A match rule is processed before cluster settings are processed, and behaves like an if-then
statement: if a client request’s content matches the conditional expression set in the match rule,
then the options and objects specified in the match rule are used. If the expression in the match
rule is not matched by the client request, then the next match rule is processed. If all match rules
defined in the cluster are processed and none of them match the incoming request, then the
objects and options set on the cluster are used to process the request.
The objects that can be selected by match rules include server pools, responders (used when no
servers in a server pool are available), SSL certificates, and certificate revocation lists (CRLs).
Many cluster options can also be specified in a match rule, including persistence settings and load
balancing policy.
Supported operations on all objects are explained in
Command Line Editing
Use the key sequences below to edit the current command line
ctrl–a
ctrl–e
Move the cursor to the beginning of the line
Move the cursor to the end of the line
ctrl–b
ctrl–f
Move the cursor one character to the left
Move the cursor one character to the right
esc–b
esc–f
Move the cursor one word to the left (also left arrow)
Move the cursor one word to the right (also right arrow)
ctrl–h
ctrl-k
esc-d
ctrl-u
Delete the character to the left of the cursor
Delete all characters from the cursor to the end of the line
Delete the word to the right of the cursor
Delete the entire line
ctrl-y
Inserts previously deleted text starting at the cursor
ctrl-t
Transpose the character under the cursor and the character to the left of the cursor
ctrl-l
Redraw the line
ctrl–n
ctrl–p
Display next command from history (also up arrow)
Display last command from history (also down arrow)
Copyright © 2014 Coyote Point Systems, A Subsidiary of Fortinet, Inc.
All Rights Reserved.
147
Equalizer Administration Guide
Summary of Contents for Equalizer GX Series
Page 18: ......
Page 32: ...Overview 32 Copyright 2014 Coyote Point Systems A Subsidiary of Fortinet Inc ...
Page 42: ......
Page 52: ......
Page 64: ......
Page 72: ......
Page 76: ......
Page 228: ......
Page 238: ......
Page 476: ......
Page 492: ......
Page 530: ......
Page 614: ......
Page 626: ......
Page 638: ......
Page 678: ......
Page 732: ...Using SNMP Traps 732 Copyright 2014 Coyote Point Systems A Subsidiary of Fortinet Inc ...
Page 754: ......
Page 790: ......
Page 804: ......
Page 842: ......
Page 866: ......