8-77
User
Guide

for

the

Cisco

Application

Networking

Manager

5.2
OL-26572-01
Chapter
8






Configuring

Real

Servers

and

Server

Farms
Configuring
Secure

KAL-AP


Click
Next
t

o
deploy
your

entries

and

to
add
another

i

tem

to

t

he

SNMP

OID

table.
Related
Topics


Configuring
Health
Monitoring
for
Real

Servers,

page
8-51


SNMP
Probe

Attributes,
page
8-69


Displaying
Health

Monitoring

Statistics

and
Status
Information,

page
8-77
Displaying
Health

Monitoring

Statistics

and

Status

Information
You
can

display

statistics

and

status

information

for

a

particular

probe.
Procedure
Step
1
Choose
Config
>

Devices

>

context

>

Load

Balancing

>

Health

Monitoring.
The
Health

Monitoring

t

able

ap

pears.
Step
2
In
the

Health

Monitoring

table,

choose

a

probe

from

the

Health

Monitoring
table,
and
click
Details.
The
show

probe

name

detail

CLI

command

out

put

appears.

For

details

on

the

di

splayed

out

put

fields,
see
th

e

Cisco

ACE

Module

Server

Load-Balancing

Configuration

Guide

or

t

he

Cisco

ACE

4700

Series
Appliance
Server

Load-Balancing

Configuration

Guide,

Chapter

4,

Configuring

Health

Monitoring.
Note
For
a

DNS

pr

obe,

the

detailed

probe

results

always

identify

a

de

fault

DNS

domain
of
www.Cisco.com.
Step
3
Click
Update
Details

to

refresh

the

output
for
the
show
probe

name

detail

CLI

command.
Step
4
Click
Close
to

return

to

the

Health

Monitoring

table.
Related
Topics


Configuring
Health
Monitoring
for
Real

Servers,

page
8-51
Configuring
Secure

KAL-AP
You
can

configure

a

secure

keepalive-appliance

protocol

(KAL-AP)

associated

with

a

virtual

context.

A
KAL-AP
on

the

ACE

enables

communication

between

the

ACE

and

a

Global

Site

Selector

(GSS),

which
sends
KAL-AP

requests

to

report

the

ser

ver

states

and

loads

for

gl

obal-server

load-balancing

(GSLB)
decisions.
The

ACE

uses

KAL-AP

through

a

UDP

connection

to

calculate

weights

and

provide
information
for

server

availability

to

the

KAL-AP

device.

The

ACE

acts

as

a

server

and

listens

for
KAL-AP
requests.

When

KAL-AP

is

initialized

on

the

ACE,

the

ACE

listens

on

the

standard

5002

port
for
any

KAL-AP

requests.

You

cannot

configure

any

other

por

t.
The
ACE

supports

secure

KAL-AP

for

MD5

encryption

of

data

between

it

and

the

GSS.

For

encryption,
you
must

configure

a

shared

secret

as

a

key

for

authentication

between

the

GSS

and

the

ACE

context.