysname-lba-http-a_http] fallback-action response raw-file 301.raw

Related commands

display loadbalance action

fallback-action continue

fin-wait1 timeout

Use fin-wait1 timeout to set the FIN-WAIT-1 state timeout time for TCP connections.

Use undo fin-wait1 timeout to restore the default.

Syntax

fin-wait1 timeout timeout-value

undo fin-wait1 timeout

Default

The FIN-WAIT-1 state timeout time is 5 seconds for TCP connections.

Views

TCP parameter profile view

Predefined user roles

network-admin

Parameters

timeout-value: Specifies the FIN-WAIT-1 state timeout time in the range of 1 to 65535 seconds.

Examples

# Set the FIN-WAIT-1 state timeout time for TCP connections to 10 seconds in the TCP parameter profile profile.

<Sysname> system-view

[Sysname] parameter-profile profile type tcp

[Sysname-para-tcp-profile] fin-wait1 timeout 10

Related commands

display parameter-profile

fin-wait2 timeout

Use fin-wait2 timeout to set the FIN-WAIT-2 state timeout time for TCP connections.

Use undo fin-wait2 timeout to restore the default.

Syntax

fin-wait1 timeout timeout-value

undo fin-wait1 timeout

Default

The FIN-WAIT-2 state timeout time is 5 seconds for TCP connections.

Views

TCP parameter profile view

Predefined user roles

network-admin

Parameters

timeout-value: Specifies the FIN-WAIT-2 state timeout time in the range of 1 to 65535 seconds.

Examples

# Set the FIN-WAIT-2 state timeout time for TCP connections to 10 seconds in the TCP parameter profile profile.

<Sysname> system-view

[Sysname] parameter-profile profile type tcp

[Sysname-para-tcp-profile] fin-wait2 timeout 10

Related commands

display parameter-profile

forward all

Use forward all to configure the packet forwarding mode.

Use undo forward to restore the default.

Syntax

forward all

undo forward

Default

The packet forwarding mode is to discard packets.

Views

DNS/Generic/Link-generic LB action view

Predefined user roles

network-admin

Usage guidelines

In DNS LB action view, this command is mutually exclusive with the dns-server-pool or skip current-dns-proxy command. In generic LB action view, the forward all and server-farm commands are mutually exclusive. In link-generic LB action view, the forward all and link-group commands are mutually exclusive. If you configure one command, the other command (if configured) is automatically cancelled.

Examples

# Configure the packet forwarding mode for the generic LB action lba1.

<Sysname> system-view

[Sysname] loadbalance action lba1 type generic

[Sysname-lba-generic-lba1] forward all

Related commands

dns-server-pool

link-group (LB action view)

server-farm (LB action view)

frequency

Use frequency to set the probe interval for an LB probe template.

Use undo frequency to restore the default.

Syntax

frequency interval

undo frequency

Default

The probe interval is 300 seconds.

Views

Load balancing probe template view

Predefined user roles

network-admin

Parameters

interval: Specifies the probe interval in the range of 5 to 604800 seconds.

Usage guidelines

This command specifies the interval for sending probe packets.

Examples

# Set the probe interval to 3600 seconds for ICMP probe template icmptplt.

<Sysname> system-view

[Sysname] loadbalance probe-template icmp icmptplt

[Sysname-lb-pt-icmp-icmptplt] frequency 3600

header (HTTP header sticky group view)

Use header to configure the HTTP header sticky method.

Use undo header to restore the default.

Syntax

header { { { host | name header-name | url } [ offset offset ] [ start start-string ] [ end end-string | length length ] } | request-method | version }

undo header

Default

No HTTP header sticky methods exist.

Views

HTTP header sticky group view

Predefined user roles

network-admin

Parameters

host: Specifies the HTTP host based sticky method.

name header-name: Specifies the HTTP header name based sticky method. The header-name argument is a case-insensitive string of 1 to 63 characters.

url: Specifies the HTTP URL based sticky method.

offset offset: Specifies the offset value of the HTTP header based on the start of the HTTP packet, in the range of 0 to 1000 bytes. The default is 0.

start start-string: Specifies the regular expression that marks the start of the HTTP header, a case-sensitive string of 1 to 127 characters starting from the offset value. The string cannot contain question marks (?).

end end-string: Specifies the regular expression that marks the end of the HTTP header, a case-sensitive string of 1 to 127 characters starting from the start-string value. The string cannot contain question marks (?).

length length: Specifies the length of the HTTP header, in the range of 0 to 1000 bytes. The default is 0, which indicates all lengths.

request-method: Specifies the HTTP Request-Method based sticky method.

version: Specifies the HTTP version based sticky method.

Usage guidelines

Use this command to obtain the HTTP header information used to generate sticky entries based on the offset, start-string, end-string, and length values. The start-string and end-string values are not included in the sticky entry information.

Examples

# Configure the HTTP header sticky method for the HTTP header sticky group sg4: Specify the HTTP host based sticky method.

<Sysname> system-view

[Sysname] sticky-group sg4 type http-header

[Sysname-sticky-http-header-sg4] header host

header (HTTP passive sticky group view)

Use header to configure the HTTP header passive sticky method.

Use undo header to delete the HTTP header passive sticky method.

Syntax

header { get id name header-name | match id { name header-name | url } } start start-string { end end-string | length length }

undo { get | match } id

Default

No HTTP header passive sticky methods exist.

Views

HTTP passive sticky group view

Predefined user roles

network-admin

Parameters

get: Obtains the specified string in the HTTP response header, which is used to generate an HTTP header passive sticky entry.

match: Obtains the specified string in the HTTP request header, which is used to match an HTTP header passive sticky entry.

id: Specifies the string ID in the range of 1 to 4.

name header-name: Specifies the HTTP header name based sticky method. The header-name argument is a case-insensitive string of 1 to 63 characters.

url: Specifies the HTTP URL based sticky method.

start start-string: Specifies the regular expression that marks the start of the HTTP header or URL, a case-sensitive string of 1 to 127 characters. The string cannot contain question marks (?).

end end-string: Specifies the regular expression that marks the end of the HTTP header or URL, a case-sensitive string of 1 to 127 characters. The string cannot contain question marks (?).

length length: Specifies the length of the HTTP header or URL, in the range of 0 to 1000 bytes. The default is 0, which indicates all lengths.

Usage guidelines

The start-string and end-string values are not included in the sticky entry information.

Both the header get and header match commands are required for an HTTP header passive sticky method.

The device obtains the header or URL information of an incoming HTTP request based on the header match command and obtains the header information of an incoming HTTP response based on the header get command. If the header or URL information of the HTTP request matches the header information of the HTTP response, the device generates a sticky entry based on the header information of the HTTP response. Subsequent HTTP requests that match the sticky entry are forwarded according to the sticky entry.

The following rules apply to use of the header match and header get commands:

·     You can execute a maximum of four header get commands and four header match commands for one HTTP passive sticky method.

·     A number of n strings that are obtained based on n header get commands generates 2n-1 strings in ascending order of string IDs. If the string obtained based on the header match command matches any one of these generated strings, the match is successful.

·     A number of n strings that are obtained based on n header match commands combine as one string in ascending order of string IDs.

For example, three header get commands are executed with string IDs 1, 2, and 3. The device obtains three strings a, b, and c in the HTTP response header, generates seven strings a, b, c, ab, ac, bc, and abc, and generates seven sticky entries. Then, three header match commands are executed with string IDs 2, 3, and 4. The device obtains three strings a, b, and c in the HTTP request header and generates one string abc. If the string matches one of the seven strings, the device generates a sticky entry based on the string abc. Subsequent HTTP requests that match the sticky entry are forwarded according to the sticky entry.

Examples

# Configure the HTTP passive sticky method for the HTTP passive sticky group sg4: Obtain the string between callid and & in the URL of the HTTP request. If the string matches the string between phone-number and & in HTTP response header x-forward-callid, the device generates a sticky entry based on the string between phone-number and &.

<Sysname> system-view

[Sysname] sticky-group sg4 type http-passive

[Sysname-sticky-http-passive-sg4] header get 1 name x-forward-callid start phone-number end &

[Sysname-sticky-http-passive-sg4] header match 1 url start callid end &

Related commands

content (HTTP passive sticky group view)

display sticky-group

header call-id

Use header call-id to configure the SIP call ID sticky method.

Use undo header call-id to restore the default.

Syntax

header call-id

undo header call-id

Default

No sticky methods exist.

Views

SIP sticky group view

Predefined user roles

network-admin

Usage guidelines

The SIP call ID sticky method allows the device to generate sticky entries based on the Call-ID header field in SIP messages. Packets with the same call ID are assigned to the same real server.

Examples

# Configure the SIP call ID sticky method for the SIP sticky group sg6.

<Sysname> system-view

[Sysname] sticky-group sg6 type sip

[Sysname-sticky-sip-sg6] header call-id

header delete

Use header delete to delete the HTTP header.

Use undo header delete to keep the HTTP header.

Syntax

header delete { both | request | response } name header-name

undo header delete { both | request | response } name header-name

Default

The HTTP header is kept.

Views

HTTP LB action view

Predefined user roles

network-admin

Parameters

both: Specifies both the HTTP request and response packets.

request: Specifies the HTTP request packets.

response: Specifies the HTTP response packets.

name header-name: Specifies the name of the HTTP packet header, including standard and user-defined headers that must match the header in the packet. The header-name argument is a case-insensitive string of 1 to 63 characters excluding brackets ({ }, ( ),[ ], < >), at sign (@), comma (,), semicolon (;), colon (:), backslash (\), quotation mark ("), slash (/), question mark (?), equal sign (=), space character (SP), and horizontal tab (HT). The character string also excludes ASCII codes that are less than or equal to 31 and greater than or equal to 127. You can enter a question mark (?) to obtain a list of standard header names. For more information about the header names, see RFC 4229.

Usage guidelines

This command deletes the specified header from HTTP packets.

Examples

# Delete the header named host from HTTP request packets for the HTTP LB action lba2.

<Sysname> system-view

[Sysname] loadbalance action lba2 type http

[Sysname-lba-http-lba2] header delete request name host

header delete request accept-encoding

Use header delete request accept-encoding to delete the Accept-Encoding header from HTTP requests.

Use undo header delete request accept-encoding to keep the Accept-Encoding header in HTTP requests.

Syntax

header delete request accept-encoding

undo header delete request accept-encoding

Default

The LB device deletes the Accept-Encoding header from HTTP requests.

Views

HTTP-compression parameter profile view

Predefined user roles

network-admin

Usage guidelines

This command enables the LB device to delete the Accept-Encoding header from the HTTP request before sending it to the server. If the response packet sent by the server matches the specified match rule, the LB device compresses the packet before sending it to the requesting client. If the HTTP request sent by the client does not contain the Accept-Encoding header, the LB device does not compress the response packet regardless of whether this command is executed.

By default, the LB device does not modify request packets. If the response packet sent by the server is compressed, the LB device sends the packet to the requesting client without compressing it. If the response packet sent by the server is not compressed and matches the specified match rule, the LB device compresses the packet before sending it to the requesting client.

Examples

# Create the HTTP-compression parameter profile http1, and delete the Accept-Encoding header from HTTP requests.

<Sysname> system-view

[Sysname] parameter-profile http1 type http-compression

[Sysname-para-http-compression-http1] header delete request accept-encoding

header exceed-length

Use header exceed-length to specify the action to take on the HTTP requests or responses when their packet headers exceed the maximum length.

Use undo header exceed-length to restore the default.

Syntax

header exceed-length { continue | drop }

undo header exceed-length

Default

The system continues to perform load balancing for HTTP requests or responses when their packet headers exceed the maximum length.

Views

HTTP parameter profile view

Predefined user roles

network-admin

Parameters

continue: Continues to perform load balancing.

drop: Stops performing load balancing, discards the packet, and terminates the connection.

Usage guidelines

This command is not supported by virtual servers of the fast HTTP type.

When the HTTP packet header length exceeds the processing capability of load balancing, the drop method applies.

Examples

# For the HTTP parameter profile pp1, specify the drop action for the HTTP requests or responses with their packet headers exceeding the maximum length.

<Sysname> system-view

[Sysname] parameter-profile pp1 type http

[Sysname-para-http-pp1] header exceed-length drop

header insert

Use header insert to insert the HTTP header.

Use undo header insert to remove the configuration.

Syntax

header insert { both | request | response } name header-name value value [ encode { base64 | url } ]

undo header insert { both | request | response } name header-name

Default

The HTTP header is not inserted.

Views

HTTP LB action view

Predefined user roles

network-admin

Parameters

both: Specifies both the HTTP request and response packets.

request: Specifies the HTTP request packets.

response: Specifies the HTTP response packets.

name header-name: Specifies the name of the HTTP packet header, including standard and user-defined headers. The header-name argument is a case-sensitive string of 1 to 63 characters excluding brackets ({ }, ( ),[ ], < >), at sign (@), comma (,), semicolon (;), colon (:), backslash (\), quotation mark ("), slash (/), question mark (?), equal sign (=), space character (SP), and horizontal tab (HT). The character string also excludes ASCII codes that are less than or equal to 31 and greater than or equal to 127. You can enter a question mark (?) to obtain a list of standard header names. For more information about the header names, see RFC 4229.

value value: Specifies the header content to be inserted to the HTTP packet, a string of 1 to 255 characters. You can also specify the following replacement strings:

·     %is—Source IP address in HTTP requests.

·     %ps—Source port number in HTTP requests.

·     %id—Destination IP address in HTTP requests.

·     %pd—Destination port number in HTTP requests.

·     %sps—Source port number in HTTP responses.

·     %spd—Destination port number in HTTP responses.

·     %sis—Source IP address in HTTP responses.

·     %sid—Destination IP address in HTTP responses.

·     %{x509v}—Certificate version.

·     %{x509snum}—Certificate serial number.

·     %{x509sigalgo}—Certificate signature algorithm.

·     %{x509issuer}—Certificate issuer.

·     %{x509before}—Certificate effective time.

·     %{x509after}—Certificate expiration time.

·     %{x509sub}—Certificate subject.

·     %{x509spktype}—Public key type for the certificate subject.

·     %{x509spk}—Public key for the certificate subject.

·     %{x509spkRSA}—Length of the RSA public key for the certificate subject (this field is available only for an RSA public key).

·     %{x509hash}—MD5 hash value of the client certificate.

·     %{dncn}—Issuee.

·     %{dne}—Email.

·     %{dno}—Company/Organization.

·     %{dnou}—Department.

·     %{dnc}—Country.

·     %{dns}—State/Province.

·     %{dnl}—City.

encode { base64 | url }: Specifies an encoding method for replacement strings. If you do not specify an encoding method, replacement strings are not encoded.

Usage guidelines

This command inserts the specified header to HTTP packets.

URL encoding encodes only special characters in replacement strings, for example, colons in IPv6 addresses. Base64 encoding encodes entire replacement strings.

Examples

# Insert the header named source with source IP address and source port number as the content to HTTP request packets for the HTTP LB action lba2.

<Sysname> system-view

[Sysname] loadbalance action lba2 type http

[Sysname-lba-http-lba2] header insert request name source value %is:%ps

header insert response vary

Use header insert response vary to insert the Vary header into HTTP responses.

Use undo header insert response vary to remove the configuration.

Syntax

header insert response vary

undo header insert response vary

Default

The Vary header is inserted into HTTP responses.

Views

HTTP-compression parameter profile view

Predefined user roles

network-admin

Usage guidelines

This command inserts the Vary header to HTTP responses and sets the header content to Accept-Encoding before sending them to the client. The command takes effect regardless of whether the response packets contain the Vary header or whether the packets are compressed.

Examples

# Create the HTTP-compression parameter profile http1, and insert the Vary header into HTTP responses.

<Sysname> system-view

[Sysname] parameter-profile http1 type http-compression

[Sysname-para-http-compression-http1] header insert response vary

header maxparse-length

Use header maxparse-length to set the maximum length of HTTP headers that can be parsed.

Use undo header maxparse-length to restore the default.

Syntax

header maxparse-length length

undo header maxparse-length

Default

The maximum length of HTTP headers that can be parsed is 4096.

Views

HTTP parameter profile view

Predefined user roles

network-admin

Parameters

length: Specifies the maximum length of HTTP headers that can be parsed, in the range of 1 to 65535 bytes.

Usage guidelines

This command is not supported by the virtual servers of the fast HTTP type.

Examples

# Set the maximum length of HTTP headers that can be parsed to 8192 for the HTTP parameter profile pp1.

<Sysname> system-view

[Sysname] parameter-profile pp1 type http

[Sysname-para-http-pp1] header maxparse-length 8192

header modify per-request

Use header modify per-request to perform the insert, delete, or modify operation for the header of each HTTP request or response packet.

Use undo header modify per-request to restore the default.

Syntax

header modify per-request

undo header modify per-request

Default

The insert, delete, or modify operation is performed for the header of the first HTTP request or response  packet of a connection.

Views

HTTP parameter profile view

Predefined user roles

network-admin

Examples

# For the HTTP parameter profile pp1, perform the insert, delete, or modify operation for the header of each HTTP request or response packet.

<Sysname> system-view

[Sysname] parameter-profile pp1 type http

[Sysname-para-http-pp1] header modify per-request

header rewrite

Use header rewrite to rewrite the HTTP header.

Use undo header rewrite to remove the configuration.

Syntax

header rewrite { both | request | response } name header-name value value replace replace [ encode { base64 | url } ]

undo header rewrite { both | request | response } name header-name

Default

The HTTP header is not rewritten.

Views

HTTP LB action view

Predefined user roles

network-admin

Parameters

both: Specifies both the HTTP request and response packets.

request: Specifies the HTTP request packets.

response: Specifies the HTTP response packets.

name header-name: Specifies the name of the HTTP packet header, including standard and user-defined headers that must match the header in the packet. The header-name argument is a case-insensitive string of 1 to 63 characters excluding brackets ({ }, ( ),[ ], < >), at sign (@), comma (,), semicolon (;), colon (:), backslash (\), quotation mark ("), slash (/), question mark (?), equal sign (=), space character (SP), and horizontal tab (HT). The character string also excludes ASCII codes that are less than or equal to 31 and greater than or equal to 127. You can enter a question mark (?) to obtain a list of standard header names. For more information about the header names, see RFC 4229.

value value: Specifies the HTTP packet header content to be rewritten, a case-sensitive string of 1 to 127 characters. The string cannot contain question marks (?).

replace replace: Specifies the content after rewrite, a case-sensitive string of 1 to 127 characters. You can also specify the following replacement strings:

·     %is—Source IP address in HTTP requests.

·     %ps—Source port number in HTTP requests.

·     %id—Destination IP address in HTTP requests.

·     %pd—Destination port number in HTTP requests.

·     %sps—Source port number in HTTP responses.

·     %spd—Destination port number in HTTP responses.

·     %sis—Source IP address in HTTP responses.

·     %sid—Destination IP address in HTTP responses.

·     %{x509v}—Certificate version.

·     %{x509snum}—Certificate serial number.

·     %{x509sigalgo}—Certificate signature algorithm.

·     %{x509issuer}—Certificate issuer.

·     %{x509before}—Certificate effective time.

·     %{x509after}—Certificate expiration time.

·     %{x509sub}—Certificate subject.

·     %{x509spktype}—Public key type for the certificate subject.

·     %{x509spk}—Public key for the certificate subject.

·     %{x509spkRSA}—Length of the RSA public key for the certificate subject (this field is available only for an RSA public key).

·     %{x509hash}—MD5 hash value of the client certificate.

·     %{dncn}—Issuee.

·     %{dne}—Email.

·     %{dno}—Company/Organization.

·     %{dnou}—Department.

·     %{dnc}—Country.

·     %{dns}—State/Province.

·     %{dnl}—City.

encode { base64 | url }: Specifies an encoding method for replacement strings. If you do not specify an encoding method, replacement strings are not encoded.

Usage guidelines

This command rewrites the value setting of the specified header in HTTP packets to the replace setting.

URL encoding encodes only special characters in replacement strings, for example, colons in IPv6 addresses. Base64 encoding encodes entire replacement strings.

Examples

# For the HTTP LB action lba2, rewrite the content www.hello.com of the header named host in HTTP request packets to www.he.com.cn.

<Sysname> system-view

[Sysname] loadbalance action lba2 type http

[Sysname-lba-http-lba2] header rewrite request name host value www\.(he)(llo)\.com replace www.%1.com.cn encode url

header rewrite request url

Use header rewrite request url to rewrite the URL in HTTP requests.

Use undo header rewrite request url to restore the default.

Syntax

header rewrite request url value value replace replace [ encode { base64 | url } ]

undo header rewrite request url

Default

The URL in HTTP requests is not rewritten.

Views

HTTP LB action view

Predefined user roles

network-admin

Parameters

value value: Specifies the URL to be rewritten, a case-sensitive string of 1 to 127 characters. The string cannot contain question marks (?).

replace replace: Specifies the URL after rewrite, a case-sensitive string of 1 to 127 characters. You can also specify the following replacement strings:

·     %is—Source IP address in HTTP requests.

·     %ps—Source port number in HTTP requests.

·     %id—Destination IP address in HTTP requests.

·     %pd—Destination port number in HTTP requests.

·     %sps—Source port number in HTTP responses.

·     %spd—Destination port number in HTTP responses.

·     %sis—Source IP address in HTTP responses.

·     %sid—Destination IP address in HTTP responses.

·     %{x509v}—Certificate version.

·     %{x509snum}—Certificate serial number.

·     %{x509sigalgo}—Certificate signature algorithm.

·     %{x509issuer}—Certificate issuer.

·     %{x509before}—Certificate effective time.

·     %{x509after}—Certificate expiration time.

·     %{x509sub}—Certificate subject.

·     %{x509spktype}—Public key type for the certificate subject.

·     %{x509spk}—Public key for the certificate subject.

·     %{x509spkRSA}—Length of the RSA public key for the certificate subject (this field is available only for an RSA public key).

·     %{x509hash}—MD5 hash value of the client certificate.

·     %{dncn}—Issuee.

·     %{dne}—Email.

·     %{dno}—Company/Organization.

·     %{dnou}—Department.

·     %{dnc}—Country.

·     %{dns}—State/Province.

·     %{dnl}—City.

encode { base64 | url }: Specifies an encoding method for replacement strings. If you do not specify an encoding method, replacement strings are not encoded.

Usage guidelines

This command rewrites the value setting in the HTTP request URL to the replace setting.

URL encoding encodes only special characters in replacement strings, for example, colons in IPv6 addresses. Base64 encoding encodes entire replacement strings.

Examples

# For the HTTP LB action lba2, rewrite the URL www.hello.com in HTTP requests to www.he.com.cn.

<Sysname> system-view

[Sysname] loadbalance action lba2 type http

[Sysname-lba-http-lba2] header rewrite request url value www\.(he)(llo)\.com replace www.%1.com.cn encode url

idle-time

Use idle-time to set the idle timeout time for TCP connections between the LB device and servers.

Use undo idle-time to restore the default.

Syntax

idle-time idle-time

undo idle-time

Default

The idle timeout time for TCP connections between the LB device and servers is 86400 seconds.

Views

OneConnect parameter profile view

MySQL parameter profile view

Predefined user roles

network-admin

Parameters

idle-time: Specifies the idle timeout time in the range of 1 to 4294967295 seconds.

Usage guidelines

The idle timeout time is the amount of time that a TCP connection can stay idle before it is disconnected. After the TCP connection is disconnected, new connection requests trigger establishment of a new TCP connection.

Examples

# In OneConnect parameter profile ocp, set the idle timeout time to 10000 seconds for TCP connections between the LB device and servers.

<Sysname> system-view

[Sysname] parameter-profile ocp type oneconnect

[Sysname-para-oneconnect-ocp] idle-time 10000

inherit vpn-instance disable (link view)

Use inherit vpn-instance disable to disable VPN instance inheritance for a link.

Use undo inherit vpn-instance disable to enable VPN instance inheritance for a link.

Syntax

inherit vpn-instance disable

undo inherit vpn-instance disable

Default

VPN instance inheritance is enabled for a link.

Views

Link view

Predefined user roles

network-admin

Usage guidelines

When VPN instance inheritance is enabled, a link without a VPN instance specified inherits the VPN instance of the virtual server. When VPN instance inheritance is disabled, a link without a VPN instance specified belongs to the public network.

To specify a VPN instance for a link, use the vpn-instance vpn-instance-name command in link view.

You can display the VPN instance for a link by using the display loadbalance link command.

Examples

# Disable VPN instance inheritance for link lk1.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] inherit vpn-instance disable

Related commands

display loadbalance link

vpn-instance (link view)

inherit vpn-instance disable (real server view)

Use inherit vpn-instance disable to disable VPN instance inheritance for a real server.

Use undo inherit vpn-instance disable to enable VPN instance inheritance for a real server.

Syntax

inherit vpn-instance disable

undo inherit vpn-instance disable

Default

VPN instance inheritance is enabled for a real server.

Views

Real server view

Predefined user roles

network-admin

Usage guidelines

When VPN instance inheritance is enabled, a real server without a VPN instance specified inherits the VPN instance of its virtual server. When VPN instance inheritance is disabled, a real server without a VPN instance specified belongs to the public network.

To specify a VPN instance for a real server, use the vpn-instance command in real server view.

Examples

# Disable VPN instance inheritance for real server rs.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] inherit vpn-instance disable

Related commands

vpn-instance (real server view)

vpn-instance (virtual server view)

ip

Use ip to configure the IPv4 sticky method.

Use undo ip to restore the default.

Syntax

ip [ port ] { both | destination | source } [ mask mask-length ]

undo ip

Default

No IPv4 sticky method is configured.

Views

Sticky group view

Predefined user roles

network-admin

Parameters

port: Specifies the sticky method as IPv4 address + port number. If you do not specify this keyword, the sticky method is IPv4 address.

both: Specifies the sticky method as source IPv4 address + destination IPv4 address (if you do not specify the port keyword), or source IPv4 address + source port number + destination IPv4 address + destination port number (if you specify the port keyword).

destination: Specifies the sticky method as destination IPv4 address if you do not specify the port keyword, or destination IPv4 address + destination port number if you specify the port keyword.

source: Specifies the sticky method as source IPv4 address if you do not specify the port keyword, or source IPv4 address + source port number if you specify the port keyword.

mask mask-length: Specifies the mask length for the sticky method.

Examples

# Configure the sticky method for the address and port-based sticky group sg1 as source IPv4 address.

<Sysname> system-view

[Sysname] sticky-group sg1 type address-port

[Sysname-sticky-address-port-sg1] ip source

# Configure the sticky method for the address and port-based sticky group sg1 as source IPv4 address + source port number.

<Sysname> system-view

[Sysname] sticky-group sg1 type address-port

[Sysname-sticky-address-port-sg1] ip port source

Related commands

sticky-group

ip address (DNS server view)

Use ip address to specify an IPv4 address for a DNS server.

Use undo ip address to restore the default.

Syntax

ip address ipv4-address

undo ip address

Default

No IPv4 address is specified for a DNS server.

Views

DNS server view

Predefined user roles

network-admin

Parameters

ipv4-address: Specifies an IPv4 address, which cannot be a loopback address, multicast address, broadcast address, or an address in the format of 0.X.X.X.

Usage guidelines

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the IPv4 address for DNS server ds1 as 1.2.3.4.

<Sysname> system-view

[Sysname] loadbalance dns-server ds1

[Sysname-lb-ds-ds1] ip address 1.2.3.4

ip address (ISP view)

Use ip address to configure an IPv4 address for an ISP.

Use undo ip address to restore the default.

Syntax

ip address ipv4-address { mask-length | mask }

undo ip address ipv4-address { mask-length | mask }

Default

No IPv4 address is configured for an ISP.

Views

ISP view

Predefined user roles

network-admin

Parameters

ipv4-address: Specifies an IPv4 address.

mask-length: Specifies the mask length for the IPv4 address, in the range of 0 to 32.

mask: Specifies the mask for the IPv4 address.

Examples

# Configure the IPv4 address for the ISP isp1 as 1.1.1.1.

<Sysname> system-view

[Sysname] loadbalance isp name isp1

[Sysname-lbisp-isp1] ip address 1.1.1.1 24

ip address (real server view)

Use ip address to configure an IPv4 address for a real server.

Use undo ip address to restore the default.

Syntax

ip address ipv4-address

undo ip address

Default

No IPv4 address is configured for a real server.

Views

Real server view

Predefined user roles

network-admin

Parameters

ipv4-address: Specifies an IPv4 address, which cannot be a loopback address, multicast address, broadcast address, or an address in the format of 0.X.X.X.

Examples

# Configure the IPv4 address for the real server rs as 1.1.1.1.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] ip address 1.1.1.1

ip address (transparent DNS proxy view)

Use ip address to specify an IPv4 address for a transparent DNS proxy.

Use undo ip address to restore the default.

Syntax

ip address ipv4-address [ mask-length | mask ]

undo ip address

Default

No IPv4 address is specified for a transparent DNS proxy.

Views

Transparent DNS proxy view

Predefined user roles

network-admin

Parameters

ipv4-address: Specifies an IPv4 address, which cannot be a loopback address, multicast address, broadcast address, or an address in the format of 0.X.X.X.

mask-length: Specifies a mask length in the range of 0 to 32.

mask: Specifies a subnet mask.

Usage guidelines

A transparent DNS proxy processes a DNS request only when the destination IP address and port number of the DNS request match those of the transparent DNS proxy.

If server load balancing is configured, configure different IP addresses and port numbers for the transparent DNS proxy and the virtual server of the UDP type.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the IPv4 address for transparent DNS proxy dns-proxy1 as 1.2.3.4/24.

<Sysname> system-view

[Sysname] loadbalance dns-proxy dns_proxy1

[Sysname-lb-dp-udp-dns-proxy1] ip address 1.2.3.4 24

ip mask

Use ip mask to set the mask length for IPv4 proximity entries.

Use undo ip mask to restore the default.

Syntax

ip mask { mask-length | mask }

undo ip mask

Default

The mask length for IPv4 proximity entries is 24.

Views

Proximity view

Predefined user roles

network-admin

Parameters

mask-length: Specifies the mask length for IPv4 proximity entries, in the range of 0 to 32. A value of 0 indicates the natural mask.

mask: Specifies the mask for IPv4 proximity entries.

Examples

# Set the mask length for IPv4 proximity entries to 30.

<Sysname> system-view

[Sysname] loadbalance proximity

[Sysname-lb-proximity] ip mask 30

ip range

Use ip range to add an IPv4 address range to a SNAT address pool.

Use undo ip range to remove an IPv4 address range from a SNAT address pool.

Syntax

ip range start start-ipv4-address end end-ipv4-address

undo ip range start start-ipv4-address end end-ipv4-address

Default

An SNAT address pool does not contain IPv4 address ranges.

Views

SNAT address pool view

Predefined user roles

network-admin

Parameters

start start-ipv4-address: Specifies the start IPv4 address.

end end-ipv4-address: Specifies the end IPv4 address, which must be greater than or equal to the start IPv4 address.

Usage guidelines

You can execute this command multiple times to add multiple IPv4 address ranges to a SNAT address pool. Each address range can have a maximum of 256 IPv4 addresses. No overlapping IPv4 addresses are allowed in the same SNAT address pool or different SNAT address pools.

Examples

# Add IPv4 address range 1.1.1.1 to 1.1.1.100 to the SNAT address pool lbsp.

<Sysname> system-view

[Sysname] loadbalance snat-pool lbsp

[Sysname-lbsnat-pool-lbsp] ip range start 1.1.1.1 end 1.1.1.100

Related commands

loadbalance snat-pool

ip source mask

Use ip source mask to specify the IPv4 mask for connection reuse.

Use undo ip source mask to restore the default.

Syntax

ip source mask { mask-length | mask }

undo ip source mask

Default

The IPv4 mask for connection reuse is the natural mask.

Views

OneConnect parameter profile view

MySQL parameter profile view

Predefined user roles

network-admin

Parameters

mask-length: Specifies the mask length in the range of 0 to 32. A value of 0 indicates the natural mask.

mask: Specifies the subnet mask in dotted decimal notation.

Usage guidelines

This command limits the network segment of clients that can reuse connections between the LB device and servers. If the client that initiates a connection request is in the same network segment as the idle TCP connection, the idle TCP connection is reused. If the client does not match this requirement, a new TCP connection is established.

Examples

# In OneConnect parameter profile ocp, set the mask length for connection reuse to 24.

<Sysname> system-view

[Sysname] parameter-profile ocp type oneconnect

[Sysname-para-oneconnect-ocp] ip source mask 24

ipv6

Use ipv6 to configure the IPv6 sticky method.

Use undo ipv6 to restore the default.

Syntax

ipv6 [ port ] { both | destination | source } [ prefix prefix-length ]

undo ipv6

Default

No IPv6 sticky method is configured.

Views

Sticky group view

Predefined user roles

network-admin

Parameters

port: Specifies the sticky method as IPv6 address + port number. If you do not specify this keyword, the sticky method is IPv6 address.

both: Specifies the sticky method as source IPv6 address + destination IPv6 address if you do not specify the port keyword, or source IPv6 address + source port number + destination IPv6 address + destination port number if you specify the port keyword.

destination: Specifies the sticky method as destination IPv6 address if you do not specify the port keyword, or destination IPv6 address + destination port number if you specify the port keyword.

source: Specifies the sticky method as source IPv6 address if you do not specify the port keyword, or source IPv6 address + source port number if you specify the port keyword.

prefix prefix-length: Specifies the prefix length for the sticky method.

Examples

# Configure the sticky method for the address- and port-based sticky group sg1 as source IPv6 address.

<Sysname> system-view

[Sysname] sticky-group sg1 type address-port

[Sysname-sticky-address-port-sg1] ipv6 source

# Configure the sticky method for the address- and port-based sticky group sg1 as source IPv6 address + source port number.

<Sysname> system-view

[Sysname] sticky-group sg1 type address-port

[Sysname-sticky-address-port-sg1] ipv6 port source

Related commands

sticky-group

ipv6 address (DNS server view)

Use ipv6 address to configure an IPv6 address for a DNS server.

Use undo ipv6 address to restore the default.

Syntax

ipv6 address ipv6-address

undo ipv6 address

Default

No IPv6 address is configured for a DNS server.

Views

DNS server view

Predefined user roles

network-admin

Parameters

ipv6-address: Specifies an IPv6 address, which cannot be a loopback address, IPv6 multicast address, link-local address, or all-zero address.

Usage guidelines

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Configure the IPv6 address for DNS server ds1 as 1001::1.

<Sysname> system-view

[Sysname] loadbalance dns-server ds1

[Sysname-lb-ds-ds1] ipv6 address 1001::1

ipv6 address (ISP view)

Use ipv6 address to configure an IPv6 address for an ISP.

Use undo ipv6 address to restore the default.

Syntax

ipv6 address ipv6-address prefix-length

undo ipv6 address ipv6-address prefix-length

Default

No IPv6 address is configured for an ISP.

Views

ISP view

Predefined user roles

network-admin

Parameters

ipv6-address: Specifies an IPv6 address.

prefix-length: Specifies the prefix length for the IPv6 address, in the range of 1 to 128.

Examples

# Configure the IPv6 address for the ISP isp1 as 200::1.

<Sysname> system-view

[Sysname] loadbalance isp name isp1

[Sysname-lbisp-isp1] ipv6 address 200::1 100

ipv6 address (real server view)

Use ipv6 address to configure an IPv6 address for a real server.

Use undo ipv6 address to restore the default.

Syntax

ipv6 address ipv6-address

undo ipv6 address

Default

No IPv6 address is configured for a real server.

Views

Real server view

Predefined user roles

network-admin

Parameters

ipv6-address: Specifies an IPv6 address, which cannot be a loopback address, IPv6 multicast address, link-local address, or all-zero address.

Examples

# Configure the IPv6 address for the real server rs as 1001::1.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] ipv6 address 1001::1

ipv6 address (transparent DNS proxy view)

Use ipv6 address to configure an IPv6 address for a transparent DNS proxy.

Use undo ipv6 address to restore the default.

Syntax

ipv6 address ipv6-address [ prefix-length ]

undo ipv6 address

Default

No IPv6 address is configured for a transparent DNS proxy.

Views

Transparent DNS proxy view

Predefined user roles

network-admin

Parameters

ipv6-address: Specifies an IPv6 address, which cannot be a loopback address, IPv6 multicast address, link-local address, or all-zero address (If the prefix length is 0, you can specify the all-zero address.).

prefix-length: Specifies a prefix length for the IPv6 address, in the range of 0 to 128.

Usage guidelines

A transparent DNS proxy processes a DNS request only when the destination IP address and port number of the DNS request match those of the transparent DNS proxy.

If server load balancing is configured, configure different IP addresses and port numbers for the transparent DNS proxy and the virtual server of the UDP type.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Configure the IPv6 address for transparent DNS proxy dns-proxy1 as 1::2:3/112.

<Sysname> system-view

[Sysname] loadbalance dns-proxy dns-proxy1

[Sysname-lb-dp-udp-dns-proxy1] ipv6 address 1::2:3 112

ipv6 prefix

Use ipv6 prefix to configure the prefix length for IPv6 proximity entries.

Use undo ipv6 prefix to restore the default.

Syntax

ipv6 prefix prefix-length

undo ipv6 prefix

Default

The prefix length for IPv6 proximity entries is 96.

Views

Proximity view

Predefined user roles

network-admin

Parameters

prefix-length: Specifies the prefix length for IPv6 proximity entries, in the range of 1 to 128.

Examples

# Specify the prefix length for IPv6 proximity entries as 64.

<Sysname> system-view

[Sysname] loadbalance proximity

[Sysname-lb-proximity] ipv6 prefix 64

ipv6 range

Use ipv6 range to add an IPv6 address range to a SNAT address pool.

Use undo ipv6 range to remove an IPv6 address range from a SNAT address pool.

Syntax

Default

An SNAT address pool does not contain IPv6 address ranges.

Views

SNAT address pool view

Predefined user roles

network-admin

Parameters

start start-ipv6-address: Specifies the start IPv6 address.

end end-ipv6-address: Specifies the end IPv6 address, which must be greater than or equal to the start IPv6 address.

Usage guidelines

You can execute this command multiple times to add multiple IPv6 address ranges to a SNAT address pool. Each address range can have a maximum of 65536 IPv6 addresses. No overlapping IPv6 addresses are allowed in the same SNAT address pool or different SNAT address pools.

Examples

# Add IPv6 address range 1001::1 to 1001::100 to the SNAT address pool lbsp.

<Sysname> system-view

[Sysname] loadbalance snat-pool lbsp

[Sysname-lbsnat-pool-lbsp] ipv6 range start 1001::1 end 1001::100

Related commands

loadbalance snat-pool

ipv6 source prefix

Use ipv6 source prefix to specify the IPv6 prefix length for connection reuse.

Use undo ipv6 source prefix to restore the default.

Syntax

ipv6 source prefix prefix-length

undo ipv6 source prefix

Default

Client IPv6 addresses with a prefix length of 0 can reuse connections.

Views

OneConnect parameter profile view

MySQL parameter profile view

Predefined user roles

network-admin

Parameters

prefix-length: Specifies the prefix length in the range of 0 to 128.

Usage guidelines

This command limits the network segment of clients that can reuse connections between the LB device and servers. If the client that initiates a connection request is in the same network segment as the idle TCP connection, the idle TCP connection is reused. If the client does not match this requirement, a new TCP connection is established.

Examples

# In OneConnect parameter profile ocp, set the prefix length for connection reuse to 24.

<Sysname> system-view

[Sysname] parameter-profile ocp type oneconnect

[Sysname-para-oneconnect-ocp] ipv6 source prefix 24

isp

Use isp to add an ISP to a region.

Use undo isp to delete an ISP from a region.

Syntax

isp isp-name

undo isp isp-name

Default

A region does not contain any ISPs.

Views

Region view

Predefined user roles

network-admin

Parameters

isp-name: Specifies an ISP by its name, a case-insensitive string of 1 to 63 characters.

Examples

# Add the ISP isp-ct to the region region-ct.

<Sysname> system-view

[Sysname] loadbalance region region-ct

[Sysname-lb-region-region-ct] isp isp-ct

Related commands

loadbalance region

keepalive idle-timeout

Use keepalive idle-timeout to set the idle timeout time for sending keepalive packets.

Use undo keepalive idle-timeout to restore the default.

Syntax

keepalive idle-timeout timeout-value

undo keepalive idle-timeout

Default

The idle timeout time for sending keepalive packets is 1800 seconds.

Views

TCP parameter profile view

Predefined user roles

network-admin

Parameters

timeout-value: Specifies the idle timeout time for sending keepalive packets, in the range of 1 to 65535 seconds.

Examples

# Set the timeout time for sending keepalive packets to 5 seconds in the TCP parameter profile profile.

<Sysname> system-view

[Sysname] parameter-profile profile type tcp

[Sysname-para-tcp-profile] keepalive idle-timeout 5

Related commands

display parameter-profile

keepalive retransmission interval

Use keepalive retransmission interval to set the retransmission interval and retransmission times for keepalive packets.

Use undo keepalive retransmission interval to restore the default.

Syntax

keepalive retransmission interval interval count count

undo keepalive retransmission

Default

The retransmission interval is 10 seconds, and the retransmission times is 3.

Views

TCP parameter profile view

Predefined user roles

network-admin

Parameters

interval: Specifies the retransmission interval for keepalive packets, in the range of 1 to 65535 seconds.

count: Specifies the retransmission times for keepalive packets, in the range of 1 to 65535.

Examples

# Set the retransmission interval and retransmission times for keepalive packets to 5 seconds and 10, respectively, in the TCP parameter profile profile.

<Sysname> system-view

[Sysname] parameter-profile profile type tcp

[Sysname-para-tcp-profile] keepalive retransmission interval 5 count 10

Related commands

display parameter-profile

lb-cache-policy

Use lb-cache-policy to apply a Web cache policy to a virtual server.

Use undo lb-cache-policy to restore the default.

Syntax

lb-cache-policy cache-policy-name

undo lb-cache-policy

Default

No Web cache policy is applied to a virtual server.

Views

HTTP virtual server view

Predefined user roles

network-admin

Parameters

cache-policy-name: Specifies a Web cache policy by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

You can apply only one Web cache policy to a virtual server. For more information about Web cache policies, see "Configuring a Web cache policy."

This command and the response command are mutually exclusive.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Apply the Web cache policy cp1 to the HTTP-type virtual server vs3.

<Sysname> system-view

[Sysname] virtual-server vs3 type http

[Sysname-vs-http-vs3] lb-cache-policy cp1

Related commands

response

lb-limit-policy

Use lb-limit-policy to apply an LB connection limit policy to a virtual server.

Use undo lb-limit-policy to restore the default.

Syntax

lb-limit-policy policy-name

undo lb-limit-policy

Default

No LB connection limit policies are applied to a virtual server.

Views

Virtual server view

Predefined user roles

network-admin

Parameters

policy-name: Specifies an LB connection limit policy by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

Use this command to implement rate limit for user traffic.

This command takes effect only on new sessions and does not take effect on existing sessions.

Examples

# Apply the LB connection limit policy llp to the HTTP-type virtual server vs.

<Sysname> system-view

[Sysname] virtual-server vs type http

[Sysname-vs-http-vs]lb-limit-policy llp

Related commands

loadbalance limit-policy

lb-policy (transparent DNS proxy view)

Use lb-policy to specify an LB policy to be referenced by a transparent DNS proxy.

Use undo lb-policy to restore the default.

Syntax

lb-policy policy-name

undo lb-policy

Default

No LB policy is referenced by a transparent DNS proxy.

Views

Transparent DNS proxy view

Predefined user roles

network-admin

Parameters

policy-name: Specifies an LB policy by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

By referencing an LB policy, a transparent DNS proxy implements load balancing for matching packets based on the packet contents.

A transparent DNS proxy can reference only a DNS policy template.

Examples

# Specify the LB policy dns-policy1 to be referenced by transparent DNS proxy dns-proxy1.

<Sysname> system-view

[Sysname] loadbalance dns-proxy dns-proxy1

[Sysname-lb-dp-udp-dns-proxy1] lb-policy dns-policy1

lb-policy (virtual server view)

Use lb-policy to specify an LB policy to be referenced by the specified virtual server.

Use undo lb-policy to restore the default.

Syntax

lb-policy policy-name

undo lb-policy

Default

No LB policy is referenced by a virtual server.

Views

Virtual server view

Predefined user roles

network-admin

Parameters

policy-name: Specifies an LB policy by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

By referencing an LB policy, the virtual server implements load balancing for matching packets based on the packet contents.

A virtual server can reference the policy template of the specified type. For example, a virtual server of the fast HTTP or HTTP type can reference a policy template of the generic type or HTTP type. A virtual server of the IP, SIP, TCP, or UDP type can reference a policy template of the generic type only.

Examples

# Specify the LB policy lbp1 to be referenced by the IP-type virtual server vs3.

<Sysname> system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] lb-policy lbp1

limit

Use limit to configure an LB connection limit rule.

Use undo limit to delete an LB connection limit rule.

Syntax

limit limit-id acl [ ipv6 ] { acl-number | name acl-name } [ per-destination | per-service | per-source ] * amount max-amount min-amount

undo limit limit-id

Default

No rules are configured for an LB connection limit policy.

Views

LB connection limit policy view

Predefined user roles

network-admin

Parameters

limit-id: Specifies an LB connection limit rule ID. The value range for this argument is 1 to 65535.

acl: Specifies an ACL to limit user connections of a specified user range.

ipv6: Specifies an IPv6 ACL. If you do not specify this keyword, the command uses an IPv4 ACL.

acl-number: Specifies the ACL number in the range of 2000 to 3999.

name acl-name: Specifies an ACL by its name.

per-destination: Limits user connections by destination IP address.

per-service: Limits user connections by service. Services are classified by transport layer protocol and service port number.

per-source: Limits user connections by source IP address.

max-amount: Specifies the upper limit of connections, in the range of 1 to 4294967295. When the number of connections in a specified range or for a certain type reaches the upper limit, the device does not accept new connection requests.

min-amount: Specifies the lower limit of connections, in the range of 1 to 4294967295. The min-amount must be equal to or smaller than the max-amount. The device accepts new connection requests only when the number of connections drops below the lower limit.

Usage guidelines

An LB connection limit policy can have multiple rules. You can specify an ACL, a type, and the upper and lower limits for each rule. You can specify one or more of the per-destination, per-service, and per-source keywords for the command. For example, you can specify both the per-destination and per-source keywords to limit user connections by destination address and source address of packets.

You must specify a different ACL for each rule in an LB connection limit policy.

If the per-destination, per-service, and per-source keywords are not specified, the command limits all user connections matching the specified ACL.

The rules in an LB connection limit policy are matched in ascending order of the rule IDs until a match is found.

When the specified ACL changes, the device uses a new LB connection limit policy to process existing connections again.

Examples

# Configure rule 1 for the LB connection limit policy 1. Use ACL 3000 to permit user connections sourced from the network 192.168.0.0/24, and set the upper and lower limits to 2000 and 1800 for the user connections by source and destination addresses.

<Sysname> system-view

[Sysname] acl advanced 3000

[Sysname-acl-ipv4-adv-3000] rule permit ip source 192.168.0.0 0.0.0.255

[Sysname-acl-ipv4-adv-3000] quit

[Sysname] loadbalance limit-policy 1

[Sysname-lb-limit-policy-1] limit 1 acl 3000 per-destination per-source amount 2000 1800

link (DNS server view)

Use link to associate a link with a DNS server.

Use undo link to restore the default.

Syntax

link link-name

undo link

Default

No link is associated with a DNS server.

Views

DNS server view

Predefined user roles

network-admin

Parameters

link-name: Specifies a link by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

A DNS server can be associated with only one link. A link can be associated with multiple DNS servers.

Examples

# Associate link link1 with DNS server ds1.

<Sysname> system-view

[Sysname] loadbalance dns-server ds1

[Sysname-lb-ds-ds1] link link1

link (link group view)

Use link to create a link group member and enter its view, or enter the view of an existing link group member.

Use undo link to delete a link group member.

Syntax

link link-name

undo link link-name

Default

No link group members exist.

Views

Link group view

Predefined user roles

network-admin

Parameters

link-name: Specifies a link group member name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

You can use one of the following methods to add a member to a link group:

·     Use the link command in link group view. H3C recommends using this method.

·     Use the link-group command in link view.

You cannot use both methods to add a member with the same link name to a link group.

Examples

# Add link group member lk1 and enter link group member view.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] link lk1

[Sysname-lb-lgroup-lg-#member#-lk1]

Related commands

link-group (link view)

link-group (LB action view)

Use link-group to specify the primary link group.

Use undo link-group to restore the default.

Syntax

link-group link-group-name [ backup backup-link-group-name ] [ sticky sticky-name ]

undo link-group

Default

No primary link group is specified.

Views

LB action view

Predefined user roles

network-admin

Parameters

link-group-name: Specifies a primary link group name, a case-insensitive string of 1 to 63 characters.

backup backup-link-group-name: Specifies a backup link group name, a case-insensitive string of 1 to 63 characters.

sticky sticky-name: Specifies the name of the sticky group corresponding to the link group. It is a case-insensitive string of 1 to 63 characters.

Usage guidelines

The link-group and forward all commands are mutually exclusive. If you configure one command, the other command (if configured) is automatically cancelled.

When the primary link group is available (contains links), packets are forwarded through the primary link group. When the primary link group is not available, packets are forwarded through the backup link group.

Examples

# Specify the primary link group lg, the backup link group lgb, and the sticky group sg1 for the link-generic LB action lba1.

<Sysname> system-view

[Sysname] loadbalance action lba1 type link-generic

[Sysname-lba-link-generic-lba1] server-farm sf backup sfb sticky sg1

Related commands

forward all

link-group (link view)

Use link-group to specify a link group for a link.

Use undo link-group to restore the default.

Syntax

link-group link-group-name

undo link-group

Default

A link does not belong to any link group.

Views

Link view

Predefined user roles

network-admin

Parameters

link-group-name: Specifies a link group name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

The device selects the best link from the matching link group to perform link load balancing.

Examples

# Specify the link group lkg1 for the link lk1.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] link-group lkg1

loadbalance action

Use loadbalance action to create an LB action and enter its view, or enter the view of an existing LB action.

Use undo loadbalance action to delete the specified LB action.

Syntax

loadbalance action action-name [ type { dns | generic | http | link-generic | radius } ]

undo loadbalance action action-name

Default

No LB actions exist.

Views

System view

Predefined user roles

network-admin

Parameters

action-name: Specifies the LB action name, a case-insensitive string of 1 to 63 characters.

type { dns | generic | http | link-generic | radius }: Specifies an LB action type.

·     dns: DNS load balancing action.

·     generic: Generic server load balancing action.

·     http: HTTP load balancing action.

·     link-generic: Link load balancing action.

·     radius: RADIUS load balancing action.

Usage guidelines

When you create an LB action, you must specify the LB action type. You can enter an existing LB action view without entering the type of the LB action.

Examples

# Create the LB action lba1 with the generic type, and enter LB action view.

<Sysname> system-view

[Sysname] loadbalance action lba1 type generic

[Sysname-lba-generic-lba1]

loadbalance alg

Use loadbalance alg to enable ALG for the specified protocols.

Use undo loadbalance alg to disable ALG for the specified protocols.

Syntax

loadbalance alg { dns | ftp | h323 | icmp-error | ils | mgcp | nbt | pptp | rsh | rtsp | sccp | sip | sqlnet | tftp | xdmcp }

undo loadbalance alg { dns | ftp | h323 | icmp-error | ils | mgcp | nbt | pptp | rsh | rtsp | sccp | sip | sqlnet | tftp | xdmcp }

Default

ALG is enabled for the DNS, FTP, PPTP, and RTSP protocols and ICMP error packets.

Views

System view

Predefined user roles

network-admin

Parameters

dns: Specifies the DNS protocol.

ftp: Specifies the FTP protocol.

h323: Specifies the H.323 protocol.

icmp-error: Specifies the ICMP error packets.

ils: Specifies the Internet Locator Service (ILS) protocol.

mgcp: Specifies the Media Gateway Control Protocol (MGCP).

nbt: Specifies the NetBIOS over TCP/IP (NBT) protocol.

pptp: Specifies the Point-to-Point Tunneling Protocol (PPTP).

rsh: Specifies the Remote Shell (RSH) protocol.

rtsp: Specifies the Real Time Streaming Protocol (RTSP).

sccp: Specifies the Skinny Client Control Protocol (SCCP).

sip: Specifies the Session Initiation Protocol (SIP).

sqlnet: Specifies the SQLNET protocol.

tftp: Specifies the TFTP protocol.

xdmcp: Specifies the X Display Manager Control Protocol (XDMCP).

Usage guidelines

The ALG feature distributes parent and child sessions to the same link.

Examples

# Enable ALG for TFTP.

<Sysname> system-view  

[Sysname] loadbalance alg tftp

loadbalance alg all-enable

Use loadbalance alg all-enable to enable ALG for all protocols.

Use loadbalance alg all-disable to disable ALG for all protocols.

Syntax

loadbalance alg all-enable

loadbalance alg all-disable

Default

ALG is enabled for the DNS, FTP, PPTP, and RTSP protocols and ICMP error packets.

Views

System view

Predefined user roles

network-admin

Examples

# Enable ALG for all protocols.

<Sysname> system-view

[Sysname] loadbalance alg all-enable

loadbalance class

Use loadbalance class to create an LB class and enter its view, or enter the view of an existing LB class.

Use undo loadbalance class to delete the specified LB class.

Syntax

loadbalance class class-name [ type { dns | generic | http | link-generic | mysql | radius } [ match-all | match-any ] ]

undo loadbalance class class-name

Default

No LB classes exist.

Views

System view

Predefined user roles

network-admin

Parameters

class-name: Specifies the LB class name, a case-insensitive string of 1 to 63 characters.

type { dns | generic | http | link-generic | mysql | radius }: Specifies an LB class type.

·     dns: DNS load balancing class.

·     generic: Generic server load balancing class.

·     http: HTTP load balancing class.

·     link-generic: Link load balancing class.

·     mysql: MySQL load balancing class.

·     radius: RADIUS load balancing class.

[ match-all | match-any ]: Requires matching all rules or any rule of the LB class. match-all is the default match mode.

Usage guidelines

When you create an LB class, you must specify an LB class type. You can enter an existing LB class view without entering the type of the LB class.

Examples

# Create the LB class lbc1 with the generic type, and enter LB class view.

<Sysname> system-view

[Sysname] loadbalance class lbc1 type generic

[Sysname-lbc-generic-lbc1]

loadbalance dns-cache aging-time

Use loadbalance dns-cache aging-time to set the aging time for DNS cache entries.

Use undo loadbalance dns-cache aging-time to restore the default.

Syntax

loadbalance dns-cache aging-time aging-time

undo loadbalance dns-cache aging-time

Default

The aging time for DNS cache entries is 60 minutes.

Views

System view

Predefined user roles

network-admin

Parameters

aging-time: Specifies the aging time for DNS cache entries, in the range of 1 to 1440 minutes.

Examples

# Set the aging time for DNS cache entries to 100 minutes.

<Sysname> system-view

[Sysname] loadbalance dns-cache aging-time 100

loadbalance dns-proxy

Use loadbalance dns-proxy to create a transparent DNS proxy and enter its view, or enter the view of an existing transparent DNS proxy.

Use undo loadbalance dns-proxy to delete a transparent DNS proxy.

Syntax

loadbalance dns-proxy dns-proxy-name type udp

undo loadbalance dns-proxy dns-proxy-name

Default

No transparent DNS proxies exist.

Views

System view

Predefined user roles

network-admin

Parameters

dns-proxy-name: Specifies the transparent DNS proxy name, a case-insensitive string of 1 to 63 characters.

type udp: Specifies the transparent DNS proxy type as UDP.

Examples

# Create the UDP transparent DNS proxy dns-proxy1, and enter UDP transparent DNS proxy view.

<Sysname> system-view

[Sysname] loadbalance dns-proxy dns-proxy1 type udp

[Sysname-lb-dp-udp-dns-proxy1]

Related commands

display loadbalance dns-proxy

loadbalance dns-server

Use loadbalance dns-server to create a DNS server and enter its view, or enter the view of an existing DNS server.

Use undo loadbalance dns-server to delete a DNS server.

Syntax

loadbalance dns-server dns-server-name

undo loadbalance dns-server dns-server-name

Default

No DNS servers exist.

Views

System view

Predefined user roles

network-admin

Parameters

dns-server-name: Specifies the DNS server name, a case-insensitive string of 1 to 63 characters.

Examples

# Create the DNS server ds1, and enter DNS server view.

<Sysname> system-view

[Sysname] loadbalance dns-server ds1

[Sysname-lb-ds-ds1]

loadbalance dns-server-pool

Use loadbalance dns-server-pool to create a DNS server pool and enter its view, or enter the view of an existing DNS server pool.

Use undo loadbalance dns-server-pool to delete a DNS server pool.

Syntax

loadbalance dns-server-pool pool-name

undo loadbalance dns-server-pool pool-name

Default

No DNS server pools exist.

Views

System view

Predefined user roles

network-admin

Parameters

pool-name: Specifies the DNS server pool name, a case-insensitive string of 1 to 63 characters.

Examples

# Create the DNS server pool dns-pool1, and enter DNS server pool view.

<Sysname> system-view

[Sysname] loadbalance dns-server-pool dns-pool1

[Sysname-lb-dspool-dns-pool1]

loadbalance flow-redirect blade-aggregation

Use loadbalance flow-redirect blade-aggregation to distribute traffic to the specified Blade aggregate interfaces.

Use undo loadbalance flow-redirect to restore the default.

Syntax

loadbalance flow-redirect blade-aggregation

undo loadbalance flow-redirect

Default

Traffic is evenly distributed among failover groups.

Views

System view

Predefined user roles

network-admin

Usage guidelines

This command distributes LB traffic to Blade aggregate interface 257 and distributes the return traffic that does not match any traffic distribution rules to Blade aggregate interface 1. This command requires the following configurations:

·     Configure the link-aggregation load-sharing mode source-ip command on Blade aggregate interface 257.

·     Configure the link-aggregation load-sharing mode destination-ip command on Blade aggregate interface 1.

Examples

# Distribute traffic to the specified Blade aggregate interfaces.

<Sysname> system-view

[Sysname] loadbalance flow-redirect blade-aggregation

Related commands

link-aggregation load-sharing mode (Layer 2—LAN Switching Command Reference)

loadbalance isp auto-update enable

Use loadbalance isp auto-update enable to enable ISP auto update.

Use undo loadbalance isp auto-update enable to disable ISP auto update.

Syntax

loadbalance isp auto-update enable

undo loadbalance isp auto-update enable

Default

ISP auto update is disabled.

Views

System view

Predefined user roles

network-admin

Usage guidelines

With ISP auto update enabled, the device regularly queries IP address information from the whois server according to the whois maintainer object of the ISP.

Examples

# Enable ISP auto update.

<Sysname> system-view

[Sysname] loadbalance isp auto-update enable

Related commands

loadbalance isp auto-update frequency

loadbalance isp auto-update whois-server

loadbalance isp auto-update frequency

Use loadbalance isp auto-update frequency to configure the ISP auto update frequency.

Use undo loadbalance isp auto-update frequency to restore the default.

Syntax

loadbalance isp auto-update frequency { per-day | per-week | per-month }

undo loadbalance isp auto-update frequency

Default

The ISP auto update is performed once per week.

Views

System view

Predefined user roles

network-admin

Parameters

per-day: Updates ISP address information once per day.

per-week: Updates ISP address information once per week.

per-month: Updates ISP address information once per month.

Usage guidelines

The specific update time is about 04:00:00 a.m. For the first auto update, the specific update time is 04:00:00 a.m on the next day.

Examples

# Configure the ISP auto update frequency as per day.

<Sysname> system-view

[Sysname] loadbalance isp auto-update frequency per-day

Related commands

loadbalance isp auto-update enable

loadbalance isp auto-update whois-server

Use loadbalance isp auto-update whois-server to specify the whois server to be queried for ISP auto update.

Use undo loadbalance isp auto-update whois-server to restore the default.

Syntax

loadbalance isp auto-update whois-server { domain domain-name | ip ip-address }

undo loadbalance isp auto-update whois-server

Default

No whois server is specified for ISP auto update.

Views

System view

Predefined user roles

network-admin

Parameters

domain domain-name: Specify a whois server by its domain name, a case-insensitive, dot-separated string of 1 to 253 characters (for example, aabbcc.com). Each dot-separated part in the domain name can contain a maximum of 63 characters. The domain name can contain letters, digits, hyphens (-), underscores (_), and periods (.).

ip ip-address: Specify a whois server by its IPv4 address.

Examples

# Specify the whois server with IP address 20.1.1.1 for ISP auto update.

<Sysname> system-view

[Sysname] loadbalance isp auto-update whois-server ip 20.1.1.1

loadbalance isp file

Use loadbalance isp file to import an ISP file.

Use undo loadbalance isp file to delete an ISP file.

Syntax

loadbalance isp file isp-file-name

undo loadbalance isp file

Views

System view

Predefined user roles

network-admin

Parameters

isp-file-name: Specifies the ISP file name, a case-insensitive string of 1 to 255 characters.

Usage guidelines

The system keeps the imported information intact when detecting the following problems:

·     The file does not exist.

·     The file name is invalid.

·     File decryption occurs.

If the system quits the import operation because of IP address parsing failure, the system performs the following operations:

·     Clears the most recently imported information.

·     Saves the information imported this time.

You cannot delete the imported ISP and its IPv4 or IPv6 address. If the manually configured and imported ISP information overlaps, you can delete the manually configured ISP information.

To perform an active/standby MPU switchover, make sure the standby MPU has the same ISP file as the active MPU.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Import the ISP file isp2.

<Sysname> system-view

[Sysname] loadbalance isp file isp2

loadbalance isp name

Use loadbalance isp name to create an ISP and enter its view, or enter the view of an existing ISP.

Use undo loadbalance isp name to delete the specified ISP.

Syntax

loadbalance isp name isp-name

undo loadbalance isp name isp-name

Default

No ISPs exist.

Views

System view

Predefined user roles

network-admin

Parameters

isp-name: Specifies the ISP name, a case-insensitive string of 1 to 63 characters.

Examples

# Create ISP isp1, and enter ISP view.

<Sysname> system-view

[Sysname] loadbalance isp name isp1

[Sysname-lbisp-isp1]

loadbalance limit-policy

Use loadbalance limit-policy to create an LB connection limit policy and enter its view, or enter the view of an existing LB connection limit policy.

Use undo loadbalance limit-policy to delete an LB connection limit policy.

Syntax

loadbalance limit-policy policy-name

undo loadbalance limit-policy policy-name

Default

No LB connection limit policies exist.

Views

System view

Predefined user roles

network-admin

Parameters

policy-name: Specifies the LB connection limit policy name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

Using an LB connection limit policy can limit the number of connections on the device. It helps prevent a large number of connections from consuming too many device system resources and server resources. In this way, internal network resources (hosts or servers) are protected, and device system resources can be used more appropriately.

Examples

# Create the LB connection limit policy llp, and enter LB connection limit policy view.

<Sysname> system-view

[Sysname] loadbalance limit-policy llp

[Sysname-lb-limit-policy-llp]

loadbalance link

Use loadbalance link to create an LB link and enter its view, or enter the view of an existing LB link.

Use undo loadbalance link to delete an LB link.

Syntax

loadbalance link link-name

undo loadbalance link link-name

Default

No LB links exist.

Views

System view

Predefined user roles

network-admin

Parameters

link-name: Specifies the LB link name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

Each physical link connected to the external network corresponds to an LB link.

Examples

# Create the LB link lk1, and enter LB link view.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1]

loadbalance link-group

Use loadbalance link-group to create a link group and enter its view, or enter the view of an existing link group.

Use undo loadbalance link-group to delete a link group.

Syntax

loadbalance link-group link-group-name

undo loadbalance link-group link-group-name

Default

No link groups exist.

Views

System view

Predefined user roles

network-admin

Parameters

link-group-name: Specifies the link group name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

You can add links that contain similar functions to a link group to facilitate management.

Examples

# Create the link group lg, and enter link group view.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg]

loadbalance log enable bandwidth-busy

Use loadbalance log enable bandwidth-busy to enable load balancing link busy state logging.

Use undo loadbalance log enable bandwidth-busy to disable load balancing link busy state logging.

Syntax

loadbalance log enable bandwidth-busy

undo loadbalance log enable bandwidth-busy

Default

Load balancing link busy state logging is disabled.

Views

System view

Predefined user roles

network-admin

Usage guidelines

Load balancing link busy state logging records busy states for all links.

Examples

# Enable load balancing link busy state logging.

<Sysname> system-view

[Sysname] loadbalance log enable bandwidth-busy

loadbalance log enable base

Use loadbalance log enable base to enable load balancing basic logging.

Use undo loadbalance log enable base to disable load balancing basic logging.

Syntax

loadbalance log enable base

undo loadbalance log enable base

Default

Load balancing basic logging is enabled.

Views

System view

Predefined user roles

network-admin

Usage guidelines

Load balancing basic logging generates logs for the following events:

·     The state of a real server, real server group, link, or link group changes.

·     The health monitoring result of a real server or link changes.

·     The number of connections on a real server, virtual server, or link reaches or drops below the upper limit.

·     The connection establishment rate on a real server, virtual server, or link reaches or drops below the upper limit.

·     A primary/backup server farm switchover occurs between server farms specified for a virtual server.

·     A primary/backup link group switchover occurs between link groups specified for a virtual server.

·     A primary/backup server farm switchover occurs between server farms specified for an LB action.

·     A primary/backup link group switchover occurs between link groups specified for an LB action.

Examples

# Enable load balancing basic logging.

<Sysname> system-view

[Sysname] loadbalance log enable base

loadbalance log enable nat

Use loadbalance log enable nat to enable load balancing NAT logging.

Use undo loadbalance log enable nat to disable load balancing NAT logging.

Syntax

loadbalance log enable nat

undo loadbalance log enable nat

Default

Load balancing NAT logging is disabled.

Views

System view

Predefined user roles

network-admin

Usage guidelines

Load balancing NAT logging records NAT session information, including IP address and port translation information and access information.

Examples

# Enable load balancing NAT logging.

<Sysname> system-view

[Sysname] loadbalance log enable nat

loadbalance policy

Use loadbalance policy to create an LB policy and enter its view, or enter the view of an existing LB policy.

Use undo loadbalance policy to delete the specified LB policy.

Syntax

loadbalance policy policy-name [ type { dns | generic | http | link-generic | mysql | radius } ]

undo loadbalance policy policy-name

Default

No LB policies exist.

Views

System view

Predefined user roles

network-admin

Parameters

policy-name: Specifies the LB policy name, a case-insensitive string of 1 to 63 characters.

type { dns | generic | http | link-generic | mysql | radius }: Specifies an LB policy type.

·     dns: DNS load balancing policy.

·     generic: Generic server load balancing policy.

·     http: HTTP load balancing policy.

·     link-generic: Link load balancing policy.

·     mysql: MySQL load balancing policy.

·     radius: RADIUS load balancing policy.

Usage guidelines

When you create an LB policy, you must specify the LB policy type. You can enter existing LB policy view without entering the type of the LB policy.

Examples

# Create the LB policy lbp1 with the generic type, and enter LB policy view.

<Sysname> system-view

[Sysname] loadbalance policy lbp1 type generic

[Sysname-lbp-generic-lbp1]

loadbalance probe-template

Use loadbalance probe-template to create an LB probe template and enter its view, or enter the view of an existing LB probe template.

Use undo loadbalance probe-template to delete an LB probe template.

Syntax

loadbalance probe-template { external-monitor | http-passive | icmp | tcp-rst | tcp-zero-window } template-name

undo loadbalance probe-template { external-monitor | http-passive | icmp | tcp-rst | tcp-zero-window } template-name

Default

No LB probe templates exist.

Views

System view

Predefined user roles

network-admin

Parameters

external-monitor: Specifies the custom-monitoring-type template.

http-passive: Specifies the HTTP-passive-type template.

icmp: Specifies the ICMP-type template.

tcp-rst: Specifies the TCP-RST template.

tcp-zero-window: Specifies the TCP zero-window template.

template-name: Specifies a template name, a case-insensitive string of 1 to 32 characters.

Usage guidelines

A server farm, a server farm member, or a real server can use a custom-monitoring LB probe template to detect the health state of each real server.

A server farm can use an HTTP passive LB probe template to count the number of URL error times by monitoring the responses of HTTP requests to each real server.

The proximity feature can use an ICMP LB probe template to start ICMP tests and identify the reachability of hosts according to received ICMP responses.

A server farm can use a TCP-RST or TCP zero-window LB probe template to count the number of RST packets or zero-window packets sent by each server farm member.

Examples

# Create an LB probe template named icmptplt, and enter LB probe template view.

<Sysname> system-view

[Sysname] loadbalance probe-template icmp icmptplt

[Sysname-lbpt-icmp-icmptplt]

loadbalance process-limit

Use loadbalance process-limit to set the maximum number of processes allowed to be started for custom monitoring.

Use undo loadbalance process-limit to restore the default.

Syntax

loadbalance process-limit number

undo loadbalance process-limit

Default

The maximum number of processes allowed to be started for custom monitoring is 1.

Views

System view

Predefined user roles

network-admin

Parameters

number: Specifies the maximum number of processes. The value range for this argument is 1 to 16.

Examples

# Set the maximum number of processes allowed to be started for custom monitoring to 2.

<Sysname> system-view

[Sysname] loadbalance process-limit 2

Related commands

display loadbalance process-limit

loadbalance protection-policy

Use loadbalance protection-policy to create a protection policy and enter its view, or enter the view of an existing protection policy.

Use undo loadbalance protection-policy to delete a protection policy.

Syntax

loadbalance protection-policy policy-name [ type http ]

undo loadbalance protection-policy policy-name

Default

No protection policies exist.

Views

System view

Predefined user roles

network-admin

Parameters

policy-name: Specifies a protection policy name, a case-insensitive string of 1 to 63 characters.

type http: Specifies the HTTP-type protection policy. When you create a protection policy, you must specify the policy type. You can enter the view of an existing protection policy without specifying the policy type.

Examples

# Create an HTTP protection policy named p1 and enter its view.

<Sysname> system-view

[Sysname] loadbalance protection-policy p1 type http

[Sysname-lbpp-http-p1]

loadbalance proximity

Use loadbalance proximity to create proximity and enter its view, or enter the view of the existing proximity.

Use undo loadbalance proximity to delete proximity view and clear all configuration in proximity view.

Syntax

loadbalance proximity [ vpn-instance vpn-instance-name ]

undo loadbalance proximity [ vpn-instance vpn-instance-name ]

Views

System view

Predefined user roles

network-admin

Parameters

vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you do not specify this option, the command is executed for the public network.

Examples

# Create and enter proximity view for the VPN instance vpn1.

<Sysname> system-view

[Sysname] loadbalance proximity vpn vpn1

[Sysname-lb-proximity-vpn1]

loadbalance region

Use loadbalance region to create a region and enter its view, or enter the view of an existing region.

Use undo loadbalance region to delete a region.

Syntax

loadbalance region region-name

undo loadbalance region region-name

Default

No regions exist.

Views

System view

Predefined user roles

network-admin

Parameters

region-name: Specifies the region name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

A region contains network segments corresponding to different ISPs.

Examples

# Create the region isp-ct, and enter region view.

<Sysname> system-view

[Sysname] loadbalance region isp-ct

[Sysname-lb-region-isp-ct]

loadbalance schedule-test ip

Use loadbalance schedule-test ip to perform an IPv4 load balancing test.

Syntax

In standalone mode:

loadbalance schedule-test ip [ vpn-instance vpn-instance-name ] { application http { message-file file-name | method { get | post } url url [ header header ]&<1-10> [ content content-value ] } | protocol { protocol-number | icmp | tcp | udp } } destination destination-address destination-port destination-port source source-address source-port source-port

In IRF mode:

loadbalance schedule-test ip [ vpn-instance vpn-instance-name ] { application http { message-file file-name | method { get | post } url url [ header header ]&<1-10> [ content content-value ] } | protocol { protocol-number | icmp | tcp | udp } } destination destination-address destination-port destination-port source source-address source-port source-port [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

Parameters

vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you do not specify this option, the command is executed for the public network.

application: Specifies an application to be tested.

http: Specifies the HTTP application.

message-file file-name: Specifies the file that contains HTTP packet contents. The file name is a case-insensitive string of 1 to 255 characters. The file size cannot exceed 5000 bytes.

method: Specifies an HTTP request method.

get: Specifies the GET method.

post: Specifies the POST method.

url url: Specifies a URL for the HTTP packet, a case-insensitive string of 1 to 255 characters. A URL can contain letters, digits, hyphens (-), underscores (_), and periods (.). The URL cannot contain consecutive periods.

[ header header ]&<1-10>: Specifies a space-separated list of up to 10 HTTP packet headers. A header is a case-sensitive string of 1 to 127 characters excluding question marks (?).

content content-value: Specifies the content of the HTTP packet body, a case-sensitive string of 1 to 255 characters excluding question marks (?).

protocol { protocol-number | icmp | tcp | udp }: Specifies a protocol by its number in the range of 0 to 255 or by its name. For ICMP (1), TCP (6), and UDP (17), you can enter the protocol number or protocol name.

destination destination-address: Specifies the destination IPv4 address.

destination-port destination-port: Specifies the destination port number in the range of 0 to 65535. This option is not supported by some protocols.

source source-address: Specifies the source IPv4 address.

source-port source-port: Specifies the source port number in the range of 0 to 65535. This option is not supported by some protocols.

slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command tests all member devices. (In IRF mode.)

Examples

# Perform an IPv4 load balancing test for the TCP protocol.

<Sysname> loadbalance schedule-test ip protocol tcp destination 7.7.7.7 destination-port 4 source 2.2.2.2 source-port 5

    Matched virtual server: vs2

    Matched default server farm: sf

    Forward type: Forwarding to real server

    Selected real server: rs2

        Scheduling algorithm: Predictor

# Perform an IPv4 load balancing test for the TCP protocol.

<Sysname> loadbalance schedule-test ip protocol tcp destination 7.7.7.7 destination-port 4 source 2.2.2.2 source-port 5

    Matched virtual server: vs2

    Matched default link group: lg

    Forward type: Forwarding to link

    Selected link: link2

        Scheduling algorithm: Predictor

Table 31 Command output

Field

Description

Forward type

Forwarding mode:

·     The destination address is not supported. Load balancing is not performed.

·     Matching HTTP virtual server is not supported—An HTTP virtual server is matched. Load balancing is not supported.

·     Forward all—Forwards packets.

·     Forwarding to real server—Forwards packets to the real server.

·     Forwarding to link—Forwards packets to the link.

·     Drop—Drops packets.

·     Redirect—Redirects packets.

·     Waiting—Enqueues packets.

Drop reason

Packet drop reason:

·     Number of connections or bandwidth for the virtual server exceeded the limit.

·     No class matched and no valid default server farm/link group configured.

·     No valid real server/link in the server farm/link group.

·     Action is drop.

·     A sticky entry was matched but the number of connections or bandwidth for the real server/link exceeded the limit.

·     A class was matched but no valid server farm/link group exists in the action of the class.

·     The HTTP message is not valid.

·     The HTTP request line is not valid.

·     The HTTP header is not valid.

·     The chunk HTTP content is not valid.

·     The server farm is busy.

·     Queue overflow (which means the wait queue is full).

Scheduling algorithm

Scheduling algorithm used to select the real server or link:

·     Predictor—The real server or link is selected by using the scheduling algorithm.

·     Sticky method—The real server or link is selected by using the sticky method.

·     Proximity—The link is selected by using the proximity feature.

 

loadbalance schedule-test ipv6

Use loadbalance schedule-test ipv6 to perform an IPv6 load balancing test.

Syntax

In standalone mode:

loadbalance schedule-test ipv6 [ vpn-instance vpn-instance-name ] { application http { message-file file-name | method { get | post } url url [ header header ]&<1-10> [ content content-value ] } | protocol { protocol-number | icmpv6 | tcp | udp } } destination destination-address destination-port destination-port source source-address source-port source-port

In IRF mode:

loadbalance schedule-test ipv6 [ vpn-instance vpn-instance-name ] { application http { message-file file-name | method { get | post } url url [ header header ]&<1-10> [ content content-value ] } | protocol { protocol-number | icmpv6 | tcp | udp } } destination destination-address destination-port destination-port source source-address source-port source-port [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

Parameters

vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you do not specify this option, the command is executed for the public network.

application: Specifies an application to be tested.

http: Specifies the HTTP application.

message-file file-name: Specifies the file that contains HTTP packet contents. The file name is a case-insensitive string of 1 to 255 characters. The file size cannot exceed 5000 bytes.

method: Specifies an HTTP request method.

get: Specifies the GET method.

post: Specifies the POST method.

url url: Specifies a URL for the HTTP packet, a case-insensitive string of 1 to 255 characters. A URL can contain letters, digits, hyphens (-), underscores (_), and periods (.). The URL cannot contain consecutive periods.

[ header header ]&<1-10>: Specifies a space-separated list of up to 10 HTTP packet headers. A header is a case-sensitive string of 1 to 127 characters excluding question marks (?).

content content-value: Specifies the content of the HTTP packet body, a case-sensitive string of 1 to 255 characters excluding question marks (?).

protocol { protocol-number | icmpv6 | tcp | udp }: Specifies a protocol by its number in the range of 0 to 255 or by its name. For ICMPv6 (58), TCP (6), and UDP (17), you can enter the protocol number or protocol name.

destination destination-address: Specifies the destination IPv6 address.

destination-port destination-port: Specifies the destination port number in the range of 0 to 65535. This option is not supported by some protocols.

source source-address: Specifies the source IPv6 address.

source-port source-port: Specifies the source port number in the range of 0 to 65535. This option is not supported by some protocols.

slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command tests all member devices. (In IRF mode.)

Examples

# Schedule an IPv6 load balancing test for the ICMPv6 protocol.

<Sysname> loadbalance schedule-test ipv6 protocol icmpv6 destination 10::1 source 12::2

    Matched virtual server: vs2

    Matched default server farm: sf

    Forward type: Forwarding to real server

    Selected real server: rs2

        Scheduling algorithm: Predictor

# Schedule an IPv6 load balancing test for the ICMPv6 protocol.

<Sysname> loadbalance schedule-test ipv6 protocol icmpv6 destination 10::1 source 12::2

    Matched virtual server: vs2

    Matched default link group: lg

    Forward type: Forwarding to link

    Selected link: link2

        Scheduling algorithm: Predictor

Table 32 Command output

Field

Description

Forward type

Forwarding mode:

·     The destination address is not supported. Load balancing is not performed.

·     Matching HTTP virtual server is not supported—An HTTP virtual server is matched. Load balancing is not supported.

·     Forward all—Forwards packets.

·     Forwarding to real server/link—Forwards packets to the real server or link.

·     Drop—Drops packets.

·     Redirect—Redirects packets.

·     Waiting—Enqueues packets.

Drop reason

Packet drop reason:

·     Number of connections or bandwidth for the virtual server exceeded the limit.

·     No class matched and no valid default server farm/link group configured.

·     No valid real server/link in the server farm/link group.

·     Action is drop.

·     A sticky entry was matched but the number of connections or bandwidth for the real server/link exceeded the limit.

·     A class was matched but no valid server farm/link group exists in the action of the class.

·     The HTTP message is not valid.

·     The HTTP request line is not valid.

·     The HTTP header is not valid.

·     The chunk HTTP content is not valid.

·     The server farm is busy.

·     Queue overflow (which means the wait queue is full).

Scheduling algorithm

Scheduling algorithm used to select the real server or link:

·     Predictor—The real server or link is selected by using the scheduling algorithm.

·     Sticky method—The real server or link is selected by using the sticky method.

·     Proximity—The link is selected by using the proximity feature.

 

loadbalance snat-global-policy

Use loadbalance snat-global-policy to create a SNAT global policy and enter its view, or enter the view of an existing SNAT global policy.

Use undo loadbalance snat-global-policy to delete the specified SNAT global policy.

Syntax

loadbalance snat-global-policy policy-name

undo loadbalance snat-global-policy policy-name

Default

No SNAT global policies exist.

Views

System view

Predefined user roles

network-admin

Parameters

policy-name: Specifies the SNAT global policy name, a case-insensitive string of 1 to 63 characters.

Examples

# Create the SNAT global policy sn1, and enter SNAT global policy view.

<Sysname> system-view

[Sysname] loadbalance snat-global-policy sn1

[Sysname-lb-snat-gp-sn1]

Related commands

snat-mode

snat-pool (server farm view)

loadbalance snat-pool

Use loadbalance snat-pool to create a SNAT address pool and enter its view, or enter the view of an existing SNAT address pool.

Use undo loadbalance snat-pool to delete the specified SNAT address pool.

Syntax

loadbalance snat-pool pool-name

undo loadbalance snat-pool pool-name

Default

No SNAT address pools exist.

Views

System view

Predefined user roles

network-admin

Parameters

pool-name: Specifies the SNAT address pool name, a case-insensitive string of 1 to 63 characters.

Examples

# Create the SNAT address pool lbsp, and enter SNAT address pool view.

<Sysname> system-view

[Sysname] loadbalance snat-pool lbsp

[Sysname-lbsnat-pool-lbsp]

loadbalance test pcre

Use loadbalance test pcre to perform a PCRE regular expression match test and display the match result.

Syntax

loadbalance test pcre value value { string string | file file-name } [ offset offset ] [ case-insensitive ]

Views

Any view

Predefined user roles

network-admin

Parameters

value value: Specifies a PCRE regular expression, a case-sensitive string of 1 to 255 characters excluding question marks (?).

string string: Specifies the string to be tested, a case-sensitive string of 1 to 255 characters.

file file-name: Specifies the file to be tested by its name, a case-insensitive string of 1 to 255 characters. The file size cannot exceed 5000 bytes.

offset offset: Specifies the offset from the content to be tested, in the range of 0 to 255 bytes. The default is 0.

case-insensitive: Enables case-insensitivity matching. If you do not specify this keyword, case-sensitivity matching applies.

Usage guidelines

If the specified string or file matches the PCRE regular expression multiple times, the device displays only the result of the first match.

For a string test, the device displays the match result in text strings. For a file test, the device displays the match result in both hexadecimal characters and text strings. Characters that cannot be displayed are represented as periods (.).

Examples

# Perform a PCRE regular expression match test for string ABCDAAaefg.

<Sysname> loadbalance test pcre value aaa string ABCDAAaefg case-insensitive

Matched string content: AAa

# Perform a PCRE regular expression match test for file 123.txt.

<Sysname> loadbalance test pcre value dzckgjlfdsfdsfsdnfsdkjgnf file 123.txt

Matched file content:

64 7a 63 6b 67 6a 6c 66 64  73 66 64 73 66 73 64   dzckgjlf dsfdsfsd

6e 66 73 64 6b 6a 67 6e 66  64                     nfsdkjgn f

loadbalance test rewrite

Use loadbalance test rewrite to perform a regular-expression-based rewrite test and display the rewrite result.

Syntax

loadbalance test rewrite value value replace replace-string { string string | file file-name } [ offset offset ] [ case-insensitive ]

Views

Any view

Predefined user roles

network-admin

Parameters

value value: Specifies a regular expression to match the content to be rewritten, a case-sensitive string of 1 to 255 characters excluding question marks (?). You can also specify the following character strings:

·     %is—Source IP address.

·     %ps—Source port number.

·     %id—Destination IP address.

·     %pd—Destination port number.

replace replace-string: Specifies the content after rewrite, a case-sensitive string of 1 to 255 characters.

string string: Specifies the string to be tested, a case-sensitive string of 1 to 255 characters.

file file-name: Specifies the file to be tested by its name, a case-insensitive string of 1 to 255 characters. The file size cannot exceed 5000 bytes.

offset offset: Specifies the offset from the content to be tested, in the range of 0 to 255 bytes. The default is 0.

case-insensitive: Enables case-insensitivity matching. If you do not specify this keyword, case-sensitivity matching applies.

Usage guidelines

If the string or file to be tested matches the regular expression, the device replaces the matching content with the content after rewrite.

If the string or file matches the regular expression multiple times, the device displays only the rewrite result of the first match.

For a string test, the device displays the rewrite result in text strings. For a file test, the device displays the rewrite result in both hexadecimal characters and text strings. Characters that cannot be displayed are represented as periods (.).

Examples

# Perform a rewrite test for string ABCDAAaefg.

<Sysname> loadbalance test rewrite value %id replace ip:%id,port:%pd string ABCDAAaefg case-insensitive

Rewritten string content: ABCD172.0.0.1fg

# Perform a rewrite test for file 123.txt.

<Sysname> loadbalance test rewrite value dzckgjlfdsfdsfsdnfsdkjgnf replace ip:%id,port:%pd file 123.txt

Rewritten file content:

66 67 73 2d 61 47 76 61 73  64 64 73 61 67 76 62   fgs-aGva sddsagvb

64 6a 63 78 6b 6c 63 78 76  0d 0a 0d 0a 0d 0a 0d   djcxklcx v.......

0a 69 70 3a 31 37 32 2e 30  2e 30 2e 31 2c 70 6f   .ip:172. 0.0.1,po

72 74 3a 38 30 09 6a 6b 64  67 6e 66 64 6a 6b 67   rt:80.jk dgnfdjkg

6e 66 64 6b 6a 67 6e 66 64  6b 6e 67 76 73 64 66   nfdkjgnf dkngvsdf

6c 0d 0a 0d 0a 0d 0a 0d 0a  66 67 73 2b 61 67 76   l....... .fgs+agv

61 73 64 64 73 61 67 76 62  64 6a 63 78 6b 6c 63   asddsagv bdjcxklc

78 76 0d 0a 66 67 73 64 61  67 76 61 73 64 64 73   xv..fgsd agvasdds

61 67 76 62 64 6a 63 78 6b  6c 63 78 76            agvbdjcx klcxv

match

Use match to specify the proximity probe method for packets.

Use undo match to restore the default.

Syntax

match [ match-id ] tcp { lb-probe lb-template | probe nqa-template }

undo match match-id

Default

No proximity probe method is specified.

Views

Proximity view

Predefined user roles

network-admin

Parameters

match-id: Specifies a proximity probe method by its ID in the range of 1 to 65535. If the rule does not exist, the command creates the proximity probe method. If the rule already exists, the command modifies the proximity probe method. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest available ID.

tcp: Specifies TCP packets.

lb-probe lb-template: Specifies an LB probe template by its name, a case-insensitive string of 1 to 32 characters.

probe nqa-template: Specifies an NQA template by its name, a case-insensitive string of 1 to 32 characters.

Usage guidelines

If the match command is configured, the specified proximity probe method applies. If no packets match the type in the match command or the match command is not configured, the default proximity probe method specified by using the match default command applies.

You can specify only one proximity probe method for each type of packets.

If both the match command and the match default command are configured, specify the same template type in the two commands as a best practice for both templates to take effect. If you specify different template types, the NQA template does not take effect.

Examples

# Create the ICMP-type NQA template t4, and specify the NQA template as the proximity probe method for TCP packets.

<Sysname> system-view

[Sysname] nqa template icmp t4

[Sysname-nqatplt-icmp-t4] quit

[Sysname] loadbalance proximity

[Sysname-lb-proximity] match tcp probe t4

Related commands

match default

match acl

Use match class to create an ACL match rule or modify an existing ACL match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] acl [ ipv6 ] { acl-number | name acl-name }

undo match match-id

Default

No match rules exist.

Views

LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

ipv6: Specifies an IPv6 ACL. If you do not specify this keyword, the command creates an IPv4 ACL.

acl-number: Specifies the ACL number in the range of 2000 to 3999.

name acl-name: Specifies an ACL by its name, a case-insensitive string of 1 to 63 characters starting with a letter.

Usage guidelines

If the specified ACL does not exist, this rule is not matched.

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create an ACL match rule for the generic LB class lbc1.

<Sysname> system-view

[Sysname] loadbalance class lbc1 type generic

[Sysname-lbc-generic-lbc1] match acl 2000

match app-group

Use match app-group to create an application group match rule or modify an existing application group match rule.

Use undo match app-group to delete a match rule.

Syntax

match [ match-id ] app-group group-name

undo match match-id

Default

No match rules exist.

Views

Link-generic LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

app-group group-name: Specifies an application group by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

If the specified application group does not exist, the rule does not take effect.

Examples

# Create an application group match rule for the link-generic LB class lbc1.

<Sysname> system-view

[Sysname] loadbalance class lbc1 type link-generic

[Sysname-lbc-link-generic-lbc1] match app-group http

Related commands

app-group (Security Command Reference)

match class

Use match class to create a match rule that references an LB class or modify an existing match rule that references an LB class.

Use undo match to delete a match rule.

Syntax

match [ match-id ] class class-name

undo match match-id

Default

An LB class does not have a match rule.

Views

LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

class-name: Specifies an LB class by its name, a case-insensitive string of 1 to 63 characters, to be referenced by the match rule. The current LB class cannot be referenced.

Usage guidelines

A match rule cannot reference an LB class that has already been referenced.

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create a match rule that references the LB class lbc2 for the generic LB class lbc1.

<Sysname> system-view

[Sysname] loadbalance class lbc1 type generic

[Sysname-lbc-generic-lbc1] match class lbc2

match content

Use match content to create an HTTP entity match rule or modify an existing HTTP entity match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] content content [ offset offset ]

undo match match-id

Default

An LB class does not have a match rule.

Views

HTTP LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

content content: Specifies the HTTP entity regular expression, a case-sensitive string of 1 to 255 characters. The string cannot contain question marks (?).

offset offset: Specifies the offset value of the HTTP entity based on the start of the HTTP packet, in the range of 0 to 1000 bytes. The default is 0.

Usage guidelines

If the entity of an HTTP packet after the offset value matches the specified regular expression, the packet matches the rule.

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create an HTTP entity match rule for the HTTP LB class lbc2: Specify the offset value as 10 and regular expression as abc.

<Sysname> system-view

[Sysname] loadbalance class lbc2 type http

[Sysname-lbc-http-lbc2] match content abc.* offset 10

match cookie

Use match cookie to create an HTTP cookie match rule or modify an existing HTTP cookie match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] cookie cookie-name value value

undo match match-id

Default

An LB class does not have a match rule.

Views

HTTP LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

cookie cookie-name: Specifies the name of the HTTP cookie, a case-sensitive string of 1 to 63 characters excluding brackets ({ }, ( ),[ ], < >), at sign (@), comma (,), semicolon (;), colon (:), backslash (\), quotation mark ("), slash (/), question mark (?), equal sign (=), space character (SP), and horizontal tab (HT). The character string also excludes ASCII codes that are less than or equal to 31 and greater than or equal to 127.

value value: Specifies the cookie value regular expression, a case-sensitive string of 1 to 255 characters. The string cannot contain question marks (?).

Usage guidelines

If an HTTP packet contains the specified cookie with the value matching the specified regular expression, the packet matches the rule.

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create an HTTP cookie match rule for the HTTP LB class lbc2: Specify the cookie name as JSession-id and cookie value regular expression as abc.

<Sysname> system-view

[Sysname] loadbalance class lbc2 type http

[Sysname-lbc-http-lbc2] match cookie JSession-id value abc.*

match default

Use match default to specify the default proximity probe method.

Use undo match default to restore the default.

Syntax

match default { lb-probe lb-template | probe nqa-template }

undo match default

Default

The default proximity probe method is not specified.

Views

Proximity view

Predefined user roles

network-admin

Parameters

lb-probe lb-template: Specifies an LB probe template by its name, a case-insensitive string of 1 to 32 characters.

probe nqa-template: Specifies an NQA template by its name, a case-insensitive string of 1 to 32 characters.

Usage guidelines

If the match command is configured, the specified proximity probe method applies. If no packets match the type in the match command or the match command is not configured, the default proximity probe method applies.

If both the match command and the match default command are configured, you must specify the same template type (load balancing or NQA) in the two commands as a best practice for both templates to take effect. If you specify different template types, the NQA template does not take effect.

Examples

# Create the ICMP-type NQA template t4, and specify the NQA template as the default proximity probe method.

<Sysname> system-view

[Sysname] nqa template icmp t4

[Sysname-nqatplt-icmp-t4] quit

[Sysname] loadbalance proximity

[Sysname-lb-proximity] match default probe t4

Related commands

loadbalance probe-template

match

nqa template (Network Management and Monitoring Command Reference)

match destination

Use match destination to create a destination IP address match rule or modify an existing destination IP address match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] destination { ip address ipv4-address [ mask-length | mask ] | ipv6 address ipv6-address [ prefix-length ] }

undo match match-id

Default

An LB class does not have a match rule.

Views

DNS/Link-generic LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

ip address ipv4-address: Specifies an IPv4 address.

mask-length: Specifies a mask length in the range of 0 to 32. The default is 32.

mask: Specifies a subnet mask. The default is 255.255.255.255.

ipv6 address ipv6-address: Specifies an IPv6 address.

prefix-length: Specifies a prefix length in the range of 0 to 128. The default is 128.

Usage guidelines

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create a match rule to match destination IPv4 address 1.1.1.1/32 for the DNS LB class lbc1.

<Sysname> system-view

[Sysname] loadbalance class lbc1 type dns

[Sysname-lbc-dns-lbc1] match destination ip address 1.1.1.1

# Create a match rule to match destination IPv4 address 1.1.1.1/32 for the link-generic LB class lbc2.

<Sysname> system-view

[Sysname] loadbalance class lbc2 type link-generic

[Sysname-lbc-link-generic-lbc2] match destination ip address 1.1.1.1

match destination domain-name

Use match destination domain-name to create a domain name match rule or modify an existing domain name match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] destination domain-name domain-name

undo match match-id

Default

An LB class does not have a match rule.

Views

Link-generic LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

domain-name: Specifies a domain name, a case-insensitive string of 1 to 253 characters. Each dot-separated part in the domain name can contain a maximum of 63 characters. The domain name can contain letters, digits, hyphens (-), underscores (_), dots (.), and wildcards (asterisks and question marks).

Usage guidelines

When you use wildcards (asterisks and question marks) in a domain name, follow these guidelines:

·     The wildcards can substitute any characters except for dots (.).

·     An asterisk (*) can substitute a character string.

·     A question mark (?) can substitute a single character.

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create a domain name match rule for the link-generic LB class lbc1 to match domain name www.abc.com.

<Sysname> system-view

[Sysname] loadbalance class lbc1 type link-generic

[Sysname-lbc-link-generic-lbc1] match destination domain-name www.aaa.com

match domain-name

Use match domain-name to create a domain name match rule or modify an existing domain name match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] domain-name domain-name

undo match match-id

Default

An LB class does not have a match rule.

Views

DNS LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

domain-name: Specifies a domain name, a case-insensitive string of 1 to 253 characters. Each dot-separated part in the domain name can contain a maximum of 63 characters. The domain name can contain letters, digits, hyphens (-), underscores (_), dots (.), and wildcards (asterisks and question marks).

Usage guidelines

When you use wildcards (asterisks and question marks) in a domain name, follow these guidelines:

·     The wildcards can substitute any characters except for dots (.).

·     An asterisk (*) can substitute a character string.

·     A question mark (?) can substitute a single character.

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create a domain name match rule for DNS LB class lbc1 to match domain name www.abc.com.

<Sysname> system-view

[Sysname] loadbalance class lbc1 type dns

[Sysname-lbc-dns-lbc1] match domain-name www.abc.com

match header

Use match header to create an HTTP header match rule or modify an existing HTTP header match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] header header-name value value

undo match match-id

Default

An LB class does not have a match rule.

Views

HTTP LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

header header-name: Specifies the name of the HTTP packet header, a case-insensitive string of 1 to 63 characters excluding brackets ({ }, ( ),[ ], < >), at sign (@), comma (,), semicolon (;), colon (:), backslash (\), quotation mark ("), slash (/), question mark (?), equal sign (=), space character (SP), and horizontal tab (HT). The character string also excludes ASCII codes that are less than or equal to 31 and greater than or equal to 127.

value value: Specifies the header value regular expression, a case-sensitive string of 1 to 255 characters. The string cannot contain question marks (?).

Usage guidelines

If an HTTP packet contains the specified header with the value matching the specified regular expression, the packet matches the rule.

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create an HTTP header match rule for the HTTP LB class lbc2: Specify the HTTP packet header name as user-agent and header value regular expression as abcd.

<Sysname> system-view

[Sysname] loadbalance class lbc2 type http

[Sysname-lbc-http-lbc2] match header user-agent value abcd

match interface

Use match interface to create an interface match rule or modify an existing interface match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] interface interface-type interface-number

undo match match-id

Default

An LB class does not have a match rule.

Views

Generic/HTTP/Link-generic LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

interface interface-type interface-number: Specifies an interface by its type and number. The interface type can be Layer 3 Ethernet interface and Layer 3 aggregate interface.

Usage guidelines

If the specified interface does not exist, the rule does not take effect.

Examples

# Create an interface match rule for the link-generic LB class lbc1 to match interface GigabitEthernet 1/0/0.

<Sysname> system-view

[Sysname] loadbalance class lbc1 type link-generic

[Sysname-lbc-link-generic-lbc1] match interface gigabitethernet 1/0/0

match isp

Use match isp to create an ISP match rule or modify an existing ISP match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] isp isp-name

undo match match-id

Default

An LB class does not have a match rule.

Views

LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

isp-name: Specifies an ISP name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

If the specified ISP does not exist or is not configured with an IP network segment, this rule is not matched.

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create an ISP match rule for the generic LB class lbc1. Specify the ISP name as isp1.

<Sysname> system-view

[Sysname] loadbalance class lbc1 type generic

[Sysname-lbc-generic-lbc1] match isp isp1

match method

Use match method to create an HTTP method match rule or modify an existing HTTP method match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] method { ext ext-type | rfc rfc-type }

undo match match-id

Default

An LB class does not have a match rule.

Views

HTTP LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

ext ext-type: Specifies the extended type, a case-sensitive string of 1 to 63 characters excluding brackets ({ }, ( ),[ ], < >), at sign (@), comma (,), semicolon (;), colon (:), backslash (\), quotation mark ("), slash (/), question mark (?), equal sign (=), space character (SP), and horizontal tab (HT). The character string also excludes ASCII codes that are less than or equal to 31 and greater than or equal to 127.

rfc rfc-type: Specifies the RFC type to process the resources identified by the URI in HTTP request packets:

·     CONNECT—Maintain the resources.

·     DELETE—Delete the resources.

·     GET—Request for the resources.

·     HEAD—Request for the header of the response message of the resources.

·     OPTIONS—Request to query the resources-related options and requirements supported by the server.

·     POST—Add new data to the resources.

·     PUT—Request the server to store the resource identified by the URI.

·     TRACE—Request the server to return the request message it receives for test or diagnosis.

Usage guidelines

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create a packet matching method match rule with extended type user for the HTTP LB class lbc2.

<Sysname> system-view

[Sysname] loadbalance class lbc2 type http

[Sysname-lbc-http-lbc2] match method ext user

# Create a packet matching method match rule with RFC type CONNECT for the HTTP LB class lbc2.

<Sysname> system-view

[Sysname] loadbalance class lbc2 type http

[Sysname-lbc-http-lbc2] match method rfc CONNECT

match payload

Use match payload to create a TCP payload match rule or modify an existing TCP payload match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] payload payload [ case-insensitive ] [ not ]

undo match match-id

Default

An LB class does not have a match rule.

Views

Generic LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

payload: Specifies the TCP payload regular expression, a case-sensitive string of 1 to 255 characters.

case-insensitive: Disables case sensitivity for matching character strings. If you do not specify this keyword, case sensitivity is enabled.

not: Negates the match rule. If you do not specify this keyword, the LB action is taken when the TCP payload regular expression is matched.

Usage guidelines

The device takes the corresponding LB action on TCP packets matching a TCP payload match rule. If you specify the not keyword for a TCP payload match rule, the device takes the corresponding LB action on TCP packets not matching the TCP payload match rule.

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create a match rule to match the payload hello for generic LB class c1.

<Sysname> system-view

[Sysname] loadbalance class c1 type generic

[Sysname-lbc-generic-c1] match payload hello

match radius-attribute

Use match radius-attribute to create a RADIUS attribute match rule or modify an existing RADIUS attribute match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] radius-attribute { code attribute-code | user-name } value attribute-value

undo match match-id

Default

An LB class does not have a match rule.

Views

RADIUS LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

code attribute-code: Specifies the code of the RADIUS attribute type, in the range of 1 to 255.

user-name: Specifies the RADIUS attribute type as user-name (code 1).

value attribute-value: Specifies the RADIUS attribute regular expression, a case-sensitive string of 1 to 255 characters.

Usage guidelines

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create a match rule to match usernames that contain aaa for RADIUS LB class lbc1.

<Sysname> system-view

[Sysname] loadbalance class lbc1 type radius

[Sysname-lbc-radius-lbc1] match radius-attribute user-name value aaa*

match source

Use match source to create a source IP address match rule or modify an existing source IP address match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] source { ip address ipv4-address [ mask-length | mask ] | ipv6 address ipv6-address [ prefix-length ] }

undo match match-id

Default

An LB class does not have a match rule.

Views

LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

source: Specifies the match rule type as source IP address.

ip address ipv4-address: Specifies an IPv4 address.

mask-length: Specifies a mask length in the range of 0 to 32. The default is 32.

mask: Specifies a subnet mask. The default is 255.255.255.255.

ipv6 address ipv6-address: Specifies an IPv6 address.

prefix-length: Specifies a prefix length in the range of 0 to 128. The default is 128.

Usage guidelines

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create a match rule that matches source IP address 1.1.1.1/32 for the generic LB class lbc1.

<Sysname> system-view

[Sysname] loadbalance class lbc1 type generic

[Sysname-lbc-generic-lbc1] match source ip address 1.1.1.1

match sql

Use match sql to create a MySQL statement match rule or modify an existing MySQL statement match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] sql sql [ case-insensitive ] [ not ]

undo match match-id

Default

An LB class does not have a match rule.

Views

MySQL LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

sql: Specifies a regular expression used to match MySQL statements, a case-sensitive string of 1 to 255 characters.

case-insensitive: Disables case sensitivity for matching character strings. If you do not specify this keyword, case sensitivity is enabled.

not: Specifies that the LB action is taken when the MySQL statement regular expression is not matched. If you do not specify this keyword, the LB action is taken when the MySQL statement regular expression is matched.

Usage guidelines

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create a match rule that matches MySQL statement select for the MySQL LB class c1.

<Sysname> system-view

[Sysname] loadbalance class c1 type mysql

[Sysname-lbc-mysql-lbc1] match sql select

match url

Use match url to create an HTTP URL match rule or modify an existing HTTP URL match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] url url

undo match match-id

Default

An LB class does not have a match rule.

Views

HTTP LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

url url: Specifies a URL regular expression, a case-sensitive string of 1 to 255 characters. The string cannot contain question marks (?).

Usage guidelines

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create an HTTP URL match rule with regular expression .*.html for the HTTP LB class lbc2.

<Sysname> system-view

[Sysname] loadbalance class lbc2 type http

[Sysname-lbc-http-lbc2] match url .*.html

match user

Use match user to create a user match rule or modify an existing user match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] [ identity-domain domain-name ] user user-name

undo match match-id

Default

An LB class does not have a match rule.

Views

Generic/HTTP/Link-generic LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

identity-domain domain-name: Matches the user in an identity domain. The domain-name argument represents the identity domain name, a case-insensitive string of 1 to 255 characters excluding question marks (?). If you do not specify this option, the system matches the user among users that do not belong to any identity domain.

user-name: Specifies a username, a case-sensitive string of 1 to 55 characters.

Usage guidelines

If the specified user does not exist, the rule does not take effect.

Examples

# Create a user match rule for the link-generic LB class lbc1 to match user u1 in identity domain domain1.

<Sysname> system-view

[Sysname] loadbalance class lbc1 type link-generic

[Sysname-lbc-link-generic-lbc1] match identity-domain domain1 user u1

Related commands

display loadbalance class

match user-group

Use match user-group to create a user group match rule or modify an existing user group match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] [ identity-domain domain-name ] user-group user-group-name

undo match match-id

Default

An LB class does not have a match rule.

Views

Generic/HTTP/Link-generic LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

identity-domain domain-name: Matches the user group in an identity domain. The domain-name argument represents the identity domain name, a case-insensitive string of 1 to 255 characters excluding question marks (?). If you do not specify this option, the system matches the user group among user groups that do not belong to any identity domain.

user-group-name: Specifies a user group by its name, a case-insensitive string of 1 to 200 characters.

Usage guidelines

If the specified user group does not exist, the rule does not take effect.

Examples

# Create a user group match rule for the link-generic LB class lbc1 to match user group lb-group in identity domain domain1.

<Sysname> system-view

[Sysname] loadbalance class lbc1 type link-generic

[Sysname-lbc-link-generic-lbc1] match identity-domain domain1 user-group lb-group

Related commands

display loadbalance class

match version

Use match version to create an HTTP version match rule or modify an existing HTTP version match rule.

Use undo match to delete a match rule.

Syntax

match [ match-id ] version { 1.0| 1.1 }

undo match match-id

Default

An LB class does not have a match rule.

Views

HTTP LB class view

Predefined user roles

network-admin

Parameters

match-id: Specifies a match rule by its ID in the range of 1 to 65535. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

1.0: Specifies HTTP 1.0.

1.1: Specifies HTTP 1.1.

Usage guidelines

You can create a maximum of 65535 match rules for an LB class.

Examples

# Create an HTTP version match rule with HTTP 1.0 for the HTTP LB class lbc1.

<Sysname> system-view

[Sysname] loadbalance class lbc1 type http

[Sysname-lbc-dns-lbc1] match version 1.0

match-buffer-end

Use match-buffer-end to configure the buffering end string for TCP payload matching.

Use undo match-buffer-end to restore the default.

Syntax

match-buffer-end string

undo match-buffer-end

Default

No buffering end string is configured.

Views

TCP-application parameter profile view

Predefined user roles

network-admin

Parameters

string: Specifies a string that indicates the end of buffering, a case-insensitive string of 1 to 31 characters.

Usage guidelines

For the TCP payload match rule, the device buffers traffic from clients for TCP payload matching during the buffering period. The device stops buffering traffic when any of the following events occurs:

·     The device receives the buffering end string from clients.

·     The size of buffered data exceeds the specified buffering size.

·     The buffered data matches the TCP payload match rule.

This command specifies the string that indicates the end of buffering for traffic received from clients.

Examples

# In TCP-application parameter profile p1, configure the buffering end string as over.

<Sysname> system-view

[Sysname] parameter-profile p1 type tcp-application

[Sysname-para-tcp-application-p1] match-buffer-end over

Related commands

match-buffer-size

match-buffer-time

match payload

match-buffer-size

Use match-buffer-size to set the maximum buffering size for TCP payload matching.

Use undo match-buffer-size to restore the default.

Syntax

match-buffer-size size

undo match-buffer-size

Default

The maximum buffering size is 4096 bytes.

Views

TCP-application parameter profile view

Predefined user roles

network-admin

Parameters

size: Specifies the maximum buffering size in the range of 1 to 4096 bytes.

Usage guidelines

For the TCP payload match rule, the device buffers traffic from clients for TCP payload matching during the buffering period. The device stops buffering traffic when any of the following events occurs:

·     The device receives the buffering end string from clients.

·     The size of buffered data exceeds the specified buffering size.

·     The buffered data matches the TCP payload match rule.

This command specifies the maximum size of TCP data from clients that the device can buffer.

Examples

# In TCP-application parameter profile p1, set the maximum buffering size to 2048 bytes for TCP payload matching.

<Sysname> system-view

[Sysname] parameter-profile p1 type tcp-application

[Sysname-para-tcp-application-p1] match-buffer-size 2048

Related commands

match-buffer-end

match-buffer-time

match payload

match-buffer-time

Use match-buffer-time to set the buffering period for TCP payload matching.

Use undo match-buffer-time to restore the default.

Syntax

match-buffer-time time

undo match-buffer-time

Default

The buffering period for TCP payload matching is 3 seconds.

Views

TCP-application parameter profile view

Predefined user roles

network-admin

Parameters

time: Specifies the buffering period in the range of 1 to 5 seconds.

Usage guidelines

For the TCP payload match rule, the device buffers traffic from clients for TCP payload matching during the buffering period. The device stops buffering traffic when any of the following events occurs:

·     The device receives the buffering end string from clients.

·     The size of buffered data exceeds the specified buffering size.

·     The buffered data matches the TCP payload match rule.

This command specifies the amount of time for the device to buffer TCP data sent by clients.

Examples

# In TCP-application parameter profile p1, set the buffering period for TCP payload matching to 3 seconds.

<Sysname> system-view

[Sysname] parameter-profile p1 type tcp-application

[Sysname-para-tcp-application-p1] match-buffer-time 3

Related commands

match-buffer-end

match-buffer-size

match payload

max-bandwidth

Use max-bandwidth to set the maximum expected bandwidth of an LB link.

Use undo max-bandwidth to restore the default.

Syntax

max-bandwidth [ inbound | outbound ] bandwidth-value kbps

undo max-bandwidth [ inbound | outbound ]

Default

The maximum expected bandwidth of an LB link is not limited.

Views

Link view

Predefined user roles

network-admin

Parameters

inbound: Specifies the maximum inbound expected bandwidth.

outbound: Specifies the maximum outbound expected bandwidth.

bandwidth-value: Specifies the maximum expected bandwidth in the range of 0 to 4294967295. The value 0 means the bandwidth is not limited.

kbps: Specifies the bandwidth unit as kbps.

Usage guidelines

If you do not specify the inbound or outbound keyword, the maximum expected bandwidth equals the inbound expected bandwidth plus the outbound expected bandwidth.

This command takes effect only on new sessions and does not take effect on existing sessions.

In addition to being used for link protection, the maximum expected bandwidth is used for remaining bandwidth calculation in the bandwidth algorithm, maximum bandwidth algorithm, and dynamic proximity algorithm.

Examples

# Set the maximum expected bandwidth of the LB link lk1 to 1 kbps.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] max-bandwidth 1 kbps

# Set the maximum inbound expected bandwidth of the LB link lk1 to 1 kbps.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] max-bandwidth inbound 1 kbps

# Set the maximum outbound expected bandwidth of the LB link lk1 to 1 kbps.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] max-bandwidth outbound 1 kbps

max-number

Use max-number to set the maximum number of proximity entries.

Use undo max-number to restore the default.

Syntax

max-number number

undo max-number

Default

The maximum number of proximity entries is 65535.

Views

Proximity view

Predefined user roles

network-admin

Parameters

number: Specifies the maximum number of proximity entries, in the range of 0 to 10000000. The value 0 indicates that the maximum number of proximity entries is not limited.

Examples

# Set the maximum number of proximity entries to 100.

<Sysname> system-view

[Sysname] loadbalance proximity

[Sysname-lb-proximity] max-number 100

max-reuse

Use max-reuse to set the maximum number of times that a TCP connection can be reused.

Use undo max-reuse to restore the default.

Syntax

max-reuse reuse-number

undo max-reuse

Default

A TCP connection can be reused for a maximum of 1000 times.

Views

OneConnect parameter profile view

MySQL parameter profile view

Predefined user roles

network-admin

Parameters

reuse-number: Specifies the maximum number of reuse times, in the range of 1 to 4294967295.

Usage guidelines

After connection reuse is enabled, a TCP connection is not disconnected until the maximum number of reuse times is reached. After the TCP connection is disconnected, new connection requests trigger establishment of a new TCP connection.

Examples

# In OneConnect parameter profile ocp, set the maximum number of reuse times to 10000.

<Sysname> system-view

[Sysname] parameter-profile ocp type oneconnect

[Sysname-para-oneconnect-ocp] max-reuse 10000

memory-size

Use memory-size to set the memory size used for compression.

Use undo memory-size to restore the default.

Syntax

memory-size size

undo memory-size

Default

The memory size used for compression is 8 KB.

Views

HTTP-compression parameter profile view

Predefined user roles

network-admin

Parameters

size: Specifies the memory size in KB used for compression. The value can only be 1, 2, 4, 8, 16, 32, or 64.

Examples

# Create the HTTP-compression parameter profile pa1, and set the memory size used for compression to 32 KB.

<Sysname> system-view

[Sysname] parameter-profile pa1 type http-compress

[Sysname-para-http-compress-pa1] memory-size 32

monitor-interval

Use monitor-interval to set the monitoring time for an LB probe template.

Use undo monitor-interval to restore the default.

Syntax

monitor-interval interval-time

undo monitor-interval

Default

The monitoring time is 10 seconds for a TCP-RST or TCP zero-window LB probe template, 1 second for an HTTP passive LB probe template, and 5 seconds for a custom-monitoring LB probe template.

Views

HTTP passive LB probe template view

TCP-RST LB probe template view

TCP zero-window LB probe template view

Custom-monitoring LB probe template view

Predefined user roles

network-admin

Parameters

interval-time: Specifies the monitoring time in the range of 5 to 255 seconds for a TCP-RST or TCP zero-window LB probe template, in the range of 1 to 5 seconds for an HTTP passive LB probe template, and in the range of 1 to 86400 seconds for a custom-monitoring LB probe template.

Usage guidelines

During the monitoring time, the system counts the number of RST packets or zero-window packets sent by each server farm member in a server farm.

During the monitoring time, the system monitors the responses of matching HTTP requests and counts the number of URL error times.

After a custom-monitoring LB probe template is specified, the system executes the custom script file during the monitoring time to detect the state of real servers.

Examples

# In TCP RST LB probe template rsttplt, set the monitoring time to 60 seconds.

<Sysname> system-view

[Sysname] loadbalance probe-template tcp-rst rsttplt

[Sysname-lbpt-tcp-rst-rsttplt] monitor-interval 60

Related commands

external-script

node

Use node to create a statistics node and enter its view, or enter the view of an existing statistics node.

Use undo node to delete the specified statistics node.

Syntax

node node-name

undo node node-name

Default

No statistics nodes exist.

Views

HTTP statistics parameter profile view

Predefined user roles

network-admin

Parameters

node-name: Specifies the statistics node name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

You can configure a maximum of 256 statistics nodes in one HTTP statistics parameter profile.

Examples

# In HTTP statistics parameter profile http1, create statistics node node1 and enter statistics node view.

<Sysname> system-view

[Sysname] parameter-profile http1 type http-statistics

[Sysname-para-http-statistics-http1] node node1

[Sysname-para-http-statistics-http1-node-node1]

override-limit enable

Use override-limit enable to ignore the limits for sessions that match sticky entries.

Use undo override-limit enable to remove the configuration.

Syntax

override-limit enable

undo override-limit enable

Default

The session limits apply to sessions that match sticky entries.

Views

Sticky group view

Predefined user roles

network-admin

Usage guidelines

Use this command to ignore the following limits for sessions that match sticky entries:

·     Bandwidth and connection parameters on real servers or links.

·     Bandwidth ratios and maximum expected bandwidths for real servers or links.

·     LB connection limit policies on virtual servers.

This command takes effect only on new sessions and does not take effect on existing sessions.

Examples

# Ignore the limits for sessions that match sticky entries generated in the sticky group st.

<Sysname> system-view

[Sysname] sticky-group st type http-cookie

[Sysname-sticky-http-cookie-st] override-limit enable

parameter

Use parameter to specify a parameter profile to be referenced by a virtual server.

Use undo parameter to restore the default.

Syntax

parameter { http | http-compression | http-statistics | ip | mysql | oneconnect | tcp | tcp-application } profile-name [ client-side | server-side ]

undo parameter { http | http-compression | http-statistics | ip | mysql | oneconnect | tcp | tcp-application } [ client-side | server-side ]

Default

No parameter profile is referenced by a virtual server.

Views

Virtual server view

Predefined user roles

network-admin

Parameters

{ http | http-compression | http-statistics | ip | mysql | oneconnect | tcp | tcp-application }: Specifies a parameter profile type, HTTP, HTTP-compression, HTTP statistics, IP, OneConnect, TCP, or TCP-application. The http and tcp keywords are supported by the virtual servers of the fast HTTP or HTTP type. The http-compression, http-statistics, and oneconnect keywords are supported only by the virtual servers of the HTTP type. The mysql keyword is supported only by MySQL virtual servers. The tcp-application keyword is supported only by TCP virtual servers operating at Layer 7.

profile-name: Specifies a parameter profile by its name, a case-insensitive string of 1 to 63 characters.

client-side: Specifies a client-side parameter profile.

server-side: Specifies a server-side parameter profile.

Usage guidelines

The virtual server references the parameter profile to implement analysis, processing, and optimization for service traffic.

The virtual servers of the RADIUS type can only reference the IP parameter profile.

A client-side parameter profile optimizes and processes TCP connections between the client and the device. A server-side parameter profile optimizes and processes TCP connections between the device and the server. Only TCP parameter profiles support the client-side and server-side keywords.

Examples

# Specify the IP parameter profile pp2 to be referenced by the IP-type virtual server vs3.

<Sysname> system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] parameter ip pp2

parameter-profile

Use parameter-profile to create a parameter profile and enter its view, or enter the view of an existing parameter profile.

Use undo parameter-profile to delete the specified parameter profile.

Syntax

parameter-profile profile-name [ type { http | http-compression | http-statistics | ip | mysql | oneconnect | tcp | tcp-application } ]

undo parameter-profile profile-name

Default

No parameter profiles exist.

Views

System view

Predefined user roles

network-admin

Parameters

profile-name: Specifies a parameter profile name, a case-insensitive string of 1 to 63 characters.

type { http | http-compression | http-statistics | ip | mysql | oneconnect | tcp | tcp-application }: Specifies a parameter profile type, HTTP, HTTP-compression, HTTP statistics, IP, MySQL, OneConnect, TCP, or TCP-application. When you create a parameter profile, you must specify the parameter profile type. You can enter an existing parameter profile view without entering the parameter profile type.

Usage guidelines

You can configure advanced parameters through the parameter profile. The virtual server references the parameter profile to implement analysis, processing, and optimization for service traffic.

Examples

# Create the IP parameter profile pp2, and enter parameter profile view.

<Sysname> system-view

[Sysname] parameter-profile pp2 type ip

[Sysname-para-ip-pp2]

payload (HTTP/UDP payload sticky group view)

Use payload to configure the HTTP or UDP payload sticky method.

Use undo payload to delete the HTTP or UDP payload sticky method.

Syntax

payload [ offset offset ] [ start start-string ] [ end end-string | length length ]

undo payload

Default

No sticky methods exist.

Views

HTTP/UDP payload sticky group view

Predefined user roles

network-admin

Parameters

offset offset: Specifies the offset value of the HTTP or UDP payload based on the start of the HTTP or UDP packet, in the range of 0 to 1000 bytes. The default is 0.

start start-string: Specifies the regular expression that marks the start of the HTTP or UDP payload, a case-sensitive string of 1 to 127 characters starting from the offset value. The string cannot contain question marks (?).

end end-string: Specifies the regular expression that marks the end of the HTTP or UDP payload, a case-sensitive string of 1 to 127 characters starting from the start-string value. The string cannot contain question marks (?).

length length: Specifies the length of the HTTP or UDP payload, in the range of 0 to 1000 bytes. The default is 0, which indicates all lengths.

Usage guidelines

Use this command to obtain the HTTP or UDP payload information used to generate sticky entries based on the offset, start-string, end-string, and length values. The start-string and end-string values are not included in the sticky entry information.

This command is not supported by the virtual servers of the fast HTTP type.

Examples

# Configure the HTTP payload sticky method for the HTTP payload sticky group sg5: Starting from the 10th byte of start of the HTTP packet, use the 20-byte HTTP payload to generate sticky entries.

<Sysname> system-view

[Sysname] sticky-group sg5 type payload

[Sysname-sticky-payload-sg5] payload offset 10 length 20

# Configure the UDP payload sticky method for the UDP payload sticky group sg6: Starting from the 28th byte of start of the UDP packet, use the 6-byte UDP payload to generate sticky entries.

<Sysname> system-view

[Sysname] sticky-group sg6 type payload

[Sysname-sticky-payload-sg6] payload offset 28 length 6

payload (UDP passive sticky group view)

Use payload to configure the UDP payload passive sticky method.

Use undo payload to delete the UDP payload passive sticky method.

Syntax

payload { get | match } [ offset offset ] [ start start-string ] [ end end-string | length length ]

undo payload { get | match }

Default

No UDP payload passive sticky methods exist.

Views

UDP passive sticky group view

Predefined user roles

network-admin

Parameters

get: Obtains the specified string in the UDP response payload, which is used to generate a UDP payload passive sticky entry.

match: Obtains the specified string in the UDP request payload, which is used to match a UDP payload passive sticky entry.

offset offset: Specifies the offset value of the UDP payload based on the start of the UDP packet, in the range of 0 to 1000 bytes. The default is 0.

start start-string: Specifies the regular expression that marks the start of the UDP payload, a case-sensitive string of 1 to 127 characters starting from the offset value. The string cannot contain question marks (?).

end end-string: Specifies the regular expression that marks the end of the UDP payload, a case-sensitive string of 1 to 127 characters starting from the start-string value. The string cannot contain question marks (?).

length length: Specifies the length of the UDP payload, in the range of 0 to 1000 bytes. The default is 0, which indicates all lengths.

Usage guidelines

Use the payload get command to obtain the UDP response payload information based on the offset, start-string, end-string, and length values. Use the payload match command to obtain the UDP request payload information based on those values.

The start-string and end-string values are not included in the sticky entry information.

Both the payload get and payload match commands are required for a UDP payload passive sticky method.

The device obtains the payload information of an incoming UDP request based on the payload match command and obtains the payload information of an incoming UDP response based on the payload get command. If the payload information of the UDP request matches the payload information of the UDP response, the device generates a sticky entry based on the payload information of the UDP response. Subsequent UDP requests that match the sticky entry are forwarded according to the sticky entry.

Examples

# Configure the UDP payload passive sticky method for the UDP passive sticky group sg5: Obtain the 20-byte UDP payload string starting with id in the UDP response. If the obtained string matches the 20-byte UDP payload string starting with id in the UDP request, the device generates a sticky entry based on the string obtained from the UDP response.

<Sysname> system-view

[Sysname] sticky-group sg5 type udp-passive

[Sysname-sticky-udp-passive-sg5] payload get start id length 20

[Sysname-sticky-udp-passive-sg5] payload match start id length 20

payload rewrite

Use payload rewrite to rewrite the TCP payload.

Use undo payload rewrite to remove the configuration.

Syntax

payload rewrite { both | request | response } value value replace replace-string

undo payload rewrite { both | request | response } value value

Default

The TCP payload is not rewritten.

Views

Generic LB action view

Predefined user roles

network-admin

Parameters

both: Specifies both the TCP request and response packets.

request: Specifies the TCP request packets.

response: Specifies the TCP response packets.

value value: Specifies the TCP packet header content to be rewritten, a case-sensitive string of 1 to 127 characters.

replace replace-string: Specifies the content after rewrite, a case-sensitive string of 1 to 127 characters. You can also specify the following replacement strings:

·     %[variable]—Replaces the specified value with the variable associated with the server farm member. The variable is the variable name.

·     %[1-9]—Replaces the specified value with the content in the corresponding parentheses of the specified value. For example, executing the payload rewrite value (Wel)(co)(me) replace %2 command will replace the string Welcome with co in the second pair of parentheses.

Usage guidelines

You can replace the specified value with the variable associated with the server farm member by specifying the replacement string %[variable]. For example, you can replace the string QMGR.S01 in the payload with QMGR.S0_1 by executing the following commands:

·     variable var1 value _1 (in server farm member view).

·     payload rewrite request value “QMGR.S01” replace QMGR.S01%[var1] (in generic LB action view).

Examples

# In generic LB action lba1, replace QMGR.S01 in the payload of TCP requests with QMGR.S01%[var1]. var1 is the name of the variable associated with the server farm member.

<Sysname> system-view

[Sysname] loadbalance action lba1 type generic

[Sysname-lba-generic-lba1] payload rewrite request value QMGR.S01 replace QMGR.S01%[var1]

Related commands

variable

pool-size

Use pool-size to set the maximum number of connections allowed in the MySQL connection pool.

Use undo pool-size to restore the default.

Syntax

pool-size pool-size

undo pool-size

Default

The maximum number of connections allowed in the MySQL connection pool is 1024.

Views

MySQL parameter profile view

Predefined user roles

network-admin

Parameters

pool-size: Specifies the maximum number of connections allowed in the MySQL connection pool, in the range of 1 to 64000.

Usage guidelines

After MySQL data transfer is completed, the TCP connection is stored in a connection pool instead of being closed. For a new connection request, the device selects an available connection from the connection pool before attempting to open a new connection.

Examples

# Set the maximum number of connections allowed in the MySQL connection pool to 2000 for the MySQL parameter profile p1.

<Sysname> system-view

[Sysname] parameter-profile p1 type mysql

[Sysname-para-mysql-p1] pool-size 2000

port (DNS server view)

Use port to configure the port number of a DNS server.

Use undo port to restore the default.

Syntax

port port-number

undo port

Default

The port number of a DNS server is 0.

Views

DNS server view

Predefined user roles

network-admin

Parameters

port-number: Specifies a port number in the range of 0 to 65535. The value 0 means that the original port number is used.

Usage guidelines

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the port number of DNS server ds1 as 5353.

<Sysname> system-view

[Sysname] loadbalance dns-server ds1

[Sysname-lb-ds-ds1] port 5353

port (real server view)

Use port to configure the port number of a real server.

Use undo port to restore the default.

Syntax

port port-number

undo port

Default

The port number of a real server is 0. (The original port number is used.)

Views

Real server view

Predefined user roles

network-admin

Parameters

port-number: Specifies a port number in the range of 0 to 65535. 0 means the original port number is used.

Usage guidelines

This configuration takes effect only when you enable the NAT feature for the server farm.

Examples

# Specify the port number of the real server rs as 8080.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] port 8080

Related commands

transparent enable (server farm view)

port (transparent DNS proxy view)

Use port to configure the port number of a transparent DNS proxy.

Use undo port to restore the default.

Syntax

port port-number

undo port

Default

The port number of a transparent DNS proxy is 53.

Views

Transparent DNS proxy view

Predefined user roles

network-admin

Parameters

port-number: Specifies a port number in the range of 1 to 65535.

Usage guidelines

A transparent DNS proxy processes a DNS request only when the destination IP address and port number of the DNS request matches those of the transparent DNS proxy.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the port number of transparent DNS proxy dns-proxy1 as 5353.

<Sysname> system-view

[Sysname] loadbalance dns-proxy dns-proxy1

[Sysname-lb-dp-dns-proxy1] port 5353

Related commands

display loadbalance dns-proxy

port (virtual server view)

Use port to configure the port number of a virtual server.

Use undo port to restore the default.

Syntax

port { port-number [ to port-number ] } &<1-n>

undo port

Default

The port number is 0 (indicates any port) for the virtual server of the IP, RADIUS, TCP, or UDP type. The port number is 80 for the virtual server of the fast HTTP or HTTP type. The port number is 5060 for the virtual server of the SIP type.

Views

Virtual server view

Predefined user roles

network-admin

Parameters

port-number [ to port-number ] &<1-n>: Specifies a space-separated list of up to n port number items. Each port number item specifies a port number or a range of port numbers in the form of start-port-number to end-port-number. For IP, RADIUS, TCP, and UDP virtual servers, the value range for the port-number argument is 0 to 65535 (0 means any port) and the value range for n is 1 to 8. For HTTP, fast HTTP, and SIP virtual servers, the value range for the port-number argument is 1 to 65535 and the value of n can only be 1.

Usage guidelines

If the virtual server has referenced an SSL policy, you must configure a non-default port number (typically 443) for the virtual server.

Examples

# Specify the port number of the IP-type virtual server vs3 as 8080.

<Sysname> system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] port 8080

Related commands

ssl-server-policy

predictor (DNS server pool view)

Use predictor to specify a scheduling algorithm for a DNS server pool.

Use undo predictor to restore the default.

Syntax

predictor hash address { destination | source | source-ip-port } [ mask mask-length ] [ prefix prefix-length ]

predictor { random | round-robin | { bandwidth | max-bandwidth } [ inbound | outbound ] }

undo predictor

Default

The scheduling algorithm for a DNS server pool is weighted round robin.

Views

DNS server pool view

Predefined user roles

network-admin

Parameters

hash address: Specifies the hash algorithm based on the IP address.

destination: Specifies the hash algorithm based on the destination IP address.

source: Specifies the hash algorithm based on the source IP address.

source-ip-port: Specifies the hash algorithm based on the source IP address and port number.

mask mask-length: Specifies the mask length of the IPv4 address used in the hash algorithm. The value range for the mask-length argument is 0 to 32. The default is 32.

prefix prefix-length: Specifies the prefix length of the IPv6 address used in the hash algorithm. The value range for the prefix-length argument is 0 to 128. The default is 128.

random: Specifies the random algorithm, which randomly assigns DNS requests to DNS servers.

round-robin: Specifies the weighted round robin algorithm, which assigns DNS requests to DNS servers based on the weights of the DNS servers. A higher weight indicates more DNS requests will be assigned. The weight value used in this algorithm is configured in DNS server pool member view.

bandwidth: Specifies the bandwidth algorithm, which assigns DNS requests to DNS servers based on the weight and remaining bandwidth of the DNS servers. The weight value used in this algorithm is configured in DNS server view.

max-bandwidth: Specifies the maximum bandwidth algorithm, which always assigns DNS requests to the DNS server corresponding to the idle link with the largest remaining bandwidth.

inbound: Selects a DNS server based on the inbound bandwidth.

outbound: Selects a DNS server based on the outbound bandwidth.

Usage guidelines

If you do not specify the inbound or outbound keyword, the total bandwidth is used to select a DNS server.

In the bandwidth algorithm and maximum bandwidth algorithm, the remaining bandwidth is the maximum expected bandwidth minus the current bandwidth. If the maximum expected bandwidth is not configured, the remaining bandwidth is the maximum bandwidth of the link minus the current bandwidth.

Examples

# Specify the scheduling algorithm as random for DNS server pool dns-pool.

<Sysname> system-view

[Sysname] loadbalance dns-server-pool dns-pool

[Sysname-lb-dspool-dns-pool] predictor random

Related commands

max-bandwidth (link view)

rate-limit bandwidth (link view)

predictor (link group view)

Use predictor to specify a scheduling algorithm for a link group.

Use undo predictor to restore the default.

Syntax

Link-based:

predictor { least-connection | { bandwidth | max-bandwidth } [ inbound | outbound ] }

undo predictor

Link group member-based:

predictor hash address { destination | source | source-ip-port } [ mask mask-length ] [ prefix prefix-length ]

predictor { least-connection member | random | round-robin }

undo predictor

Default

The scheduling algorithm for a link group is weighted round robin.

Views

Link group view

Predefined user roles

network-admin

Parameters

hash address: Performs the hash algorithm based on IP address.

destination: Performs the hash algorithm based on destination IP address.

source: Performs the hash algorithm based on source IP address.

source-ip-port: Performs the hash algorithm based on source IP address and port number.

mask mask-length: Specifies the IPv4 address mask length, in the range of 0 to 32. The default is 32.

prefix prefix-length: Specifies the IPv6 address prefix length, in the range of 0 to 128. The default is 128.

least-connection: Specifies the link-based weighted least connection algorithm. This algorithm always assigns new connections to the link with the fewest number of weighted active connections (the total number of active connections in all link groups divided by weight). The weight value used in this algorithm is configured in link view.

least-connection member: Specifies the link group member-based weighted least connection algorithm. This algorithm always assigns new connections to the link with the fewest number of weighted active connections (the number of active connections in the specified link group divided by weight). The weight value used in this algorithm is configured in link group member view.

random: Specifies the random algorithm, which randomly assigns new connections to links.

round-robin: Specifies the weighted round robin algorithm, which assigns new connections to links based on the weights of links. A higher weight indicates more new connections will be assigned. The weight value used in this algorithm is configured in link group member view.

bandwidth: Specifies the bandwidth algorithm, which assigns packets to links based on the weight of the links and the bandwidth ratio. The weight value used in this algorithm is configured in link view.

max-bandwidth: Specifies the maximum bandwidth algorithm, which always assigns packets to the idle link with the largest remaining bandwidth.

inbound: Selects a link based on the inbound bandwidth.

outbound: Selects a link based on the outbound bandwidth.

Usage guidelines

If you do not specify the inbound or outbound keyword, the total bandwidth is used to select a link.

In the bandwidth algorithm and maximum bandwidth algorithm, the remaining bandwidth is the maximum expected bandwidth minus the current bandwidth. If the maximum expected bandwidth is not configured, the remaining bandwidth is the maximum bandwidth of the link minus the current bandwidth.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the scheduling algorithm random for the link group lg.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] predictor random

Related commands

max-bandwidth (link view)

proximity enable (link group view)

rate-limit bandwidth (link view)

predictor (server farm view)

Use predictor to specify a scheduling algorithm for a server farm.

Use undo predictor to restore the default.

Syntax

Real server-based:

predictor { dync-round-robin | least-connection | least-time | { bandwidth | max-bandwidth } [ inbound | outbound ] }

undo predictor

Server farm member-based:

predictor hash [ carp ] address { destination | source | source-ip-port } [ mask mask-length ] [ prefix prefix-length ]

predictor hash [ carp ] http [ offset offset ] [ start start-string ] [ [ end end-string ] | [ length length ] ]

predictor { least-connection member | least-time member | random | round-robin | }

undo predictor

Default

The scheduling algorithm for a server farm is weighted round robin.

Views

Server farm view

Predefined user roles

network-admin

Parameters

hash address: Performs the hash algorithm based on IP address.

carp: Specifies the Cache Array Routing Protocol (CARP) hash algorithm. When the number of available real servers changes, this protocol makes all available real servers have the smallest load changes.

destination: Performs the hash algorithm based on destination IP address.

source: Performs the hash algorithm based on source IP address.

source-ip-port: Performs the hash algorithm based on source IP address and port number.

mask mask-length: Specifies the IPv4 address mask length, in the range of 0 to 32. The default is 32.

prefix prefix-length: Specifies the IPv6 address prefix length, in the range of 0 to 128. The default is 128.

http: Performs the hash algorithm based on the HTTP content.

offset offset: Specifies the offset value based on the start of the HTTP content, in the range of 0 to 1000 bytes. The default is 0.

start start-string: Specifies the regular expression that marks the start of the HTTP content, a case-sensitive string of 1 to 127 characters starting from the offset value. The string cannot contain question marks (?).

end end-string: Specifies the regular expression that marks the end of the HTTP content, a case-sensitive string of 1 to 127 characters starting from the start-string value. The string cannot contain question marks (?).

length length: Specifies the length of the HTTP content, in the range of 0 to 1000 bytes. The default is 0, which indicates all lengths.

dync-round-robin: Specifies the dynamic round robin algorithm, which assigns new connections to real servers based on load weight values calculated by using the memory usage, CPU usage, and disk usage of the real servers. The smaller the load, the greater the weight value. A real server with a greater weight value is assigned more connections.

least-connection: Specifies the real server-based weighted least connection algorithm, which always assigns new connections to the real server with the fewest number of weighted active connections (the total number of active connections in all server farms divided by weight). The weight value used in this algorithm is configured in real server view.

least-connection member: Specifies the server farm member-based weighted least connection algorithm, which always assigns new connections to the server farm member with the fewest number of weighted active connections (the number of active connections in the specified server farm divided by weight). The weight value used in this algorithm is configured in server farm member view.

least-time: Specifies the least time algorithm, which assigns new connections to real servers based on load weight values calculated by using the response time of the real servers. The shorter the response time, the greater the weight value. A real server with a greater weight value is assigned more connections.

least-time member: Specifies the server farm member-based least time algorithm, which assigns new connections to server farm members based on load weight values calculated by using the response time of the server farm members. The shorter the response time, the greater the weight value. A server farm member with a greater weight value is assigned more connections.

random: Specifies the random algorithm, which randomly assigns new connections to real servers.

round-robin: Specifies the weighted round robin algorithm, which assigns new connections to real servers based on the weights of real servers. A higher weight indicates more new connections will be assigned. The weight value used in this algorithm is configured in server farm member view.

bandwidth: Specifies the bandwidth algorithm, which assigns packets to real servers based on the weight of the real servers and the bandwidth ratio. The weight value used in this algorithm is configured in real server view.

max-bandwidth: Specifies the maximum bandwidth algorithm, which always assigns packets to the idle real server with the largest remaining bandwidth.

inbound: Selects a real server based on the inbound bandwidth.

outbound: Selects a real server based on the outbound bandwidth.

Usage guidelines

The dynamic round robin algorithm can take effect only if you specify an SNMP-DCA NQA template. If no SNMP-DCA NQA template is specified, the non-weighted round robin algorithm is used. For more information about NQA templates, see NQA configuration in Network Management and Monitoring Configuration Guide.

If you do not specify the inbound or outbound keyword, the total bandwidth is used to select a real server.

In the bandwidth algorithm and maximum bandwidth algorithm, the remaining bandwidth is the maximum expected bandwidth minus the current bandwidth. If the maximum expected bandwidth is not configured, the remaining bandwidth is the maximum bandwidth of the real server minus the current bandwidth.

Examples

# Specify the scheduling algorithm for the server farm sf as random.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] predictor random

Related commands

max-bandwidth (real server view)

rate-limit bandwidth (real server view)

prefer-method

Use prefer-method to specify the preferred compression algorithm.

Use undo prefer-method to restore the default.

Syntax

prefer-method { deflate | gzip }

undo prefer-method

Default

The preferred compression algorithm is gzip.

Views

HTTP-compression parameter profile view

Predefined user roles

network-admin

Parameters

deflate: Specifies the Deflate compression algorithm.

gzip: Specifies the default GNU zip compression algorithm.

Usage guidelines

If the client request supports the configured compression algorithm, the configured compression algorithm applies. If the client request does not support the configured compression algorithm, the compression algorithm contained in the request applies.

Examples

# Create the HTTP-compression parameter profile http1, and specify the preferred compression algorithm as deflate.

<Sysname> system-view

[Sysname] parameter-profile http1 type http-compression

[Sysname-para-http-compression-http1] prefer-method deflate

priority (DNS server pool member view)

Use priority to set the priority of a DNS server pool member.

Use undo priority to restore the default.

Syntax

priority priority

undo priority

Default

The priority of a DNS server pool member is 4.

Views

DNS server pool member view

Predefined user roles

network-admin

Parameters

priority: Specifies the priority value in the range of 1 to 8. A greater value means a higher priority.

Usage guidelines

Typically, only the members with the highest priority in a DNS server pool participate in scheduling. If the number of such members is smaller than the required minimum number, more members are selected by priority in descending order. If the allowed maximum number is exceeded after members with a certain priority are added, only some of the members with that priority are added.

Use this command together with the selected-server command in DNS server pool view.

Examples

# Set the priority of DNS server pool member ds1 to 3.

<Sysname> system-view

[Sysname] loadbalance dns-server-pool dsp1

[Sysname-lb-dspool-dsp1] dns-server ds1 port 10

[Sysname-dspool-dsp1-#member#-ds1-port-10] priority 3

Related commands

selected-server (DNS server pool view)

priority (DNS server view)

Use priority to set the priority of a DNS server.

Use undo priority to restore the default.

Syntax

priority priority

undo priority

Default

The priority of a DNS server is 4.

Views

DNS server view

Predefined user roles

network-admin

Parameters

priority: Specifies the priority value in the range of 1 to 8. A greater value means a higher priority.

Usage guidelines

Typically, only the DNS servers with the highest priority participate in scheduling. If the number of such DNS servers is smaller than the required minimum number, more DNS servers are selected by priority in descending order. If the allowed maximum number is exceeded after DNS servers with a certain priority are added, only some of the DNS servers with that priority are added.

Use this command together with the selected-server command in DNS server pool view.

Examples

# Set the priority of DNS server ds1 to 3.

<Sysname> system-view

[Sysname] loadbalance dns-server ds1

[Sysname-lb-ds-ds1] priority 3

Related commands

selected-server (DNS server pool view)

priority (link group member view)

Use priority to set the priority of a link group member.

Use undo priority to restore the default.

Syntax

priority priority

undo priority

Default

The priority of a link group member is 4.

Views

Link group member view

Predefined user roles

network-admin

Parameters

priority: Specifies the priority value in the range of 1 to 8. A greater value means a higher priority.

Usage guidelines

Typically, only the members with the highest priority in a link group participate in scheduling. If the number of such members is smaller than the required minimum number, more members are selected by priority in descending order. If the allowed maximum number is exceeded after members with a certain priority are added, only some of the members with that priority are added.

Use this command together with the selected-server command.

Examples

# Set the priority of link group member lk1 to 3.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] link lk1

[Sysname-lb-lgroup-lg-#member#-lk1] priority 3

Related commands

selected- link

priority (link view)

Use priority to set the priority of a link.

Use undo priority to restore the default.

Syntax

priority priority

undo priority

Default

The priority of a link is 4.

Views

Link view

Predefined user roles

network-admin

Parameters

priority: Specifies the priority value in the range of 1 to 8. A greater value means a higher priority.

Usage guidelines

Typically only the links with the highest priority participate in scheduling. If the number of such links is smaller than the required minimum number, more links are selected by priority in descending order.

Examples

# Set the priority of the link lk1 to 3.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] priority 3

Related commands

selected-link

priority (real server view)

Use priority to set the priority of a real server.

Use undo priority to restore the default.

Syntax

priority priority

undo priority

Default

The priority of a real server is 4.

Views

Real server view

Predefined user roles

network-admin

Parameters

priority: Specifies the priority value of the real server, in the range of 1 to 8. A greater value means a higher priority to be referenced.

Usage guidelines

Typically only the real servers with the highest priority participate in scheduling. If the number of such real servers is smaller than the required minimum number, more real servers are selected by priority in descending order.

Examples

# Set the priority of the real server rs to 3.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] priority 3

Related commands

selected-server

priority (server farm member view)

Use priority to set the priority of a server farm member.

Use undo priority to restore the default.

Syntax

priority priority

undo priority

Default

The priority of a server farm member is 4.

Views

Server farm member view

Predefined user roles

network-admin

Parameters

priority: Specifies the priority value in the range of 1 to 8. A greater value means a higher priority.

Usage guidelines

Typically, only the members with the highest priority in a server farm participate in scheduling. If the number of such members is smaller than the required minimum number, more members are selected by priority in descending order. If the allowed maximum number is exceeded after members with a certain priority are added, only some of the members with that priority are added.

Use this command together with the selected-server command in server farm view.

Examples

# Set the priority of server farm member rs1 to 3.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] real-server rs1 port 80

[Sysname-sfarm-sf-#member#-rs1-port-80] priority 3

Related commands

selected-server (server farm view)

priority (SNAT global policy view)

Use priority to set the priority of a SNAT global policy.

Use undo priority to restore the default.

Syntax

priority priority

undo priority

Default

The priority of a SNAT global policy is 0.

Views

SNAT global policy view

Predefined user roles

network-admin

Parameters

priority: Specifies the priority value in the range of 0 to 65535. A greater value means a higher priority.

Usage guidelines

You can configure multiple SNAT global policies with different priorities. They are matched in descending order of priority values.

Examples

# Set the priority of SNAT global policy sn1 to 100.

<Sysname> system-view

[Sysname] loadbalance snat-global-policy sn1

[Sysname-lb-snat-gp-sn1] priority 100

probe (DNS server pool member view)

Use probe to specify a health monitoring method for a DNS server pool member.

Use undo probe to restore the default.

Syntax

probe template-name

undo probe template-name

Default

No health monitoring method is specified for a DNS server pool member.

Views

DNS server pool member view

Predefined user roles

network-admin

Parameters

template-name: Specifies an NQA template by its name, a case-insensitive string of 1 to 32 characters.

Usage guidelines

Use the nqa template command to create an NQA template to be referenced by the health monitoring method. The DNS server pool uses the parameters defined in the NQA template to detect the availability of the pool members.

The health monitoring method configuration in DNS server pool member view takes precedence over the configuration in DNS server pool view.

The health monitoring result for a DNS server affects the availability of a DNS server pool member. The health monitoring result for a DNS server pool member does not affect the availability of a DNS server.

Examples

# Create the ICMP-type NQA template t4, and specify the health monitoring method for the DNS server pool member ds1 as t4.

<Sysname> system-view

[Sysname] nqa template icmp t4

[Sysname-nqatplt-icmp-t4] quit

[Sysname] loadbalance dns-server-pool dsp1

[Sysname-lb-dspool-dsp1] dns-server ds1 port 10

[Sysname-lb-dspool-dsp1-#member#-ds1-port-10] probe t4

Related commands

nqa template (Network Management and Monitoring Command Reference)

success-criteria (DNS server pool member view)

probe (DNS server pool view)

Use probe to specify a health monitoring method for a DNS server pool.

Use undo probe to restore the default.

Syntax

probe template-name

undo probe template-name

Default

No health monitoring method is specified for a DNS server pool.

Views

DNS server pool view

Predefined user roles

network-admin

Parameters

template-name: Specifies an NQA template by its name, a case-insensitive string of 1 to 32 characters.

Usage guidelines

Use the nqa template command to create an NQA template to be referenced by the health monitoring method. The DNS server pool uses the parameters defined in the NQA template to detect the availability of DNS servers.

The health monitoring method configuration in DNS server view takes precedence over the configuration in DNS server pool view.

Examples

# Create the ICMP-type NQA template t4, and specify the health monitoring method for the DNS server pool dns-pool as t4.

<Sysname> system-view

[Sysname] nqa template icmp t4

[Sysname-nqatplt-icmp-t4] quit

[Sysname] loadbalance dns-server-pool dns-pool

[Sysname-lb-dspool-dns-pool] probe t4

Related commands

nqa template (Network Management and Monitoring Command Reference)

success-criteria (DNS server pool view)

probe (DNS server view)

Use probe to specify a health monitoring method for a DNS server.

Use undo probe to restore the default.

Syntax

probe template-name

undo probe template-name

Default

No health monitoring method is specified for a DNS server.

Views

DNS server view

Predefined user roles

network-admin

Parameters

template-name: Specifies an NQA template by its name, a case-insensitive string of 1 to 32 characters.

Usage guidelines

Use the nqa template command to create an NQA template to be referenced by the health monitoring method.

The health monitoring method configuration in DNS server view takes precedence over the configuration in DNS server pool view.

Examples

# Create the ICMP-type NQA template t4, and specify the health monitoring method for DNS server ds1 as t4.

<Sysname> system-view

[Sysname] nqa template icmp t4

[Sysname-nqatplt-icmp-t4] quit

[Sysname] loadbalance dns-server ds1

[Sysname-lb-ds-ds1] probe t4

Related commands

nqa template (Network Management and Monitoring Command Reference)

success-criteria (DNS server view)

probe (link group member view)

Use probe to specify a health monitoring method for a link group member.

Use undo probe to restore the default.

Syntax

probe template-name

undo probe template-name

Default

No health monitoring method is specified for a link group member.

Views

Link group member view

Predefined user roles

network-admin

Parameters

template-name: Specifies an NQA template by its name, a case-insensitive string of 1 to 32 characters.

Usage guidelines

Use the nqa template command to create an NQA template to be referenced by the health monitoring method. The link group uses the parameters defined in the NQA template to detect the availability of the link group members.

The health monitoring method configuration in link group member view takes precedence over the configuration in link group view.

The health monitoring result for a link affects the availability of a link group member. The health monitoring result for a link group member does not affect the availability of a link.

Examples

# Create the ICMP-type NQA template t4, and specify the health monitoring method for the link group member lk1 as t4.

<Sysname> system-view

[Sysname] nqa template icmp t4

[Sysname-nqatplt-icmp-t4] quit

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] link lk1

[Sysname-lb-lgroup-lg-#member#-lk1] probe t4

Related commands

nqa template (Network Management and Monitoring Command Reference)

success-criteria (link group member view)

probe (link group view)

Use probe to specify a health monitoring method for a link group.

Use undo probe to restore the default.

Syntax

probe template-name

undo probe template-name

Default

No health monitoring method is specified for a link group.

Views

Link group view

Predefined user roles

network-admin

Parameters

template-name: Specifies an NQA template by its name, a case-insensitive string of 1 to 32 characters.

Usage guidelines

The link group uses the parameters defined in the NQA template to detect the availability of links.

The health monitoring method configuration in link view takes precedence over the configuration in link group view.

Examples

# Create the ICMP-type NQA template t4, and specify the health monitoring method for the link group lg as t4.

<Sysname> system-view

[Sysname] nqa template icmp t4

[Sysname-nqatplt-icmp-t4] quit

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] probe t4

Related commands

nqa template (Network Management and Monitoring Command Reference)

success-criteria (link group view)

probe (link view)

Use probe to specify a health monitoring method for an LB link.

Use undo probe to restore the default.

Syntax

probe template-name

undo probe template-name

Default

No health monitoring method is specified for an LB link.

Views

Link view

Predefined user roles

network-admin

Parameters

template-name: Specifies an NQA template by its name, a case-insensitive string of 1 to 32 characters.

Usage guidelines

Use the nqa template command to create an NQA template to be referenced by the health monitoring method.

You can configure multiple health monitoring methods for an LB link. By default, health monitoring succeeds only when all the specified health monitoring methods succeed. You can use the success-criteria command to specify the health monitoring success criteria for the LB link.

Examples

# Create the ICMP-type NQA template t4, and specify the health monitoring method for the LB link lk1 as t4.

<Sysname> system-view

[Sysname] nqa template icmp t4

[Sysname-nqatplt-icmp-t4] quit

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] probe t4

Related commands

nqa template (Network Management and Monitoring Command Reference)

success-criteria (link view)

probe (real server view)

Use probe to specify a health monitoring method for a real server.

Use undo probe to restore the default.

Syntax

probe template-name [ nqa-template-port ]

undo probe template-name

Default

No health monitoring method is specified for a real server.

Views

Real server view

Predefined user roles

network-admin

Parameters

template-name: Specifies an NQA template by its name, a case-insensitive string of 1 to 32 characters.

nqa-template-port: Uses the destination port number specified in the NQA template for detection. If you do not specify this keyword, the real server's port number is used for detection.

Usage guidelines

Use the nqa template command to create an NQA template to be referenced by the health monitoring method.

The health monitoring method configuration in real server view takes precedence over the configuration in server farm view.

Examples

# Create the ICMP-type NQA template t4, and specify the health monitoring method for the real server rs as t4.

<Sysname> system-view

[Sysname] nqa template icmp t4

[Sysname-nqatplt-icmp-t4] quit

[Sysname] real-server rs

[Sysname-rserver-rs] probe t4

Related commands

nqa template (Network Management and Monitoring Command Reference)

success-criteria (real server view)

probe (server farm member view)

Use probe to specify a health monitoring method for a server farm member.

Use undo probe to restore the default.

Syntax

probe template-name [ nqa-template-port ]

undo probe template-name

Default

No health monitoring method is specified for a server farm member.

Views

Server farm member view

Predefined user roles

network-admin

Parameters

template-name: Specifies an NQA template by its name, a case-insensitive string of 1 to 32 characters.

nqa-template-port: Uses the destination port number specified in the NQA template for detection. If you do not specify this keyword, the server farm member's port number is used for detection.

Usage guidelines

Use the nqa template command to create an NQA template to be referenced by the health monitoring method. The server farm uses the parameters defined in the NQA template to detect the availability of the server farm members.

The health monitoring method configuration in server farm member view takes precedence over the configuration in server farm view.

The health monitoring result for a real server affects the availability of a server farm member. The health monitoring result for a server farm member does not affect the availability of a real server.

Examples

# Create the ICMP-type NQA template t4, and specify the health monitoring method for the server farm member rs1 as t4.

<Sysname> system-view

[Sysname] nqa template icmp t4

[Sysname-nqatplt-icmp-t4] quit

[Sysname] server-farm sf

[Sysname-sfarm-sf] real-server rs1 port 80

[Sysname-sfarm-sf-#member#-rs1-port-80] probe t4

Related commands

nqa template (Network Management and Monitoring Command Reference)

success-criteria (server farm member view)

probe (server farm view)

Use probe to specify a health monitoring method for a server farm.

Use undo probe to delete a health monitoring method from a server farm.

Syntax

probe template-name [ nqa-template-port ]

undo probe template-name

Default

No health monitoring method is specified for a server farm.

Views

Server farm view

Predefined user roles

network-admin

Parameters

template-name: Specifies an NQA template by its name, a case-insensitive string of 1 to 32 characters.

nqa-template-port: Uses the destination port number specified in the NQA template for detection. If you do not specify this keyword, the real server's port number is used for detection.

Usage guidelines

Use the nqa template command to create an NQA template to be referenced by the health monitoring method.

The health monitoring method configuration in real server view takes precedence over the configuration in server farm view.

Examples

# Create the ICMP-type NQA template t4, and specify the health monitoring method for the server farm sf as t4.

<Sysname>system-view

[Sysname] nqa template icmp t4

[Sysname-nqatplt-icmp-t4] quit

[Sysname] server-farm sf

[Sysname-sfarm-sf] probe t4

Related commands

nqa template (Network Management and Monitoring Command Reference)

success-criteria (server farm view)

probe-template (real server view)

Use probe-template to specify a custom-monitoring LB probe template for a real server.

Use undo probe-template to remove a custom-monitoring LB probe template from a real server.

Syntax

probe-template external-monitor template-name

undo probe-template external-monitor template-name

Default

No custom-monitoring LB probe template is specified for a real server.

Views

Real server view

Predefined user roles

network-admin

Parameters

template-name: Specifies a custom-monitoring template by its name, a case-insensitive string of 1 to 32 characters.

Usage guidelines

This command can monitor a real sever by referencing a custom-monitoring LB probe template.

The monitoring result of a real server affects the availability of a server farm member, but the monitoring result of a server farm member does not affect the availability of a real server.

Examples

# Specify custom-monitoring LB probe template test_external for real server rs.

<Sysname>system-view

[Sysname] real-server rs

[Sysname-rserver-rs] probe-template external-monitor test_external

Related commands

loadbalance probe-template

probe-template (server farm member view)

Use probe-template to specify a custom-monitoring probe template for a server farm member.

Use undo probe-template to remove a custom-monitoring LB probe template from a server farm member.

Syntax

probe-template external-monitor template-name

undo probe-template external-monitor template-name

Default

No custom-monitoring probe template is specified for a server farm member.

Views

Server farm member view

Predefined user roles

network-admin

Parameters

template-name: Specifies a custom-monitoring template by its name, a case-insensitive string of 1 to 32 characters.

Usage guidelines

This command can monitor a sever farm member by referencing a custom-monitoring LB probe template.

You can configure this command for all server farm members in server farm view or for a single server farm member in server farm member view. If you configure this command in both server farm view and server farm member view, the configuration in server farm member view takes effect.

The monitoring result of a real server affects the availability of a server farm member, but the monitoring result of a server farm member does not affect the availability of a real server.

Examples

# Specify custom-monitoring LB probe template test_external for server farm member rs1.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] real-server rs1 port 80

[Sysname-sfarm-sf-#member#-rs1-port-80] probe-template external-monitor test_external

Related commands

loadbalance probe-template

probe-template (server farm view)

Use probe-template to specify an LB probe template for a server farm.

Use undo probe-template to remove an LB probe template for a server farm.

Syntax

probe-template { external-monitor | http-passive | tcp-rst | tcp-zero-window } template-name

undo probe-template { external-monitor | http-passive | tcp-rst | tcp-zero-window }

Default

No LB probe template is specified for a server farm.

Views

Server farm view

Predefined user roles

network-admin

Parameters

external-monitor: Specifies a custom-monitoring LB probe template.

http-passive: Specifies an HTTP passive LB probe template.

tcp-rst: Specifies a TCP-RST LB probe template.

tcp-zero-window: Specifies a TCP zero-window LB probe template.

template-name: Specifies the template name, a case-insensitive string of 1 to 32 characters.

Usage guidelines

This command can monitor all real severs in a server farm.

A server farm can reference only one HTTP passive LB probe template, one TCP-RST LB probe template, and one TCP zero-window LB probe template at the same time.

You can specify multiple custom-monitoring LB probe templates for a server farm.

Examples

# Specify TCP-RST LB probe template r1 for server farm sf.

<Sysname>system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] probe-template tcp-rst r1

Related commands

loadbalance probe-template

probe log enable (real server view)

Use probe log enable to enable health monitoring logging for a real server.

Use undo probe log enable to disable health monitoring logging for a real server.

Syntax

probe log enable

undo probe log enable

Default

Health monitoring logging is enabled for a real server.

Views

Real server view

Predefined user roles

network-admin

Usage guidelines

This feature generates logs when the health of a real server changes.

Examples

# Enable health monitoring logging for real server rs.

<Sysname>system-view

[Sysname] real-server rs

[Sysname-rserver-rs] probe log enable

probe log enable (server farm member view)

Use probe log enable to enable health monitoring logging for a server farm member.

Use undo probe log enable to disable health monitoring logging for a server farm member.

Syntax

probe log enable

undo probe log enable

Default

Health monitoring logging is enabled for a server farm member.

Views

Server farm member view

Predefined user roles

network-admin

Usage guidelines

This feature generates logs when the health of a server farm member changes.

Examples

# Enable health monitoring logging for server farm member rs1.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] real-server rs1 port 80

[Sysname-sfarm-sf-#member#-rs1-port-80] probe log enable

protect-action

Use protect-action to configure the protection action for an LB probe template.

Use undo protect-action to restore the default.

Syntax

protect-action { auto-shutdown | busy [ probe-interval interval ] [ probe-times times ] }

undo protect-action

Default

The protection action is to place a real server in busy state.

Views

TCP-RST LB probe template view

TCP zero-window LB probe template view

Predefined user roles

network-admin

Parameters

auto-shutdown: Automatically shuts down a real server.

busy: Places a real server in busy state.

probe-interval interval: Specifies the interval for probing the real server in busy state, in the range of 5 to 3600 seconds. The default is 30 seconds.

probe-times times: Specifies the maximum number of times for probing the real server in busy state, in the range of 0 to 255. The default is 0, which means that the number of probe times is not limited.

Usage guidelines

For the busy action, after placing a real server in busy state, the device starts probing the real server at the specified probe intervals. If the number of RST or zero-window packets sent does not reach the threshold in a probe interval, the real server is placed back in normal state. If threshold violation persists when the maximum probe times is reached, the system automatically shuts down the real server.

A real server that is shut down or placed in busy state due to packet threshold violation will be restored to normal state immediately when the referenced LB probe template is deleted.

Examples

# In TCP-RST LB probe template rsttplt, configure the protection action as busy, set the probe interval to 30 seconds, and set the probe times to 3.

<Sysname>system-view

[Sysname] loadbalance probe-template tcp-rst rsttplt

[Sysname-lbpt-tcp-rst-rsttplt] protect-action busy probe-interval 30 probe-times 3

protected-url

Use protected-url to configure the URLs to be protected.

Use undo protected-url to remove all protected URLs.

Syntax

protected-url url

undo protected-url

Default

No URLs are protected.

Views

Protection rule view

Predefined user roles

network-admin

Parameters

url: Specifies a regular expression to match URLs, a case-sensitive string of 1 to 255 characters. The regular expression cannot contain question marks (?).

Usage guidelines

If the number of times that a user accesses a protected URL exceeds the request threshold during the protection period, the protection action is taken.

The device does not match the parameters in a URL and matches only the portion before the question mark (?).

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# In protection rule 5, configure www.aaa.com/index.html as a protected URL.

<Sysname>system-view

[Sysname] loadbalance protection-policy p1

[Sysname-lbpp-http-p1] rule 5

[Sysname-lbpp-http-p1-rule-5] protected-url www.aaa.com/index.html

Related commands

cookie (protection policy view)

protection-action

protection-period

source-ip

protection-action

Use protection-action to configure a protection action.

Use undo protection-action to restore the default.

Syntax

protection-action { warning | { drop | verify { insert-header | js } } } *

undo protection-action

Default

No protection action is configured.

Views

HTTP protection policy view

Predefined user roles

network-admin

Parameters

warning: Generates a log message.

drop: Drops requests.

verify: Performs cookie verification on subsequent requests.

insert-header: Performs cookie verification by inserting an HTTP header.

js: Performs cookie verification by inserting a JS script.

Usage guidelines

The protection action is taken when protection rules in a protection policy are matched. The device supports the following protection actions:

·     Warning—Generates a log message and sends it to the information center.

·     Drop—Drops requests.

·     Verify cookie—Returns a response carrying a cookie value to the client. If a subsequent request carries the returned cookie value, it passes the verification. If a subsequent request does not carry a cookie value or carries a different cookie value, it fails to pass the verification and is dropped. This protection action is useful in scenarios where attackers cannot insert cookie values into attack packets. The device supports returning a cookie value by inserting an HTTP header or a JS script.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# In HTTP protection policy p1, configure generating log messages and performing cookie verification by inserting an HTTP header as the protection actions.

<Sysname> system-view

[Sysname] loadbalance protection-policy p1 type http

[Sysname-lbpp-http-p1] protection-action warning verify insert-header

protection-period

Use protection-period to set the protection period.

Use undo protection-period to restore the default.

Syntax

protection-period period

undo protection-period

Default

The protection period is 120 seconds.

Views

Protection rule view

Predefined user roles

network-admin

Parameters

period: Specifies a protection period in the range of 1 to 900 seconds.

Usage guidelines

If the number of times that a user accesses a protected URL exceeds the request threshold during the protection period, the protection action is taken.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# In protection rule 5, set the protection period to 5 seconds.

<Sysname> system-view

[Sysname] loadbalance protection-policy p1

[Sysname-lbpp-http-p1] rule 5

[Sysname-lbpp-http-p1-rule-5] protection-period 5

Related commands

protected-url

protection-action

protection-policy

Use protection-policy to specify a protection policy for a virtual server.

Use undo protection-policy to restore the default.

Syntax

protection-policy http policy-name

undo protection-policy http

Default

No protection policy is specified for a virtual server.

Views

HTTP virtual server view

Predefined user roles

network-admin

Parameters

policy-name: Specifies a protection policy by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

The protection policy specified for a virtual server protects the traffic matching the virtual server.

Examples

# Specify protection policy p1 for HTTP virtual server vs.

<Sysname> system-view

[Sysname] virtual-server vs type http

[Sysname-vs-http-vs]protection-policy http p1

Related commands

loadbalance protection-policy

proximity enable (link group view)

Use proximity enable to enable the proximity feature for a link group.

Use undo proximity enable to disable the proximity feature for a link group.

Syntax

proximity enable

undo proximity enable

Default

The proximity feature is disabled for a link group.

Views

Link group view

Predefined user roles

network-admin

Usage guidelines

The proximity feature takes precedence over the scheduling algorithm in selecting a link. If no link is selected according to the proximity feature, the scheduling algorithm is used.

Examples

# Enable the proximity feature for the link group lg.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] proximity enable

Related commands

predictor (link group view)

proximity enable (server farm view)

Use proximity enable to enable the proximity feature for a server farm.

Use undo proximity enable to disable the proximity feature for a server farm.

Syntax

proximity enable

undo proximity enable

Default

The proximity feature is disabled for a server farm.

Views

Server farm view

Predefined user roles

network-admin

Usage guidelines

The proximity feature takes precedence over the scheduling algorithm in selecting a real server. If no real server is selected according to the proximity feature, the scheduling algorithm is used.

Examples

# Enable the proximity feature for the server farm sf.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] proximity enable

radius-attribute

Use radius-attribute to configure the RADIUS attribute sticky method.

Use undo radius-attribute to delete the RADIUS attribute sticky method.

Syntax

radius-attribute { code attribute-code | framed-ip-address | user-name }

undo radius-attribute

Default

No RADIUS sticky methods exist.

Views

RADIUS sticky group view

Predefined user roles

network-admin

Parameters

code attribute-code: Specifies the code of the RADIUS attribute type, in the range of 1 to 255.

framed-ip-address: Specifies the RADIUS attribute type as framed-ip-address (code 8).

user-name: Specifies the RADIUS attribute type as user-name (code 1).

Usage guidelines

The RADIUS attribute sticky method takes effect only on RADIUS packets.

Examples

# Configure the RADIUS attribute sticky method for sticky group s1 by specifying the RADIUS attribute type as user-name.

<Sysname> system-view

[Sysname] sticky-group s1 type radius

[Sysname-sticky-radius-s1] radius-attribute user-name

rate-limit bandwidth (link view)

Use rate-limit bandwidth to set the maximum bandwidth of a link.

Use undo rate-limit bandwidth to restore the default.

Syntax

rate-limit bandwidth [ inbound | outbound ] bandwidth-value kbps

undo rate-limit bandwidth [ inbound | outbound ]

Default

The maximum bandwidth of a link is not limited.

Views

Link view

Predefined user roles

network-admin

Parameters

inbound: Specifies the maximum inbound bandwidth.

outbound: Specifies the maximum outbound bandwidth.

bandwidth-value: Specifies the maximum bandwidth in the range of 0 to 4294967295. The value 0 means the bandwidth is not limited.

kbps: Specifies the bandwidth unit as kbps.

Usage guidelines

If you do not specify the inbound or outbound keyword, the maximum bandwidth equals the inbound bandwidth plus the outbound bandwidth.

This command takes effect only on new sessions and does not take effect on existing sessions.

Examples

# Set the maximum bandwidth of the link lk1 to 1 kbps.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] rate-limit bandwidth 1 kbps

# Set the maximum inbound bandwidth of the link lk1 to 1 kbps.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] rate-limit bandwidth inbound 1 kbps

# Set the maximum outbound bandwidth of the link lk1 to 1 kbps.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] rate-limit bandwidth outbound 1 kbps

rate-limit bandwidth (real server view)

Use rate-limit bandwidth to set the maximum bandwidth of a real server.

Use undo rate-limit bandwidth to restore the default.

Syntax

rate-limit bandwidth [ inbound | outbound ] bandwidth-value kbps

undo rate-limit bandwidth [ inbound | outbound ]

Default

The maximum bandwidth of a real server is not limited.

Views

Real server view

Predefined user roles

network-admin

Parameters

inbound: Specifies the maximum inbound bandwidth.

outbound: Specifies the maximum outbound bandwidth.

bandwidth-value: Specifies the maximum bandwidth in the range of 0 to 4294967295. The value 0 means the bandwidth is not limited.

kbps: Specifies the bandwidth unit as kbps.

Usage guidelines

If you do not specify the inbound or outbound keyword, the maximum bandwidth equals the inbound bandwidth plus the outbound bandwidth.

This command takes effect only on new sessions and does not take effect on existing sessions.

Examples

# Set the maximum bandwidth of the real server rs to 1 kbps.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] rate-limit bandwidth 1 kbps

# Set the maximum inbound bandwidth of the real server rs to 1 kbps.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] rate-limit bandwidth inbound 1 kbps

# Set the maximum outbound bandwidth of the real server rs to 1 kbps.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] rate-limit bandwidth outbound 1 kbps

rate-limit bandwidth (virtual server view)

Use rate-limit bandwidth to set the maximum bandwidth of a virtual server.

Use undo rate-limit bandwidth to restore the default.

Syntax

rate-limit bandwidth [ inbound | outbound ] bandwidth-value kbps

undo rate-limit bandwidth [ inbound | outbound ]

Default

The maximum bandwidth of a virtual server is not limited.

Views

Virtual server view

Predefined user roles

network-admin

Parameters

inbound: Specifies the maximum inbound bandwidth.

outbound: Specifies the maximum outbound bandwidth.

bandwidth-value: Specifies the maximum bandwidth in the range of 0 to 4294967295. The value 0 means the bandwidth is not limited.

kbps: Specifies the bandwidth unit as kbps.

Usage guidelines

If you do not specify the inbound or outbound keyword, the maximum bandwidth equals the inbound bandwidth plus the outbound bandwidth.

Examples

# Set the maximum bandwidth of the IP-type virtual server vs3 to 1 kbps.

<Sysname> system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] rate-limit bandwidth 1 kbps

# Set the maximum inbound bandwidth of the IP-type virtual server vs3 to 1 kbps.

<Sysname> system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] rate-limit bandwidth inbound 1 kbps

# Set the maximum outbound bandwidth of the IP-type virtual server vs3 to 1 kbps.

<Sysname> system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] rate-limit bandwidth outbound 1 kbps

rate-limit connection (link group member view)

Use rate-limit connection to set the maximum number of connections per second of a link group member.

Use undo rate-limit connection to restore the default.

Syntax

rate-limit connection connection-number

undo rate-limit connection

Default

The maximum number of connections per second of a link group member is 0.

Views

Link group member view

Predefined user roles

network-admin

Parameters

connection-number: Specifies the maximum number of connections per second in the range of 0 to 4294967295. 0 means the number is not limited.

Examples

# Set the maximum number of connections per second of the link group member lk1 to 1000.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] link lk1

[Sysname-lb-lgroup-lg-#member#-lk1] rate-limit connection 1000

rate-limit connection (link view)

Use rate-limit connection to set the maximum number of connections per second of a link.

Use undo rate-limit connection to restore the default.

Syntax

rate-limit connection connection-number

undo rate-limit connection

Default

The maximum number of connections per second of a link is 0.

Views

Link view

Predefined user roles

network-admin

Parameters

connection-number: Specifies the maximum number of connections per second in the range of 0 to 4294967295. 0 means the number is not limited.

Usage guidelines

This command takes effect only on new sessions and does not take effect on existing sessions.

Examples

# Set the maximum number of connections per second of the link lk1 to 10000.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] rate-limit connection 10000

rate-limit connection (real server view)

Use rate-limit connection to set the maximum number of connections per second of a real server.

Use undo rate-limit connection to restore the default.

Syntax

rate-limit connection connection-number

undo rate-limit connection

Default

The maximum number of connections per second of a real server is 0.

Views

Real server view

Predefined user roles

network-admin

Parameters

connection-number: Specifies the maximum number of connections per second in the range of 0 to 4294967295. 0 means the number is not limited.

Usage guidelines

This command takes effect only on new sessions and does not take effect on existing sessions.

Examples

# Set the maximum number of connections per second of the real server rs to 10000.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] rate-limit connection 10000

rate-limit connection (server farm member view)

Use rate-limit connection to set the maximum number of connections per second of a server farm member.

Use undo rate-limit connection to restore the default.

Syntax

rate-limit connection connection-number

undo rate-limit connection

Default

The maximum number of connections per second of a server farm member is 0.

Views

Server farm member view

Predefined user roles

network-admin

Parameters

connection-number: Specifies the maximum number of connections per second in the range of 0 to 4294967295. 0 means the number is not limited.

Examples

# Set the maximum number of connections per second of the server farm member rs1 to 1000.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] real-server rs1 port 80

[Sysname-sfarm-sf-#member#-rs1-port-80] rate-limit connection 1000

rate-limit connection (virtual server view)

Use rate-limit connection to set the maximum number of connections per second of a virtual server.

Use undo rate-limit connection to restore the default.

Syntax

rate-limit connection connection-number

undo rate-limit connection

Default

The maximum number of connections per second of a virtual server is 0.

Views

Virtual server view

Predefined user roles

network-admin

Parameters

connection-number: Specifies the maximum number of connections per second in the range of 0 to 4294967295. 0 means the number is not limited.

Examples

# Set the maximum number of connections per second of the IP-type virtual server vs3 to 10000.

<Sysname> system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] rate-limit connection 10000

rate-limit http-request

Use rate-limit http-request to set the maximum number of HTTP requests per second for a real server.

Use undo rate-limit http-request to restore the default.

Syntax

rate-limit http-request request-number

undo rate-limit http-request

Default

The maximum number of HTTP requests per second is 0 for a real server.

Views

Real server view

Predefined user roles

network-admin

Parameters

request-number: Specifies the maximum number of HTTP requests per second, in the range of 0 to 4294967295. 0 means the number is not limited.

Examples

# Set the maximum number of HTTP requests per second to 10000 for real server rs.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] rate-limit http-request 10000

readwrite-separation

Use readwrite-separation to enable read/write separation for the MySQL database.

Use undo readwrite-separation to disable read/write separation for the MySQL database.

Syntax

readwirte-separation read-server-farm read-server-farm-name [ read-sticky-group read-sticky-group-name ] write-server-farm write-sever-farm-name [ write-sticky-group write-sticky-group-name ]

undo readwrite-separation

Default

Read/write separation is disabled for the MySQL database.

Views

MySQL virtual server view

Predefined user roles

network-admin

Parameters

read-server-farm read-server-farm-name: Specifies a read server farm by its name, a case-insensitive string of 1 to 63 characters.

read-sticky read-sticky-group-name: Specifies a sticky group for the read server farm by its name, a case-insensitive string of 1 to 63 characters.

write-server-farm write-server-farm-name: Specifies a write server farm by its name, a case-insensitive string of 1 to 63 characters.

write-sticky write-sticky-group-name: Specifies a sticky group for the write server farm by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

Read/write separation allows read commands and write commands to be executed by the read server farm and write server farm, respectively, which helps reduce the impact of concurrent read/write requests on database performance.

Examples

# Enable read/write separation for the MySQL database of MySQL virtual server vs1.

<Sysname> system-view

[Sysname] virtual-server vs1 type mysql

[Sysname-vs-mysql-vs1] readwrite-separation read-server-farm rd write-server-farm wr

real-server (server farm view)

Use real-server to create a server farm member and enter its view, or enter the view of an existing server farm member.

Use undo real-server to delete a server farm member.

Syntax

real-server real-server-name port port-number

undo real-server real-server-name port port-number

Default

No server farm members exist.

Views

Server farm view

Predefined user roles

network-admin

Parameters

real-server-name: Specifies a server farm member by its name, a case-insensitive string of 1 to 63 characters.

port-number: Specifies the port number of the server farm member, in the range of 0 to 65535.

Usage guidelines

You can use one of the following methods to add a member to a server farm:

·     Use the real-server command in server farm view. H3C recommends using this method.

·     Use the server-farm command in real server view.

You cannot use both methods to add a member with the same real server name and port number to a server farm.

Examples

# Add server farm member rs1 and enter server farm member view.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] real-server rs1 port 80

[Sysname-sfarm-sf-#member#-rs1-port-80]

Related commands

server-farm (real server view)

real-server (system view)

Use real-server to create a real server and enter its view, or enter the view of an existing real server.

Use undo real-server to delete the specified real server.

Syntax

real-server real-server-name

undo real-server real-server-name

Default

No real servers exist.

Views

System view

Predefined user roles

network-admin

Parameters

real-server-name: Specifies the real server name, a case-insensitive string of 1 to 63 characters.

Examples

# Create real server rs and enter real server view.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs]

rebalance per-request

Use rebalance per-request to enable load balancing for each HTTP request.

Use undo rebalance per-request to restore the default.

Syntax

rebalance per-request

undo rebalance per-request

Default

Load balancing applies to the first HTTP request of a connection. Other HTTP requests are processed in the same way.

Views

HTTP parameter profile view

Predefined user roles

network-admin

Examples

# Enable load balancing for each HTTP request in the HTTP parameter profile pp1.

<Sysname> system-view

[Sysname] parameter-profile pp1 type http

[Sysname-para-http-pp1] rebalance per-request

recover-from-auto-shutdown (real server view)

Use recover-from-auto-shutdown to manually recover a real server in Auto shutdown state.

Syntax

recover-from-auto-shutdown

Views

Real server view

Predefined user roles

network-admin

Usage guidelines

Use this command to manually recover a real server shut down by intelligent monitoring.

If health monitoring is not configured, a recovered real server is set to Unknown state.

If health monitoring is configured and succeeds, a recovered real server is set to Active state. If health monitoring fails, a recovered real server is set to Probe-failed state.

Examples

# Manually recover a real server in Auto shutdown state.

<Sysname>system-view

[Sysname] real-server rs

[Sysname-rserver-rs] recover-from-auto-shutdown

recover-from-auto-shutdown (server farm member view)

Use recover-from-auto-shutdown to manually recover a server farm member in Auto shutdown state.

Syntax

recover-from-auto-shutdown

Views

Server farm member view

Predefined user roles

network-admin

Usage guidelines

Use this command to manually recover a server farm member shut down by intelligent monitoring.

If health monitoring is not configured, a recovered server farm member is set to Unknown state.

If health monitoring is configured and succeeds, a recovered server farm member is set to Active state. If health monitoring fails, a recovered server farm member is set to Probe-failed state.

Examples

# Manually recover a server farm member in Auto shutdown state.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] real-server rs1 port 80

[Sysname-sfarm-sf-#member#-rs1-port-80] recover-from-auto-shutdown

redirect relocation (LB action view)

Use redirect relocation to enable the redirection feature and specify a redirection URL for an LB action.

Use undo redirect relocation to disable the redirection feature for an LB action.

Syntax

redirect relocation relocation

undo redirect relocation

Default

The redirection feature is disabled for an LB action.

Views

HTTP LB action view

Predefined user roles

network-admin

Parameters

relocation: Specifies a redirection URL, a case-sensitive string of 1 to 255 characters. You can also specify the question mark (?) or the following character strings as the redirection URL (each character string can be used only once):

·     %h: Specifies the host name in the client request packet.

·     %p: Specifies the URL in the client request packet.

Usage guidelines

This command and the server-farm command are mutually exclusive. If you configure one command, the other command (if configured) is automatically cancelled.

This command redirects all HTTP request packets matching an LB action to the specified URL.

Examples

# Enable the redirection feature for the HTTP LB action lba1, and specify the redirection URL as https://%h%p.

<Sysname> system-view

[Sysname] loadbalance action lba1 type http

[Sysname-lba-http-lba1] redirect relocation https://%h%p

redirect relocation (virtual server view)

Use redirect relocation to enable the redirection feature and specify a redirection URL for a virtual server.

Use undo redirect relocation to disable the redirection feature for a virtual server.

Syntax

redirect relocation relocation

undo redirect relocation

Default

The redirection feature is disabled for a virtual server.

Views

HTTP virtual server view

Predefined user roles

network-admin

Parameters

relocation: Specifies a redirection URL, a case-sensitive string of 1 to 255 characters. The redirection feature redirects all request packets matching the virtual server to the URL. You can also specify the question mark (?) or the following character strings as the redirection URL (each character string can be used only once):

·     %h: Specifies the host name in the client request packet.

·     %p: Specifies the URL in the client request packet.

Examples

# Enable the redirection feature for the HTTP-type virtual server vs2, and specify the redirection URL as https://%h%p.

<Sysname> system-view

[Sysname] virtual-server vs2 type http

[Sysname-vs-http-vs2] redirect relocation https://%h%p

redirect return-code (LB action view)

Use redirect return-code to specify the status code in the redirection packets that the LB device returns to clients.

Use undo redirect return-code to restore the default.

Syntax

redirect return-code { 301 | 302 }

undo redirect return-code

Default

The status code in the redirection packets that the LB device returns to clients is 302.

Views

HTTP LB action view

Predefined user roles

network-admin

Parameters

301: Deletes request resources permanently.

302: Deletes request resources temporarily.

Usage guidelines

This configuration takes effect only when the redirection feature is enabled for the HTTP LB action.

Examples

# Specify the status code in the redirection packets that the LB device returns to clients as 301 for the HTTP LB action lba1.

<Sysname> system-view

[Sysname] loadbalance action lba1 type http

[Sysname-lba-http-lba1] redirect return-code 301

Related commands

redirect relocation

redirect return-code (virtual server view)

Use redirect return-code to specify the status code in the redirection packets that the LB device returns to clients.

Use undo redirect return-code to restore the default.

Syntax

redirect return-code { 301 | 302 }

undo redirect return-code

Default

The status code in the redirection packets that the LB device returns to clients is 302.

Views

HTTP virtual server view

Predefined user roles

network-admin

Parameters

301: Deletes request resources permanently.

302: Deletes request resources temporarily.

Usage guidelines

This configuration takes effect only when the redirection feature is enabled for the virtual server.

Examples

# Specify the status code in the redirection packets that the LB device returns to clients as 301 for the HTTP-type virtual server vs2.

<Sysname> system-view

[Sysname] virtual-server vs2 type http

[Sysname-vs-http-vs2] redirect return-code 301

Related commands

redirect relocation

reload http-response

Use reload http-response to reload a response file.

Syntax

reload http-response { file filename }

Views

System view

Predefined user roles

network-admin

Parameters

file filename: Specifies a file by its name, a case-insensitive string of 1 to 255 characters.

Usage guidelines

If a response file changes, you must reload the file to make it take effect.

Examples

# Reload response file subsys_intf.js.

<Sysname> system-view

[Sysname] reload http-response /index/subsys_intf.js

Related commands

fallback-action response raw-file

response

request-version all

Use request-version all to enable compression for responses to HTTP 1.0 requests.

Use undo request-version all to restore the default.

Syntax

request-version all

undo request-version all

Default

Compression is disabled for responses to HTTP 1.0 requests.

Views

HTTP-compression parameter profile view

Predefined user roles

network-admin

Examples

# Create the HTTP-compression parameter profile http1, and enable compression for responses to HTTP 1.0 requests.

<Sysname> system-view

[Sysname] parameter-profile http1 type http-compression

[Sysname-para-http-compression-http1] request-version all

reset loadbalance connections

Use reset loadbalance connections to clear application layer connections.

Syntax

reset loadbalance connections

Views

User view

Predefined user roles

network-admin

Usage guidelines

This command clears all application layer connections, including reused idle connections.

Examples

# Clear application layer connections.

<Sysname> reset loadbalance connection

reset loadbalance dns-cache

Use reset loadbalance dns-cache to clear DNS cache information.

Syntax

reset loadbalance dns-cache [ domain-name domain-name ]

Views

User view

Predefined user roles

network-admin

Parameters

domain-name domain-name: Specifies a domain name, a case-insensitive string of 1 to 253 characters. If you do not specify this option, the command clears DNS cache information for all domain names.

Examples

# Clear DNS cache information for all domain names.

<Sysname> reset loadbalance dns-cache

reset loadbalance dns-proxy statistics

Use reset loadbalance dns-proxy statistics to clear transparent DNS proxy statistics.

Syntax

reset loadbalance dns-proxy statistics [ dns-proxy-name ]

Views

User view

Predefined user roles

network-admin

Parameters

dns-proxy-name: Specifies a transparent DNS proxy by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this argument, the command clears statistics for all DNS transparent proxies.

Examples

# Clear statistics for transparent DNS proxy dns-proxy1.

<Sysname> reset loadbalance dns-proxy statistics dns-proxy1

Related commands

display loadbalance dns-proxy statistics

reset loadbalance dns-server statistics

Use reset loadbalance dns-server statistics to clear DNS server statistics or DNS server pool member statistics.

Syntax

reset loadbalance dns-server statistics [ dns-server-name ]

reset loadbalance dns-server statistics dns-server-pool dns-server-pool-name [ name dns-server-name port port-number ]

Views

User view

Predefined user roles

network-admin

Parameters

dns-server-name: Specifies a DNS server by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this argument, the command clears statistics for all DNS servers.

dns-server-pool dns-server-pool-name: Clears statistics for members of a DNS server pool. The dns-server-pool-name argument specifies a DNS server pool by its name, a case-insensitive string of 1 to 63 characters.

dns-server dns-server-name port port-number: Clears statistics for a DNS server pool member. The dns-server-name argument specifies a DNS server pool member by its name, a case-insensitive string of 1 to 63 characters. The port-number argument specifies the port number of the DNS server pool member, in the range of 0 to 65535. If you do not specify this option, the command clears statistics for all members of a DNS server pool.

Examples

# Clear statistics for DNS server ds1.

<Sysname> reset loadbalance dns-server statistics ds1

# Clear statistics for all members in DNS server pool dsp.

<Sysname> reset loadbalance dns-server statistics dns-server-pool dsp

Related commands

display loadbalance dns-server statistics

reset loadbalance hot-backup statistics

Use reset loadbalance hot-backup statistics to clear LB hot backup statistics.

Syntax

reset loadbalance hot-backup statistics

Views

User view

Predefined user roles

network-admin

Examples

# Clear LB hot backup statistics.

<Sysname> reset loadbalance hot-backup statistics

reset loadbalance link statistics

Use reset loadbalance link statistics to clear link statistics or link group member statistics.

Syntax

reset loadbalance link statistics [ link-name ]

reset loadbalance link statistics link-group link-group-name [ name link-name ]

Views

User view

Predefined user roles

network-admin

Parameters

link-name: Specifies a link by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this argument, the command clears statistics about all links.

link-group link-group-name: Clears statistics for members of a link group. The link-group-name argument specifies a link group by its name, a case-insensitive string of 1 to 63 characters.

name link-name: Clears statistics for of a link group member. The link-name argument specifies a link group member by its name, a case-insensitive string of 1 to 63 characters. If you do not specify this option, the command clears statistics for all members of a link group.

Examples

# Clear statistics about all links.

<Sysname> reset loadbalance link statistics

# Clear statistics about all members in link group lg.

<Sysname> reset loadbalance link statistics link-group lg

reset loadbalance local-dns-server parse-fail-record

Use reset loadbalance local-dns-server parse-fail-record to clear DNS request parse failures.

Syntax

reset loadbalance local-dns-server parse-fail-record

Views

User view

Predefined user roles

network-admin

Examples

# Clear DNS request parse failures.

<Sysname> reset loadbalance local-dns-server parse-fail-record

reset loadbalance proximity

Use reset loadbalance proximity to clear proximity entry information.

Syntax

reset loadbalance proximity [ vpn-instance vpn-instance-name ] [ ip [ ipv4-address ] | ipv6 [ ipv6-address ] ]

Views

User view

Predefined user roles

network-admin

Parameters

vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you do not specify this option, the command clears proximity entry information for the public network.

ip [ ipv4-address ]: Clears IPv4 proximity entry information. If you specify the ipv4-address argument, this command clears information about the proximity entry corresponding to the IPv4 address. If you do not specify the ipv4-address argument, this command clears information about all IPv4 proximity entries.

ipv6 [ ipv6-address ]: Clears IPv6 proximity entry information. If you specify the ipv6-address argument, this command clears information about the proximity entry corresponding to the IPv6 address. If you do not specify the ipv6-address argument, this command clears information about all IPv6 proximity entries.

Usage guidelines

If you do not specify the vpn-instance, ip, or ipv6 keyword, this command clears information about all IPv4 and IPv6 proximity entries for the public network.

Examples

# Clear information about the proximity entry corresponding to the IPv4 address 1.1.1.1 for the VPN instance vrf1.

<Sysname> reset loadbalance proximity vpn vrf1 ip 1.1.1.1

# Clear information about all IPv6 proximity entries for the public network.

<Sysname> reset loadbalance proximity ipv6

reset real-server statistics

Use reset real-server statistics to clear real server statistics or server farm member statistics.

Syntax

reset real-server statistics [ real-server-name ]

reset real-server statistics server-farm server-farm-name [ name real-server-name port port-number ]

Views

User view

Predefined user roles

network-admin

Parameters

real-server-name: Clears statistics of the specified real server. The real-server-name argument specifies a real server name, a case-insensitive string of 1 to 63 characters. If you do not specify this argument, the command clears statistics of all real servers.

server-farm server-farm-name: Clears statistics for members of a server farm. The server-farm-name argument specifies a server farm by its name, a case-insensitive string of 1 to 63 characters.

name real-server-name port port-number: Clears statistics for a server farm member. The real-server-name argument specifies a server farm member by its name, a case-insensitive string of 1 to 63 characters. The port-number argument specifies the port number of the server farm member, in the range of 0 to 65535. If you do not specify this option, the command clears statistics for all members of a server farm.

Examples

# Clear statistics of all real servers.

<Sysname> reset real-server statistics

# Clear statistics of all members in server farm sf.

<Sysname> reset real-server statistics server-farm sf

Related commands

display real-server statistics

reset virtual-server statistics

Use reset virtual-server statistics to clear virtual server statistics.

Syntax

reset virtual-server statistics [ virtual-server-name ]

Views

User view

Predefined user roles

network-admin

Parameters

virtual-server-name: Clears statistics of the specified virtual server. The virtual-server-name argument specifies a virtual server name, a case-insensitive string of 1 to 63 characters. If you do not specify this argument, the command clears statistics of all virtual servers.

Examples

# Clear statistics of all virtual servers.

<Sysname> reset virtual-server statistics

Related commands

display virtual-server statistics

response

Use response to specify a response file for matching HTTP requests.

Use undo response to restore the default.

Syntax

response { url url file filename | workpath workpath zip-file zip-filename }

undo response { url url | workpath workpath }

Default

No response file is specified for HTTP requests.

Views

HTTP LB action view

Predefined user roles

network-admin

Parameters

url url: Specifies the URL path used to match HTTP requests, a case-sensitive string of 1 to 255 characters. The specified URL path must start with a forward slash (/).

file filename: Specifies an uncompressed file by its name, a case-insensitive string of 1 to 255 characters.

workpath workpath: Specifies a working path to match the URL in HTTP requests, a case-sensitive string of 1 to 255 characters. The working path can be a single forward slash (/), or a string that starts with a forward slash and does not end with a forward slash.

zip-file zip-filename: Specifies a zip file by its name, a case-insensitive string of 1 to 255 characters. The relative path in the zip file is used to match the URL in HTTP requests.

Usage guidelines

If the URL path in a client request matches the specified URL path, the device responds to the request by using an uncompressed file.

If the URL path in a client request matches the specified working path plus a relative path in the zip file, the device responds to the request by using the file in the zip file. For example, if you configure the response workpath /index zip-file flash:/za/zb/test.zip command and a relative path /css/col.css exists in test.zip, the matching URL is /index/css/col.css and the response file is col.css.

URL-encoded URLs cannot be matched.

If you configure both an uncompressed file and a compressed file for the same URL path, the uncompressed file is used to respond to matching HTTP requests.

For the same HTTP LB action, only one uncompressed file can be used for a URL, and one uncompressed file can be used for multiple URLs.

If you specify multiple compressed files for one or more URL paths in the same HTTP LB action, the most recent configuration takes effect.

If you specify multiple uncompressed files for one URL path in the same HTTP LB action, the most recent configuration takes effect. One uncompressed file can be used for different URL paths.

Any two of the following commands are mutually exclusive:

·     response

·     server-farm (LB action view)

·     redirect relocation (LB action view)

Examples

# Specify response file subsys.js for the HTTP requests with URL path /index/subsys/subsys_intf.js.

<Sysname> system-view

[Sysname] loadbalance action a_http type http

[Sysname-lba-http-a_http] response url /index/subsys/subsys_intf.js file subsys.js

Related commands

display loadbalance action

redirect relocation (LB action view)

server-farm (LB action view)

route-advertisement enable

Use route-advertisement enable to enable IP address advertisement for a virtual server.

Use undo route-advertisement enable to disable IP address advertisement for a virtual server.

Syntax

route-advertisement enable

undo route-advertisement enable

Default

IP address advertisement is disabled for a virtual server.

Views

Virtual server view

Predefined user roles

network-admin

Usage guidelines

After this feature is configured, the device advertises the IP address of the virtual server to OSPF for route calculation. When the service of a data center switches to another data center, the traffic to the virtual server can also be switched to that data center. For information about OSPF, see Layer 3—IP Routing Configuration Guide.

Examples

# Enable IP address advertisement for the virtual server vs.

<Sysname> system-view

[Sysname] virtual-server vs type ip

[Sysname-vs-ip-vs] route-advertisement enable

router interface

Use router interface to specify an outgoing interface for an LB link.

Use undo router interface to delete the outgoing interface for an LB link.

Syntax

router interface interface-type interface-number

undo router interface

Default

No outgoing interface is specified for an LB link.

Views

LB link view

Predefined user roles

network-admin

Parameters

interface-type interface-number: Specifies an outgoing interface.

Usage guidelines

In scenarios where IP addresses are obtained through PPPoE, use this command to dynamically obtain the outbound next hop IP address through the specified outgoing interface.

The specified outgoing interface must be an interface that can dynamically obtain IP addresses.

You can configure both this command and the router ip or router ipv6 command. The command configured later overwrites the command configured first.

If you configure this command after configuring the vpn-instance (link view) command, this command overwrites the vpn-instance (link view) command. After you configure this command, you cannot configure the vpn-instance (link view) command.

Examples

# Specify Dialer0 as the outgoing interface for the LB link cnc.

<Sysname> system-view

[Sysname] loadbalance link cnc

[Sysname-lb-link-cnc] router interface Dialer0

router ip

Use router ip to specify the outbound next hop for an LB link.

Use undo router ip to restore the default.

Syntax

router ip ipv4-address

undo router ip

Default

The outbound next hop is not specified for an LB link.

Views

LB link view

Predefined user roles

network-admin

Parameters

ipv4-address: Specifies an IPv4 address, which cannot be a loopback address, multicast address, broadcast address, or an address in the format of 0.X.X.X.

Usage guidelines

You can specify only one outbound next hop for an LB link.

Examples

# Specify the outbound next hop as 1.2.3.4 for the LB link lk1.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] router ip 1.2.3.4

router ipv6

Use router ipv6 to specify the outbound next hop for an LB link.

Use undo router ipv6 to restore the default.

Syntax

router ipv6 ipv6-address

undo router ipv6

Default

The outbound next hop is not specified for an LB link.

Views

LB link view

Predefined user roles

network-admin

Parameters

ipv6-address: Specifies an IPv6 address, which cannot be an all-zero address, a multicast address, a loopback address, or a link-local address.

Usage guidelines

You can specify only one outbound next hop for an LB link.

Examples

# Specify the outbound next hop as 8008::8  for the LB link lk1.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] router ipv6 8008::8

rst threshold

Use rst threshold to set the RST packet count threshold for a TCP-RST LB probe template.

Use undo rst threshold to restore the default.

Syntax

rst threshold number

undo rst threshold

Default

The RST packet count threshold is 1000000.

Views

TCP-RST LB probe template view

Predefined user roles

network-admin

Parameters

number: Specifies the RST packet count threshold value, in the range of 1 to 4294967295.

Usage guidelines

When the number of RST packets sent by a real server reaches the threshold, the protection action specified in the protect-action command is taken.

Examples

# In TCP-RST LB probe template rsttplt, set the RST packet count threshold to 20.

<Sysname>system-view

[Sysname] loadbalance probe-template tcp-rst rsttplt

[Sysname-lbpt-tcp-rst-rsttplt] rst threshold 20

Related commands

protect-action

rtt weight

Use rtt weight to set the network delay weight for proximity calculation.

Use undo rtt weight to restore the default.

Syntax

rtt weight rtt-weight

undo rtt weight

Default

The network delay weight for proximity calculation is 100.

Views

Proximity view

Predefined user roles

network-admin

Parameters

rtt-weight: Specifies the network delay weight for proximity calculation, in the range of 0 to 255. A larger value indicates a higher weight.

Examples

# Set the network delay weight for proximity calculation to 200.

<Sysname> system-view

[Sysname] loadbalance proximity

[Sysname-lb-proximity] rtt weight 200

rule (parameter profile view)

Use rule to configure a filtering rule for compression.

Use undo rule to restore the default.

Syntax

rule [ rule-id ] { deny | permit } { content-type | url } expression

undo rule rule-id

Default

No filtering rules are configured.

Views

HTTP-compression parameter profile view

Predefined user roles

network-admin

Parameters

rule-id: Specifies a rule by its ID in the range of 1 to 65535. If the rule does not exist, the command creates the rule. If the rule already exists, the command modifies the rule. If you do not specify this argument, the system automatically assigns an available rule ID with the smallest number.

deny: Does not compress matching packets.

permit: Compresses matching packets.

content-type: Matches content types in the content-type header of packets.

url: Matches URLs in packets.

expression: Specifies a regular expression, a case-sensitive string of 1 to 255 characters. The string cannot contain question marks (?).

Examples

# Create the HTTP-compression parameter profile http1, and configure the device to not compress the response packets containing the string image in URLs.

<Sysname> system-view

[Sysname] parameter-profile http1 type http-compression

[Sysname-para-http-compression-http1] rule deny url image

rule (protection policy view)

Use rule to create a protection rule and enter its view, or enter the view of an existing protection rule.

Use undo rule to delete a protection rule.

Syntax

rule rule-id

undo rule rule-id

Default

No protection rules exist.

Views

HTTP protection policy view

Predefined user roles

network-admin

Parameters

rule-id: Specifies a rule ID in the range of 1 to 65535.

Usage guidelines

You can configure multiple protection rules in an HTTP protection policy.

Examples

# In HTTP protection policy p1, create protection rule 5 and enter its view.

<Sysname> system-view

[Sysname] loadbalance protection-policy p1

[Sysname-lbpp-http-p1] rule 5

[Sysname-lbpp-http-p1-rule-5]

secondary-cookie delimiters

Use secondary-cookie delimiters to configure the delimiter that separates secondary cookies in URLs.

Use undo secondary-cookie delimiters to restore the default.

Syntax

secondary-cookie delimiters text

undo secondary-cookie delimiters

Default

The delimiter that separates secondary cookies in URLs can be slash (/), ampersand (&), number sign (#), or plus (+).

Views

HTTP parameter profile view

Predefined user roles

network-admin

Parameters

text: Specifies the delimiter, a string of 1 to 4 characters including exclamation mark (!), quotation mark (',"), number sign (#), semicolon (;), brackets (( ),[ ], < >), question mark (?), backslash (\), caret (^), grave accent (`), vertical bar (|), colon (:), at sign (@), ampersand (&), dollar sign ($), plus (+), asterisk (*), comma (,), and slash (/). Each character in the string is considered as a delimiter.

Examples

# For the HTTP parameter profile pp1, configure the delimiter that separates secondary cookies in URLs as slash (/), at sign (@), number sign (#), or dollar sign ($).

<Sysname> system-view

[Sysname] parameter-profile pp1 type http

[Sysname-para-http-pp1] secondary-cookie delimiters !@#$

secondary-cookie start

Use secondary-cookie start to configure the start delimiter for secondary cookies in URLs.

Use undo secondary-cookie start to restore the default.

Syntax

secondary-cookie start text

undo secondary-cookie start

Default

The start delimiter for secondary cookies in URLs is question mark (?).

Views

HTTP parameter profile view

Predefined user roles

network-admin

Parameters

text: Specifies the delimiter, a string of 1 to 2 characters including exclamation mark (!), quotation mark ("), number sign (#), semicolon (;), brackets ([ ], < >), question mark (?), backslash (\), caret (^), grave accent (`), and vertical bar (|).

Examples

# For the HTTP parameter profile pp1, configure the start delimiter for secondary cookies in URLs as question mark (?) or exclamation mark (!).

<Sysname> system-view

[Sysname] parameter-profile pp1 type http

[Sysname-para-http-pp1] secondary-cookie start ?!

selected-link

Use selected-link to specify the number of links to participate in scheduling.

Use undo selected-link to restore the default.

Syntax

selected-link min min-number max max-number

undo selected-link

Default

The links with the highest priority participate in scheduling.

Views

Link group view

Predefined user roles

network-admin

Parameters

min min-number: Specifies the minimum number of links to participate in scheduling, in the range of 1 to 1000.

max max-number: Specifies the maximum number of links to participate in scheduling, in the range of 1 to 1000. The value of the max-number argument must be greater than or equal to the value of the min-number argument.

Usage guidelines

If the number of links available to participate in scheduling exceeds the max-number setting, the max-number setting applies.

If the number of links available to participate in scheduling is smaller than the min-number setting, more links are selected by priority in descending order.

Examples

# Configure the minimum number and maximum number of links in the link group lg to participate in scheduling as 20 and 30, respectively.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] selected-link min 20 max 30

Related commands

predictor (link group view)

priority (link view)

selected-server (DNS server pool view)

Use selected-server to specify the number of DNS servers to participate in scheduling.

Use undo selected-server to restore the default.

Syntax

selected-server min min-number max max-number

undo selected-server

Default

The DNS servers with the highest priority participate in scheduling.

Views

DNS server pool view

Predefined user roles

network-admin

Parameters

min min-number: Specifies the minimum number of DNS servers to participate in scheduling, in the range of 1 to 1000.

max max-number: Specifies the maximum number of DNS servers to participate in scheduling, in the range of 1 to 1000. The value of the max-number argument must be greater than or equal to the value of the min-number argument.

Usage guidelines

If the number of DNS servers available to participate in scheduling exceeds the max-number setting, the max-number setting applies.

If the number of DNS servers available to participate in scheduling is less than the min-number setting, more DNS servers are selected by priority in descending order.

Examples

# Configure the minimum number and maximum number of DNS servers in DNS server pool dns-pool to participate in scheduling as 20 and 30, respectively.

<Sysname> system-view

[Sysname] loadbalance dns-server-pool dns-pool

[Sysname-lb-dspool-dns-pool] selected-server min 20 max 30

selected-server (server farm view)

Use selected-server to specify the number of real servers to participate in scheduling.

Use undo selected-server to restore the default.

Syntax

selected-server min min-number max max-number

undo selected-server

Default

The real servers with the highest priority participate in scheduling.

Views

Server farm view

Predefined user roles

network-admin

Parameters

min min-number: Specifies the minimum number of real servers to participate in scheduling, in the range of 1 to 1000.

max max-number: Specifies the maximum number of real servers to participate in scheduling, in the range of 1 to 1000. The value of the max-number argument must be greater than or equal to the value of the min-number argument.

Usage guidelines

If the number of real servers available to participate in scheduling exceeds the max-number setting, the max-number setting applies.

If the number of real servers available to participate in scheduling is less than the min-number setting, more real servers are selected by priority in descending order.

Examples

# Configure the minimum number and maximum number of real servers in the server farm sf to participate in scheduling as 20 and 30, respectively.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] selected-server min 20 max 30

Related commands

predictor (server farm view)

priority (real server view)

server-connection reuse

Use server-connection reuse to enable connection reuse between the LB device and the server.

Use undo server-connection reuse to disable connection reuse between the LB device and the server.

Syntax

server-connection reuse

undo server-connection reuse

Default

Connection reuse between the LB device and the server is disabled.

Views

HTTP parameter profile view

MySQL parameter profile view

Predefined user roles

network-admin

Usage guidelines

This command allows the LB device to establish connections to the server that can be reused by clients. Because multiple clients can use the same connection, the number of connections between the clients and the server is reduced.

This command is not supported by the virtual servers of the fast HTTP type.

Examples

# Enable connection reuse between the LB device and the server for the HTTP parameter profile pp1.

<Sysname> system-view

[Sysname] parameter-profile pp1 type http

[Sysname-para-http-pp1] server-connection reuse

server-farm (LB action view)

Use server-farm to specify the primary server farm.

Use undo server-farm to restore the default.

Syntax

server-farm server-farm-name [ backup backup-server-farm-name ] [ sticky sticky-name [ backup backup-sticky-name ] ]

undo server-farm

Default

No primary server farm is specified.

Views

LB action view

Predefined user roles

network-admin

Parameters

server-farm-name: Specifies a primary server farm name, a case-insensitive string of 1 to 63 characters.

backup backup-server-farm-name: Specifies a backup server farm name, a case-insensitive string of 1 to 63 characters.

sticky sticky-name: Specifies a primary sticky group by its name, a case-insensitive string of 1 to 63 characters.

backup backup-sticky-name: Specifies a backup sticky group by its name, a case-insensitive string of 1 to 63 characters. This option is supported only by HTTP virtual servers and RADIUS virtual servers.

Usage guidelines

This command is mutually exclusive with the forward all or redirect relocation command. If you configure one command, the other command (if configured) is automatically cancelled.

When the primary server farm is available (contains real servers), packets are forwarded through the primary server farm. When the primary server farm is not available, packets are forwarded through the backup server farm.

If you specify both a primary sticky group and a backup sticky group, the device generates both primary sticky entries and backup sticky entries. If packets do not match primary sticky entries, backup sticky entries will apply.

The device generates backup sticky entries for only the following sticky group combinations:

·     RADIUS-type primary sticky group and port-address-type backup sticky group.

·     HTTP cookie-type primary sticky group and port-address-type backup sticky group.

·     HTTP cookie-type primary sticky group and HTTP passive-type backup sticky group.

Examples

# Specify the primary server farm sf, the backup server farm sfb, and the sticky group sg1 for the generic LB action lba1.

<Sysname> system-view

[Sysname] loadbalance action lba1 type generic

[Sysname-lba-generic-lba1] server-farm sf backup sfb sticky sg1

Related commands

forward all

server-farm (real server view)

Use server-farm to specify the server farm for a real server.

Use undo server-farm to restore the default.

Syntax

server-farm server-farm-name

undo server-farm [ server-farm-name ]

Default

A real server does not belong to any server farm.

Views

Real server view

Predefined user roles

network-admin

Parameters

server-farm-name: Specifies a server farm name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

You can specify a server farm that has not been created.

Examples

# Specify the server farm sf for the real server rs.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] server-farm sf

server-farm (system view)

Use server-farm to create a server farm and enter its view, or enter the view of an existing server farm.

Use undo server-farm to delete the specified server farm.

Syntax

server-farm server-farm-name

undo server-farm server-farm-name

Default

No server farms exist.

Views

System view

Predefined user roles

network-admin

Parameters

server-farm-name: Specifies a server farm name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

You can add servers with common attributes to a server farm to facilitate management.

Examples

# Create the server farm sf and enter server farm view.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf]

service enable (transparent DNS proxy view)

Use service enable to enable the transparent DNS proxy feature.

Use undo service enable to disable the transparent DNS proxy feature.

Syntax

service enable

undo service enable

Default

The transparent DNS proxy feature is disabled.

Views

Transparent DNS proxy view

Predefined user roles

network-admin

Examples

# Enable the transparent DNS proxy feature for transparent DNS proxy dns-proxy1.

<Sysname> system-view

[Sysname] loadbalance dns-proxy dns-proxy1

[Sysname-lb-dp-udp-dns-proxy1] service enable

service enable (virtual server view)

Use service enable to enable a virtual server.

Use undo service enable to disable a virtual server.

Syntax

service enable

undo service enable

Default

A virtual server is disabled.

Views

Virtual server view

Predefined user roles

network-admin

Examples

# Enable the IP-type virtual server vs3.

<Sysname> system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] service enable

service object-group

Use service object-group to specify a service object group for address translation.

Use undo service object-group to restore the default.

Syntax

service object-group object-group-name

undo service object-group

Default

All packets are translated.

Views

SNAT global policy view

Predefined user roles

network-admin

Parameters

object-group-name: Specifies a service object group by its name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

If you specify a service object group, the device performs SNAT on only packets with a matching service. For information about configuring a service object group, see object group configuration in Security Configuration Guide.

Examples

# Specify a service object group obj1 for SNAT global policy sn1.

<Sysname> system-view

[Sysname] loadbalance snat-global-policy sn1

[Sysname-lb-snat-gp-sn1] service object-group obj1

Related commands

object-group (Security Command Reference)

set ip tos (LB action view)

Use set ip tos to set the ToS field value of IP packets sent to the server.

Use undo set ip tos to restore the default.

Syntax

set ip tos tos-number

undo set ip tos

Default

The ToS field of IP packets sent to the server is not changed.

Views

LB action view

Predefined user roles

network-admin

Parameters

tos-number: Specifies the ToS field value in the range of 0 to 255.

Examples

# Set the ToS field value to 20 for IP packets sent to the server for the generic LB action lba1.

<Sysname> system-view

[Sysname] loadbalance action lba1 type generic

[Sysname-lba-generic-lba1] set ip tos 20

set ip tos (parameter profile view)

Use set ip tos to set the ToS field value of IP packets sent to the client.

Use undo set ip tos to restore the default.

Syntax

set ip tos tos-number

undo set ip tos

Default

The ToS field of IP packets sent to the client is not changed.

Views

Parameter profile view

Predefined user roles

network-admin

Parameters

tos-number: Specifies the ToS field value in the range of 0 to 255.

Usage guidelines

This command is available in IP parameter profile view only.

Examples

# Set the ToS field value to 20 for IP packets sent to the client for the IP parameter profile pp2.

<Sysname> system-view

[Sysname] parameter-profile pp2 type ip

[Sysname-para-ip-pp2] set ip tos 20

shutdown (link group member view)

Use shutdown to shut down a link group member.

Use undo shutdown to activate a link group member.

Syntax

shutdown

undo shutdown

Default

A link group member is activated.

Views

Link group member view

Predefined user roles

network-admin

Examples

# Shut down the link group member lk1.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] link lk1

[Sysname-lb-lgroup-lg-#member#-lk1] shutdown

shutdown (link view)

Use shutdown to shut down a link.

Use undo shutdown to activate a link.

Syntax

shutdown

undo shutdown

Default

A link is activated.

Views

Link view

Predefined user roles

network-admin

Examples

# Shut down the link lk1.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] shutdown

shutdown (real server view)

Use shutdown to shut down a real server.

Use undo shutdown to activate a real server.

Syntax

shutdown

undo shutdown

Default

A real server is activated.

Views

Real server view

Predefined user roles

network-admin

Examples

# Shut down the real server rs.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] shutdown

shutdown (server farm member view)

Use shutdown to shut down a server farm member.

Use undo shutdown to activate a server farm member.

Syntax

shutdown

undo shutdown

Default

A server farm member is activated.

Views

Server farm member view

Predefined user roles

network-admin

Examples

# Shut down the server farm member rs1.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] real-server rs1 port 80

[Sysname-sfarm-sf-#member#-rs1-port-80] shutdown

skip current-dns-proxy

Use skip current-dns-proxy to skip the current transparent DNS proxy.

Use undo skip current-dns-proxy to restore the default.

Syntax

skip current-dns-proxy

undo skip current-dns-proxy

Default

The forwarding mode is to discard packets.

Views

DNS LB action view

Predefined user roles

network-admin

Usage guidelines

This command enables DNS requests to skip the current transparent DNS proxy and match the next transparent DNS proxy or virtual server.

A DNS request can skip a maximum of five transparent DNS proxies and virtual servers.

This command is mutually exclusive with the dns-server-pool or forward all command. If you configure one command, the other command (if configured) is automatically cancelled.

Examples

# Skip the current transparent DNS proxy in DNS LB action lba1.

<Sysname> system-view

[Sysname] loadbalance action lba1 type dns

[Sysname-lba-dns-lba1] skip current-dns-proxy

slow-online (link group view)

Use slow-online to enable the slow online feature for a link group.

Use undo slow-online to disable the slow online feature for a link group.

Syntax

slow-online [ standby-time standby-time ramp-up-time ramp-up-time ]

undo slow-online

Default

The slow online feature is disabled for a link group.

Views

Link group view

Predefined user roles

network-admin

Parameters

standby-time standby-time: Specifies the standby timer in the range of 0 to 600 seconds. The default is 5 seconds.

ramp-up-time ramp-up-time: Specifies the ramp-up timer in the range of 3 to 600 seconds. The default is 5 seconds.

Usage guidelines

The links newly added to a link group might be unable to immediately process large numbers of services assigned by the LB device. To resolve this issue, enable the slow online feature for the link group. The feature uses the standby timer and ramp-up timer. When a link is added, the LB device does not assign any service to the link until the standby timer expires.

When the standby timer expires, the ramp-up timer starts. During the ramp-up time, the LB device increases the service amount according to the processing capability of the link, until the ramp-up timer expires.

Examples

# Enable the slow online feature for the link group lg.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] slow-online

slow-online (server farm view)

Use slow-online to enable the slow online feature for a server farm.

Use undo slow-online to disable the slow online feature for a server farm.

Syntax

slow-online [ standby-time standby-time ramp-up-time ramp-up-time ]

undo slow-online

Default

The slow online feature is disabled for a server farm.

Views

Server farm view

Predefined user roles

network-admin

Parameters

standby-time standby-time: Specifies the standby timer in the range of 0 to 600 seconds. The default is 5 seconds.

ramp-up-time ramp-up-time: Specifies the ramp-up timer in the range of 3 to 600 seconds. The default is 5 seconds.

Usage guidelines

The real servers newly added to a server farm might not be able to immediately process large numbers of services assigned by the LB device. To resolve this issue, enable the slow online feature for the server farm. The feature uses the standby timer and ramp-up timer. When a real server is added, the LB device does not assign any service to the real server until the standby timer expires.

When the standby timer expires, the ramp-up timer starts. During the ramp-up time, the LB device increases the service amount according to the processing capability of the real server, until the ramp-up timer expires.

Examples

# Enable the slow online feature for the server farm sf.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] slow-online

slow-shutdown enable (link group member view)

Use slow-shutdown enable to enable the slow offline feature for a link group member.

Use undo slow-shutdown enable to disable the slow offline feature for a link group member.

Syntax

slow-shutdown enable

undo slow-shutdown enable

Default

The slow offline feature is disabled for a link group member.

Views

Link group member view

Predefined user roles

network-admin

Usage guidelines

The shutdown command immediately terminates existing connections of a link group member. The slow offline feature ages out the connections, and does not establish new connections.

To enable the slow offline feature for a link group member, you must execute the slow-shutdown enable command and then the shutdown command. If you execute the shutdown command and then the slow-shutdown enable command, the slow offline feature does not take effect and the link group member is shut down.

Examples

# Enable the slow offline feature for the link group member lk1.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] link lk1

[Sysname-lb-lgroup-lg-link-lk1] slow-shutdown enable

Related commands

shutdown (link group member view)

slow-shutdown enable (link view)

Use slow-shutdown enable to enable the slow offline feature for a link.

Use undo slow-shutdown enable to disable the slow offline feature for a link.

Syntax

slow-shutdown enable

undo slow-shutdown enable

Default

The slow offline feature is disabled for a link.

Views

Link view

Predefined user roles

network-admin

Usage guidelines

The shutdown command immediately terminates existing connections of a link. The slow offline feature ages out the connections, and does not establish new connections.

To enable the slow offline feature for a link, you must execute the slow-shutdown enable command and then the shutdown command. If you execute the shutdown command and then the slow-shutdown enable command, the slow offline feature does not take effect and the link is shut down.

Examples

# Enable the slow offline feature for the link lk1.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] slow-shutdown enable

Related commands

shutdown (link view)

slow-shutdown enable (real server view)

Use slow-shutdown enable to enable the slow offline feature for a real server.

Use undo slow-shutdown enable to disable the slow offline feature for a real server.

Syntax

slow-shutdown enable

undo slow-shutdown enable

Default

The slow offline feature is disabled for a real server.

Views

Real server view

Predefined user roles

network-admin

Usage guidelines

The shutdown command immediately terminates existing connections of a real server. The slow offline feature ages out the connections, and does not establish new connections.

To enable the slow offline feature for a real server, you must execute the slow-shutdown enable command and then the shutdown command. If you execute the shutdown command and then the slow-shutdown enable command, the slow offline feature does not take effect and the real server is shut down.

Examples

# Enable the slow offline feature for the real server rs.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] slow-shutdown enable

Related commands

shutdown (real server view)

slow-shutdown enable (server farm member view)

Use slow-shutdown enable to enable the slow offline feature for a server farm member.

Use undo slow-shutdown enable to disable the slow offline feature for a server farm member.

Syntax

slow-shutdown enable

undo slow-shutdown enable

Default

The slow offline feature is disabled for a server farm member.

Views

Server farm member view

Predefined user roles

network-admin

Usage guidelines

The shutdown command immediately terminates existing connections of a server farm member. The slow offline feature ages out the connections, and does not establish new connections.

To enable the slow offline feature for a server farm member, you must execute the slow-shutdown enable command and then the shutdown command. If you execute the shutdown command and then the slow-shutdown enable command, the slow offline feature does not take effect and the server farm member is shut down.

Examples

# Enable the slow offline feature for the server farm member rs1.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] real-server rs1 port 80

[Sysname-sfarm-sf-#member#-rs1-port-80] slow-shutdown enable

Related commands

shutdown (server farm member view)

snat enable

Use snat enable to enable a SNAT global policy.

Use undo snat enable to disable a SNAT global policy.

Syntax

snat enable

undo snat enable

Default

A SNAT global policy is disabled.

Views

SNAT global policy view

Predefined user roles

network-admin

Examples

# Enable SNAT global policy sn1.

<Sysname> system-view

[Sysname] loadbalance snat-global-policy sn1

[Sysname-lb-snat-gp-sn1] snat enable

snat-mode

Use snat-mode to specify a translation mode for a server farm.

Use undo snat-mode to restore the default.

Syntax

snat-mode { tcp-option | auto-map }

undo snat-mode

Default

No translation mode is specified for a server farm.

Views

Server farm view

Predefined user roles

network-admin

Parameters

auto-map: Specifies the automatic mapping mode.

tcp-option: Specifies the TCP option mode.

Usage guidelines

The device supports the following translation modes for a server farm:

·     Automatic mapping—Translates the source IP address into the IP address of the interface connecting to the real servers.

·     TCP option—Translates the source IP address into the IP address carried in the TCP option field of packets.

·     SNAT address pool—Translates the source IP address into an IP address in the SNAT address pool specified by using the snat-pool (server farm view) command.

You can configured only one translation mode for a server farm. This command and the snat-pool (server farm view) command are mutually exclusive.

If SNAT is not configured for a server farm, the server farm uses SNAT global policies for address translation.

Examples

# Specify the automatic mapping translation mode for server farm sf.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] snat-mode auto-map

Related commands

loadbalance snat-global-policy

snat-pool (server farm view)

snat-pool (link group view)

Use snat-pool to specify the SNAT address pool to be referenced by a link group.

Use undo snat-pool to restore the default.

Syntax

snat-pool pool-name

undo snat-pool

Default

No SNAT address pool is referenced by a link group.

Views

Link group view

Predefined user roles

network-admin

Parameters

pool-name: Specifies the SNAT address pool name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

After a link group references a SNAT address pool, the LB device replaces the source address of packets it receives with an SNAT address before forwarding the packets.

Examples

# Specify the SNAT address pool lbsp to be referenced by the link group lg.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] snat-pool lbsp

snat-pool (server farm view)

Use snat-pool to specify the SNAT address pool to be referenced by a server farm.

Use undo snat-pool to restore the default.

Syntax

snat-pool pool-name

undo snat-pool

Default

No SNAT address pool is referenced by a server farm.

Views

Server farm view

Predefined user roles

network-admin

Parameters

pool-name: Specifies the SNAT address pool name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

After a server farm references a SNAT address pool, the LB device replaces the source address of packets it receives with an SNAT address before forwarding the packets.

Examples

# Specify the SNAT address pool lbsp to be referenced by the server farm sf.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] snat-pool lbsp

snmp-agent trap enable loadbalance

Use snmp-agent trap enable loadbalance to enable SNMP notifications for load balancing.

Use undo snmp-agent trap enable loadbalance to disable SNMP notifications for load balancing.

Syntax

snmp-agent trap enable loadbalance

undo snmp-agent trap enable loadbalance

Default

All SNMP notifications are enabled for load balancing.

Views

System view

Predefined user roles

network-admin

Usage guidelines

To report critical load balancing events to an NMS, enable SNMP notifications for load balancing. For load balancing event notifications to be sent correctly, you must also configure SNMP as described in the network management and monitoring configuration guide for the device.

Examples

# Disable SNMP notifications for load balancing.

<Sysname> system-view

[Sysname] undo snmp-agent trap enable loadbalance

source-ip

Use source-ip to configure a source-IP-based request threshold.

Use undo source-ip to restore the default.

Syntax

source-ip request-threshold threshold

undo source-ip

Default

The source-IP-based request threshold is not configured.

Views

Protection rule view

Predefined user roles

network-admin

Parameters

request-threshold threshold: Specifies a request threshold in the range of 1 to 4294967295.

Usage guidelines

If the number of times that a user accesses a protected URL exceeds the request threshold during the protection period, the protection action is taken. The device determines whether requests belong to the same user based on the following elements:

·     Cookie—Requests with the same cookie value for a cookie (specified in the cookie command in protection rule view) belong to the same user.

·     Source IP address—Requests with the same source IP address belong to the same user.

If you configure both a cookie-based request threshold and a source-IP-based request threshold, the protection action is taken when either threshold is exceeded.

Examples

# In protection rule 5, configure a source-IP-based request threshold of 2.

<Sysname> system-view

[Sysname] loadbalance protection-policy p1

[Sysname-lbpp-http-p1] rule 5

[Sysname-lbpp-http-p1-rule-5] source-ip request-threshold 2

Related commands

cookie (protection policy view)

protected-url

protection-action

protection-period

source-ip object-group (parameter profile view)

Use source-ip object-group to enable collection of HTTP traffic statistics by source IP address object group.

Use undo source-ip object-group to remove a source IP address object group for HTTP traffic statistics collection.

Syntax

source-ip object-group object-group-name

undo source-ip object-group object-group-name

Default

HTTP traffic statistics are collected on a per-IP address basis.

Views

HTTP statistics parameter profile view

Predefined user roles

network-admin

Parameters

object-group-name: Specifies a source IP address object group by its name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

If HTTP packets match the specified URL and source IP address object group, they are counted based on the source IP address object group. If HTTP packets match the specified URL but do not match the specified source IP address object group, they are counted based on the source IP address.

You can specify a maximum of 1024 source IP address object groups in one HTTP statistics parameter profile.

This command takes effect only on IP address objects configured by using the host, subnet, and range keywords in the network command. For information about configuring IP address objects, see object group configuration in Security Configuration Guide.

Examples

# In HTTP statistics parameter profile http1, enable collection of HTTP traffic statistics by source IP address object group cnc.

<Sysname> system-view

[Sysname] parameter-profile http1 type http-statistics

[Sysname-para-http-statistics-http1] source-ip object-group cnc

Related commands

network (Security Command Reference)

object-group (Security Command Reference)

source-ip object-group (SNAT global policy view)

Use source-ip object-group to specify a source IP address object group for address translation.

Use undo source-ip object-group to restore the default.

Syntax

source-ip object-group object-group-name

undo source-ip object-group

Default

All packets are translated.

Views

SNAT global policy view

Predefined user roles

network-admin

Parameters

object-group-name: Specifies a source IP address object group by its name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

If you specify a source IP address object group, the device performs SNAT on only packets with a matching source IP address. For information about configuring an IP address object group, see object group configuration in Security Configuration Guide.

Examples

# Specify source IP address object group obj1 for SNAT global policy sn1.

<Sysname> system-view

[Sysname] loadbalance snat-global-policy sn1

[Sysname-lb-snat-gp-sn1] source-ip object-group obj1

Related commands

object-group (Security Command Reference)

src-addr-option

Use src-addr-option to configure the TCP option for SNAT.

Use undo src-addr-option to restore the default.

Syntax

src-addr-option option-number [ encode { binary | string } ]

undo src-addr-option

Default

No TCP option is configured for SNAT.

Views

TCP parameter profile view

Predefined user roles

network-admin

Parameters

option-number: Specifies a TCP option by its number. Valid numbers are 6, 7, 9 to 18, and 22 to 254.

encode { binary | string }: Specifies the bindary or string encoding mode. The default is the binary mode.

Usage guidelines

This command enables the device to parse the IP address in the TCP option by using the specified encoding mode. Then, the device translates the source IP address according to the configured translation mode.

This command takes effect only in a TCP parameter profile that is referenced as a client-side parameter profile by a virtual server.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# In TCP parameter profile pp3, specify TCP option 28 with binary encoding mode for SNAT.

<Sysname> system-view

[Sysname] parameter-profile pp3 type tcp

[Sysname-para-tcp-pp3] src-addr-option 28 encode binary

ssl session-id

Use ssl session-id to configure an SSL sticky method based on SSL session ID.

Use undo ssl session-id to restore the default.

Syntax

ssl session-id

undo ssl session-id

Default

No sticky methods exist.

Views

SSL sticky group view

Predefined user roles

network-admin

Usage guidelines

The SSL sticky method based on SSL session ID applies only to HTTPS request packets. This sticky method requires specifying an SSL server policy for the virtual server.

Examples

# Configure the SSL sticky method based on SSL session ID for the SSL sticky group sg6.

<Sysname> system-view

[Sysname] sticky-group sg6 type ssl

[Sysname-sticky-ssl-sg6] ssl session-id

ssl url rewrite

Use ssl url rewrite to rewrite the URL in the Location header of HTTP response packets sent by the server.

Use undo ssl url rewrite to remove the configuration.

Syntax

ssl url rewrite location location [ clearport clear-port ] [ sslport ssl-port ]

undo ssl url rewrite location location [ clearport clear-port ]

Default

The URL in the Location header of HTTP response packets sent by the server is not rewritten.

Views

HTTP LB action view

Predefined user roles

network-admin

Parameters

location location: Specifies the Location header URL regular expression, a case-sensitive string of 1 to 255 characters.

clearport clear-port: Specifies the HTTP port number to be rewritten, in the range of 1 to 65535. The default is 80.

sslport ssl-port: Specifies the SSL port number after rewrite, in the range of 1 to 65535. The default is 443.

Usage guidelines

If the Location header of an HTTP response packet contains the location and clear-port values, the system rewrites HTTP in the URL to HTTPS and rewrites the clear-port value to the ssl-port value.

Examples

# For the HTTP LB action lba2, rewrite the URL http://www.ss.com:8080 in the Location header of HTTP response packets sent by the server to https://www.ss.com:443.

<Sysname> system-view

[Sysname] loadbalance action lba2 type http

[Sysname-lba-http-lba2] ssl url rewrite location www.ss.com clearport 8080 sslport 443

ssl-client-policy (LB action view)

Use ssl-client-policy to specify an SSL client policy to encrypt traffic between the LB device (SSL client) and the SSL server.

Use undo ssl-client-policy to restore the default.

Syntax

ssl-client-policy policy-name

undo ssl-client-policy policy-name

Default

No SSL client policy is referenced.

Views

HTTP LB action view

Predefined user roles

network-admin

Parameters

policy-name: Specifies an SSL policy by its name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

The virtual servers of the fast HTTP type do not support this command.

You must disable and then enable a virtual server for a modified SSL policy to take effect.

The device does not support specifying an SSL client policy that uses the following cipher suites:

·     exp_rsa_des_cbc_sha.

·     exp_rsa_rc2_md5.

·     exp_rsa_rc4_md5.

·     rsa_des_cbc_sha.

Examples

# Specify the SSL client policy scp for the HTTP LB action lba2.

<Sysname> system-view

[Sysname] loadbalance action lba2 type http

[Sysname-lba-http-lba2] ssl-client-policy scp

ssl-client-policy (virtual server view)

Use ssl-client-policy to specify an SSL client policy for a virtual server to encrypt traffic between the LB device (SSL client) and the SSL server.

Use undo ssl-client-policy to restore the default.

Syntax

ssl-client-policy policy-name

undo ssl-client-policy policy-name

Default

A virtual server does not reference any SSL client policy.

Views

HTTP virtual server view

Predefined user roles

network-admin

Parameters

policy-name: Specifies an SSL policy by its name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

The virtual servers of the fast HTTP type do not support this command.

You must disable and then enable a virtual server for a modified SSL policy to take effect.

The device does not support specifying an SSL client policy that uses the following cipher suites:

·     exp_rsa_des_cbc_sha.

·     exp_rsa_rc2_md5.

·     exp_rsa_rc4_md5.

·     rsa_des_cbc_sha.

Examples

# Specify the SSL client policy scp for the HTTP virtual server vs2.

<Sysname> system-view

[Sysname] virtual-server vs2 type http

[Sysname-vs-http-vs2] ssl-client-policy scp

ssl-server-policy

Use ssl-server-policy to specify an SSL server policy for a virtual server to encrypt traffic between the LB device (SSL server) and the SSL client.

Use undo ssl-server-policy to restore the default.

Syntax

ssl-server-policy policy-name

undo ssl-server-policy policy-name

Default

A virtual server does not reference any SSL server policy.

Views

HTTP/TCP virtual server view

Predefined user roles

network-admin

Parameters

policy-name: Specifies an SSL policy by its name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

The virtual servers of the fast HTTP type do not support this command.

You must disable and then enable a virtual server for a modified SSL policy to take effect.

The device does not support specifying an SSL server policy that uses the following cipher suites:

·     exp_rsa_des_cbc_sha.

·     exp_rsa_rc2_md5.

·     exp_rsa_rc4_md5.

·     rsa_des_cbc_sha.

Examples

# Specify the SSL server policy ssp for the HTTP virtual server vs2.

<Sysname> system-view

[Sysname] virtual-server vs2 type http

[Sysname-vs-http-vs2] ssl-server-policy ssp

statistics-match url

Use statistics-match url to configure a URL match rule.

Use undo statistics-match url to delete a URL match rule.

Syntax

statistics-match [ rule-id ] url url

undo statistics-match rule-id

Default

No URL match rules exist.

Views

Statistics node view

Predefined user roles

network-admin

Parameters

rule-id: Specifies the match rule ID in the range of 1 to 256. If you do not specify a match rule ID, the system assigns the smallest available rule ID to the match rule.

url: Specifies a URL regular expression, a case-sensitive string of 1 to 255 characters. The string cannot contain question marks (?).

Usage guidelines

You can configure a maximum of 256 URL match rules for one statistics node.

Examples

# In statistics node bank, configure a string of .html to match URLs in HTTP packets.

<Sysname> system-view

[Sysname] parameter-profile http1 type http-statistics

[Sysname-para-http-statistics-http1] node bank

[Sysname-para-http-statistics-http1-node-bank] statistics-match url *.html

status-code

Use status-code to configure a response status code to check.

Use undo status-code to remove a response status code.

Syntax

status-code code

undo status-code code

Default

No response status code is configured for checking.

Views

HTTP passive LB probe template view

Predefined user roles

network-admin

Parameters

code: Specifies a response status code, in the range of 100 to 599.

Usage guidelines

The device monitors the responses of HTTP requests with URLs specified in the check-url command. If the status code in an HTTP response is the same as the specified response status code, a URL error is recorded.

You can configure a maximum of 10 response status codes for one HTTP passive load balancing template.

Examples

# Configure response status code 404 in HTTP passive load balancing template tplt.

<Sysname> system-view

[Sysname] loadbalance probe-template http-passive tplt

[Sysname-lbpt-http-passive-tplt] status-code 404

Related commands

check-url

sticky

Use sticky to specify a sticky group for a virtual server.

Use undo sticky to restore the default.

Syntax

sticky sticky-name

undo sticky

Default

No sticky group is specified for a virtual server.

Views

HTTP virtual server view

Predefined user roles

network-admin

Parameters

sticky-name: Specifies a sticky group by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

You can also specify a sticky group by using the default server-farm and server-farm (LB action view) commands. The sticky group specified by using the sticky command has the highest priority.

This command allows you to specify only HTTP cookie sticky groups.

Examples

# Specify the HTTP cookie sticky group test for HTTP virtual server vs.

<Sysname> system-view

[Sysname] virtual-server vs type http

[Sysname-vs-http-vs] sticky test

Related commands

default server-farm

server-farm (LB action view)

sticky-group

sticky-group

Use sticky-group to create a sticky group and enter its view, or enter the view of an existing sticky group.

Use undo sticky-group to delete the specified sticky group.

Syntax

sticky-group group-name [ type { address-port | http-content | http-cookie | http-header | http-passive | payload | radius| sip | ssl | tcp-payload | udp-passive } ]

undo sticky-group group-name

Default

No sticky groups exist.

Views

System view

Predefined user roles

network-admin

Parameters

group-name: Specifies a sticky group name, a case-insensitive string of 1 to 63 characters.

type { address-port | http-content | http-cookie | http-header | http-passive | payload | radius | sip | ssl | tcp-payload | udp-passive }: Specifies the sticky group type, address and port, HTTP entity, HTTP cookie, HTTP header, HTTP passive, HTTP or UDP payload, RADIUS, SIP, SSL, TCP payload, or UDP passive. When you create a sticky group, you must specify the sticky group type. You can enter an existing sticky group view without entering the type of the sticky group.

Usage guidelines

A sticky group uses a specific sticky method to distribute similar sessions to the same real server or link. The sticky method applies to the first packet of a session. Subsequent packets of the session are distributed to the same real server or link.

Examples

# Create the address- and port-type sticky group sg1 and enter sticky group view.

<Sysname> system-view

[Sysname] sticky-group sg1 type address-port

[Sysname-sticky-address-port-sg1]

sticky-over-busy enable

Use sticky-over-busy enable to enable stickiness-over-busyness.

Use undo sticky-over-busy enable to disable stickiness-over-busyness.

Syntax

sticky-over-busy enable

undo sticky-over-busy enable

Default

Stickiness-over-busyness is disabled.

Views

Sticky group view

Predefined user roles

network-admin

Usage guidelines

This command enables the device to assign client requests to real servers based on sticky entries, regardless of whether the real servers are busy.

When stickiness-over-busyness is disabled, the device assigns client requests to only the real servers in normal state.

Examples

# In address- and port-type sticky group sg1, enable stickiness-over-busyness.

<Sysname> system-view

[Sysname] sticky-group sg1 type address-port

[Sysname-sticky-address-port-sg1] sticky-over-busy enable

sticky-sync enable (transparent DNS proxy view)

Use sticky-sync enable to enable sticky entry synchronization for a transparent DNS proxy.

Use undo sticky-sync enable to disable sticky entry synchronization for a transparent DNS proxy.

Syntax

sticky-sync enable [ global ]

undo sticky-sync enable

Default

Sticky entry synchronization is disabled for a transparent DNS proxy.

Views

Transparent DNS proxy view

Predefined user roles

network-admin

Parameters

global: Enables global synchronization.

Usage guidelines

This command can back up sticky entry information to ensure service continuity during a master and backup switchover in hot backup mode.

In a VRRP network, you must specify the global keyword for the sticky entry synchronization feature to take effect.

Examples

# Enable sticky entry synchronization for transparent DNS proxy dns_proxy1.

<Sysname>system-view

[Sysname] loadbalance dns-proxy dns_proxy1 type udp

[Sysname-lb-dp-udp-dns_proxy1] sticky-sync enable

sticky-sync enable (virtual server view)

Use sticky-sync enable to enable sticky entry synchronization for a virtual server.

Use undo sticky-sync enable to disable sticky entry synchronization for a virtual server.

Syntax

sticky-sync enable [ global ]

undo sticky-sync enable

Default

Sticky entry synchronization is disabled for a virtual server.

Views

Virtual server view

Predefined user roles

network-admin

Parameters

global: Enables global synchronization.

Usage guidelines

For successful sticky entry synchronization, if you want to specify a sticky group, enable sticky entry synchronization before specifying a sticky group on both LB devices. You can specify a sticky group by using the sticky sticky-name option when you specify a primary server farm (see the default server-farm command).

In a VRRP network, you must specify the global keyword for the sticky entry synchronization feature to take effect.

Examples

# Enable sticky entry synchronization for the IP-type virtual server vs3.

<Sysname>system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] sticky-sync enable

success-criteria (DNS server pool member view)

Use success-criteria to specify the health monitoring success criteria for a DNS server pool member.

Use undo success-criteria to restore the default.

Syntax

success-criteria { all | at-least min-number }

undo success-criteria

Default

Health monitoring succeeds only when all the specified health monitoring methods succeed.

Views

DNS server pool member view

Predefined user roles

network-admin

Parameters

all: Specifies the health monitoring success criteria as all successful health monitoring methods.

at-least min-number: Specifies the health monitoring success criteria as the specified minimum number of successful health monitoring methods, in the range of 1 to 4294967295.

Usage guidelines

If the min-number setting exceeds the number of existing health monitoring methods on the device, the number of existing health monitoring methods applies.

The health monitoring success criteria configuration in DNS server pool member view takes precedence over the configuration in DNS server pool view.

The health monitoring result for a DNS server affects the availability of a DNS server pool member. The health monitoring result for a DNS server pool member does not affect the availability of a DNS server.

Examples

# Configure the health monitoring success criteria for the DNS server pool member ds1 as a minimum number of 2 successful health monitoring methods.

<Sysname> system-view

[Sysname] loadbalance dns-server-pool dsp1

[Sysname-lb-dsp-dsp1] dns-server ds1 port 10

[Sysname-lb-dsp-dsp1-#member#-ds1-port-10] success-criteria at-least 2

success-criteria (DNS server pool view)

Use success-criteria to specify the health monitoring success criteria for a DNS server pool.

Use undo success-criteria to restore the default.

Syntax

success-criteria { all | at-least min-number }

undo success-criteria

Default

Health monitoring succeeds only when all the specified health monitoring methods succeed.

Views

DNS server pool view

Predefined user roles

network-admin

Parameters

all: Specifies the health monitoring success criteria as all successful health monitoring methods.

at-least min-number: Specifies the health monitoring success criteria as the specified minimum number of successful health monitoring methods, in the range of 1 to 4294967295.

Usage guidelines

If the min-number setting exceeds the number of existing health monitoring methods on the device, the number of existing health monitoring methods applies.

The health monitoring success criteria configuration in DNS server view takes precedence over the configuration in DNS server pool view.

Examples

# Configure the health monitoring success criteria for the DNS server pool dns-pool as a minimum number of 2 successful health monitoring methods.

<Sysname> system-view

[Sysname] loadbalance dns-server-pool dns-pool

[Sysname-lb-dspool-dns-pool] success-criteria at-least 2

Related commands

success-criteria (DNS server view)

success-criteria (DNS server view)

Use success-criteria to specify the health monitoring success criteria for a DNS server.

Use undo success-criteria to restore the default.

Syntax

success-criteria { all | at-least min-number }

undo success-criteria

Default

Health monitoring succeeds only when all the specified health monitoring methods succeed.

Views

DNS server view

Predefined user roles

network-admin

Parameters

all: Specifies the health monitoring success criteria as all successful health monitoring methods.

at-least min-number: Specifies the health monitoring success criteria as the specified minimum number of successful health monitoring methods, in the range of 1 to 4294967295.

Usage guidelines

If the min-number setting exceeds the number of existing health monitoring methods on the device, the number of existing health monitoring methods applies.

The health monitoring success criteria configuration in DNS server view takes precedence over the configuration in DNS server pool view.

Examples

# Configure the health monitoring success criteria for DNS server ds1 as a minimum number of 2 successful health monitoring methods.

<Sysname> system-view

[Sysname] loadbalance dns-server ds1

[Sysname-lb-ds-ds1] success-criteria at-least 2

Related commands

success-criteria (DNS server pool view)

success-criteria (link group member view)

Use success-criteria to specify the health monitoring success criteria for a link group member.

Use undo success-criteria to restore the default.

Syntax

success-criteria { all | at-least min-number }

undo success-criteria

Default

Health monitoring succeeds only when all the specified health monitoring methods succeed.

Views

Link group member view

Predefined user roles

network-admin

Parameters

all: Specifies the health monitoring success criteria as all successful health monitoring methods.

at-least min-number: Specifies the health monitoring success criteria as the specified minimum number of successful health monitoring methods, in the range of 1 to 4294967295.

Usage guidelines

If the min-number setting exceeds the number of existing health monitoring methods on the device, the number of existing health monitoring methods applies.

The health monitoring success criteria configuration in link group member view takes precedence over the configuration in link group view.

The health monitoring result for a link affects the availability of a link group member. The health monitoring result for a link group member does not affect the availability of a link.

Examples

# Configure the health monitoring success criteria for the link group member lk1 as a minimum number of 2 successful health monitoring methods.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] link lk1

[Sysname-lb-lgroup-lg-#member#-lk1] success-criteria at-least 2

success-criteria (link group view)

Use success-criteria to specify the health monitoring success criteria for a link group.

Use undo success-criteria to restore the default.

Syntax

success-criteria { all | at-least min-number }

undo success-criteria

Default

Health monitoring succeeds only when all the specified health monitoring methods succeed.

Views

Link group view

Predefined user roles

network-admin

Parameters

all: Specifies the health monitoring success criteria as all successful health monitoring methods.

at-least min-number: Specifies the health monitoring success criteria as the specified minimum number of successful health monitoring methods, in the range of 1 to 4294967295.

Usage guidelines

If the min-number setting exceeds the number of existing health monitoring methods on the device, the number of existing health monitoring methods applies.

The health monitoring success criteria configuration in link view takes precedence over the configuration in link group view.

Examples

# Configure the health monitoring success criteria for the link group lg as a minimum number of 2 successful health monitoring methods.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] success-criteria at-least 2

Related commands

success-criteria (link view)

success-criteria (link view)

Use success-criteria to specify the health monitoring success criteria for an LB link.

Use undo success-criteria to restore the default.

Syntax

success-criteria { all | at-least min-number }

undo success-criteria

Default

Health monitoring succeeds only when all the specified health monitoring methods succeed.

Views

LB link view

Predefined user roles

network-admin

Parameters

all: Specifies the health monitoring success criteria as all successful health monitoring methods.

at-least min-number: Specifies the health monitoring success criteria as the specified minimum number of successful health monitoring methods, in the range of 1 to 4294967295.

Usage guidelines

If the min-number setting exceeds the number of existing health monitoring methods on the device, the number of existing health monitoring methods applies.

Examples

# Configure the health monitoring success criteria for the LB link lk1 as a minimum number of 2 successful health monitoring methods.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] success-criteria at-least 2

Related commands

success-criteria (link group view)

success-criteria (real server view)

Use success-criteria to specify the health monitoring success criteria for a real server.

Use undo success-criteria to restore the default.

Syntax

success-criteria { all | at-least min-number }

undo success-criteria

Default

Health monitoring succeeds only when all the specified health monitoring methods succeed.

Views

Real server view

Predefined user roles

network-admin

Parameters

all: Specifies the health monitoring success criteria as all successful health monitoring methods.

at-least min-number: Specifies the health monitoring success criteria as the specified minimum number of successful health monitoring methods, in the range of 1 to 4294967295.

Usage guidelines

If the min-number setting exceeds the number of existing health monitoring methods on the device, the number of existing health monitoring methods applies.

The health monitoring success criteria configuration in real server view takes precedence over the configuration in server farm view.

Examples

# Configure the health monitoring success criteria for the real server rs as a minimum number of 2 successful health monitoring methods.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] success-criteria at-least 2

success-criteria (server farm member view)

Use success-criteria to specify the health monitoring success criteria for a server farm member.

Use undo success-criteria to restore the default.

Syntax

success-criteria { all | at-least min-number }

undo success-criteria

Default

Health monitoring succeeds only when all the specified health monitoring methods succeed.

Views

Server farm member view

Predefined user roles

network-admin

Parameters

all: Specifies the health monitoring success criteria as all successful health monitoring methods.

at-least min-number: Specifies the health monitoring success criteria as the specified minimum number of successful health monitoring methods, in the range of 1 to 4294967295.

Usage guidelines

If the min-number setting exceeds the number of existing health monitoring methods on the device, the number of existing health monitoring methods applies.

The health monitoring success criteria configuration in server farm member view takes precedence over the configuration in server farm view.

The health monitoring result for a real server affects the availability of a server farm member. The health monitoring result for a server farm member does not affect the availability of a real server.

Examples

# Configure the health monitoring success criteria for the server farm member rs1 as a minimum number of 2 successful health monitoring methods.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] real-server rs1 port 80

[Sysname-sfarm-sf-#member#-rs1-port-80] success-criteria at-least 2

success-criteria (server farm view)

Use success-criteria to specify the health monitoring success criteria for a server farm.

Use undo success-criteria to restore the default.

Syntax

success-criteria { all | at-least min-number }

undo success-criteria

Default

Health monitoring succeeds only when all the specified health monitoring methods succeed.

Views

Server farm view

Predefined user roles

network-admin

Parameters

all: Specifies the health monitoring success criteria as all successful health monitoring methods.

at-least min-number: Specifies the health monitoring success criteria as the specified minimum number of successful health monitoring methods, in the range of 1 to 4294967295.

Usage guidelines

If the min-number setting exceeds the number of existing health monitoring methods on the device, the number of existing health monitoring methods applies.

The health monitoring success criteria configuration in real server view takes precedence over the configuration in server farm view.

Examples

# Configure the health monitoring success criteria for the server farm sf as a minimum number of 2 successful health monitoring methods.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] success-criteria at-least 2

syn retransmission-timeout

Use syn retransmission-timeout to set the retransmission timeout time for SYN packets.

Use undo syn retransmission-timeout to restore the default.

Syntax

syn retransmission-timeout timeout-value

undo syn retransmission-timeout

Default

The retransmission timeout time for SYN packets is 10 seconds.

Views

TCP parameter profile view

Predefined user roles

network-admin

Parameters

timeout-value: Specifies the retransmission timeout time for SYN packets, in the range of 1 to 75 seconds.

Usage guidelines

This command sets the amount of time the device waits for a SYN ACK before closing a TCP connection.

Examples

# Set the retransmission timeout time for SYN packets to 5 seconds for TCP connections.

<Sysname> system-view

[Sysname] parameter-profile profile type tcp

[Sysname-para-tcp-profile] syn retransmission-timeout 5

Related commands

display parameter-profile

tcp connection idle-timeout

Use tcp connection idle-timeout to set the idle timeout for TCP connections.

Use undo tcp connection idle-timeout to restore the default.

Syntax

tcp connection idle-timeout value

undo tcp connection idle-timeout

Default

The idle timeout is 0 seconds for TCP connections, which means TCP connections never time out.

Views

TCP parameter profile view

Predefined user roles

network-admin

Parameters

value: Specifies the idle timeout in the range of 10 to 86400 seconds.

Usage guidelines

This command sets the idle timeout for TCP connections between the LB device and the clients and for TCP connections between the LB device and the servers. If no traffic is available on a TCP connection before the idle timeout expires, the LB device terminates the TCP connection.

Examples

# Set the idle timeout to 60 seconds for TCP connections.

<Sysname> system-view

[Sysname] parameter-profile pp1 type tcp

[Sysname-para-tcp-pp1] tcp connection idle-timeout 60

tcp mss

Use tcp mss to set the MSS for the LB device.

Use undo tcp mss to restore the default.

Syntax

tcp mss value

undo tcp mss

Default

The MSS is not set for the LB device.

Views

TCP parameter profile view

Predefined user roles

network-admin

Parameters

value: Specifies the MSS value in the range of 128 to 1460 bytes.

Usage guidelines

This command takes effect only when the fast HTTP or HTTP virtual server has referenced a TCP parameter profile.

When the client establishes a TCP connection to the LB device, the client sends its own MSS value to the LB device. The LB device records the MSS value and sends the configured MSS value to the client. The client and the LB device use the smaller MSS value for communication.

When the LB device establishes a TCP connection to the server, the LB device sends the configured MSS value to the server. The server records the MSS value and sends its own MSS value to the LB device. The LB device and the server use the smaller MSS value for communication.

Examples

# Set the MSS to 1300 bytes for the LB device.

<Sysname> system-view

[Sysname] parameter-profile tcp type tcp

[Sysname-para-tcp-tcp] tcp mss 1300

tcp option insert

Use tcp option insert to insert the client IP address into a TCP option.

Use undo tcp option insert to remove the configuration.

Syntax

tcp option insert option-number src-addr [ encode { binary | string } ]

undo tcp option insert option-number

Default

The client IP address is not inserted into any TCP options.

Views

TCP parameter profile view

Predefined user roles

network-admin

Parameters

option-number: Specifies a TCP option by its number. Valid values are 6, 7, 9 to 18, and 22 to 254.

encode { binary | string }: Specifies the binary or string encoding mode. The default is binary mode.

Usage guidelines

This command inserts the client's actual IP address as the source IP address into the specified option in headers of TCP packets sent to the server.

This command takes effect only on TCP parameter profiles referenced by the following virtual servers:

·     HTTP virtual servers.

·     TCP virtual servers configured with SSL server policies.

·     TCP virtual servers operating at Layer 7.

·     MySQL virtual servers.

You can execute this command multiple times to insert the client IP address to a maximum of five TCP options.

If you execute this command multiple times for the same TCP option, the most recent configuration takes effect.

Examples

# In TCP parameter profile para2, insert the client IP address into TCP option 28.

<Sysname> system-view

[Sysname] parameter-profile para2 type tcp

[Sysname-para-tcp-para2] tcp option insert 28 src-addr

Related commands

parameter-profile

tcp option remove

Use tcp option remove to remove the specified TCP option from TCP packet headers.

Use undo tcp option remove to cancel the removal configuration.

Syntax

tcp option remove option-number

undo tcp option remove option-number

Default

No TCP option is removed from TCP packet headers.

Views

TCP parameter profile view

Predefined user roles

network-admin

Parameters

option-number: Specifies a TCP option by its number in the range of 3 to 254.

Usage guidelines

This command removes the specified TCP option from headers of TCP packets sent to the server.

You can execute this command multiple times to remove a maximum of five TCP options.

Examples

# In TCP parameter profile para2, remove TCP option 8 from TCP packet headers.

<Sysname> system-view

[Sysname] parameter-profile para2 type tcp

[Sysname-para-tcp-para2] tcp option remove 8

Related commands

parameter-profile

tcp window-size

Use tcp window-size to configure the maximum local window size for TCP connections.

Use undo tcp window-size to restore the default.

Syntax

tcp window-size size

undo tcp window-size

Default

The maximum local window size for TCP connections is 65535.

Views

TCP parameter profile view

Predefined user roles

network-admin

Parameters

size: Specifies the maximum local window size for TCP connections, in the range of 8192 to 65535.

Examples

# Set the maximum local window size for TCP connections to 8192 for the TCP parameter profile pp3.

<Sysname> system-view

[Sysname] parameter-profile pp3 type tcp

[Sysname-para-tcp-pp3] tcp window-size 8192

tcp-close

Use tcp-close to configure the method to close TCP connections.

Use undo tcp-close to restore the default.

Syntax

tcp-close { fin | rst }

undo tcp-close

Default

FIN packets are sent to close TCP connections.

Views

Generic/HTTP LB action view

Predefined user roles

network-admin

Parameters

fin: Closes TCP connections by sending FIN packets.

rst: Closes TCP connections by sending RST packets.

Examples

# In generic LB action lba1, configure the rst method to close TCP connections.

<Sysname> system-view

[Sysname] loadbalance action lba1 type generic

[Sysname-lba-generic-lba1] tcp-close rst

timeout (LB probe template view)

Use timeout to set the timeout time for probe responses.

Use undo timeout to restore the default.

Syntax

timeout timeout-value

undo timeout

Default

The timeout time for probe responses is 3 seconds for ICMP probe packets and custom monitoring probe packets and is 5 seconds for HTTP passive probe packets.

Views

ICMP LB probe template view

HTTP passive LB probe template view

Custom-monitoring LB probe template view

Predefined user roles

network-admin

Parameters

timeout-value: Specifies the timeout time for probe responses, in the range of 1 to 60 seconds for ICMP probe packets, 1 to 255 seconds for HTTP passive probe packets, and 1 to 86400 seconds for custom monitoring probe packets.

Usage guidelines

As a best practice, set the timeout time for probe responses to be smaller than the monitoring time (set by using the monitor-interval command).

After an HTTP passive LB probe template is referenced, the device monitors the responses of HTTP requests with URLs specified in the check-url command. If the response time for an HTTP request exceeds the specified timeout time, a URL error is recorded.

Examples

# Set the timeout time for probe responses to 5 seconds in the ICMP template icmptplt.

<Sysname> system-view

[Sysname] loadbalance probe-template icmp icmptplt

[Sysname-lbpt-icmp-icmptplt] timeout 5

Related commands

check-url

monitor-interval

timeout (proximity view)

Use timeout to set the timeout timer for proximity entries.

Use undo timeout to restore the default.

Syntax

timeout timeout-value

undo timeout

Default

The timeout timer for proximity entries is 60 seconds.

Views

Proximity view

Predefined user roles

network-admin

Parameters

timeout-value: Specifies the timeout timer in the range of 60 to 3600 seconds.

Examples

# Set the timeout timer for proximity entries to 80 seconds.

<Sysname> system-view

[Sysname] loadbalance proximity

[Sysname-lb-proximity] timeout 80

timeout (sticky group view)

Use timeout to set the timeout timer for sticky entries.

Use undo timeout to restore the default.

Syntax

timeout { infinite | timeout-value }

undo timeout

Default

The timeout timer for sticky entries is 86400 seconds for sticky groups of the HTTP cookie, HTTP passive, and UDP passive types and 60 seconds for sticky groups of other types.

Views

Sticky group view

Predefined user roles

network-admin

Parameters

infinite: Specifies an infinite timeout timer for sticky entries so that the sticky entries never age out. Sticky groups of the HTTP cookie type, HTTP passive type, and UDP passive type do not support this keyword.

timeout-value: Specifies the timeout timer in the range of 0 to 31536000 seconds for sticky groups of the HTTP cookie type and in the range of 10 to 604800 seconds for sticky groups of other types.

Usage guidelines

For sticky groups of the HTTP cookie type, the following principles apply:

·     If the sticky method is cookie insert or cookie rewrite, a timeout timer of 0 indicates session persistency.

·     If the sticky method is cookie get, a timeout timer of 0 indicates the timeout time for the sticky entries is 0 seconds.

Examples

# Set the timeout timer for sticky entries to 100 seconds in the address- and port-type sticky group sg1.

<Sysname> system-view

[Sysname] sticky-group sg1 type address-port

[Sysname-sticky-address-port-sg1] timeout 100

time-wait timeout

Use time-wait timeout to set the TIME_WAIT state timeout time for TCP connections.

Use undo time-wait timeout to restore the default.

Syntax

time-wait timeout value

undo time-wait timeout

Default

The TIME_WAIT state timeout time is 2 seconds for TCP connections.

Views

TCP parameter profile view

Predefined user roles

network-admin

Parameters

value: Specifies the TIME_WAIT state timeout time in the range of 1 to 65535 seconds.

Usage guidelines

A TCP connection cannot be released until the TIME_WAIT timer expires. To release TCP connections faster and improve load balancing efficiency, use this command to set a shorter TIME_WAIT state timeout time.

Examples

# Set the TIME_WAIT state timeout time for TCP connections to 30 seconds in the TCP parameter profile pa1.

<Sysname> system-view

[Sysname] parameter-profile pa1 type tcp

[Sysname-para-tcp-pa1] time-wait timeout 30

topology region

Use topology region to configure a topology.

Use undo topology region to restore the default.

Syntax

topology region region-name { ip ipv4-address { mask-length | mask } | ipv6 ipv6-address prefix-length } [ priority priority ]

undo topology region region-name [ ip ipv4-address [ mask-length | mask ] | ipv6 ipv6-address [ prefix-length ] ]

Default

No topologies exist.

Views

System view

Predefined user roles

network-admin

Parameters

region-name: Specifies a region by its name, a case-insensitive string of 1 to 63 characters.

ip ipv4-address: Specifies the IPv4 address of a virtual server.

mask-length: Specifies the mask length for the IPv4 address, in the range of 0 to 32. The default is 32.

mask: Specifies the mask for the IPv4 address. The default is 255.255.255.255.

ipv6 ipv6-address prefix-length: Specifies the IPv6 address of a virtual server.

prefix-length: Specifies the prefix length for the IPv6 address, in the range of 0 to 128. The default is 128.

priority priority: Specifies the priority of the topology, in the range of 1 to 255. The default weight is 100.

Usage guidelines

A topology associates the region where the local DNS server resides with the IP address of a virtual server.

When the static proximity algorithm (topology) is specified for the virtual server pool by using the predictor command, you must configure a topology.

When a DNS request matches multiple topology records, the topology record with the highest priority is selected.

You can execute this command multiple times to configure multiple IP address ranges for a region.

If you only specify a region when deleting a topology, all topologies for the region are deleted.

Examples

# Configure a topology by associating the region region-ct with the IPv4 address 1.2.3.4.

<Sysname> system-view

[Sysname] topology region region-ct ip 1.2.3.4 24 priority 200

Related commands

loadbalance region

predictor (virtual server pool view)

translation-mode

Use translation-mode to configure a translation mode for a SNAT global policy.

Use undo translation-mode to restore the default.

Syntax

translation-mode { auto-map | snat-pool pool-name }

undo translation-mode

Default

No translation mode is configured for a SNAT global policy.

Views

SNAT global policy view

Predefined user roles

network-admin

Parameters

auto-map: Specifies the automatic mapping mode.

snat-pool pool-name: Specifies the SNAT address pool mode. The pool-name argument specifies the SNAT address pool name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

The device supports the following translation modes in a SNAT global policy:

·     Automatic mapping—Translates the source IP address into the IP address of the interface connecting to the real servers.

·     SNAT address pool—Translates the source IP address into an IP address in the specified SNAT address pool.

If SNAT is not configured for a server farm, the server farm uses SNAT global policies for address translation.

Examples

# Specify SNAT address pool sp for address translation in SNAT global policy sn1.

<Sysname> system-view

[Sysname] loadbalance snat-global-policy sn1

[Sysname-lb-snat-gp-sn1] translation-mode snat-pool sp

transparent enable (link group view)

Use transparent enable to disable NAT for a link group.

Use undo transparent enable to enable NAT for a link group.

Syntax

transparent enable

undo transparent enable

Default

NAT is enabled for a link group.

Views

Link group view

Predefined user roles

network-admin

Examples

# Disable NAT for the link group lg.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-sinalab] transparent enable

transparent enable (server farm view)

Use transparent enable to disable NAT for a server farm.

Use undo transparent enable to enable NAT for a server farm.

Syntax

transparent enable

undo transparent enable

Default

NAT is enabled for a server farm.

Views

Server farm view

Predefined user roles

network-admin

Usage guidelines

If the server farm is referenced by a virtual server of the HTTP type, the NAT feature takes effect even if it is disabled.

Examples

# Disable NAT for the server farm sf.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] transparent enable

ttl weight

Use ttl weight to set the TTL weight for proximity calculation.

Use undo ttl weight to restore the default.

Syntax

ttl weight ttl-weight

undo ttl weight

Default

The TTL weight for proximity calculation is 100.

Views

Proximity view

Predefined user roles

network-admin

Parameters

ttl-weight: Specifies the TTL weight for proximity calculation, in the range of 0 to 255. A larger value indicates a higher weight.

Examples

# Set the TTL weight for proximity calculation to 200.

<Sysname> system-view

[Sysname] loadbalance proximity

[Sysname-lb-proximity] ttl weight 200

udp per-packet

Use udp per-packet to enable per-packet load balancing for UDP traffic for a virtual server.

Use undo udp per-packet to disable per-packet load balancing for UDP traffic for a virtual server.

Syntax

udp per-packet

undo udp per-packet

Default

Per-packet load balancing for UDP traffic is disabled for a virtual server.

Views

UDP virtual server view

UDP-based SIP virtual server view

Predefined user roles

network-admin

Usage guidelines

When per-packet load balancing for UDP traffic is disabled, the LB device distributes traffic matching the virtual server according to application type. Traffic of the same application type is distributed to one real server.

When per-packet load balancing for UDP traffic is enabled, the following results apply:

·     The LB device distributes traffic matching the virtual server on a per-packet basis.

·     The LB device does not collect statistics of connections on the virtual server or real server.

·     If NAT is not enabled for the referenced server farm, the LB device does not collect statistics of packets sent by the virtual server or real server.

·     The following configurations are still effective:

¡     Scheduling algorithm configured on the server farm referenced by the virtual server.

¡     Sticky method of the sticky group when the virtual server references the server farm.

Because packets of the same session have the same quintuple, the hash scheduling algorithm or the source IP address sticky method yields the same result for the packets. For example, if a server farm uses the hash scheduling algorithm or the source IP address sticky method, the LB device distributes UDP packets of the same session to one real server. In this case, the LB device cannot distribute UDP packets on a per-packet basis.

Examples

# Enable per-packet load balancing for UDP traffic for the UDP virtual server vs5.

<Sysname> system-view

[Sysname] virtual-server vs5 type udp

[Sysname-vs-udp-vs5] udp per-packet

username

Use username to specify the login username and password of the MySQL database.

Use undo username to remove the login username and password of the MySQL database.

Syntax

username username [ password { cipher | simple } string ]

undo username username

Default

The login username and password of the MySQL database is not specified.

Views

MySQL virtual server view

Predefined user roles

network-admin

Parameters

username: Specifies the username, a case-sensitive string of 1 to 63 characters.

password: Specifies the password. If you do not specify the password, the password is null.

cipher: Specifies a password in encrypted form.

simple: Specifies a password in plaintext form. For security purposes, the password specified in plaintext form will be stored in encrypted form.

string: Specifies the password string. Its plaintext form is a case-sensitive string of 1 to 127 characters. Its encrypted form is a case-sensitive string of 1 to 255 characters.

Usage guidelines

You can configure a maximum of 100 login users.

The specified login username and password must be the same as the actual login username and password of the MySQL database.

Examples

# Specify the username and password as root and 123456, respectively, for the MySQL virtual server vs1.

<Sysname> system-view

[Sysname] virtual-server vs1 type mysql

[Sysname-vs-mysql-vs1] username root password simple 123456

variable

Use variable to associate a variable with a server farm member.

Use undo variable to disassociate a variable from a server farm member.

Syntax

variable variable-name value value

undo variable variable-name

Default

No variable is associated with a server farm member.

Views

Server farm member view

Predefined user roles

network-admin

Parameters

variable-name: Specifies a variable name, a case-sensitive string of 1 to 63 characters.

value value: Specifies the variable value, a case-sensitive string of 1 to 127 characters.

Examples

# Associate a variable with variable name var1 and variable value 1 with server farm member rs.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] real-server rs port 5001

[Sysname-sfarm-sf-#member#-rs-port-5001] variable var1 value _1

Related commands

payload rewrite

version

Use version to configure the MySQL database version.

Use undo version to restore the default.

Syntax

version { 5.0 | 5.1 | 5.5 | 5.6 | 5.7 }

undo version

Default

The MySQL database version is 5.6.

Views

MySQL virtual server view

Predefined user roles

network-admin

Parameters

{ 5.0 | 5.1 | 5.5 | 5.6 | 5.7 }: Specifies the MySQL database version number.

Usage guidelines

The LB device performs authentication for clients on behalf of the MySQL server and sends database initialization packets of the specified MySQL version to clients.

Examples

# Configure the MySQL database version as 5.7 for the MySQL virtual server vs1.

<Sysname> system-view

[Sysname] virtual-server vs1 type mysql

[Sysname-vs-mysql-vs1] version 5.7

virtual ip address

Use virtual ip address to configure an IPv4 address (VSIP) for a virtual server.

Use undo virtual ip address to restore the default.

Syntax

virtual ip address ipv4-address [ mask-length | mask ]

undo virtual ip address

Default

No IPv4 address is configured for a virtual server.

Views

Virtual server view

Predefined user roles

network-admin

Parameters

ipv4-address: Specifies an IPv4 address. It cannot be a loopback address, multicast address, broadcast address, or an address in the format of 0.X.X.X (with a mask length of 32).

mask-length: Specifies a mask length in the range of 0 to 32. The default is 32. This argument is not supported by virtual servers of the fast HTTP type and HTTP type.

mask: Specifies a subnet mask. The default is 255.255.255.255. This argument is not supported by virtual servers of the fast HTTP type and HTTP type.

Examples

# Configure the IPv4 address for the IP-type virtual server vs3 as 1.1.1.1/24.

<Sysname> system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] virtual ip address 1.1.1.1 24

virtual ipv6 address

Use virtual ipv6 address to configure an IPv6 address (VSIP) for a virtual server.

Use undo virtual ipv6 address to restore the default.

Syntax

virtual ipv6 address ipv6-address [ prefix-length ]

undo virtual ipv6 address

Default

No IPv6 address is configured for a virtual server.

Views

Virtual server view

Predefined user roles

network-admin

Parameters

ipv6-address: Specifies an IPv6 address, which cannot be a loopback address, IPv6 multicast address, link-local address, or all-zero address (when the prefix length is not 0).

prefix-length: Specifies a prefix length in the range of 0 to 128. The default is 128. This argument is not supported by virtual servers of the fast HTTP type and HTTP type.

Examples

# Configure the IPv6 address for the IP-type virtual server vs3 as 1001::1/64.

<Sysname> system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] virtual ipv6 address 1001::1 64

virtual-server (system view)

Use virtual-server to create a virtual server and enter its view, or enter the view of an existing virtual server.

Use undo virtual-server to delete the specified virtual server.

Syntax

virtual-server virtual-server-name [ type { fast-http | http | ip | link-ip | | mysql sip-tcp | sip-udp | radius | tcp | udp } ]

undo virtual-server virtual-server-name

Default

No virtual servers exist.

Views

System view

Predefined user roles

network-admin

Parameters

virtual-server-name: Specifies the virtual server name, a case-insensitive string of 1 to 63 characters.

type {  fast-http |http | ip | link-ip | mysql | sip-tcp | sip-udp | radius | tcp | udp }: Specifies the virtual server type as fast HTTP, HTTP, IP, link-IP, MySQL, RADIUS, TCP-based SIP, UDP-based SIP, TCP, or UDP. When you create a virtual server, you must specify a virtual server type. You can enter an existing virtual server view without entering the type of the virtual server.

Examples

# Create the virtual server vs3 with the IP type, and enter virtual server view.

<Sysname> system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3]

virtual-server (virtual server pool view)

Use virtual-server to add a virtual server to a virtual server pool.

Use undo virtual-server to delete a virtual server from a virtual server pool.

Syntax

virtual-server virtual-server-name link link-name [ weight weight-value ]

undo virtual-server virtual-server-name

Default

No virtual servers are added to a virtual server pool.

Views

Virtual server pool view

Predefined user roles

network-admin

Parameters

virtual-server-name: Specifies a virtual server by its name, a case-insensitive string of 1 to 63 characters.

link link-name: Specifies an LB link by its name, a case-insensitive string of 1 to 63 characters.

weight weight-value: Specifies the weight for the virtual server, in the range of 1 to 255. The default weight is 100. For the weighted round robin algorithm, a greater value means a higher priority to be referenced. If you do not specify this option, the default weight 100 applies.

Usage guidelines

You can add multiple virtual servers to a virtual server pool.

To ensure correct operation of inbound link load balancing when server load balancing is also enabled, do not specify the virtual server's IP address as the DNS listener's IP address.

The virtual server's IP address for inbound link load balancing must be a unicast address with a 32-bit mask length. The IP address cannot be an all-zero address.

Examples

# Add the virtual server vs1 associated with the LB link link1 to the virtual server pool local-pool.

<Sysname> system-view

[Sysname] loadbalance virtual-server-pool local-pool

[Sysname-lb-vspool-local-pool] virtual-server vs1 link link1

Related commands

loadbalance link

loadbalance virtual-server-pool

vpn-instance (link view)

Use vpn-instance to specify a VPN instance for a link.

Use undo vpn-instance to restore the default.

Syntax

vpn-instance vpn-instance-name

undo vpn-instance

Default

A link belongs to the public network.

Views

Link view

Predefined user roles

network-admin

Parameters

vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters.

Usage guidelines

Before executing this command, you must create the VPN instance by using the ip vpn-instance vpn-instance-name command. If the specified VPN instance has not been created, the link state will be unavailable.

Examples

# Specify VPN instance vpn1 for link lk1.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] vpn-instance vpn1

Related commands

ip vpn-instance (MPLS Command Reference)

vpn-instance (real server view)

Use vpn-instance to specify a VPN instance for a real server.

Use undo vpn-instance to restore the default.

Syntax

vpn-instance vpn-instance-name

undo vpn-instance

Default

A real server belongs to the public network if VPN instance inheritance is disabled.

A real server belongs to the VPN instance specified for its virtual server if VPN instance inheritance is enabled.

Views

Real server view

Predefined user roles

network-admin

Parameters

vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters.

Examples

# Specify VPN instance vpn1 for real server rs.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] vpn-instance vpn1

Related commands

inherit vpn-instance disable

vpn-instance (SNAT global policy view)

Use vpn-instance to specify a VPN instance for a SNAT global policy.

Use undo vpn-instance to restore the default.

Syntax

vpn-instance vpn-instance-name

undo vpn-instance

Default

A SNAT global policy belongs to the public network.

Views

SNAT global policy view

Predefined user roles

network-admin

Parameters

vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters.

Examples

# Specify VPN instance vpn1 for SNAT global policy sn1.

<Sysname> system-view

[Sysname] loadbalance snat-global-policy sn1

[Sysname-lb-snat-gp-sn1] vpn-instance vpn1

vpn-instance (transparent DNS proxy view)

Use vpn-instance to specify a VPN instance for a transparent DNS proxy.

Use undo vpn-instance to restore the default.

Syntax

vpn-instance vpn-instance-name

undo vpn-instance

Default

A transparent DNS proxy belongs to the public network.

Views

Transparent DNS proxy view

Predefined user roles

network-admin

Parameters

vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters.

Examples

# Specify VPN instance vpn1 for transparent DNS proxy dns-proxy1.

<Sysname> system-view

[Sysname] loadbalance dns-proxy dns-proxy1

[Sysname-lb-dp-udp-dns-proxy1] vpn-instance vpn1

vpn-instance (virtual server view)

Use vpn-instance to specify a VPN instance for a virtual server.

Use undo vpn-instance to restore the default.

Syntax

vpn-instance vpn-instance-name

undo vpn-instance

Default

A virtual server belongs to the public network.

Views

Virtual server view

Predefined user roles

network-admin

Parameters

vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters.

Examples

# Specify VPN instance vpn1 for the IP-type virtual server vs3.

<Sysname>system-view

[Sysname] virtual-server vs3 type ip

[Sysname-vs-ip-vs3] vpn-instance vpn1

vrrp vrid

Use vrrp vrid to bind a VRRP group to a virtual server.

Use undo vrrp vrid to unbind a VRRP group from a virtual server.

Syntax

vrrp vrid virtual-router-id interface interface-type interface-number

undo vrrp

Default

No VRRP group is bound to a virtual server.

Views

Virtual server view

Predefined user roles

network-admin

Parameters

virtual-router-id: Specifies a VRRP group by its virtual router ID in the range of 1 to 255.

interface-type interface-number: Specifies the interface on which the VRRP group was created.

Usage guidelines

In a VRRP hot backup system, execute this command if you configure server load balancing on the primary device in a remote backup group to make sure the return packets are processed on the same master device. For more information about remote backup groups, see RBM in High Availability Configuration Guide.

Multiple virtual servers bound to different VRRP groups cannot use the same SNAT address pool.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Bind VRRP group 1 to TCP virtual server vs.

<Sysname> system-view

[Sysname] virtual-server vs type tcp

[Sysname-vs-tcp-vs] vrrp vrid 1 interface gigabitethernet 1/0

Related commands

virtual-server

vrrp vrid (High Availability Command Reference)

weight (DNS server pool member view)

Use weight to set the weight of a DNS server pool member.

Use undo weight to restore the default.

Syntax

weight weight-value

undo weight

Default

The weight of a DNS server pool member is 100.

Views

DNS server pool member view

Predefined user roles

network-admin

Parameters

weight-value: Specifies the weight in the range of 1 to 255. A greater value means a higher priority in scheduling.

Usage guidelines

The weight configured in this command is used in the weighted round-robin algorithm.

Examples

# Set the weight of the DNS server pool member ds1 to 150.

<Sysname> system-view

[Sysname] loadbalance dns-server-pool dsp1

[Sysname-lb-dspool-dsp1] dns-server ds1 port 10

[Sysname-lb-dspool-dsp1-#member#-ds1-port-10] weight 150

weight (DNS server view)

Use weight to set the weight of a DNS server to be used by the weighted round robin algorithm and bandwidth algorithm.

Use undo weight to restore the default.

Syntax

weight weight-value

undo weight

Default

The weight of a DNS server is 100.

Views

DNS server view

Predefined user roles

network-admin

Parameters

weight-value: Specifies the weight in the range of 1 to 255. A greater value means a higher priority in scheduling.

Examples

# Set the weight of the DNS server ds1 to 150.

<Sysname> system-view

[Sysname] loadbalance dns-server ds1

[Sysname-lb-ds-ds1] weight 150

weight (link group member view)

Use weight to set the weight of a link group member.

Use undo weight to restore the default.

Syntax

weight weight-value

undo weight

Default

The weight of a link group member is 100.

Views

Link group member view

Predefined user roles

network-admin

Parameters

weight-value: Specifies the weight in the range of 1 to 255. A greater value means a higher priority in scheduling.

Usage guidelines

The weight configured in this command is used in the weighted least-connection algorithm and weighted round-robin algorithm.

Examples

# Set the weight of the link group member lk1 to 150.

<Sysname> system-view

[Sysname] loadbalance link-group lg

[Sysname-lb-lgroup-lg] link lk1

[Sysname-lb-lgroup-lg-#member#-lk1] weight 150

weight (link view)

Use weight to set the weight of a link to be used by the weighted round robin and weighted least connection algorithms.

Use undo weight to restore the default.

Syntax

weight weight-value

undo weight

Default

The weight of a link is 100.

Views

Link view

Predefined user roles

network-admin

Parameters

weight-value: Specifies the weight in the range of 1 to 255. For the weighted round robin or weighted least connection algorithm, a greater value means a higher priority to be referenced.

Examples

# Set the weight of the link lk1 to 150.

<Sysname> system-view

[Sysname] loadbalance link lk1

[Sysname-lb-link-lk1] weight 150

weight (real server view)

Use weight to set the weight of a real server to be used by the weighted round robin and weighted least connection algorithms.

Use undo weight to restore the default.

Syntax

weight weight-value

undo weight

Default

The weight of a real server is 100.

Views

Real server view

Predefined user roles

network-admin

Parameters

weight-value: Specifies the weight in the range of 1 to 255. For the weighted round robin or weighted least connection algorithm, a greater value means a higher priority to be referenced.

Examples

# Set the weight of the real server rs to 150.

<Sysname> system-view

[Sysname] real-server rs

[Sysname-rserver-rs] weight 150

weight (server farm member view)

Use weight to set the weight of a server farm member.

Use undo weight to restore the default.

Syntax

weight weight-value

undo weight

Default

The weight of a server farm member is 100.

Views

Server farm member view

Predefined user roles

network-admin

Parameters

weight-value: Specifies the weight in the range of 1 to 255. A greater value means a higher priority in scheduling.

Usage guidelines

The weight configured in this command is used in the weighted least-connection algorithm and weighted round-robin algorithm.

Examples

# Set the weight of the server farm member rs1 to 150.

<Sysname> system-view

[Sysname] server-farm sf

[Sysname-sfarm-sf] real-server rs1 port 80

[Sysname-sfarm-sf-#member#-rs1-port-80] weight 150

whois-mntner

Use whois-mntner to specify a whois maintainer object for an ISP.

Use undo whois-mntner to delete a whois maintainer object for an ISP.

Syntax

whois-mntner mntner-name

undo whois-mntner mntner-name

Default

No whois maintainer object is specified for an ISP.

Views

ISP view

Predefined user roles

network-admin

Parameters

mntner-name: Specify a whois maintainer object by its name, a case-sensitive string of 1 to 63 characters.

Usage guidelines

This command specifies the geographical area where ISP address information is to be updated by the whois server.

You can specify a maximum of 10 whois maintainer objects for an ISP.

A whois maintainer object is globally unique.

Examples

# Specify whois maintainer object MAINT-CHINANET for ISP isp1.

<Sysname> system-view

[Sysname] loadbalance isp name isp1

[Sysname-lbisp-isp1] whois-mntner MAINT-CHINANET

window-size

Use window-size to set the window size used for compression.

Use undo window-size to restore the default.

Syntax

window-size size

undo window-size

Default

The window size used for compression is 16 KB.

Views

HTTP-compression parameter profile view

Predefined user roles

network-admin

Parameters

size: Specifies the window size in KB used for compression. The value can only be 1, 2, 4, 8, 16, or 32.

Examples

# Create the HTTP-compression parameter profile pa1, and set the window size used for compression to 32 KB.

<Sysname> system-view

[Sysname] parameter-profile pa1 type http-compress

[Sysname-para-http-compression-pa1] window-size 32

zero-window threshold

Use zero-window threshold to set the percentage threshold of zero-window packets for a TCP zero-window LB probe template.

Use undo zero-window threshold to restore the default.

Syntax

zero-window threshold percentage

undo packet-zero-window

Default

The percentage threshold of zero-window packets  is 40%.

Views

TCP zero-window LB probe template view

Predefined user roles

network-admin

Parameters

percentage: Specifies the percentage threshold of zero-window packets, in the range of 1 to 100.

Usage guidelines

When the percentage of zero-window packets sent by a real server reaches the threshold, the protection action specified in the protect-action command is taken.

Examples

# In TCP zero-window LB probe template zerotplt, set the percentage threshold of zero-window packets to 20%.

<Sysname>system-view

[Sysname] loadbalance probe-template tcp-zero-window zerotplt

[Sysname-lbpt-tcp-zwnd-zerotplt] zero-window threshold 20

Related commands

protect-action

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网