8-78
User
Guide

for

the

Cisco

Application

Networking

Manager

5.2
OL-26572-01
Chapter
8






Configuring

Real

Servers

and

Server

Farms
Configuring
Secure

KAL-AP
Assumptions
This
topic

assumes

the

following:


You
have
created
a

vi

rtual
context
that

specifies

t

he
Keepalive
Appliance

Prot

ocol

over

UDP.


You
have

enabled

KAL-AP

on

the

ACE

by

configuring

a

management

class

map

and

policy

map,
and
apply

it

to

the

appropriate

interface.
Procedure
Step
1
Choose
Config
>

Devices

>

context

>

Load

Balancing

>

Secure

KAL-AP.
The
Secure

KAL-AP

table

appears.
Step
2
In
the

Secure

KAL-AP

table,

click
Add
to

configure

secure

KAL-AP

for

MD5

encryption

of
data.
The
Secure

KAL-AP

configuration

window

appears.
Step
3
In
the

IP

Address

field

of

the

Secure

KAL-AP

configuration
window,
enable
secure

KAL-AP

by
configuring
the

VIP

address

for

the

GSS.
Enter
the

IP

address

in

dotted-decimal

notation

(for

example,

192.168.11.1).
Step
4
In
the

Hash
Key
field,
enter
the

MD5
encryption
method
shared
secret

between

the

KAL-AP

device

and
the
ACE.
Enter
the

shared

secret

as

a

case-sensitive

string

with

no

spaces

and

a

maximum

of

31

alphanumeric
characters.
The

ACE

supports

the

following

special

characters

in

a

shared

secret:
,
.

/

=

+

-

^

@

!

%

~

#

$

*

(

)
Step
5
Do
one

of

the

following:


Click
Deploy
Now

to

deploy
this
configuration

on

t

he
ACE

and

save

your

entries

t

o

the
running-configuration
and

startup-configuration

files.

The

ACE

validates

the

secure

KAL-AP
configuration
and

deploys

it.


Click
Cancel
to

exit

this

procedure

without
accepting
your
entries

and

to

return

to

the

Secure
KAL-AP
table.


Click
Next
to

accept

your
entries.
Related
Topics


Creating
Virtual

Cont

exts,

page
6-2


Setting
Match

Conditions

for

Layer

3/Layer

4

Management

Traffic
Class
Maps,
page
14-12