7-43
User
Guide

for

the

Cisco

Application

Networking

Manager

5.2
OL-26572-01
Chapter
7






Configuring

Virtual

Servers
Configuring
Virtual

Servers
Hash
Content
Method
that

indicates

that

the

ACE

is

to

select

the

server

by

using

a

hash

value

based

on

the

specified
content
st

ring

of

the

HTTP

packet

body.
a.
In
the

Begin

Pattern

field,

enter

the

beginning

pattern
of

the

content

string

and

the

pattern

string

to
match
before

hashing.

If

you

do

not

specify

a

beginning

pattern,

the

ACE

starts

parsing

the

HTTP
body
immediate

following

the

offset

byte.

You

cannot

configure

different

beginning

and

ending
patterns
for

different

server

farms

that

are

part

of

the

same

traffic

classification.
Valid
entries

are

unquoted

text

strings

with

no

spa

ces

and

a

maximum

of

255


alphanumeric
characters.
The

ACE

supports

regular

expressions

for

matching

string

expressions.

Ta

b

l

e


14-33
lists
the

supported

characters

that

you

can

use

for


matching

string

expressions.
b.
In
the
End
Pattern
field,
enter

the

pattern

that

marks

the

end

of

hashing.
If
you

do

not

specify

either
a
length

or

an

end

pattern,

the

ACE

continues

to

parse

the

data

until

it

reaches

the

end

of

the

field
or
the

end

of

the

packet,

or

until

it

reaches

the

maximum

body

parse

length.

You

cannot

configure
different
beginning

and

ending

patterns

for


different

server

farms

that

ar

e

part

of

t

he

same

traffic
classification.
Valid
entries

are

unquoted

text

strings

with

no

spa

ces

and

a

maximum

of

255


alphanumeric
characters.
The

ACE

supports

regular

expressions

for

matching

string

expressions.

Ta

b

l

e


14-33
lists
the

supported

characters

that

you

can

use

for


matching

string

expressions.
c.
In
the

Length

(Bytes)

field,

enter

the

length

in

bytes

of

the

portion

of

the

content

(starting

with

the
byte
after

the

offset

value)

that

the

ACE

uses

for

sticking

the

client

to

the

server.

Valid

entries

are
from
1

to

1000

bytes.
The
offset

and

length

can

vary

from

0

to

1000

bytes.

If

the

payload

is

longer

than

the

offset

but
shorter
than

the

offset

plus

the

length

of

the

payload,

the

ACE

sticks

the

connection

based

on

that
portion
of

the

payload

starting

with

the

byte

after

the

offset

value

and

ending

with

the

byte

specified
by
the

offset

pl

us

the

l

ength.

The

total

of

the

offset

and

the

length

cannot

exceed

1000.
Note
You
cannot
specify

both

t

he

l

ength

and

the

end-pattern

opt

ions
for
a

Hash
Content
predictor.
d.
In
the

HTTP

Content

Offset

(Bytes)
field,
enter
the

portion

of
the

content

that

the

ACE

uses

to

stick
the
client

on

a

particular

server

by

indicating

the

bytes

to

ignore

starting

with

the

first

byte

of

the
payload.
Valid

entries

are

from

0

to

999

bytes.

The

default

is

0,

which

indicates

that

the

ACE

does
not
exclude

any

por

tion

of

t

he

content.
Hash
Cookie
Method
that

indicates

that

the

ACE

is

to

select

the

server

by

using

a

hash

value

based

on

the

cookie
name.
In
the

Cookie

Name

field,

enter

a

c

ookie

name

i

n

the

form

of


an

unquoted

text

string

with

no

spa

ces
and
a

maximum

of

64

characters.
Hash
Header
Method
that

indicates

that

the

ACE

is

to

select

the

server

by

using

a

hash

value

based

on

the

header
name.
In
the

Header

Name

field,

choose

the

HTTP

header

to

be

used

for

server

selection

as

follows:


To
specify

an

HTTP

header

that

is

not

one

of

the

standard

HTTP

headers,

click

the

first

radio

button
and
enter

the

HTTP

header

name

in

the

Header

Name

field.

Valid

entries

are

unquoted

text

strings
with
no

spa

ces

and

a

maximum

of

64

c

haracters.


To
specify

one

of

the

standard

HTTP

headers,

click

the

second

radio

button,

and

then
choose
one
of
the

HTTP

headers

from

the

list.
Table
7-14
Predictor
Methods

and

Attributes

(continued)