Configuring Acls Using Http Methods To Redirect Requests - Cisco Nexus 9000 Series Configuration Manual

Nx-os security configuration guide, release 9.x
Hide thumbs Also See for Nexus 9000 Series:
Table of Contents

Configuring ACLs Using HTTP Methods to Redirect Requests

Command or Action
Step 9
logging ip access-list cache entries number-of-flows
Example:
switch(config)# logging ip access-list cache
entries 8001
Step 10
logging ip access-list cache threshold threshold
Example:
switch(config)# logging ip access-list cache
threshold 490
Step 11
logging ip access-list detailed
Example:
switch(config)# logging ip access-list detailed
Step 12
hardware rate-limiter access-list-log packets
Example:
switch(config)# hardware rate-limiter
access-list-log 200
Step 13
acllog match-log-level severity-level
Example:
switch(config)# acllog match-log-level 5
Step 14
(Optional) show logging ip access-list cache [detail]
Example:
switch(config)# show logging ip access-list cache
Configuring ACLs Using HTTP Methods to Redirect Requests
You can configure ACLs to intercept and redirect specific HTTP methods to a server that is connected to a
specific port.
The following HTTP methods can be redirected:
• connect
• delete
• get
• head
• post
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
264
Purpose
Specifies the maximum number of flows to be monitored
by the ACL logging process. The default value is 8000.
The range of values supported is from 0 to 1048576.
If the specified number of packets is logged before the
expiry of the alert interval, the system generates a syslog
message.
Enables the following information to be displayed in the
output of the show logging ip access-list cache command:
the access control entry (ACE) sequence number, ACE
action, ACL name, ACL direction, ACL filter type, and
ACL applied interface.
Configures rate limits in packets per second for packets
copied to the supervisor module for ACL logging. The
range is from 0 to 30000.
Specifies the minimum severity level to log ACL matches.
The default is 6 (informational). The range is from 0
(emergency) to 7 (debugging).
Displays information on the active logged flows, such as
source IP and destination IP addresses, source port and
destination port information, source interfaces, and so on.
If you entered the logging ip access-list detailed
command, the output also includes the following
information: the access control entry (ACE) sequence
number, ACE action, ACL name, ACL direction, ACL
filter type, and ACL applied interface.
Configuring IP ACLs

Hide quick links:

Table of Contents
loading

Table of Contents