Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Bleed traffic off a Cisco ACE

Posted on 2010-09-03
1
Medium Priority
?
872 Views
Last Modified: 2012-05-10
My hosting provider, doesn't know how to bleed traffic on their load balancer.  Very sad.

Can someone send me a URL or the commands that show how to disable a server on the Cisco ACE, so existing connections are maintained, but new connections are sent to another server?

I haven't touched a Cisco load balancer in years.  I'm an F5 BigIP guy.
0
Comment
Question by:magnusthorne
1 Comment
 
LVL 6

Accepted Solution

by:
joopv earned 2000 total points
ID: 33602278
That would be this document (for the latest version of ACE):

http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/vA2_3_0/configuration/slb/guide/slbgd.pdf

Page 2-16:
Gracefully Shutting Down a Server
You can shut down a real server gracefully by using the no inservice command in
either real server host or real server redirect configuration mode. This command
causes the ACE to reset all non-TCP connections to the server. For TCP
connections, existing flows are allowed to complete before the ACE takes the real
server out of service. No new connections are allowed.
Note The ACE resets all Secure Sockets Layer (SSL) connections to a particular real
server when you enter the no inservice command for that server.
The syntax of this command is as follows:
no inservice
For example, to gracefully shut down a real server (for example, for maintenance
or software upgrades), enter:
host1/Admin(config-rserver-host)# no inservice
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, we’ll look at how to deploy ProxySQL.
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

783 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question