A match rule is processed before cluster settings are processed, and behaves like an if-then
statement: if a client request’s content matches the conditional expression set in the match rule,
then the options and objects specified in the match rule are used. If the expression in the match
rule is not matched by the client request, then the next match rule is processed. If all match rules
defined in the cluster are processed and none of them match the incoming request, then the
objects and options set on the cluster are used to process the request.
The objects that can be selected by match rules include server pools, responders (used when no
servers in a server pool are available), SSL certificates, and certificate revocation lists (CRLs).
Many cluster options can also be specified in a match rule, including persistence settings and load
balancing policy.
Supported operations on all objects are explained in
Command Line Editing
Use the key sequences below to edit the current command line
ctrl–a
ctrl–e
Move the cursor to the beginning of the line
Move the cursor to the end of the line
ctrl–b
ctrl–f
Move the cursor one character to the left
Move the cursor one character to the right
esc–b
esc–f
Move the cursor one word to the left (also left arrow)
Move the cursor one word to the right (also right arrow)
ctrl–h
ctrl-k
esc-d
ctrl-u
Delete the character to the left of the cursor
Delete all characters from the cursor to the end of the line
Delete the word to the right of the cursor
Delete the entire line
ctrl-y
Inserts previously deleted text starting at the cursor
ctrl-t
Transpose the character under the cursor and the character to the left of the cursor
ctrl-l
Redraw the line
ctrl–n
ctrl–p
Display next command from history (also up arrow)
Display last command from history (also down arrow)
Copyright © 2014 Coyote Point Systems, A Subsidiary of Fortinet, Inc.
All Rights Reserved.
147
Equalizer Administration Guide
Содержание Equalizer GX Series
Страница 18: ......
Страница 32: ...Overview 32 Copyright 2014 Coyote Point Systems A Subsidiary of Fortinet Inc ...
Страница 42: ......
Страница 52: ......
Страница 64: ......
Страница 72: ......
Страница 76: ......
Страница 123: ...Copyright 2014 Coyote Point Systems A Subsidiary of Fortinet Inc All Rights Reserved 123 Equalizer Administration Guide ...
Страница 228: ......
Страница 238: ......
Страница 411: ...Copyright 2014 Coyote Point Systems A Subsidiary of Fortinet Inc All Rights Reserved 411 Equalizer Administration Guide ...
Страница 459: ...Copyright 2014 Coyote Point Systems A Subsidiary of Fortinet Inc All Rights Reserved 459 Equalizer Administration Guide ...
Страница 476: ......
Страница 492: ......
Страница 530: ......
Страница 614: ......
Страница 626: ......
Страница 638: ......
Страница 678: ......
Страница 732: ...Using SNMP Traps 732 Copyright 2014 Coyote Point Systems A Subsidiary of Fortinet Inc ...
Страница 754: ......
Страница 790: ......
Страница 804: ......
Страница 842: ......
Страница 847: ...Copyright 2014 Coyote Point Systems A Subsidiary of Fortinet Inc All Rights Reserved 847 Equalizer Administration Guide ...
Страница 866: ......