Installation guide

3-12
Device Manager Guide, Cisco ACE 4700 Series Application Control Engine Appliance
OL-26645-02
Chapter 3 Using DM Guided Setup
Using Application Setup
Note After you define the BVI, write down the client-side VLAN number. You will need this BVI
number in the ACL and virtual server steps (Steps 9 and 11) of this procedure.
c. Click Deploy Now to deploy this configuration on the ACE and save your entries to the
running-configuration and startup-configuration files.
d. To display statistics and status information for a BVI interface, choose the BVI interface from the
BVI Interface table, and then click Details. The show interface bvi, show ipv6 interface bvi, and
show ipv6 neighbors CLI commands appear. Click on the command to display its output. See the
“Displaying BVI Interface Statistics and Status Information” section on page 10-31 for details.
Step 8 If you selected the one-armed topology, click NAT Pools under Application Setup.
The NAT Pools window appears (Config > Guided Setup > Application Setup > NAT Pools). To set
up a one-armed topology, you need a NAT pool to provide the set of IP addresses that ACE can use as
source addresses when sending requests to the real servers.
Note You must configure the NAT pool on the same VLAN interface that you configured in Step 6.
Perform the following actions to create or modify a NAT pool for a VLAN:
a. Click Add to add a new NAT pool entry, or choose an existing NAT pool entry and click Edit to
modify it. The NAT Pool configuration window appears.
b. Configure the NAT pool attributes as described in the “Configuring VLAN Interface NAT Pools and
Displaying NAT Utilization” section on page 10-32.
Note After you define the NAT pool, write down the NAT pool ID. You will specify the NAT pool
ID in the virtual server step (Step 11) of this procedure.
c. Click Deploy Now to deploy this configuration on the ACE and save your entries to the
running-configuration and startup-configuration files.
Step 9 Click ACLs under Application Setup.
The ACLs window appears (Config > Guided Setup > Application Setup > ACLs). An ACL applies
to one or more VLAN interfaces. Each ACL consists of a list of entries, each of which defines a source,
a destination, and whether to permit or deny traffic between those locations.
Perform the following actions to create or modify an ACL:
a. Click Add to add a new ACL entry, or choose an existing ACL entry and click Edit to modify it.
The Access List configuration window appears.
b. Add or edit the required fields as described in the “Configuring Security with ACLs” section on
page 4-58.
c. Click Deploy to save this configuration.
d. To display statistics and status information for an ACL, choose an ACL from the ACLs table, and
then click Details. The show access-list access-list detail CLI command output appears. See the
“Displaying ACL Information and Statistics” section on page 4-69 for details.
Step 10 Click SSL Proxy under Application Setup.
This selection appears only if you specified in Step 3 that the ACE is to use HTTPS when communicating
with either the client or with real servers.