{"info":{"_postman_id":"22e52c59-3fd4-4728-bb6f-293acd270316","name":"LoadMaster RESTful APIv1 Documentation","description":"<html><head></head><body><p>This document describes the RESTful API Interface to the LoadMaster. It describes in detail how to configure the various features of the LoadMaster using the RESTful API.</p>\n<p>In LoadMaster firmware version 7.2.50, functionality was added which allows you to specify API requests as a POST of a JSON object and receive a JSON-based API payload response. POST is not required for input data - the GET method can also be used for this.</p>\n<p>For example requests and responses using the JSON-based format, refer to the following documentation: <a href=\"https://loadmasterapiv2.docs.progress.com/\">https://loadmasterapiv2.docs.progress.com</a></p>\n<p>This document provides example requests in cURL format and example responses in XML format.</p>\n<p>This document does not explain each of the features or options in detail. For further information, refer to the relevant document on <a href=\"https://docs.progress.com\">https://docs.progress.com</a></p>\n<h2 id=\"intended-audience\">Intended Audience</h2>\n<p>This document is intended to help anyone who wants to configure the LoadMaster using the RESTful API.</p>\n<h2 id=\"setting-collection-level-variables\">Setting Collection-Level Variables</h2>\n<p>Clicking <strong>Run in Postman</strong> in the top-right of the LoadMaster API documentation allows you to import this collection into your Postman instance.</p>\n<p>A number of collection-level variables are used throughout the commands and you can set the values of these variables by following these steps in Postman:</p>\n<ol>\n<li><p>Click <strong>Collections</strong>.</p>\n</li>\n<li><p>Click the <strong>LoadMaster RESTful API Documentation</strong> collection.</p>\n</li>\n<li><p>Click <strong>Variables</strong>.</p>\n</li>\n<li><p>Set the value of the variable.</p>\n</li>\n</ol>\n<p>After setting the value of the relevant variables, you should be able to run the commands in the collection successfully against your LoadMaster.</p>\n<h1 id=\"the-restful-api-interface\">The RESTful API Interface</h1>\n<p>This document describes an interface designed to allow remote applications access to the LoadMaster in a simple and consistent manner. The interface is a REST-like interface. REST (Representational State Transfer) is a style of software architecture for distributed systems and is one of the predominant web service design models</p>\n<h2 id=\"how-the-loadmaster-restful-api-works\">How the LoadMaster RESTful API Works</h2>\n<p>The LoadMaster RESTful API works in a RESTful manner, by allowing a user or application to pass HTTPS requests to the LoadMaster. The LoadMaster answers the request with an XML formatted response. The HTTPS request is in the format:</p>\n<pre class=\"click-to-expand-wrapper is-snippet-wrapper\"><code>https://&lt;LoadMaster IP Address&gt;/access/&lt;command&gt;?&lt;parameter1&gt;=value&amp;&lt;parameter2&gt;=value\n\n</code></pre><p>You can also run the commands using cURL. If you are using cURL, you may need to surround the URL in double quotes for it to work, for example:</p>\n<pre class=\"click-to-expand-wrapper is-snippet-wrapper\"><code>curl -k \"https://bal:&lt;Password&gt;@&lt;LoadMasterIPAddress&gt;/access/set?param=backupmethod&amp;value=sftp\"\n\n</code></pre><p>When you run commands using cURL, you may also need to include <strong>-k</strong> or <strong>--insecure</strong> if you are using the self-signed LoadMaster certificate.</p>\n<p>The basic interface is a simple HTTPS GET operation where the command is specified by the URL. If any parameters are required by the operation, they are passed as QUERY parameters.</p>\n<blockquote>\n<p>When using the API there is a maximum URL length of 1K. If you want to set a value which is longer than this, use a POST operation instead. </p>\n</blockquote>\n<p>The following points should be noted regarding the formatting of the HTTPS request:</p>\n<ul>\n<li><p>Only one command can be given at a time.</p>\n</li>\n<li><p>The '?' character signifies the end of a command.</p>\n</li>\n<li><p>The '&amp;' character signifies the end of a parameter/value pair.</p>\n</li>\n<li><p>If there are any unnecessary parameter/value pairs, they will be ignored.</p>\n</li>\n<li><p>The order in which the parameter/value pairs appear does not matter</p>\n</li>\n<li><p>There cannot be any spaces within the query. Although some applications, like browsers, would convert spaces to HTML code prior to sending the string to the LoadMaster.</p>\n</li>\n<li><p>Multiple parameters can be modified within the same command.</p>\n</li>\n</ul>\n<p>For example, the following query will return the maximum cache size from a LoadMaster with the IP address of 10.11.0.20.</p>\n<pre class=\"click-to-expand-wrapper is-snippet-wrapper\"><code>https://InsertIPAddress/access/get?param=cachesize\n\n</code></pre><p>The response to the query, from the LoadMaster, is returned in an easily decoded XML format, for example:</p>\n<pre class=\"click-to-expand-wrapper is-snippet-wrapper\"><code>&lt;Response stat=\"200\" code=\"ok\"&gt;\n    &lt;Success&gt;\n        &lt;Data&gt;\n            &lt;cachesize&gt;\n            100\n            &lt;/cachesize&gt;\n        &lt;/Data&gt;\n    &lt;/Success&gt;\n&lt;/Response&gt;\n\n</code></pre><blockquote>\n<p>Not all commands in this document are allowed on all LoadMasters. Some<br>functions are only available for certain LoadMaster licenses. </p>\n</blockquote>\n<blockquote>\n<p>The connection drops if more than 30 calls are performed in less than 3 seconds over all API interfaces. </p>\n</blockquote>\n<h2 id=\"security\">Security</h2>\n<p>An application can only access the LoadMaster using the standard IP address. Security is provided in exactly the same way as over the standard User Interface (UI), that is, valid credentials must be passed on every access when using Basic Authentication.</p>\n<p>The user <strong>bal</strong> naturally has access to all functionality; other users have access to the subsystems that have been assigned to them using the LoadMaster permissions.</p>\n<p>Currently there is no way to modify user permissions using this interface.</p>\n<p>Depending on security settings and whether the browser has ever connected to the WUI before adding login information may be required. In this case instead of a standard command format such as:</p>\n<pre class=\"click-to-expand-wrapper is-snippet-wrapper\"><code>https://&lt;LoadMasterIPAddress&gt;/access/&lt;command&gt;?params\n\n</code></pre><p>the login information would need to be included, for example:</p>\n<pre class=\"click-to-expand-wrapper is-snippet-wrapper\"><code>https://&lt;UserName&gt;:&lt;UserPassword&gt;@&lt;LoadMasterIPaddress&gt;/access/&lt;command&gt;?params\n\n</code></pre><p>You can also use certificate-based authentication or API keys.</p>\n<p>For instructions on how to use certificate based authentication, refer to the <strong>Configure Certificate-Based Authentication</strong> section.</p>\n<p>For instructions on how to use API keys, refer to the <a href=\"#a5982ecb-1e3a-4b1b-95b0-25a351a26c21\">How to Use API Keys</a> section.</p>\n<h3 id=\"configure-certificate-based-authentication\">Configure Certificate-Based Authentication</h3>\n<p>Follow the steps in the sections below to configure certificate-based authentication.</p>\n<p>Certificate-based authentication is not supported in version 2 of the API (which is currently in beta).</p>\n<p>Certificate-based authentication will be deprecated for version 1 at some point in the future. Instead, use API keys. For further details, refer to the <a href=\"#a5982ecb-1e3a-4b1b-95b0-25a351a26c21\">How to Use API Keys </a> section.</p>\n<h4 id=\"enable-session-management\">Enable Session Management</h4>\n<p>You must enable <strong>Session Management</strong> before you can enable client certificate authentication. To enable Session Management, follow the steps below:</p>\n<ol>\n<li><p>In the main menu of the LoadMaster WUI, go to <strong>Certificates &amp; Security &gt; Admin WUI Access</strong>.</p>\n</li>\n<li><p>Select the <strong>Enable Session Management</strong> check box.<br> <strong>Note:</strong> After this check box is selected, you must log in to continue using the LoadMaster.</p>\n</li>\n<li><p>Configure any other settings as needed.</p>\n</li>\n</ol>\n<h4 id=\"create-a-user-if-needed\">Create a User (If Needed)</h4>\n<p>It is not possible to use certificate-based authentication with the <strong>bal</strong> user. However, you can create a non-<strong>bal</strong> user and grant it <strong>All Permissions</strong>, or whatever permissions you want. If you do not already have another user created, you can add one by following these steps:</p>\n<ol>\n<li><p>In the main menu of the LoadMaster WUI, expand <strong>System Configuration &gt; System Administration</strong> and click <strong>User Management</strong>.</p>\n</li>\n<li><p>At the bottom of the screen, enter a username in the <strong>User</strong> text box.</p>\n</li>\n<li><p>At this point, you can either set a <strong>Password</strong> for the new user, or select the <strong>No Local Password</strong> check box.<br> <strong>Note:</strong> For further information on the <strong>No Local Password</strong> option and on certificate authentication in general, refer to the <a href=\"https://docs.progress.com/bundle/loadmaster-feature-description-user-management-ga\">User Management, Feature Description</a>.</p>\n</li>\n<li><p>Click <strong>Add User</strong>.</p>\n</li>\n</ol>\n<h4 id=\"enable-client-certificate-authentication-on-the-loadmaster\">Enable Client Certificate Authentication on the LoadMaster</h4>\n<p>A number of different login methods are available to enable. For steps on how to set the <strong>Admin Login Method</strong>, along with a description of each of the available methods, refer to the steps below:</p>\n<ol>\n<li><p>In the main menu of the LoadMaster WUI, expand <strong>Certificates &amp; Security</strong> and click <strong>Remote Access</strong>.</p>\n</li>\n<li><p>Select the relevant <strong>Admin Login Method</strong>.</p>\n</li>\n</ol>\n<blockquote>\n<p>The <strong>Pre-Auth Click Through Banner</strong> in the <strong>Admin WUI Access</strong> screen must be set for all <strong>Admin Login Method</strong> options to be made available. </p>\n</blockquote>\n<blockquote>\n<p>Using local certificates only works with API authentication. Because of this, it might be best to select the <strong>Password or Client certificate</strong> option. This enables API access using the client certificate and WUI access using the username/password. </p>\n</blockquote>\n<p>The following login methods are available:</p>\n<ul>\n<li><p><strong>Password Only Access (default):</strong> This option provides access using the username and password only – there is no access using client certificates.</p>\n</li>\n<li><p><strong>Password or Client certificate:</strong> You can log in either using the username/password or using a valid client certificate. If a valid client certificate is in place, the username and password is not required. The LoadMaster asks the client for a certificate. If a client certificate is available, the LoadMaster checks for a match. The LoadMaster checks if the certificate matches one of the local certificates, or checks if the Subject Alternative Name (SAN) or Common Name (CN) of the certificate is a match. The SAN is used in preference to the CN when performing a match. If there is a match, you are granted access to the LoadMaster. This works both using the API and user interface. An invalid certificate will not allow access.If no client certificate is supplied, the LoadMaster expects that a username and password is supplied (for the API) or will request a password using the standard WUI login page</p>\n</li>\n<li><p><strong>Client certificate required:</strong> Access is only allowed with the use of a client certificate. It is not possible to log in using the username and password. SSH access is not affected by this (only the <strong>bal</strong> user can log in using SSH).</p>\n</li>\n<li><p><strong>Client certificate required (Verify via OCSP):</strong> This is the same as the <strong>Client certificate required</strong> option, but the client certificate is verified using an OCSP service. You must configure the OCSP<br>  Server Settings for this to work. For further information on the OCSP Server Settings, refer to the <a href=\"https://docs.progress.com/bundle/loadmaster-feature-description-ssl-accelerated-services-ga\">SSL Accelerated Services, Feature Description</a>.</p>\n</li>\n</ul>\n<p>Some points to note regarding the client certificate methods are below:</p>\n<ul>\n<li><p>The <strong>bal</strong> user does not have a client certificate. Therefore, it is not possible to log into the LoadMaster as <strong>bal</strong> using the <strong>Client certificate required</strong> methods. However, a non-<strong>bal</strong> user can be created and granted <strong>All Permissions</strong>. This will allow the same functionality as the <strong>bal</strong> user.</p>\n</li>\n<li><p>There is no log out option for users that are logged in to the WUI using client certificates, as it is not possible to log out (if the user did log out the next access would automatically log them back in again). The session terminates when the page is closed, or when the browser is restarted.</p>\n</li>\n</ul>\n<h4 id=\"generate-and-download-the-client-certificate\">Generate and Download the Client Certificate</h4>\n<p>To generate a local certificate, follow the steps below:</p>\n<blockquote>\n<p>Users with <strong>User Administration</strong> permissions are able to manage local certificates for themselves and other users. </p>\n</blockquote>\n<ol>\n<li><p>In the main menu of the LoadMaster WUI, navigate to <strong>System Configuration &gt; System Administration &gt; User Management</strong>.</p>\n</li>\n<li><p>Click <strong>Modify</strong> on the relevant user.</p>\n</li>\n<li><p>Enter a <strong>Passphrase</strong> and click <strong>Generate</strong>.<br> <strong>Note:</strong> Entering a passphrase is optional. If a passphrase is entered, it is used to encrypt the private key.</p>\n</li>\n<li><p>Click <strong>OK</strong> to the pop-up message that appears.</p>\n</li>\n<li><p>Click <strong>Download</strong>.</p>\n</li>\n</ol>\n<p>You can also regenerate from this screen.</p>\n<h4 id=\"specify-the-certificate-details-in-the-api\">Specify the Certificate Details in the API</h4>\n<p>After configuring all of the options as outlined in the above sections, you must specify the details of the certificate to run the API commands successfully. You must also run the command as a cURL command, for example:</p>\n<pre class=\"click-to-expand-wrapper is-snippet-wrapper\"><code>curl -k -E &lt;PathToCertificateFile&gt;/&lt;CertificateFilename&gt;.pem https://InsertIPAddress/access/get?param=version\n\n</code></pre><h4 id=\"create-a-pfx-file-if-running-commands-using-a-web-browser\">Create a PFX File (If Running Commands using a Web Browser)</h4>\n<p>If you are running the RESTful APIs from the command line – you can use the PEM file, as indicated in the <strong>Specify the Certificate Details in the API</strong> section. If you want to run RESTful API commands using a web browser, you need to create a PFX file and import that into the browser.</p>\n<p>You can convert the .pem file to .pfx any way you like. For the purposes of this document, we have provided steps on how to do it using OpenSSL. If you are using Windows, you may need to install OpenSSL to run these steps.</p>\n<p>To create a .pfx file using, follow the steps below:</p>\n<ol>\n<li><p>Open the .pem certificate.</p>\n</li>\n<li><p>Copy from the start of the <strong>-----BEGIN CERTIFICATE-----</strong> section to the end of the <strong>-----END CERTIFICATE-----</strong> section.</p>\n</li>\n<li><p>Paste this text into a new file.</p>\n</li>\n<li><p>Save the file as <strong>.cer</strong>.</p>\n</li>\n<li><p>Go to the .pem certificate file again.</p>\n</li>\n<li><p>Copy from the start of the <strong>-----BEGIN RSA PRIVATE KEY-----</strong> section to the end of the <strong>-----END RSA PRIVATE KEY-----</strong> section.</p>\n</li>\n<li><p>Paste this text into a new file.</p>\n</li>\n<li><p>Save the file as <strong>.key</strong>.</p>\n</li>\n<li><p>Use the <strong>openssl</strong> command to create the .pfx file:<br> <strong>openssl pkcs12 -export -out .pfx -inkey .key -in .cer</strong></p>\n</li>\n<li><p>Import the certificate to the web browser.</p>\n</li>\n</ol>\n<h3 id=\"api-keys\">API Keys</h3>\n<p>When running API commands, you can authenticate using an API key. An API key is a unique identifier used to authenticate a user.</p>\n<p>Refer to the following section for details on how to list, generate, and delete API keys:</p>\n<p><a href=\"#a5982ecb-1e3a-4b1b-95b0-25a351a26c21\">How to Use API Keys</a></p>\n<p>When you have an API key, you can perform any command as normal, but you no longer need the username or password.</p>\n<h2 id=\"enabling-the-loadmaster-api-interface\">Enabling the LoadMaster API Interface</h2>\n<p>The API interface is enabled or disabled using the LoadMaster UI. By default the interface is disabled.</p>\n<p>To enable the RESTful API interface complete the following steps:</p>\n<ol>\n<li><p>Select the <strong>Certificates &amp; Security &gt; Remote Access</strong> menu option.</p>\n</li>\n<li><p>Select the <strong>Enable API Interface</strong> check box.</p>\n</li>\n</ol>\n<h2 id=\"enable-session-management-1\">Enable Session Management</h2>\n<p>Session management must be enabled on the LoadMaster to use the JSON-based input and output. To enable session management, follow these steps in the LoadMaster UI:</p>\n<ol>\n<li><p>Go to <strong>Certificates &amp; Security &gt; Admin WUI Access</strong>.</p>\n</li>\n<li><p>Select the <strong>Enable Session Management</strong> check box.</p>\n</li>\n</ol>\n<h3 id=\"disable-require-basic-authentication\">Disable Require Basic Authentication</h3>\n<p>The <strong>Require Basic Authentication</strong> check box must be disabled on the LoadMaster to use the JSON-based input and output. To disable this option, follow these steps in the LoadMaster UI:</p>\n<ol>\n<li><p>Go to <strong>Certificates &amp; Security &gt; Admin WUI Access</strong>.</p>\n</li>\n<li><p>Deselect the <strong>Require Basic Authentication</strong> check box.</p>\n</li>\n</ol>\n<h2 id=\"error-reports\">Error Reports</h2>\n<p>If an error occurs, for example where a request is missing a required parameter, an error report is generated, for example:</p>\n<pre class=\"click-to-expand-wrapper is-snippet-wrapper\"><code>&lt;Response stat=\"422\" code=\"fail\"&gt;\n&lt;Error&gt;Incorrect ACME type specified&lt;/Error&gt;\n&lt;/Response&gt;\n\n</code></pre><p>The HTTP status of the request also reflects the response code.</p>\n<h2 id=\"notation\">Notation</h2>\n<p>Throughout the document the parameter types are defined as follows:</p>\n<table><tbody><tr><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Abbreviation</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Typical Values</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Boolean</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Y or N; y or n; 1 or 0;</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Integer</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>-</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>String</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>\"value\"</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Address</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>IP address</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>File</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>F</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Some type of file</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table></body></html>","schema":"https://schema.getpostman.com/json/collection/v2.0.0/collection.json","toc":[{"content":"The RESTful API Interface","slug":"the-restful-api-interface"}],"owner":"1897577","collectionId":"22e52c59-3fd4-4728-bb6f-293acd270316","publishedId":"2sAXqnfjxL","public":true,"customColor":{"top-bar":"FFFFFF","right-sidebar":"303030","highlight":"FF6C37"},"publishDate":"2025-09-29T14:36:33.000Z"},"item":[{"name":"How to Use API Keys","item":[{"name":"Generate an API Key","id":"78fab3bf-fe38-44b1-8bc6-1facbd86b738","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addapikey","description":"<p>A list of API keys is returned. You can have up to 16 API keys per user - if you try to create more, the oldest is deleted.</p>\n<p>When creating an API key using the API, if the credentials you are using to access the API are located in LDAP only (that is, there is no local user defined on the LoadMaster for this login name), the API key will not work until you do the following:</p>\n<ol>\n<li>Log in to the WUI using an existing login with administrative privileges.</li>\n<li>Go to <strong>System Configuration &gt; System Administration &gt; User Management</strong>.</li>\n<li>Create a new user using the same login name that appears in the LDAP credentials. Ensure to enable the <strong>No Local Password</strong> check box.</li>\n</ol>\n<p>After doing the above, the previously obtained key will provide access to the API.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addapikey"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"a4bcbbf1-45b2-4873-b72a-4bf18462d7ec","name":"Generate an API Key","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addapikey"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:27:40 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <apikeys>\n                <key>API key would appear here</key>\n                <key>API key would appear here</key>\n            </apikeys>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"78fab3bf-fe38-44b1-8bc6-1facbd86b738"},{"name":"List the API Keys","id":"a2913bd5-741c-44c1-86e8-eba6ef95ac8e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listapikeys","description":"<p>List the existing API keys already generated.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listapikeys"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"6caf9bc5-7a37-4743-b2d0-f692cf46fc82","name":"List the API Keys","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listapikeys"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:29:10 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <apikeys>\n                <key>API key would appear here</key>\n                <key>API key would appear here</key>\n            </apikeys>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"a2913bd5-741c-44c1-86e8-eba6ef95ac8e"},{"name":"Delete an API Key (Using an API Key to Authenticate)","id":"edbddc10-5e0d-4bea-93e2-df92d4996323","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://InsertLoadMasterIPAddress/access/delapikey?key=InsertAPIKey&apikey=InsertAPIKey","description":"<p>Delete an existing API key. This example assumes that the <b>apikey</b> used to authenticate and the <b>key</b> to delete belong to the same user.</p>\n","urlObject":{"protocol":"https","path":["access","delapikey"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"key","value":"InsertAPIKey"},{"key":"apikey","value":"InsertAPIKey"}],"variable":[]}},"response":[{"id":"1fb618f8-c9c7-4bd2-8e1f-dfb91d6380cb","name":"Delete an API Key (Using an API Key to Authenticate)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://InsertLoadMasterIPAddress/access/delapikey?key=InsertAPIKey&apikey=InsertAPIKey","protocol":"https","host":["InsertLoadMasterIPAddress"],"path":["access","delapikey"],"query":[{"key":"key","value":"InsertAPIKey"},{"key":"apikey","value":"InsertAPIKey"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:36:40 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <apikeys>\n                <key>API key would appear here</key>\n            </apikeys>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"edbddc10-5e0d-4bea-93e2-df92d4996323"},{"name":"Delete an API Key (Using a Username and Password to Authenticate)","id":"6ee9f5df-35f2-4cc9-8530-7f4a629d7dca","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delapikey?key=InsertAPIKey","description":"<p>This example assumes the user whose username is specified owns the API key to delete.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delapikey"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"key","value":"InsertAPIKey"}],"variable":[]}},"response":[{"id":"42b60f39-01e2-435c-959e-76b980386405","name":"Delete an API Key (Using a Username and Password to Authenticate)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delapikey?key=InsertAPIKey","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delapikey"],"query":[{"key":"key","value":"InsertAPIKey"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:37:59 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <apikeys>\n                <key>API key would appear here</key>\n            </apikeys>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"6ee9f5df-35f2-4cc9-8530-7f4a629d7dca"},{"name":"Delete an API Key (Using the bal User with Basic Authentication)","id":"aa9901b3-19c8-4630-af14-319256f97343","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delapikey?key=InsertAPIKey&user=\"ExampleUser\"","description":"<p>The bal user has full administrator permissions and can delete API keys for any user specified.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delapikey"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"key","value":"InsertAPIKey"},{"key":"user","value":"\"ExampleUser\""}],"variable":[]}},"response":[{"id":"7127e46b-78ff-4f31-be1e-86a60e0a3f4c","name":"Delete an API Key (Using the bal User with Basic Authentication)","originalRequest":{"method":"POST","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delapikey?key=InsertAPIKey&user=\"ExampleUser\"","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delapikey"],"query":[{"key":"key","value":"InsertAPIKey"},{"key":"user","value":"\"ExampleUser\""}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:40:10 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <apikeys>\r\n</apikeys>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"aa9901b3-19c8-4630-af14-319256f97343"},{"name":"Delete an API Key (Using the bal User with API Key Authentication)","id":"2d72e977-9722-4c2c-9ba3-818761524c4d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"text"}}},"url":"https://InsertLoadMasterIPAddress/access/delapikey?key=InsertAPIKey&apikey=InsertAPIKey&user=\"ExampleUser\"&apiuser=\"bal\"","description":"<p>This example deletes an API key for the specified user using the admin bal user with API key authentication.</p>\n<p>You can also use a different LoadMaster user to delete API keys for other users (but the user running the command must have the <b>User Administration</b> permission).</p>\n","urlObject":{"protocol":"https","path":["access","delapikey"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"key","value":"InsertAPIKey"},{"key":"apikey","value":"InsertAPIKey"},{"key":"user","value":"\"ExampleUser\""},{"key":"apiuser","value":"\"bal\""}],"variable":[]}},"response":[{"id":"d4a5e9a5-ed40-402a-b96f-62201d1f1d85","name":"Delete an API Key (Using the bal User with API Key Authentication)","originalRequest":{"method":"POST","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://InsertLoadMasterIPAddress/access/delapikey?key=InsertAPIKey&apikey=InsertAPIKey&user=\"ExampleUser\"&apiuser=\"bal\"","protocol":"https","host":["InsertLoadMasterIPAddress"],"path":["access","delapikey"],"query":[{"key":"key","value":"InsertAPIKey"},{"key":"apikey","value":"InsertAPIKey"},{"key":"user","value":"\"ExampleUser\""},{"key":"apiuser","value":"\"bal\""}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:42:11 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <apikeys>\r\n</apikeys>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"2d72e977-9722-4c2c-9ba3-818761524c4d"}],"id":"ba1bad8e-0d91-4faa-a9f6-7aab10daefd4","description":"<p>When running API commands, you can authenticate using an API key. An API key is a unique identifier used to authenticate a user.</p>\n","_postman_id":"ba1bad8e-0d91-4faa-a9f6-7aab10daefd4"},{"name":"Using get and set Commands","item":[{"name":"Example get Command","id":"2de75b9e-4219-4670-9cf3-c0499941221f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=motd","description":"<p>Values of parameters can be obtained using the <b>get</b> command using this format.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","get"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"motd"}],"variable":[]}},"response":[{"id":"ebcbccf2-696e-4798-8762-9e19d09343e0","name":"Example get Command","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=motd","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","get"],"query":[{"key":"param","value":"motd"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 05 Aug 2024 08:19:03 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <motd>Example message of the day</motd>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"2de75b9e-4219-4670-9cf3-c0499941221f"},{"name":"Example set Command","id":"3ed98d8f-9af1-4793-b154-12c8ca025b83","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=motd&value=New example message of the day","description":"<p>Values of parameters can be set using the <b>set</b> command using this format.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","set"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"motd"},{"key":"value","value":"New example message of the day"}],"variable":[]}},"response":[{"id":"590c6fa3-efd3-4961-86bb-a5f9460a667d","name":"Example set Command","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=motd&value=New example message of the day","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","set"],"query":[{"key":"param","value":"motd"},{"key":"value","value":"New example message of the day"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 05:10:05 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"3ed98d8f-9af1-4793-b154-12c8ca025b83"},{"name":"List All Parameters","id":"4a843f88-1f2c-4e2d-b3dd-ca0479f5fe1c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getall","description":"<p>The <b>getall</b> command returns a list of all parameters (that are not null) that can be retrieved and configured using the <b>get</b> and <b>set</b> commands.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getall"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"17cd6ab0-7c66-4225-8b07-13806156df2f","name":"List All Parameters","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getall"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 05:11:28 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <dfltgw>IP address would appear here</dfltgw>\n            <snat>yes</snat>\n            <hamode>0</hamode>\n            <sshaccess>yes</sshaccess>\n            <sshport>22</sshport>\n            <wuiaccess>yes</wuiaccess>\n            <wuiiface>0</wuiiface>\n            <wuiport>443</wuiport>\n            <apiport>443</apiport>\n            <sshiface>all</sshiface>\n            <hoverhelp>yes</hoverhelp>\n            <routefilter>no</routefilter>\n            <transparent>no</transparent>\n            <expect100>2</expect100>\n            <localbind>no</localbind>\n            <addcookieport>no</addcookieport>\n            <subnetoriginating>no</subnetoriginating>\n            <nonlocalrs>yes</nonlocalrs>\n            <multigw>no</multigw>\n            <addforwardheader>1</addforwardheader>\n            <conntimeout>660</conntimeout>\n            <authtimeout>30</authtimeout>\n            <authpostwait>2000</authpostwait>\n            <clienttokentimeout>120</clienttokentimeout>\n            <finalpersist>300</finalpersist>\n            <tcptimestamp>no</tcptimestamp>\n            <paranoia>1</paranoia>\n            <cachesize>100</cachesize>\n            <hostcache>no</hostcache>\n            <resetclose>no</resetclose>\n            <rfcconform>yes</rfcconform>\n            <keepalive>yes</keepalive>\n            <backupday>0</backupday>\n            <backupenable>no</backupenable>\n            <backuphour>0</backuphour>\n            <backupminute>0</backupminute>\n            <backuppassword>********</backuppassword>\n            <backuptop>no</backuptop>\n            <backupnetstat>yes</backupnetstat>\n            <backupsecure>yes</backupsecure>\n            <backupmethod>wput</backupmethod>\n            <backupident>********</backupident>\n            <enableapi>yes</enableapi>\n            <emailpassword>********</emailpassword>\n            <emailsslmode>0</emailsslmode>\n            <emailport>25</emailport>\n            <addvia>no</addvia>\n            <loguseragent>no</loguseragent>\n            <allowupload>no</allowupload>\n            <dropatdrainend>no</dropatdrainend>\n            <droponfail>no</droponfail>\n            <closeonerror>no</closeonerror>\n            <rsarelocal>no</rsarelocal>\n            <slowstart>0</slowstart>\n            <subnetorigin>no</subnetorigin>\n            <dnssecclient>no</dnssecclient>\n            <emailenable>no</emailenable>\n            <irqbalance>no</irqbalance>\n            <snmpenable>no</snmpenable>\n            <snmpV3enable>no</snmpV3enable>\n            <snmpv3userpasswd>********</snmpv3userpasswd>\n            <snmpV3Privenable>no</snmpV3Privenable>\n            <snmpv3privpasswd>********</snmpv3privpasswd>\n            <snmpHaTrap>no</snmpHaTrap>\n            <snmptrapenable>no</snmptrapenable>\n            <motd>New example message of the day</motd>\n            <wuidisplaylines>0</wuidisplaylines>\n            <linearesplogs>no</linearesplogs>\n            <ssomaxthreads>128</ssomaxthreads>\n            <onlydefaultroutes>no</onlydefaultroutes>\n            <sessionauthmode>0</sessionauthmode>\n            <sessionidletime>0</sessionidletime>\n            <sessionmaxfailattempts>0</sessionmaxfailattempts>\n            <sessioncontrol>yes</sessioncontrol>\n            <sessionbasicauth>no</sessionbasicauth>\n            <sessionconcurrent>0</sessionconcurrent>\n            <adminclientaccess>0</adminclientaccess>\n            <sessionlocalauth>no</sessionlocalauth>\n            <ntpkeyid>0</ntpkeyid>\n            <ntpkeysecret>********</ntpkeysecret>\n            <netconsoleinterface>0</netconsoleinterface>\n            <nameserver>IP address would appear here</nameserver>\n            <radiusbackupport>0</radiusbackupport>\n            <radiusbackupsecret>********</radiusbackupsecret>\n            <radiusport>0</radiusport>\n            <radiussecret>********</radiussecret>\n            <radiusrevalidateinterval>60</radiusrevalidateinterval>\n            <radiussendnasid>no</radiussendnasid>\n            <radiussendvendorspec>no</radiussendvendorspec>\n            <wuicertmapping>0</wuicertmapping>\n            <wuinestedgroups>no</wuinestedgroups>\n            <wuiservercertval>no</wuiservercertval>\n            <samlidpprov>0</samlidpprov>\n            <samlidpmatchcert>no</samlidpmatchcert>\n            <hostname>lb100</hostname>\n            <admincert>No Admin Certificate assigned</admincert>\n            <localcert>Only available in HA mode</localcert>\n            <time>Fri, 02 Aug 24 05:11:28 UTC</time>\n            <boottime>Thu, 01 Aug 24 10:34:28 UTC</boottime>\n            <activetime>Thu, 01 Aug 24 10:34:28 UTC</activetime>\n            <serialnumber>1346565</serialnumber>\n            <version>7.2.60.0.22478.DEV</version>\n            <Tethering>yes</Tethering>\n            <multihomedwui>no</multihomedwui>\n            <logsplitinterval>10</logsplitinterval>\n            <allowemptyposts>no</allowemptyposts>\n            <WUITLSProtocols>0</WUITLSProtocols>\n            <WUITLS13Ciphersets>TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_AES_128_GCM_SHA256</WUITLS13Ciphersets>\n            <AllowEmptyHttpHeaders>no</AllowEmptyHttpHeaders>\n            <ShareSubVSPersist>no</ShareSubVSPersist>\n            <DNSNamesEnable>yes</DNSNamesEnable>\n            <DNSUpdateInterval>60</DNSUpdateInterval>\n            <DNSReloadOnError>no</DNSReloadOnError>\n            <ForceFullRSMatch>no</ForceFullRSMatch>\n            <SyslogPort>514</SyslogPort>\n            <SyslogProt>udp</SyslogProt>\n            <SyslogCert>no</SyslogCert>\n            <TCPnorecycle>no</TCPnorecycle>\n            <SecurityHeaderAge>31536000</SecurityHeaderAge>\n            <extendedperms>no</extendedperms>\n            <tcpsack>no</tcpsack>\n            <autosave>yes</autosave>\n            <CEFmsgFormat>no</CEFmsgFormat>\n            <MinPassword>8</MinPassword>\n            <EnableIsetupCli>yes</EnableIsetupCli>\n            <SSLOldLibraryVersion>no</SSLOldLibraryVersion>\n            <irqpinning>no</irqpinning>\n            <IPV6forwarding>yes</IPV6forwarding>\n            <KcdCipherSha1>no</KcdCipherSha1>\n            <dhcpv6>no</dhcpv6>\n            <dhcpv6release>no</dhcpv6release>\n            <dhcpv6duid>LLT</dhcpv6duid>\n            <L4SyncThreshold>3</L4SyncThreshold>\n            <L4SyncPeriod>50</L4SyncPeriod>\n            <L4SyncRefreshPeriod>0</L4SyncRefreshPeriod>\n            <L7NTLMProxy>yes</L7NTLMProxy>\n            <L7SameSite>0</L7SameSite>\n            <AllowNoLocalUserClientCert>no</AllowNoLocalUserClientCert>\n            <geosshport>22</geosshport>\n            <geo_ssh_iface>0</geo_ssh_iface>\n            <ClientCPSLimit>0</ClientCPSLimit>\n            <ClientRPSLimit>0</ClientRPSLimit>\n            <ClientMaxConnsLimit>0</ClientMaxConnsLimit>\n            <ClientMaxBandwidthLimit>0</ClientMaxBandwidthLimit>\n            <MaxCPSLimit>0</MaxCPSLimit>\n            <MaxRPSLimit>0</MaxRPSLimit>\n            <MaxConnsLimit>0</MaxConnsLimit>\n            <MaxBandwidthLimit>0</MaxBandwidthLimit>\n            <SendRateLimitError>0</SendRateLimitError>\n            <RateLimitFail>no</RateLimitFail>\n            <LimitLogging>no</LimitLogging>\n            <ClientRepeatDelay>60</ClientRepeatDelay>\n            <L7LimitInput>0</L7LimitInput>\n            <OCSPPort>0</OCSPPort>\n            <OCSPcertChecking>no</OCSPcertChecking>\n            <OCSPUseSSL>no</OCSPUseSSL>\n            <OCSPOnServerFail>no</OCSPOnServerFail>\n            <SSLForceServerVerify>no</SSLForceServerVerify>\n            <SSLStapling>no</SSLStapling>\n            <SSLRefreshInterval>3600</SSLRefreshInterval>\n            <SSLDisableMasterSecret>no</SSLDisableMasterSecret>\n            <sslrenegotiate>no</sslrenegotiate>\n            <sslclienterrors>0</sslclienterrors>\n            <ECCerts>0</ECCerts>\n            <dhkeysize>2048</dhkeysize>\n            <acmetype>0</acmetype>\n            <TelemetryActiveTimeout>60</TelemetryActiveTimeout>\n            <TelemetryInActiveTimeout>10</TelemetryInActiveTimeout>\n            <TelemetryOptArp>yes</TelemetryOptArp>\n            <TelemetryOptDhcp>yes</TelemetryOptDhcp>\n            <TelemetryOptDns>yes</TelemetryOptDns>\n            <TelemetryOptHttp>yes</TelemetryOptHttp>\n            <TelemetryOptMail>yes</TelemetryOptMail>\n            <TelemetryOptNbar2>yes</TelemetryOptNbar2>\n            <TelemetryOptSamba>yes</TelemetryOptSamba>\n            <TelemetryOptExtendedVoip>yes</TelemetryOptExtendedVoip>\n            <TelemetryOptPostgres>yes</TelemetryOptPostgres>\n            <TelemetryOptMySql>yes</TelemetryOptMySql>\n            <TelemetryOptNpm>yes</TelemetryOptNpm>\n            <TelemetryOptExtendedNpm>yes</TelemetryOptExtendedNpm>\n            <TelemetryOptTds>yes</TelemetryOptTds>\n        </Data>\n    </Success>\n</Response>"},{"id":"ae5fc6ad-26a8-491c-8f8d-580489bc9efe","name":"List All Parameters","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getall"},"status":"OK","code":200,"_postman_previewlanguage":null,"header":[{"key":"Date","value":"Tue, 12 Aug 2025 08:39:50 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <dfltgw>IP address would appear here</dfltgw>\n            <snat>yes</snat>\n            <hamode>0</hamode>\n            <sshaccess>yes</sshaccess>\n            <sshport>22</sshport>\n            <wuiaccess>yes</wuiaccess>\n            <wuiiface>0</wuiiface>\n            <wuiport>443</wuiport>\n            <apiport>443</apiport>\n            <sshiface>all</sshiface>\n            <hoverhelp>yes</hoverhelp>\n            <routefilter>no</routefilter>\n            <transparent>no</transparent>\n            <expect100>2</expect100>\n            <localbind>no</localbind>\n            <addcookieport>no</addcookieport>\n            <subnetoriginating>no</subnetoriginating>\n            <nonlocalrs>yes</nonlocalrs>\n            <multigw>no</multigw>\n            <addforwardheader>1</addforwardheader>\n            <conntimeout>660</conntimeout>\n            <authtimeout>30</authtimeout>\n            <authpostwait>2000</authpostwait>\n            <clienttokentimeout>120</clienttokentimeout>\n            <finalpersist>300</finalpersist>\n            <tcptimestamp>no</tcptimestamp>\n            <paranoia>1</paranoia>\n            <cachesize>100</cachesize>\n            <hostcache>no</hostcache>\n            <resetclose>no</resetclose>\n            <rfcconform>yes</rfcconform>\n            <keepalive>yes</keepalive>\n            <backupday>0</backupday>\n            <backupenable>no</backupenable>\n            <backuphour>0</backuphour>\n            <backupminute>0</backupminute>\n            <backuppassword>********</backuppassword>\n            <backuptop>no</backuptop>\n            <backupnetstat>yes</backupnetstat>\n            <backupsecure>yes</backupsecure>\n            <backupmethod>wput</backupmethod>\n            <backupident>********</backupident>\n            <enableapi>yes</enableapi>\n            <emailpassword>********</emailpassword>\n            <emailsslmode>0</emailsslmode>\n            <emailport>25</emailport>\n            <addvia>no</addvia>\n            <loguseragent>no</loguseragent>\n            <allowupload>no</allowupload>\n            <dropatdrainend>no</dropatdrainend>\n            <droponfail>no</droponfail>\n            <closeonerror>no</closeonerror>\n            <rsarelocal>no</rsarelocal>\n            <slowstart>0</slowstart>\n            <subnetorigin>no</subnetorigin>\n            <syslogcritical>IP address would appear here</syslogcritical>\n            <syslogemergency>IP address would appear here</syslogemergency>\n            <sysloginfo>IP address would appear here</sysloginfo>\n            <dnssecclient>no</dnssecclient>\n            <emailenable>no</emailenable>\n            <irqbalance>no</irqbalance>\n            <snmpenable>no</snmpenable>\n            <snmpV3enable>no</snmpV3enable>\n            <snmpv3userpasswd>********</snmpv3userpasswd>\n            <snmpV3Privenable>no</snmpV3Privenable>\n            <snmpv3privpasswd>********</snmpv3privpasswd>\n            <snmpHaTrap>no</snmpHaTrap>\n            <snmptrapenable>no</snmptrapenable>\n            <wuidisplaylines>0</wuidisplaylines>\n            <linearesplogs>no</linearesplogs>\n            <ssomaxthreads>128</ssomaxthreads>\n            <onlydefaultroutes>no</onlydefaultroutes>\n            <sessionauthmode>0</sessionauthmode>\n            <sessionidletime>86400</sessionidletime>\n            <sessionmaxfailattempts>0</sessionmaxfailattempts>\n            <sessioncontrol>yes</sessioncontrol>\n            <sessionbasicauth>no</sessionbasicauth>\n            <sessionconcurrent>0</sessionconcurrent>\n            <adminclientaccess>0</adminclientaccess>\n            <sessionlocalauth>no</sessionlocalauth>\n            <ntpkeyid>0</ntpkeyid>\n            <ntpkeysecret>********</ntpkeysecret>\n            <netconsoleinterface>0</netconsoleinterface>\n            <nameserver>IP address would appear here,IP address would appear here,IP address would appear here</nameserver>\n            <radiusbackupport>0</radiusbackupport>\n            <radiusbackupsecret>********</radiusbackupsecret>\n            <radiusport>0</radiusport>\n            <radiussecret>********</radiussecret>\n            <radiusrevalidateinterval>60</radiusrevalidateinterval>\n            <radiussendnasid>no</radiussendnasid>\n            <radiussendvendorspec>no</radiussendvendorspec>\n            <wuicertmapping>0</wuicertmapping>\n            <wuinestedgroups>no</wuinestedgroups>\n            <wuiservercertval>no</wuiservercertval>\n            <hostname>lb100</hostname>\n            <admincert>No Admin Certificate assigned</admincert>\n            <localcert>Only available in HA mode</localcert>\n            <time>Tue, 12 Aug 25 08:39:50 UTC</time>\n            <boottime>Fri, 08 Aug 25 10:07:09 UTC</boottime>\n            <activetime>Fri, 08 Aug 25 10:07:09 UTC</activetime>\n            <serialnumber>1332268</serialnumber>\n            <version>7.2.63.0.f6d42ce.DEV</version>\n            <Tethering>yes</Tethering>\n            <multihomedwui>no</multihomedwui>\n            <logsplitinterval>10</logsplitinterval>\n            <allowemptyposts>no</allowemptyposts>\n            <WUITLSProtocols>0</WUITLSProtocols>\n            <WUITLS13Ciphersets>TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_AES_128_GCM_SHA256</WUITLS13Ciphersets>\n            <AllowEmptyHttpHeaders>no</AllowEmptyHttpHeaders>\n            <ShareSubVSPersist>no</ShareSubVSPersist>\n            <DNSNamesEnable>yes</DNSNamesEnable>\n            <DNSUpdateInterval>60</DNSUpdateInterval>\n            <DNSReloadOnError>no</DNSReloadOnError>\n            <ForceFullRSMatch>no</ForceFullRSMatch>\n            <SyslogPort>514</SyslogPort>\n            <SyslogPrefix>PrefixExample</SyslogPrefix>\n            <SyslogProt>udp</SyslogProt>\n            <SyslogCert>no</SyslogCert>\n            <TCPnorecycle>no</TCPnorecycle>\n            <SecurityHeaderAge>31536000</SecurityHeaderAge>\n            <extendedperms>no</extendedperms>\n            <tcpsack>no</tcpsack>\n            <autosave>yes</autosave>\n            <CEFmsgFormat>no</CEFmsgFormat>\n            <MinPassword>8</MinPassword>\n            <EnableIsetupCli>yes</EnableIsetupCli>\n            <SSLOldLibraryVersion>no</SSLOldLibraryVersion>\n            <irqpinning>no</irqpinning>\n            <IPV6forwarding>yes</IPV6forwarding>\n            <KcdCipherSha1>no</KcdCipherSha1>\n            <dhcpv6>no</dhcpv6>\n            <dhcpv6release>no</dhcpv6release>\n            <dhcpv6duid>LLT</dhcpv6duid>\n            <L4SyncThreshold>3</L4SyncThreshold>\n            <L4SyncPeriod>50</L4SyncPeriod>\n            <L4SyncRefreshPeriod>0</L4SyncRefreshPeriod>\n            <L7NTLMProxy>yes</L7NTLMProxy>\n            <L7SameSite>0</L7SameSite>\n            <AllowNoLocalUserClientCert>no</AllowNoLocalUserClientCert>\n            <geosshport>22</geosshport>\n            <geo_ssh_iface>0</geo_ssh_iface>\n            <ClientCPSLimit>0</ClientCPSLimit>\n            <ClientRPSLimit>0</ClientRPSLimit>\n            <ClientMaxConnsLimit>0</ClientMaxConnsLimit>\n            <ClientMaxBandwidthLimit>0</ClientMaxBandwidthLimit>\n            <MaxCPSLimit>0</MaxCPSLimit>\n            <MaxRPSLimit>0</MaxRPSLimit>\n            <MaxConnsLimit>0</MaxConnsLimit>\n            <MaxBandwidthLimit>0</MaxBandwidthLimit>\n            <SendRateLimitError>0</SendRateLimitError>\n            <RateLimitFail>no</RateLimitFail>\n            <LimitLogging>no</LimitLogging>\n            <ClientRepeatDelay>60</ClientRepeatDelay>\n            <L7LimitInput>0</L7LimitInput>\n            <OCSPPort>0</OCSPPort>\n            <OCSPcertChecking>no</OCSPcertChecking>\n            <OCSPUseSSL>no</OCSPUseSSL>\n            <OCSPOnServerFail>no</OCSPOnServerFail>\n            <SSLForceServerVerify>no</SSLForceServerVerify>\n            <SSLStapling>no</SSLStapling>\n            <SSLRefreshInterval>3600</SSLRefreshInterval>\n            <SSLDisableMasterSecret>no</SSLDisableMasterSecret>\n            <sslrenegotiate>no</sslrenegotiate>\n            <sslclienterrors>0</sslclienterrors>\n            <ECCerts>0</ECCerts>\n            <dhkeysize>2048</dhkeysize>\n            <acmetype>0</acmetype>\n            <TelemetryActiveTimeout>60</TelemetryActiveTimeout>\n            <TelemetryInActiveTimeout>10</TelemetryInActiveTimeout>\n            <TelemetryOptArp>yes</TelemetryOptArp>\n            <TelemetryOptDhcp>yes</TelemetryOptDhcp>\n            <TelemetryOptDns>yes</TelemetryOptDns>\n            <TelemetryOptHttp>yes</TelemetryOptHttp>\n            <TelemetryOptMail>yes</TelemetryOptMail>\n            <TelemetryOptNbar2>yes</TelemetryOptNbar2>\n            <TelemetryOptSamba>yes</TelemetryOptSamba>\n            <TelemetryOptExtendedVoip>yes</TelemetryOptExtendedVoip>\n            <TelemetryOptPostgres>yes</TelemetryOptPostgres>\n            <TelemetryOptMySql>yes</TelemetryOptMySql>\n            <TelemetryOptNpm>yes</TelemetryOptNpm>\n            <TelemetryOptExtendedNpm>yes</TelemetryOptExtendedNpm>\n            <TelemetryOptTds>yes</TelemetryOptTds>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"4a843f88-1f2c-4e2d-b3dd-ca0479f5fe1c"}],"id":"cccae82b-194b-4118-afe2-1eef3f63c7ce","description":"<p>A large number of LoadMaster parameters can be managed using the set and get commands. These parameters are described throughout the document. A list of parameters that can be retrieved and configured using the <b>get</b> and <b>set</b> commands is provided in the <a href=\"#c1b5d9d0-2b7e-4274-aa1f-d5b0df545835\">List All Parameters</a> section.</p>\n","_postman_id":"cccae82b-194b-4118-afe2-1eef3f63c7ce"},{"name":"List All API Commands","item":[{"name":"List All API Commands and the LoadMaster Version","id":"03b39250-d493-46e1-95eb-7f38229e5bb6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listapi","description":"<p>List all available API commands and the currently installed LoadMaster version.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listapi"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"0bc3ce2b-f634-416e-a01a-28a57728e8c7","name":"List All API Commands and the LoadMaster Version","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listapi"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 08:55:31 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <commands>\n                <cmd>get</cmd>\n                <cmd>set</cmd>\n                <cmd>getall</cmd>\n                <cmd>listvs</cmd>\n                <cmd>showvs</cmd>\n                <cmd>addvs</cmd>\n                <cmd>delvs</cmd>\n                <cmd>modvs</cmd>\n                <cmd>dupvs</cmd>\n                <cmd>exportvstmplt</cmd>\n                <cmd>enablers</cmd>\n                <cmd>disablers</cmd>\n                <cmd>addrs</cmd>\n                <cmd>delrs</cmd>\n                <cmd>modrs</cmd>\n                <cmd>showrs</cmd>\n                <cmd>addrsrule</cmd>\n                <cmd>delrsrule</cmd>\n                <cmd>showrule</cmd>\n                <cmd>addrule</cmd>\n                <cmd>delrule</cmd>\n                <cmd>modrule</cmd>\n                <cmd>stats</cmd>\n                <cmd>vstotals</cmd>\n                <cmd>shutdown</cmd>\n                <cmd>reboot</cmd>\n                <cmd>backup</cmd>\n                <cmd>restore</cmd>\n                <cmd>license</cmd>\n                <cmd>accesskey</cmd>\n                <cmd>installpatch</cmd>\n                <cmd>restorepatch</cmd>\n                <cmd>addroute</cmd>\n                <cmd>delroute</cmd>\n                <cmd>showroute</cmd>\n                <cmd>updatedetect</cmd>\n                <cmd>addnocache</cmd>\n                <cmd>delnocache</cmd>\n                <cmd>addnocompress</cmd>\n                <cmd>delnocompress</cmd>\n                <cmd>setmotd</cmd>\n                <cmd>addprerule</cmd>\n                <cmd>delprerule</cmd>\n                <cmd>addrequestrule</cmd>\n                <cmd>delrequestrule</cmd>\n                <cmd>addresponserule</cmd>\n                <cmd>delresponserule</cmd>\n                <cmd>addresponsebodyrule</cmd>\n                <cmd>delresponsebodyrule</cmd>\n                <cmd>showhealth</cmd>\n                <cmd>modhealth</cmd>\n                <cmd>showadaptive</cmd>\n                <cmd>modadaptive</cmd>\n                <cmd>showiface</cmd>\n                <cmd>modiface</cmd>\n                <cmd>addadditional</cmd>\n                <cmd>deladditional</cmd>\n                <cmd>createbond</cmd>\n                <cmd>unbond</cmd>\n                <cmd>addbond</cmd>\n                <cmd>delbond</cmd>\n                <cmd>addvlan</cmd>\n                <cmd>delvlan</cmd>\n                <cmd>addvxlan</cmd>\n                <cmd>delvxlan</cmd>\n                <cmd>showdomain</cmd>\n                <cmd>adddomain</cmd>\n                <cmd>deldomain</cmd>\n                <cmd>moddomain</cmd>\n                <cmd>setrsaconfig</cmd>\n                <cmd>setrsanodesecret</cmd>\n                <cmd>uploadsamlidpmd</cmd>\n                <cmd>downloadsamlspcert</cmd>\n                <cmd>ssoimages</cmd>\n                <cmd>delssoimage</cmd>\n                <cmd>listssoimages</cmd>\n                <cmd>addaddon</cmd>\n                <cmd>listaddon</cmd>\n                <cmd>deladdon</cmd>\n                <cmd>showdomainlockedusers</cmd>\n                <cmd>unlockdomainusers</cmd>\n                <cmd>spla_license</cmd>\n                <cmd>kill_spla_instance</cmd>\n                <cmd>kill_instance</cmd>\n                <cmd>uploadtemplate</cmd>\n                <cmd>deltemplate</cmd>\n                <cmd>listtemplates</cmd>\n                <cmd>uploadvserrfile</cmd>\n                <cmd>setadminaccess</cmd>\n                <cmd>licenseinfo</cmd>\n                <cmd>gethosts</cmd>\n                <cmd>addhostsentry</cmd>\n                <cmd>delhostsentry</cmd>\n                <cmd>listifconfig</cmd>\n                <cmd>tcpdump</cmd>\n                <cmd>resolvenow</cmd>\n                <cmd>enablexroot</cmd>\n                <cmd>getpreviousversion</cmd>\n                <cmd>hsmsmartinfo</cmd>\n                <cmd>hsminfo</cmd>\n                <cmd>smartctl</cmd>\n                <cmd>opensslspeed</cmd>\n                <cmd>isopensslspeedrunning</cmd>\n                <cmd>factoryreset</cmd>\n                <cmd>alsilicensetypes</cmd>\n                <cmd>alsilicense</cmd>\n                <cmd>killaslinstance</cmd>\n                <cmd>getaslinfo</cmd>\n                <cmd>aslactivate</cmd>\n                <cmd>aslgetlicensetypes</cmd>\n                <cmd>getcipherset</cmd>\n                <cmd>modifycipherset</cmd>\n                <cmd>delcipherset</cmd>\n                <cmd>setlmcommsecret</cmd>\n                <cmd>showlocalreservedports</cmd>\n                <cmd>setlocalreservedports</cmd>\n                <cmd>readeula</cmd>\n                <cmd>accepteula</cmd>\n                <cmd>accepteula2</cmd>\n                <cmd>notice</cmd>\n                <cmd>listapi</cmd>\n                <cmd>forceupdatepartner</cmd>\n                <cmd>aclcontrol</cmd>\n                <cmd>cluster</cmd>\n                <cmd>ssodomain</cmd>\n                <cmd>listfqdns</cmd>\n                <cmd>addfqdn</cmd>\n                <cmd>addcustomlocation</cmd>\n                <cmd>editcustomlocation</cmd>\n                <cmd>deletecustomlocation</cmd>\n                <cmd>listcustomlocation</cmd>\n                <cmd>showfqdn</cmd>\n                <cmd>modfqdn</cmd>\n                <cmd>delfqdn</cmd>\n                <cmd>addmap</cmd>\n                <cmd>modmap</cmd>\n                <cmd>delmap</cmd>\n                <cmd>addrr</cmd>\n                <cmd>modrr</cmd>\n                <cmd>delrr</cmd>\n                <cmd>geochangecheckermapping</cmd>\n                <cmd>changemaploc</cmd>\n                <cmd>addcountry</cmd>\n                <cmd>removecountry</cmd>\n                <cmd>changecheckeraddr</cmd>\n                <cmd>listclusters</cmd>\n                <cmd>showcluster</cmd>\n                <cmd>addcluster</cmd>\n                <cmd>delcluster</cmd>\n                <cmd>modcluster</cmd>\n                <cmd>clustchangeloc</cmd>\n                <cmd>listparams</cmd>\n                <cmd>modparams</cmd>\n                <cmd>locdataupdate</cmd>\n                <cmd>getgeopartnerstatus</cmd>\n                <cmd>listips</cmd>\n                <cmd>showip</cmd>\n                <cmd>addip</cmd>\n                <cmd>delip</cmd>\n                <cmd>modiploc</cmd>\n                <cmd>deliploc</cmd>\n                <cmd>addipcountry</cmd>\n                <cmd>removeipcountry</cmd>\n                <cmd>enablegeo</cmd>\n                <cmd>disablegeo</cmd>\n                <cmd>isgeoenabled</cmd>\n                <cmd>geoacl</cmd>\n                <cmd>geostats</cmd>\n                <cmd>geogenerateksk</cmd>\n                <cmd>geoimportksk</cmd>\n                <cmd>geodeleteksk</cmd>\n                <cmd>geosetdnssec</cmd>\n                <cmd>geoshowdnssec</cmd>\n                <cmd>set_geo_failover</cmd>\n                <cmd>setwafautoupdate</cmd>\n                <cmd>getwafsettings</cmd>\n                <cmd>downloadwafrules</cmd>\n                <cmd>addwafcustomrule</cmd>\n                <cmd>delwafcustomrule</cmd>\n                <cmd>downloadwafcustomrule</cmd>\n                <cmd>addwafcustomdata</cmd>\n                <cmd>delwafcustomdata</cmd>\n                <cmd>downloadwafcustomdata</cmd>\n                <cmd>enablewafautoinstall</cmd>\n                <cmd>setwafautoinstall</cmd>\n                <cmd>setwafinstalltime</cmd>\n                <cmd>maninstallwafrules</cmd>\n                <cmd>downloadwafauditlog</cmd>\n                <cmd>listwafauditfiles</cmd>\n                <cmd>listwafrules</cmd>\n                <cmd>vslistwafruleids</cmd>\n                <cmd>vsaddwafrule</cmd>\n                <cmd>vsremovewafrule</cmd>\n                <cmd>getwafchangelog</cmd>\n                <cmd>enablewafremotelogging</cmd>\n                <cmd>disablewafremotelogging</cmd>\n                <cmd>setwaflogformat</cmd>\n                <cmd>addowaspcustomrule</cmd>\n                <cmd>delowaspcustomrule</cmd>\n                <cmd>downloadowaspcustomrule</cmd>\n                <cmd>addowaspcustomdata</cmd>\n                <cmd>delowaspcustomdata</cmd>\n                <cmd>downloadowaspcustomdata</cmd>\n                <cmd>owasprules</cmd>\n                <cmd>logging</cmd>\n                <cmd>afeclientlimitadd</cmd>\n                <cmd>afeclientlimitdel</cmd>\n                <cmd>afeclientlimitlist</cmd>\n                <cmd>clientcpslimitadd</cmd>\n                <cmd>clientcpslimitdel</cmd>\n                <cmd>clientcpslimitlist</cmd>\n                <cmd>clientrpslimitadd</cmd>\n                <cmd>clientrpslimitdel</cmd>\n                <cmd>clientrpslimitlist</cmd>\n                <cmd>clientmaxclimitadd</cmd>\n                <cmd>clientmaxclimitdel</cmd>\n                <cmd>clientmaxclimitlist</cmd>\n                <cmd>clientbandwidthlimitadd</cmd>\n                <cmd>clientbandwidthlimitdel</cmd>\n                <cmd>clientbandwidthlimitlist</cmd>\n                <cmd>listlimitrules</cmd>\n                <cmd>addlimitrule</cmd>\n                <cmd>modlimitrule</cmd>\n                <cmd>dellimitrule</cmd>\n                <cmd>movelimitrule</cmd>\n                <cmd>listapikeys</cmd>\n                <cmd>delapikey</cmd>\n                <cmd>addapikey</cmd>\n                <cmd>createvpncon</cmd>\n                <cmd>deletevpncon</cmd>\n                <cmd>setvpnaddr</cmd>\n                <cmd>setvpnlocalip</cmd>\n                <cmd>setvpnlocalsubnets</cmd>\n                <cmd>setvpnremoteip</cmd>\n                <cmd>setvpnremotesubnets</cmd>\n                <cmd>setvpnsecret</cmd>\n                <cmd>setvpnpfsenable</cmd>\n                <cmd>setvpnpfsdisable</cmd>\n                <cmd>startvpncon</cmd>\n                <cmd>stopvpncon</cmd>\n                <cmd>getvpnstatus</cmd>\n                <cmd>startikedaemon</cmd>\n                <cmd>stopikedaemon</cmd>\n                <cmd>statusikedaemon</cmd>\n                <cmd>listvpns</cmd>\n                <cmd>groupaddremote</cmd>\n                <cmd>groupsetperms</cmd>\n                <cmd>groupdelremote</cmd>\n                <cmd>groupshow</cmd>\n                <cmd>grouplist</cmd>\n                <cmd>usersetsyspassword</cmd>\n                <cmd>useraddlocal</cmd>\n                <cmd>userchangelocpass</cmd>\n                <cmd>usersetperms</cmd>\n                <cmd>userdellocal</cmd>\n                <cmd>usershow</cmd>\n                <cmd>userlist</cmd>\n                <cmd>userreadcert</cmd>\n                <cmd>usernewcert</cmd>\n                <cmd>userdelcert</cmd>\n                <cmd>userdownloadcert</cmd>\n                <cmd>azurehamode</cmd>\n                <cmd>azurehaparam</cmd>\n                <cmd>getazurehaparams</cmd>\n                <cmd>awshamode</cmd>\n                <cmd>awshaparam</cmd>\n                <cmd>getawshaparams</cmd>\n                <cmd>getCloudHaParams</cmd>\n                <cmd>setcloudhamode</cmd>\n                <cmd>setcloudhaparam</cmd>\n                <cmd>getcloudhaparams</cmd>\n                <cmd>getcloudhaparameters</cmd>\n                <cmd>getraidinfo</cmd>\n                <cmd>getraiddisksinfo</cmd>\n                <cmd>addldapendpoint</cmd>\n                <cmd>modifyldapendpoint</cmd>\n                <cmd>deleteldapendpoint</cmd>\n                <cmd>showldaplist</cmd>\n                <cmd>showldapendpoint</cmd>\n                <cmd>addcert</cmd>\n                <cmd>delcert</cmd>\n                <cmd>backupcert</cmd>\n                <cmd>restorecert</cmd>\n                <cmd>listcert</cmd>\n                <cmd>readcert</cmd>\n                <cmd>addintermediate</cmd>\n                <cmd>delintermediate</cmd>\n                <cmd>listintermediate</cmd>\n                <cmd>readintermediate</cmd>\n                <cmd>registerleaccount</cmd>\n                <cmd>registeracmeaccount</cmd>\n                <cmd>fetchleaccount</cmd>\n                <cmd>fetchacmeaccount</cmd>\n                <cmd>addacmecert</cmd>\n                <cmd>addlecert</cmd>\n                <cmd>renewacmecert</cmd>\n                <cmd>renewlecert</cmd>\n                <cmd>delacmecert</cmd>\n                <cmd>dellecert</cmd>\n                <cmd>getacmecert</cmd>\n                <cmd>getlecert</cmd>\n                <cmd>listacmecert</cmd>\n                <cmd>listlecert</cmd>\n                <cmd>acmeaccountinfo</cmd>\n                <cmd>leaccountinfo</cmd>\n                <cmd>delacmeconfig</cmd>\n                <cmd>setacmedirectoryurl</cmd>\n                <cmd>setacmekid</cmd>\n                <cmd>setacmehmac</cmd>\n                <cmd>setacmerenewperiod</cmd>\n                <cmd>getacmedirectoryurl</cmd>\n                <cmd>getacmekid</cmd>\n                <cmd>getacmehmac</cmd>\n                <cmd>getacmerenewperiod</cmd>\n                <cmd>l7_http_reqlog</cmd>\n                <cmd>addlmingressk8sconf</cmd>\n                <cmd>dellmingressk8sconf</cmd>\n                <cmd>showlmingressk8sconf</cmd>\n                <cmd>getlmingressmode</cmd>\n                <cmd>setlmingressmode</cmd>\n                <cmd>getlmingressnamespace</cmd>\n                <cmd>setlmingressnamespace</cmd>\n                <cmd>getlmingresswatchtimeout</cmd>\n                <cmd>setlmingresswatchtimeout</cmd>\n                <cmd>restartlmingress</cmd>\n                <cmd>enabletelemetry</cmd>\n                <cmd>showtelemetry</cmd>\n            </commands>\n            <version>7.2.63.0.f6d42ce.DEV</version>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"03b39250-d493-46e1-95eb-7f38229e5bb6"}],"id":"b2d5080a-4793-4cba-842b-7d2ce624ea5f","description":"<p>You can list all available API commands and paramters.</p>\n","event":[{"listen":"prerequest","script":{"id":"7a355a3d-ca0d-4c52-a337-3a5e412aad9d","type":"text/javascript","exec":[""]}},{"listen":"test","script":{"id":"0d8cf6dd-6f9a-4722-a878-4d11ac1d7dc4","type":"text/javascript","exec":[""]}}],"_postman_id":"b2d5080a-4793-4cba-842b-7d2ce624ea5f"},{"name":"Home Screen Information","item":[{"name":"Retrieve the LoadMaster Firmware Version","id":"2d921334-1e85-4180-b19d-f88376570d7e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=version","description":"<p>Get the currently installed LoadMaster firmware version.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","get"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"version"}],"variable":[]}},"response":[{"id":"6cd241c1-6015-4582-887b-c6f3d404b937","name":"Retrieve the LoadMaster Firmware Version","originalRequest":{"method":"POST","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=version","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","get"],"query":[{"key":"param","value":"version"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:50:04 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <version>7.2.60.0.22478.DEV</version>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"2d921334-1e85-4180-b19d-f88376570d7e"},{"name":"Retrieve the Boot Time","id":"43c101d8-9114-4fa8-b089-b0536a586d1e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=boottime","description":"<p>The boot time is the time at which the LoadMaster last booted.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","get"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"boottime"}],"variable":[]}},"response":[{"id":"cb810183-3785-41f8-bff5-32b7f7a33ce4","name":"Retrieve the Boot Time","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=boottime","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","get"],"query":[{"key":"param","value":"boottime"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:50:58 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <boottime>Wed, 17 Jul 24 04:06:01 UTC</boottime>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"43c101d8-9114-4fa8-b089-b0536a586d1e"},{"name":"Retrieve the Active Time","id":"38296fe9-d8a7-41bc-ad45-d05a1b96b226","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=activetime","description":"<p>The boot time is the time at which the LoadMaster last booted. The boot time and active time are the same when a LoadMaster is not running in High Availability (HA) mode. When in HA mode, the active time is the time at which the LoadMaster last became the active unit. The active time will be zero if the LoadMaster is in standby mode.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","get"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"activetime"}],"variable":[]}},"response":[{"id":"93c6b53a-bdd9-4e21-a566-c77027814a28","name":"Retrieve the Active Time","originalRequest":{"method":"POST","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=activetime","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","get"],"query":[{"key":"param","value":"activetime"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:51:46 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <activetime>Wed, 17 Jul 24 04:06:01 UTC</activetime>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"38296fe9-d8a7-41bc-ad45-d05a1b96b226"},{"name":"Retrieve the Serial Number","id":"8416d08b-42bd-4357-b711-783ebcdc0814","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=serialnumber","description":"<p>Get the serial number of the LoadMaster.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","get"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"serialnumber"}],"variable":[]}},"response":[{"id":"0f6e877f-572b-4ecb-9559-ae51e291c601","name":"Retrieve the Serial Number","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=serialnumber","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","get"],"query":[{"key":"param","value":"serialnumber"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:52:39 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <serialnumber>Serial number would appear here</serialnumber>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"8416d08b-42bd-4357-b711-783ebcdc0814"},{"name":"Retrieve the Virtual Service and Real Service Statuses","id":"0b1d026b-423c-449d-a8d3-d38fd26b0a9b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/vstotals","description":"<p>Retrieve the total numbers of Virtual Services, SubVSs, and Real Servers that are up, down, and administratively disabled.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","vstotals"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"bac15af8-da6b-46fe-bf7d-0c10256c2aaa","name":"Retrieve the Virtual Service and Real Service Statuses","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/vstotals"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:53:33 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <VSTotals>\n                <Total>2</Total>\n                <Up>0</Up>\n                <Down>2</Down>\n                <Disabled>0</Disabled>\n            </VSTotals>\n            <SUBVSTotals>\n                <Total>0</Total>\n                <Up>0</Up>\n                <Down>0</Down>\n                <Disabled>0</Disabled>\n            </SUBVSTotals>\n            <RSTotals>\n                <Total>1</Total>\n                <Up>0</Up>\n                <Down>1</Down>\n                <Disabled>0</Disabled>\n            </RSTotals>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"0b1d026b-423c-449d-a8d3-d38fd26b0a9b"},{"name":"Retrieve Licensing Information","id":"4fc44bb9-697e-40a8-a7ec-7b3e235bb9ec","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/licenseinfo","description":"<p>Get details about the LoadMaster license and subscription.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","licenseinfo"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"c8dd5ab0-dd0c-422a-a638-72986d668f9b","name":"Retrieve Licensing Information","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/licenseinfo"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:54:13 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <uuid>UUID would appear here</uuid>\n            <ActivationDate>Wed Jul 17 09:57:43 UTC 2024</ActivationDate>\n            <LicensedUntil>August 17 2024</LicensedUntil>\n            <SupportLevel>Premium plus + WAF + GEOBL</SupportLevel>\n            <SupportUntil>Fri Aug 16 09:57:42 UTC 2024</SupportUntil>\n            <LicenseType>VLM-MAX + Enterprise Plus Subscription</LicenseType>\n            <LicenseStatus>Single Temp</LicenseStatus>\n            <ApplianceModel>VLM-MAX</ApplianceModel>\n            <MaxVS>0</MaxVS>\n            <MaxRS>0</MaxRS>\n            <Bandwidth>0</Bandwidth>\n            <TpsLimit>1000000</TpsLimit>\n            <HA>no</HA>\n            <FirstHA>no</FirstHA>\n            <ModSecurity>yes</ModSecurity>\n            <AFE>yes</AFE>\n            <ViewAFE>yes</ViewAFE>\n            <ESP>yes</ESP>\n            <IPSEC>2</IPSEC>\n            <SingleCPU>no</SingleCPU>\n            <VLM>yes</VLM>\n            <VlmPlatform>VMWARE</VlmPlatform>\n            <SKU>VLM_OVF_64</SKU>\n            <FreeLicense>no</FreeLicense>\n            <Temporary>yes</Temporary>\n            <ASL>no</ASL>\n            <MandatoryTether>no</MandatoryTether>\n            <MultipleConnect>yes</MultipleConnect>\n            <SubscriptionEntry1>\n                <Name>Enterprise Plus</Name>\n                <Expires>1723802262</Expires>\n                <FeatureList>hasmodsec,wafsub,hassdna,hasmulti,hasesp,geo_acl</FeatureList>\n            </SubscriptionEntry1>\n            <Option>\n                <Name>GEO Access List IP</Name>\n                <Value>1</Value>\n                <Expires>Fri Aug 16 09:57:42 UTC 2024</Expires>\n            </Option>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"4fc44bb9-697e-40a8-a7ec-7b3e235bb9ec"}],"id":"80cff961-61e8-4304-aa5e-5a4a35c234d1","description":"<p>Some information which is available in the LoadMaster UI is also available using the API. Refer to the sub-sections below for further details.</p>\n","_postman_id":"80cff961-61e8-4304-aa5e-5a4a35c234d1"},{"name":"Initial Configuration","item":[{"name":"Read the EULA","id":"5e772d10-dd90-44a6-95c1-52db753a972a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://InsertLoadMasterIPAddress/access/readeula","description":"<p>The <strong>ReadEula</strong> command displays the EULA and a magic string.</p>\n<blockquote>\n<p>The magic string is used for security reasons - it limits the possibility of remote attacks. If a command requires the magic string (like some of the other ones in the sections below) and does not get the correct magic string from the previous command, the command will fail.</p>\n</blockquote>\n<blockquote>\n<p>The magic string is an automatically generated random string. Copy this string because it will be needed in the next command to set the license type.</p>\n</blockquote>\n","urlObject":{"protocol":"https","path":["access","readeula"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"594eb2a4-e656-4f08-bfc3-97f7e275d7d8","name":"Read the EULA","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://InsertLoadMasterIPAddress/access/readeula"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 10:51:54 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\r\n<Response stat=\"200\" code=\"ok\">\r\n    <Success>\r\n        <Data>\r\n            <Magic>Magic string would appear here</Magic>\r\n            <Eula>End User License Agreement (EULA) would appear here</Eula>\r\n        </Data>\r\n    </Success>\r\n</Response>"}],"_postman_id":"5e772d10-dd90-44a6-95c1-52db753a972a"},{"name":"Accept the EULA and Set the License Type","id":"72b9ee93-cdd1-4f6b-9d49-922151a44543","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://InsertLoadMasterIPAddress/access/accepteula?magic=InsertMagicString&type=trial","description":"<p>There are three license types available. These are:</p>\n<ul>\n<li>Trial (Unrestricted)</li>\n<li>Perpetual</li>\n<li>Free (Restricted)</li>\n</ul>\n<p>When running the <strong>AcceptEULA</strong> command, you enter the magic string returned by the ReadEula command. The <strong>AcceptEULA</strong> command accepts the EULA and sets the type of license used, for example, <strong>Trial</strong>, <strong>Perm</strong> or <strong>Free</strong>.</p>\n<blockquote>\n<p>The <strong>type</strong> parameter must be set when running the <strong>AcceptEula</strong> command. The <strong>type</strong> set depends on the type of LoadMaster you are deploying.</p>\n</blockquote>\n<table><tbody><tr><td><p><b>Value</b></p></td><td><p><b>Description</b></p></td></tr><tr><td><p>Trial</p><p> </p></td><td><p>Temporary license for users evaluating the LoadMaster</p><p> </p></td></tr><tr><td><p>Perm</p></td><td><p>Purchased permanent LoadMaster</p></td></tr><tr><td><p>Free</p></td><td><p>Free LoadMaster</p></td></tr></tbody></table>\n\n<p>If running this command on a Virtual LoadMaster (VLM) which has been created in the Multi-Tenant LoadMaster product, the license type set here is irrelevant because the license type will be inherited from the Multi-Tenant LoadMaster. However, this command still needs to be run to get another magic string which is needed to run the next command (<strong>AcceptEula2</strong>).</p>\n","urlObject":{"protocol":"https","path":["access","accepteula"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"magic","value":"InsertMagicString"},{"key":"type","value":"trial"}],"variable":[]}},"response":[{"id":"076b19ad-6786-438b-ab71-289327225f4f","name":"Accept the EULA and Set the License Type","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://InsertLoadMasterIPAddress/access/accepteula?magic=InsertMagicString&type=trial","protocol":"https","host":["InsertLoadMasterIPAddress"],"path":["access","accepteula"],"query":[{"key":"magic","value":"InsertMagicString"},{"key":"type","value":"trial"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 10:55:02 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Eula>As part of Progress’ continuous drive to offer better value and services to its customers Progress has introduced a Call Home feature.\nThe LoadMaster can utilize Call Home to get available license updates, information regarding any updated firmware for your product and provide system status information to Progress. The system status information will include Throughput, Enabled Features, Virtual Service and Real Server details but will not include any unique personal information or actual traffic from your network.\nYour LoadMaster will initiate a connection to Progress once during any 24 hour interval.\n\n                <b>NOTE</b> – Allowing Call Home is mandatory for Free LoadMaster versions.\nFor more details on this visit\n                <a href=\"https://kemptechnologies.com/callhome\" target=\"_blank\">Call Home - Disclosure and Usage</a>\nAs used herein, “Progress” means Progress Software Corporation and its subsidiaries.\n            </Eula>\n            <Magic>Magic string would appear here</Magic>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"72b9ee93-cdd1-4f6b-9d49-922151a44543"},{"name":"Retrieve the Available License Types","id":"6f69d118-c199-4030-b350-f61a6873b028","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://InsertNewLoadMasterIPAddress/access/alsilicensetypes&kempid=InsertProgressID&password=InsertProgressIDPassword","description":"<p>To retrieve a list of available license types for a particular Progress ID, run the <strong>alsilicensetypes</strong> command.</p>\n<p>The <strong>orderid</strong> parameter is only needed for Virtual LoadMasters.<br />If successful, the output provides a list of license types and associated IDs. The ID number is used when licensing using the <strong>alsilicense</strong> command.</p>\n","urlObject":{"protocol":"https","path":["access","alsilicensetypes&kempid=InsertProgressID&password=InsertProgressIDPassword"],"host":["InsertNewLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"c587b694-cfb6-4301-967c-731273886109","name":"Retrieve the Available License Types","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://InsertNewLoadMasterIPAddress/access/alsilicensetypes&kempid=InsertProgressID&password=InsertProgressIDPassword"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 19 Jul 2022 10:26:24 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/xml","description":"","type":"text"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n<response>\n    <license>\n        <licenseTypes>\n            <type>\n                <name>VLM-MAX with Enterprise Plus subscription</name>\n                <description>VLM-MAX with Enterprise Plus subscription</description>\n                <available>1</available>\n                <tethered>0</tethered>\n                <id>ID would appear here</id>\n            </type>\n        </licenseTypes>\n        <description>Temp License</description>\n        <purchaseOptions>\n            <option>\n                <name>Buy More...</name>\n                <link>https://www.kemptechnologies.com/buy-me-now?KEMPID=KempIDWouldAppearHere</link>\n            </option>\n        </purchaseOptions>\n    </license>\n</response>"}],"_postman_id":"6f69d118-c199-4030-b350-f61a6873b028"},{"name":"License the LoadMaster","id":"02236746-0339-4f6b-8a10-75bc0b4ebf01","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://InsertNewLoadMasterIPAddress/access/alsilicense?kempid=InsertProgressID&password=InsertProgressIDPassword&lic_type_id=1","description":"<p>The LoadMaster can be licensed using the <strong>license</strong> (offline) or <strong>alsilicense</strong> (online) commands. In this section, the online licensing (<strong>alsilicense</strong>) command is used. For further information on offline licensing and other commands relating to licensing, refer to the <a href=\"#4f372d65-2f07-423e-8d8c-fddfcd774032\">Licensing</a> section.</p>\n","urlObject":{"protocol":"https","path":["access","alsilicense"],"host":["InsertNewLoadMasterIPAddress"],"query":[{"key":"kempid","value":"InsertProgressID"},{"key":"password","value":"InsertProgressIDPassword"},{"key":"lic_type_id","value":"1"}],"variable":[]}},"response":[{"id":"e6f09ae4-34b5-40d5-a151-ec0afcc2a86d","name":"License the LoadMaster","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://InsertNewLoadMasterIPAddress/access/alsilicense?kempid=InsertProgressID&password=InsertProgressIDPassword&lic_type_id=1","protocol":"https","host":["InsertNewLoadMasterIPAddress"],"path":["access","alsilicense"],"query":[{"key":"kempid","value":"InsertProgressID"},{"key":"password","value":"InsertProgressIDPassword"},{"key":"lic_type_id","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 19 Jul 2022 10:32:12 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/xml","description":"","type":"text"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<response stat=\"200\">\n    <message>Command completed ok</message>\n    <status>ok</status>\n</response>"}],"_postman_id":"02236746-0339-4f6b-8a10-75bc0b4ebf01"},{"name":"Set the Initial Password","id":"a802c812-3b60-4f83-a8a7-4309112e14a3","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://InsertLoadMasterIPAddress/access/set_initial_passwd?passwd=InsertPassword","description":"<p>Use the <strong>Set_Initial_Passwd</strong> command to set the password of the default LoadMaster user (<strong>bal</strong>).</p>\n<table><tbody><tr><td><p><b>Parameter</b></p></td><td><p><b>Parameter Type</b></p></td><td><p><b>Description</b></p></td><td><p><b>Mandatory</b></p></td></tr><tr><td><p>Passwd</p></td><td><p>String</p></td><td><p>This is the password for the default administrator user (<b>bal</b>). The password should contain at least 8 alphanumeric characters.</p></td><td><p>Yes</p></td></tr></tbody></table>","urlObject":{"protocol":"https","path":["access","set_initial_passwd"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"passwd","value":"InsertPassword"}],"variable":[]}},"response":[{"id":"f811502e-0088-4e71-a995-b9d618b026eb","name":"Set the Initial Password","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://InsertLoadMasterIPAddress/access/set_initial_passwd?passwd=InsertPassword","protocol":"https","host":["InsertLoadMasterIPAddress"],"path":["access","set_initial_passwd"],"query":[{"key":"passwd","value":"InsertPassword"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:00:56 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"a802c812-3b60-4f83-a8a7-4309112e14a3"},{"name":"Set the Initial Password when using Kemp 360 Central Licensing","id":"6bf35dd8-7397-4775-9cb8-81b26d50ec40","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/usersetsyspassword?currpassword=InsertPassword&password=InsertNewPassword","description":"<p>If you are licensing using Kemp 360 Central, you may need to use the <strong>usersetsyspassword</strong> command.</p>\n<p>Refer to the following table to determine what command you should use:</p>\n<table><tbody><tr><td><b>LoadMaster Version</b></td><td><b>Kemp 360 Central version &gt;= V2.3</b><br /></td><td><b>Kemp 360 Central version &lt; V2.3</b></td></tr><tr><td>LoadMaster &gt;= V7.2.47</td><td>Use <b>usersetsyspassword</b></td><td>Use <b>set_initial_password</b></td></tr><tr><td>LoadMaster &lt; V7.2.47</td><td>Use <b>set_initial_password</b></td><td>Use <b>set_initial_password</b></td></tr></tbody></table>\n\n<p>To future-proof any existing LoadMaster deployment scripts you may have, modify the scripts to first use <strong>set_initial_password</strong> to attempt setting the <strong>bal</strong> password. If that fails, use <strong>usersetsyspassword</strong>.<br />If you are trying to license LoadMaster version 7.2.46 against a version of Kemp 360 Central that is above V2.3, you will not be able to log into the UI after setting the password using the API. To work around this, you must run the <strong>set</strong> command and set the <strong>motd</strong> value to an empty string after running the <strong>set_initial_password</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","usersetsyspassword"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"currpassword","value":"InsertPassword"},{"key":"password","value":"InsertNewPassword"}],"variable":[]}},"response":[{"id":"cc40449f-c5dc-482b-86e3-c6fbfa573981","name":"Set the Initial Password when using Kemp 360 Central Licensing","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/usersetsyspassword?currpassword=InsertPassword&password=InsertNewPassword","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","usersetsyspassword"],"query":[{"key":"currpassword","value":"InsertPassword"},{"key":"password","value":"InsertNewPassword"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 15:58:07 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Password Changed</Success>\n</Response>"}],"_postman_id":"6bf35dd8-7397-4775-9cb8-81b26d50ec40"},{"name":"Retrieve a List of Available License Types when using Kemp 360 Central Licensing","id":"4f8de7f5-0b56-4237-ae7b-a19ffd36ce08","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://InsertLoadMasterIPAddress/access/aslgetlicensetypes?aslhost=InsertKemp360CentralIPAddress&aslport=443","description":"<p>You can license locally if using Kemp 360 Central with Activation Server functionality.<br />To retrieve a list of available license types, use the <strong>aslgetlicensetypes</strong> command.</p>\n<blockquote>\n<p>The <strong>aslhost</strong> parameter was introduced in LoadMaster firmware version 7.2.43. The parameters previously used were called <strong>aslipaddr</strong> and <strong>aslname</strong>. If you have scripts using these old parameters, you will need to update them to use the new <strong>aslhost</strong> parameter if upgrading.</p>\n</blockquote>\n<p>After running the <strong>aslgetlicensetypes</strong> command, a list of available license types with license IDs is displayed.</p>\n","urlObject":{"protocol":"https","path":["access","aslgetlicensetypes"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"aslhost","value":"InsertKemp360CentralIPAddress"},{"key":"aslport","value":"443"}],"variable":[]}},"response":[{"id":"b87b09dd-b3bf-4e7d-a425-907d0f1ebd87","name":"Retrive a List of Available License Types when using Kemp 360 Central Licensing","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://InsertLoadMasterIPAddress/access/aslgetlicensetypes?aslhost=InsertKemp360CentralIPAddress&aslport=443","protocol":"https","host":["InsertLoadMasterIPAddress"],"path":["access","aslgetlicensetypes"],"query":[{"key":"aslhost","value":"InsertKemp360CentralIPAddress"},{"key":"aslport","value":"443"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:06:11 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>{\"categories\": [{\"licenseTypes\": [{\"name\": \"VLM-100\", \"id\": \"181\", \"available\": 1, \"description\": \"VLM-100\"}, {\"name\": \"VLM-200\", \"id\": \"188\", \"available\": 1, \"description\": \"VLM-200\"}, {\"name\": \"VLM-500\", \"id\": \"195\", \"available\": 1, \"description\": \"VLM-500\"}, {\"name\": \"VLM-1000\", \"id\": \"202\", \"available\": 1, \"description\": \"VLM-1000\"}, {\"name\": \"VLM-3000\", \"id\": \"209\", \"available\": 1, \"description\": \"VLM-3000\"}, {\"name\": \"VLM-5000\", \"id\": \"216\", \"available\": 1, \"description\": \"VLM-5000\"}, {\"name\": \"VLM-Uncapped\", \"id\": \"223\", \"available\": 1, \"description\": \"VLM-Uncapped\"}, {\"name\": \"VLM-50\", \"id\": \"230\", \"available\": 1, \"description\": \"VLM-50\"}], \"description\": \"Licenses received from Kemp 360 Central\"}]}</Success>\n</Response>"}],"_postman_id":"4f8de7f5-0b56-4237-ae7b-a19ffd36ce08"},{"name":"Activate the License using Kemp 360 Central","id":"0a230464-645d-4d65-a3c9-8ba63de650e1","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://InsertLoadMasterIPAddress/access/aslactivate?lic_type_id=216","description":"<p>To activate the license, use the <strong>aslactivate</strong> command and specify the license type ID.</p>\n<p>For compatibility across releases, the <strong>lic_id_type</strong> and the <strong>licensetypeid</strong> can be used interchangeably in any command where a license type ID is required.</p>\n","urlObject":{"protocol":"https","path":["access","aslactivate"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"lic_type_id","value":"216"}],"variable":[]}},"response":[{"id":"0a476467-13bb-493c-8ada-7bf75d12a129","name":"Activate the License using Kemp 360 Central","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://InsertLoadMasterIPAddress/access/aslactivate?lic_type_id=216","protocol":"https","host":["InsertLoadMasterIPAddress"],"path":["access","aslactivate"],"query":[{"key":"lic_type_id","value":"216"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:08:33 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <aslhost>IP address would appear here</aslhost>\n            <aslport>443</aslport>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"0a230464-645d-4d65-a3c9-8ba63de650e1"}],"id":"e3d2ba28-8ac3-4516-b8c7-31c67d1653a8","description":"<blockquote>\n<p>The initial configuration API commands are not valid for pay-per-use cloud LoadMasters. They are valid for Bring Your Own License (BYOL) cloud LoadMasters.</p>\n</blockquote>\n<p>A number of steps are involved in initially deploying a LoadMaster, such as accepting the End User License Agreement (EULA) and licensing the unit. Before the LoadMaster can be fully deployed the user must display and accept the EULA. These initial configuration steps can either be performed using the UI or the API. The API commands relating to initial configuration are listed in the sections below.</p>\n<blockquote>\n<p>These commands should be run in sequential order.</p>\n</blockquote>\n","_postman_id":"e3d2ba28-8ac3-4516-b8c7-31c67d1653a8"},{"name":"Virtual Services","item":[{"name":"Virtual Service Commands","item":[{"name":"List All Virtual Services","id":"3740d47a-1b2d-4e7b-90e5-71c6336dc1ab","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listvs","description":"<p>Retrieve details for all existing Virtual Services.</p>\n<p>When the status of the Virtual Service is returned, the Real Servers associated with the Virtual Service are also returned.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listvs"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"a4a633ba-7084-41a2-b0d7-e45930cdc913","name":"List All Virtual Services","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listvs"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 08:23:27 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <VS>\n                <Status>Down</Status>\n                <Index>1</Index>\n                <VSAddress>IP address would appear here</VSAddress>\n                <VSPort>80</VSPort>\n                <Layer>7</Layer>\n                <Enable>Y</Enable>\n                <SSLReverse>N</SSLReverse>\n                <SSLReencrypt>N</SSLReencrypt>\n                <InterceptMode>0</InterceptMode>\n                <Intercept>N</Intercept>\n                <InterceptOpts>\n                    <Opt>opnormal</Opt>\n                    <Opt>auditrelevant</Opt>\n                    <Opt>reqdatadisable</Opt>\n                    <Opt>resdatadisable</Opt>\n                </InterceptOpts>\n                <AlertThreshold>0</AlertThreshold>\n                <OwaspOpts>\n                    <Opt>opnormal</Opt>\n                    <Opt>auditnone</Opt>\n                    <Opt>reqdatadisable</Opt>\n                    <Opt>resdatadisable</Opt>\n                </OwaspOpts>\n                <BlockingParanoia>0</BlockingParanoia>\n                <IPReputationBlocking>N</IPReputationBlocking>\n                <ExecutingParanoia>0</ExecutingParanoia>\n                <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n                <PCRELimit>0</PCRELimit>\n                <JSONDLimit>0</JSONDLimit>\n                <BodyLimit>0</BodyLimit>\n                <Transactionlimit>0</Transactionlimit>\n                <Transparent>N</Transparent>\n                <SubnetOriginating>Y</SubnetOriginating>\n                <ServerInit>0</ServerInit>\n                <StartTLSMode>0</StartTLSMode>\n                <Idletime>660</Idletime>\n                <Cache>N</Cache>\n                <Compress>N</Compress>\n                <Verify>0</Verify>\n                <UseforSnat>N</UseforSnat>\n                <ForceL4>N</ForceL4>\n                <ForceL7>Y</ForceL7>\n                <MultiConnect>N</MultiConnect>\n                <ClientCert>0</ClientCert>\n                <SecurityHeaderOptions>0</SecurityHeaderOptions>\n                <SameSite>0</SameSite>\n                <VerifyBearer>N</VerifyBearer>\n                <ErrorCode>0</ErrorCode>\n                <CheckUse1.1>N</CheckUse1.1>\n                <MatchLen>0</MatchLen>\n                <CheckUseGet>0</CheckUseGet>\n                <SSLRewrite>0</SSLRewrite>\n                <VStype>http</VStype>\n                <FollowVSID>0</FollowVSID>\n                <Protocol>tcp</Protocol>\n                <Schedule>rr</Schedule>\n                <CheckType>http</CheckType>\n                <PersistTimeout>0</PersistTimeout>\n                <CheckPort>0</CheckPort>\n                <HTTPReschedule>N</HTTPReschedule>\n                <NRules>0</NRules>\n                <NRequestRules>0</NRequestRules>\n                <NResponseRules>0</NResponseRules>\n                <NMatchBodyRules>0</NMatchBodyRules>\n                <NPreProcessRules>0</NPreProcessRules>\n                <EspEnabled>N</EspEnabled>\n                <InputAuthMode>0</InputAuthMode>\n                <OutputAuthMode>0</OutputAuthMode>\n                <MasterVS>0</MasterVS>\n                <MasterVSID>0</MasterVSID>\n                <IsTransparent>2</IsTransparent>\n                <AddVia>0</AddVia>\n                <QoS>0</QoS>\n                <TlsType>0</TlsType>\n                <NeedHostName>N</NeedHostName>\n                <OCSPVerify>N</OCSPVerify>\n                <AllowHTTP2>N</AllowHTTP2>\n                <PassCipher>N</PassCipher>\n                <PassSni>N</PassSni>\n                <ChkInterval>0</ChkInterval>\n                <ChkTimeout>0</ChkTimeout>\n                <ChkRetryCount>0</ChkRetryCount>\n                <AdaptivePort>0</AdaptivePort>\n                <AdaptiveInterval>0</AdaptiveInterval>\n                <AdaptiveMinPercent>0</AdaptiveMinPercent>\n                <Bandwidth>0</Bandwidth>\n                <ConnsPerSecLimit>0</ConnsPerSecLimit>\n                <RequestsPerSecLimit>0</RequestsPerSecLimit>\n                <MaxConnsLimit>0</MaxConnsLimit>\n                <RefreshPersist>N</RefreshPersist>\n                <ResponseStatusRemap>N</ResponseStatusRemap>\n                <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n                <EnhancedHealthChecks>N</EnhancedHealthChecks>\n                <RsMinimum>0</RsMinimum>\n                <NumberOfRSs>0</NumberOfRSs>\n            </VS>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"3740d47a-1b2d-4e7b-90e5-71c6336dc1ab"},{"name":"Add a Virtual Service","id":"91669267-597d-41ec-866d-00165d4e10ad","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addvs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp","description":"<p>Create a new Virtual Service. When adding a Virtual Service, you can specify the values for all parameters.</p>\n<blockquote>\n<p>For details about these parameters, refer to the following section: <a href=\"#f85a3cd7-a2d0-4e19-957a-d0df05eac473\">Virtual Service Parameters</a> </p>\n</blockquote>\n<p>When creating a new Virtual Service, the default values set are non-transparent and subnet originating - except for UDP services, which are transparent (force L4).</p>\n<blockquote>\n<p>Frequently adding or deleting Virtual Services at a high velocity is not the recommended best practice. If you need to modify parameters, use the <strong>modvs</strong> command. If you need to constantly modify Virtual Service IP addresses, moving to FQDNs (rather than IP addresses) is the recommended best practice.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"}],"variable":[]}},"response":[{"id":"01be5d01-8e32-4a65-b7fd-cc5e4414a240","name":"Add a Virtual Service","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addvs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addvs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:57:50 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>1</Index>\n            <VSAddress>IP address would appear here</VSAddress>\n            <VSPort>80</VSPort>\n            <Layer>7</Layer>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>0</InterceptMode>\n            <Intercept>N</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditrelevant</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>0</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>0</ExecutingParanoia>\n            <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n            <PCRELimit>0</PCRELimit>\n            <JSONDLimit>0</JSONDLimit>\n            <BodyLimit>0</BodyLimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>N</Transparent>\n            <SubnetOriginating>Y</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <SameSite>0</SameSite>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>0</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>rr</Schedule>\n            <CheckType>http</CheckType>\n            <PersistTimeout>0</PersistTimeout>\n            <CheckPort>0</CheckPort>\n            <HTTPReschedule>N</HTTPReschedule>\n            <NRules>0</NRules>\n            <NRequestRules>0</NRequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>0</MasterVS>\n            <MasterVSID>0</MasterVSID>\n            <IsTransparent>2</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>0</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <AdaptivePort>0</AdaptivePort>\n            <AdaptiveInterval>0</AdaptiveInterval>\n            <AdaptiveMinPercent>0</AdaptiveMinPercent>\n            <Bandwidth>0</Bandwidth>\n            <ConnsPerSecLimit>0</ConnsPerSecLimit>\n            <RequestsPerSecLimit>0</RequestsPerSecLimit>\n            <MaxConnsLimit>0</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <ResponseStatusRemap>N</ResponseStatusRemap>\n            <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n            <EnhancedHealthChecks>N</EnhancedHealthChecks>\n            <RsMinimum>0</RsMinimum>\n            <NumberOfRSs>0</NumberOfRSs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"91669267-597d-41ec-866d-00165d4e10ad"},{"name":"Adding a Virtual Service using a Template","id":"43e72d77-af7f-4443-802f-04ba05d5f1db","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addvs?vs=InsertVirtualServiceIPAddress&port=8810&prot=tcp&template=PASOE-HTTP-JSESSIONID_Cookie","description":"<p>To add a Virtual Service and automatically configure it with a template, run the <b>addvs</b> command with a <b>template</b> specified.</p>\n<p>The port and protocol parameters are required, but if the template sets the ports then the values entered in the command will be ignored.</p>\n<p>For commands on adding, removing, and listing templates, refer to the <a href=\"#a6246394-2fe4-4c4c-bea9-b0e354f97bc9\">Manage Templates</a> section.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"8810"},{"key":"prot","value":"tcp"},{"key":"template","value":"PASOE-HTTP-JSESSIONID_Cookie"}],"variable":[]}},"response":[{"id":"94306950-2ec1-4cd7-b2fe-4f44c888e18c","name":"Adding a Virtual Service using a Template","originalRequest":{"method":"POST","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addvs?vs=InsertVirtualServiceIPAddress&port=8810&prot=tcp&template=PASOE-HTTP-JSESSIONID_Cookie","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addvs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"8810"},{"key":"prot","value":"tcp"},{"key":"template","value":"PASOE-HTTP-JSESSIONID_Cookie"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:01:32 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Template VS added</Success>\n</Response>"}],"_postman_id":"43e72d77-af7f-4443-802f-04ba05d5f1db"},{"name":"Modify a Virtual Service","id":"df48a203-c193-4594-b813-2c38f5ec0de5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&persist=src","description":"<p>You can use this command to modify the Virtual Service settings. For details about these parameters, refer to the <a href=\"#a60285d4-8ad2-4b96-a49b-628aab44fef9\">Virtual Service Parameters</a> section.</p>\n<blockquote>\n<p>Some commands depend on other commands as a prerequisite. If the prerequisites are not met, the command will do nothing.</p>\n</blockquote>\n<blockquote>\n<p>Not all parameters are applicable on all setups. The parameters available for use depends on the configured environment.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"persist","value":"src"}],"variable":[]}},"response":[{"id":"75e366d2-2737-4b4e-bea2-cd6ac572b70f","name":"Modify a Virtual Service","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&persist=src","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modvs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"persist","value":"src"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:02:52 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>1</Index>\n            <VSAddress>IP address would appear here</VSAddress>\n            <VSPort>80</VSPort>\n            <Layer>7</Layer>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>0</InterceptMode>\n            <Intercept>N</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditrelevant</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>0</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>0</ExecutingParanoia>\n            <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n            <PCRELimit>0</PCRELimit>\n            <JSONDLimit>0</JSONDLimit>\n            <BodyLimit>0</BodyLimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>N</Transparent>\n            <SubnetOriginating>Y</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <SameSite>0</SameSite>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>0</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>rr</Schedule>\n            <CheckType>http</CheckType>\n            <Persist>src</Persist>\n            <PersistTimeout>360</PersistTimeout>\n            <CheckPort>0</CheckPort>\n            <HTTPReschedule>N</HTTPReschedule>\n            <NRules>0</NRules>\n            <NRequestRules>0</NRequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>0</MasterVS>\n            <MasterVSID>0</MasterVSID>\n            <IsTransparent>2</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>0</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <AdaptivePort>0</AdaptivePort>\n            <AdaptiveInterval>0</AdaptiveInterval>\n            <AdaptiveMinPercent>0</AdaptiveMinPercent>\n            <Bandwidth>0</Bandwidth>\n            <ConnsPerSecLimit>0</ConnsPerSecLimit>\n            <RequestsPerSecLimit>0</RequestsPerSecLimit>\n            <MaxConnsLimit>0</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <ResponseStatusRemap>N</ResponseStatusRemap>\n            <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n            <EnhancedHealthChecks>N</EnhancedHealthChecks>\n            <RsMinimum>0</RsMinimum>\n            <NumberOfRSs>0</NumberOfRSs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"df48a203-c193-4594-b813-2c38f5ec0de5"},{"name":"Show a Virtual Service (using IP Address, Port, and Protocol)","id":"43612308-6efe-48a1-b8b4-88ab153f975e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showvs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp","description":"<p>Retrieve details for a specified Virtual Service (using IP Address, Port, and Protocol).</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"}],"variable":[]}},"response":[{"id":"b4225067-de35-4776-b820-d7b9f171d8dc","name":"Show a Virtual Service (using IP Address, Port, and Protocol)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showvs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","showvs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:04:03 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>1</Index>\n            <VSAddress>IP address would appear here</VSAddress>\n            <VSPort>80</VSPort>\n            <Layer>7</Layer>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>0</InterceptMode>\n            <Intercept>N</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditrelevant</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>0</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>0</ExecutingParanoia>\n            <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n            <PCRELimit>0</PCRELimit>\n            <JSONDLimit>0</JSONDLimit>\n            <BodyLimit>0</BodyLimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>N</Transparent>\n            <SubnetOriginating>Y</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <SameSite>0</SameSite>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>0</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>rr</Schedule>\n            <CheckType>http</CheckType>\n            <Persist>src</Persist>\n            <PersistTimeout>360</PersistTimeout>\n            <CheckPort>0</CheckPort>\n            <HTTPReschedule>N</HTTPReschedule>\n            <NRules>0</NRules>\n            <NRequestRules>0</NRequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>0</MasterVS>\n            <MasterVSID>0</MasterVSID>\n            <IsTransparent>2</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>0</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <AdaptivePort>0</AdaptivePort>\n            <AdaptiveInterval>0</AdaptiveInterval>\n            <AdaptiveMinPercent>0</AdaptiveMinPercent>\n            <Bandwidth>0</Bandwidth>\n            <ConnsPerSecLimit>0</ConnsPerSecLimit>\n            <RequestsPerSecLimit>0</RequestsPerSecLimit>\n            <MaxConnsLimit>0</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <ResponseStatusRemap>N</ResponseStatusRemap>\n            <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n            <EnhancedHealthChecks>N</EnhancedHealthChecks>\n            <RsMinimum>0</RsMinimum>\n            <NumberOfRSs>0</NumberOfRSs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"43612308-6efe-48a1-b8b4-88ab153f975e"},{"name":"Show a Virtual Service (using ID)","id":"f6de58ba-a7d9-4a5c-87f8-401bde6b0c1c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showvs?vs=1","description":"<p>Get the details of a the specified Virtual Service using the Virtual Service ID.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"1"}],"variable":[]}},"response":[{"id":"727a8a22-0309-44db-9cdb-86dfe994b1e0","name":"Show a Virtual Service (using ID)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showvs?vs=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","showvs"],"query":[{"key":"vs","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:05:26 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>1</Index>\n            <VSAddress>IP address would appear here</VSAddress>\n            <VSPort>80</VSPort>\n            <Layer>7</Layer>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>0</InterceptMode>\n            <Intercept>N</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditrelevant</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>0</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>0</ExecutingParanoia>\n            <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n            <PCRELimit>0</PCRELimit>\n            <JSONDLimit>0</JSONDLimit>\n            <BodyLimit>0</BodyLimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>N</Transparent>\n            <SubnetOriginating>Y</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <SameSite>0</SameSite>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>0</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>rr</Schedule>\n            <CheckType>http</CheckType>\n            <Persist>src</Persist>\n            <PersistTimeout>360</PersistTimeout>\n            <CheckPort>0</CheckPort>\n            <HTTPReschedule>N</HTTPReschedule>\n            <NRules>0</NRules>\n            <NRequestRules>0</NRequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>0</MasterVS>\n            <MasterVSID>0</MasterVSID>\n            <IsTransparent>2</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>0</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <AdaptivePort>0</AdaptivePort>\n            <AdaptiveInterval>0</AdaptiveInterval>\n            <AdaptiveMinPercent>0</AdaptiveMinPercent>\n            <Bandwidth>0</Bandwidth>\n            <ConnsPerSecLimit>0</ConnsPerSecLimit>\n            <RequestsPerSecLimit>0</RequestsPerSecLimit>\n            <MaxConnsLimit>0</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <ResponseStatusRemap>N</ResponseStatusRemap>\n            <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n            <EnhancedHealthChecks>N</EnhancedHealthChecks>\n            <RsMinimum>0</RsMinimum>\n            <NumberOfRSs>0</NumberOfRSs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"f6de58ba-a7d9-4a5c-87f8-401bde6b0c1c"},{"name":"Delete a Virtual Service (using IP Address, Port, and Protocol)","id":"fd7c98df-818e-413f-8ac2-77de6adb3654","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delvs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp","description":"<p>Delete the Virtual Service with the IP address, port, and protocol specified.</p>\n<blockquote>\n<p>Frequently adding or deleting Virtual Services at a high velocity is not the recommended best practice. If you need to modify parameters, use the <strong>modvs</strong> command. If you need to constantly modify Virtual Service IP addresses, moving to FQDNs (rather than IP addresses) is the recommended best practice.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"}],"variable":[]}},"response":[{"id":"dca46c18-f6b3-4d3f-a9b9-45f467e44ad0","name":"Delete a Virtual Service (using IP Address, Port, and Protocol)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delvs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delvs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:06:31 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"fd7c98df-818e-413f-8ac2-77de6adb3654"},{"name":"Duplicate a Virtual Service (using IP Address, Port, and Protocol)","id":"d2443f1d-72d5-4a05-83cd-d4554ef28039","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/dupvs?vs=InsertVirtualServiceIPAddress&port=8810&prot=tcp&newport=443&newvs=InsertVirtualServiceIPAddress","description":"<p>To duplicate a Virtual Service, run the <strong>dupvs</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","dupvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"8810"},{"key":"prot","value":"tcp"},{"key":"newport","value":"443"},{"key":"newvs","value":"InsertVirtualServiceIPAddress"}],"variable":[]}},"response":[{"id":"67801a73-c393-4ca3-99ed-98d2b7d5edff","name":"Duplicate a Virtual Service (using IP Address, Port, and Protocol)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/dupvs?vs=InsertVirtualServiceIPAddress&port=8810&prot=tcp&newport=443&newvs=InsertVirtualServiceIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","dupvs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"8810"},{"key":"prot","value":"tcp"},{"key":"newport","value":"443"},{"key":"newvs","value":"InsertVirtualServiceIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:14:52 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>3</Index>\n            <VSAddress>IP address would appear here</VSAddress>\n            <VSPort>443</VSPort>\n            <Layer>7</Layer>\n            <NickName>PASOE-HTTP-JSESSIONID_Cookie[1]</NickName>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>0</InterceptMode>\n            <Intercept>N</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>0</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>0</ExecutingParanoia>\n            <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n            <PCRELimit>0</PCRELimit>\n            <JSONDLimit>0</JSONDLimit>\n            <BodyLimit>0</BodyLimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>N</Transparent>\n            <SubnetOriginating>Y</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <SameSite>0</SameSite>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>1</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>lc</Schedule>\n            <CheckType>http</CheckType>\n            <Persist>cookie</Persist>\n            <PersistTimeout>360</PersistTimeout>\n            <Cookie>JSESSIONID</Cookie>\n            <CheckPort>8810</CheckPort>\n            <HTTPReschedule>N</HTTPReschedule>\n            <NRules>0</NRules>\n            <NRequestRules>0</NRequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>0</MasterVS>\n            <MasterVSID>0</MasterVSID>\n            <IsTransparent>2</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>0</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <AdaptivePort>0</AdaptivePort>\n            <AdaptiveInterval>0</AdaptiveInterval>\n            <AdaptiveMinPercent>0</AdaptiveMinPercent>\n            <Bandwidth>0</Bandwidth>\n            <ConnsPerSecLimit>0</ConnsPerSecLimit>\n            <RequestsPerSecLimit>0</RequestsPerSecLimit>\n            <MaxConnsLimit>0</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <ResponseStatusRemap>N</ResponseStatusRemap>\n            <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n            <EnhancedHealthChecks>N</EnhancedHealthChecks>\n            <RsMinimum>0</RsMinimum>\n            <NumberOfRSs>0</NumberOfRSs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"d2443f1d-72d5-4a05-83cd-d4554ef28039"},{"name":"Duplicate a Virtual Service (using ID)","id":"126cf5ec-b194-4fcf-b788-d0f6881a35ee","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/dupvs?vs=2&newport=443&newvs=InsertVirtualServiceIPAddress","description":"<p>To duplicate a Virtual Service, run the <strong>dupvs</strong> command.</p>\n<blockquote>\n<p>You can retrieve the Virtual Service ID by running the <strong>listvs</strong> command.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","dupvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"2"},{"key":"newport","value":"443"},{"key":"newvs","value":"InsertVirtualServiceIPAddress"}],"variable":[]}},"response":[{"id":"d79d7dd5-fb13-401e-9342-7ec08c31fc9c","name":"Duplicate a Virtual Service (using ID)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/dupvs?vs=2&newport=443&newvs=InsertVirtualServiceIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","dupvs"],"query":[{"key":"vs","value":"2"},{"key":"newport","value":"443"},{"key":"newvs","value":"InsertVirtualServiceIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:16:37 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>3</Index>\n            <VSAddress>IP address would appear here</VSAddress>\n            <VSPort>443</VSPort>\n            <Layer>7</Layer>\n            <NickName>PASOE-HTTP-JSESSIONID_Cookie[1]</NickName>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>0</InterceptMode>\n            <Intercept>N</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>0</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>0</ExecutingParanoia>\n            <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n            <PCRELimit>0</PCRELimit>\n            <JSONDLimit>0</JSONDLimit>\n            <BodyLimit>0</BodyLimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>N</Transparent>\n            <SubnetOriginating>Y</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <SameSite>0</SameSite>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>1</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>lc</Schedule>\n            <CheckType>http</CheckType>\n            <Persist>cookie</Persist>\n            <PersistTimeout>360</PersistTimeout>\n            <Cookie>JSESSIONID</Cookie>\n            <CheckPort>8810</CheckPort>\n            <HTTPReschedule>N</HTTPReschedule>\n            <NRules>0</NRules>\n            <NRequestRules>0</NRequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>0</MasterVS>\n            <MasterVSID>0</MasterVSID>\n            <IsTransparent>2</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>0</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <AdaptivePort>0</AdaptivePort>\n            <AdaptiveInterval>0</AdaptiveInterval>\n            <AdaptiveMinPercent>0</AdaptiveMinPercent>\n            <Bandwidth>0</Bandwidth>\n            <ConnsPerSecLimit>0</ConnsPerSecLimit>\n            <RequestsPerSecLimit>0</RequestsPerSecLimit>\n            <MaxConnsLimit>0</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <ResponseStatusRemap>N</ResponseStatusRemap>\n            <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n            <EnhancedHealthChecks>N</EnhancedHealthChecks>\n            <RsMinimum>0</RsMinimum>\n            <NumberOfRSs>0</NumberOfRSs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"126cf5ec-b194-4fcf-b788-d0f6881a35ee"}],"id":"a4f2e2e9-ddf1-4002-bb81-a4c9b319e10a","description":"<p>This section contains details about the various commands that you can run in relation to Virtual Services.</p>\n","_postman_id":"a4f2e2e9-ddf1-4002-bb81-a4c9b319e10a"},{"name":"Virtual Service Parameters","item":[{"name":"Properties","item":[],"id":"02a062e9-849f-4dc4-a850-745a871dd335","description":"<p>The table below provides details about the properties of a Virtual Service.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Range</b></p></td><td><p><b>Description</b></p></td></tr><tr><td><p>Port</p></td><td><p>I</p></td><td><p>unset</p></td><td><p>3-65530, *</p></td><td><p>The port for the Virtual Service. A wildcard port can also be specified by using an asterisk (*).</p><p>The port parameter is used to assign a port when initially creating a Virtual Service. If modifying the port of an existing Virtual Service, specify the existing port as the port parameter and use the vsport parameter to assign the new port.</p><p>The reason why these must be separate parameters is because you need to specify what the port of the existing Virtual Service is (because there may be another Virtual Service with the same IP address but a different port) and if you want to change the port, a second port parameter (VSPort) is needed to specify the new port value.</p></td></tr><tr><td><p>VSPort</p></td><td><p>I</p></td><td><p>unset</p></td><td><p>3-65530, *</p></td><td><p>The port for the Virtual Service.</p><p>The <b>port </b>parameter is used to assign a port when initially creating a Virtual Service. If modifying the port of an existing Virtual Service, specify the existing port as the <b>port </b>parameter and use the <b>vsport </b>parameter to assign the new port.</p><p>The reason why these must be separate parameters is because you need to specify what the port of the existing Virtual Service is (because there may be another Virtual Service with the same IP address but a different port) and if you want to change the port, a second port parameter (VSPort) is needed to specify the new port value.</p></td></tr><tr><td><p>Protocol</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>udp, tcp</p></td><td><p>The protocol to be used for the Virtual Service.</p></td></tr><tr><td><p>VSAddress</p></td><td><p>A</p></td><td><p>unset</p></td><td><p> </p></td><td><p>The IP address of the Virtual Service.</p></td></tr><tr><td><p>MasterVS</p></td><td><p>I (Read Only)</p></td><td><p>unset</p></td><td><p>0 – Not a parent Virtual Service</p><p>1 – Is a parent Virtual Service</p></td><td><p>Signifies whether or not the Virtual Service is a parent Virtual Service (that is, if it has one or more SubVSs).</p></td></tr></tbody></table>","event":[{"listen":"prerequest","script":{"id":"6ae804d8-f71e-4ab5-be43-88aa9540c205","type":"text/javascript","exec":[""]}},{"listen":"test","script":{"id":"0cf80a86-a7d5-4a34-b6a3-fd8476d91d32","type":"text/javascript","exec":[""]}}],"_postman_id":"02a062e9-849f-4dc4-a850-745a871dd335"},{"name":"Basic Properties","item":[],"id":"d6f5c383-50ef-4566-acc1-2f4d176a275a","description":"<p>The table below provides details about the Basic Properties of a Virtual Service.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Default</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Enable</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Y</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Activate or deactivate the Virtual Service</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>VStype</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>port-dependent</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>gen - Generic</p><p>http - HTTP/HTTPS</p><p>http2 - HTTP/2</p><p>ts - Remote Terminal</p><p>tls – STARTTLS protocols</p><p>log – Log Insight</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the type of service being load balanced.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>NickName</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the \"friendly\" name of the service.</p><p>In addition to the usual alphanumeric characters, the following ‘special’ characters can be used as part of the Service Name:</p><p>. @ - _<br /></p><p> </p><p>You cannot use a special character as the first character of the Service Name.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","_postman_id":"d6f5c383-50ef-4566-acc1-2f4d176a275a"},{"name":"Standard Options","item":[],"id":"39df505f-e983-4aac-b91a-e219d99de6d7","description":"<p>The table below provides details about the Standard Options of a Virtual Service.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Default</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Cookie</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter is only relevant when the persistence mode is set to <b>cookie</b>, <b>active-cookie</b>, <b>cookie-src</b>, or <b>active-cook-src</b>. Enter the name of the cookie to be checked.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ForceL7</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Y (if not UDP)</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabling <b>ForceL7 </b>means the Virtual Service runs at Layer 7 and not Layer 4. This may be needed for various reasons, including that only Layer 7 services can be non-transparent.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Idletime</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>660</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-86400</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the length of time (in seconds) that a connection may remain idle before it is closed. The range for this parameter is 0 to 86400.</p><p>Setting the <b>Idletime</b> to 0 ensures the default L7 connection timeout is used. You can modify the default timeout value by setting the <b>ConnTimeout </b>parameter.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Persist</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>none</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The list of relevant persist values are:</p><p>ssl</p><p>cookie</p><p>active-cookie</p><p>cookie-src</p><p>active-cook-src</p><p>cookie-hash</p><p>cookie-hash-src</p><p>url</p><p>query-hash</p><p>host</p><p>header</p><p>super</p><p>super-src</p><p>src</p><p>rdp</p><p>rdp-src</p><p>rdp-sb</p><p>rdp-sb-src</p><p>none</p><p>udpsip</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the type of persistence (stickiness) to be used for this Virtual Service.</p><p><b>Note: </b>If setting the persistence mode to an option that requires a cookie (or query-hash), the <b>cookie </b>parameter must also be set.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>SubnetOriginating</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When transparency is not enabled, the source IP address of connections to the Real Servers is that of the Virtual Service. When transparency is enabled, the source IP address will be the IP address that is initiating connection to the Virtual Service. If the Real Server is on a subnet, and the Subnet Originating Requests option is enabled, then the subnet address of the LoadMaster will be used as the source IP address.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>PersistTimeout</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-2419200</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The length of time (in seconds) after the last connection that the LoadMaster will remember the persistence information.</p><p>Timeout values are rounded down to an even number of minutes. Setting a value that is not a number of whole minutes results in the excess being ignored. Setting a value to less than 60 seconds results in a value of 0 being set, which disables persistency.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>Refreshpersist</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div>0 - Disabled<br />1 - Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>When this parameter is enabled, it keeps auto-refreshing persist entries for long lived connections.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>QueryTag</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This is the query tag to be matched if the <b>Persist </b>type is set to <b>query-hash</b>.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Schedule</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>rr</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>rr</p><p>wrr</p><p>lc</p><p>wlc</p><p>fixed</p><p>adaptive</p><p>sh</p><p>dl</p><p>sdn-adaptive</p><p>uhash</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the type of scheduling of new connections to Real Servers that is to be performed. The valid values are spelled out below:</p><p>rr = round robin</p><p>wrr = weighted round robin</p><p>lc = least connection</p><p>wlc = weighted least connection</p><p>fixed = fixed weighting</p><p>adaptive = resource based (adaptive)</p><p>sh = source IP hash</p><p>dl = weighted response time</p><p>sdn-adaptive = resource based (SDN adaptive)</p><p>uhash = URL hash</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>showadaptive</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div>This parameter allows you to get the details of Virtual Service based adaptive parameters.<br /><b>Note:</b> This parameter is only relevant if the Schedule parameter is set to adaptive.<br /><b>Note:</b> This parameter is not supported in the LTSF LoadMaster version yet.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>AdaptiveInterval</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>10</div><div><div><div><div></div></div></div><div></div></div></td><td><div>10-60</div><div><div><div><div></div></div></div><div></div></div></td><td><div>This is the interval, in seconds, at which the LoadMaster checks the load on the servers. A low value means the LoadMaster is very sensitive to load, but this comes at a cost of extra load on the LoadMaster itself. 10 seconds is a good starting value. This value must not be less than the HTTP checking interval.<br /><b>Note:</b> This parameter is only relevant if the Schedule parameter is set to adaptive.<br /><b>Note:</b> This parameter is not supported in the LTSF LoadMaster version yet.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>AdaptiveUrl</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div>The path name of the file containing the Real Server load value. The adaptive method retrieves load information from the servers using HTTP inquiry. This URL specifies the resource where the load information of the servers is stored. This resource can be either a file or program (for example Adaptive Agent) that delivers this information. The standard location is /load. It is the servers’ job to provide the current load data in this file in ASCII format. In doing so, the following must be considered:<br /><br />An ASCII file containing a value in the range of 0 to 100 in the first line where: 0=idle and 100=overloaded. As the number increases, that is, the server becomes more heavily loaded, the LoadMaster will pass less traffic to that server. Hence, it ‘adapts’ to the server loading.<br /><br />If the server becomes 101% or 102% loaded, a message is added to the logs.<br /><br />The file is set to \"/load\" by default.<br /><br />The file must be accessible using HTTP.<br /><br />The URL must be the same for all servers that are to be supported by the adaptive method.<br /><br /><b>Note:</b> This parameter is only relevant if the Schedule parameter is set to adaptive.<br /><b>Note:</b> This parameter is not supported in the LTSF LoadMaster version yet.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>AdaptivePort</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>80</div><div><div><div><div></div></div></div><div></div></div></td><td><div>3-65530</div><div><div><div><div></div></div></div><div></div></div></td><td><div>This value specifies the port number of the HTTP daemon on the servers.<br /><b>Note:</b> This parameter is only relevant if the Schedule parameter is set to adaptive.<br /><b>Note:</b> This parameter is not supported in the LTSF LoadMaster version yet.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>AdaptiveMinPercent</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>5</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0-50</div><div><div><div><div></div></div></div><div></div></div></td><td><div>This value specifies a threshold below which the balancer will switch to static weight-based scheduling, that is, normal Weighted Round Robin. The value is a percentage of the maximum load (0-50).<br /><b>Note:</b> This parameter is only relevant if the Schedule parameter is set to adaptive.<br /><b>Note:</b> This parameter is not supported in the LTSF LoadMaster version yet.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ServerInit</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-6</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>By default, the LoadMaster will not initiate a connection with a Real Server until it has received some data from a client. This prohibits certain protocols from working as they need to communicate with the Real Server before transmitting data.</p><p>If the Virtual Service uses one of these protocols, specify the protocol using the ServerInit parameter to enable it to work correctly.</p><p>0 = Normal Protocols</p><p>1 = SMTP</p><p>2 = SSH</p><p>3 = Other Server Initiating</p><p>4 = IMAP4</p><p>5 = MySQL</p><p>6 = POP3</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Transparent</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Y</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When using Layer 7, when this is enabled - the connection arriving at the Real Server appears to come directly from the client. Alternatively, the connection can be non-transparent which means that the connections at the Real Server appear to come from the LoadMaster.</p><p>If a Virtual Service (with or without a SubVS) has SSL re-encrypt enabled, the transparency flag of the Virtual Service has no meaning (re-encryption forces transparency to be off). The transparency setting can still be modified by the API, and is honored when re-encrypt is disabled on the Virtual Service.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>UseforSnat</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>N</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>By default, when the LoadMaster is being used to NAT Real Servers, the source IP address used on the Internet is that of the LoadMaster.</p><p>Enabling this option allows the Real Servers configured to use the Virtual Service as the source IP address instead.</p><p>If the Real Servers are configured on more than one Virtual Service which has this option set, only connections to destination port 80 will use this Virtual Service as the source IP address.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>QoS</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Normal Service</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Normal-Service</p><p>1 - Minimize-Cost</p><p>2 - Maximize-Reliability</p><p>4 - Maximize-Throughput</p><p>8 - Minimize-Delay</p><p>16 - Pass Through</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The Quality of Service (QoS) parameter sets a Type of Service (ToS) in the IP header of packets that leave the Virtual Service. This means that the next device or service that deals with the packets will know how to treat and prioritize this traffic. Higher priority packets are sent from the LoadMaster before lower priority packets.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>StartTLSMode</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-6</p><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 = HTTP/HTTPS (the <b>Service Type</b> needs to be set to HTTP/HTTPS for this to work)</p><p>The Virtual Service Type must be set to STARTTLS for the remaining values to be set:</p><p>1 = SMTP (STARTTLS if requested)</p><p>2 = SMTP (STARTTLS always)</p><p>3 = FTP</p><p>4 = IMAP</p><p>6 = POP3</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ExtraPorts</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>3-65530</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify extra ports that the Virtual Service will listen to. To remove any existing extra ports, set the <b>ExtraPorts </b>parameter to an empty string.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","_postman_id":"39df505f-e983-4aac-b91a-e219d99de6d7"},{"name":"SSL Properties","item":[],"id":"4d80b8e0-e679-4ad3-96ad-024947ab994b","description":"<p>The table below provides details about the SSL Properties of a Virtual Service.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Default</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>CertFile</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A list of certificate identifiers, separated by spaces. When used with the <b>addvs</b> command, all certificates required for the VS must be specified in a single space-separated list. Similarly, when using the <b>modvs</b> command, the entire list of certificates required for the VS must be specified.</p><p>There is a limit of 8099 characters when assigning certificates to a Virtual Service using the API.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Ciphers</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Default assignment</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>All supported ciphers</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Multiple ciphers can be assigned by inserting a colon between each cipher. When ciphers are assigned in this way, a <b>Cipher Set </b>called <b>Custom_</b> will be created/updated.</p><p><b>Note:</b> The assigned ciphers list will be overwritten when ciphers are added in this way. Ensure to include all ciphers to be assigned.</p><p><b>Note:</b> Do not try to set the <b>CipherSet </b>parameter and the <b>Ciphers </b>parameter at the same time - use one or the other. Custom cipher sets can be created using a different command. For more information, refer to the<a href=\"#1c7cb631-41a6-4231-9029-4a268427b81f\">Modify a Custom Cipher Set/Create a New Custom Cipher Set</a>section.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>CipherSet</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Default</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>All available cipher sets</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter can be used to assign a cipher set to a Virtual Service. System-defined cipher sets and custom cipher sets can be assigned using this parameter. The valid values are below:</p><ul><li><p>Default</p></li><li><p>Default_NoRc4</p></li><li><p>BestPractices</p></li><li><p>Intermediate_compatibility</p></li><li><p>Backward_compatibility</p></li><li><p>WUI</p></li><li><p>FIPS</p></li><li><p>Legacy</p></li><li><p>Null_Ciphers</p></li><li><p>ECDSA_Default</p></li><li><p>ECDSA_BestPractices</p></li></ul><p>Do not try to set the CipherSet parameter and the Ciphers parameter at the same time - use one or the other. Custom cipher sets can be created using a different command. For more information, refer to the <b>Modify a Custom Cipher Set/Create a New Custom Cipher Set</b> section.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>Tls13CipherSet</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div>All TLS1.3 available cipher sets</div><div><div><div><div></div></div></div><div></div></div></td><td><div>You can use this parameter to assign TLS1.3 cipher sets to a Virtual Service. You can specify multiple ciphers using a space or colon-separated list. You cannot unset this parameter - at least one cipher set must be specified.<br />The list of supported TLS1.3 Ciphers (and valid values) is as follows:<br />- TLS_AES_256_GCM_SHA384<br />- TLS_CHACHA20_POLY1305_SHA256<br />- TLS_AES_128_GCM_SHA256<br />- TLS_AES_128_CCM_8_SHA256<br />- TLS_AES_128_CCM_SHA256<br /><b>Note:</b> The <b>Tls13CipherSet</b> parameter is not supported in the LTSF LoadMaster version yet.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ClientCert</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-6</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 = No client certificates required</p><p>1 = Client certificates required</p><p>2 = Client certificates and add headers</p><p>3 = Client Certificates and pass DER through as SSL-CLIENT-CERT</p><p>4 = Client Certificates and pass DER through as X-CLIENT-CERT</p><p>5 = Client Certificates and pass DER through as SSL-CLIENT-CERT</p><p>6 = Client Certificates and pass PEM through as X-CLIENT-CERT</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>PassCipher</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>When this parameter is enabled, the LoadMaster adds X-SSL headers containing client SSLinformation such as TLS version, TLS cipher, client certificate serial number, and SNI host.<br /><b>Note: SSLAcceleration </b>must be enabled to enable the <b>PassCipher </b>parameter.<br /></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>SSLReencrypt</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>N</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter is only relevant if <b>SSL Acceleration</b> is enabled.</p><p>When this option is enabled, the SSL data stream is re-encrypted before sending to the Real Server.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>PassSNI</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enable or disable the <b>PassSNI </b>parameter.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>SSLReverse</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>N</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabling this parameter means that the data from the LoadMaster to the Real Server is re-encrypted.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>SSLRewrite</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset, http, https</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When the Real Server rejects a request with a HTTP redirect, the requesting Location URL may need to be converted to specify HTTPS instead of HTTP (and vice versa).</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ReverseSNIHostname</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><br />Specify the SNI Hostname that should be used when connecting to the Real Servers. This parameter relates to the <b>Reencryption SNI Hostname</b> field in the UI.<br /></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>SecurityHeaderOptions</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0 - Don't add the Strict Transport Security Header</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Don't add the Strict Transport Security Header</p><p>1 - Add the Strict Transport Security Header - no subdomains</p><p>2 - Add the Strict Transport Security Header - include subdomains</p><p>4 - Add the Strict Transport Security Header - no subdomains + preload<br />6 - Add the Strict Transport Security Header - include subdomains + preload</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enable this option to add the Strict-Transport-Security header to all LoadMaster-generated messages (ESP and error messages).</p><p><b>Note:</b> You can configure the maximum age for the message by setting the <b>SecurityHeaderAge</b> parameter.</p><p>To retrieve the current value of the <b>SecurityHeaderAge</b> parameter, run the <b>get </b>command with the <b>param </b>value set to <b>securityheaderage</b></p><p>To set the parameter, run the set command.</p><p>Valid values for this parameter range from <b>86400</b> (1 day) to <b>94608000 </b>(2 years).</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>SSLAcceleration</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>N</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enable SSL handling on this Virtual Service.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>OCSPVerify</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Verify (using Online Certificate Status Protocol (OCSP)) that the client certificate is valid.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>TLSType</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled if SSL Acceleration is not enabled.</p><p>TLS1.1, TLS1.2, and TLS1.3 are enabled when SSL Acceleration is enabled.</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – 30 bitmask</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify which of the following protocols to support; SSLv3, TLS1.0, TLS1.1, TLS1.2, or TLS1.3. The protocols can be enabled and disabled using a bitmask value. Refer to the table below to find out what number corresponds to which settings.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>NeedHostName</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When this parameter is enabled, the hostname is always required to be sent in the TLS client hello message. If it is not sent, the connection will be dropped.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>IntermediateCerts</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div>By default, all intermediate certificates are assigned</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Valid cert names</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Assign intermediate and root certificates to the specified Virtual Service. This provides the ability to restrict access. You cannot add a certificate to an already assigned list of certificates - all certificates that should be assigned to the Virtual Service must be specified in the one <b>modvs</b> command. If you enter more than one certificate name, separate them using a plus symbol (<b>+</b>).</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>\n\n<p>For the <strong>TLSType</strong> parameter, the protocols can be enabled and disabled using a bitmask value.</p>\n<p>The valid bitmask values vary depending on whether the <strong>SSLOldLibraryVersion</strong> parameter is enabled or disabled. Refer to the relevant section below to find out what number corresponds to which settings.</p>\n<p><strong>SSLOldLibraryVersion Disabled</strong><br />If the <strong>SSLOldLibraryVersion</strong> parameter is disabled, the bitmask values and settings are as outlined in the table below:</p>\n<table><tbody><tr><td><div><b>Number</b></div><div><div><div><div></div></div></div><div></div></div></td><td><div><b>SSLv3</b></div><div><div><div><div></div></div></div><div></div></div></td><td><div><b>TLS1.0</b></div><div><div><div><div></div></div></div><div></div></div></td><td><div><b>TLS1.1</b></div><div><div><div><div></div></div></div><div></div></div></td><td><div><b>TLS1.2</b></div><div><div><div><div></div></div></div><div></div></div></td><td><div><b>TLS1.3</b></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><br />0<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><br />1<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><br />2<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><br />3<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><br />4<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><br />5<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><br />6<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><br />7<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><br />8<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><br />9<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><br />10<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><br />11<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><br />12<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><br />13<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><br />14<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Disabled<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div><br />Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>15</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>16</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>17</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>18</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>19</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>20</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>21</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>22</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>23</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>24</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>25</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>26</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>27</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>28</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>29</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>30</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>\n\n<p><strong>SSLOldLibraryVersion Enabled</strong><br />If the <strong>SSLOldLibraryVersion</strong> parameter is enabled, <strong>TLS1.3</strong> is not available and the range of the bitmask value is 0-14, as outlined in the table below.</p>\n<table><tbody><tr><td><div><p><b>Number</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>SSLv3</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>TLS1.0</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>TLS1.1</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>TLS1.2</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>0</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>1</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>2</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>3</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>4</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>5</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>6</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>7</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>8</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>9</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>10</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>11</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>12</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>13</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>14</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>\n\n<p>Another way of determining the correct bitmask value to set for the <strong>TLSType</strong> parameter is outlined in the partial table and explanation below.</p>\n<table><tbody><tr><td><div><p><b>Dec Bit Values</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>16</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>8</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>4</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>2</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>1</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Values Set</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div><b>TLS1.3</b></div><div><div><div><div></div></div></div><div></div></div></td><td><div><b>TLS1.2</b></div><div><div><div><div></div></div></div><div></div></div></td><td><div><b>TLS1.1</b></div><div><div><div><div></div></div></div><div></div></div></td><td><div><b>TLS1.0</b></div><div><div><div><div></div></div></div><div></div></div></td><td><div><b>SSLv3</b></div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>0</div><div><div><div><div></div></div></div><div></div></div></td><td><div>off</div><div><div><div><div></div></div></div><div></div></div></td><td><div>off</div><div><div><div><div></div></div></div><div></div></div></td><td><div>off</div><div><div><div><div></div></div></div><div></div></div></td><td><div>off</div><div><div><div><div></div></div></div><div></div></div></td><td><div>off</div><div><div><div><div></div></div></div><div></div></div></td><td><div>All TLS types enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>3</div><div><div><div><div></div></div></div><div></div></div></td><td><div>off</div><div><div><div><div></div></div></div><div></div></div></td><td><div>off</div><div><div><div><div></div></div></div><div></div></div></td><td><div>off</div><div><div><div><div></div></div></div><div></div></div></td><td><div>on</div><div><div><div><div></div></div></div><div></div></div></td><td><div>on</div><div><div><div><div></div></div></div><div></div></div></td><td><div>1.1,1.2,1.3 enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>23</div><div><div><div><div></div></div></div><div></div></div></td><td><div>on</div><div><div><div><div></div></div></div><div></div></div></td><td><div>off</div><div><div><div><div></div></div></div><div></div></div></td><td><div>on</div><div><div><div><div></div></div></div><div></div></div></td><td><div>on</div><div><div><div><div></div></div></div><div></div></div></td><td><div>on</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Only TLS1.2 enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>15</div><div><div><div><div></div></div></div><div></div></div></td><td><div>off</div><div><div><div><div></div></div></div><div></div></div></td><td><div>on</div><div><div><div><div></div></div></div><div></div></div></td><td><div>on</div><div><div><div><div></div></div></div><div></div></div></td><td><div>on</div><div><div><div><div></div></div></div><div></div></div></td><td><div>on</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Only TLS1.3 enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>\n\n<p>Here are some notes about the above table:</p>\n<p>* For all TLS types that you want to enable, you leave the bit off and turn on the rest<br />* A value of 31 is not possible (all bits on) because you would be disabling all TLS types so valid values are 0 - 30<br />* When TLS1.3 is not available (if the <strong>SSLOldLibraryVersion</strong> is enabled) then the range becomes 0 - 15. However, 15 is not a valid value so the valid range is 0 - 14</p>\n<p>Another way of thinking about this is by adding 16+8+4+2+1=31 and then whatever TLS type you want on, you subtract from 31.<br />If TLS 1.3 is not available, then you leave out the TLS 1.3 column above and add 8+4+2+1.</p>\n","_postman_id":"4d80b8e0-e679-4ad3-96ad-024947ab994b"},{"name":"Advanced Properties","item":[{"name":"Upload an Error File","item":[{"name":"Upload an Error File","id":"c824b5a8-f89d-4f11-ae2e-5d6170e34e44","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/uploadvserrfile?data=InsertBase64-EncodedString&vs=2","description":"<p>To upload an error file using the RESTful API, run the <strong>uploadvserrfile</strong> command.</p>\n<blockquote>\n<p>If a command requires binary data (file uploads), this data must be passed in the \"data\" string and be base64-encoded.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","uploadvserrfile"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"data","value":"InsertBase64-EncodedString"},{"key":"vs","value":"2"}],"variable":[]}},"response":[{"id":"ff41c9fa-1ae0-491e-a364-3349fdb88e76","name":"Upload an Error File","originalRequest":{"method":"POST","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/uploadvserrfile?data=InsertBase64-EncodedString&vs=2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","uploadvserrfile"],"query":[{"key":"data","value":"InsertBase64-EncodedString"},{"key":"vs","value":"2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:18:25 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Error file, uploaded successfully</Success>\n</Response>"}],"_postman_id":"c824b5a8-f89d-4f11-ae2e-5d6170e34e44"}],"id":"5c41f841-d5c9-49f3-8f74-75066822e4eb","description":"<p>As of LoadMaster firmware version 7.2.52, it is possible to upload an error file to be sent with a Virtual Service error response.</p>\n","_postman_id":"5c41f841-d5c9-49f3-8f74-75066822e4eb"},{"name":"Verify Parameter","item":[],"id":"121ed619-f135-43d5-972a-4eb82da02060","description":"<p><strong>Verify</strong> is a bitmask. The valid values of the <strong>Verify</strong> parameter are as follows:</p>\n<ul>\n<li><p>Bit 0: set this to <strong>1</strong> to enable detection intrusion</p>\n<blockquote>\n<p>Bit 0 must be set to <strong>1</strong> to use the other two bits.</p>\n</blockquote>\n</li>\n<li><p>Bit 1 determines whether to reject or drop a connection. Setting it to 1 will drop the connection.</p>\n</li>\n<li><p>Bit 2 determines whether to give just warnings on bad requests or also on malicious (but not invalid) requests.</p>\n<blockquote>\n<p>Bits 3 to 7 cannot be set – an error message displays if you try to do this.</p>\n</blockquote>\n</li>\n</ul>\n<p>The following table lists the valid integers and the values they set the fields to when used:</p>\n<table><tbody><tr><td><p><b>Integer</b></p></td><td><p><b>Detect Malicious Requests</b></p></td><td><p><b>Intrusion Handling</b></p></td><td><p><b>Warnings Checkbox</b></p></td></tr><tr><td><p>0</p></td><td><p>Disabled</p></td><td><p>N/A</p></td><td><p>N/A</p></td></tr><tr><td><p>1</p></td><td><p>Enabled</p></td><td><p>Drop Connection</p></td><td><p>Unchecked</p></td></tr><tr><td><p>2</p></td><td><p>Enabled</p></td><td><p>Send Reject</p></td><td><p>Unchecked</p></td></tr><tr><td><p>3</p></td><td><p>Enabled</p></td><td><p>Send Reject</p></td><td><p>Unchecked</p></td></tr><tr><td><p>4</p></td><td><p>Enabled</p></td><td><p>Drop Connection</p></td><td><p>Checked</p></td></tr><tr><td><p>5</p></td><td><p>Enabled</p></td><td><p>Drop Connection</p></td><td><p>Checked</p></td></tr><tr><td><p>6</p></td><td><p>Enabled</p></td><td><p>Send Reject</p></td><td><p>Checked</p></td></tr><tr><td><p>7</p></td><td><p>Enabled</p></td><td><p>Send Reject</p></td><td><p>Checked</p></td></tr></tbody></table>\n\n<blockquote>\n<p>You cannot set the <strong>Verify</strong> parameter to a value above 7. The maximum value is 7.</p>\n</blockquote>\n","_postman_id":"121ed619-f135-43d5-972a-4eb82da02060"}],"id":"d890b577-8d7d-4663-895e-949bfca71c16","description":"<p>The table below provides details about the Advanced Properties of a Virtual Service.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Default</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>HTTPReschedule</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0 - Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0 - Disabled<br />1 - Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>The <b>HTTPReschedule</b> parameter is only relevant if the Virtual Service <b>prot</b> is set to <b>tcp</b> and the <b>VStype</b> is set to <b>http</b>.<br />If this parameter is enabled and content switching is not in use, this forces the reselection of a Real Server for each request. By default, the Real Server is selected only once per connection.<br />You cannot enable the <b>HTTPReschedule</b> parameter if the <b>AllowHTTP2</b> parameter is enabled.<br /><b>Note:</b> The <b>HTTPReschedule</b> parameter is not supported in the LTSF LoadMaster version yet.<br />The <b>Persist </b>parameter must be set to <b>none </b>to use the <b>HTTPReschedule </b>parameter.<br /></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>CopyHdrFrom</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This is the name of the source header field to copy into the new header field before the request is sent to the Real Servers.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>CopyHdrTo</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Used in conjunction with the <b>CopyHdrFrom </b>parameter.</p><p>The name of the header field into which the source header is to be copied.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>AddVia</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 = Legacy Operation(X-Forwarded-For)</p><p>1 = X-Forwarded-For (+ Via)</p><p>2 = None</p><p>3 = X-ClientSide (+ Via)</p><p>4 = X-ClientSide (No Via)</p><p>5 = X-Forwarded-For (No Via)</p><p>6 = Via Only</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This corresponds to the <b>Add HTTP Headers</b> field in the UI. Select which headers are to be added to HTTP requests. X-ClientSide and X-Forwarded-For are only added to non-transparent connections.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>AllowHTTP2</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enable HTTP2 for this Virtual Service. SSL Acceleration must be enabled before HTTP2 can be enabled. The <b>BestPractices </b>cipher set should be used when HTTP2 is enabled.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Cache</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>N</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Caching Disabled</p><p>1 – Caching Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enable or disable the caching of URLs.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Compress</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>N</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When enabled, files sent from the LoadMaster are compressed with Gzip.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>CachePercent</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-100</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter is only relevant if caching is enabled. Specify the maximum percentage of cache space permitted for this Virtual Service.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>DefaultGW</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the Virtual Service-specific default gateway to be used and to send responses back to clients. If not set, the global default gateway will be used.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ErrorCode</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>200-505</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>If no Real Servers are available, the LoadMaster can terminate the connection with an HTTP error code. Specify the error code number in this parameter. To unset the error code, set the parameter to an empty string.</p><p>In LoadMaster firmware version 7.2.52 it is possible to upload an error file using the API to add to the error response. For further details, refer to the<a href=\"#b70792c3-fd38-4392-a5c9-4532b3b3c5e5\">Upload Error File</a>section.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ErrorUrl</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When no Real Servers are available and an error response is sent back to the client, a redirect URL can also be specified.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>PortFollow</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 and 3-65530</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter was depreciated as of 7.1-24. For LoadMasters with version 7.1-24 or higher, use the <b>FollowVSID </b>parameter to set port following.</p><p>Specify the ID of the Virtual Service to follow. Setting this value to 0 disables port following. 1 and 2 are not valid values so ensure that the Virtual Service that you want to follow has a value between 3 and 65530.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>FollowVSID</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the ID of the Virtual Service to follow.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>LocalBindAddrs</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A space separated list of IP addresses</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This corresponds to the <b>Alternate Source Address</b> in the <b>Advanced Properties</b> section of the UI. <b>Allow connections scaling over 64K Connections </b>needs to be enabled in <b>L7 Configuration</b> for this feature to work.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>NRequestRules</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I (Read only)</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This displays the number of HTTP Header Modification request rules.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>NResponseRules</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I (Read only)</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This displays the number of HTTP Header Modification response rules.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>RequestRules</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>List (Read only)</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The list of request rules that are assigned to the Virtual Service.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ResponseRules</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>List (Read only)</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The list of response rules that are assigned to the Virtual Service.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>StandbyAddr</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the IP address of the “Sorry” server that is to be used when no other Real Servers are available. This server will not be health checked and is assumed to be always available.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>StandbyPort</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the port of the “Sorry” server.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Non_local</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Set this parameter to 1 (enabled) if you are adding a non-local sorry server using the <b>StandByAddr</b> and <b>StandByPort</b> parameters.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Verify</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-7 (bitmask)</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Refer to the <a href=\"#74f06838-dcc7-4283-8409-9dc915addc81\">Verify Parameter </a>section for further information on the <b>Verify </b>parameter.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>AltAddress</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>IP address</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the alternate address for this Virtual Service.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>AddVia</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-6</p><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify which headers to be added to HTTP requests. X-ClientSide and X-Forwarded-For are only added to non-transparent connections.</p><p>0 = Legacy Operation(X-Forwarded-For)</p><p>1 = X-Forwarded-For (+ Via)</p><p>2 = None</p><p>3 = X-ClientSide (+ Via)</p><p>4 = X-ClientSide (No Via)</p><p>5 = X-Forwarded-For (No Via)</p><p>6 = Via Only</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>PreProcPrecedence</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter should be used in conjunction with <b>PreProcPrecedencePos</b>. This parameter is used to specify the name of the existing rule whose position you wish to change.</p><p>This parameter relates to <b>Content Matching Rules </b>only.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>PreProcPrecedencePos</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Int16</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter, in conjunction with the <b>PreProcPrecedence</b> parameter, is used to change the position of the rule in a sequence of rules. For example, a position of 2 means the rule will be checked second.</p><p>This parameter relates to the <b>Content Matching Rules</b> only.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>RequestPrecedence</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>String</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter should be used in conjunction with <b>RequestPrecedencePos</b>. This parameter is used to specify the name of the existing request rule whose position you wish to change.</p><p>This parameter relates to the following rule types:</p><p>Content Matching</p><p>Add Header</p><p>Delete Header</p><p>Replace Header</p><p>Modify URL</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>RequestPrecedencePos</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Int16</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter, in conjunction with the <b>RequestPrecedence</b> parameter, is used to change the position of the rule in a sequence of rules. For example, a position of <b>2</b> means the rule will be checked second.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ResponsePrecedence</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>String</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter should be used in conjunction with <b>ResponsePrecedencePos</b>. This parameter is used to specify the name of the existing response rule whose position you wish to change.</p><p>This parameter relates to the following rule types:</p><p>Content Matching</p><p>Add Header</p><p>Delete Header</p><p>Replace Header<br /></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ResponsePrecedencePos</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Int16</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter, in conjunction with the <b>ResponsePrecedence</b> parameter, is used to change the position of the rule in a sequence of rules. For example, a position of <b>2</b> means the rule will be checked second.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>MatchBodyPrecedence</div><div><div><div><div></div></div></div><div></div></div></td><td><div>String</div><div><div><div><div></div></div></div><div></div></div></td><td><div>unset</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter should be used in conjunction with <b>MatchBodyPrecedencePos</b>. Use this parameter to specify the name of the existing body modification rule that you want to change the position of.</p><p>This parameter relates to <b>Body Modification</b> rules only.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>MatchBodyPrecedencePos</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Int16</div><div><div><div><div></div></div></div><div></div></div></td><td><div>unset</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div>Use this parameter, in conjunction with the <b>MatchBodyPrecedence</b> parameter, to change the position of the rule in a sequence of rules. For example, a position of <b>2</b> means the rule is checked second.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>ResponseStatusRemap</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div>0 - Disabled 1 - Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>When this parameter is enabled, all error messages coming from the Real Servers are blocked and a simplified standard error message is generated. The text of this message is encoded in JSON and contains a { \"status\" : , \"message\": }, where status is the response code coming from the Real Server (unless this has been changed in the error response mappings) and the message string is the standard message text for that error message (as defined here:<a href=\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Status\">HTTP response status code</a>).<br /><b>Note:</b> This parameter is not supported in the LTSF LoadMaster version yet.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>ResponseRemapMsgMap</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Use this parameter to edit the response text for response codes. For example:<br /><b>ResponseRemapMsgMap=300: Example+Updated+Message</b><br />You can also configure the response text for multiple response codes. For example:<br /><b>ResponseRemapMsgMap=300: Example+Updated+Message,301:Testing+response</b><br /><br /><b>Note:</b> This parameter is not supported in the LTSF LoadMaster version yet.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>ResponseRemapMsgFormat</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div>0 - JSON<br />1 - XML<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div>This parameter allows you to select the response code text format.<br /><b>Note:</b> This parameter is not supported in the LTSF LoadMaster version yet.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>ResponseRemapCodeMap</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div>This parameter is used to map the error codes. A combination of <b>Response Codes from Server</b> and <b>Response Code to Client</b> is specified using a space or comma separated list. For example:<br /><b>ResponseRemapMap=403:400,404:400</b><br />Each server response code can only be mapped once per Virtual Service. However, you can map multiple different server response codes to the same client response code. For example, you can map errors 404 and 403 to error 400.<br />Note: Setting a value for the <b>ResponseRemapCodeMap</b> command overrides previously configured values.<br /><b>Note:</b> This parameter is not supported in the LTSF LoadMaster version yet.</div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","_postman_id":"d890b577-8d7d-4663-895e-949bfca71c16"},{"name":"WAF Settings","item":[{"name":"WAF InterceptOpts Parameter","item":[],"id":"959a42ec-c26d-4eb4-9888-b81ececa7cb3","description":"<p>The WAF <strong>InterceptOpts</strong> parameter is a special parameter – it can be used to set the value for multiple fields, rather than just one field as with most other parameters. The <strong>InterceptOpts</strong> parameter allows the specification of most of the fields in the <strong>WAF Options</strong> section of the Virtual Service modify screen in the LoadMaster UI.</p>\n<blockquote>\n<p>To enable WAF, set the <strong>Intercept</strong> parameter to <strong>1</strong>.</p>\n</blockquote>\n<p>The names of the specific UI fields that the <strong>InterceptOpts</strong> parameter is related to, are listed in the table below.</p>\n<p>One or more field values can be set in one command. Multiple values can be set in the one command by separating the values with a semi-colon, for example:</p>\n<p><code>\"InterceptOpts\": \"opnormal;auditnone;reqdataenable;resdataenable;jsondisable;xmldisable\"</code></p>\n<p>The table below outlines what each of the values mean.</p>\n<blockquote>\n<p>The values that are related to the same UI option are mutually exclusive. For example, you cannot set <strong>Basic Operation</strong> to both <strong>opnormal</strong> and <strong>opblock</strong>.</p>\n</blockquote>\n<table><tbody><tr><td><p><b>Value</b></p></td><td><p><b>Related UI Option</b></p></td><td><p><b>Default</b></p></td><td><p><b>Meaning</b></p></td></tr><tr><td><p>opnormal</p></td><td><p><b>Default Operation</b></p></td><td><p>Audit Only</p></td><td><p>Set the <b>Basic Operation </b>to <b>Audit Only</b></p></td></tr><tr><td><p>opblock</p></td><td><p><b>Default Operation</b></p></td><td><p>Audit Only</p></td><td><p>Set the <b>Basic Operation </b>to <b>Block Mode</b></p></td></tr><tr><td><p>auditnone</p></td><td><p><b>Audit mode</b></p></td><td><p>No Audit</p></td><td><p>Set the <b>Audit mode </b>to <b>No Audit</b>. No data is logged.</p></td></tr><tr><td><p>auditrelevant</p></td><td><p><b>Audit mode</b></p></td><td><p>No Audit</p></td><td><p>Set the <b>Audit mode </b>to <b>Audit Relevant</b>. Logs data which is of a warning level and higher.</p></td></tr><tr><td><p>auditall</p></td><td><p><b>Audit mode</b></p></td><td><p>No Audit</p></td><td><p>Set the <b>Audit mode</b> to <b>Audit All</b>. Logs all data through the Virtual Service.</p><p>The <b>Audit All </b>option is not recommended for use in normal operation. <b>Audit All </b>should only be used when troubleshooting a specific problem.</p></td></tr><tr><td><p>reqdataenable</p></td><td><p><b>Inspect HTML POST Request Content</b></p></td><td><p>Disabled</p></td><td><p>Enable the <b>Inspect HTML POST Request Content </b>option</p></td></tr><tr><td><p>reqdatadisable</p></td><td><p><b>Inspect HTML POST Request Content</b></p></td><td><p>Disabled</p></td><td><p>Disable the <b>Inspect HTML POST Request Content </b>option</p></td></tr><tr><td><p>resdataenable</p></td><td><p><b>Process Response Data</b></p></td><td><p>Disabled</p></td><td><p>Enable the <b>Process Response Data</b> option</p></td></tr><tr><td><p>resdatadisable</p></td><td><p><b>Process Response Data</b></p></td><td><p>Disabled</p></td><td><p>Disable the <b>Process Response Data</b> option</p></td></tr><tr><td><p>jsondisable</p></td><td><p><b>Enable JSON Parser</b></p></td><td><p>Enabled</p></td><td><p>Disable the JSON parser.</p><p>This option is only relevant if the <b>Inspect HTML POST Request Content</b> option is enabled.</p></td></tr><tr><td><p>jsonenable</p></td><td><p><b>Enable JSON Parser</b></p></td><td><p>Enabled</p></td><td><p>Enable the JSON parser.</p><p>This option is only relevant if the <b>Inspect HTML POST Request Content </b>option is enabled.</p></td></tr><tr><td><p>xmldisable</p></td><td><p><b>Enable XML Parser</b></p></td><td><p>Enabled</p></td><td><p>Disable the XML parser.</p><p>This option is only relevant if the<b> Inspect HTML POST Request Content </b>option is enabled.</p></td></tr><tr><td><p>xmlenable</p></td><td><p><b>Enable XML Parser</b></p></td><td><p>Enabled</p></td><td><p>Enable the XML parser.</p><p>This option is only relevant if the <b>Inspect HTML POST Request Content</b> option is enabled.</p></td></tr><tr><td>otherctypesdisable</td><td><b>Enable Other Content Types</b></td><td>Disabled</td><td>Disable verification of POST content types (other than XML/JSON).</td></tr><tr><td><p>otherctypesenable</p></td><td><p><b>Enable Other Content Types</b></p></td><td><p>Disabled</p></td><td><p>Enable verification of POST content types (other than XML/JSON).</p><p>Enabling the inspection of any other content types may increase system resource utilization (CPU and memory). A specific list of content types should be considered.</p><p>When this option is enabled, the <b>InterceptPOSTOtherContentTypes</b> parameter can be used to enter a comma-separated list of POST content types allowed for WAF analysis. By default, all types (other than XML/JSON) are enabled.</p></td></tr></tbody></table>","_postman_id":"959a42ec-c26d-4eb4-9888-b81ececa7cb3"},{"name":"Assign a WAF Rule to a Virtual Service","id":"f9d588d3-80d3-44d2-902c-548b5ae3c095","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/vsaddwafrule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=G/ip_reputation","description":"<p>All rules for a particular WAF ruleset can be assigned to a Virtual Service by running the <b>vsaddwafrule</b> command.</p>\n<p>The <b>rule</b> name must be preceded with the relevant letter or word and a forward slash. The letter/word used depends on the type of rule being added:</p>\n<blockquote>\n<p>This is case sensitive. The letter/word needs to be in in the correct case (as per the case used in this document below) for the command to work.</p>\n</blockquote>\n<ul>\n<li>C or Custom</li>\n<li>Z  or ApplicationGeneric</li>\n<li>A or ApplicationSpecific</li>\n<li>G or Generic</li>\n</ul>\n\n<blockquote>\n<p>All parameters listed in the example command are required for the <b>vsaddwafrule</b> command. If any of the parameters is omitted, a <b>String value missing</b> error will be displayed.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","vsaddwafrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"G/ip_reputation"}],"variable":[]}},"response":[{"id":"c77c0bac-b67f-486f-8a2f-ee681b5fc000","name":"Assign a WAF Rule to a Virtual Service","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/vsaddwafrule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=G/ip_reputation","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","vsaddwafrule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"G/ip_reputation"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 14:53:42 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"f9d588d3-80d3-44d2-902c-548b5ae3c095"},{"name":"Add Multiple WAF Rules to a Virtual Service","id":"8948a57c-7fbf-41b0-ac2f-48bf6d618a9e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/vsaddwafrule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=G/malware_detection%20G/known_vulns","description":"<p>Multiple rules can be assigned in the same command by separating them with a space (or <b>%20</b>).</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","vsaddwafrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"G/malware_detection%20G/known_vulns"}],"variable":[]}},"response":[{"id":"0f93ef19-84df-4a45-8b23-a3c302b7e51d","name":"Add Multiple WAF Rules to a Virtual Service","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/vsaddwafrule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=G/malware_detection%20G/known_vulns","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","vsaddwafrule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"G/malware_detection%20G/known_vulns"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 14:56:21 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"8948a57c-7fbf-41b0-ac2f-48bf6d618a9e"},{"name":"View a List of Rule and Rule IDs for an Active Ruleset","id":"acfdb8d9-b308-48b9-9f08-b0669575eaf6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/vslistwafruleids?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=G/malware_detection","description":"<p>View a list of rules and rule IDs for an active ruleset by running the <b>vslistwafruleids</b> command. </p>\n<p>A list of rules and their IDs will be displayed for the specified ruleset.</p>\n<p>The ID is the number displayed before the rule name.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","vslistwafruleids"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"G/malware_detection"}],"variable":[]}},"response":[{"id":"517e1d1e-76cd-49bc-bc19-0e0ec998b6c7","name":"View a List of Rule and Rule IDs for an Active Ruleset","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/vslistwafruleids?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=G/malware_detection","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","vslistwafruleids"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"G/malware_detection"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 14:58:34 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <malware_detection>\n                <ActiveRule1>2200001:MALICIOUS_CODE:SLR: Known Malicious Code Detected in Response Data.</ActiveRule1>\n                <ActiveRule2>2200005:application-magento:SLR: Magecart Related Code Detected in Response Body</ActiveRule2>\n                <ActiveRule3>2200006:application-magento:SLR: Magecart Related Strings/Patterns Detected in Response Body</ActiveRule3>\n            </malware_detection>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"acfdb8d9-b308-48b9-9f08-b0669575eaf6"},{"name":"Add a Ruleset with Specific Rules Disabled","id":"8ad633f7-b3a3-4e35-b95e-58c7c95a233e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/vsaddwafrule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=G/malware_detection&disablerules=2200005,2200006","description":"<p>When adding a ruleset, you can specify the specific rules to not enable within the ruleset by specifying the rule IDs to not enable.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","vsaddwafrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"G/malware_detection"},{"key":"disablerules","value":"2200005,2200006"}],"variable":[]}},"response":[{"id":"d2c3d414-bb2a-49fb-9cfe-781fc2ff2995","name":"Add a Ruleset with Specific Rules Disabled","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/vsaddwafrule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=G/malware_detection&disablerules=2200005,2200006","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","vsaddwafrule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"G/malware_detection"},{"key":"disablerules","value":"2200005,2200006"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 15:00:43 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"8ad633f7-b3a3-4e35-b95e-58c7c95a233e"},{"name":"Disable a Specific Rule (or Rules)","id":"9fbbae18-c767-439b-9e74-284631d3d58a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/vsaddwafrule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=&disablerules=2200005,2200006","description":"<p>To disable a specific rule (or rules) (and not an entire ruleset), run the <strong>vsaddwafrule</strong> command with a blank <strong>rule</strong> parameter.</p>\n<p><strong>Related UI Item</strong></p>\n<p>Virtual Services &gt; View/Modify Services &gt; Modify &gt; WAF Options &gt; Manage Rules</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","vsaddwafrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":""},{"key":"disablerules","value":"2200005,2200006"}],"variable":[]}},"response":[{"id":"144e228e-bac6-47a2-bebf-f831bb576b8c","name":"Disable a Specific Rule (or Rules)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/vsaddwafrule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=&disablerules=2200005,2200006","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","vsaddwafrule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":""},{"key":"disablerules","value":"2200005,2200006"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 15:03:53 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"9fbbae18-c767-439b-9e74-284631d3d58a"},{"name":"Unassign a WAF Rule from a Virtual Service","id":"445c2103-24e9-4610-9df6-795673a82f10","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/vsremovewafrule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=G/ip_reputation","description":"<p>A WAF rule can be unassigned from a Virtual Service by running the <strong>vsremovewafrule</strong> command. This command relate to the <strong>Available Rules</strong> and <strong>Assigned Rules</strong> fields in the Virtual Service modify screen in the UI.</p>\n<p>The <strong>rule</strong> name must be preceded with the relevant letter or word and a forward slash. The letter/word used depends on the type of rule being added:</p>\n<ul><li><p>C or Custom</p></li><li><p>Z or ApplicationGeneric</p></li><li><p>A or ApplicationSpecific</p></li><li><p>G or Generic</p></li></ul>\n\n<blockquote>\n<p>All parameters listed in the example command are required for the <strong>vsremovewafrule</strong> command. If any of the parameters is omitted, a <strong>String value missing</strong> error will be displayed.</p>\n</blockquote>\n<p><strong>Related UI Item</strong></p>\n<p>Virtual Services &gt; View/Modify Services &gt; Modify &gt; WAF Options &gt; Manage Rules</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","vsremovewafrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"G/ip_reputation"}],"variable":[]}},"response":[{"id":"452f596e-8f45-4899-b89e-b8bb633e5ead","name":"Unassign a WAF Rule from a Virtual Service","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/vsremovewafrule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=G/ip_reputation","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","vsremovewafrule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"G/ip_reputation"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 15:05:51 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"445c2103-24e9-4610-9df6-795673a82f10"}],"id":"01a1deae-29b0-4073-aac7-7133868cc712","description":"<p>The table below provides details about the WAF Settings of a Virtual Service.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Default</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Intercept</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enable/disable the legacy Web Application Firewall (WAF) for this Virtual Service.<br /><b>Note: </b>Legacy WAF was deprecated and removed from the LoadMaster in version 7.2.61 - to enable OWASP WAF use the <b>InterceptMode </b>parameter.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>InterceptMode</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0 - Disabled<br />1 - Legacy<br />2 - OWASP</div><div><div><div><div></div></div></div><div></div></div></td><td><div>You cannot switch from one WAF mode to another. You must first disable WAF (set InterceptMode to 0) and then you can switch to the other mode.<br /><b>Note: </b>Legacy WAF was deprecated and removed from the LoadMaster in version 7.2.61 - to enable OWASP WAF set the <b>InterceptMode </b>parameter to <b>2</b>.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>InterceptOpts</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Most of the fields in the WAF Options section of the Virtual Service modify screen in the LoadMaster UI can be set using this parameter. For more information, refer to the<a href=\"#712f0f9b-7cc3-475a-809a-fc883f020446\">AFP InterceptOpts Parameter</a>section.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>InterceptPOSTOtherContentTypes</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div>unset</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When the <b>otherctypesenable </b>parameter is enabled, use the <b>InterceptPOSTOtherContentTypes</b> parameter to enter a comma-separated list of POST content types allowed for WAF analysis, for example <b>text/plain,text/css</b>. By default, all types (other than XML/JSON) are enabled. To set this to any other content types, set the value to <b>any</b>.</p><p>Enabling the inspection of any other content types may increase system resource utilization (CPU and memory). A specific list of content types should be considered.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>AlertThreshold</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - 100000</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This is the threshold of incidents per hour before sending an alert. Setting this to <b>0</b> disables alerting.</p><p> </p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","_postman_id":"01a1deae-29b0-4073-aac7-7133868cc712"},{"name":"ESP Options","item":[],"id":"9c9fdf7a-227d-4e50-be5e-c0960a8348ad","description":"<p>The table below provides details about the ESP Options of a Virtual Service.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Range</b></p></td><td><p><b>Description</b></p></td></tr><tr><td><p>AllowedHosts</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>This parameter is only relevant when ESP is enabled. Specify all the virtual hosts that can be accessed using this Virtual Service.</p></td></tr><tr><td><p>AllowedDirectories</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>You can specify up to 254 characters for this parameter.</p></td><td><p>This parameter is only relevant when ESP is enabled. Specify all the virtual directories that can be accessed using this Virtual Service.</p></td></tr><tr><td><p>Domain</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>The Single Sign On (SSO) domain in which this Virtual Service will operate.</p></td></tr><tr><td><p>Logoff</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>You can specify up to 255 characters for this parameter.</p></td><td><p>This parameter is only relevant when ESP is enabled and when the <b>Client Authentication Mode</b> is set to <b>Form Based</b>. Specify the string that the LoadMaster should use to detect a logout event. Multiple logoff strings can be specified by using a space-separated list.</p><p>If the URL to be matched contains sub-directories before the specified string, the <b>Logoff String </b>will not be matched. Therefore, the LoadMaster will not log the user off.</p></td></tr><tr><td>AddAuthHeader</td><td>S</td><td>unset</td><td>You can specify up to 255 characters for this parameter.</td><td>This option is only available if <b>SAML</b> is selected as the <b>InputAuthMode</b>. Specify the name of the HTTP header. This header is added to the HTTP request from the LoadMaster to the Real Server and its value is set to the user ID for the authenticated session.<br />You can unset the value of this parameter by running the <b>modvs </b>command with the <b>addauthheader </b>parameter set to an empty string.</td></tr><tr><td><p>DisplayPubPriv</p></td><td><p>B</p></td><td><p>1 – Enabled</p></td><td><p>0 – Disabled</p><p>1 – Enabled</p></td><td><p>Display the public/private option on the login page. Based on the option the user selects on the login form, the session timeout value will be set to the value specified for either the public or private timeout.</p></td></tr><tr><td><p>DisablePasswordForm</p></td><td><p>B</p></td><td><p>0 – Disabled</p></td><td><p>0 – Disabled</p><p>1 – Enabled</p></td><td><p>Enabling this option removes the password field from the login page. This may be needed when password validation is not required, for example, if using RSA SecurID authentication in a singular fashion.</p></td></tr><tr><td>Captcha</td><td>B</td><td>0 - Disabled</td><td>0 - Disabled<br />1 - Enabled</td><td>Enable this parameter to allow CAPTCHA verification on the login page.<br />The LoadMaster only supports CAPTCHA v2. The <b>InputAuthMode </b>must be set to <b>2</b> (Form Based) for the CAPTCHA parameters to be relevant<br />All CAPTCHA parameters must be set before it can be used.<br /><br />Both the LoadMaster and the client machine must be able to access Google for this to work.<br />Before the CAPTCHA has been correctly answered, the submit button on the login form is disabled. If the user does not submit the form within two minutes of answering the CAPTCHA, the CAPTCHA times out (Google-specified timeout), and the user must verify a new CAPTCHA (the submit button is disabled until the new CAPTCHA has been verified).<br /></td></tr><tr><td>CaptchaPublicKey</td><td>S</td><td>unset</td><td></td><td>The key that was provided as the public key when you signed up for the CAPTCHA service.</td></tr><tr><td>CaptchaPrivateKey</td><td>S</td><td>unset</td><td></td><td>The key that was provided as the private key when you signed up for the CAPTCHA service.</td></tr><tr><td>CaptchaAccessUrl</td><td>S</td><td>www.google.com/recaptcha/api.js</td><td></td><td>The URL of the service that provides the CAPTCHA challenge.<br /><br />Do not start this URL with https.<br /><br />Only CAPTCHA V2 is currently supported.<br /></td></tr><tr><td>CaptchaVerifyUrl</td><td>S</td><td>www.google.com/recaptcha/api/siteverify</td><td></td><td>The URL of the service that verifies the response to the CAPTCHA challenge.<br /><br />Do not start this URL with https.<br /><br />Only CAPTCHA V2 is currently supported.<br /></td></tr><tr><td><p>ESPLogs</p></td><td><p>I</p></td><td><p>7</p></td><td><p>Integer 0-7</p><p> </p></td><td><p>Enable ESP logging. Valid values are below:</p><p>0 = Logging off</p><p>1 = User Access</p><p>2 = Security</p><p>3 = User Access and Security</p><p>4 = Connection</p><p>5 = User Access and Connection</p><p>6 = Security and connection</p><p>7 = User Access, Security and Connection</p><p><b>Note:</b> The only valid values for SMTP services are 0 and 4. For SMTP services, security issues are always logged. Nothing is logged for user access because there are no logins.</p></td></tr><tr><td><p>SMTPAllowedDomains</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Specify all the permitted domains that are allowed to be received by this Virtual Service.</p></td></tr><tr><td>ExcludedDirectories</td><td>S</td><td>unset</td><td> </td><td><p>This parameter is only relevant when ESP is enabled. Any virtual directories specified within this field will not be pre-authorized on this Virtual Service and are passed directly to the relevant Real Servers.</p></td></tr><tr><td><p>EspEnabled</p></td><td><p>B</p></td><td><p>N</p></td><td><p>0 – Disabled</p><p>1 - Enabled</p></td><td><p>Enable or disable the Edge Security Pack (ESP) features.</p></td></tr><tr><td><p>InputAuthMode</p></td><td><p>I</p></td><td><p>0</p></td><td><p>0-8</p><p> </p></td><td><p>Specify the client authentication method to be used:</p><p>0 = Delegate to Server</p><p>1 = Basic Authentication</p><p>2 = Form Based</p><p>4 = Client Certificate</p><p>5 = NTLM</p><p>6 = SAML</p><p>7 = Pass Post</p><p>8 = OIDC / OAUTH</p></td></tr><tr><td><p>OutputAuthMode</p></td><td><p>I</p></td><td><p>Dependent on InputAuthMode value</p></td><td><p>0-4</p><p> </p></td><td><p>Specify the server authentication mode to be used:</p><p>0 = None</p><p>1 = Basic Authentication</p><p>2 = Form Based</p><p>3 = KCD</p><p>4 = Server Token</p></td></tr><tr><td>TokenServerFQDN</td><td>S</td><td>unset</td><td>You can specify up to 127 characters for this parameter.</td><td>This parameter is only relevant when using <b>SAML </b>as the <b>Client Authentication Mode </b>(<b>InputAuthMode</b>) and <b>Server Token</b> as the <b>Server Authentication Mode </b>(<b>OutputAuthMode</b>). When set, the LoadMaster contacts the token server at the given FQDN during sign-on and obtains a permanent access token from that token server. If this parameter is unset, then the LoadMaster obtains the token from the Real Server.</td></tr><tr><td><p>ServerFbaPath</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Only relevant when using form-based authentication as the <b>Server Authentication Mode</b> (<b>OutputAuthMode</b>). Set the authentication path for server-side Form Based Authentication (FBA). When used in Exchange environments, this does not need to be set.</p></td></tr><tr><td><p>ServerFBAPost</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Only relevant when using form-based authentication as the <b>Server Authentication Mode</b> (<b>OutputAuthMode</b>). Set the format string used to generate POST body for server side FBA. The value must be base64-encoded.</p><p>When used in Exchange environments, this does not need to be set.</p></td></tr><tr><td>ServerFbaUsernameOnly</td><td>B</td><td>0 - Disabled<br /></td><td>0 - Disabled<br />1 - Enabled</td><td>This option is only relevant if the <b>InputAuthMode </b>is set to <b>2</b> (Form Based), the <b>OutputAuthMode </b>is set to <b>2</b> (Form Based), and the <b>ServerFbaPath </b>has been entered. Enable this option to send the username only (without the domain part) in the server-side form-based authentication POST request.</td></tr><tr><td><p>OutConf</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Enter the name of the outbound SSO domain.</p></td></tr><tr><td><p>SingleSignOnDir</p></td><td><p>S</p></td><td><p>unset</p></td><td>- Blank<br />- Dual Factor Authentication<br />- Exchange<br />- Français Canadien<br />- Blank<br />- Français Canadien<br />- Exchange<br />- Português do<br />Brasil - Blank<br />- Português do<br />Brasil - Exchange</td><td><p>This parameter relates to the <b>SSO Image Set</b> drop-down in the <b>ESP Options </b>section of the modify Virtual Service screen. Specify the name of the image set to be used for the login screen. If no image set is specified, the default <b>Exchange </b>image set will be used.</p></td></tr><tr><td>SingleSignOnMessage</td><td>S</td><td>unset</td><td>You can specify up to 255 characters for this parameter.</td><td><p>Specifies the SSO message that is displayed. The <b>SingleSignOnMessage</b> parameter accepts HTML code, so you can insert an image if required.</p><p>There are several characters that are not supported. These are the grave accent character ( ` ) and the single quote ('). If a grave accent character is used in the <b>SingleSignOnMessage</b>, the character will not display in the output, for example a`b`c becomes abc. If a single quote is used, users will not be able to log in.</p></td></tr><tr><td><p>AllowedGroups</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>You can specify up to 2048 characters for this parameter.</p></td><td><p>Specify the groups that are allowed to access this Virtual Service.</p><p>If the parameter value is longer than the maximum length of a HTTP GET query (1024 characters), you must set the <b>HTTP Method</b> to <b>POST</b>.</p></td></tr><tr><td><p>GroupSIDs</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>This parameter allows a list of group SIDs of up to 64 bytes and 2048 characters in length.</p></td><td><p>Specify the group security identifiers (SIDs) that are allowed to access this Virtual Service.</p><p>Each group is separated by a semi-colon. Spaces are used to separate bytes in certain group SIDs. Here is an example:</p><p><b>S-1-5-21-703902271-2531649136-2593404273-1606</b><br /></p><p>SIDs can be found by using the <b>get-adgroup-Identity GroupName</b> command.</p><p> </p><p>If the parameter value is longer than the maximum length of HTTP GET query (1024 characters), you must set the <b>HTTP Method</b> to <b>POST</b>.</p></td></tr><tr><td><p>IncludeNestedGroups</p></td><td><p>B</p></td><td><p>0 - Disabled</p></td><td><p>0 – Disabled</p><p>1 - Enabled</p></td><td><p>This parameter relates to the <b>AllowedGroups </b>parameter. Enable this option to include nested groups in the authentication attempt. If this option is disabled, only users in the top-level group will be granted access. If this option is enabled, users in both the top-level and first sub-level group will be granted access.</p></td></tr><tr><td>SteeringGroups</td><td>S</td><td>unset</td><td>You can specify up to 2048 characters for this parameter.</td><td><p>Enter the Active Directory group names that will be used for steering traffic.<br />Use a semi-colon to separate multiple group names.<br />The steering group index number corresponds to the location of the group in this list.</p><p>If the parameter value is longer than the maximum length of a HTTP GET query (1024 characters), you must set the <b>HTTP Method</b> to <b>POST</b>.</p></td></tr><tr><td>VerifyBearer</td><td>B</td><td>0 - Disabled</td><td>0 - Disabled<br />1 - Enabled</td><td>Enable this option to verify if the authentication header contains a bearer record. This is used when doing JSON web token validation.</td></tr><tr><td>BearerCertificateName</td><td>S</td><td>unset</td><td>A valid name of an uploaded certificate.</td><td>This option is only visible if the <b>VerifyBearer </b>parameter is enabled.<br />Specify the name of the relevant certificate (this must be first uploaded to the LoadMaster using the <b>addcert </b>command) containing a Public Key used to validate the authenticity of the JSON Web Token Signature. This is used when doing JSON web token validation.</td></tr><tr><td>BearerText</td><td>S</td><td>unset</td><td></td><td>This option is only visible if the <b>VerifyBearer </b>parameter is enabled.<br />You can enter up to five bearer header validation strings (comma-separated list). This is used when doing JSON web token validation.</td></tr><tr><td><p>ExcludedDomains</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Any virtual directories specified within this field will not be pre-authorized on this Virtual Service and will be passed directly to the relevant Real Servers. Multiple excluded domains can be specified by using a space-separated list.</p></td></tr><tr><td><p>AltDomains</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Specify alternative domains to be assigned to a Virtual Service when configuring multi-domain authentication. To specify multiple alternative domains, use a space separated list.</p></td></tr><tr><td>SameSite</td><td>I</td><td></td><td>0 – System Default<br />1 – SameSite=None<br />2 - SameSite=LAX<br />3 - SameSite=Strict<br />4 - SameSite Option Not Added</td><td>Allows the SameSite attribute to be explicitly specified for cookies used by LoadMaster Edge Security Pack. This influences the way browsers will use cookies across sites.</td></tr><tr><td><p>UserPwdChangeURL</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>This is relevant when using form-based LDAP authentication. Specify the URL that users can use to change their password. If a user’s password has expired, or if they must reset their password, this URL and the <b>UserPwdChangeMsg</b> is displayed on the login form.</p><p>This URL must be put into the exception list for authentication, if required.</p></td></tr><tr><td><p>UserPwdChangeMsg</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>This parameter is only relevant if the <b>UserPwdChangeURL</b> parameter is set. Specify the text to be displayed on the login form when the user must reset their password.</p></td></tr><tr><td>UserPwdExpiryWarn</td><td>B</td><td>0 - Disabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td><p>By default, SSO users are notified about the number of days before they must change their password. If you disable this option, the password expiry notification will not appear on the login forms. This parameter is only relevant if the <b>InputAuthMode</b> is set to <b>Form Based</b> (<b>2</b>) and the <b>UserPwdChangeURL</b> is set.</p><p>The language of the warning text is based on the <b>SSO Image Set</b> that is selected (English, French, or Portuguese).</p></td></tr><tr><td>UserPwdExpiryWarnDays</td><td>Integer</td><td>15</td><td>1 - 30</td><td><p>Specify the number of days to show the warning before the password is expired. This parameter is only relevant if the <b>InputAuthMode</b> is set to <b>Form Based</b> (<b>2</b>) and the <b>UserPwdChangeURL</b> is set.</p></td></tr></tbody></table>","_postman_id":"9c9fdf7a-227d-4e50-be5e-c0960a8348ad"},{"name":"Real Servers","item":[],"id":"04ee13f4-b13d-4eb5-bf71-a14f73608352","description":"<p>The table below provides details about the Real Server settings of a Virtual Service.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Range</b></p></td><td><p><b>Description</b></p></td></tr><tr><td><p>CheckType</p></td><td><p>S</p></td><td><p>tcp</p></td><td><p>The default value is dependent on the Virtual Service port. The list of values is:</p><p>icmp</p><p>https</p><p>http</p><p>tcp</p><p>smtp</p><p>nntp</p><p>ftp</p><p>telnet</p><p>pop3</p><p>imap</p><p>rdp</p><p>bdata</p><p>ldap</p><p>none</p></td><td><p>Specify which protocol is to be used to check the health of the Real Server.</p></td></tr><tr><td><p>LdapEndpoint</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>An existing endpoint name</p></td><td><p>Specify the name of an LDAP endpoint to use for the health checks. If <b>LDAP </b>is selected as the <b>CheckType</b>, the server IP address (or addresses) and ports from the LDAP endpoint configuration are used instead of the Real Server IP address and port. For further information on LDAP endpoints, refer to the <a href=\"#9c747c6a-79a6-4055-a8de-9577ce8b9e1f\">LDAP Configuration</a> section.</p></td></tr><tr><td><p>CheckHost</p></td><td><p>A</p></td><td><p>unset</p></td><td><p> </p></td><td><p>The <b>CheckUse1.1 </b>parameter must be enabled to set the <b>CheckHost </b>value. When using HTTP/1.1 checking, the Real Servers require a Hostname be supplied in each request. If no value is set then this value is the IP address of the Virtual Service.</p></td></tr><tr><td><p>CheckPattern</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>When the <b>CheckType </b>is set to <b>http </b>or <b>https </b>- this corresponds to the <b>Reply 200 Pattern</b> in the WUI. This parameter only applies when the <b>HTTP Method </b>is set to <b>GET </b>or <b>POST</b>. When the <b>CheckType </b>is set to <b>bdata</b>: Specify the hexadecimal string which will be searched for in the response. Specify an empty value to unset CheckPattern.</p></td></tr><tr><td><p>CheckUrl</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>When the <b>CheckType </b>is set to <b>http </b>or <b>https </b>- by default, the health checker tries to access the URL / to determine if the machine is available. A different URL can be set in the <b>CheckUrl </b>parameter.</p><p>When the <b>CheckType </b>is set to <b>bdata</b>: Specify a hexadecimal string to send to the Real Server.</p><p>The maximum character length for the <b>CheckUrl </b>parameter value is 126 characters.</p></td></tr><tr><td><p>CheckCodes</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>300-599</p></td><td><p>A space-separated list of HTTP status codes that should be treated as successful when received from the Real Server.</p></td></tr><tr><td><p>CheckHeaders</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Specify up to four additional headers/fields which will be sent with each health check request. Separate the pairs with a pipe, for example; <b>Host:xyc|UserAgent:prq</b>.</p></td></tr><tr><td><p>MatchLen</p></td><td><p>S</p></td><td><p>0</p></td><td><p>0-8000</p></td><td><p>This parameter is only relevant when the <b>CheckType </b>is set to <b>bdata</b>. Specify the number of bytes to find the <b>CheckPattern </b>within.</p></td></tr><tr><td><p>CheckUse1.1</p></td><td><p>B</p></td><td><p>0 - Disabled</p></td><td><p>0 – Disabled</p><p>1 - Enabled</p></td><td><p>By default, the health checker uses HTTP/1.0 when checking the Real Server status. Enabling CheckUse1.1 means HTTP/1.1 is used (which is more efficient).</p><p>Optimization only works on HTTP (not HTTPS) connections.</p></td></tr><tr><td><p>CheckPort</p></td><td><p>I</p></td><td><p>unset</p></td><td><p>3-65530</p></td><td><p>The port to be checked. If a port is not specified, the Real Server port is used. Specify 0 to unset CheckPort.</p></td></tr><tr><td><p>NumberOfRSs</p></td><td><p>I (Read only)</p></td><td><p>unset</p></td><td><p> </p></td><td><p>This displays the number of Real Servers that are assigned to the Virtual Service.</p></td></tr><tr><td><p>NRules</p></td><td><p>I (Read only)</p></td><td><p>unset</p></td><td><p> </p></td><td><p>This displays the number of rules assigned to a Real Server when content switching is enabled.</p></td></tr><tr><td><p>RuleList</p></td><td><p>List(Read only)</p></td><td><p> </p></td><td><p> </p></td><td><p>A list of content rules assigned to the Real Servers.</p></td></tr><tr><td><p>CheckUseGet</p></td><td><p>I</p></td><td><p>N</p></td><td><p>0 - HEAD</p><p>1 - GET</p><p>2 - POST</p><p>3 - OPTIONS</p></td><td><p>When accessing the URL - the system can use the HEAD, the GET, the POST, or the OPTIONS method.</p></td></tr><tr><td><p>ExtraHdrKey</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Specify the key for the extra header to be inserted into every request sent to the Real Servers.</p></td></tr><tr><td><p>ExtraHdrValue</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Specify the value for the extra header to be inserted into every request sent to the Real Servers.</p></td></tr><tr><td><p>CreateSubVS</p></td><td><p> </p></td><td><p>unset</p></td><td><p> </p></td><td><p>This parameter can be used to create a SubVS within a Virtual Service. This parameter has no value (entering \"createsubvs\": \"\" creates a SubVS).</p></td></tr><tr><td><p>SubVS</p></td><td><p>I (Read Only)</p></td><td><p> </p></td><td><p>0 – Disabled</p><p>1 – Enabled</p></td><td><p>This parameter displays details of any SubVSes which exist in the Virtual Service.</p></td></tr><tr><td><p>CheckPostData</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>Supports up to 2047 characters</p></td><td><p>This parameter is only relevant if the <b>HTTP Method i</b>s set to <b>POST</b>. When using the <b>POST </b>method, up to 2047 characters of POST data can be sent to the server.</p></td></tr><tr><td><p>RSRulePrecedence</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p><p> </p></td><td><p>This parameter should be used in conjunction with <b>RSRulePrecedencePos</b>. This parameter is used to specify the name of the existing rule whose position you wish to change.</p></td></tr><tr><td><p>RSRulePrecedencePos</p></td><td><p>I</p></td><td><p>unset</p></td><td><p> </p></td><td><p>This parameter, in conjunction with the <b>RSRulePrecedence</b> parameter, is used to change the position of the rule in a sequence of rules. For example, a position of <b>2</b> means the rule will be checked second.</p></td></tr><tr><td><p>EnhancedHealthchecks</p></td><td><p>B</p></td><td><p>0 – Disabled</p></td><td><p>0 – Disabled</p><p>1 – Enabled</p></td><td><p>Enabling the <b>EnhancedHealthchecks</b> parameter provides an additional health check parameter – <b>RsMinimum</b>. If the <b>EnhancedHealthchecks</b> parameter is disabled, the Virtual Service will be considered available if at least one Real Server is available. If the <b>EnhancedHealthchecks</b> parameter is enabled, you can specify the minimum number of Real Servers which should be available to consider the Virtual Service to be available.</p></td></tr><tr><td><p>RsMinimum</p></td><td><p>Integer</p></td><td><p>1</p></td><td><p>1 to the number of Real Servers configured</p></td><td><p>This parameter can only be set using the <b>modvs </b>command if the <b>EnhancedHealthchecks</b> parameter is enabled. Specify the minimum number of Real Servers required to be available for the Virtual Service to be considered up. If less than the minimum amount of Real Servers are available, a critical log is generated. If some Real Servers are down but it has not reached the minimum amount specified, a warning is logged. If the email options are configured, an email will be sent to the relevant recipients.</p><p>When retrieving the value of this parameter – 0 is the default value if there are no Real Servers or 1 Real Server in the Virtual Service. However, 1 is always the minimum in reality.</p></td></tr></tbody></table>","_postman_id":"04ee13f4-b13d-4eb5-bf71-a14f73608352"},{"name":"Miscellaneous","item":[],"id":"7c5a35ad-651d-4dfd-9333-66a376b00be5","description":"<p>The table below provides details about some miscellaneous Virtual Service settings.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Range</b></p></td><td><p><b>Description</b></p></td></tr><tr><td><p>Adaptive</p></td><td><p>S (Read only)</p></td><td><p>unset</p></td><td><p> </p></td><td><p>This parameter is read-only and will only be displayed when the Scheduling Method is set to resource-based (adaptive).</p></td></tr><tr><td><p>MultiConnect</p></td><td><p>B</p></td><td><p>0</p></td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td><p>Enabling this option permits the LoadMaster to manage connection handling between the LoadMaster and the Real Servers. Requests from multiple clients will be sent over the same TCP connection.</p><p>Multiplexing only works for simple HTTP GET operations. This parameter cannot be enabled in certain situations, for example if WAF, ESP or SSL Acceleration is enabled.</p></td></tr><tr><td><p>non_local</p></td><td><p>B</p></td><td><p>0 - Disabled</p></td><td><p>0 – Disabled</p><p>1 – Enabled</p></td><td><p>By default, only Real Servers on local networks can be assigned to a Virtual Service. Enabling this option will allow a non-local Real Server to be assigned to the Virtual Service.</p><p>This option will only be available if <b>NonLocalRS </b>has been enabled and the <b>Transparent </b>option has been disabled on the relevant Virtual Service.</p></td></tr></tbody></table>","_postman_id":"7c5a35ad-651d-4dfd-9333-66a376b00be5"}],"id":"f85a3cd7-a2d0-4e19-957a-d0df05eac473","description":"<p>The parameters that can be set using the <strong>addvs</strong> and <strong>modvs</strong> commands are described in the sections below. For ease of use, the parameters have been broken into sections based on where the corresponding field appears in the UI.</p>\n","_postman_id":"f85a3cd7-a2d0-4e19-957a-d0df05eac473"},{"name":"Sub-Virtual Services (SubVSs)","item":[{"name":"Show a SubVS","id":"07cc19f2-b9ec-46e7-bedd-d1c9fb639767","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showvs?vs=4","description":"<p>Display details about a particular SubVS.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"4"}],"variable":[]}},"response":[{"id":"4f5ad100-e8a3-44bf-ae4d-ca0c611ed2de","name":"Show a SubVS","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showvs?vs=4","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","showvs"],"query":[{"key":"vs","value":"4"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:25:49 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>4</Index>\n            <VSPort>0</VSPort>\n            <Layer>7</Layer>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>0</InterceptMode>\n            <Intercept>N</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>0</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>0</ExecutingParanoia>\n            <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n            <PCRELimit>0</PCRELimit>\n            <JSONDLimit>0</JSONDLimit>\n            <BodyLimit>0</BodyLimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>N</Transparent>\n            <SubnetOriginating>Y</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <SameSite>0</SameSite>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>0</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>rr</Schedule>\n            <CheckType>http</CheckType>\n            <PersistTimeout>0</PersistTimeout>\n            <CheckPort>0</CheckPort>\n            <HTTPReschedule>N</HTTPReschedule>\n            <NRules>0</NRules>\n            <NRequestRules>0</NRequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>0</MasterVS>\n            <MasterVSID>2</MasterVSID>\n            <IsTransparent>2</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>0</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <AdaptivePort>0</AdaptivePort>\n            <AdaptiveInterval>0</AdaptiveInterval>\n            <AdaptiveMinPercent>0</AdaptiveMinPercent>\n            <Bandwidth>0</Bandwidth>\n            <ConnsPerSecLimit>0</ConnsPerSecLimit>\n            <RequestsPerSecLimit>0</RequestsPerSecLimit>\n            <MaxConnsLimit>0</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <ResponseStatusRemap>N</ResponseStatusRemap>\n            <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n            <EnhancedHealthChecks>N</EnhancedHealthChecks>\n            <RsMinimum>0</RsMinimum>\n            <NumberOfRSs>0</NumberOfRSs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"07cc19f2-b9ec-46e7-bedd-d1c9fb639767"},{"name":"Add a SubVS (using the IP Address, Port, and Protocol of the parent Virtual Service)","id":"8dfd43ca-1ccc-4e1a-9ffc-931d0825606b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=InsertVirtualServiceIPAddress&port=8810&prot=tcp&createsubvs=","description":"<p>To create a new SubVS, you use the <strong>modvs</strong> command (because you are essentially modifying the existing parent Virtual Service) with the <strong>createsubvs</strong> parameter set to an empty string.</p>\n<blockquote>\n<p>Frequently adding or deleting Real Servers or SubVSs at a high velocity is not the recommended best practice. If you need to modify parameters, use the <strong>modrs</strong> command. If you need to constantly modify Real Server IP addresses, moving to FQDNs (rather than IP addresses) is the recommended best practice.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"8810"},{"key":"prot","value":"tcp"},{"key":"createsubvs","value":""}],"variable":[]}},"response":[{"id":"88014bf7-b8c9-4d5e-bad2-58fd94291482","name":"Add a SubVS (using the IP Address, Port, and Protocol of the parent Virtual Service)","originalRequest":{"method":"POST","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=InsertVirtualServiceIPAddress&port=8810&prot=tcp&createsubvs=","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modvs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"8810"},{"key":"prot","value":"tcp"},{"key":"createsubvs","value":""}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:27:17 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>2</Index>\n            <VSAddress>IP address would appear here</VSAddress>\n            <VSPort>8810</VSPort>\n            <Layer>7</Layer>\n            <NickName>PASOE-HTTP-JSESSIONID_Cookie</NickName>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>0</InterceptMode>\n            <Intercept>N</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>0</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>0</ExecutingParanoia>\n            <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n            <PCRELimit>0</PCRELimit>\n            <JSONDLimit>0</JSONDLimit>\n            <BodyLimit>0</BodyLimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>Y</Transparent>\n            <SubnetOriginating>N</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <SameSite>0</SameSite>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>1</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>lc</Schedule>\n            <CheckType>http</CheckType>\n            <Persist>cookie</Persist>\n            <PersistTimeout>360</PersistTimeout>\n            <Cookie>JSESSIONID</Cookie>\n            <CheckPort>8810</CheckPort>\n            <HTTPReschedule>N</HTTPReschedule>\n            <NRules>0</NRules>\n            <NRequestRules>0</NRequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>2</MasterVS>\n            <MasterVSID>0</MasterVSID>\n            <IsTransparent>0</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>0</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <AdaptivePort>0</AdaptivePort>\n            <AdaptiveInterval>0</AdaptiveInterval>\n            <AdaptiveMinPercent>0</AdaptiveMinPercent>\n            <Bandwidth>0</Bandwidth>\n            <ConnsPerSecLimit>0</ConnsPerSecLimit>\n            <RequestsPerSecLimit>0</RequestsPerSecLimit>\n            <MaxConnsLimit>0</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <ResponseStatusRemap>N</ResponseStatusRemap>\n            <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n            <RsMinimum>0</RsMinimum>\n            <NumberOfRSs>2</NumberOfRSs>\n            <SubVS>\n                <Status>Down</Status>\n                <VSIndex>4</VSIndex>\n                <RsIndex>1</RsIndex>\n                <Name>-</Name>\n                <Forward>nat</Forward>\n                <Weight>1000</Weight>\n                <Limit>0</Limit>\n                <RateLimit>0</RateLimit>\n                <Follow>0</Follow>\n                <Enable>Y</Enable>\n                <Critical>N</Critical>\n                <Nrules>0</Nrules>\n            </SubVS>\n            <SubVS>\n                <Status>Down</Status>\n                <VSIndex>5</VSIndex>\n                <RsIndex>2</RsIndex>\n                <Name>-</Name>\n                <Forward>nat</Forward>\n                <Weight>1000</Weight>\n                <Limit>0</Limit>\n                <RateLimit>0</RateLimit>\n                <Follow>0</Follow>\n                <Enable>Y</Enable>\n                <Critical>N</Critical>\n                <Nrules>0</Nrules>\n            </SubVS>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"8dfd43ca-1ccc-4e1a-9ffc-931d0825606b"},{"name":"Add a SubVS (using the ID of the parent Virtual Service)","id":"32d36d42-6c55-4dac-aa09-3e6f5bae0021","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=2&createsubvs=","description":"<p>To create a new SubVS, you use the <strong>modvs</strong> command (because you are essentially modifying the existing parent Virtual Service) with the <strong>createsubvs</strong> parameter set to an empty string.</p>\n<blockquote>\n<p>Frequently adding or deleting Real Servers or SubVSs at a high velocity is not the recommended best practice. If you need to modify parameters, use the <strong>modrs</strong> command. If you need to constantly modify Real Server IP addresses, moving to FQDNs (rather than IP addresses) is the recommended best practice.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"2"},{"key":"createsubvs","value":""}],"variable":[]}},"response":[{"id":"140ef586-9db3-4749-a686-cd06fb2f89c7","name":"Add a SubVS (using the ID of the parent Virtual Service)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=2&createsubvs=","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modvs"],"query":[{"key":"vs","value":"2"},{"key":"createsubvs","value":""}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:28:26 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>2</Index>\n            <VSAddress>IP address would appear here</VSAddress>\n            <VSPort>8810</VSPort>\n            <Layer>7</Layer>\n            <NickName>PASOE-HTTP-JSESSIONID_Cookie</NickName>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>0</InterceptMode>\n            <Intercept>N</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>0</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>0</ExecutingParanoia>\n            <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n            <PCRELimit>0</PCRELimit>\n            <JSONDLimit>0</JSONDLimit>\n            <BodyLimit>0</BodyLimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>Y</Transparent>\n            <SubnetOriginating>N</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <SameSite>0</SameSite>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>1</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>lc</Schedule>\n            <CheckType>http</CheckType>\n            <Persist>cookie</Persist>\n            <PersistTimeout>360</PersistTimeout>\n            <Cookie>JSESSIONID</Cookie>\n            <CheckPort>8810</CheckPort>\n            <HTTPReschedule>N</HTTPReschedule>\n            <NRules>0</NRules>\n            <NRequestRules>0</NRequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>3</MasterVS>\n            <MasterVSID>0</MasterVSID>\n            <IsTransparent>0</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>0</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <AdaptivePort>0</AdaptivePort>\n            <AdaptiveInterval>0</AdaptiveInterval>\n            <AdaptiveMinPercent>0</AdaptiveMinPercent>\n            <Bandwidth>0</Bandwidth>\n            <ConnsPerSecLimit>0</ConnsPerSecLimit>\n            <RequestsPerSecLimit>0</RequestsPerSecLimit>\n            <MaxConnsLimit>0</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <ResponseStatusRemap>N</ResponseStatusRemap>\n            <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n            <RsMinimum>0</RsMinimum>\n            <NumberOfRSs>3</NumberOfRSs>\n            <SubVS>\n                <Status>Down</Status>\n                <VSIndex>4</VSIndex>\n                <RsIndex>1</RsIndex>\n                <Name>-</Name>\n                <Forward>nat</Forward>\n                <Weight>1000</Weight>\n                <Limit>0</Limit>\n                <RateLimit>0</RateLimit>\n                <Follow>0</Follow>\n                <Enable>Y</Enable>\n                <Critical>N</Critical>\n                <Nrules>0</Nrules>\n            </SubVS>\n            <SubVS>\n                <Status>Down</Status>\n                <VSIndex>5</VSIndex>\n                <RsIndex>2</RsIndex>\n                <Name>-</Name>\n                <Forward>nat</Forward>\n                <Weight>1000</Weight>\n                <Limit>0</Limit>\n                <RateLimit>0</RateLimit>\n                <Follow>0</Follow>\n                <Enable>Y</Enable>\n                <Critical>N</Critical>\n                <Nrules>0</Nrules>\n            </SubVS>\n            <SubVS>\n                <Status>Down</Status>\n                <VSIndex>6</VSIndex>\n                <RsIndex>3</RsIndex>\n                <Name>-</Name>\n                <Forward>nat</Forward>\n                <Weight>1000</Weight>\n                <Limit>0</Limit>\n                <RateLimit>0</RateLimit>\n                <Follow>0</Follow>\n                <Enable>Y</Enable>\n                <Critical>N</Critical>\n                <Nrules>0</Nrules>\n            </SubVS>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"32d36d42-6c55-4dac-aa09-3e6f5bae0021"},{"name":"Modify a SubVS","id":"6d66b87f-22b0-4360-b8fe-36d70acfbdda","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=2&persist=super","description":"<p>Configure the SubVS settings. Most of the SubVS parameters are the same as the parent Virtual Service parameters. For details, refer to the <a href=\"#a60285d4-8ad2-4b96-a49b-628aab44fef9\">Virtual Service Parameters</a> section.</p>\n<blockquote>\n<p>Frequently adding or deleting Real Servers or SubVSs at a high velocity is not the recommended best practice. If you need to modify parameters, use the <strong>modrs</strong> command. If you need to constantly modify Real Server IP addresses, moving to FQDNs (rather than IP addresses) is the recommended best practice.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"2"},{"key":"persist","value":"super"}],"variable":[]}},"response":[{"id":"223e4e68-6893-4ba3-8fe2-c536d85f5658","name":"Modify a SubVS","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=2&persist=super","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modvs"],"query":[{"key":"vs","value":"2"},{"key":"persist","value":"super"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:29:23 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>2</Index>\n            <VSAddress>IP address would appear here</VSAddress>\n            <VSPort>8810</VSPort>\n            <Layer>7</Layer>\n            <NickName>PASOE-HTTP-JSESSIONID_Cookie</NickName>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>0</InterceptMode>\n            <Intercept>N</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>0</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>0</ExecutingParanoia>\n            <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n            <PCRELimit>0</PCRELimit>\n            <JSONDLimit>0</JSONDLimit>\n            <BodyLimit>0</BodyLimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>Y</Transparent>\n            <SubnetOriginating>N</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <SameSite>0</SameSite>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>1</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>lc</Schedule>\n            <CheckType>http</CheckType>\n            <Persist>super</Persist>\n            <PersistTimeout>360</PersistTimeout>\n            <Cookie>JSESSIONID</Cookie>\n            <CheckPort>8810</CheckPort>\n            <HTTPReschedule>N</HTTPReschedule>\n            <NRules>0</NRules>\n            <NRequestRules>0</NRequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>3</MasterVS>\n            <MasterVSID>0</MasterVSID>\n            <IsTransparent>0</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>0</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <AdaptivePort>0</AdaptivePort>\n            <AdaptiveInterval>0</AdaptiveInterval>\n            <AdaptiveMinPercent>0</AdaptiveMinPercent>\n            <Bandwidth>0</Bandwidth>\n            <ConnsPerSecLimit>0</ConnsPerSecLimit>\n            <RequestsPerSecLimit>0</RequestsPerSecLimit>\n            <MaxConnsLimit>0</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <ResponseStatusRemap>N</ResponseStatusRemap>\n            <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n            <RsMinimum>0</RsMinimum>\n            <NumberOfRSs>3</NumberOfRSs>\n            <SubVS>\n                <Status>Down</Status>\n                <VSIndex>4</VSIndex>\n                <RsIndex>1</RsIndex>\n                <Name>-</Name>\n                <Forward>nat</Forward>\n                <Weight>1000</Weight>\n                <Limit>0</Limit>\n                <RateLimit>0</RateLimit>\n                <Follow>0</Follow>\n                <Enable>Y</Enable>\n                <Critical>N</Critical>\n                <Nrules>0</Nrules>\n            </SubVS>\n            <SubVS>\n                <Status>Down</Status>\n                <VSIndex>5</VSIndex>\n                <RsIndex>2</RsIndex>\n                <Name>-</Name>\n                <Forward>nat</Forward>\n                <Weight>1000</Weight>\n                <Limit>0</Limit>\n                <RateLimit>0</RateLimit>\n                <Follow>0</Follow>\n                <Enable>Y</Enable>\n                <Critical>N</Critical>\n                <Nrules>0</Nrules>\n            </SubVS>\n            <SubVS>\n                <Status>Down</Status>\n                <VSIndex>6</VSIndex>\n                <RsIndex>3</RsIndex>\n                <Name>-</Name>\n                <Forward>nat</Forward>\n                <Weight>1000</Weight>\n                <Limit>0</Limit>\n                <RateLimit>0</RateLimit>\n                <Follow>0</Follow>\n                <Enable>Y</Enable>\n                <Critical>N</Critical>\n                <Nrules>0</Nrules>\n            </SubVS>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"6d66b87f-22b0-4360-b8fe-36d70acfbdda"},{"name":"Duplicate a SubVS","id":"228608c3-afb8-4224-9822-cf3ddbb8529f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/dupvs?vs=4","description":"<p>To duplicate a SubVS, run the <strong>dupvs</strong> command and specify the <strong>VSIndex</strong> number of the SubVs.</p>\n<blockquote>\n<p>The <strong>vs</strong> parameter value in this case should be set to an integer. You can retrieve the <strong>VSIndex</strong> of the SubVS by running the <strong>listvs</strong> command. </p>\n</blockquote>\n<blockquote>\n<p><strong>Note:</strong> This command is not supported in the LTSF LoadMaster version yet.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","dupvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"4"}],"variable":[]}},"response":[{"id":"7fe43603-adb5-4496-9c56-d363bd5132db","name":"Duplicate a SubVS","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/dupvs?vs=4","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","dupvs"],"query":[{"key":"vs","value":"4"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:30:59 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>7</Index>\n            <VSPort>0</VSPort>\n            <Layer>7</Layer>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>0</InterceptMode>\n            <Intercept>N</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>0</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>0</ExecutingParanoia>\n            <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n            <PCRELimit>0</PCRELimit>\n            <JSONDLimit>0</JSONDLimit>\n            <BodyLimit>0</BodyLimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>N</Transparent>\n            <SubnetOriginating>Y</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <SameSite>0</SameSite>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>0</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>rr</Schedule>\n            <CheckType>http</CheckType>\n            <PersistTimeout>0</PersistTimeout>\n            <CheckPort>0</CheckPort>\n            <HTTPReschedule>N</HTTPReschedule>\n            <NRules>0</NRules>\n            <NRequestRules>0</NRequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>0</MasterVS>\n            <MasterVSID>2</MasterVSID>\n            <IsTransparent>2</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>0</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <AdaptivePort>0</AdaptivePort>\n            <AdaptiveInterval>0</AdaptiveInterval>\n            <AdaptiveMinPercent>0</AdaptiveMinPercent>\n            <Bandwidth>0</Bandwidth>\n            <ConnsPerSecLimit>0</ConnsPerSecLimit>\n            <RequestsPerSecLimit>0</RequestsPerSecLimit>\n            <MaxConnsLimit>0</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <ResponseStatusRemap>N</ResponseStatusRemap>\n            <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n            <EnhancedHealthChecks>N</EnhancedHealthChecks>\n            <RsMinimum>0</RsMinimum>\n            <NumberOfRSs>0</NumberOfRSs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"228608c3-afb8-4224-9822-cf3ddbb8529f"},{"name":"Delete a SubVS","id":"faf120ce-49f9-48f9-9744-21936f8565f0","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delvs?vs=4","description":"<p>Specify the ID number of the SubVS to delete.</p>\n<blockquote>\n<p>Frequently adding or deleting Real Servers or SubVSs at a high velocity is not the recommended best practice. If you need to modify parameters, use the <strong>modrs</strong> command. If you need to constantly modify Real Server IP addresses, moving to FQDNs (rather than IP addresses) is the recommended best practice.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"4"}],"variable":[]}},"response":[{"id":"f86ff3f9-ab32-429b-919c-35ea580040a6","name":"Delete a SubVS","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delvs?vs=4","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delvs"],"query":[{"key":"vs","value":"4"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:32:04 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"faf120ce-49f9-48f9-9744-21936f8565f0"},{"name":"Add a Real Server to a SubVS","id":"acc68f61-e3a4-44ed-9eb8-fe69a9929089","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrs?vs=2&rs=InsertRealServerIPAddress&rsport=80","description":"<p>To add a Real Server to a SubVS, specify the SubVS ID in the <strong>vs</strong> parameter.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addrs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"2"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"80"}],"variable":[]}},"response":[{"id":"f9005120-1ada-4442-9c58-fdfb3a5a0626","name":"Add a Real Server to a SubVS","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrs?vs=2&rs=InsertRealServerIPAddress&rsport=80","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addrs"],"query":[{"key":"vs","value":"2"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"80"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:36:35 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Rs>\n                <Status>Down</Status>\n                <VSIndex>2</VSIndex>\n                <RsIndex>1</RsIndex>\n                <Addr>IP address would appear here</Addr>\n                <Port>80</Port>\n                <DnsName></DnsName>\n                <Forward>nat</Forward>\n                <Weight>1000</Weight>\n                <Limit>0</Limit>\n                <RateLimit>0</RateLimit>\n                <Follow>0</Follow>\n                <Enable>Y</Enable>\n                <Critical>N</Critical>\n                <Nrules>0</Nrules>\n            </Rs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"acc68f61-e3a4-44ed-9eb8-fe69a9929089"},{"name":"Delete a Real Server from a SubVS","id":"dffb4448-172e-42b4-b68c-f703f14f2049","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrs?vs=2&rs=InsertRealServerIPAddress&rsport=80","description":"<p>To delete a Real Server from a SubVS, specify the SubVS ID in the <b>vs</b> parameter and the Real Server ID preceded by <b>%21</b> in the <b>rs</b> parameter.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delrs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"2"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"80"}],"variable":[]}},"response":[{"id":"59f29886-f6d5-45a1-a822-42929be23456","name":"Delete a Real Server from a SubVS","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrs?vs=2&rs=InsertRealServerIPAddress&rsport=80","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delrs"],"query":[{"key":"vs","value":"2"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"80"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:38:25 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"dffb4448-172e-42b4-b68c-f703f14f2049"}],"id":"e600e407-b221-4817-8a97-e39ef955f151","description":"<p>The Virtual Service commands can be used on SubVSs also. However, because SubVSs do not have IP addresses, the SubVS index must be used. The SubVS index can be found using the <b>listvs</b> command.</p>\n<p>Alternatively, check the ID of the SubVS on the SubVS modify screen, for example:\n<b>Properties for subVS 1 (Id:8)</b>.</p>\n","_postman_id":"e600e407-b221-4817-8a97-e39ef955f151"},{"name":"Manage Templates","item":[{"name":"Export a Virtual Service as a Template","id":"1a7b8e59-18cc-4424-9e37-1c9121780447","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/exportvstmplt?vs=InsertVirtualServiceIPAddress&port=8810&prot=tcp","description":"<p>An existing Virtual Service can be exported as a template by running the <b>exportvstmplt</b> command.</p>\n<p>The Virtual Service index can also be entered for the <b>vs</b> parameter (and then the other parameters are then not needed). To retrieve the Virtual Service ID, run the <b>listvs</b> command. For further information, refer to the <a href=\"#2f003e15-0511-4cbd-97d9-db13383da658\">List All Virtual Services</a> section.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","exportvstmplt"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"8810"},{"key":"prot","value":"tcp"}],"variable":[]}},"response":[{"id":"13fe95a4-4d9d-43a3-92be-c957d468c889","name":"Export a Virtual Service as a Template","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/exportvstmplt?vs=InsertVirtualServiceIPAddress&port=8810&prot=tcp","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","exportvstmplt"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"8810"},{"key":"prot","value":"tcp"}]}},"status":"OK","code":200,"_postman_previewlanguage":"plain","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:40:59 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/plain; charset=us-ascii"},{"key":"Content-Disposition","value":"attachment; filename=\"PASOE-HTTP-JSESSIONID_Cookie.txt\""}],"cookie":[],"responseTime":null,"body":"%TYPE% VS\r\n%NAME% Template generated from PASOE-HTTP-JSESSIONID_Cookie\r\n%COMMENT% Generated by vipdump $Revision: 22463 $\r\n%PORT% 8810\r\n%PROT% tcp\r\n%TVERSION% 3\r\n\r\nvip tcp/%VIP%+%PORT%\r\nname \"%REALNAME%\"\r\nmtype \"http\"\r\ntransparent\r\nforcel7\r\ncookie \"JSESSIONID\"\r\nhealthcheck \"http\"\r\npersist \"super\"\r\nschedule \"lc\"\r\nptimeout 360\r\nuseget 1\r\ncheckport 8810\r\nexit\r\n"}],"_postman_id":"1a7b8e59-18cc-4424-9e37-1c9121780447"},{"name":"Upload a Template","id":"a77df504-8147-4428-8ce0-2a565c99ae21","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/Downloads/pasoe.tmpl"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/uploadtemplate?=","description":"<p>You can upload a template by running the <strong>uploadtemplate</strong> command.</p>\n<blockquote>\n<p>If a command requires binary data (file uploads), this data must be passed in the \"data\" string and be base64-encoded.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","uploadtemplate"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"","value":""}],"variable":[]}},"response":[{"id":"da878129-a619-4710-b7d5-fd1318e29312","name":"Upload a Template","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/Downloads/pasoe.tmpl"}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/uploadtemplate?","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","uploadtemplate"],"query":[{"key":"","value":null}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:45:12 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Installed 6 new Kemp certified templates.</Success>\n</Response>"}],"_postman_id":"a77df504-8147-4428-8ce0-2a565c99ae21"},{"name":"Display a List of Installed Templates","id":"c6d6f2d7-f108-44c2-b405-e275d62fadfd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listtemplates","description":"<p>To display a list of the templates that exist on the LoadMaster, run the <b>listtemplates</b> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listtemplates"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"487c9174-4456-4bf7-9b81-8a0873d76d4c","name":"Display a List of Installed Templates","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listtemplates"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:45:54 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <template>\n                <name>PASOE-HTTPS-Offloaded-JSESSIONID_Cookie </name>\n                <comment>Progress Application Server for OpenEdge (PASOE) HTTPS Offloaded using Cookie Persistence (JSESSIONID) (Version Q1-22)</comment>\n                <certified>yes</certified>\n            </template>\n            <template>\n                <name>PASOE-HTTPS-Offloaded-Source_IP</name>\n                <comment>Progress Application Server for OpenEdge (PASOE) HTTPS Offloaded using SourceIP Persistence (Version Q1-22)</comment>\n                <certified>yes</certified>\n            </template>\n            <template>\n                <name>PASOE-HTTPS-ReEncrypt-JSESSIONID_Cookie </name>\n                <comment>Progress Application Server for OpenEdge (PASOE) HTTPS ReEncrypt using Cookie Persistence (JSESSIONID) (Version Q1-22)</comment>\n                <certified>yes</certified>\n            </template>\n            <template>\n                <name>PASOE-HTTPS-ReEncrypt-Source_IP</name>\n                <comment>Progress Application Server for OpenEdge (PASOE) HTTPS ReEncrypt using SourceIP Persistence (Version Q1-22)</comment>\n                <certified>yes</certified>\n            </template>\n            <template>\n                <name>PASOE-HTTP-JSESSIONID_Cookie</name>\n                <comment>Progress Application Server for OpenEdge (PASOE) HTTP using Cookie Persistence (JSESSIONID) (Version Q1-22)</comment>\n                <certified>yes</certified>\n            </template>\n            <template>\n                <name>PASOE-HTTP-Source_IP </name>\n                <comment>Progress Application Server for OpenEdge (PASOE) HTTP using SourceIP Persistence (Version Q1-22)</comment>\n                <certified>yes</certified>\n            </template>\n            <template>\n                <name>PASOE-HTTPS-Offloaded-JSESSIONID_Cookie </name>\n                <comment>Progress Application Server for OpenEdge (PASOE) HTTPS Offloaded using Cookie Persistence (JSESSIONID) (Version Q1-22)</comment>\n                <certified>yes</certified>\n            </template>\n            <template>\n                <name>PASOE-HTTPS-Offloaded-Source_IP</name>\n                <comment>Progress Application Server for OpenEdge (PASOE) HTTPS Offloaded using SourceIP Persistence (Version Q1-22)</comment>\n                <certified>yes</certified>\n            </template>\n            <template>\n                <name>PASOE-HTTPS-ReEncrypt-JSESSIONID_Cookie </name>\n                <comment>Progress Application Server for OpenEdge (PASOE) HTTPS ReEncrypt using Cookie Persistence (JSESSIONID) (Version Q1-22)</comment>\n                <certified>yes</certified>\n            </template>\n            <template>\n                <name>PASOE-HTTPS-ReEncrypt-Source_IP</name>\n                <comment>Progress Application Server for OpenEdge (PASOE) HTTPS ReEncrypt using SourceIP Persistence (Version Q1-22)</comment>\n                <certified>yes</certified>\n            </template>\n            <template>\n                <name>PASOE-HTTP-JSESSIONID_Cookie</name>\n                <comment>Progress Application Server for OpenEdge (PASOE) HTTP using Cookie Persistence (JSESSIONID) (Version Q1-22)</comment>\n                <certified>yes</certified>\n            </template>\n            <template>\n                <name>PASOE-HTTP-Source_IP </name>\n                <comment>Progress Application Server for OpenEdge (PASOE) HTTP using SourceIP Persistence (Version Q1-22)</comment>\n                <certified>yes</certified>\n            </template>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"c6d6f2d7-f108-44c2-b405-e275d62fadfd"},{"name":"Delete a Template","id":"5e499a7c-87ab-499f-b0df-365a89317750","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deltemplate?name=PASOE-HTTP-JSESSIONID_Cookie","description":"<p>To delete a template from the LoadMaster, run the <b>deltemplate</b> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","deltemplate"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"PASOE-HTTP-JSESSIONID_Cookie"}],"variable":[]}},"response":[{"id":"1c815453-7503-4bce-b0c0-b4e1fd146245","name":"Delete a Template","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deltemplate?name=PASOE-HTTP-JSESSIONID_Cookie","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","deltemplate"],"query":[{"key":"name","value":"PASOE-HTTP-JSESSIONID_Cookie"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:46:43 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"5e499a7c-87ab-499f-b0df-365a89317750"}],"id":"d38c1005-52b7-4c6d-a475-dddce6c0fa4d","description":"<p>Refer to the sections below for command examples relating to Virtual Service template management.</p>\n","_postman_id":"d38c1005-52b7-4c6d-a475-dddce6c0fa4d"},{"name":"Manage SSO","item":[{"name":"SSO Domain Management","item":[{"name":"Retrieve the Value of the kcdciphersha1 Parameter","id":"fad4f815-5a94-4355-a792-c7de870b043d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=kcdciphersha1","description":"<p>When the <b>kcdciphersha1</b> parameter is enabled, the AES256 SHA1 KCD cipher is used (by default the RC4 cipher is used).\nTo retrieve the value of the kcdciphersha1 parameter, run the <b>get</b> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","get"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"kcdciphersha1"}],"variable":[]}},"response":[{"id":"3d14145f-1643-4715-9314-e9d23870fa93","name":"Retrieve the Value of the kcdciphersha1 Parameter","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=kcdciphersha1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","get"],"query":[{"key":"param","value":"kcdciphersha1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:47:33 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <KcdCipherSha1>no</KcdCipherSha1>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"fad4f815-5a94-4355-a792-c7de870b043d"},{"name":"Enable/Disable the kcdciphersha1 Parameter","id":"a5c5b1e3-ec52-4be4-a078-b202284b8964","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=kcdciphersha1&value=1","description":"<p>To enable or disable the <strong>kcdciphersha1</strong> parameter, run the <strong>set</strong> command.</p>\n<p>After changing the value of the <strong>kcdciphersha1</strong> parameter, you can run the <strong>logging.ssoflush</strong> command to flush the SSO authentication cache.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","set"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"kcdciphersha1"},{"key":"value","value":"1"}],"variable":[]}},"response":[{"id":"eeddbf04-e755-43dd-9d39-841e9fa81932","name":"Enable/Disable the kcdciphersha1 Parameter","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=kcdciphersha1&value=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","set"],"query":[{"key":"param","value":"kcdciphersha1"},{"key":"value","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:48:24 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"a5c5b1e3-ec52-4be4-a078-b202284b8964"},{"name":"Show Details of All SSO Domains","id":"c5e049ec-f075-4269-a139-13b5f1043946","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showdomain","description":"<p>To show details of all domains, run the <b>showdomain</b> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showdomain"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"9c6b01a7-05ab-4b5b-adf8-3af4cebf22c1","name":"Show Details of All SSO Domains","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showdomain"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:49:17 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Domain>\n                <Id>1</Id>\n                <Name>EXAMPLE.COM</Name>\n                <ldap_endpoint>None</ldap_endpoint>\n                <ldapephc>1</ldapephc>\n                <testuser></testuser>\n                <ldap_version>3</ldap_version>\n                <server_side>0</server_side>\n                <auth_type>LDAP-Unencrypted</auth_type>\n                <logon_fmt>Principalname</logon_fmt>\n                <logon_fmt2>Principalname</logon_fmt2>\n                <logon_transcode>0</logon_transcode>\n                <logon_domain></logon_domain>\n                <radius_send_nas_id>0</radius_send_nas_id>\n                <kerberos_domain></kerberos_domain>\n                <kerberos_kdc></kerberos_kdc>\n                <kcd_username></kcd_username>\n                <user_acc_control>0</user_acc_control>\n                <max_failed_auths>0</max_failed_auths>\n                <reset_fail_tout>60</reset_fail_tout>\n                <unblock_tout>1800</unblock_tout>\n                <sess_tout_type>idle time</sess_tout_type>\n                <sess_tout_idle_pub>900</sess_tout_idle_pub>\n                <sess_tout_duration_pub>1800</sess_tout_duration_pub>\n                <sess_tout_idle_priv>900</sess_tout_idle_priv>\n                <sess_tout_duration_priv>28800</sess_tout_duration_priv>\n                <cert_asi>0</cert_asi>\n                <cert_check_cn>0</cert_check_cn>\n            </Domain>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"c5e049ec-f075-4269-a139-13b5f1043946"},{"name":"Add an SSO Domain","id":"442ed03e-87fe-4ed4-8e85-6d7ed465a1c7","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/adddomain?domain=example2.com","description":"<p>To add a domain, run the <b>adddomain</b> command.</p>\n<blockquote>\n<p>You can specify up to 64 characters in the <b>domain</b> parameter. The maximum number of SSO domains that are allowed is 128.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","adddomain"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"domain","value":"example2.com"}],"variable":[]}},"response":[{"id":"ce2fcad5-6146-4410-ac8e-63b5298aac3e","name":"Add an SSO Domain","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/adddomain?domain=example2.com","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","adddomain"],"query":[{"key":"domain","value":"example2.com"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:50:14 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Domain 'EXAMPLE2.COM' created</Success>\n</Response>"}],"_postman_id":"442ed03e-87fe-4ed4-8e85-6d7ed465a1c7"},{"name":"Modify an SSO Domain","id":"706d6e1b-a010-4047-ad2d-d909b1cac52a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/moddomain?domain=example.com&ldap_endpoint=ExampleEndpoint","description":"<p>To modify an SSO domain, run the <strong>moddomain</strong> command.</p>\n<p>The <strong>moddomain</strong> command accepts the following additional (optional) parameters:</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Range</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>auth_type</p></td><td><p>S</p></td><td><p>LDAP-StartTLS</p></td><td><p>LDAP-Unencrypted</p><p>LDAP-StartTLS</p><p>LDAP-LDAPS</p><p>RADIUS</p><p>RSA-SECURID</p><p>KCD</p><p>Certificates</p><p>RADIUS and LDAP-Unencrypted</p><p>RADIUS and LDAP-StartTLS</p><p>RADIUS and LDAP-LDAPS</p><p>RSA-SECURID and LDAP-Unencrypted</p><p>RSA-SECURID and LDAP-StartTLS</p><p>RSA-SECURID and LDAP-LDAPS</p><p>OIDC-OAUTH</p></td><td><p>Specify the transport protocol used to communicate with the authentication server.</p></td></tr><tr><td><p>ldap_endpoint</p></td><td><p>S</p></td><td><p>None</p></td><td><p>The name of an existing LDAP endpoint</p></td><td><p>Specify the LDAP endpoint to use. For further information on LDAP endpoints, refer to the<a href=\"#9c747c6a-79a6-4055-a8de-9577ce8b9e1f\">LDAP Configuration</a>section.</p></td></tr><tr><td><p>radius_shared_secret</p></td><td><p>S (masked)</p></td><td><p>unset</p></td><td><p> </p></td><td><p>The shared secret to use between the RADIUS server and the LoadMaster.</p></td></tr><tr><td>radius_send_nas_id</td><td>B</td><td>0 - Disabled</td><td>0 - Disabled<br />1 - Enabled<br /></td><td>If this parameter is disabled (default), a NAS identifier is not sent to the RADIUS server. If it is enabled, a Network Access Server (NAS) identifier string is sent to the RADIUS server. By default, this is the hostname. Alternatively, if a value is specified in the <b>radius_nas_id</b> parameter, this value is used as the NAS identifier. If the NAS identifier cannot be added, the RADIUS access request is still processed.<br />This field is only available if the <b>auth_type</b> is set to a RADIUS option.<br /></td></tr><tr><td>radius_nas_id</td><td>S</td><td>The hostname</td><td> </td><td><p>If the <b>radius_send_nas_id</b> parameter is enabled, the <b>radius_nas_id</b> parameter is relevant. When specified, this value is used as the NAS identifier. Otherwise, the hostname is used as the NAS identifier. If the NAS identifier cannot be added, the RADIUS access request is still processed.<br /></p><p>This parameter is only relevant if the <b>auth_type</b> is set to a RADIUS option and the <b>radius_send_nas_id</b> parameter is enabled.<br /></p></td></tr><tr><td><p>logon_fmt</p></td><td><p>S</p></td><td><p>Principalname</p></td><td><p>not specified</p><p>Principalname</p><p>Username</p><p>Username only</p></td><td><p>Specify the logon string format used to authenticate to the LDAP/RADIUS server.</p><p>The <b>Username only</b> value is only available if the <b>auth_type</b> is set to a <b>RADIUS </b>or <b>RSA-SecurID</b> protocol. The <b>Username </b>value is not available if the auth_type is set to <b>RADIUS </b>or a <b>RADIUS and LDAP</b> protocol.</p></td></tr><tr><td><p>logon_fmt2</p></td><td><p>S</p></td><td><p>Principalname</p></td><td><p>Not specified</p><p>Principalname</p><p>Username</p></td><td><p>Specify the logon string format used to authenticate to the server.</p></td></tr><tr><td><p>logon_domain</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>This parameter corresponds with the <b>Domain/Realm </b>field in the WUI. The login domain to be used. This is also used with logon format to construct the normalized user name, for example:</p><p>Principalname: @</p><p>Username:</p><p>\\</p></td></tr><tr><td><p>logon_transcode</p></td><td><p>B</p></td><td><p>0</p></td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td><p>Enable or disable the transcode of logon credentials from ISO-8859-1 to UTF-8, when required.</p></td></tr><tr><td>user_acc_control</td><td>I</td><td>0</td><td>0-300</td><td>Specify the range in which periodic User Access Control (UAC) checks are performed. When an interval value is specified in the range of 1 to 300 minutes, the periodic UAC check is performed per user for the requests received after the interval expiry. If the interval value is set to 0 minutes, then the UAC check is not performed.</td></tr><tr><td><p>max_failed_auths</p></td><td><p>I</p></td><td><p>0</p></td><td><p>0-999</p></td><td><p>The maximum number of failed login attempts before the user is locked out.</p><p>0 – Never lock out.</p></td></tr><tr><td><p>sess_tout_idle_pub</p></td><td><p>I</p></td><td><p>900</p></td><td><p>60-604800</p></td><td><p>The session idle timeout value in seconds. This value is used in a public environment.</p></td></tr><tr><td><p>sess_tout_duration_pub</p></td><td><p>I</p></td><td><p>1800</p></td><td><p>60-604800</p></td><td><p>The maximum duration timeout value for the session in seconds. This value is used in a public environment.</p></td></tr><tr><td><p>sess_tout_idle_priv</p></td><td><p>I</p></td><td><p>900</p></td><td><p>60-604800</p></td><td><p>The session idle timeout value in seconds. This value is used in a private environment.</p></td></tr><tr><td><p>sess_tout_duration_priv</p></td><td><p>I</p></td><td><p>2800</p></td><td><p>60-604800</p></td><td><p>The maximum duration timeout value for the session in seconds. This value is used in a private environment.</p></td></tr><tr><td><p>sess_tout_type</p></td><td><p>S</p></td><td><p>idle time</p></td><td><p>idle time</p><p>max duration</p></td><td><p>Specify the type of session timeout to be used.</p></td></tr><tr><td><p>testuser</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>The username that will be used to check the authentication server(s), if you are not using an LDAP endpoint.</p></td></tr><tr><td><p>testpass</p></td><td><p>S (masked)</p></td><td><p>unset</p></td><td><p> </p></td><td><p>The password of the user that is used to check the authentication server(s), if you are not using an LDAP endpoint.</p></td></tr><tr><td><p>reset_fail_tout</p></td><td><p>I</p></td><td><p>60</p></td><td><p>60-86400</p></td><td><p>The number of seconds that must elapse before the <b>Failed Login Attempts</b> counter is reset to 0. This value must be less than the <b>unblock_tout</b>.</p></td></tr><tr><td><p>unblock_tout</p></td><td><p>I</p></td><td><p>1800</p></td><td><p>60-86400</p></td><td><p>The timeout value (in seconds) before a blocked account is automatically unblocked. This must be greater than the <b>reset_fail_tout </b>value.</p></td></tr><tr><td><p>server</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>The address(s) of the server(s) that are to be used to validate this domain.</p><p>IPv6 is not supported for RADIUS authentication.</p></td></tr><tr><td><p>server2</p></td><td><p>A</p></td><td><p>unset</p></td><td><p>Valid IP address</p></td><td><p>When using dual factor authentication, use the <b>server </b>parameter to set the address of the RADIUS server(s) and use the <b>server2 </b>parameter to set the address of the LDAP server(s).</p></td></tr><tr><td><p>kerberos_domain</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>The Kerberos Realm</p></td></tr><tr><td><p>kerberos_kdc</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>The Kerberos Key Distribution Center</p></td></tr><tr><td><p>kcd_username</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>The <b>kcd_username </b>should not contain double or single quotes.</p></td></tr><tr><td><p>kcd_password</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>The <b>kcd_password </b>should not contain double or single quotes.</p></td></tr><tr><td><p>ldap_admin</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>This, along with the <b>ldap_password</b>, is used to log in to the database to check if the user from the certificate exists.</p></td></tr><tr><td><p>ldap_password</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>This, along with the <b>ldap_admin</b>, is used to log in to the database to check if the user from the certificate exists.</p></td></tr><tr><td><p>cert_check_asi</p></td><td><p>B</p></td><td><p>0 - Disabled</p></td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td><p>This option is only available when the <b>Authentication Protocol</b> is set to <b>Certificates</b>. When this option is enabled - in addition to checking the validity of the client certificate, the client certificate will also be checked against the altSecurityIdentities (ASI) attribute of the user on the Active Directory.</p></td></tr><tr><td><p>cert_check_cn</p></td><td><p>B</p></td><td><p>0 - Disabled</p></td><td><p>0 - Disabled</p><p>1 - Disabled</p></td><td><p>Enabling this parameter allows a fallback to check the Common Name (CN) in the certificate when the SAN is not available.</p></td></tr><tr><td><p>server_side</p></td><td><p>B</p></td><td><p>Y – Outbound KCD SSO domain</p></td><td><p>Y = Outbound KCD SSO domain</p><p>N = Inbound configuration</p></td><td><p>Specify whether the configuration is inbound or outbound.</p></td></tr><tr><td><p>idp_entity_id</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Specify the Identity Service Provider (IdP) Entity ID. This is relevant when using SAML. The maximum number of characters permitted in this field is 255.</p></td></tr><tr><td><p>idp_sso_url</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Specify the IdP Single Sign On (SSO) URL. This is relevant when using SAML.</p></td></tr><tr><td><p>Idp_logoff_url</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Specify the IdP Logoff URL. This is relevant when using SAML. The maximum number of characters permitted in this field is 255.</p></td></tr><tr><td><p>idp_cert</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Specify the IdP certificate to use for verification processing.</p></td></tr><tr><td>idp_match_cert</td><td>B</td><td>0 - Disabled</td><td>0 - Disabled<br /><br />1 - Enabled<br /></td><td>If this option is enabled, the IdP certificate assigned must match the certificate in the IdP SAML response.</td></tr><tr><td><p>sp_entity_id</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Relevant when using SAML - the Service Provider (SP) entity ID is an identifier that is shared to enable the IdP to understand, accept and have knowledge of the entity when request messages are sent from the LoadMaster. This must correlate to the identifier of the relying party on the AD FS server. The maximum number of characters permitted in this field is 255.</p></td></tr><tr><td><p>sp_cert</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>It is optional to sign requests that are sent in the context of logon. Currently, the LoadMaster does not sign those requests.</p><p>In the context of log off requests – it is mandatory and these requests must be signed. This is to avoid any spoofing and to provide extra security in relation to log off functionality. This ensures that users are not being hacked and not being logged off unnecessarily.</p><p>In the <b>sp_cert</b> parameter, you can choose to use a self-signed certificate to perform the signing.</p><p>To specify a self-signed certificate, set <b>sp_cert</b> to <b>useselfsigned</b>. By default, <b>sp_cert</b> is set to <b>useselfsigned</b>.</p></td></tr><tr><td>ldapephc</td><td>B</td><td>1 - Enabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>Enable this parameter to use the LDAP endpoint admin username and password for the health check.</td></tr><tr><td>oidc_app_id</td><td>S</td><td>unset</td><td></td><td>Add the Application (client) ID of the application. The maximum number of characters permitted in this field is 255.</td></tr><tr><td>oidc_redirect_uri</td><td>S</td><td>unset</td><td></td><td>Specify the redirect Uniform Resource Identifier (URI) or URIs (reply URLs). You can enter multiple URIs separated by a space. A maximum of 255 characters can be specified for the <b>oidc_redirect_uri </b>parameter. Once a value is set for this parameter, you cannot unset it.</td></tr><tr><td>oidc_auth_ep_url</td><td>S</td><td>unset</td><td></td><td>Specify the authorization end point URL of the application. Ensure to use the correct URL format. The maximum number of characters permitted in this field is 255.</td></tr><tr><td>oidc_token_ep_url</td><td>S</td><td>unset</td><td></td><td>Specify the token end point URL of the application. Ensure to use the correct URL format. The maximum number of characters permitted in this field is 255.</td></tr><tr><td>oidc_logoff_url</td><td>S</td><td>unset</td><td></td><td>Specify the logoff URL of the application. Ensure to use the correct URL format. The maximum number of characters permitted in this field is 255.</td></tr><tr><td>oidc_secret</td><td>S</td><td>unset</td><td></td><td>Specify the OIDC application secret of the application.</td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","moddomain"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"domain","value":"example.com"},{"key":"ldap_endpoint","value":"ExampleEndpoint"}],"variable":[]}},"response":[{"id":"4996e8a1-b65a-4e2a-ac26-1d4a16c8d707","name":"Modify an SSO Domain","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/moddomain?domain=example.com&ldap_endpoint=ExampleEndpoint","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","moddomain"],"query":[{"key":"domain","value":"example.com"},{"key":"ldap_endpoint","value":"ExampleEndpoint"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:51:20 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Domain>\n                <Id>1</Id>\n                <Name>EXAMPLE.COM</Name>\n                <ldap_endpoint>EXAMPLEENDPOINT</ldap_endpoint>\n                <ldapephc>1</ldapephc>\n                <testuser></testuser>\n                <ldap_version>3</ldap_version>\n                <server_side>0</server_side>\n                <auth_type>LDAP-Unencrypted</auth_type>\n                <logon_fmt>Principalname</logon_fmt>\n                <logon_fmt2>Principalname</logon_fmt2>\n                <logon_transcode>0</logon_transcode>\n                <logon_domain></logon_domain>\n                <radius_send_nas_id>0</radius_send_nas_id>\n                <kerberos_domain></kerberos_domain>\n                <kerberos_kdc></kerberos_kdc>\n                <kcd_username></kcd_username>\n                <user_acc_control>0</user_acc_control>\n                <max_failed_auths>0</max_failed_auths>\n                <reset_fail_tout>60</reset_fail_tout>\n                <unblock_tout>1800</unblock_tout>\n                <sess_tout_type>idle time</sess_tout_type>\n                <sess_tout_idle_pub>900</sess_tout_idle_pub>\n                <sess_tout_duration_pub>1800</sess_tout_duration_pub>\n                <sess_tout_idle_priv>900</sess_tout_idle_priv>\n                <sess_tout_duration_priv>28800</sess_tout_duration_priv>\n                <cert_asi>0</cert_asi>\n                <cert_check_cn>0</cert_check_cn>\n            </Domain>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"706d6e1b-a010-4047-ad2d-d909b1cac52a"},{"name":"Show Details of a Specific SSO Domain","id":"aa95218e-1bde-4871-ba19-1d671f086795","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showdomain?domain=example.com","description":"<p>To show details for a particular SSO domain, run the <b>showdomain</b> command and specify the <b>domain</b>.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showdomain"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"domain","value":"example.com"}],"variable":[]}},"response":[{"id":"acfddbdb-465f-4e52-adf0-357c4cbac081","name":"Show Details of a Specific SSO Domain","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showdomain?domain=example.com","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","showdomain"],"query":[{"key":"domain","value":"example.com"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:52:08 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Domain>\n                <Id>1</Id>\n                <Name>EXAMPLE.COM</Name>\n                <ldap_endpoint>EXAMPLEENDPOINT</ldap_endpoint>\n                <ldapephc>1</ldapephc>\n                <testuser></testuser>\n                <ldap_version>3</ldap_version>\n                <server_side>0</server_side>\n                <auth_type>LDAP-Unencrypted</auth_type>\n                <logon_fmt>Principalname</logon_fmt>\n                <logon_fmt2>Principalname</logon_fmt2>\n                <logon_transcode>0</logon_transcode>\n                <logon_domain></logon_domain>\n                <radius_send_nas_id>0</radius_send_nas_id>\n                <kerberos_domain></kerberos_domain>\n                <kerberos_kdc></kerberos_kdc>\n                <kcd_username></kcd_username>\n                <user_acc_control>0</user_acc_control>\n                <max_failed_auths>0</max_failed_auths>\n                <reset_fail_tout>60</reset_fail_tout>\n                <unblock_tout>1800</unblock_tout>\n                <sess_tout_type>idle time</sess_tout_type>\n                <sess_tout_idle_pub>900</sess_tout_idle_pub>\n                <sess_tout_duration_pub>1800</sess_tout_duration_pub>\n                <sess_tout_idle_priv>900</sess_tout_idle_priv>\n                <sess_tout_duration_priv>28800</sess_tout_duration_priv>\n                <cert_asi>0</cert_asi>\n                <cert_check_cn>0</cert_check_cn>\n            </Domain>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"aa95218e-1bde-4871-ba19-1d671f086795"},{"name":"Delete an SSO Domain","id":"b46c1670-607c-4e61-bac9-f0de76a81ca8","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deldomain?domain=example.com","description":"<p>To delete an existing SSO domain, run the <b>deldomain</b> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","deldomain"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"domain","value":"example.com"}],"variable":[]}},"response":[{"id":"aa3f0a6a-76ec-4e96-a9a8-4c1adabd7fdb","name":"Delete an SSO Domain","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deldomain?domain=example.com","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","deldomain"],"query":[{"key":"domain","value":"example.com"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:52:46 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Domain deleted</Success>\n</Response>"}],"_postman_id":"b46c1670-607c-4e61-bac9-f0de76a81ca8"},{"name":"Show Locked Users","id":"c68d3a1c-0735-441b-a78c-4f57bd25548b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showdomainlockedusers","description":"<p>To display the locked users, run the <strong>showdomainlockedusers</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showdomainlockedusers"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"aadba3ec-b3bf-49fb-bacf-f02d5b2c1039","name":"Show Locked Users","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showdomainlockedusers"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:53:34 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <LockedUsers>\n        <user>\n            <domainid>3</domainid>\n            <username>user@example.com</username>\n            <locktime>Wed Oct  7 02:33:29 4461407</locktime>\n        </user>\n    </LockedUsers>\n</response>"}],"_postman_id":"c68d3a1c-0735-441b-a78c-4f57bd25548b"},{"name":"Unlock Users","id":"2a68a64d-98af-4838-a451-47389a0f831c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/unlockdomainusers?domain=example2.com&users=ExampleUser","description":"<p>To unlock specified users, run the <strong>unlockdomainusers</strong> command.</p>\n<p>You can either use the <strong>domain</strong> or <strong>domainid</strong> parameter to specify the relevant domain.</p>\n<p>You can find the domain ID in the response of the <strong>showdomainlockedusers</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","unlockdomainusers"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"domain","value":"example2.com"},{"key":"users","value":"ExampleUser"}],"variable":[]}},"response":[{"id":"67324c0f-1544-4c18-8907-5c9890df5b42","name":"Unlock Users","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/unlockdomainusers?domain=example2.com&users=ExampleUser","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","unlockdomainusers"],"query":[{"key":"domain","value":"example2.com"},{"key":"users","value":"ExampleUser"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 15:57:07 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <UnlockedUsers>\n        <user>ExampleUser</user>\n    </UnlockedUsers>\n</response>"}],"_postman_id":"2a68a64d-98af-4838-a451-47389a0f831c"},{"name":"Upload RSA Authentication Manager Config File","id":"fcb9ee6a-e057-46a3-b241-ea8c46027954","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/OneDrive - Progress Software Corporation/documentation updates/RSA SecurID two factor authentication/AM_Config.zip"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setrsaconfig","description":"<p>If using <strong>RSA-SecurID</strong> as the <strong>Authentication Protocol</strong>, files need to be uploaded to the LoadMaster for the authentication to work.<br />To upload the <strong>RSA Authentication Manager Config File</strong>, run the <strong>setrsaconfig</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setrsaconfig"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"a4f4e695-f1d1-41e2-a302-8ecc4f4ebc00","name":"Upload RSA Authentication Manager Config File","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/OneDrive - Progress Software Corporation/documentation updates/RSA SecurID two factor authentication/AM_Config.zip"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setrsaconfig"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 11:04:13 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Authentication Manager Config successfully loaded</Success>\n</Response>"}],"_postman_id":"fcb9ee6a-e057-46a3-b241-ea8c46027954"},{"name":"Upload RSA Node Secret File","id":"80cfdd20-c3f1-4a4a-afd1-a9880051ada2","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/OneDrive - Progress Software Corporation/documentation updates/RSA SecurID two factor authentication/lm60_NodeSecret.zip"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setrsanodesecret?rsanspwd=\"\"","description":"<p>To upload the <strong>RSA Node Secret File</strong>, run the <strong>setrsanodesecret</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setrsanodesecret"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"rsanspwd","value":"\"\""}],"variable":[]}},"response":[{"id":"2213a1b8-02ac-413f-9457-90b57f65c58a","name":"Upload RSA Node Secret File","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/OneDrive - Progress Software Corporation/documentation updates/RSA SecurID two factor authentication/lm60_NodeSecret.zip"}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setrsanodesecret?rsanspwd=\"\"","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setrsanodesecret"],"query":[{"key":"rsanspwd","value":"\"\""}]}},"status":"Unprocessable Entity (WebDAV) (RFC 4918)","code":422,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 15:27:29 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"422\" code=\"fail\">\n    <Error>Command Failed: Failed to load Node Secret</Error>\n</Response>"}],"_postman_id":"80cfdd20-c3f1-4a4a-afd1-a9880051ada2"},{"name":"Upload an Identity Provider (IdP) Metadata File","id":"f739308d-63fe-4f0c-bbc7-094cf679ff61","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/OneDrive - Progress Software Corporation/documentation updates/SAML/SAML-Metadata.xml"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/uploadsamlidpmd?domain=example2.com","description":"<p>The <strong>uploadsamlidpmd</strong> command is used to upload an IdP metadata file. This simplifies the configuration of the IdP attributes, including the <strong>IdP Entity ID</strong>, <strong>IdP SSO URL,</strong> and <strong>IdP Logoff URL</strong>. The metadata file can be downloaded from the IdP. To upload an IdP metadata file, run the <strong>uploadsamlidpmd</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","uploadsamlidpmd"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"domain","value":"example2.com"}],"variable":[]}},"response":[{"id":"a12f1c63-b5a4-4cb7-b3d8-1261491cea00","name":"Upload an Identity Provider (IdP) Metadata File","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/OneDrive - Progress Software Corporation/documentation updates/SAML/SAML-Metadata.xml"}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/uploadsamlidpmd?domain=example2.com","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","uploadsamlidpmd"],"query":[{"key":"domain","value":"example2.com"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 15:29:26 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>IdP MetaData file successfully loaded</Success>\n</Response>"}],"_postman_id":"f739308d-63fe-4f0c-bbc7-094cf679ff61"},{"name":"Download the Service Provider Certificate","id":"35bd32ab-3880-4384-b53f-8e3654ac6d86","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/downloadsamlspcert?domain=example2.com","description":"<p>If using SAML and a self-signed certificate, the <b>downloadsamlspcert</b> command is used to download the certificate from the LoadMaster. This certificate must be installed on the IdP server (for example AD FS) to be added to the relying party signature. </p>\n<p>The AD FS server requires this certificate for use of the public key to verify the signatures that the LoadMaster generates.</p>\n<p>To download the certificate, run the <b>downloadsamlspcert</b> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","downloadsamlspcert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"domain","value":"example2.com"}],"variable":[]}},"response":[{"id":"be79ed2f-7df5-4bd2-b455-dd46449db533","name":"Download the Service Provider Certificate","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/downloadsamlspcert?domain=example2.com","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","downloadsamlspcert"],"query":[{"key":"domain","value":"example2.com"}]}},"status":"OK","code":200,"_postman_previewlanguage":"raw","header":[{"key":"Date","value":"Thu, 15 Aug 2024 15:07:14 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/octet-stream"},{"key":"Content-Disposition","value":"inline; filename=\"EXAMPLE\""}],"cookie":[],"responseTime":null,"body":"To save the file, in Postman - go to the Body of the response, click the three dots on the right, and click Save response to file."}],"_postman_id":"35bd32ab-3880-4384-b53f-8e3654ac6d86"}],"id":"39f08086-de9b-4330-a536-40ff18b32b36","description":"<p>The sections below provide details on SSO domain management.</p>\n","_postman_id":"39f08086-de9b-4330-a536-40ff18b32b36"},{"name":"SSO Sessions","item":[{"name":"List All Open Sessions for a Specific SSO Domain","id":"a84bc747-bbe4-48e5-90e0-311f4b9dcace","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/ssodomain/queryall?domain=example2.com","description":"<p>To retrieve a list of all open sessions for a specific SSO domain, run the <strong>ssodomain/queryall</strong> command.</p>\n<p>This returns the number of active user and cookie sessions.</p>\n<blockquote>\n<p>The <strong>queryall</strong> command returns the number of <strong>UserSessions</strong> and <strong>CookieSessions</strong>. The SSO sessions for <strong>Basic Authentication</strong>, <strong>Client Certificate</strong>, and <strong>Form Based</strong> authentication types are counted as <strong>UserSessions</strong>. For <strong>Form Based</strong> authentication, the same session is also counted as a cookie session. <strong>SAML</strong> SSO sessions are counted as <strong>CookieSessions</strong> only.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","ssodomain","queryall"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"domain","value":"example2.com"}],"variable":[]}},"response":[{"id":"e53cb712-2ade-416a-aae2-181c655d4faf","name":"List All Open Sessions for a Specific SSO Domain","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/ssodomain/queryall?domain=example2.com","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","ssodomain","queryall"],"query":[{"key":"domain","value":"example2.com"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 15:32:44 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Session>\n                <UserSessions>0</UserSessions>\n                <CookieSessions>0</CookieSessions>\n            </Session>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"a84bc747-bbe4-48e5-90e0-311f4b9dcace"},{"name":"Filter the List of Open Sessions by User","id":"8bb8b565-3e9c-4e1c-8e03-070e07a8f700","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/ssodomain/search?domain=example2.com&user=ExampleUser","description":"<p>To filter the list of open sessions by user, run the <strong>ssodomain/search</strong> command and specify the <strong>user</strong>.</p>\n<blockquote>\n<p>The match is based on a substring of the username and is not exact.<br />The <strong>user</strong> parameter is not case sensitive.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","ssodomain","search"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"domain","value":"example2.com"},{"key":"user","value":"ExampleUser"}],"variable":[]}},"response":[{"id":"f90d9f1b-2816-49b0-938f-8c09555b87f8","name":"Filter the List of Open Sessions by User","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/ssodomain/search?domain=example2.com&user=ExampleUser","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","ssodomain","search"],"query":[{"key":"domain","value":"example2.com"},{"key":"user","value":"ExampleUser"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 15:35:33 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <NumberOfSessions>0</NumberOfSessions>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"8bb8b565-3e9c-4e1c-8e03-070e07a8f700"},{"name":"Return Sessions with a Particular Range","id":"83441b2b-fa77-4481-911a-180af352e574","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/ssodomain/querysessions?domain=example2.com&user=ExampleUser&startsession=1&endsession=1000","description":"<p>To return sessions within a particular range, run the <b>querysessions</b> command.</p>\n<p>This returns sessions in sequence, as they appear in the cache.</p>\n<p>If you do not specify the <b>startsession</b> and <b>endsession</b> parameters, the first 1000 sessions display.</p>\n<blockquote>\n<p>The maximum number of SSO sessions that can be returned in a single <b>querysessions</b> API call is limited to 1000. If the maximum number of SSO sessions exceeds 1000, you must use multiple <b>querysessions</b> API calls.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","ssodomain","querysessions"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"domain","value":"example2.com"},{"key":"user","value":"ExampleUser"},{"key":"startsession","value":"1"},{"key":"endsession","value":"1000"}],"variable":[]}},"response":[{"id":"414c54a2-3490-45a0-a329-d080a1e12a82","name":"Return Sessions with a Particular Range","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/ssodomain/querysessions?domain=example2.com&user=ExampleUser&startsession=1&endsession=1000","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","ssodomain","querysessions"],"query":[{"key":"domain","value":"example2.com"},{"key":"user","value":"ExampleUser"},{"key":"startsession","value":"1"},{"key":"endsession","value":"1000"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 15:36:39 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <NumberOfSessions>0</NumberOfSessions>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"83441b2b-fa77-4481-911a-180af352e574"},{"name":"Kill an SSO Session","id":"f0f1429a-40ca-41bf-9320-a54672132eb5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/ssodomain/killsession?domain=example2.com&key=InsertCookie","description":"<p>To kill a particular session, run the <strong>killsession</strong> command.</p>\n<p>For the key parameter, you can either specify the <strong>Cookie</strong> or <strong>Username</strong>,<strong>SourceIPAddress</strong>.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","ssodomain","killsession"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"domain","value":"example2.com"},{"key":"key","value":"InsertCookie"}],"variable":[]}},"response":[{"id":"312db847-b85b-41b3-b889-be13e1b71b3a","name":"Kill an SSO Session","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/ssodomain/killsession?domain=example2.com&key=InsertCookie","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","ssodomain","killsession"],"query":[{"key":"domain","value":"example2.com"},{"key":"key","value":"InsertCookie"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 15:37:32 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <message>Killed 1 example2.com domain user session(s)</message>\n</response>"}],"_postman_id":"f0f1429a-40ca-41bf-9320-a54672132eb5"},{"name":"Kill all Open Sessions for a Specific SSO Domain","id":"476867a4-764e-4e33-91b4-010b93a5b433","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/ssodomain/killallsessions?domain=example2.com","description":"<p>To kill all open sessions for a particular domain, run the <strong>killallsessions</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","ssodomain","killallsessions"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"domain","value":"example2.com"}],"variable":[]}},"response":[{"id":"71eafca8-5dbf-4831-b47b-1a5767eeb169","name":"Kill all Open Sessions for a Specific SSO Domain","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/ssodomain/killallsessions?domain=example2.com","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","ssodomain","killallsessions"],"query":[{"key":"domain","value":"example2.com"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 15:39:16 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <message>Killed 1 example2.com domain user session(s)</message>\n</response>"}],"_postman_id":"476867a4-764e-4e33-91b4-010b93a5b433"}],"id":"d2e2b29b-45ab-41cb-a1ec-ac37aaaa5294","description":"<p>The commands in this section relate to the open SSO sessions.</p>\n","_postman_id":"d2e2b29b-45ab-41cb-a1ec-ac37aaaa5294"},{"name":"Custom SSO Image Sets","item":[{"name":"List Custom SSO Image Sets","id":"82404df6-d4c9-4da9-94a8-c7ce72864863","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listssoimages","description":"<p>To list the existing custom SSO image sets, run the <b>listssoimages</b> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listssoimages"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"1e29dd7e-7813-40a6-9cdc-3742e0bb407f","name":"List Custom SSO Image Sets","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listssoimages"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 15:41:18 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Imagesets>\n                <Imageset>\n                    <Name>ExampleImageSet</Name>\n                    <Installed>Tue Aug  6 15:41:13 2024</Installed>\n                    <Info></Info>\n                </Imageset>\n            </Imagesets>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"82404df6-d4c9-4da9-94a8-c7ce72864863"},{"name":"Upload a Custom SSO Image Set","id":"e91c16ef-46b7-4470-ba8f-d72c48d755d9","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/OneDrive - Progress Software Corporation/documentation updates/Custom Auth Form/ExampleImageSet.tar"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/ssoimages","description":"<p>To upload an SSO image set, use the <strong>ssoimages</strong> command.</p>\n<blockquote>\n<p>If a command requires binary data (file uploads), this data must be passed in the \"data\" string and be base64-encoded.</p>\n</blockquote>\n<p>The custom SSO image set must be in the format of a .tar file. A template tar file is available from the Support site: <a href=\"https://support.kemptechnologies.com/hc/en-us/articles/360048332092\">Single Sign-On Custom Images</a>. This can then be modified to gain the desired look and feel. For further information, please refer to the <a href=\"https://kemptechnologies.com/documentation/latestga/203126599\">Custom Authentication Form, Technical Note</a>.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","ssoimages"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"bf2ce924-2341-4bbe-a75f-6e14f96a9f7e","name":"Upload a Custom SSO Image Set","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/OneDrive - Progress Software Corporation/documentation updates/Custom Auth Form/ExampleImageSet.tar"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/ssoimages"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 15:43:14 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"shell-init","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Custom image sets installed</Success>\n</Response>"}],"_postman_id":"e91c16ef-46b7-4470-ba8f-d72c48d755d9"},{"name":"Delete a Custom SSO Image Set","id":"90629241-7524-41e2-aa13-fc33f38290a1","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delssoimage?name=ExampleImageSet","description":"<p>To delete a custom SSO image set, run the <b>delssoimage</b> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delssoimage"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"ExampleImageSet"}],"variable":[]}},"response":[{"id":"f77cadf0-e514-4981-a5df-4899ad2cd974","name":"Delete a Custom SSO Image Set","originalRequest":{"method":"POST","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delssoimage?name=ExampleImageSet","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delssoimage"],"query":[{"key":"name","value":"ExampleImageSet"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 15:44:17 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"90629241-7524-41e2-aa13-fc33f38290a1"}],"id":"543531e3-d378-4ce2-98c9-ac6e1b7cbf6a","description":"<p>Custom SSO image sets can be managed by using the commands detailed in the sections below.</p>\n","_postman_id":"543531e3-d378-4ce2-98c9-ac6e1b7cbf6a"}],"id":"0d255795-aba2-4ea5-b591-705cfe9afe4f","description":"<p>Refer to the sections below for details about commands relating to Edge Security Pack (ESP) Single Sign On (SSO) domains.</p>\n","_postman_id":"0d255795-aba2-4ea5-b591-705cfe9afe4f"},{"name":"Cache Configuration","item":[{"name":"Specify a File Extension to Not Cache","id":"282030e2-50f6-4542-af1e-790c518b906e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addnocache?param=.jpg","description":"<p>You can add a file extension to the list of file extensions that should not be cached by using the <strong>addnocache</strong> command.</p>\n<p>The FileExtension string must begin with a “.”.</p>\n<p>Related parameters that can be managed using <strong>get</strong> and <strong>set</strong> commands are detailed in the following table. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details on the <strong>get</strong> and <strong>set</strong> commands.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Range</b></p></td><td><p><b>Description</b></p></td></tr><tr><td><p>cachesize</p></td><td><p>I</p></td><td><p>1-409</p></td><td><p>Specifies the cache size.</p></td></tr><tr><td><p>hostcache</p></td><td><p>B</p></td><td><p>0 - Disabled</p><p>1 – Enabled</p></td><td><p>Enable or disable using the host cache.</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addnocache"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":".jpg"}],"variable":[]}},"response":[{"id":"08740e17-6eca-44cd-a9be-105b2b24d3f1","name":"Specify a File Extension to Not Cache","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addnocache?param=.jpg","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addnocache"],"query":[{"key":"param","value":".jpg"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 15:09:34 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"282030e2-50f6-4542-af1e-790c518b906e"},{"name":"Remove a File Extension from the No Cache List","id":"b21a0f68-086f-437e-9c1b-451aaf838f01","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delnocache?param=.jpg","description":"<p>You can delete a file extension from the list of file extensions that should not be cached by using the <strong>delnocache</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delnocache"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":".jpg"}],"variable":[]}},"response":[{"id":"4e4621fc-cdf2-4cea-8f87-0755b5b200bb","name":"Remove a File Extension from the No Cache List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delnocache?param=.jpg","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delnocache"],"query":[{"key":"param","value":".jpg"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 15:10:11 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"b21a0f68-086f-437e-9c1b-451aaf838f01"}],"id":"5fe44ab0-4e31-40dd-9780-ebf4a03d28d2","description":"<p>The sections below relate to the Cache Configuration. You can find these options in the LoadMaster UI in the following locations:</p>\n<ul>\n<li><p>GA: Virtual Services &gt; Cache Configuration</p>\n</li>\n<li><p>LTSF: System Configuration &gt; Miscellaneous Options &gt; AFE Configuration</p>\n</li>\n</ul>\n","_postman_id":"5fe44ab0-4e31-40dd-9780-ebf4a03d28d2"},{"name":"Compression Options","item":[{"name":"Specify a File Extension to Not Compress","id":"d59e4e02-094c-49d3-b2d8-778a03c4da9b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addnocompress?param=.jpg","description":"<p>You can add a file extension to the list of file extensions that should not be compressed by using the <strong>addnocompress</strong> command.</p>\n<p>The FileExtension string must begin with a “.”.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addnocompress"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":".jpg"}],"variable":[]}},"response":[{"id":"67f54f85-a810-4382-93fc-76486bc56d23","name":"Specify a File Extension to Not Compress","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addnocompress?param=.jpg","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addnocompress"],"query":[{"key":"param","value":".jpg"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 15:11:04 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"d59e4e02-094c-49d3-b2d8-778a03c4da9b"},{"name":"Remove a File Extension from the No Compression List","id":"f6cc9afc-0034-46f4-bd7c-4440d18848b8","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delnocompress?param=.jpg","description":"<p>To delete a file extension from the list of file extensions that should not be compressed by using the <strong>delnocompress</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delnocompress"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":".jpg"}],"variable":[]}},"response":[{"id":"b63f5e24-e160-4bbe-a536-bc96c9b4f63d","name":"Remove a File Extension from the No Compression List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delnocompress?param=.jpg","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delnocompress"],"query":[{"key":"param","value":".jpg"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 15:11:49 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"f6cc9afc-0034-46f4-bd7c-4440d18848b8"}],"id":"e7715be5-e0a0-4011-a4f4-4b2ee5d71e70","description":"<p>The sections below relate to the Compression Options. You can find these options in the LoadMaster UI in the following locations:</p>\n<ul>\n<li><p>GA: Virtual Services &gt; Compression Options</p>\n</li>\n<li><p>LTSF: System Configuration &gt; Miscellaneous Options &gt; AFE Configuration</p>\n</li>\n</ul>\n","_postman_id":"e7715be5-e0a0-4011-a4f4-4b2ee5d71e70"},{"name":"Kubernetes Settings","item":[{"name":"Upload a Kube Config File","id":"b4fe89b6-f11f-4d2a-bc33-1125286ff8b6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/OneDrive - Progress Software Corporation/documentation updates/Kubernetes/Kubeconfig"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addlmingressk8sconf","description":"<p>To upload a Kube config file to the LoadMaster, run the <strong>addlmingressk8sconf</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addlmingressk8sconf"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"b1605e3f-1764-4fd8-9ae3-f414d79e4c5a","name":"Upload a Kube Config File","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/OneDrive - Progress Software Corporation/documentation updates/Kubernetes/Kubeconfig"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addlmingressk8sconf"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:24:45 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"mv","value":"failed to preserve ownership for '/one4net/k8s/config.cc': Operation not permitted"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Kube Config correctly installed</Success>\n</Response>"}],"_postman_id":"b4fe89b6-f11f-4d2a-bc33-1125286ff8b6"},{"name":"Delete the Kube Config File","id":"d068d2e6-66f6-47f2-a946-70a972abc9ce","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/dellmingressk8sconf","description":"<p>To delete the existing Kube config file from the LoadMaster, run the <strong>dellmingressk8sconf</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","dellmingressk8sconf"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"09fe66ba-3383-46f4-83d5-015964c88330","name":"Delete the Kube Config File","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/dellmingressk8sconf"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:25:25 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Kube Config successfully removed</Success>\n</Response>"}],"_postman_id":"d068d2e6-66f6-47f2-a946-70a972abc9ce"},{"name":"List the Contexts in the Kube Config File","id":"f7f22610-ba0d-4762-88b6-8ef0ceb8edcd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showlmingressk8sconf","description":"<p>To list the contexts in the Kube config file that is installed on the LoadMaster, run the <strong>showlmingressk8sconf</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showlmingressk8sconf"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"04572e7f-b86c-4eb5-873a-03925beac126","name":"List the Contexts in the Kube Config File","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showlmingressk8sconf"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:26:09 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Context>\n                <Name>kubernetes-admin@kubernetes</Name>\n                <Cluster>kubernetes</Cluster>\n                <User>kubernetes-admin</User>\n                <Current>*</Current>\n            </Context>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"f7f22610-ba0d-4762-88b6-8ef0ceb8edcd"},{"name":"Check the Operations Mode","id":"46405a54-9a00-4b99-b353-af50c18155b8","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getlmingressmode","description":"<p>To check what <strong>Operations Mode</strong> is currently selected, run the <strong>getlmingressmode</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getlmingressmode"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"b68346b4-9df1-4edb-ba54-639446d6e923","name":"Check the Operations Mode","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getlmingressmode"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:26:49 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Mode>Service</Mode>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"46405a54-9a00-4b99-b353-af50c18155b8"},{"name":"Set the Operations Mode","id":"0e2119d4-c847-4686-9b9e-dbf9098fc587","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setlmingressmode?mode=Ingress","description":"<p>To set the <strong>Operations Mode</strong>, run the <strong>setlmingressmode</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setlmingressmode"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"mode","value":"Ingress"}],"variable":[]}},"response":[{"id":"8f8e2bbd-8e6a-4ebf-8039-077c5041c069","name":"Set the Operations Mode","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setlmingressmode?mode=Ingress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setlmingressmode"],"query":[{"key":"mode","value":"Ingress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:27:41 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"0e2119d4-c847-4686-9b9e-dbf9098fc587"},{"name":"Check the Namespace being Watched","id":"d4585e47-e723-49c5-9aff-514da30b84e9","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getlmingressnamespace","description":"<p>To check what namespace is currently being watched, run the <strong>getlmingressnamespace</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getlmingressnamespace"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"9b1e0011-a60f-4ae4-bd20-6cc05a634cca","name":"Check the Namespace being Watched","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getlmingressnamespace"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:28:19 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Namespace>ExampleNamespace</Namespace>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"d4585e47-e723-49c5-9aff-514da30b84e9"},{"name":"Set the Namespace to Watch","id":"4ac384cd-670f-4303-a7a1-82f2b56f4117","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setlmingressnamespace?namespace=default","description":"<p>To set the <strong>Namespace to Watch</strong>, run the <strong>setlmingressnamespace</strong> command.</p>\n<p>You can only filter on either a single name space or all name spaces. There is no capability to select multiple name spaces at this time.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setlmingressnamespace"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"namespace","value":"default"}],"variable":[]}},"response":[{"id":"93667896-024c-4e93-bddd-f7d28bb4af5c","name":"Set the Namespace to Watch","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setlmingressnamespace?namespace=default","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setlmingressnamespace"],"query":[{"key":"namespace","value":"default"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:29:31 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <message>Command completed ok</message>\n</response>"}],"_postman_id":"4ac384cd-670f-4303-a7a1-82f2b56f4117"},{"name":"Check the Watch Timeout","id":"2516ca37-9bfd-4777-95fe-04fdc110b6f7","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getlmingresswatchtimeout","description":"<p>To check the current <strong>LMingress Watch Timeout</strong> (in seconds), run the <strong>getlmingresswatchtimeout</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getlmingresswatchtimeout"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"af80cbf0-b6f5-4847-bf03-c3a6d7772943","name":"Check the Watch Timeout","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getlmingresswatchtimeout"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:31:42 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <WatchTimeout>300</WatchTimeout>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"2516ca37-9bfd-4777-95fe-04fdc110b6f7"},{"name":"Set the Watch Timeout","id":"732f64c0-eccc-4b54-8086-9cfec4513307","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setlmingresswatchtimeout?watchtimeout=30","description":"<p>To set the <strong>LMingress Watch Timeout</strong> (in seconds), run the <strong>setlmingresswatchtimeout</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setlmingresswatchtimeout"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"watchtimeout","value":"30"}],"variable":[]}},"response":[{"id":"f7d92f80-2745-4e04-9660-c4340ed61ee4","name":"Set the Watch Timeout","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setlmingresswatchtimeout?watchtimeout=30","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setlmingresswatchtimeout"],"query":[{"key":"watchtimeout","value":"30"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:32:17 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"732f64c0-eccc-4b54-8086-9cfec4513307"},{"name":"Restart the Ingress Controller","id":"463df515-45d6-409b-8a44-6ddabada316b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/restartlmingress","description":"<p>To restart the LoadMaster Ingress Controller, run the <strong>restartlmingress</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","restartlmingress"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"df8a7780-95d8-4a90-a426-7273edc534e2","name":"Restart the Ingress Controller","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/restartlmingress"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:32:45 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"463df515-45d6-409b-8a44-6ddabada316b"}],"id":"8fb7f316-8244-43bd-a912-2809c9959979","description":"<p>This section provides details about the LoadMaster RESTful API commands you can use to configure the Kubernetes Ingress Controller functionality.</p>\n","_postman_id":"8fb7f316-8244-43bd-a912-2809c9959979"},{"name":"Legacy WAF Settings","item":[{"name":"Commands Relating to Commercial Rule Files","item":[{"name":"Display the Commercial WAF Rule Settings","id":"d4402623-554b-4256-a53f-33ec68d2c88f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getwafsettings","description":"<p>The <strong>getwafsettings</strong> command displays the values of the WAF options relating to commercial rules that appear in the <strong>WAF Settings</strong> screen on the LoadMaster UI.</p>\n<p><strong>Related UI Item</strong></p>\n<p>Virtual Services &gt; WAF Settings</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getwafsettings"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"8ea58eb6-e855-4be7-bacc-0bb808e79660","name":"Display the Commercial WAF Rule Settings","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getwafsettings"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:39:13 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"find","value":"`waf_updated*': No such file or directory"},{"key":"date","value":"mapfile: No such file or directory"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <WAF>\n                <LogFormat>Native</LogFormat>\n                <RemoteLogging>no</RemoteLogging>\n                <AutoUpdate>0</AutoUpdate>\n                <AutoInstall>1</AutoInstall>\n                <InstallTimeHour>4</InstallTimeHour>\n                <LastUpdated>Never</LastUpdated>\n                <LastInstalled>Never</LastInstalled>\n            </WAF>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"d4402623-554b-4256-a53f-33ec68d2c88f"}],"id":"fac8f6f9-4578-4d40-96d4-324830021001","description":"<p>The commands in this section are all related to commercial rule files.</p>\n","_postman_id":"fac8f6f9-4578-4d40-96d4-324830021001"},{"name":"Commands Relating to Custom Rule Files","item":[],"id":"9d1563c9-f1be-40e2-84a7-be887cf556cb","description":"<p>The commands in this section are all related to custom rules.</p>\n","_postman_id":"9d1563c9-f1be-40e2-84a7-be887cf556cb"},{"name":"Command Relating to Custom and Commercial Rules","item":[{"name":"List WAF Rules","id":"4afb938a-1e49-481b-880d-3387b09d0421","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listwafrules","description":"<p>The <strong>listwafrules</strong> command displays a list of all installed rules (commercial and custom rules).</p>\n<p>It also shows if the rules are active or not by displaying either <strong>Active</strong> or <strong>Inactive</strong> in the tag name. Active rules are ones that have been assigned to one or more Virtual Services.</p>\n<p><strong>Related UI Item</strong></p>\n<p>Virtual Services &gt; WAF Settings &gt; Custom Rules</p>\n<p>Virtual Services &gt; View/Modify Services &gt; Modify &gt; WAF Options &gt; Available Rules</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listwafrules"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"fc4e6243-7a70-43f5-9efa-2874c9d0c1e1","name":"List WAF Rules","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listwafrules"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 15:09:15 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Rules>\n                <Inactive1>Generic/ip_reputation</Inactive1>\n                <Active2>Generic/known_vulns</Active2>\n                <Inactive3>Generic/malware_detection</Inactive3>\n                <Inactive4>Generic/botnet_attacks</Inactive4>\n                <Inactive5>Generic/creditcard_known</Inactive5>\n                <Inactive6>Generic/creditcard_track_pan</Inactive6>\n                <Inactive7>ApplicationSpecific/cpanel_attacks</Inactive7>\n                <Inactive8>ApplicationSpecific/drupal_attacks</Inactive8>\n                <Inactive9>ApplicationSpecific/joomla_attacks</Inactive9>\n                <Inactive10>ApplicationSpecific/modx_attacks</Inactive10>\n                <Inactive11>ApplicationSpecific/netcat_attacks</Inactive11>\n                <Inactive12>ApplicationSpecific/oscommerce_attacks</Inactive12>\n                <Inactive13>ApplicationSpecific/phpbb_attacks</Inactive13>\n                <Inactive14>ApplicationSpecific/sharepoint_attacks</Inactive14>\n                <Inactive15>ApplicationSpecific/typo3_attacks</Inactive15>\n                <Inactive16>ApplicationSpecific/vbulletin_attacks</Inactive16>\n                <Inactive17>ApplicationSpecific/wordpress_attacks</Inactive17>\n                <Inactive18>ApplicationSpecific/owa_attacks</Inactive18>\n                <Inactive19>ApplicationSpecific/iis_attacks</Inactive19>\n                <Inactive20>ApplicationGeneric/disclosure_attacks</Inactive20>\n                <Inactive21>ApplicationGeneric/lfi_attacks</Inactive21>\n                <Inactive22>ApplicationGeneric/rce_attacks</Inactive22>\n                <Inactive23>ApplicationGeneric/rfi_attacks</Inactive23>\n                <Inactive24>ApplicationGeneric/sqli_attacks</Inactive24>\n                <Inactive25>ApplicationGeneric/xss_attacks</Inactive25>\n            </Rules>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"4afb938a-1e49-481b-880d-3387b09d0421"}],"id":"f1e143fe-ca23-4e0c-a93b-d4be46ff2149","description":"<p>The command in this section is related to both commercial and custom rules.</p>\n","_postman_id":"f1e143fe-ca23-4e0c-a93b-d4be46ff2149"},{"name":"Commands Relating to Remote Logging","item":[{"name":"Save Temporary WAF Remote Log Data","id":"3dd84cd0-d9c8-4a77-97da-f281ffbabf4a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/savemlogcdata","description":"<p>Temporary WAF remote log data can be saved to your local machine by running the <strong>logging/savemlogcdata</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","savemlogcdata"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"43f724fc-d9bc-4787-a32b-10c9de488a60","name":"Save Temporary WAF Remote Log Data","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/savemlogcdata"},"status":"OK","code":200,"_postman_previewlanguage":"raw","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:41:37 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/octet-stream"},{"key":"Content-Disposition","value":"inline; filename=LM_mlogc_data_lb100_2024_08_07.09.41.tar.gz"}],"cookie":[],"responseTime":null,"body":"To save the file, in Postman - go to the Body of the response, click the three dots on the right, and click Save response to file."}],"_postman_id":"3dd84cd0-d9c8-4a77-97da-f281ffbabf4a"},{"name":"Clear Temporary WAF Remote Log Data","id":"124d1879-4e36-4bfc-9c11-4c0fed0eed1f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/clearmlogcdata","description":"<p>Temporary WAF remote log data can be cleared by running the <b>clearmlogcdata</b> command.</p>\n<p>This removes all of the temporary WAF remote log data. This data is created when WAF remote logging is enabled on the LoadMaster and the remote log server is down or too slow to process the amount of logs generated. These log files are temporary and get automatically deleted/cleared once the data/logs have been sent to the remote log server.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","clearmlogcdata"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"469091bf-a8bb-47f7-a560-8abe74672391","name":"Clear Temporary WAF Remote Log Data","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/clearmlogcdata"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:43:09 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"124d1879-4e36-4bfc-9c11-4c0fed0eed1f"}],"id":"39d61482-1428-415c-8350-a3da399caefe","description":"<p>The commands in this section relates to the WAF remote logging feature which allows the WAF audit logs to be sent to a central log repository.</p>\n","_postman_id":"39d61482-1428-415c-8350-a3da399caefe"}],"id":"bd2ba535-a295-4bb2-99c8-9349409698f6","description":"<blockquote>\n<p>The Legacy WAF functionality is not available on new LoadMaster deployments of firmware version 7.2.59 or above. If you have upgraded from a pre-7.2.59 version to 7.2.59 the Legacy WAF functionality remains available on version 7.2.59. </p>\n</blockquote>\n<blockquote>\n<p>Legacy WAF was fully deprecated in the v7.2.61 release. Deprecated means that Progress Kemp fully removed <strong>WAF Options (Legacy)</strong> from the LoadMaster. If you are running <strong>WAF Options (Legacy)</strong> and upgrade to the v7.2.61 release, a warning will be provided and the new WAF engine will be enabled with default values. We recommend upgrading your LoadMaster to use the latest WAF feature prior to upgrading to 7.2.61 so that you can configure the WAF engine to suit your configuration at the earliest possible convenience. </p>\n</blockquote>\n<blockquote>\n<p>The following commands only work on a LoadMaster with a legacy WAF-enabled license. </p>\n</blockquote>\n<p>If you have a WAF license and WAF Support, Progress Kemp provides a number of commercial rules, such as <strong>ip_reputation</strong>, which can be set to automatically download and update on a daily basis. These commercial rules are targeted to protect against specific threats. The Progress Kemp-provided commercial rules are available when signed up to WAF Support.</p>\n<p>You can also upload other rules such as the ModSecurity core rule set which contains generic attack detection rules that provide a base level of protection for any web application.</p>\n<p>You can also write and upload your own custom rules if desired.</p>\n<p>With the WAF-enabled LoadMaster, you can choose whether to use Progress Kemp-provided rules, custom rules which can be uploaded or a combination of both. The sections below provide details about commands that are specific to commercial rules, custom rules and a command which relates to both types of rule.</p>\n","_postman_id":"bd2ba535-a295-4bb2-99c8-9349409698f6"},{"name":"WAF Settings","item":[{"name":"Enable Legacy or OWASP WAF","item":[{"name":"Enable Legacy WAF","id":"c6e377fc-b6b1-4458-ac1e-e70a57863897","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=1&InterceptMode=1","description":"<p>To enable legacy WAF, run the <strong>modvs</strong> command and set the parameter <strong>InterceptMode</strong> value to <strong>1</strong>.</p>\n<blockquote>\n<p>You cannot switch from legacy WAF mode to OWASP WAF mode (or vice versa). You must first disable WAF (set <strong>InterceptMode</strong> to <strong>0</strong>) and then you can switch to the other mode. </p>\n</blockquote>\n<blockquote>\n<p><strong>Note:</strong> Legacy WAF was deprecated and removed from the LoadMaster in firmware version 7.2.61.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"1"},{"key":"InterceptMode","value":"1"}],"variable":[]}},"response":[{"id":"67fe579e-3334-4250-9a00-13e511922741","name":"Enable Legacy WAF","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=1&InterceptMode=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modvs"],"query":[{"key":"vs","value":"1"},{"key":"InterceptMode","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 15:10:21 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>1</Index>\n            <VSAddress>IP address would appear here</VSAddress>\n            <VSPort>80</VSPort>\n            <Layer>7</Layer>\n            <NickName>Example Virtual Service</NickName>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>1</InterceptMode>\n            <Intercept>Y</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditrelevant</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <InterceptRules>G/known_vulns </InterceptRules>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>0</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>0</ExecutingParanoia>\n            <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n            <PCRELimit>0</PCRELimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>N</Transparent>\n            <SubnetOriginating>Y</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CertFile>545ba83aa2c6d65373d53194080a16f5</CertFile>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>0</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>rr</Schedule>\n            <CheckType>http</CheckType>\n            <PersistTimeout>0</PersistTimeout>\n            <SSLAcceleration>Y</SSLAcceleration>\n            <CheckPort>0</CheckPort>\n            <NRules>0</NRules>\n            <NRequestRules>0</NRequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>0</MasterVS>\n            <MasterVSID>0</MasterVSID>\n            <IsTransparent>2</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>3</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <Bandwidth>0</Bandwidth>\n            <ConnsPerSecLimit>0</ConnsPerSecLimit>\n            <RequestsPerSecLimit>0</RequestsPerSecLimit>\n            <MaxConnsLimit>0</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <EnhancedHealthChecks>N</EnhancedHealthChecks>\n            <RsMinimum>0</RsMinimum>\n            <CipherSet>Default</CipherSet>\n            <NumberOfRSs>0</NumberOfRSs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"c6e377fc-b6b1-4458-ac1e-e70a57863897"},{"name":"Enable OWASP WAF","id":"b7874f59-e4aa-4f5d-9b36-83ad56b98127","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=2&InterceptMode=2","description":"<p>To enable OWASP WAF, run the <strong>modvs</strong> command and set the parameter <strong>InterceptMode</strong> value to <strong>2</strong>.</p>\n<blockquote>\n<p>You cannot switch from legacy WAF mode to OWAP WAF mode (or vice versa). You must first disable WAF (set <strong>InterceptMode</strong> to <strong>0</strong>) and then you can switch to the other mode.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"2"},{"key":"InterceptMode","value":"2"}],"variable":[]}},"response":[{"id":"1936a6db-95b4-4975-aacc-e6c52f16ea8d","name":"Enable OWASP WAF","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=2&InterceptMode=2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modvs"],"query":[{"key":"vs","value":"2"},{"key":"InterceptMode","value":"2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:46:41 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>2</Index>\n            <VSAddress>IP address would appear here</VSAddress>\n            <VSPort>8810</VSPort>\n            <Layer>7</Layer>\n            <NickName>PASOE-HTTP-JSESSIONID_Cookie</NickName>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>2</InterceptMode>\n            <Intercept>N</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>1</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>1</ExecutingParanoia>\n            <AnomalyScoringThreshold>100</AnomalyScoringThreshold>\n            <RuleSets>911,913,920,921,922,930,931,932,933,934,941,942,943,944,950,951,952,953,954,980</RuleSets>\n            <AuditParts>BEFH</AuditParts>\n            <PCRELimit>10000</PCRELimit>\n            <JSONDLimit>10000</JSONDLimit>\n            <BodyLimit>1048576</BodyLimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>Y</Transparent>\n            <SubnetOriginating>N</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <SameSite>0</SameSite>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>1</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>lc</Schedule>\n            <CheckType>http</CheckType>\n            <Persist>super</Persist>\n            <PersistTimeout>360</PersistTimeout>\n            <Cookie>JSESSIONID</Cookie>\n            <CheckPort>8810</CheckPort>\n            <HTTPReschedule>N</HTTPReschedule>\n            <NRules>0</NRules>\n            <NRequestRules>1</NRequestRules>\n            <RequestRules>\n                <Name>ExampleResponseRule3</Name>\n            </RequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>0</MasterVS>\n            <MasterVSID>0</MasterVSID>\n            <IsTransparent>2</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>0</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <AdaptivePort>0</AdaptivePort>\n            <AdaptiveInterval>0</AdaptiveInterval>\n            <AdaptiveMinPercent>0</AdaptiveMinPercent>\n            <Bandwidth>0</Bandwidth>\n            <ConnsPerSecLimit>0</ConnsPerSecLimit>\n            <RequestsPerSecLimit>0</RequestsPerSecLimit>\n            <MaxConnsLimit>0</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <ResponseStatusRemap>N</ResponseStatusRemap>\n            <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n            <EnhancedHealthChecks>N</EnhancedHealthChecks>\n            <RsMinimum>0</RsMinimum>\n            <NumberOfRSs>0</NumberOfRSs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"b7874f59-e4aa-4f5d-9b36-83ad56b98127"}],"id":"5c36e827-efff-4a14-9659-a577f9745456","description":"<p>This section provides commands relating to enabling legacy or OWASP WAF.</p>\n","_postman_id":"5c36e827-efff-4a14-9659-a577f9745456"},{"name":"WAF OwaspOpts Parameter","item":[],"id":"17c37eb1-9325-47a0-a3f9-2de280c5398c","description":"<p>The WAF <strong>OwaspOpts</strong> parameter is a special parameter – it can be used to set the value for multiple fields, rather than just one field as with most other parameters.</p>\n<blockquote>\n<p>To enable OWASP WAF, set the <strong>InterceptMode</strong> parameter to <strong>2</strong>.</p>\n</blockquote>\n<p>The names of the specific UI fields that the <strong>OwaspOpts</strong> parameter is related to are listed in the table below.<br />One or more field values can be set in one command. Multiple values can be set in the one command by separating the values with a semi-colon, for example:<br /><strong>\"InterceptOpts\": \"auditnone;reqdataenable;resdataenable;jsondisable;xmldisable\"</strong><br />The table below outlines what each of the values mean.</p>\n<blockquote>\n<p>The values that are related to the same UI option are mutually exclusive. For example, you cannot set <strong>Enable JSON Parser</strong> to both <strong>jsondisable</strong> and <strong>jsonenable</strong>.</p>\n</blockquote>\n<table><tbody><tr><td><p><b>Value</b></p></td><td><p><b>Related UI Option</b></p></td><td><p><b>Default</b></p></td><td><p><b>Meaning</b></p></td></tr><tr><td><p>auditnone</p></td><td><b>Audit mode</b><br /></td><td><p>No Audit</p></td><td><p>Set the <b>Audit mode </b>to <b>No Audit</b>. No data is logged.</p></td></tr><tr><td><p>auditrelevant</p></td><td><b>Audit mode</b><br /></td><td><p>No Audit</p></td><td><p>Set the <b>Audit mode</b> to <b>Audit Relevant</b>. Logs data which is of a warning level and higher.</p></td></tr><tr><td><p>auditall</p></td><td><b>Audit mode</b></td><td><p>No Audit</p></td><td><p>Set the <b>Audit mode</b> to <b>Audit All</b>. Logs all data through the Virtual Service.</p><p>The <b>Audit All </b>option is not recommended for use in normal operation. <b>Audit All </b>should only be used when troubleshooting a specific problem.</p></td></tr><tr><td><p>reqdataenable</p></td><td>Inspect HTML POST Request Bodies<br /></td><td><p>Disabled</p></td><td><p>Enable the Inspect <b>HTML POST Request Bodies</b> option. This verifies the data supplied in POST requests.</p></td></tr><tr><td><p>reqdatadisable</p></td><td>Inspect HTML POST Request Bodies<br /></td><td><p>Disabled</p></td><td><p>Disable the I<b>nspect HTML POST Request Bodies</b> option.</p></td></tr><tr><td><p>resdataenable</p></td><td>Process HTTP Responses<br /></td><td><p>Disabled</p></td><td><p>Enable the <b>Process HTTP Responses</b> option. This verifies data sent from the Real Servers. This can be CPU and memory intensive.</p></td></tr><tr><td><p>resdatadisable</p></td><td>Process HTTP Responses<br /></td><td><p>Disabled</p></td><td><p>Disable the <b>Process HTTP Responses </b>option.</p></td></tr><tr><td><p>jsondisable</p></td><td>Enable JSON Parser<br /></td><td><p>Enabled</p></td><td><p>Disable the JSON parser.</p><p>This option is only relevant if the <b>Inspect HTML POST Request Bodies</b> option is enabled.</p></td></tr><tr><td><p>jsonenable</p></td><td>Enable JSON Parser<br /></td><td><p>Enabled</p></td><td><p>Enable the JSON parser. This enables the verification of JSON POSTs.</p><p>This option is only relevant if the <b>Inspect HTML POST Request Bodies </b>option is enabled.</p></td></tr><tr><td><p>xmldisable</p></td><td>Enable XML Parser<br /></td><td><p>Enabled</p></td><td><p>Disable the XML parser.</p><p>This option is only relevant if the <b>Inspect HTML POST Request Bodies</b> option is enabled.</p></td></tr><tr><td><p>xmlenable</p></td><td>Enable XML Parser<br /></td><td><p>Enabled</p></td><td><p>Enable the XML parser. This enables the verification of XML POSTs.</p><p>This option is only relevant if the <b>Inspect HTML POST Request Bodies</b> option is enabled.</p></td></tr><tr><td>otherctypesdisable</td><td>Enable Other Content Types</td><td>Disabled</td><td>Disable verification of POST content types (other than XML/JSON).</td></tr><tr><td>otherctypesenable</td><td><b>Enable Other Content Types</b><br /></td><td>Disabled</td><td><p>Enable verification of POST content types (other than XML/JSON).</p><p>Enabling the inspection of any other content types may increase system resource utilization (CPU and memory). A specific list of content types should be considered.</p><p>When this option is enabled, the <b>POSTOtherContentTypes</b> parameter can be used to enter a comma-separated list of POST content types allowed for WAF analysis. By default, all types (other than XML/JSON) are enabled.</p></td></tr></tbody></table>","_postman_id":"17c37eb1-9325-47a0-a3f9-2de280c5398c"},{"name":"OWASP Custom Rulesets","item":[{"name":"Add a New Custom Rule","id":"25e1028a-da42-47fb-ae33-4e3d42957c62","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/OneDrive - Progress Software Corporation/documentation updates/WAF/Custom rule and data files/known.conf"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addowaspcustomrule?filename=known.conf","description":"<p>To add a new custom rule file, run the <strong>addowaspcustomrule</strong> command.</p>\n<blockquote>\n<p><strong>Note:</strong> In the LTSF version, if the character length of the OWASP rule file exceeds 456 characters the command will fail with an error saying <code>Command Failed: No Rules in File</code>.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addowaspcustomrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"filename","value":"known.conf"}],"variable":[]}},"response":[{"id":"5c6c66fd-0f75-4dca-9656-2d4d9c6e1558","name":"Add a New Custom Rule","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/OneDrive - Progress Software Corporation/documentation updates/WAF/Custom rule and data files/known.conf"}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addowaspcustomrule?filename=known.conf","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addowaspcustomrule"],"query":[{"key":"filename","value":"known.conf"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:49:38 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Custom WAF rule(s) installed</Success>\n</Response>"}],"_postman_id":"25e1028a-da42-47fb-ae33-4e3d42957c62"},{"name":"Delete a Existing Custom Rule","id":"1d2b8e13-9d9a-4a88-a617-c84ed3c6fee8","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delowaspcustomrule?filename=known","description":"<p>To delete an existing rule file, run the <strong>delowaspcustomrule</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delowaspcustomrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"filename","value":"known"}],"variable":[]}},"response":[{"id":"4180201d-2df0-4647-995d-e75b859b50f9","name":"Delete a Existing Custom Rule","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delowaspcustomrule?filename=known","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delowaspcustomrule"],"query":[{"key":"filename","value":"known"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:50:29 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"1d2b8e13-9d9a-4a88-a617-c84ed3c6fee8"},{"name":"Download a Custom Rule","id":"7647dbd9-f363-474d-b843-9df2f9bd65fb","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/downloadowaspcustomrule?filename=known","description":"<p>To download a custom rule file, run the <strong>downloadowaspcustomrule</strong> command.</p>\n<p>The <strong>filename</strong> parameter is mandatory. Specify the name of the OWASP custom rule file to download in the <strong>filename</strong> parameter. You can get the filename by going to <strong>Web Application Firewall &gt; Custom Rules</strong> in the UI. If you run the command using a web browser, the file will download to the location specified in your browser settings.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","downloadowaspcustomrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"filename","value":"known"}],"variable":[]}},"response":[{"id":"fa2a3492-5b31-4724-8601-fca25d255aad","name":"Download a Custom Rule","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/downloadowaspcustomrule?filename=known","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","downloadowaspcustomrule"],"query":[{"key":"filename","value":"known"}]}},"status":"OK","code":200,"_postman_previewlanguage":"raw","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:51:35 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/octet-stream"},{"key":"Content-Disposition","value":"inline; filename=\"known.conf\""}],"cookie":[],"responseTime":null,"body":"Rule file would appear here"}],"_postman_id":"7647dbd9-f363-474d-b843-9df2f9bd65fb"}],"id":"977bdcd9-8e32-42a5-ab3d-976927299d76","description":"<p>This section provides commands relating to OWASP custom rulesets.</p>\n","_postman_id":"977bdcd9-8e32-42a5-ab3d-976927299d76"},{"name":"OWASP Custom Data File","item":[{"name":"Add a Custom Data File","id":"6ae6026a-9350-417b-ae68-b2b51f365828","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/OneDrive - Progress Software Corporation/documentation updates/WAF/Custom rule and data files/owasp_cust.data"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addowaspcustomdata?filename=owasp_cust.data","description":"<p>To add a custom data file, run the <strong>addowaspcustomdata</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addowaspcustomdata"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"filename","value":"owasp_cust.data"}],"variable":[]}},"response":[{"id":"aba6c947-cf7a-4517-acf5-53ffe50fe6a6","name":"Add a Custom Data File","originalRequest":{"method":"GET","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/OneDrive - Progress Software Corporation/documentation updates/WAF/Custom rule and data files/owasp_cust.data"}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addowaspcustomdata?filename=owasp_cust.data","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addowaspcustomdata"],"query":[{"key":"filename","value":"owasp_cust.data"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:53:39 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"6ae6026a-9350-417b-ae68-b2b51f365828"},{"name":"Delete a Custom Data File","id":"d008628a-8a04-41af-9fd2-d40e9549325e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delowaspcustomdata?filename=owasp_cust","description":"<p>To delete an existing data file, run the <strong>delowaspcustomdata</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delowaspcustomdata"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"filename","value":"owasp_cust"}],"variable":[]}},"response":[{"id":"ff37a6c0-7932-4f2e-9fc0-baab7c6057b4","name":"Delete a Custom Data File","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delowaspcustomdata?filename=owasp_cust","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delowaspcustomdata"],"query":[{"key":"filename","value":"owasp_cust"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:54:21 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"d008628a-8a04-41af-9fd2-d40e9549325e"},{"name":"Download a Custom Data File","id":"51850906-f994-4349-b799-092040282c81","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/downloadowaspcustomdata?filename=owasp_cust.data","description":"<p>To download a custom data file, run the <strong>downloadowaspcustomdata</strong> command.</p>\n<p>The <strong>filename</strong> parameter is mandatory. Specify the name and extension (either <strong>.txt</strong> or <strong>.data</strong>) of the OWASP custom data file to download in the <strong>filename</strong> parameter. You can get the filename by going to <strong>Web Application Firewall &gt; Custom Rules</strong> in the UI. If you run the command using a web browser, the file will download to the location specified in your browser settings.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","downloadowaspcustomdata"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"filename","value":"owasp_cust.data"}],"variable":[]}},"response":[{"id":"5627782a-ff91-4c09-b5dc-9a8355bf8013","name":"Download a Custom Data File","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/downloadowaspcustomdata?filename=owasp_cust.data","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","downloadowaspcustomdata"],"query":[{"key":"filename","value":"owasp_cust.data"}]}},"status":"OK","code":200,"_postman_previewlanguage":"raw","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:55:11 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/octet-stream"},{"key":"Content-Disposition","value":"inline; filename=\"owasp_cust.data\""}],"cookie":[],"responseTime":null,"body":"${CDPATH}\n${DIRSTACK}\n${HOME}\n${HOSTNAME}\n${IFS}\n${OLDPWD}\n${OSTYPE}\n${PATH}\n${PWD}\n$CDPATH\n$DIRSTACK\n$HOME\n$HOSTNAME\n$IFS\n$OLDPWD\n$OSTYPE\n$PATH\n$PWD\nbin/bash\nbin/cat\nbin/csh\nbin/dash\nbin/du\nbin/echo\nbin/grep\nbin/less\nbin/ls\nbin/mknod\nbin/more\nbin/nc\nbin/ps\nbin/rbash\nbin/sh\nbin/sleep\nbin/su\nbin/tcsh\nbin/uname\r\n"}],"_postman_id":"51850906-f994-4349-b799-092040282c81"}],"id":"14e8ab91-0ec2-4a73-ad5c-156beae10d86","description":"<p>This section provides commands relating to the OWASP custom data file.</p>\n","_postman_id":"14e8ab91-0ec2-4a73-ad5c-156beae10d86"},{"name":"OWASP Rules","item":[{"name":"List the Available OWASP Rules","id":"02f98356-a55f-452f-8e8d-6a554f4a4eea","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/owasprules","description":"<p>To list all available OWASP rules, run the <strong>owasprules</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","owasprules"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"7ccf7e00-d5b0-4a75-a485-226e807f20dd","name":"List the Available OWASP Rules","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/owasprules"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:55:55 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Rule>\n                <Id>911100</Id>\n                <Type>CRS</Type>\n                <Name>911100 Method is not allowed by policy</Name>\n            </Rule>\n            <Rule>\n                <Id>913100</Id>\n                <Type>CRS</Type>\n                <Name>913100 Found User-Agent associated with security scanner</Name>\n            </Rule>\n            <Rule>\n                <Id>913101</Id>\n                <Type>CRS</Type>\n                <Name>913101 Found User-Agent associated with scripting/generic HTTP client</Name>\n            </Rule>\n            <Rule>\n                <Id>913102</Id>\n                <Type>CRS</Type>\n                <Name>913102 Found User-Agent associated with web crawler/bot</Name>\n            </Rule>\n            <Rule>\n                <Id>913110</Id>\n                <Type>CRS</Type>\n                <Name>913110 Found request header associated with security scanner</Name>\n            </Rule>\n            <Rule>\n                <Id>913120</Id>\n                <Type>CRS</Type>\n                <Name>913120 Found request filename/argument associated with security scanner</Name>\n            </Rule>\n            <Rule>\n                <Id>920100</Id>\n                <Type>CRS</Type>\n                <Name>920100 Invalid HTTP Request Line</Name>\n            </Rule>\n            <Rule>\n                <Id>920120</Id>\n                <Type>CRS</Type>\n                <Name>920120 Attempted multipart/form-data bypass</Name>\n            </Rule>\n            <Rule>\n                <Id>920121</Id>\n                <Type>CRS</Type>\n                <Name>920121 Attempted multipart/form-data bypass</Name>\n            </Rule>\n            <Rule>\n                <Id>920160</Id>\n                <Type>CRS</Type>\n                <Name>920160 Content-Length HTTP header is not numeric</Name>\n            </Rule>\n            <Rule>\n                <Id>920170</Id>\n                <Type>CRS</Type>\n                <Name>920170 GET or HEAD Request with Body Content</Name>\n            </Rule>\n            <Rule>\n                <Id>920171</Id>\n                <Type>CRS</Type>\n                <Name>920171 GET or HEAD Request with Transfer-Encoding</Name>\n            </Rule>\n            <Rule>\n                <Id>920180</Id>\n                <Type>CRS</Type>\n                <Name>920180 POST without Content-Length or Transfer-Encoding headers</Name>\n            </Rule>\n            <Rule>\n                <Id>920181</Id>\n                <Type>CRS</Type>\n                <Name>920181 Content-Length and Transfer-Encoding headers present.</Name>\n            </Rule>\n            <Rule>\n                <Id>920190</Id>\n                <Type>CRS</Type>\n                <Name>920190 Range: Invalid Last Byte Value</Name>\n            </Rule>\n            <Rule>\n                <Id>920200</Id>\n                <Type>CRS</Type>\n                <Name>920200 Range: Too many fields (6 or more)</Name>\n            </Rule>\n            <Rule>\n                <Id>920201</Id>\n                <Type>CRS</Type>\n                <Name>920201 Range: Too many fields for pdf request (63 or more)</Name>\n            </Rule>\n            <Rule>\n                <Id>920202</Id>\n                <Type>CRS</Type>\n                <Name>920202 Range: Too many fields for pdf request (6 or more)</Name>\n            </Rule>\n            <Rule>\n                <Id>920210</Id>\n                <Type>CRS</Type>\n                <Name>920210 Multiple/Conflicting Connection Header Data Found</Name>\n            </Rule>\n            <Rule>\n                <Id>920220</Id>\n                <Type>CRS</Type>\n                <Name>920220 URL Encoding Abuse Attack Attempt</Name>\n            </Rule>\n            <Rule>\n                <Id>920230</Id>\n                <Type>CRS</Type>\n                <Name>920230 Multiple URL Encoding Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>920240</Id>\n                <Type>CRS</Type>\n                <Name>920240 URL Encoding Abuse Attack Attempt</Name>\n            </Rule>\n            <Rule>\n                <Id>920250</Id>\n                <Type>CRS</Type>\n                <Name>920250 UTF8 Encoding Abuse Attack Attempt</Name>\n            </Rule>\n            <Rule>\n                <Id>920260</Id>\n                <Type>CRS</Type>\n                <Name>920260 Unicode Full/Half Width Abuse Attack Attempt</Name>\n            </Rule>\n            <Rule>\n                <Id>920270</Id>\n                <Type>CRS</Type>\n                <Name>920270 Invalid character in request (null character)</Name>\n            </Rule>\n            <Rule>\n                <Id>920271</Id>\n                <Type>CRS</Type>\n                <Name>920271 Invalid character in request (non printable characters)</Name>\n            </Rule>\n            <Rule>\n                <Id>920272</Id>\n                <Type>CRS</Type>\n                <Name>920272 Invalid character in request (outside of printable chars below ascii 127)</Name>\n            </Rule>\n            <Rule>\n                <Id>920273</Id>\n                <Type>CRS</Type>\n                <Name>920273 Invalid character in request (outside of very strict set)</Name>\n            </Rule>\n            <Rule>\n                <Id>920274</Id>\n                <Type>CRS</Type>\n                <Name>920274 Invalid character in request headers (outside of very strict set)</Name>\n            </Rule>\n            <Rule>\n                <Id>920275</Id>\n                <Type>CRS</Type>\n                <Name>920275 Invalid character in request headers (outside of very strict set)</Name>\n            </Rule>\n            <Rule>\n                <Id>920280</Id>\n                <Type>CRS</Type>\n                <Name>920280 Request Missing a Host Header</Name>\n            </Rule>\n            <Rule>\n                <Id>920290</Id>\n                <Type>CRS</Type>\n                <Name>920290 Empty Host Header</Name>\n            </Rule>\n            <Rule>\n                <Id>920300</Id>\n                <Type>CRS</Type>\n                <Name>920300 Request Missing an Accept Header</Name>\n            </Rule>\n            <Rule>\n                <Id>920310</Id>\n                <Type>CRS</Type>\n                <Name>920310 Request Has an Empty Accept Header</Name>\n            </Rule>\n            <Rule>\n                <Id>920311</Id>\n                <Type>CRS</Type>\n                <Name>920311 Request Has an Empty Accept Header</Name>\n            </Rule>\n            <Rule>\n                <Id>920320</Id>\n                <Type>CRS</Type>\n                <Name>920320 Missing User Agent Header</Name>\n            </Rule>\n            <Rule>\n                <Id>920330</Id>\n                <Type>CRS</Type>\n                <Name>920330 Empty User Agent Header</Name>\n            </Rule>\n            <Rule>\n                <Id>920340</Id>\n                <Type>CRS</Type>\n                <Name>920340 Request Containing Content</Name>\n            </Rule>\n            <Rule>\n                <Id>920341</Id>\n                <Type>CRS</Type>\n                <Name>920341 Request Containing Content Requires Content-Type header</Name>\n            </Rule>\n            <Rule>\n                <Id>920350</Id>\n                <Type>CRS</Type>\n                <Name>920350 Host header is a numeric IP address</Name>\n            </Rule>\n            <Rule>\n                <Id>920360</Id>\n                <Type>CRS</Type>\n                <Name>920360 Argument name too long</Name>\n            </Rule>\n            <Rule>\n                <Id>920370</Id>\n                <Type>CRS</Type>\n                <Name>920370 Argument value too long</Name>\n            </Rule>\n            <Rule>\n                <Id>920380</Id>\n                <Type>CRS</Type>\n                <Name>920380 Too many arguments in request</Name>\n            </Rule>\n            <Rule>\n                <Id>920390</Id>\n                <Type>CRS</Type>\n                <Name>920390 Total arguments size exceeded</Name>\n            </Rule>\n            <Rule>\n                <Id>920400</Id>\n                <Type>CRS</Type>\n                <Name>920400 Uploaded file size too large</Name>\n            </Rule>\n            <Rule>\n                <Id>920410</Id>\n                <Type>CRS</Type>\n                <Name>920410 Total uploaded files size too large</Name>\n            </Rule>\n            <Rule>\n                <Id>920420</Id>\n                <Type>CRS</Type>\n                <Name>920420 Request content type is not allowed by policy</Name>\n            </Rule>\n            <Rule>\n                <Id>920430</Id>\n                <Type>CRS</Type>\n                <Name>920430 HTTP protocol version is not allowed by policy</Name>\n            </Rule>\n            <Rule>\n                <Id>920440</Id>\n                <Type>CRS</Type>\n                <Name>920440 URL file extension is restricted by policy</Name>\n            </Rule>\n            <Rule>\n                <Id>920450</Id>\n                <Type>CRS</Type>\n                <Name>920450 HTTP header is restricted by policy (%{MATCHED_VAR})</Name>\n            </Rule>\n            <Rule>\n                <Id>920460</Id>\n                <Type>CRS</Type>\n                <Name>920460 Abnormal character escapes in request</Name>\n            </Rule>\n            <Rule>\n                <Id>920470</Id>\n                <Type>CRS</Type>\n                <Name>920470 Illegal Content-Type header</Name>\n            </Rule>\n            <Rule>\n                <Id>920480</Id>\n                <Type>CRS</Type>\n                <Name>920480 Request content type charset is not allowed by policy</Name>\n            </Rule>\n            <Rule>\n                <Id>920490</Id>\n                <Type>CRS</Type>\n                <Name>920490 Request header x-up-devcap-post-charset detected in combination with prefix </Name>\n            </Rule>\n            <Rule>\n                <Id>920500</Id>\n                <Type>CRS</Type>\n                <Name>920500 Attempt to access a backup or working file</Name>\n            </Rule>\n            <Rule>\n                <Id>920510</Id>\n                <Type>CRS</Type>\n                <Name>920510 Invalid Cache-Control request header</Name>\n            </Rule>\n            <Rule>\n                <Id>920530</Id>\n                <Type>CRS</Type>\n                <Name>920530 Multiple charsets detected in content type header</Name>\n            </Rule>\n            <Rule>\n                <Id>920600</Id>\n                <Type>CRS</Type>\n                <Name>920600 Illegal Accept header: charset parameter</Name>\n            </Rule>\n            <Rule>\n                <Id>921110</Id>\n                <Type>CRS</Type>\n                <Name>921110 HTTP Request Smuggling Attack</Name>\n            </Rule>\n            <Rule>\n                <Id>921120</Id>\n                <Type>CRS</Type>\n                <Name>921120 HTTP Response Splitting Attack</Name>\n            </Rule>\n            <Rule>\n                <Id>921130</Id>\n                <Type>CRS</Type>\n                <Name>921130 HTTP Response Splitting Attack</Name>\n            </Rule>\n            <Rule>\n                <Id>921140</Id>\n                <Type>CRS</Type>\n                <Name>921140 HTTP Header Injection Attack via headers</Name>\n            </Rule>\n            <Rule>\n                <Id>921150</Id>\n                <Type>CRS</Type>\n                <Name>921150 HTTP Header Injection Attack via payload (CR/LF detected)</Name>\n            </Rule>\n            <Rule>\n                <Id>921151</Id>\n                <Type>CRS</Type>\n                <Name>921151 HTTP Header Injection Attack via payload (CR/LF detected)</Name>\n            </Rule>\n            <Rule>\n                <Id>921160</Id>\n                <Type>CRS</Type>\n                <Name>921160 HTTP Header Injection Attack via payload (CR/LF and header-name detected)</Name>\n            </Rule>\n            <Rule>\n                <Id>921180</Id>\n                <Type>CRS</Type>\n                <Name>921180 HTTP Parameter Pollution (%{TX.1})</Name>\n            </Rule>\n            <Rule>\n                <Id>921190</Id>\n                <Type>CRS</Type>\n                <Name>921190 HTTP Splitting (CR/LF in request filename detected)</Name>\n            </Rule>\n            <Rule>\n                <Id>921200</Id>\n                <Type>CRS</Type>\n                <Name>921200 LDAP Injection Attack</Name>\n            </Rule>\n            <Rule>\n                <Id>921230</Id>\n                <Type>CRS</Type>\n                <Name>921230 HTTP Range Header detected</Name>\n            </Rule>\n            <Rule>\n                <Id>921421</Id>\n                <Type>CRS</Type>\n                <Name>921421 Content-Type header: Dangerous content type outside the mime type declaration</Name>\n            </Rule>\n            <Rule>\n                <Id>921422</Id>\n                <Type>CRS</Type>\n                <Name>921422 Content-Type header: Dangerous content type outside the mime type declaration</Name>\n            </Rule>\n            <Rule>\n                <Id>922100</Id>\n                <Type>CRS</Type>\n                <Name>922100 Multipart content type global _charset_ definition is not allowed by policy</Name>\n            </Rule>\n            <Rule>\n                <Id>922110</Id>\n                <Type>CRS</Type>\n                <Name>922110 Illegal MIME Multipart Header content-type: charset parameter</Name>\n            </Rule>\n            <Rule>\n                <Id>922120</Id>\n                <Type>CRS</Type>\n                <Name>922120 Content-Transfer-Encoding was deprecated by rfc7578 in 2015 and should not be used</Name>\n            </Rule>\n            <Rule>\n                <Id>930100</Id>\n                <Type>CRS</Type>\n                <Name>930100 Path Traversal Attack (/../)</Name>\n            </Rule>\n            <Rule>\n                <Id>930110</Id>\n                <Type>CRS</Type>\n                <Name>930110 Path Traversal Attack (/../)</Name>\n            </Rule>\n            <Rule>\n                <Id>930120</Id>\n                <Type>CRS</Type>\n                <Name>930120 OS File Access Attempt</Name>\n            </Rule>\n            <Rule>\n                <Id>930130</Id>\n                <Type>CRS</Type>\n                <Name>930130 Restricted File Access Attempt</Name>\n            </Rule>\n            <Rule>\n                <Id>931100</Id>\n                <Type>CRS</Type>\n                <Name>931100 Possible Remote File Inclusion (RFI) Attack: URL Parameter using IP Address</Name>\n            </Rule>\n            <Rule>\n                <Id>931110</Id>\n                <Type>CRS</Type>\n                <Name>931110 Possible Remote File Inclusion (RFI) Attack: Common RFI Vulnerable Parameter Name used w/URL Payloa</Name>\n            </Rule>\n            <Rule>\n                <Id>931120</Id>\n                <Type>CRS</Type>\n                <Name>931120 Possible Remote File Inclusion (RFI) Attack: URL Payload Used w/Trailing Question Mark Character (?</Name>\n            </Rule>\n            <Rule>\n                <Id>931130</Id>\n                <Type>CRS</Type>\n                <Name>931130 Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link</Name>\n            </Rule>\n            <Rule>\n                <Id>932100</Id>\n                <Type>CRS</Type>\n                <Name>932100 Remote Command Execution: Unix Command Injection</Name>\n            </Rule>\n            <Rule>\n                <Id>932105</Id>\n                <Type>CRS</Type>\n                <Name>932105 Remote Command Execution: Unix Command Injection</Name>\n            </Rule>\n            <Rule>\n                <Id>932106</Id>\n                <Type>CRS</Type>\n                <Name>932106 Remote Command Execution: Unix Command Injection</Name>\n            </Rule>\n            <Rule>\n                <Id>932110</Id>\n                <Type>CRS</Type>\n                <Name>932110 Remote Command Execution: Windows Command Injection</Name>\n            </Rule>\n            <Rule>\n                <Id>932115</Id>\n                <Type>CRS</Type>\n                <Name>932115 Remote Command Execution: Windows Command Injection</Name>\n            </Rule>\n            <Rule>\n                <Id>932120</Id>\n                <Type>CRS</Type>\n                <Name>932120 Remote Command Execution: Windows PowerShell Command Found</Name>\n            </Rule>\n            <Rule>\n                <Id>932130</Id>\n                <Type>CRS</Type>\n                <Name>932130 Remote Command Execution: Unix Shell Expression Found</Name>\n            </Rule>\n            <Rule>\n                <Id>932140</Id>\n                <Type>CRS</Type>\n                <Name>932140 Remote Command Execution: Windows FOR/IF Command Found</Name>\n            </Rule>\n            <Rule>\n                <Id>932150</Id>\n                <Type>CRS</Type>\n                <Name>932150 Remote Command Execution: Direct Unix Command Execution</Name>\n            </Rule>\n            <Rule>\n                <Id>932160</Id>\n                <Type>CRS</Type>\n                <Name>932160 Remote Command Execution: Unix Shell Code Found</Name>\n            </Rule>\n            <Rule>\n                <Id>932170</Id>\n                <Type>CRS</Type>\n                <Name>932170 Remote Command Execution: Shellshock (CVE-2014-6271)</Name>\n            </Rule>\n            <Rule>\n                <Id>932171</Id>\n                <Type>CRS</Type>\n                <Name>932171 Remote Command Execution: Shellshock (CVE-2014-6271)</Name>\n            </Rule>\n            <Rule>\n                <Id>932180</Id>\n                <Type>CRS</Type>\n                <Name>932180 Restricted File Upload Attempt</Name>\n            </Rule>\n            <Rule>\n                <Id>932190</Id>\n                <Type>CRS</Type>\n                <Name>932190 Remote Command Execution: Wildcard bypass technique attempt</Name>\n            </Rule>\n            <Rule>\n                <Id>932200</Id>\n                <Type>CRS</Type>\n                <Name>932200 RCE Bypass Technique</Name>\n            </Rule>\n            <Rule>\n                <Id>933100</Id>\n                <Type>CRS</Type>\n                <Name>933100 PHP Injection Attack: PHP Open Tag Found</Name>\n            </Rule>\n            <Rule>\n                <Id>933110</Id>\n                <Type>CRS</Type>\n                <Name>933110 PHP Injection Attack: PHP Script File Upload Found</Name>\n            </Rule>\n            <Rule>\n                <Id>933111</Id>\n                <Type>CRS</Type>\n                <Name>933111 PHP Injection Attack: PHP Script File Upload Found</Name>\n            </Rule>\n            <Rule>\n                <Id>933120</Id>\n                <Type>CRS</Type>\n                <Name>933120 PHP Injection Attack: Configuration Directive Found</Name>\n            </Rule>\n            <Rule>\n                <Id>933130</Id>\n                <Type>CRS</Type>\n                <Name>933130 PHP Injection Attack: Variables Found</Name>\n            </Rule>\n            <Rule>\n                <Id>933131</Id>\n                <Type>CRS</Type>\n                <Name>933131 PHP Injection Attack: Variables Found</Name>\n            </Rule>\n            <Rule>\n                <Id>933140</Id>\n                <Type>CRS</Type>\n                <Name>933140 PHP Injection Attack: I/O Stream Found</Name>\n            </Rule>\n            <Rule>\n                <Id>933150</Id>\n                <Type>CRS</Type>\n                <Name>933150 PHP Injection Attack: High-Risk PHP Function Name Found</Name>\n            </Rule>\n            <Rule>\n                <Id>933151</Id>\n                <Type>CRS</Type>\n                <Name>933151 PHP Injection Attack: Medium-Risk PHP Function Name Found</Name>\n            </Rule>\n            <Rule>\n                <Id>933160</Id>\n                <Type>CRS</Type>\n                <Name>933160 PHP Injection Attack: High-Risk PHP Function Call Found</Name>\n            </Rule>\n            <Rule>\n                <Id>933161</Id>\n                <Type>CRS</Type>\n                <Name>933161 PHP Injection Attack: Low-Value PHP Function Call Found</Name>\n            </Rule>\n            <Rule>\n                <Id>933170</Id>\n                <Type>CRS</Type>\n                <Name>933170 PHP Injection Attack: Serialized Object Injection</Name>\n            </Rule>\n            <Rule>\n                <Id>933180</Id>\n                <Type>CRS</Type>\n                <Name>933180 PHP Injection Attack: Variable Function Call Found</Name>\n            </Rule>\n            <Rule>\n                <Id>933190</Id>\n                <Type>CRS</Type>\n                <Name>933190 PHP Injection Attack: PHP Closing Tag Found</Name>\n            </Rule>\n            <Rule>\n                <Id>933200</Id>\n                <Type>CRS</Type>\n                <Name>933200 PHP Injection Attack: Wrapper scheme detected</Name>\n            </Rule>\n            <Rule>\n                <Id>933210</Id>\n                <Type>CRS</Type>\n                <Name>933210 PHP Injection Attack: Variable Function Call Found</Name>\n            </Rule>\n            <Rule>\n                <Id>934100</Id>\n                <Type>CRS</Type>\n                <Name>934100 Node.js Injection Attack</Name>\n            </Rule>\n            <Rule>\n                <Id>941100</Id>\n                <Type>CRS</Type>\n                <Name>941100 XSS Attack Detected via libinjection</Name>\n            </Rule>\n            <Rule>\n                <Id>941101</Id>\n                <Type>CRS</Type>\n                <Name>941101 XSS Attack Detected via libinjection</Name>\n            </Rule>\n            <Rule>\n                <Id>941110</Id>\n                <Type>CRS</Type>\n                <Name>941110 XSS Filter - Category 1: Script Tag Vector</Name>\n            </Rule>\n            <Rule>\n                <Id>941120</Id>\n                <Type>CRS</Type>\n                <Name>941120 XSS Filter - Category 2: Event Handler Vector</Name>\n            </Rule>\n            <Rule>\n                <Id>941130</Id>\n                <Type>CRS</Type>\n                <Name>941130 XSS Filter - Category 3: Attribute Vector</Name>\n            </Rule>\n            <Rule>\n                <Id>941140</Id>\n                <Type>CRS</Type>\n                <Name>941140 XSS Filter - Category 4: Javascript URI Vector</Name>\n            </Rule>\n            <Rule>\n                <Id>941150</Id>\n                <Type>CRS</Type>\n                <Name>941150 XSS Filter - Category 5: Disallowed HTML Attributes</Name>\n            </Rule>\n            <Rule>\n                <Id>941160</Id>\n                <Type>CRS</Type>\n                <Name>941160 NoScript XSS InjectionChecker: HTML Injection</Name>\n            </Rule>\n            <Rule>\n                <Id>941170</Id>\n                <Type>CRS</Type>\n                <Name>941170 NoScript XSS InjectionChecker: Attribute Injection</Name>\n            </Rule>\n            <Rule>\n                <Id>941180</Id>\n                <Type>CRS</Type>\n                <Name>941180 Node-Validator Blacklist Keywords</Name>\n            </Rule>\n            <Rule>\n                <Id>941190</Id>\n                <Type>CRS</Type>\n                <Name>941190 IE XSS Filters - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941200</Id>\n                <Type>CRS</Type>\n                <Name>941200 IE XSS Filters - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941210</Id>\n                <Type>CRS</Type>\n                <Name>941210 IE XSS Filters - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941220</Id>\n                <Type>CRS</Type>\n                <Name>941220 IE XSS Filters - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941230</Id>\n                <Type>CRS</Type>\n                <Name>941230 IE XSS Filters - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941240</Id>\n                <Type>CRS</Type>\n                <Name>941240 IE XSS Filters - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941250</Id>\n                <Type>CRS</Type>\n                <Name>941250 IE XSS Filters - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941260</Id>\n                <Type>CRS</Type>\n                <Name>941260 IE XSS Filters - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941270</Id>\n                <Type>CRS</Type>\n                <Name>941270 IE XSS Filters - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941280</Id>\n                <Type>CRS</Type>\n                <Name>941280 IE XSS Filters - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941290</Id>\n                <Type>CRS</Type>\n                <Name>941290 IE XSS Filters - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941300</Id>\n                <Type>CRS</Type>\n                <Name>941300 IE XSS Filters - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941310</Id>\n                <Type>CRS</Type>\n                <Name>941310 US-ASCII Malformed Encoding XSS Filter - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941320</Id>\n                <Type>CRS</Type>\n                <Name>941320 Possible XSS Attack Detected - HTML Tag Handler</Name>\n            </Rule>\n            <Rule>\n                <Id>941330</Id>\n                <Type>CRS</Type>\n                <Name>941330 IE XSS Filters - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941340</Id>\n                <Type>CRS</Type>\n                <Name>941340 IE XSS Filters - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941350</Id>\n                <Type>CRS</Type>\n                <Name>941350 UTF-7 Encoding IE XSS - Attack Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941360</Id>\n                <Type>CRS</Type>\n                <Name>941360 JSFuck / Hieroglyphy obfuscation detected</Name>\n            </Rule>\n            <Rule>\n                <Id>941370</Id>\n                <Type>CRS</Type>\n                <Name>941370 JavaScript global variable found</Name>\n            </Rule>\n            <Rule>\n                <Id>941380</Id>\n                <Type>CRS</Type>\n                <Name>941380 AngularJS client side template injection detected</Name>\n            </Rule>\n            <Rule>\n                <Id>942100</Id>\n                <Type>CRS</Type>\n                <Name>942100 SQL Injection Attack Detected via libinjection</Name>\n            </Rule>\n            <Rule>\n                <Id>942101</Id>\n                <Type>CRS</Type>\n                <Name>942101 SQL Injection Attack Detected via libinjection</Name>\n            </Rule>\n            <Rule>\n                <Id>942110</Id>\n                <Type>CRS</Type>\n                <Name>942110 SQL Injection Attack: Common Injection Testing Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>942120</Id>\n                <Type>CRS</Type>\n                <Name>942120 SQL Injection Attack: SQL Operator Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>942130</Id>\n                <Type>CRS</Type>\n                <Name>942130 SQL Injection Attack: SQL Tautology Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>942140</Id>\n                <Type>CRS</Type>\n                <Name>942140 SQL Injection Attack: Common DB Names Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>942150</Id>\n                <Type>CRS</Type>\n                <Name>942150 SQL Injection Attack</Name>\n            </Rule>\n            <Rule>\n                <Id>942160</Id>\n                <Type>CRS</Type>\n                <Name>942160 Detects blind sqli tests using sleep() or benchmark()</Name>\n            </Rule>\n            <Rule>\n                <Id>942170</Id>\n                <Type>CRS</Type>\n                <Name>942170 Detects SQL benchmark and sleep injection attempts including conditional queries</Name>\n            </Rule>\n            <Rule>\n                <Id>942180</Id>\n                <Type>CRS</Type>\n                <Name>942180 Detects basic SQL authentication bypass attempts 1/3</Name>\n            </Rule>\n            <Rule>\n                <Id>942190</Id>\n                <Type>CRS</Type>\n                <Name>942190 Detects MSSQL code execution and information gathering attempts</Name>\n            </Rule>\n            <Rule>\n                <Id>942200</Id>\n                <Type>CRS</Type>\n                <Name>942200 Detects MySQL comment-/space-obfuscated injections and backtick termination</Name>\n            </Rule>\n            <Rule>\n                <Id>942210</Id>\n                <Type>CRS</Type>\n                <Name>942210 Detects chained SQL injection attempts 1/2</Name>\n            </Rule>\n            <Rule>\n                <Id>942220</Id>\n                <Type>CRS</Type>\n                <Name>942220 Looking for integer overflow attacks</Name>\n            </Rule>\n            <Rule>\n                <Id>942230</Id>\n                <Type>CRS</Type>\n                <Name>942230 Detects conditional SQL injection attempts</Name>\n            </Rule>\n            <Rule>\n                <Id>942240</Id>\n                <Type>CRS</Type>\n                <Name>942240 Detects MySQL charset switch and MSSQL DoS attempts</Name>\n            </Rule>\n            <Rule>\n                <Id>942250</Id>\n                <Type>CRS</Type>\n                <Name>942250 Detects MATCH AGAINST</Name>\n            </Rule>\n            <Rule>\n                <Id>942251</Id>\n                <Type>CRS</Type>\n                <Name>942251 Detects HAVING injections</Name>\n            </Rule>\n            <Rule>\n                <Id>942260</Id>\n                <Type>CRS</Type>\n                <Name>942260 Detects basic SQL authentication bypass attempts 2/3</Name>\n            </Rule>\n            <Rule>\n                <Id>942270</Id>\n                <Type>CRS</Type>\n                <Name>942270 Looking for basic sql injection. Common attack string for mysql</Name>\n            </Rule>\n            <Rule>\n                <Id>942280</Id>\n                <Type>CRS</Type>\n                <Name>942280 Detects Postgres pg_sleep injection</Name>\n            </Rule>\n            <Rule>\n                <Id>942290</Id>\n                <Type>CRS</Type>\n                <Name>942290 Finds basic MongoDB SQL injection attempts</Name>\n            </Rule>\n            <Rule>\n                <Id>942300</Id>\n                <Type>CRS</Type>\n                <Name>942300 Detects MySQL comments</Name>\n            </Rule>\n            <Rule>\n                <Id>942310</Id>\n                <Type>CRS</Type>\n                <Name>942310 Detects chained SQL injection attempts 2/2</Name>\n            </Rule>\n            <Rule>\n                <Id>942320</Id>\n                <Type>CRS</Type>\n                <Name>942320 Detects MySQL and PostgreSQL stored procedure/function injections</Name>\n            </Rule>\n            <Rule>\n                <Id>942330</Id>\n                <Type>CRS</Type>\n                <Name>942330 Detects classic SQL injection probings 1/3</Name>\n            </Rule>\n            <Rule>\n                <Id>942340</Id>\n                <Type>CRS</Type>\n                <Name>942340 Detects basic SQL authentication bypass attempts 3/3</Name>\n            </Rule>\n            <Rule>\n                <Id>942350</Id>\n                <Type>CRS</Type>\n                <Name>942350 Detects MySQL UDF injection and other data/structure manipulation attempts</Name>\n            </Rule>\n            <Rule>\n                <Id>942360</Id>\n                <Type>CRS</Type>\n                <Name>942360 Detects concatenated basic SQL injection and SQLLFI attempts</Name>\n            </Rule>\n            <Rule>\n                <Id>942361</Id>\n                <Type>CRS</Type>\n                <Name>942361 Detects basic SQL injection based on keyword alter or union</Name>\n            </Rule>\n            <Rule>\n                <Id>942370</Id>\n                <Type>CRS</Type>\n                <Name>942370 Detects classic SQL injection probings 2/3</Name>\n            </Rule>\n            <Rule>\n                <Id>942380</Id>\n                <Type>CRS</Type>\n                <Name>942380 SQL Injection Attack</Name>\n            </Rule>\n            <Rule>\n                <Id>942390</Id>\n                <Type>CRS</Type>\n                <Name>942390 SQL Injection Attack</Name>\n            </Rule>\n            <Rule>\n                <Id>942400</Id>\n                <Type>CRS</Type>\n                <Name>942400 SQL Injection Attack</Name>\n            </Rule>\n            <Rule>\n                <Id>942410</Id>\n                <Type>CRS</Type>\n                <Name>942410 SQL Injection Attack</Name>\n            </Rule>\n            <Rule>\n                <Id>942420</Id>\n                <Type>CRS</Type>\n                <Name>942420 Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8)</Name>\n            </Rule>\n            <Rule>\n                <Id>942421</Id>\n                <Type>CRS</Type>\n                <Name>942421 Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)</Name>\n            </Rule>\n            <Rule>\n                <Id>942430</Id>\n                <Type>CRS</Type>\n                <Name>942430 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)</Name>\n            </Rule>\n            <Rule>\n                <Id>942431</Id>\n                <Type>CRS</Type>\n                <Name>942431 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)</Name>\n            </Rule>\n            <Rule>\n                <Id>942432</Id>\n                <Type>CRS</Type>\n                <Name>942432 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2)</Name>\n            </Rule>\n            <Rule>\n                <Id>942440</Id>\n                <Type>CRS</Type>\n                <Name>942440 SQL Comment Sequence Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>942450</Id>\n                <Type>CRS</Type>\n                <Name>942450 SQL Hex Encoding Identified</Name>\n            </Rule>\n            <Rule>\n                <Id>942460</Id>\n                <Type>CRS</Type>\n                <Name>942460 Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters</Name>\n            </Rule>\n            <Rule>\n                <Id>942470</Id>\n                <Type>CRS</Type>\n                <Name>942470 SQL Injection Attack</Name>\n            </Rule>\n            <Rule>\n                <Id>942480</Id>\n                <Type>CRS</Type>\n                <Name>942480 SQL Injection Attack</Name>\n            </Rule>\n            <Rule>\n                <Id>942490</Id>\n                <Type>CRS</Type>\n                <Name>942490 Detects classic SQL injection probings 3/3</Name>\n            </Rule>\n            <Rule>\n                <Id>942500</Id>\n                <Type>CRS</Type>\n                <Name>942500 MySQL in-line comment detected</Name>\n            </Rule>\n            <Rule>\n                <Id>942510</Id>\n                <Type>CRS</Type>\n                <Name>942510 SQLi bypass attempt by ticks or backticks detected</Name>\n            </Rule>\n            <Rule>\n                <Id>942511</Id>\n                <Type>CRS</Type>\n                <Name>942511 SQLi bypass attempt by ticks detected</Name>\n            </Rule>\n            <Rule>\n                <Id>943100</Id>\n                <Type>CRS</Type>\n                <Name>943100 Possible Session Fixation Attack: Setting Cookie Values in HTML</Name>\n            </Rule>\n            <Rule>\n                <Id>943110</Id>\n                <Type>CRS</Type>\n                <Name>943110 Possible Session Fixation Attack: SessionID Parameter Name with Off-Domain Referer</Name>\n            </Rule>\n            <Rule>\n                <Id>943120</Id>\n                <Type>CRS</Type>\n                <Name>943120 Possible Session Fixation Attack: SessionID Parameter Name with No Referer</Name>\n            </Rule>\n            <Rule>\n                <Id>944100</Id>\n                <Type>CRS</Type>\n                <Name>944100 Remote Command Execution: Suspicious Java class detected</Name>\n            </Rule>\n            <Rule>\n                <Id>944110</Id>\n                <Type>CRS</Type>\n                <Name>944110 Remote Command Execution: Java process spawn (CVE-2017-9805)</Name>\n            </Rule>\n            <Rule>\n                <Id>944120</Id>\n                <Type>CRS</Type>\n                <Name>944120 Remote Command Execution: Java serialization (CVE-2015-4852)</Name>\n            </Rule>\n            <Rule>\n                <Id>944130</Id>\n                <Type>CRS</Type>\n                <Name>944130 Suspicious Java class detected</Name>\n            </Rule>\n            <Rule>\n                <Id>944200</Id>\n                <Type>CRS</Type>\n                <Name>944200 Magic bytes Detected</Name>\n            </Rule>\n            <Rule>\n                <Id>944210</Id>\n                <Type>CRS</Type>\n                <Name>944210 Magic bytes Detected Base64 Encoded</Name>\n            </Rule>\n            <Rule>\n                <Id>944240</Id>\n                <Type>CRS</Type>\n                <Name>944240 Remote Command Execution: Java serialization (CVE-2015-4852)</Name>\n            </Rule>\n            <Rule>\n                <Id>944250</Id>\n                <Type>CRS</Type>\n                <Name>944250 Remote Command Execution: Suspicious Java method detected</Name>\n            </Rule>\n            <Rule>\n                <Id>944300</Id>\n                <Type>CRS</Type>\n                <Name>944300 Base64 encoded string matched suspicious keyword</Name>\n            </Rule>\n            <Rule>\n                <Id>950100</Id>\n                <Type>CRS</Type>\n                <Name>950100 The Application Returned a 500-Level Status Code</Name>\n            </Rule>\n            <Rule>\n                <Id>950130</Id>\n                <Type>CRS</Type>\n                <Name>950130 Directory Listing</Name>\n            </Rule>\n            <Rule>\n                <Id>950140</Id>\n                <Type>CRS</Type>\n                <Name>950140 CGI source code leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951110</Id>\n                <Type>CRS</Type>\n                <Name>951110 Microsoft Access SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951120</Id>\n                <Type>CRS</Type>\n                <Name>951120 Oracle SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951130</Id>\n                <Type>CRS</Type>\n                <Name>951130 DB2 SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951140</Id>\n                <Type>CRS</Type>\n                <Name>951140 EMC SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951150</Id>\n                <Type>CRS</Type>\n                <Name>951150 firebird SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951160</Id>\n                <Type>CRS</Type>\n                <Name>951160 Frontbase SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951170</Id>\n                <Type>CRS</Type>\n                <Name>951170 hsqldb SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951180</Id>\n                <Type>CRS</Type>\n                <Name>951180 informix SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951190</Id>\n                <Type>CRS</Type>\n                <Name>951190 ingres SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951200</Id>\n                <Type>CRS</Type>\n                <Name>951200 interbase SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951210</Id>\n                <Type>CRS</Type>\n                <Name>951210 maxDB SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951220</Id>\n                <Type>CRS</Type>\n                <Name>951220 mssql SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951230</Id>\n                <Type>CRS</Type>\n                <Name>951230 mysql SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951240</Id>\n                <Type>CRS</Type>\n                <Name>951240 postgres SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951250</Id>\n                <Type>CRS</Type>\n                <Name>951250 sqlite SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>951260</Id>\n                <Type>CRS</Type>\n                <Name>951260 Sybase SQL Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>952100</Id>\n                <Type>CRS</Type>\n                <Name>952100 Java Source Code Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>952110</Id>\n                <Type>CRS</Type>\n                <Name>952110 Java Errors</Name>\n            </Rule>\n            <Rule>\n                <Id>953100</Id>\n                <Type>CRS</Type>\n                <Name>953100 PHP Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>953110</Id>\n                <Type>CRS</Type>\n                <Name>953110 PHP source code leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>953120</Id>\n                <Type>CRS</Type>\n                <Name>953120 PHP source code leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>954100</Id>\n                <Type>CRS</Type>\n                <Name>954100 Disclosure of IIS install location</Name>\n            </Rule>\n            <Rule>\n                <Id>954110</Id>\n                <Type>CRS</Type>\n                <Name>954110 Application Availability Error</Name>\n            </Rule>\n            <Rule>\n                <Id>954120</Id>\n                <Type>CRS</Type>\n                <Name>954120 IIS Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>954130</Id>\n                <Type>CRS</Type>\n                <Name>954130 IIS Information Leakage</Name>\n            </Rule>\n            <Rule>\n                <Id>980100</Id>\n                <Type>CRS</Type>\n                <Name>980100 Correlated Successful Attack Identified: (Total Score: %{tx.anomaly_score}) Inbound Attack (Inbound</Name>\n            </Rule>\n            <Rule>\n                <Id>980110</Id>\n                <Type>CRS</Type>\n                <Name>980110 Correlated Attack Attempt Identified: (Total Score: %{tx.anomaly_score}) Inbound Attack (Inbound An</Name>\n            </Rule>\n            <Rule>\n                <Id>980120</Id>\n                <Type>CRS</Type>\n                <Name>980120 Inbound Anomaly Score (Total Inbound Score: %{TX.INBOUND_ANOMALY_SCORE} - SQLI=%{tx.sql_injection_s</Name>\n            </Rule>\n            <Rule>\n                <Id>980130</Id>\n                <Type>CRS</Type>\n                <Name>980130 Inbound Anomaly Score Exceeded (Total Inbound Score: %{TX.INBOUND_ANOMALY_SCORE} - SQLI=%{tx.sql_in</Name>\n            </Rule>\n            <Rule>\n                <Id>980140</Id>\n                <Type>CRS</Type>\n                <Name>980140 Outbound Anomaly Score Exceeded (score %{TX.OUTBOUND_ANOMALY_SCORE}): individual paranoia level sco</Name>\n            </Rule>\n            <Rule>\n                <Id>980150</Id>\n                <Type>CRS</Type>\n                <Name>980150 Outbound Anomaly Score (Total Outbound Score: %{TX.OUTBOUND_ANOMALY_SCORE}): individual paranoia le</Name>\n            </Rule>\n            <Rule>\n                <Id>known</Id>\n                <Type>custom</Type>\n                <Name>known</Name>\n            </Rule>\n            <Rule>\n                <Id>nextcloud</Id>\n                <Type>workload</Type>\n                <Name>nextcloud</Name>\n            </Rule>\n            <Rule>\n                <Id>dokuwiki</Id>\n                <Type>workload</Type>\n                <Name>dokuwiki</Name>\n            </Rule>\n            <Rule>\n                <Id>cpanel</Id>\n                <Type>workload</Type>\n                <Name>cpanel</Name>\n            </Rule>\n            <Rule>\n                <Id>wordpress</Id>\n                <Type>workload</Type>\n                <Name>wordpress</Name>\n            </Rule>\n            <Rule>\n                <Id>xenforo</Id>\n                <Type>workload</Type>\n                <Name>xenforo</Name>\n            </Rule>\n            <Rule>\n                <Id>drupal</Id>\n                <Type>workload</Type>\n                <Name>drupal</Name>\n            </Rule>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"02f98356-a55f-452f-8e8d-6a554f4a4eea"},{"name":"Show All OWASP Rules","id":"4daa96fd-72fd-4029-af92-967de429b17d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/owasprules?vs=2","description":"<p>To display all OWASP rules and their enablement state for a Virtual Service, run the <strong>owasprules</strong> command and Specify the Virtual Service index.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","owasprules"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"2"}],"variable":[]}},"response":[{"id":"755c2ff0-3435-4d23-9cc7-7422ef25fdc0","name":"Show All OWASP Rules","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/owasprules?vs=2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","owasprules"],"query":[{"key":"vs","value":"2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:56:47 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Rule>\n                <Id>911100</Id>\n                <Type>CRS</Type>\n                <Name>911100 Method is not allowed by policy</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913100</Id>\n                <Type>CRS</Type>\n                <Name>913100 Found User-Agent associated with security scanner</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913101</Id>\n                <Type>CRS</Type>\n                <Name>913101 Found User-Agent associated with scripting/generic HTTP client</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913102</Id>\n                <Type>CRS</Type>\n                <Name>913102 Found User-Agent associated with web crawler/bot</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913110</Id>\n                <Type>CRS</Type>\n                <Name>913110 Found request header associated with security scanner</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913120</Id>\n                <Type>CRS</Type>\n                <Name>913120 Found request filename/argument associated with security scanner</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920100</Id>\n                <Type>CRS</Type>\n                <Name>920100 Invalid HTTP Request Line</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920120</Id>\n                <Type>CRS</Type>\n                <Name>920120 Attempted multipart/form-data bypass</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920121</Id>\n                <Type>CRS</Type>\n                <Name>920121 Attempted multipart/form-data bypass</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920160</Id>\n                <Type>CRS</Type>\n                <Name>920160 Content-Length HTTP header is not numeric</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920170</Id>\n                <Type>CRS</Type>\n                <Name>920170 GET or HEAD Request with Body Content</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920171</Id>\n                <Type>CRS</Type>\n                <Name>920171 GET or HEAD Request with Transfer-Encoding</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920180</Id>\n                <Type>CRS</Type>\n                <Name>920180 POST without Content-Length or Transfer-Encoding headers</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920181</Id>\n                <Type>CRS</Type>\n                <Name>920181 Content-Length and Transfer-Encoding headers present.</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920190</Id>\n                <Type>CRS</Type>\n                <Name>920190 Range: Invalid Last Byte Value</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920200</Id>\n                <Type>CRS</Type>\n                <Name>920200 Range: Too many fields (6 or more)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920201</Id>\n                <Type>CRS</Type>\n                <Name>920201 Range: Too many fields for pdf request (63 or more)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920202</Id>\n                <Type>CRS</Type>\n                <Name>920202 Range: Too many fields for pdf request (6 or more)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920210</Id>\n                <Type>CRS</Type>\n                <Name>920210 Multiple/Conflicting Connection Header Data Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920220</Id>\n                <Type>CRS</Type>\n                <Name>920220 URL Encoding Abuse Attack Attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920230</Id>\n                <Type>CRS</Type>\n                <Name>920230 Multiple URL Encoding Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920240</Id>\n                <Type>CRS</Type>\n                <Name>920240 URL Encoding Abuse Attack Attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920250</Id>\n                <Type>CRS</Type>\n                <Name>920250 UTF8 Encoding Abuse Attack Attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920260</Id>\n                <Type>CRS</Type>\n                <Name>920260 Unicode Full/Half Width Abuse Attack Attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920270</Id>\n                <Type>CRS</Type>\n                <Name>920270 Invalid character in request (null character)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920271</Id>\n                <Type>CRS</Type>\n                <Name>920271 Invalid character in request (non printable characters)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920272</Id>\n                <Type>CRS</Type>\n                <Name>920272 Invalid character in request (outside of printable chars below ascii 127)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920273</Id>\n                <Type>CRS</Type>\n                <Name>920273 Invalid character in request (outside of very strict set)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920274</Id>\n                <Type>CRS</Type>\n                <Name>920274 Invalid character in request headers (outside of very strict set)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920275</Id>\n                <Type>CRS</Type>\n                <Name>920275 Invalid character in request headers (outside of very strict set)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920280</Id>\n                <Type>CRS</Type>\n                <Name>920280 Request Missing a Host Header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920290</Id>\n                <Type>CRS</Type>\n                <Name>920290 Empty Host Header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920300</Id>\n                <Type>CRS</Type>\n                <Name>920300 Request Missing an Accept Header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920310</Id>\n                <Type>CRS</Type>\n                <Name>920310 Request Has an Empty Accept Header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920311</Id>\n                <Type>CRS</Type>\n                <Name>920311 Request Has an Empty Accept Header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920320</Id>\n                <Type>CRS</Type>\n                <Name>920320 Missing User Agent Header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920330</Id>\n                <Type>CRS</Type>\n                <Name>920330 Empty User Agent Header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920340</Id>\n                <Type>CRS</Type>\n                <Name>920340 Request Containing Content</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920341</Id>\n                <Type>CRS</Type>\n                <Name>920341 Request Containing Content Requires Content-Type header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920350</Id>\n                <Type>CRS</Type>\n                <Name>920350 Host header is a numeric IP address</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920360</Id>\n                <Type>CRS</Type>\n                <Name>920360 Argument name too long</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920370</Id>\n                <Type>CRS</Type>\n                <Name>920370 Argument value too long</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920380</Id>\n                <Type>CRS</Type>\n                <Name>920380 Too many arguments in request</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920390</Id>\n                <Type>CRS</Type>\n                <Name>920390 Total arguments size exceeded</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920400</Id>\n                <Type>CRS</Type>\n                <Name>920400 Uploaded file size too large</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920410</Id>\n                <Type>CRS</Type>\n                <Name>920410 Total uploaded files size too large</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920420</Id>\n                <Type>CRS</Type>\n                <Name>920420 Request content type is not allowed by policy</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920430</Id>\n                <Type>CRS</Type>\n                <Name>920430 HTTP protocol version is not allowed by policy</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920440</Id>\n                <Type>CRS</Type>\n                <Name>920440 URL file extension is restricted by policy</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920450</Id>\n                <Type>CRS</Type>\n                <Name>920450 HTTP header is restricted by policy (%{MATCHED_VAR})</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920460</Id>\n                <Type>CRS</Type>\n                <Name>920460 Abnormal character escapes in request</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920470</Id>\n                <Type>CRS</Type>\n                <Name>920470 Illegal Content-Type header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920480</Id>\n                <Type>CRS</Type>\n                <Name>920480 Request content type charset is not allowed by policy</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920490</Id>\n                <Type>CRS</Type>\n                <Name>920490 Request header x-up-devcap-post-charset detected in combination with prefix </Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920500</Id>\n                <Type>CRS</Type>\n                <Name>920500 Attempt to access a backup or working file</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920510</Id>\n                <Type>CRS</Type>\n                <Name>920510 Invalid Cache-Control request header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920530</Id>\n                <Type>CRS</Type>\n                <Name>920530 Multiple charsets detected in content type header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920600</Id>\n                <Type>CRS</Type>\n                <Name>920600 Illegal Accept header: charset parameter</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921110</Id>\n                <Type>CRS</Type>\n                <Name>921110 HTTP Request Smuggling Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921120</Id>\n                <Type>CRS</Type>\n                <Name>921120 HTTP Response Splitting Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921130</Id>\n                <Type>CRS</Type>\n                <Name>921130 HTTP Response Splitting Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921140</Id>\n                <Type>CRS</Type>\n                <Name>921140 HTTP Header Injection Attack via headers</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921150</Id>\n                <Type>CRS</Type>\n                <Name>921150 HTTP Header Injection Attack via payload (CR/LF detected)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921151</Id>\n                <Type>CRS</Type>\n                <Name>921151 HTTP Header Injection Attack via payload (CR/LF detected)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921160</Id>\n                <Type>CRS</Type>\n                <Name>921160 HTTP Header Injection Attack via payload (CR/LF and header-name detected)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921180</Id>\n                <Type>CRS</Type>\n                <Name>921180 HTTP Parameter Pollution (%{TX.1})</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921190</Id>\n                <Type>CRS</Type>\n                <Name>921190 HTTP Splitting (CR/LF in request filename detected)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921200</Id>\n                <Type>CRS</Type>\n                <Name>921200 LDAP Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921230</Id>\n                <Type>CRS</Type>\n                <Name>921230 HTTP Range Header detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921421</Id>\n                <Type>CRS</Type>\n                <Name>921421 Content-Type header: Dangerous content type outside the mime type declaration</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921422</Id>\n                <Type>CRS</Type>\n                <Name>921422 Content-Type header: Dangerous content type outside the mime type declaration</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>922100</Id>\n                <Type>CRS</Type>\n                <Name>922100 Multipart content type global _charset_ definition is not allowed by policy</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>922110</Id>\n                <Type>CRS</Type>\n                <Name>922110 Illegal MIME Multipart Header content-type: charset parameter</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>922120</Id>\n                <Type>CRS</Type>\n                <Name>922120 Content-Transfer-Encoding was deprecated by rfc7578 in 2015 and should not be used</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930100</Id>\n                <Type>CRS</Type>\n                <Name>930100 Path Traversal Attack (/../)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930110</Id>\n                <Type>CRS</Type>\n                <Name>930110 Path Traversal Attack (/../)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930120</Id>\n                <Type>CRS</Type>\n                <Name>930120 OS File Access Attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930130</Id>\n                <Type>CRS</Type>\n                <Name>930130 Restricted File Access Attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931100</Id>\n                <Type>CRS</Type>\n                <Name>931100 Possible Remote File Inclusion (RFI) Attack: URL Parameter using IP Address</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931110</Id>\n                <Type>CRS</Type>\n                <Name>931110 Possible Remote File Inclusion (RFI) Attack: Common RFI Vulnerable Parameter Name used w/URL Payloa</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931120</Id>\n                <Type>CRS</Type>\n                <Name>931120 Possible Remote File Inclusion (RFI) Attack: URL Payload Used w/Trailing Question Mark Character (?</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931130</Id>\n                <Type>CRS</Type>\n                <Name>931130 Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932100</Id>\n                <Type>CRS</Type>\n                <Name>932100 Remote Command Execution: Unix Command Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932105</Id>\n                <Type>CRS</Type>\n                <Name>932105 Remote Command Execution: Unix Command Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932106</Id>\n                <Type>CRS</Type>\n                <Name>932106 Remote Command Execution: Unix Command Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932110</Id>\n                <Type>CRS</Type>\n                <Name>932110 Remote Command Execution: Windows Command Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932115</Id>\n                <Type>CRS</Type>\n                <Name>932115 Remote Command Execution: Windows Command Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932120</Id>\n                <Type>CRS</Type>\n                <Name>932120 Remote Command Execution: Windows PowerShell Command Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932130</Id>\n                <Type>CRS</Type>\n                <Name>932130 Remote Command Execution: Unix Shell Expression Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932140</Id>\n                <Type>CRS</Type>\n                <Name>932140 Remote Command Execution: Windows FOR/IF Command Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932150</Id>\n                <Type>CRS</Type>\n                <Name>932150 Remote Command Execution: Direct Unix Command Execution</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932160</Id>\n                <Type>CRS</Type>\n                <Name>932160 Remote Command Execution: Unix Shell Code Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932170</Id>\n                <Type>CRS</Type>\n                <Name>932170 Remote Command Execution: Shellshock (CVE-2014-6271)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932171</Id>\n                <Type>CRS</Type>\n                <Name>932171 Remote Command Execution: Shellshock (CVE-2014-6271)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932180</Id>\n                <Type>CRS</Type>\n                <Name>932180 Restricted File Upload Attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932190</Id>\n                <Type>CRS</Type>\n                <Name>932190 Remote Command Execution: Wildcard bypass technique attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932200</Id>\n                <Type>CRS</Type>\n                <Name>932200 RCE Bypass Technique</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933100</Id>\n                <Type>CRS</Type>\n                <Name>933100 PHP Injection Attack: PHP Open Tag Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933110</Id>\n                <Type>CRS</Type>\n                <Name>933110 PHP Injection Attack: PHP Script File Upload Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933111</Id>\n                <Type>CRS</Type>\n                <Name>933111 PHP Injection Attack: PHP Script File Upload Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933120</Id>\n                <Type>CRS</Type>\n                <Name>933120 PHP Injection Attack: Configuration Directive Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933130</Id>\n                <Type>CRS</Type>\n                <Name>933130 PHP Injection Attack: Variables Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933131</Id>\n                <Type>CRS</Type>\n                <Name>933131 PHP Injection Attack: Variables Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933140</Id>\n                <Type>CRS</Type>\n                <Name>933140 PHP Injection Attack: I/O Stream Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933150</Id>\n                <Type>CRS</Type>\n                <Name>933150 PHP Injection Attack: High-Risk PHP Function Name Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933151</Id>\n                <Type>CRS</Type>\n                <Name>933151 PHP Injection Attack: Medium-Risk PHP Function Name Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933160</Id>\n                <Type>CRS</Type>\n                <Name>933160 PHP Injection Attack: High-Risk PHP Function Call Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933161</Id>\n                <Type>CRS</Type>\n                <Name>933161 PHP Injection Attack: Low-Value PHP Function Call Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933170</Id>\n                <Type>CRS</Type>\n                <Name>933170 PHP Injection Attack: Serialized Object Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933180</Id>\n                <Type>CRS</Type>\n                <Name>933180 PHP Injection Attack: Variable Function Call Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933190</Id>\n                <Type>CRS</Type>\n                <Name>933190 PHP Injection Attack: PHP Closing Tag Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933200</Id>\n                <Type>CRS</Type>\n                <Name>933200 PHP Injection Attack: Wrapper scheme detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933210</Id>\n                <Type>CRS</Type>\n                <Name>933210 PHP Injection Attack: Variable Function Call Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>934100</Id>\n                <Type>CRS</Type>\n                <Name>934100 Node.js Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941100</Id>\n                <Type>CRS</Type>\n                <Name>941100 XSS Attack Detected via libinjection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941101</Id>\n                <Type>CRS</Type>\n                <Name>941101 XSS Attack Detected via libinjection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941110</Id>\n                <Type>CRS</Type>\n                <Name>941110 XSS Filter - Category 1: Script Tag Vector</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941120</Id>\n                <Type>CRS</Type>\n                <Name>941120 XSS Filter - Category 2: Event Handler Vector</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941130</Id>\n                <Type>CRS</Type>\n                <Name>941130 XSS Filter - Category 3: Attribute Vector</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941140</Id>\n                <Type>CRS</Type>\n                <Name>941140 XSS Filter - Category 4: Javascript URI Vector</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941150</Id>\n                <Type>CRS</Type>\n                <Name>941150 XSS Filter - Category 5: Disallowed HTML Attributes</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941160</Id>\n                <Type>CRS</Type>\n                <Name>941160 NoScript XSS InjectionChecker: HTML Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941170</Id>\n                <Type>CRS</Type>\n                <Name>941170 NoScript XSS InjectionChecker: Attribute Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941180</Id>\n                <Type>CRS</Type>\n                <Name>941180 Node-Validator Blacklist Keywords</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941190</Id>\n                <Type>CRS</Type>\n                <Name>941190 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941200</Id>\n                <Type>CRS</Type>\n                <Name>941200 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941210</Id>\n                <Type>CRS</Type>\n                <Name>941210 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941220</Id>\n                <Type>CRS</Type>\n                <Name>941220 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941230</Id>\n                <Type>CRS</Type>\n                <Name>941230 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941240</Id>\n                <Type>CRS</Type>\n                <Name>941240 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941250</Id>\n                <Type>CRS</Type>\n                <Name>941250 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941260</Id>\n                <Type>CRS</Type>\n                <Name>941260 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941270</Id>\n                <Type>CRS</Type>\n                <Name>941270 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941280</Id>\n                <Type>CRS</Type>\n                <Name>941280 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941290</Id>\n                <Type>CRS</Type>\n                <Name>941290 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941300</Id>\n                <Type>CRS</Type>\n                <Name>941300 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941310</Id>\n                <Type>CRS</Type>\n                <Name>941310 US-ASCII Malformed Encoding XSS Filter - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941320</Id>\n                <Type>CRS</Type>\n                <Name>941320 Possible XSS Attack Detected - HTML Tag Handler</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941330</Id>\n                <Type>CRS</Type>\n                <Name>941330 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941340</Id>\n                <Type>CRS</Type>\n                <Name>941340 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941350</Id>\n                <Type>CRS</Type>\n                <Name>941350 UTF-7 Encoding IE XSS - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941360</Id>\n                <Type>CRS</Type>\n                <Name>941360 JSFuck / Hieroglyphy obfuscation detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941370</Id>\n                <Type>CRS</Type>\n                <Name>941370 JavaScript global variable found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941380</Id>\n                <Type>CRS</Type>\n                <Name>941380 AngularJS client side template injection detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942100</Id>\n                <Type>CRS</Type>\n                <Name>942100 SQL Injection Attack Detected via libinjection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942101</Id>\n                <Type>CRS</Type>\n                <Name>942101 SQL Injection Attack Detected via libinjection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942110</Id>\n                <Type>CRS</Type>\n                <Name>942110 SQL Injection Attack: Common Injection Testing Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942120</Id>\n                <Type>CRS</Type>\n                <Name>942120 SQL Injection Attack: SQL Operator Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942130</Id>\n                <Type>CRS</Type>\n                <Name>942130 SQL Injection Attack: SQL Tautology Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942140</Id>\n                <Type>CRS</Type>\n                <Name>942140 SQL Injection Attack: Common DB Names Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942150</Id>\n                <Type>CRS</Type>\n                <Name>942150 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942160</Id>\n                <Type>CRS</Type>\n                <Name>942160 Detects blind sqli tests using sleep() or benchmark()</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942170</Id>\n                <Type>CRS</Type>\n                <Name>942170 Detects SQL benchmark and sleep injection attempts including conditional queries</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942180</Id>\n                <Type>CRS</Type>\n                <Name>942180 Detects basic SQL authentication bypass attempts 1/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942190</Id>\n                <Type>CRS</Type>\n                <Name>942190 Detects MSSQL code execution and information gathering attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942200</Id>\n                <Type>CRS</Type>\n                <Name>942200 Detects MySQL comment-/space-obfuscated injections and backtick termination</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942210</Id>\n                <Type>CRS</Type>\n                <Name>942210 Detects chained SQL injection attempts 1/2</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942220</Id>\n                <Type>CRS</Type>\n                <Name>942220 Looking for integer overflow attacks</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942230</Id>\n                <Type>CRS</Type>\n                <Name>942230 Detects conditional SQL injection attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942240</Id>\n                <Type>CRS</Type>\n                <Name>942240 Detects MySQL charset switch and MSSQL DoS attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942250</Id>\n                <Type>CRS</Type>\n                <Name>942250 Detects MATCH AGAINST</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942251</Id>\n                <Type>CRS</Type>\n                <Name>942251 Detects HAVING injections</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942260</Id>\n                <Type>CRS</Type>\n                <Name>942260 Detects basic SQL authentication bypass attempts 2/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942270</Id>\n                <Type>CRS</Type>\n                <Name>942270 Looking for basic sql injection. Common attack string for mysql</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942280</Id>\n                <Type>CRS</Type>\n                <Name>942280 Detects Postgres pg_sleep injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942290</Id>\n                <Type>CRS</Type>\n                <Name>942290 Finds basic MongoDB SQL injection attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942300</Id>\n                <Type>CRS</Type>\n                <Name>942300 Detects MySQL comments</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942310</Id>\n                <Type>CRS</Type>\n                <Name>942310 Detects chained SQL injection attempts 2/2</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942320</Id>\n                <Type>CRS</Type>\n                <Name>942320 Detects MySQL and PostgreSQL stored procedure/function injections</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942330</Id>\n                <Type>CRS</Type>\n                <Name>942330 Detects classic SQL injection probings 1/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942340</Id>\n                <Type>CRS</Type>\n                <Name>942340 Detects basic SQL authentication bypass attempts 3/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942350</Id>\n                <Type>CRS</Type>\n                <Name>942350 Detects MySQL UDF injection and other data/structure manipulation attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942360</Id>\n                <Type>CRS</Type>\n                <Name>942360 Detects concatenated basic SQL injection and SQLLFI attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942361</Id>\n                <Type>CRS</Type>\n                <Name>942361 Detects basic SQL injection based on keyword alter or union</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942370</Id>\n                <Type>CRS</Type>\n                <Name>942370 Detects classic SQL injection probings 2/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942380</Id>\n                <Type>CRS</Type>\n                <Name>942380 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942390</Id>\n                <Type>CRS</Type>\n                <Name>942390 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942400</Id>\n                <Type>CRS</Type>\n                <Name>942400 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942410</Id>\n                <Type>CRS</Type>\n                <Name>942410 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942420</Id>\n                <Type>CRS</Type>\n                <Name>942420 Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942421</Id>\n                <Type>CRS</Type>\n                <Name>942421 Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942430</Id>\n                <Type>CRS</Type>\n                <Name>942430 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942431</Id>\n                <Type>CRS</Type>\n                <Name>942431 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942432</Id>\n                <Type>CRS</Type>\n                <Name>942432 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942440</Id>\n                <Type>CRS</Type>\n                <Name>942440 SQL Comment Sequence Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942450</Id>\n                <Type>CRS</Type>\n                <Name>942450 SQL Hex Encoding Identified</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942460</Id>\n                <Type>CRS</Type>\n                <Name>942460 Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942470</Id>\n                <Type>CRS</Type>\n                <Name>942470 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942480</Id>\n                <Type>CRS</Type>\n                <Name>942480 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942490</Id>\n                <Type>CRS</Type>\n                <Name>942490 Detects classic SQL injection probings 3/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942500</Id>\n                <Type>CRS</Type>\n                <Name>942500 MySQL in-line comment detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942510</Id>\n                <Type>CRS</Type>\n                <Name>942510 SQLi bypass attempt by ticks or backticks detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942511</Id>\n                <Type>CRS</Type>\n                <Name>942511 SQLi bypass attempt by ticks detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>943100</Id>\n                <Type>CRS</Type>\n                <Name>943100 Possible Session Fixation Attack: Setting Cookie Values in HTML</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>943110</Id>\n                <Type>CRS</Type>\n                <Name>943110 Possible Session Fixation Attack: SessionID Parameter Name with Off-Domain Referer</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>943120</Id>\n                <Type>CRS</Type>\n                <Name>943120 Possible Session Fixation Attack: SessionID Parameter Name with No Referer</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944100</Id>\n                <Type>CRS</Type>\n                <Name>944100 Remote Command Execution: Suspicious Java class detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944110</Id>\n                <Type>CRS</Type>\n                <Name>944110 Remote Command Execution: Java process spawn (CVE-2017-9805)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944120</Id>\n                <Type>CRS</Type>\n                <Name>944120 Remote Command Execution: Java serialization (CVE-2015-4852)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944130</Id>\n                <Type>CRS</Type>\n                <Name>944130 Suspicious Java class detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944200</Id>\n                <Type>CRS</Type>\n                <Name>944200 Magic bytes Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944210</Id>\n                <Type>CRS</Type>\n                <Name>944210 Magic bytes Detected Base64 Encoded</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944240</Id>\n                <Type>CRS</Type>\n                <Name>944240 Remote Command Execution: Java serialization (CVE-2015-4852)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944250</Id>\n                <Type>CRS</Type>\n                <Name>944250 Remote Command Execution: Suspicious Java method detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944300</Id>\n                <Type>CRS</Type>\n                <Name>944300 Base64 encoded string matched suspicious keyword</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>950100</Id>\n                <Type>CRS</Type>\n                <Name>950100 The Application Returned a 500-Level Status Code</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>950130</Id>\n                <Type>CRS</Type>\n                <Name>950130 Directory Listing</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>950140</Id>\n                <Type>CRS</Type>\n                <Name>950140 CGI source code leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951110</Id>\n                <Type>CRS</Type>\n                <Name>951110 Microsoft Access SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951120</Id>\n                <Type>CRS</Type>\n                <Name>951120 Oracle SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951130</Id>\n                <Type>CRS</Type>\n                <Name>951130 DB2 SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951140</Id>\n                <Type>CRS</Type>\n                <Name>951140 EMC SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951150</Id>\n                <Type>CRS</Type>\n                <Name>951150 firebird SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951160</Id>\n                <Type>CRS</Type>\n                <Name>951160 Frontbase SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951170</Id>\n                <Type>CRS</Type>\n                <Name>951170 hsqldb SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951180</Id>\n                <Type>CRS</Type>\n                <Name>951180 informix SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951190</Id>\n                <Type>CRS</Type>\n                <Name>951190 ingres SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951200</Id>\n                <Type>CRS</Type>\n                <Name>951200 interbase SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951210</Id>\n                <Type>CRS</Type>\n                <Name>951210 maxDB SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951220</Id>\n                <Type>CRS</Type>\n                <Name>951220 mssql SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951230</Id>\n                <Type>CRS</Type>\n                <Name>951230 mysql SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951240</Id>\n                <Type>CRS</Type>\n                <Name>951240 postgres SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951250</Id>\n                <Type>CRS</Type>\n                <Name>951250 sqlite SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951260</Id>\n                <Type>CRS</Type>\n                <Name>951260 Sybase SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>952100</Id>\n                <Type>CRS</Type>\n                <Name>952100 Java Source Code Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>952110</Id>\n                <Type>CRS</Type>\n                <Name>952110 Java Errors</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>953100</Id>\n                <Type>CRS</Type>\n                <Name>953100 PHP Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>953110</Id>\n                <Type>CRS</Type>\n                <Name>953110 PHP source code leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>953120</Id>\n                <Type>CRS</Type>\n                <Name>953120 PHP source code leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954100</Id>\n                <Type>CRS</Type>\n                <Name>954100 Disclosure of IIS install location</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954110</Id>\n                <Type>CRS</Type>\n                <Name>954110 Application Availability Error</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954120</Id>\n                <Type>CRS</Type>\n                <Name>954120 IIS Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954130</Id>\n                <Type>CRS</Type>\n                <Name>954130 IIS Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980100</Id>\n                <Type>CRS</Type>\n                <Name>980100 Correlated Successful Attack Identified: (Total Score: %{tx.anomaly_score}) Inbound Attack (Inbound</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980110</Id>\n                <Type>CRS</Type>\n                <Name>980110 Correlated Attack Attempt Identified: (Total Score: %{tx.anomaly_score}) Inbound Attack (Inbound An</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980120</Id>\n                <Type>CRS</Type>\n                <Name>980120 Inbound Anomaly Score (Total Inbound Score: %{TX.INBOUND_ANOMALY_SCORE} - SQLI=%{tx.sql_injection_s</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980130</Id>\n                <Type>CRS</Type>\n                <Name>980130 Inbound Anomaly Score Exceeded (Total Inbound Score: %{TX.INBOUND_ANOMALY_SCORE} - SQLI=%{tx.sql_in</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980140</Id>\n                <Type>CRS</Type>\n                <Name>980140 Outbound Anomaly Score Exceeded (score %{TX.OUTBOUND_ANOMALY_SCORE}): individual paranoia level sco</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980150</Id>\n                <Type>CRS</Type>\n                <Name>980150 Outbound Anomaly Score (Total Outbound Score: %{TX.OUTBOUND_ANOMALY_SCORE}): individual paranoia le</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>known</Id>\n                <Type>custom</Type>\n                <Name>known</Name>\n                <Enabled>no</Enabled>\n                <Runfirst>no</Runfirst>\n            </Rule>\n            <Rule>\n                <Id>nextcloud</Id>\n                <Type>workload</Type>\n                <Name>nextcloud</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>dokuwiki</Id>\n                <Type>workload</Type>\n                <Name>dokuwiki</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>cpanel</Id>\n                <Type>workload</Type>\n                <Name>cpanel</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>wordpress</Id>\n                <Type>workload</Type>\n                <Name>wordpress</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>xenforo</Id>\n                <Type>workload</Type>\n                <Name>xenforo</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>drupal</Id>\n                <Type>workload</Type>\n                <Name>drupal</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"4daa96fd-72fd-4029-af92-967de429b17d"},{"name":"Show an OWASP Rule","id":"1564382c-4f95-456f-aaa0-9ceaae200221","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/owasprules?vs=2&rule=911100","description":"<p>To display an OWASP rule and its enablement state for a Virtual Service, run the <strong>owasprules</strong> command and specify the Virtual Service index and rule ID.</p>\n<blockquote>\n<p>To get the rule ID of an OWASP rule, check the user interface (<strong>Virtual Services &gt; View/Modify Services &gt; Modify &gt; WAF &gt; Manage Rules</strong> and expand the relevant rule section to see the associated rule ids) or run the <strong>owasprules</strong> command. You can also specify a prefix, such as 913 for the <strong>scanner-detection</strong> rules, to enable/disable/view all rules that contain that prefix in their ID.</p>\n</blockquote>\n<blockquote>\n<p>For more information on the OWASP rules including a list of IDs for each ruleset and rule, refer to the <a href=\"https://kemptechnologies.com/documentation/latestga/100000016\">OWASP Standard Rules Technical Note</a>.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","owasprules"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"2"},{"key":"rule","value":"911100"}],"variable":[]}},"response":[{"id":"17f17321-8fa8-4316-8abd-647b683c2b0e","name":"Show an OWASP Rule","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/owasprules?vs=2&rule=911100","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","owasprules"],"query":[{"key":"vs","value":"2"},{"key":"rule","value":"911100"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:57:41 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Rule>\n                <Id>911100</Id>\n                <Type>CRS</Type>\n                <Name>911100 Method is not allowed by policy</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"1564382c-4f95-456f-aaa0-9ceaae200221"},{"name":"Specify if a Custom Rule should be run before the Core Rule Set","id":"5cad40b8-b7b3-42a7-b4d1-19bdd9bda2f3","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/owasprules?vs=2&rule=known&runfirst=1","description":"<p>To specify that a custom rule should run before the OWASP Core Rule Set (CRS), enable the <strong>runfirst</strong> parameter.</p>\n<p>If the <strong>runfirst</strong> parameter is disabled, the custom rule runs after the CRS.</p>\n<p>The <strong>runfirst</strong> parameter is disabled by default.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","owasprules"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"2"},{"key":"rule","value":"known"},{"key":"runfirst","value":"1"}],"variable":[]}},"response":[{"id":"3ef042bd-3ac8-4a1e-8cca-0ca8cb8b9439","name":"Specify if a Custom Rule should be run before the Core Rule Set","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/owasprules?vs=2&rule=known&runfirst=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","owasprules"],"query":[{"key":"vs","value":"2"},{"key":"rule","value":"known"},{"key":"runfirst","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:58:36 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Rule>\n                <Id>known</Id>\n                <Type>custom</Type>\n                <Name>known</Name>\n                <Enabled>yes</Enabled>\n                <Runfirst>yes</Runfirst>\n            </Rule>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"5cad40b8-b7b3-42a7-b4d1-19bdd9bda2f3"},{"name":"Turn Off All OWASP Rules","id":"ed27abee-6c89-404b-89ab-4274eb6d6fdc","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/owasprules?vs=2&enable=no","description":"<p>To turn off all OWASP rules for a particular ruleset of a Virtual Service, run the <strong>owaprules</strong> command and specify the Virtual Service index, rule ID, and set the <strong>enable</strong> parameter to <strong>0</strong>.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","owasprules"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"2"},{"key":"enable","value":"no"}],"variable":[]}},"response":[{"id":"33cdb3a2-9de0-4a60-8623-537a3dcdc4f9","name":"Turn Off All OWASP Rules","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/owasprules?vs=2&enable=no","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","owasprules"],"query":[{"key":"vs","value":"2"},{"key":"enable","value":"no"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 09:59:52 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Rule>\n                <Id>911100</Id>\n                <Type>CRS</Type>\n                <Name>911100 Method is not allowed by policy</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913100</Id>\n                <Type>CRS</Type>\n                <Name>913100 Found User-Agent associated with security scanner</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913101</Id>\n                <Type>CRS</Type>\n                <Name>913101 Found User-Agent associated with scripting/generic HTTP client</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913102</Id>\n                <Type>CRS</Type>\n                <Name>913102 Found User-Agent associated with web crawler/bot</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913110</Id>\n                <Type>CRS</Type>\n                <Name>913110 Found request header associated with security scanner</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913120</Id>\n                <Type>CRS</Type>\n                <Name>913120 Found request filename/argument associated with security scanner</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920100</Id>\n                <Type>CRS</Type>\n                <Name>920100 Invalid HTTP Request Line</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920120</Id>\n                <Type>CRS</Type>\n                <Name>920120 Attempted multipart/form-data bypass</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920121</Id>\n                <Type>CRS</Type>\n                <Name>920121 Attempted multipart/form-data bypass</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920160</Id>\n                <Type>CRS</Type>\n                <Name>920160 Content-Length HTTP header is not numeric</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920170</Id>\n                <Type>CRS</Type>\n                <Name>920170 GET or HEAD Request with Body Content</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920171</Id>\n                <Type>CRS</Type>\n                <Name>920171 GET or HEAD Request with Transfer-Encoding</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920180</Id>\n                <Type>CRS</Type>\n                <Name>920180 POST without Content-Length or Transfer-Encoding headers</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920181</Id>\n                <Type>CRS</Type>\n                <Name>920181 Content-Length and Transfer-Encoding headers present.</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920190</Id>\n                <Type>CRS</Type>\n                <Name>920190 Range: Invalid Last Byte Value</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920200</Id>\n                <Type>CRS</Type>\n                <Name>920200 Range: Too many fields (6 or more)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920201</Id>\n                <Type>CRS</Type>\n                <Name>920201 Range: Too many fields for pdf request (63 or more)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920202</Id>\n                <Type>CRS</Type>\n                <Name>920202 Range: Too many fields for pdf request (6 or more)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920210</Id>\n                <Type>CRS</Type>\n                <Name>920210 Multiple/Conflicting Connection Header Data Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920220</Id>\n                <Type>CRS</Type>\n                <Name>920220 URL Encoding Abuse Attack Attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920230</Id>\n                <Type>CRS</Type>\n                <Name>920230 Multiple URL Encoding Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920240</Id>\n                <Type>CRS</Type>\n                <Name>920240 URL Encoding Abuse Attack Attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920250</Id>\n                <Type>CRS</Type>\n                <Name>920250 UTF8 Encoding Abuse Attack Attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920260</Id>\n                <Type>CRS</Type>\n                <Name>920260 Unicode Full/Half Width Abuse Attack Attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920270</Id>\n                <Type>CRS</Type>\n                <Name>920270 Invalid character in request (null character)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920271</Id>\n                <Type>CRS</Type>\n                <Name>920271 Invalid character in request (non printable characters)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920272</Id>\n                <Type>CRS</Type>\n                <Name>920272 Invalid character in request (outside of printable chars below ascii 127)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920273</Id>\n                <Type>CRS</Type>\n                <Name>920273 Invalid character in request (outside of very strict set)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920274</Id>\n                <Type>CRS</Type>\n                <Name>920274 Invalid character in request headers (outside of very strict set)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920275</Id>\n                <Type>CRS</Type>\n                <Name>920275 Invalid character in request headers (outside of very strict set)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920280</Id>\n                <Type>CRS</Type>\n                <Name>920280 Request Missing a Host Header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920290</Id>\n                <Type>CRS</Type>\n                <Name>920290 Empty Host Header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920300</Id>\n                <Type>CRS</Type>\n                <Name>920300 Request Missing an Accept Header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920310</Id>\n                <Type>CRS</Type>\n                <Name>920310 Request Has an Empty Accept Header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920311</Id>\n                <Type>CRS</Type>\n                <Name>920311 Request Has an Empty Accept Header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920320</Id>\n                <Type>CRS</Type>\n                <Name>920320 Missing User Agent Header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920330</Id>\n                <Type>CRS</Type>\n                <Name>920330 Empty User Agent Header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920340</Id>\n                <Type>CRS</Type>\n                <Name>920340 Request Containing Content</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920341</Id>\n                <Type>CRS</Type>\n                <Name>920341 Request Containing Content Requires Content-Type header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920350</Id>\n                <Type>CRS</Type>\n                <Name>920350 Host header is a numeric IP address</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920360</Id>\n                <Type>CRS</Type>\n                <Name>920360 Argument name too long</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920370</Id>\n                <Type>CRS</Type>\n                <Name>920370 Argument value too long</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920380</Id>\n                <Type>CRS</Type>\n                <Name>920380 Too many arguments in request</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920390</Id>\n                <Type>CRS</Type>\n                <Name>920390 Total arguments size exceeded</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920400</Id>\n                <Type>CRS</Type>\n                <Name>920400 Uploaded file size too large</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920410</Id>\n                <Type>CRS</Type>\n                <Name>920410 Total uploaded files size too large</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920420</Id>\n                <Type>CRS</Type>\n                <Name>920420 Request content type is not allowed by policy</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920430</Id>\n                <Type>CRS</Type>\n                <Name>920430 HTTP protocol version is not allowed by policy</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920440</Id>\n                <Type>CRS</Type>\n                <Name>920440 URL file extension is restricted by policy</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920450</Id>\n                <Type>CRS</Type>\n                <Name>920450 HTTP header is restricted by policy (%{MATCHED_VAR})</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920460</Id>\n                <Type>CRS</Type>\n                <Name>920460 Abnormal character escapes in request</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920470</Id>\n                <Type>CRS</Type>\n                <Name>920470 Illegal Content-Type header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920480</Id>\n                <Type>CRS</Type>\n                <Name>920480 Request content type charset is not allowed by policy</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920490</Id>\n                <Type>CRS</Type>\n                <Name>920490 Request header x-up-devcap-post-charset detected in combination with prefix </Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920500</Id>\n                <Type>CRS</Type>\n                <Name>920500 Attempt to access a backup or working file</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920510</Id>\n                <Type>CRS</Type>\n                <Name>920510 Invalid Cache-Control request header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920530</Id>\n                <Type>CRS</Type>\n                <Name>920530 Multiple charsets detected in content type header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920600</Id>\n                <Type>CRS</Type>\n                <Name>920600 Illegal Accept header: charset parameter</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921110</Id>\n                <Type>CRS</Type>\n                <Name>921110 HTTP Request Smuggling Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921120</Id>\n                <Type>CRS</Type>\n                <Name>921120 HTTP Response Splitting Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921130</Id>\n                <Type>CRS</Type>\n                <Name>921130 HTTP Response Splitting Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921140</Id>\n                <Type>CRS</Type>\n                <Name>921140 HTTP Header Injection Attack via headers</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921150</Id>\n                <Type>CRS</Type>\n                <Name>921150 HTTP Header Injection Attack via payload (CR/LF detected)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921151</Id>\n                <Type>CRS</Type>\n                <Name>921151 HTTP Header Injection Attack via payload (CR/LF detected)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921160</Id>\n                <Type>CRS</Type>\n                <Name>921160 HTTP Header Injection Attack via payload (CR/LF and header-name detected)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921180</Id>\n                <Type>CRS</Type>\n                <Name>921180 HTTP Parameter Pollution (%{TX.1})</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921190</Id>\n                <Type>CRS</Type>\n                <Name>921190 HTTP Splitting (CR/LF in request filename detected)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921200</Id>\n                <Type>CRS</Type>\n                <Name>921200 LDAP Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921230</Id>\n                <Type>CRS</Type>\n                <Name>921230 HTTP Range Header detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921421</Id>\n                <Type>CRS</Type>\n                <Name>921421 Content-Type header: Dangerous content type outside the mime type declaration</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921422</Id>\n                <Type>CRS</Type>\n                <Name>921422 Content-Type header: Dangerous content type outside the mime type declaration</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>922100</Id>\n                <Type>CRS</Type>\n                <Name>922100 Multipart content type global _charset_ definition is not allowed by policy</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>922110</Id>\n                <Type>CRS</Type>\n                <Name>922110 Illegal MIME Multipart Header content-type: charset parameter</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>922120</Id>\n                <Type>CRS</Type>\n                <Name>922120 Content-Transfer-Encoding was deprecated by rfc7578 in 2015 and should not be used</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930100</Id>\n                <Type>CRS</Type>\n                <Name>930100 Path Traversal Attack (/../)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930110</Id>\n                <Type>CRS</Type>\n                <Name>930110 Path Traversal Attack (/../)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930120</Id>\n                <Type>CRS</Type>\n                <Name>930120 OS File Access Attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930130</Id>\n                <Type>CRS</Type>\n                <Name>930130 Restricted File Access Attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931100</Id>\n                <Type>CRS</Type>\n                <Name>931100 Possible Remote File Inclusion (RFI) Attack: URL Parameter using IP Address</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931110</Id>\n                <Type>CRS</Type>\n                <Name>931110 Possible Remote File Inclusion (RFI) Attack: Common RFI Vulnerable Parameter Name used w/URL Payloa</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931120</Id>\n                <Type>CRS</Type>\n                <Name>931120 Possible Remote File Inclusion (RFI) Attack: URL Payload Used w/Trailing Question Mark Character (?</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931130</Id>\n                <Type>CRS</Type>\n                <Name>931130 Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932100</Id>\n                <Type>CRS</Type>\n                <Name>932100 Remote Command Execution: Unix Command Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932105</Id>\n                <Type>CRS</Type>\n                <Name>932105 Remote Command Execution: Unix Command Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932106</Id>\n                <Type>CRS</Type>\n                <Name>932106 Remote Command Execution: Unix Command Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932110</Id>\n                <Type>CRS</Type>\n                <Name>932110 Remote Command Execution: Windows Command Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932115</Id>\n                <Type>CRS</Type>\n                <Name>932115 Remote Command Execution: Windows Command Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932120</Id>\n                <Type>CRS</Type>\n                <Name>932120 Remote Command Execution: Windows PowerShell Command Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932130</Id>\n                <Type>CRS</Type>\n                <Name>932130 Remote Command Execution: Unix Shell Expression Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932140</Id>\n                <Type>CRS</Type>\n                <Name>932140 Remote Command Execution: Windows FOR/IF Command Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932150</Id>\n                <Type>CRS</Type>\n                <Name>932150 Remote Command Execution: Direct Unix Command Execution</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932160</Id>\n                <Type>CRS</Type>\n                <Name>932160 Remote Command Execution: Unix Shell Code Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932170</Id>\n                <Type>CRS</Type>\n                <Name>932170 Remote Command Execution: Shellshock (CVE-2014-6271)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932171</Id>\n                <Type>CRS</Type>\n                <Name>932171 Remote Command Execution: Shellshock (CVE-2014-6271)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932180</Id>\n                <Type>CRS</Type>\n                <Name>932180 Restricted File Upload Attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932190</Id>\n                <Type>CRS</Type>\n                <Name>932190 Remote Command Execution: Wildcard bypass technique attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932200</Id>\n                <Type>CRS</Type>\n                <Name>932200 RCE Bypass Technique</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933100</Id>\n                <Type>CRS</Type>\n                <Name>933100 PHP Injection Attack: PHP Open Tag Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933110</Id>\n                <Type>CRS</Type>\n                <Name>933110 PHP Injection Attack: PHP Script File Upload Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933111</Id>\n                <Type>CRS</Type>\n                <Name>933111 PHP Injection Attack: PHP Script File Upload Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933120</Id>\n                <Type>CRS</Type>\n                <Name>933120 PHP Injection Attack: Configuration Directive Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933130</Id>\n                <Type>CRS</Type>\n                <Name>933130 PHP Injection Attack: Variables Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933131</Id>\n                <Type>CRS</Type>\n                <Name>933131 PHP Injection Attack: Variables Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933140</Id>\n                <Type>CRS</Type>\n                <Name>933140 PHP Injection Attack: I/O Stream Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933150</Id>\n                <Type>CRS</Type>\n                <Name>933150 PHP Injection Attack: High-Risk PHP Function Name Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933151</Id>\n                <Type>CRS</Type>\n                <Name>933151 PHP Injection Attack: Medium-Risk PHP Function Name Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933160</Id>\n                <Type>CRS</Type>\n                <Name>933160 PHP Injection Attack: High-Risk PHP Function Call Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933161</Id>\n                <Type>CRS</Type>\n                <Name>933161 PHP Injection Attack: Low-Value PHP Function Call Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933170</Id>\n                <Type>CRS</Type>\n                <Name>933170 PHP Injection Attack: Serialized Object Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933180</Id>\n                <Type>CRS</Type>\n                <Name>933180 PHP Injection Attack: Variable Function Call Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933190</Id>\n                <Type>CRS</Type>\n                <Name>933190 PHP Injection Attack: PHP Closing Tag Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933200</Id>\n                <Type>CRS</Type>\n                <Name>933200 PHP Injection Attack: Wrapper scheme detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933210</Id>\n                <Type>CRS</Type>\n                <Name>933210 PHP Injection Attack: Variable Function Call Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>934100</Id>\n                <Type>CRS</Type>\n                <Name>934100 Node.js Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941100</Id>\n                <Type>CRS</Type>\n                <Name>941100 XSS Attack Detected via libinjection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941101</Id>\n                <Type>CRS</Type>\n                <Name>941101 XSS Attack Detected via libinjection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941110</Id>\n                <Type>CRS</Type>\n                <Name>941110 XSS Filter - Category 1: Script Tag Vector</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941120</Id>\n                <Type>CRS</Type>\n                <Name>941120 XSS Filter - Category 2: Event Handler Vector</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941130</Id>\n                <Type>CRS</Type>\n                <Name>941130 XSS Filter - Category 3: Attribute Vector</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941140</Id>\n                <Type>CRS</Type>\n                <Name>941140 XSS Filter - Category 4: Javascript URI Vector</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941150</Id>\n                <Type>CRS</Type>\n                <Name>941150 XSS Filter - Category 5: Disallowed HTML Attributes</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941160</Id>\n                <Type>CRS</Type>\n                <Name>941160 NoScript XSS InjectionChecker: HTML Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941170</Id>\n                <Type>CRS</Type>\n                <Name>941170 NoScript XSS InjectionChecker: Attribute Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941180</Id>\n                <Type>CRS</Type>\n                <Name>941180 Node-Validator Blacklist Keywords</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941190</Id>\n                <Type>CRS</Type>\n                <Name>941190 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941200</Id>\n                <Type>CRS</Type>\n                <Name>941200 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941210</Id>\n                <Type>CRS</Type>\n                <Name>941210 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941220</Id>\n                <Type>CRS</Type>\n                <Name>941220 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941230</Id>\n                <Type>CRS</Type>\n                <Name>941230 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941240</Id>\n                <Type>CRS</Type>\n                <Name>941240 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941250</Id>\n                <Type>CRS</Type>\n                <Name>941250 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941260</Id>\n                <Type>CRS</Type>\n                <Name>941260 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941270</Id>\n                <Type>CRS</Type>\n                <Name>941270 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941280</Id>\n                <Type>CRS</Type>\n                <Name>941280 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941290</Id>\n                <Type>CRS</Type>\n                <Name>941290 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941300</Id>\n                <Type>CRS</Type>\n                <Name>941300 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941310</Id>\n                <Type>CRS</Type>\n                <Name>941310 US-ASCII Malformed Encoding XSS Filter - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941320</Id>\n                <Type>CRS</Type>\n                <Name>941320 Possible XSS Attack Detected - HTML Tag Handler</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941330</Id>\n                <Type>CRS</Type>\n                <Name>941330 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941340</Id>\n                <Type>CRS</Type>\n                <Name>941340 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941350</Id>\n                <Type>CRS</Type>\n                <Name>941350 UTF-7 Encoding IE XSS - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941360</Id>\n                <Type>CRS</Type>\n                <Name>941360 JSFuck / Hieroglyphy obfuscation detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941370</Id>\n                <Type>CRS</Type>\n                <Name>941370 JavaScript global variable found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941380</Id>\n                <Type>CRS</Type>\n                <Name>941380 AngularJS client side template injection detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942100</Id>\n                <Type>CRS</Type>\n                <Name>942100 SQL Injection Attack Detected via libinjection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942101</Id>\n                <Type>CRS</Type>\n                <Name>942101 SQL Injection Attack Detected via libinjection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942110</Id>\n                <Type>CRS</Type>\n                <Name>942110 SQL Injection Attack: Common Injection Testing Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942120</Id>\n                <Type>CRS</Type>\n                <Name>942120 SQL Injection Attack: SQL Operator Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942130</Id>\n                <Type>CRS</Type>\n                <Name>942130 SQL Injection Attack: SQL Tautology Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942140</Id>\n                <Type>CRS</Type>\n                <Name>942140 SQL Injection Attack: Common DB Names Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942150</Id>\n                <Type>CRS</Type>\n                <Name>942150 SQL Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942160</Id>\n                <Type>CRS</Type>\n                <Name>942160 Detects blind sqli tests using sleep() or benchmark()</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942170</Id>\n                <Type>CRS</Type>\n                <Name>942170 Detects SQL benchmark and sleep injection attempts including conditional queries</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942180</Id>\n                <Type>CRS</Type>\n                <Name>942180 Detects basic SQL authentication bypass attempts 1/3</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942190</Id>\n                <Type>CRS</Type>\n                <Name>942190 Detects MSSQL code execution and information gathering attempts</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942200</Id>\n                <Type>CRS</Type>\n                <Name>942200 Detects MySQL comment-/space-obfuscated injections and backtick termination</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942210</Id>\n                <Type>CRS</Type>\n                <Name>942210 Detects chained SQL injection attempts 1/2</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942220</Id>\n                <Type>CRS</Type>\n                <Name>942220 Looking for integer overflow attacks</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942230</Id>\n                <Type>CRS</Type>\n                <Name>942230 Detects conditional SQL injection attempts</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942240</Id>\n                <Type>CRS</Type>\n                <Name>942240 Detects MySQL charset switch and MSSQL DoS attempts</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942250</Id>\n                <Type>CRS</Type>\n                <Name>942250 Detects MATCH AGAINST</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942251</Id>\n                <Type>CRS</Type>\n                <Name>942251 Detects HAVING injections</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942260</Id>\n                <Type>CRS</Type>\n                <Name>942260 Detects basic SQL authentication bypass attempts 2/3</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942270</Id>\n                <Type>CRS</Type>\n                <Name>942270 Looking for basic sql injection. Common attack string for mysql</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942280</Id>\n                <Type>CRS</Type>\n                <Name>942280 Detects Postgres pg_sleep injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942290</Id>\n                <Type>CRS</Type>\n                <Name>942290 Finds basic MongoDB SQL injection attempts</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942300</Id>\n                <Type>CRS</Type>\n                <Name>942300 Detects MySQL comments</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942310</Id>\n                <Type>CRS</Type>\n                <Name>942310 Detects chained SQL injection attempts 2/2</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942320</Id>\n                <Type>CRS</Type>\n                <Name>942320 Detects MySQL and PostgreSQL stored procedure/function injections</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942330</Id>\n                <Type>CRS</Type>\n                <Name>942330 Detects classic SQL injection probings 1/3</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942340</Id>\n                <Type>CRS</Type>\n                <Name>942340 Detects basic SQL authentication bypass attempts 3/3</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942350</Id>\n                <Type>CRS</Type>\n                <Name>942350 Detects MySQL UDF injection and other data/structure manipulation attempts</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942360</Id>\n                <Type>CRS</Type>\n                <Name>942360 Detects concatenated basic SQL injection and SQLLFI attempts</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942361</Id>\n                <Type>CRS</Type>\n                <Name>942361 Detects basic SQL injection based on keyword alter or union</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942370</Id>\n                <Type>CRS</Type>\n                <Name>942370 Detects classic SQL injection probings 2/3</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942380</Id>\n                <Type>CRS</Type>\n                <Name>942380 SQL Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942390</Id>\n                <Type>CRS</Type>\n                <Name>942390 SQL Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942400</Id>\n                <Type>CRS</Type>\n                <Name>942400 SQL Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942410</Id>\n                <Type>CRS</Type>\n                <Name>942410 SQL Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942420</Id>\n                <Type>CRS</Type>\n                <Name>942420 Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942421</Id>\n                <Type>CRS</Type>\n                <Name>942421 Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942430</Id>\n                <Type>CRS</Type>\n                <Name>942430 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942431</Id>\n                <Type>CRS</Type>\n                <Name>942431 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942432</Id>\n                <Type>CRS</Type>\n                <Name>942432 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942440</Id>\n                <Type>CRS</Type>\n                <Name>942440 SQL Comment Sequence Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942450</Id>\n                <Type>CRS</Type>\n                <Name>942450 SQL Hex Encoding Identified</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942460</Id>\n                <Type>CRS</Type>\n                <Name>942460 Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942470</Id>\n                <Type>CRS</Type>\n                <Name>942470 SQL Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942480</Id>\n                <Type>CRS</Type>\n                <Name>942480 SQL Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942490</Id>\n                <Type>CRS</Type>\n                <Name>942490 Detects classic SQL injection probings 3/3</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942500</Id>\n                <Type>CRS</Type>\n                <Name>942500 MySQL in-line comment detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942510</Id>\n                <Type>CRS</Type>\n                <Name>942510 SQLi bypass attempt by ticks or backticks detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942511</Id>\n                <Type>CRS</Type>\n                <Name>942511 SQLi bypass attempt by ticks detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>943100</Id>\n                <Type>CRS</Type>\n                <Name>943100 Possible Session Fixation Attack: Setting Cookie Values in HTML</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>943110</Id>\n                <Type>CRS</Type>\n                <Name>943110 Possible Session Fixation Attack: SessionID Parameter Name with Off-Domain Referer</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>943120</Id>\n                <Type>CRS</Type>\n                <Name>943120 Possible Session Fixation Attack: SessionID Parameter Name with No Referer</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944100</Id>\n                <Type>CRS</Type>\n                <Name>944100 Remote Command Execution: Suspicious Java class detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944110</Id>\n                <Type>CRS</Type>\n                <Name>944110 Remote Command Execution: Java process spawn (CVE-2017-9805)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944120</Id>\n                <Type>CRS</Type>\n                <Name>944120 Remote Command Execution: Java serialization (CVE-2015-4852)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944130</Id>\n                <Type>CRS</Type>\n                <Name>944130 Suspicious Java class detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944200</Id>\n                <Type>CRS</Type>\n                <Name>944200 Magic bytes Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944210</Id>\n                <Type>CRS</Type>\n                <Name>944210 Magic bytes Detected Base64 Encoded</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944240</Id>\n                <Type>CRS</Type>\n                <Name>944240 Remote Command Execution: Java serialization (CVE-2015-4852)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944250</Id>\n                <Type>CRS</Type>\n                <Name>944250 Remote Command Execution: Suspicious Java method detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944300</Id>\n                <Type>CRS</Type>\n                <Name>944300 Base64 encoded string matched suspicious keyword</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>950100</Id>\n                <Type>CRS</Type>\n                <Name>950100 The Application Returned a 500-Level Status Code</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>950130</Id>\n                <Type>CRS</Type>\n                <Name>950130 Directory Listing</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>950140</Id>\n                <Type>CRS</Type>\n                <Name>950140 CGI source code leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951110</Id>\n                <Type>CRS</Type>\n                <Name>951110 Microsoft Access SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951120</Id>\n                <Type>CRS</Type>\n                <Name>951120 Oracle SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951130</Id>\n                <Type>CRS</Type>\n                <Name>951130 DB2 SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951140</Id>\n                <Type>CRS</Type>\n                <Name>951140 EMC SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951150</Id>\n                <Type>CRS</Type>\n                <Name>951150 firebird SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951160</Id>\n                <Type>CRS</Type>\n                <Name>951160 Frontbase SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951170</Id>\n                <Type>CRS</Type>\n                <Name>951170 hsqldb SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951180</Id>\n                <Type>CRS</Type>\n                <Name>951180 informix SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951190</Id>\n                <Type>CRS</Type>\n                <Name>951190 ingres SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951200</Id>\n                <Type>CRS</Type>\n                <Name>951200 interbase SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951210</Id>\n                <Type>CRS</Type>\n                <Name>951210 maxDB SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951220</Id>\n                <Type>CRS</Type>\n                <Name>951220 mssql SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951230</Id>\n                <Type>CRS</Type>\n                <Name>951230 mysql SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951240</Id>\n                <Type>CRS</Type>\n                <Name>951240 postgres SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951250</Id>\n                <Type>CRS</Type>\n                <Name>951250 sqlite SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951260</Id>\n                <Type>CRS</Type>\n                <Name>951260 Sybase SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>952100</Id>\n                <Type>CRS</Type>\n                <Name>952100 Java Source Code Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>952110</Id>\n                <Type>CRS</Type>\n                <Name>952110 Java Errors</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>953100</Id>\n                <Type>CRS</Type>\n                <Name>953100 PHP Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>953110</Id>\n                <Type>CRS</Type>\n                <Name>953110 PHP source code leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>953120</Id>\n                <Type>CRS</Type>\n                <Name>953120 PHP source code leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954100</Id>\n                <Type>CRS</Type>\n                <Name>954100 Disclosure of IIS install location</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954110</Id>\n                <Type>CRS</Type>\n                <Name>954110 Application Availability Error</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954120</Id>\n                <Type>CRS</Type>\n                <Name>954120 IIS Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954130</Id>\n                <Type>CRS</Type>\n                <Name>954130 IIS Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980100</Id>\n                <Type>CRS</Type>\n                <Name>980100 Correlated Successful Attack Identified: (Total Score: %{tx.anomaly_score}) Inbound Attack (Inbound</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980110</Id>\n                <Type>CRS</Type>\n                <Name>980110 Correlated Attack Attempt Identified: (Total Score: %{tx.anomaly_score}) Inbound Attack (Inbound An</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980120</Id>\n                <Type>CRS</Type>\n                <Name>980120 Inbound Anomaly Score (Total Inbound Score: %{TX.INBOUND_ANOMALY_SCORE} - SQLI=%{tx.sql_injection_s</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980130</Id>\n                <Type>CRS</Type>\n                <Name>980130 Inbound Anomaly Score Exceeded (Total Inbound Score: %{TX.INBOUND_ANOMALY_SCORE} - SQLI=%{tx.sql_in</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980140</Id>\n                <Type>CRS</Type>\n                <Name>980140 Outbound Anomaly Score Exceeded (score %{TX.OUTBOUND_ANOMALY_SCORE}): individual paranoia level sco</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980150</Id>\n                <Type>CRS</Type>\n                <Name>980150 Outbound Anomaly Score (Total Outbound Score: %{TX.OUTBOUND_ANOMALY_SCORE}): individual paranoia le</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>known</Id>\n                <Type>custom</Type>\n                <Name>known</Name>\n                <Enabled>no</Enabled>\n                <Runfirst>no</Runfirst>\n            </Rule>\n            <Rule>\n                <Id>nextcloud</Id>\n                <Type>workload</Type>\n                <Name>nextcloud</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>dokuwiki</Id>\n                <Type>workload</Type>\n                <Name>dokuwiki</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>cpanel</Id>\n                <Type>workload</Type>\n                <Name>cpanel</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>wordpress</Id>\n                <Type>workload</Type>\n                <Name>wordpress</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>xenforo</Id>\n                <Type>workload</Type>\n                <Name>xenforo</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>drupal</Id>\n                <Type>workload</Type>\n                <Name>drupal</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"ed27abee-6c89-404b-89ab-4274eb6d6fdc"},{"name":"Filter the List of Rules","id":"1ed1db14-ebfd-45a6-8953-e7f27edde42f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/owasprules?vs=2&enable=yes&filter=sql","description":"<p>To filter the list of rules, run the <strong>owasprules</strong> command, specifying the VS index and filter term.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","owasprules"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"2"},{"key":"enable","value":"yes"},{"key":"filter","value":"sql"}],"variable":[]}},"response":[{"id":"b97ca67c-9471-4cd3-9ac7-3bc11cd7e1fb","name":"Filter the List of Rules","originalRequest":{"method":"POST","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/owasprules?vs=2&enable=yes&filter=sql","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","owasprules"],"query":[{"key":"vs","value":"2"},{"key":"enable","value":"yes"},{"key":"filter","value":"sql"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 10:00:56 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Rule>\n                <Id>942100</Id>\n                <Type>CRS</Type>\n                <Name>942100 SQL Injection Attack Detected via libinjection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942101</Id>\n                <Type>CRS</Type>\n                <Name>942101 SQL Injection Attack Detected via libinjection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942110</Id>\n                <Type>CRS</Type>\n                <Name>942110 SQL Injection Attack: Common Injection Testing Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942120</Id>\n                <Type>CRS</Type>\n                <Name>942120 SQL Injection Attack: SQL Operator Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942130</Id>\n                <Type>CRS</Type>\n                <Name>942130 SQL Injection Attack: SQL Tautology Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942140</Id>\n                <Type>CRS</Type>\n                <Name>942140 SQL Injection Attack: Common DB Names Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942150</Id>\n                <Type>CRS</Type>\n                <Name>942150 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942160</Id>\n                <Type>CRS</Type>\n                <Name>942160 Detects blind sqli tests using sleep() or benchmark()</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942170</Id>\n                <Type>CRS</Type>\n                <Name>942170 Detects SQL benchmark and sleep injection attempts including conditional queries</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942180</Id>\n                <Type>CRS</Type>\n                <Name>942180 Detects basic SQL authentication bypass attempts 1/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942190</Id>\n                <Type>CRS</Type>\n                <Name>942190 Detects MSSQL code execution and information gathering attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942200</Id>\n                <Type>CRS</Type>\n                <Name>942200 Detects MySQL comment-/space-obfuscated injections and backtick termination</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942210</Id>\n                <Type>CRS</Type>\n                <Name>942210 Detects chained SQL injection attempts 1/2</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942230</Id>\n                <Type>CRS</Type>\n                <Name>942230 Detects conditional SQL injection attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942240</Id>\n                <Type>CRS</Type>\n                <Name>942240 Detects MySQL charset switch and MSSQL DoS attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942260</Id>\n                <Type>CRS</Type>\n                <Name>942260 Detects basic SQL authentication bypass attempts 2/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942270</Id>\n                <Type>CRS</Type>\n                <Name>942270 Looking for basic sql injection. Common attack string for mysql</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942290</Id>\n                <Type>CRS</Type>\n                <Name>942290 Finds basic MongoDB SQL injection attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942300</Id>\n                <Type>CRS</Type>\n                <Name>942300 Detects MySQL comments</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942310</Id>\n                <Type>CRS</Type>\n                <Name>942310 Detects chained SQL injection attempts 2/2</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942320</Id>\n                <Type>CRS</Type>\n                <Name>942320 Detects MySQL and PostgreSQL stored procedure/function injections</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942330</Id>\n                <Type>CRS</Type>\n                <Name>942330 Detects classic SQL injection probings 1/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942340</Id>\n                <Type>CRS</Type>\n                <Name>942340 Detects basic SQL authentication bypass attempts 3/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942350</Id>\n                <Type>CRS</Type>\n                <Name>942350 Detects MySQL UDF injection and other data/structure manipulation attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942360</Id>\n                <Type>CRS</Type>\n                <Name>942360 Detects concatenated basic SQL injection and SQLLFI attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942361</Id>\n                <Type>CRS</Type>\n                <Name>942361 Detects basic SQL injection based on keyword alter or union</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942370</Id>\n                <Type>CRS</Type>\n                <Name>942370 Detects classic SQL injection probings 2/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942380</Id>\n                <Type>CRS</Type>\n                <Name>942380 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942390</Id>\n                <Type>CRS</Type>\n                <Name>942390 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942400</Id>\n                <Type>CRS</Type>\n                <Name>942400 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942410</Id>\n                <Type>CRS</Type>\n                <Name>942410 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942420</Id>\n                <Type>CRS</Type>\n                <Name>942420 Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942421</Id>\n                <Type>CRS</Type>\n                <Name>942421 Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942430</Id>\n                <Type>CRS</Type>\n                <Name>942430 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942431</Id>\n                <Type>CRS</Type>\n                <Name>942431 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942432</Id>\n                <Type>CRS</Type>\n                <Name>942432 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942440</Id>\n                <Type>CRS</Type>\n                <Name>942440 SQL Comment Sequence Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942450</Id>\n                <Type>CRS</Type>\n                <Name>942450 SQL Hex Encoding Identified</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942470</Id>\n                <Type>CRS</Type>\n                <Name>942470 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942480</Id>\n                <Type>CRS</Type>\n                <Name>942480 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942490</Id>\n                <Type>CRS</Type>\n                <Name>942490 Detects classic SQL injection probings 3/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942500</Id>\n                <Type>CRS</Type>\n                <Name>942500 MySQL in-line comment detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942510</Id>\n                <Type>CRS</Type>\n                <Name>942510 SQLi bypass attempt by ticks or backticks detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942511</Id>\n                <Type>CRS</Type>\n                <Name>942511 SQLi bypass attempt by ticks detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951110</Id>\n                <Type>CRS</Type>\n                <Name>951110 Microsoft Access SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951120</Id>\n                <Type>CRS</Type>\n                <Name>951120 Oracle SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951130</Id>\n                <Type>CRS</Type>\n                <Name>951130 DB2 SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951140</Id>\n                <Type>CRS</Type>\n                <Name>951140 EMC SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951150</Id>\n                <Type>CRS</Type>\n                <Name>951150 firebird SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951160</Id>\n                <Type>CRS</Type>\n                <Name>951160 Frontbase SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951170</Id>\n                <Type>CRS</Type>\n                <Name>951170 hsqldb SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951180</Id>\n                <Type>CRS</Type>\n                <Name>951180 informix SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951190</Id>\n                <Type>CRS</Type>\n                <Name>951190 ingres SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951200</Id>\n                <Type>CRS</Type>\n                <Name>951200 interbase SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951210</Id>\n                <Type>CRS</Type>\n                <Name>951210 maxDB SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951220</Id>\n                <Type>CRS</Type>\n                <Name>951220 mssql SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951230</Id>\n                <Type>CRS</Type>\n                <Name>951230 mysql SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951240</Id>\n                <Type>CRS</Type>\n                <Name>951240 postgres SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951250</Id>\n                <Type>CRS</Type>\n                <Name>951250 sqlite SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951260</Id>\n                <Type>CRS</Type>\n                <Name>951260 Sybase SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980120</Id>\n                <Type>CRS</Type>\n                <Name>980120 Inbound Anomaly Score (Total Inbound Score: %{TX.INBOUND_ANOMALY_SCORE} - SQLI=%{tx.sql_injection_s</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980130</Id>\n                <Type>CRS</Type>\n                <Name>980130 Inbound Anomaly Score Exceeded (Total Inbound Score: %{TX.INBOUND_ANOMALY_SCORE} - SQLI=%{tx.sql_in</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"1ed1db14-ebfd-45a6-8953-e7f27edde42f"},{"name":"Enable/Disable Rules for a Virtual Service","id":"92a4e02f-c288-4cf5-b74e-b2416a7d1258","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/owasprules?vs=2&enable=no","description":"<p>To enable/disable all rules for a Virtual Service, run the <strong>owasprules</strong> command, specify the Virtual Service ID, and set the <strong>enable</strong> parameter.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","owasprules"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"2"},{"key":"enable","value":"no"}],"variable":[]}},"response":[{"id":"c5349ffd-bba0-4bc0-a0e4-db4f93e05883","name":"Enable Rules for a Virtual Service","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/owasprules?vs=2&enable=yes","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","owasprules"],"query":[{"key":"vs","value":"2"},{"key":"enable","value":"yes"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 10:02:02 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Rule>\n                <Id>911100</Id>\n                <Type>CRS</Type>\n                <Name>911100 Method is not allowed by policy</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913100</Id>\n                <Type>CRS</Type>\n                <Name>913100 Found User-Agent associated with security scanner</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913101</Id>\n                <Type>CRS</Type>\n                <Name>913101 Found User-Agent associated with scripting/generic HTTP client</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913102</Id>\n                <Type>CRS</Type>\n                <Name>913102 Found User-Agent associated with web crawler/bot</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913110</Id>\n                <Type>CRS</Type>\n                <Name>913110 Found request header associated with security scanner</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913120</Id>\n                <Type>CRS</Type>\n                <Name>913120 Found request filename/argument associated with security scanner</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920100</Id>\n                <Type>CRS</Type>\n                <Name>920100 Invalid HTTP Request Line</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920120</Id>\n                <Type>CRS</Type>\n                <Name>920120 Attempted multipart/form-data bypass</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920121</Id>\n                <Type>CRS</Type>\n                <Name>920121 Attempted multipart/form-data bypass</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920160</Id>\n                <Type>CRS</Type>\n                <Name>920160 Content-Length HTTP header is not numeric</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920170</Id>\n                <Type>CRS</Type>\n                <Name>920170 GET or HEAD Request with Body Content</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920171</Id>\n                <Type>CRS</Type>\n                <Name>920171 GET or HEAD Request with Transfer-Encoding</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920180</Id>\n                <Type>CRS</Type>\n                <Name>920180 POST without Content-Length or Transfer-Encoding headers</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920181</Id>\n                <Type>CRS</Type>\n                <Name>920181 Content-Length and Transfer-Encoding headers present.</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920190</Id>\n                <Type>CRS</Type>\n                <Name>920190 Range: Invalid Last Byte Value</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920200</Id>\n                <Type>CRS</Type>\n                <Name>920200 Range: Too many fields (6 or more)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920201</Id>\n                <Type>CRS</Type>\n                <Name>920201 Range: Too many fields for pdf request (63 or more)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920202</Id>\n                <Type>CRS</Type>\n                <Name>920202 Range: Too many fields for pdf request (6 or more)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920210</Id>\n                <Type>CRS</Type>\n                <Name>920210 Multiple/Conflicting Connection Header Data Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920220</Id>\n                <Type>CRS</Type>\n                <Name>920220 URL Encoding Abuse Attack Attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920230</Id>\n                <Type>CRS</Type>\n                <Name>920230 Multiple URL Encoding Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920240</Id>\n                <Type>CRS</Type>\n                <Name>920240 URL Encoding Abuse Attack Attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920250</Id>\n                <Type>CRS</Type>\n                <Name>920250 UTF8 Encoding Abuse Attack Attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920260</Id>\n                <Type>CRS</Type>\n                <Name>920260 Unicode Full/Half Width Abuse Attack Attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920270</Id>\n                <Type>CRS</Type>\n                <Name>920270 Invalid character in request (null character)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920271</Id>\n                <Type>CRS</Type>\n                <Name>920271 Invalid character in request (non printable characters)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920272</Id>\n                <Type>CRS</Type>\n                <Name>920272 Invalid character in request (outside of printable chars below ascii 127)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920273</Id>\n                <Type>CRS</Type>\n                <Name>920273 Invalid character in request (outside of very strict set)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920274</Id>\n                <Type>CRS</Type>\n                <Name>920274 Invalid character in request headers (outside of very strict set)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920275</Id>\n                <Type>CRS</Type>\n                <Name>920275 Invalid character in request headers (outside of very strict set)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920280</Id>\n                <Type>CRS</Type>\n                <Name>920280 Request Missing a Host Header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920290</Id>\n                <Type>CRS</Type>\n                <Name>920290 Empty Host Header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920300</Id>\n                <Type>CRS</Type>\n                <Name>920300 Request Missing an Accept Header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920310</Id>\n                <Type>CRS</Type>\n                <Name>920310 Request Has an Empty Accept Header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920311</Id>\n                <Type>CRS</Type>\n                <Name>920311 Request Has an Empty Accept Header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920320</Id>\n                <Type>CRS</Type>\n                <Name>920320 Missing User Agent Header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920330</Id>\n                <Type>CRS</Type>\n                <Name>920330 Empty User Agent Header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920340</Id>\n                <Type>CRS</Type>\n                <Name>920340 Request Containing Content</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920341</Id>\n                <Type>CRS</Type>\n                <Name>920341 Request Containing Content Requires Content-Type header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920350</Id>\n                <Type>CRS</Type>\n                <Name>920350 Host header is a numeric IP address</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920360</Id>\n                <Type>CRS</Type>\n                <Name>920360 Argument name too long</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920370</Id>\n                <Type>CRS</Type>\n                <Name>920370 Argument value too long</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920380</Id>\n                <Type>CRS</Type>\n                <Name>920380 Too many arguments in request</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920390</Id>\n                <Type>CRS</Type>\n                <Name>920390 Total arguments size exceeded</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920400</Id>\n                <Type>CRS</Type>\n                <Name>920400 Uploaded file size too large</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920410</Id>\n                <Type>CRS</Type>\n                <Name>920410 Total uploaded files size too large</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920420</Id>\n                <Type>CRS</Type>\n                <Name>920420 Request content type is not allowed by policy</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920430</Id>\n                <Type>CRS</Type>\n                <Name>920430 HTTP protocol version is not allowed by policy</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920440</Id>\n                <Type>CRS</Type>\n                <Name>920440 URL file extension is restricted by policy</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920450</Id>\n                <Type>CRS</Type>\n                <Name>920450 HTTP header is restricted by policy (%{MATCHED_VAR})</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920460</Id>\n                <Type>CRS</Type>\n                <Name>920460 Abnormal character escapes in request</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920470</Id>\n                <Type>CRS</Type>\n                <Name>920470 Illegal Content-Type header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920480</Id>\n                <Type>CRS</Type>\n                <Name>920480 Request content type charset is not allowed by policy</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920490</Id>\n                <Type>CRS</Type>\n                <Name>920490 Request header x-up-devcap-post-charset detected in combination with prefix </Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920500</Id>\n                <Type>CRS</Type>\n                <Name>920500 Attempt to access a backup or working file</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920510</Id>\n                <Type>CRS</Type>\n                <Name>920510 Invalid Cache-Control request header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920530</Id>\n                <Type>CRS</Type>\n                <Name>920530 Multiple charsets detected in content type header</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920600</Id>\n                <Type>CRS</Type>\n                <Name>920600 Illegal Accept header: charset parameter</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921110</Id>\n                <Type>CRS</Type>\n                <Name>921110 HTTP Request Smuggling Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921120</Id>\n                <Type>CRS</Type>\n                <Name>921120 HTTP Response Splitting Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921130</Id>\n                <Type>CRS</Type>\n                <Name>921130 HTTP Response Splitting Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921140</Id>\n                <Type>CRS</Type>\n                <Name>921140 HTTP Header Injection Attack via headers</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921150</Id>\n                <Type>CRS</Type>\n                <Name>921150 HTTP Header Injection Attack via payload (CR/LF detected)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921151</Id>\n                <Type>CRS</Type>\n                <Name>921151 HTTP Header Injection Attack via payload (CR/LF detected)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921160</Id>\n                <Type>CRS</Type>\n                <Name>921160 HTTP Header Injection Attack via payload (CR/LF and header-name detected)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921180</Id>\n                <Type>CRS</Type>\n                <Name>921180 HTTP Parameter Pollution (%{TX.1})</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921190</Id>\n                <Type>CRS</Type>\n                <Name>921190 HTTP Splitting (CR/LF in request filename detected)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921200</Id>\n                <Type>CRS</Type>\n                <Name>921200 LDAP Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921230</Id>\n                <Type>CRS</Type>\n                <Name>921230 HTTP Range Header detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921421</Id>\n                <Type>CRS</Type>\n                <Name>921421 Content-Type header: Dangerous content type outside the mime type declaration</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921422</Id>\n                <Type>CRS</Type>\n                <Name>921422 Content-Type header: Dangerous content type outside the mime type declaration</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>922100</Id>\n                <Type>CRS</Type>\n                <Name>922100 Multipart content type global _charset_ definition is not allowed by policy</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>922110</Id>\n                <Type>CRS</Type>\n                <Name>922110 Illegal MIME Multipart Header content-type: charset parameter</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>922120</Id>\n                <Type>CRS</Type>\n                <Name>922120 Content-Transfer-Encoding was deprecated by rfc7578 in 2015 and should not be used</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930100</Id>\n                <Type>CRS</Type>\n                <Name>930100 Path Traversal Attack (/../)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930110</Id>\n                <Type>CRS</Type>\n                <Name>930110 Path Traversal Attack (/../)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930120</Id>\n                <Type>CRS</Type>\n                <Name>930120 OS File Access Attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930130</Id>\n                <Type>CRS</Type>\n                <Name>930130 Restricted File Access Attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931100</Id>\n                <Type>CRS</Type>\n                <Name>931100 Possible Remote File Inclusion (RFI) Attack: URL Parameter using IP Address</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931110</Id>\n                <Type>CRS</Type>\n                <Name>931110 Possible Remote File Inclusion (RFI) Attack: Common RFI Vulnerable Parameter Name used w/URL Payloa</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931120</Id>\n                <Type>CRS</Type>\n                <Name>931120 Possible Remote File Inclusion (RFI) Attack: URL Payload Used w/Trailing Question Mark Character (?</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931130</Id>\n                <Type>CRS</Type>\n                <Name>931130 Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932100</Id>\n                <Type>CRS</Type>\n                <Name>932100 Remote Command Execution: Unix Command Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932105</Id>\n                <Type>CRS</Type>\n                <Name>932105 Remote Command Execution: Unix Command Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932106</Id>\n                <Type>CRS</Type>\n                <Name>932106 Remote Command Execution: Unix Command Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932110</Id>\n                <Type>CRS</Type>\n                <Name>932110 Remote Command Execution: Windows Command Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932115</Id>\n                <Type>CRS</Type>\n                <Name>932115 Remote Command Execution: Windows Command Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932120</Id>\n                <Type>CRS</Type>\n                <Name>932120 Remote Command Execution: Windows PowerShell Command Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932130</Id>\n                <Type>CRS</Type>\n                <Name>932130 Remote Command Execution: Unix Shell Expression Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932140</Id>\n                <Type>CRS</Type>\n                <Name>932140 Remote Command Execution: Windows FOR/IF Command Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932150</Id>\n                <Type>CRS</Type>\n                <Name>932150 Remote Command Execution: Direct Unix Command Execution</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932160</Id>\n                <Type>CRS</Type>\n                <Name>932160 Remote Command Execution: Unix Shell Code Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932170</Id>\n                <Type>CRS</Type>\n                <Name>932170 Remote Command Execution: Shellshock (CVE-2014-6271)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932171</Id>\n                <Type>CRS</Type>\n                <Name>932171 Remote Command Execution: Shellshock (CVE-2014-6271)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932180</Id>\n                <Type>CRS</Type>\n                <Name>932180 Restricted File Upload Attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932190</Id>\n                <Type>CRS</Type>\n                <Name>932190 Remote Command Execution: Wildcard bypass technique attempt</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932200</Id>\n                <Type>CRS</Type>\n                <Name>932200 RCE Bypass Technique</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933100</Id>\n                <Type>CRS</Type>\n                <Name>933100 PHP Injection Attack: PHP Open Tag Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933110</Id>\n                <Type>CRS</Type>\n                <Name>933110 PHP Injection Attack: PHP Script File Upload Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933111</Id>\n                <Type>CRS</Type>\n                <Name>933111 PHP Injection Attack: PHP Script File Upload Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933120</Id>\n                <Type>CRS</Type>\n                <Name>933120 PHP Injection Attack: Configuration Directive Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933130</Id>\n                <Type>CRS</Type>\n                <Name>933130 PHP Injection Attack: Variables Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933131</Id>\n                <Type>CRS</Type>\n                <Name>933131 PHP Injection Attack: Variables Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933140</Id>\n                <Type>CRS</Type>\n                <Name>933140 PHP Injection Attack: I/O Stream Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933150</Id>\n                <Type>CRS</Type>\n                <Name>933150 PHP Injection Attack: High-Risk PHP Function Name Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933151</Id>\n                <Type>CRS</Type>\n                <Name>933151 PHP Injection Attack: Medium-Risk PHP Function Name Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933160</Id>\n                <Type>CRS</Type>\n                <Name>933160 PHP Injection Attack: High-Risk PHP Function Call Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933161</Id>\n                <Type>CRS</Type>\n                <Name>933161 PHP Injection Attack: Low-Value PHP Function Call Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933170</Id>\n                <Type>CRS</Type>\n                <Name>933170 PHP Injection Attack: Serialized Object Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933180</Id>\n                <Type>CRS</Type>\n                <Name>933180 PHP Injection Attack: Variable Function Call Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933190</Id>\n                <Type>CRS</Type>\n                <Name>933190 PHP Injection Attack: PHP Closing Tag Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933200</Id>\n                <Type>CRS</Type>\n                <Name>933200 PHP Injection Attack: Wrapper scheme detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933210</Id>\n                <Type>CRS</Type>\n                <Name>933210 PHP Injection Attack: Variable Function Call Found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>934100</Id>\n                <Type>CRS</Type>\n                <Name>934100 Node.js Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941100</Id>\n                <Type>CRS</Type>\n                <Name>941100 XSS Attack Detected via libinjection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941101</Id>\n                <Type>CRS</Type>\n                <Name>941101 XSS Attack Detected via libinjection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941110</Id>\n                <Type>CRS</Type>\n                <Name>941110 XSS Filter - Category 1: Script Tag Vector</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941120</Id>\n                <Type>CRS</Type>\n                <Name>941120 XSS Filter - Category 2: Event Handler Vector</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941130</Id>\n                <Type>CRS</Type>\n                <Name>941130 XSS Filter - Category 3: Attribute Vector</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941140</Id>\n                <Type>CRS</Type>\n                <Name>941140 XSS Filter - Category 4: Javascript URI Vector</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941150</Id>\n                <Type>CRS</Type>\n                <Name>941150 XSS Filter - Category 5: Disallowed HTML Attributes</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941160</Id>\n                <Type>CRS</Type>\n                <Name>941160 NoScript XSS InjectionChecker: HTML Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941170</Id>\n                <Type>CRS</Type>\n                <Name>941170 NoScript XSS InjectionChecker: Attribute Injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941180</Id>\n                <Type>CRS</Type>\n                <Name>941180 Node-Validator Blacklist Keywords</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941190</Id>\n                <Type>CRS</Type>\n                <Name>941190 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941200</Id>\n                <Type>CRS</Type>\n                <Name>941200 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941210</Id>\n                <Type>CRS</Type>\n                <Name>941210 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941220</Id>\n                <Type>CRS</Type>\n                <Name>941220 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941230</Id>\n                <Type>CRS</Type>\n                <Name>941230 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941240</Id>\n                <Type>CRS</Type>\n                <Name>941240 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941250</Id>\n                <Type>CRS</Type>\n                <Name>941250 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941260</Id>\n                <Type>CRS</Type>\n                <Name>941260 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941270</Id>\n                <Type>CRS</Type>\n                <Name>941270 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941280</Id>\n                <Type>CRS</Type>\n                <Name>941280 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941290</Id>\n                <Type>CRS</Type>\n                <Name>941290 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941300</Id>\n                <Type>CRS</Type>\n                <Name>941300 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941310</Id>\n                <Type>CRS</Type>\n                <Name>941310 US-ASCII Malformed Encoding XSS Filter - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941320</Id>\n                <Type>CRS</Type>\n                <Name>941320 Possible XSS Attack Detected - HTML Tag Handler</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941330</Id>\n                <Type>CRS</Type>\n                <Name>941330 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941340</Id>\n                <Type>CRS</Type>\n                <Name>941340 IE XSS Filters - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941350</Id>\n                <Type>CRS</Type>\n                <Name>941350 UTF-7 Encoding IE XSS - Attack Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941360</Id>\n                <Type>CRS</Type>\n                <Name>941360 JSFuck / Hieroglyphy obfuscation detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941370</Id>\n                <Type>CRS</Type>\n                <Name>941370 JavaScript global variable found</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941380</Id>\n                <Type>CRS</Type>\n                <Name>941380 AngularJS client side template injection detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942100</Id>\n                <Type>CRS</Type>\n                <Name>942100 SQL Injection Attack Detected via libinjection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942101</Id>\n                <Type>CRS</Type>\n                <Name>942101 SQL Injection Attack Detected via libinjection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942110</Id>\n                <Type>CRS</Type>\n                <Name>942110 SQL Injection Attack: Common Injection Testing Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942120</Id>\n                <Type>CRS</Type>\n                <Name>942120 SQL Injection Attack: SQL Operator Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942130</Id>\n                <Type>CRS</Type>\n                <Name>942130 SQL Injection Attack: SQL Tautology Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942140</Id>\n                <Type>CRS</Type>\n                <Name>942140 SQL Injection Attack: Common DB Names Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942150</Id>\n                <Type>CRS</Type>\n                <Name>942150 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942160</Id>\n                <Type>CRS</Type>\n                <Name>942160 Detects blind sqli tests using sleep() or benchmark()</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942170</Id>\n                <Type>CRS</Type>\n                <Name>942170 Detects SQL benchmark and sleep injection attempts including conditional queries</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942180</Id>\n                <Type>CRS</Type>\n                <Name>942180 Detects basic SQL authentication bypass attempts 1/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942190</Id>\n                <Type>CRS</Type>\n                <Name>942190 Detects MSSQL code execution and information gathering attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942200</Id>\n                <Type>CRS</Type>\n                <Name>942200 Detects MySQL comment-/space-obfuscated injections and backtick termination</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942210</Id>\n                <Type>CRS</Type>\n                <Name>942210 Detects chained SQL injection attempts 1/2</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942220</Id>\n                <Type>CRS</Type>\n                <Name>942220 Looking for integer overflow attacks</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942230</Id>\n                <Type>CRS</Type>\n                <Name>942230 Detects conditional SQL injection attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942240</Id>\n                <Type>CRS</Type>\n                <Name>942240 Detects MySQL charset switch and MSSQL DoS attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942250</Id>\n                <Type>CRS</Type>\n                <Name>942250 Detects MATCH AGAINST</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942251</Id>\n                <Type>CRS</Type>\n                <Name>942251 Detects HAVING injections</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942260</Id>\n                <Type>CRS</Type>\n                <Name>942260 Detects basic SQL authentication bypass attempts 2/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942270</Id>\n                <Type>CRS</Type>\n                <Name>942270 Looking for basic sql injection. Common attack string for mysql</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942280</Id>\n                <Type>CRS</Type>\n                <Name>942280 Detects Postgres pg_sleep injection</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942290</Id>\n                <Type>CRS</Type>\n                <Name>942290 Finds basic MongoDB SQL injection attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942300</Id>\n                <Type>CRS</Type>\n                <Name>942300 Detects MySQL comments</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942310</Id>\n                <Type>CRS</Type>\n                <Name>942310 Detects chained SQL injection attempts 2/2</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942320</Id>\n                <Type>CRS</Type>\n                <Name>942320 Detects MySQL and PostgreSQL stored procedure/function injections</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942330</Id>\n                <Type>CRS</Type>\n                <Name>942330 Detects classic SQL injection probings 1/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942340</Id>\n                <Type>CRS</Type>\n                <Name>942340 Detects basic SQL authentication bypass attempts 3/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942350</Id>\n                <Type>CRS</Type>\n                <Name>942350 Detects MySQL UDF injection and other data/structure manipulation attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942360</Id>\n                <Type>CRS</Type>\n                <Name>942360 Detects concatenated basic SQL injection and SQLLFI attempts</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942361</Id>\n                <Type>CRS</Type>\n                <Name>942361 Detects basic SQL injection based on keyword alter or union</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942370</Id>\n                <Type>CRS</Type>\n                <Name>942370 Detects classic SQL injection probings 2/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942380</Id>\n                <Type>CRS</Type>\n                <Name>942380 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942390</Id>\n                <Type>CRS</Type>\n                <Name>942390 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942400</Id>\n                <Type>CRS</Type>\n                <Name>942400 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942410</Id>\n                <Type>CRS</Type>\n                <Name>942410 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942420</Id>\n                <Type>CRS</Type>\n                <Name>942420 Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942421</Id>\n                <Type>CRS</Type>\n                <Name>942421 Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942430</Id>\n                <Type>CRS</Type>\n                <Name>942430 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942431</Id>\n                <Type>CRS</Type>\n                <Name>942431 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942432</Id>\n                <Type>CRS</Type>\n                <Name>942432 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942440</Id>\n                <Type>CRS</Type>\n                <Name>942440 SQL Comment Sequence Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942450</Id>\n                <Type>CRS</Type>\n                <Name>942450 SQL Hex Encoding Identified</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942460</Id>\n                <Type>CRS</Type>\n                <Name>942460 Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942470</Id>\n                <Type>CRS</Type>\n                <Name>942470 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942480</Id>\n                <Type>CRS</Type>\n                <Name>942480 SQL Injection Attack</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942490</Id>\n                <Type>CRS</Type>\n                <Name>942490 Detects classic SQL injection probings 3/3</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942500</Id>\n                <Type>CRS</Type>\n                <Name>942500 MySQL in-line comment detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942510</Id>\n                <Type>CRS</Type>\n                <Name>942510 SQLi bypass attempt by ticks or backticks detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942511</Id>\n                <Type>CRS</Type>\n                <Name>942511 SQLi bypass attempt by ticks detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>943100</Id>\n                <Type>CRS</Type>\n                <Name>943100 Possible Session Fixation Attack: Setting Cookie Values in HTML</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>943110</Id>\n                <Type>CRS</Type>\n                <Name>943110 Possible Session Fixation Attack: SessionID Parameter Name with Off-Domain Referer</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>943120</Id>\n                <Type>CRS</Type>\n                <Name>943120 Possible Session Fixation Attack: SessionID Parameter Name with No Referer</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944100</Id>\n                <Type>CRS</Type>\n                <Name>944100 Remote Command Execution: Suspicious Java class detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944110</Id>\n                <Type>CRS</Type>\n                <Name>944110 Remote Command Execution: Java process spawn (CVE-2017-9805)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944120</Id>\n                <Type>CRS</Type>\n                <Name>944120 Remote Command Execution: Java serialization (CVE-2015-4852)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944130</Id>\n                <Type>CRS</Type>\n                <Name>944130 Suspicious Java class detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944200</Id>\n                <Type>CRS</Type>\n                <Name>944200 Magic bytes Detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944210</Id>\n                <Type>CRS</Type>\n                <Name>944210 Magic bytes Detected Base64 Encoded</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944240</Id>\n                <Type>CRS</Type>\n                <Name>944240 Remote Command Execution: Java serialization (CVE-2015-4852)</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944250</Id>\n                <Type>CRS</Type>\n                <Name>944250 Remote Command Execution: Suspicious Java method detected</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944300</Id>\n                <Type>CRS</Type>\n                <Name>944300 Base64 encoded string matched suspicious keyword</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>950100</Id>\n                <Type>CRS</Type>\n                <Name>950100 The Application Returned a 500-Level Status Code</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>950130</Id>\n                <Type>CRS</Type>\n                <Name>950130 Directory Listing</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>950140</Id>\n                <Type>CRS</Type>\n                <Name>950140 CGI source code leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951110</Id>\n                <Type>CRS</Type>\n                <Name>951110 Microsoft Access SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951120</Id>\n                <Type>CRS</Type>\n                <Name>951120 Oracle SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951130</Id>\n                <Type>CRS</Type>\n                <Name>951130 DB2 SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951140</Id>\n                <Type>CRS</Type>\n                <Name>951140 EMC SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951150</Id>\n                <Type>CRS</Type>\n                <Name>951150 firebird SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951160</Id>\n                <Type>CRS</Type>\n                <Name>951160 Frontbase SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951170</Id>\n                <Type>CRS</Type>\n                <Name>951170 hsqldb SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951180</Id>\n                <Type>CRS</Type>\n                <Name>951180 informix SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951190</Id>\n                <Type>CRS</Type>\n                <Name>951190 ingres SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951200</Id>\n                <Type>CRS</Type>\n                <Name>951200 interbase SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951210</Id>\n                <Type>CRS</Type>\n                <Name>951210 maxDB SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951220</Id>\n                <Type>CRS</Type>\n                <Name>951220 mssql SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951230</Id>\n                <Type>CRS</Type>\n                <Name>951230 mysql SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951240</Id>\n                <Type>CRS</Type>\n                <Name>951240 postgres SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951250</Id>\n                <Type>CRS</Type>\n                <Name>951250 sqlite SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951260</Id>\n                <Type>CRS</Type>\n                <Name>951260 Sybase SQL Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>952100</Id>\n                <Type>CRS</Type>\n                <Name>952100 Java Source Code Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>952110</Id>\n                <Type>CRS</Type>\n                <Name>952110 Java Errors</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>953100</Id>\n                <Type>CRS</Type>\n                <Name>953100 PHP Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>953110</Id>\n                <Type>CRS</Type>\n                <Name>953110 PHP source code leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>953120</Id>\n                <Type>CRS</Type>\n                <Name>953120 PHP source code leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954100</Id>\n                <Type>CRS</Type>\n                <Name>954100 Disclosure of IIS install location</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954110</Id>\n                <Type>CRS</Type>\n                <Name>954110 Application Availability Error</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954120</Id>\n                <Type>CRS</Type>\n                <Name>954120 IIS Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954130</Id>\n                <Type>CRS</Type>\n                <Name>954130 IIS Information Leakage</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980100</Id>\n                <Type>CRS</Type>\n                <Name>980100 Correlated Successful Attack Identified: (Total Score: %{tx.anomaly_score}) Inbound Attack (Inbound</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980110</Id>\n                <Type>CRS</Type>\n                <Name>980110 Correlated Attack Attempt Identified: (Total Score: %{tx.anomaly_score}) Inbound Attack (Inbound An</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980120</Id>\n                <Type>CRS</Type>\n                <Name>980120 Inbound Anomaly Score (Total Inbound Score: %{TX.INBOUND_ANOMALY_SCORE} - SQLI=%{tx.sql_injection_s</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980130</Id>\n                <Type>CRS</Type>\n                <Name>980130 Inbound Anomaly Score Exceeded (Total Inbound Score: %{TX.INBOUND_ANOMALY_SCORE} - SQLI=%{tx.sql_in</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980140</Id>\n                <Type>CRS</Type>\n                <Name>980140 Outbound Anomaly Score Exceeded (score %{TX.OUTBOUND_ANOMALY_SCORE}): individual paranoia level sco</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980150</Id>\n                <Type>CRS</Type>\n                <Name>980150 Outbound Anomaly Score (Total Outbound Score: %{TX.OUTBOUND_ANOMALY_SCORE}): individual paranoia le</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>known</Id>\n                <Type>custom</Type>\n                <Name>known</Name>\n                <Enabled>yes</Enabled>\n                <Runfirst>no</Runfirst>\n            </Rule>\n            <Rule>\n                <Id>nextcloud</Id>\n                <Type>workload</Type>\n                <Name>nextcloud</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>dokuwiki</Id>\n                <Type>workload</Type>\n                <Name>dokuwiki</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>cpanel</Id>\n                <Type>workload</Type>\n                <Name>cpanel</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>wordpress</Id>\n                <Type>workload</Type>\n                <Name>wordpress</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>xenforo</Id>\n                <Type>workload</Type>\n                <Name>xenforo</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n            <Rule>\n                <Id>drupal</Id>\n                <Type>workload</Type>\n                <Name>drupal</Name>\n                <Enabled>yes</Enabled>\n            </Rule>\n        </Data>\n    </Success>\n</Response>"},{"id":"bb177dc5-38ce-4233-b988-6a91a46611a8","name":"Disable Rules for a Virtual Service","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/owasprules?vs=2&enable=no","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","owasprules"],"query":[{"key":"vs","value":"2"},{"key":"enable","value":"no"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 10:02:54 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Rule>\n                <Id>911100</Id>\n                <Type>CRS</Type>\n                <Name>911100 Method is not allowed by policy</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913100</Id>\n                <Type>CRS</Type>\n                <Name>913100 Found User-Agent associated with security scanner</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913101</Id>\n                <Type>CRS</Type>\n                <Name>913101 Found User-Agent associated with scripting/generic HTTP client</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913102</Id>\n                <Type>CRS</Type>\n                <Name>913102 Found User-Agent associated with web crawler/bot</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913110</Id>\n                <Type>CRS</Type>\n                <Name>913110 Found request header associated with security scanner</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>913120</Id>\n                <Type>CRS</Type>\n                <Name>913120 Found request filename/argument associated with security scanner</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920100</Id>\n                <Type>CRS</Type>\n                <Name>920100 Invalid HTTP Request Line</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920120</Id>\n                <Type>CRS</Type>\n                <Name>920120 Attempted multipart/form-data bypass</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920121</Id>\n                <Type>CRS</Type>\n                <Name>920121 Attempted multipart/form-data bypass</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920160</Id>\n                <Type>CRS</Type>\n                <Name>920160 Content-Length HTTP header is not numeric</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920170</Id>\n                <Type>CRS</Type>\n                <Name>920170 GET or HEAD Request with Body Content</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920171</Id>\n                <Type>CRS</Type>\n                <Name>920171 GET or HEAD Request with Transfer-Encoding</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920180</Id>\n                <Type>CRS</Type>\n                <Name>920180 POST without Content-Length or Transfer-Encoding headers</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920181</Id>\n                <Type>CRS</Type>\n                <Name>920181 Content-Length and Transfer-Encoding headers present.</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920190</Id>\n                <Type>CRS</Type>\n                <Name>920190 Range: Invalid Last Byte Value</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920200</Id>\n                <Type>CRS</Type>\n                <Name>920200 Range: Too many fields (6 or more)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920201</Id>\n                <Type>CRS</Type>\n                <Name>920201 Range: Too many fields for pdf request (63 or more)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920202</Id>\n                <Type>CRS</Type>\n                <Name>920202 Range: Too many fields for pdf request (6 or more)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920210</Id>\n                <Type>CRS</Type>\n                <Name>920210 Multiple/Conflicting Connection Header Data Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920220</Id>\n                <Type>CRS</Type>\n                <Name>920220 URL Encoding Abuse Attack Attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920230</Id>\n                <Type>CRS</Type>\n                <Name>920230 Multiple URL Encoding Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920240</Id>\n                <Type>CRS</Type>\n                <Name>920240 URL Encoding Abuse Attack Attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920250</Id>\n                <Type>CRS</Type>\n                <Name>920250 UTF8 Encoding Abuse Attack Attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920260</Id>\n                <Type>CRS</Type>\n                <Name>920260 Unicode Full/Half Width Abuse Attack Attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920270</Id>\n                <Type>CRS</Type>\n                <Name>920270 Invalid character in request (null character)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920271</Id>\n                <Type>CRS</Type>\n                <Name>920271 Invalid character in request (non printable characters)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920272</Id>\n                <Type>CRS</Type>\n                <Name>920272 Invalid character in request (outside of printable chars below ascii 127)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920273</Id>\n                <Type>CRS</Type>\n                <Name>920273 Invalid character in request (outside of very strict set)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920274</Id>\n                <Type>CRS</Type>\n                <Name>920274 Invalid character in request headers (outside of very strict set)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920275</Id>\n                <Type>CRS</Type>\n                <Name>920275 Invalid character in request headers (outside of very strict set)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920280</Id>\n                <Type>CRS</Type>\n                <Name>920280 Request Missing a Host Header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920290</Id>\n                <Type>CRS</Type>\n                <Name>920290 Empty Host Header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920300</Id>\n                <Type>CRS</Type>\n                <Name>920300 Request Missing an Accept Header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920310</Id>\n                <Type>CRS</Type>\n                <Name>920310 Request Has an Empty Accept Header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920311</Id>\n                <Type>CRS</Type>\n                <Name>920311 Request Has an Empty Accept Header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920320</Id>\n                <Type>CRS</Type>\n                <Name>920320 Missing User Agent Header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920330</Id>\n                <Type>CRS</Type>\n                <Name>920330 Empty User Agent Header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920340</Id>\n                <Type>CRS</Type>\n                <Name>920340 Request Containing Content</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920341</Id>\n                <Type>CRS</Type>\n                <Name>920341 Request Containing Content Requires Content-Type header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920350</Id>\n                <Type>CRS</Type>\n                <Name>920350 Host header is a numeric IP address</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920360</Id>\n                <Type>CRS</Type>\n                <Name>920360 Argument name too long</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920370</Id>\n                <Type>CRS</Type>\n                <Name>920370 Argument value too long</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920380</Id>\n                <Type>CRS</Type>\n                <Name>920380 Too many arguments in request</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920390</Id>\n                <Type>CRS</Type>\n                <Name>920390 Total arguments size exceeded</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920400</Id>\n                <Type>CRS</Type>\n                <Name>920400 Uploaded file size too large</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920410</Id>\n                <Type>CRS</Type>\n                <Name>920410 Total uploaded files size too large</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920420</Id>\n                <Type>CRS</Type>\n                <Name>920420 Request content type is not allowed by policy</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920430</Id>\n                <Type>CRS</Type>\n                <Name>920430 HTTP protocol version is not allowed by policy</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920440</Id>\n                <Type>CRS</Type>\n                <Name>920440 URL file extension is restricted by policy</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920450</Id>\n                <Type>CRS</Type>\n                <Name>920450 HTTP header is restricted by policy (%{MATCHED_VAR})</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920460</Id>\n                <Type>CRS</Type>\n                <Name>920460 Abnormal character escapes in request</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920470</Id>\n                <Type>CRS</Type>\n                <Name>920470 Illegal Content-Type header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920480</Id>\n                <Type>CRS</Type>\n                <Name>920480 Request content type charset is not allowed by policy</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920490</Id>\n                <Type>CRS</Type>\n                <Name>920490 Request header x-up-devcap-post-charset detected in combination with prefix </Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920500</Id>\n                <Type>CRS</Type>\n                <Name>920500 Attempt to access a backup or working file</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920510</Id>\n                <Type>CRS</Type>\n                <Name>920510 Invalid Cache-Control request header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920530</Id>\n                <Type>CRS</Type>\n                <Name>920530 Multiple charsets detected in content type header</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>920600</Id>\n                <Type>CRS</Type>\n                <Name>920600 Illegal Accept header: charset parameter</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921110</Id>\n                <Type>CRS</Type>\n                <Name>921110 HTTP Request Smuggling Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921120</Id>\n                <Type>CRS</Type>\n                <Name>921120 HTTP Response Splitting Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921130</Id>\n                <Type>CRS</Type>\n                <Name>921130 HTTP Response Splitting Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921140</Id>\n                <Type>CRS</Type>\n                <Name>921140 HTTP Header Injection Attack via headers</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921150</Id>\n                <Type>CRS</Type>\n                <Name>921150 HTTP Header Injection Attack via payload (CR/LF detected)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921151</Id>\n                <Type>CRS</Type>\n                <Name>921151 HTTP Header Injection Attack via payload (CR/LF detected)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921160</Id>\n                <Type>CRS</Type>\n                <Name>921160 HTTP Header Injection Attack via payload (CR/LF and header-name detected)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921180</Id>\n                <Type>CRS</Type>\n                <Name>921180 HTTP Parameter Pollution (%{TX.1})</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921190</Id>\n                <Type>CRS</Type>\n                <Name>921190 HTTP Splitting (CR/LF in request filename detected)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921200</Id>\n                <Type>CRS</Type>\n                <Name>921200 LDAP Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921230</Id>\n                <Type>CRS</Type>\n                <Name>921230 HTTP Range Header detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921421</Id>\n                <Type>CRS</Type>\n                <Name>921421 Content-Type header: Dangerous content type outside the mime type declaration</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>921422</Id>\n                <Type>CRS</Type>\n                <Name>921422 Content-Type header: Dangerous content type outside the mime type declaration</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>922100</Id>\n                <Type>CRS</Type>\n                <Name>922100 Multipart content type global _charset_ definition is not allowed by policy</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>922110</Id>\n                <Type>CRS</Type>\n                <Name>922110 Illegal MIME Multipart Header content-type: charset parameter</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>922120</Id>\n                <Type>CRS</Type>\n                <Name>922120 Content-Transfer-Encoding was deprecated by rfc7578 in 2015 and should not be used</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930100</Id>\n                <Type>CRS</Type>\n                <Name>930100 Path Traversal Attack (/../)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930110</Id>\n                <Type>CRS</Type>\n                <Name>930110 Path Traversal Attack (/../)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930120</Id>\n                <Type>CRS</Type>\n                <Name>930120 OS File Access Attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>930130</Id>\n                <Type>CRS</Type>\n                <Name>930130 Restricted File Access Attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931100</Id>\n                <Type>CRS</Type>\n                <Name>931100 Possible Remote File Inclusion (RFI) Attack: URL Parameter using IP Address</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931110</Id>\n                <Type>CRS</Type>\n                <Name>931110 Possible Remote File Inclusion (RFI) Attack: Common RFI Vulnerable Parameter Name used w/URL Payloa</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931120</Id>\n                <Type>CRS</Type>\n                <Name>931120 Possible Remote File Inclusion (RFI) Attack: URL Payload Used w/Trailing Question Mark Character (?</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>931130</Id>\n                <Type>CRS</Type>\n                <Name>931130 Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932100</Id>\n                <Type>CRS</Type>\n                <Name>932100 Remote Command Execution: Unix Command Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932105</Id>\n                <Type>CRS</Type>\n                <Name>932105 Remote Command Execution: Unix Command Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932106</Id>\n                <Type>CRS</Type>\n                <Name>932106 Remote Command Execution: Unix Command Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932110</Id>\n                <Type>CRS</Type>\n                <Name>932110 Remote Command Execution: Windows Command Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932115</Id>\n                <Type>CRS</Type>\n                <Name>932115 Remote Command Execution: Windows Command Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932120</Id>\n                <Type>CRS</Type>\n                <Name>932120 Remote Command Execution: Windows PowerShell Command Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932130</Id>\n                <Type>CRS</Type>\n                <Name>932130 Remote Command Execution: Unix Shell Expression Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932140</Id>\n                <Type>CRS</Type>\n                <Name>932140 Remote Command Execution: Windows FOR/IF Command Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932150</Id>\n                <Type>CRS</Type>\n                <Name>932150 Remote Command Execution: Direct Unix Command Execution</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932160</Id>\n                <Type>CRS</Type>\n                <Name>932160 Remote Command Execution: Unix Shell Code Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932170</Id>\n                <Type>CRS</Type>\n                <Name>932170 Remote Command Execution: Shellshock (CVE-2014-6271)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932171</Id>\n                <Type>CRS</Type>\n                <Name>932171 Remote Command Execution: Shellshock (CVE-2014-6271)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932180</Id>\n                <Type>CRS</Type>\n                <Name>932180 Restricted File Upload Attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932190</Id>\n                <Type>CRS</Type>\n                <Name>932190 Remote Command Execution: Wildcard bypass technique attempt</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>932200</Id>\n                <Type>CRS</Type>\n                <Name>932200 RCE Bypass Technique</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933100</Id>\n                <Type>CRS</Type>\n                <Name>933100 PHP Injection Attack: PHP Open Tag Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933110</Id>\n                <Type>CRS</Type>\n                <Name>933110 PHP Injection Attack: PHP Script File Upload Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933111</Id>\n                <Type>CRS</Type>\n                <Name>933111 PHP Injection Attack: PHP Script File Upload Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933120</Id>\n                <Type>CRS</Type>\n                <Name>933120 PHP Injection Attack: Configuration Directive Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933130</Id>\n                <Type>CRS</Type>\n                <Name>933130 PHP Injection Attack: Variables Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933131</Id>\n                <Type>CRS</Type>\n                <Name>933131 PHP Injection Attack: Variables Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933140</Id>\n                <Type>CRS</Type>\n                <Name>933140 PHP Injection Attack: I/O Stream Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933150</Id>\n                <Type>CRS</Type>\n                <Name>933150 PHP Injection Attack: High-Risk PHP Function Name Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933151</Id>\n                <Type>CRS</Type>\n                <Name>933151 PHP Injection Attack: Medium-Risk PHP Function Name Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933160</Id>\n                <Type>CRS</Type>\n                <Name>933160 PHP Injection Attack: High-Risk PHP Function Call Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933161</Id>\n                <Type>CRS</Type>\n                <Name>933161 PHP Injection Attack: Low-Value PHP Function Call Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933170</Id>\n                <Type>CRS</Type>\n                <Name>933170 PHP Injection Attack: Serialized Object Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933180</Id>\n                <Type>CRS</Type>\n                <Name>933180 PHP Injection Attack: Variable Function Call Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933190</Id>\n                <Type>CRS</Type>\n                <Name>933190 PHP Injection Attack: PHP Closing Tag Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933200</Id>\n                <Type>CRS</Type>\n                <Name>933200 PHP Injection Attack: Wrapper scheme detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>933210</Id>\n                <Type>CRS</Type>\n                <Name>933210 PHP Injection Attack: Variable Function Call Found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>934100</Id>\n                <Type>CRS</Type>\n                <Name>934100 Node.js Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941100</Id>\n                <Type>CRS</Type>\n                <Name>941100 XSS Attack Detected via libinjection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941101</Id>\n                <Type>CRS</Type>\n                <Name>941101 XSS Attack Detected via libinjection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941110</Id>\n                <Type>CRS</Type>\n                <Name>941110 XSS Filter - Category 1: Script Tag Vector</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941120</Id>\n                <Type>CRS</Type>\n                <Name>941120 XSS Filter - Category 2: Event Handler Vector</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941130</Id>\n                <Type>CRS</Type>\n                <Name>941130 XSS Filter - Category 3: Attribute Vector</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941140</Id>\n                <Type>CRS</Type>\n                <Name>941140 XSS Filter - Category 4: Javascript URI Vector</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941150</Id>\n                <Type>CRS</Type>\n                <Name>941150 XSS Filter - Category 5: Disallowed HTML Attributes</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941160</Id>\n                <Type>CRS</Type>\n                <Name>941160 NoScript XSS InjectionChecker: HTML Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941170</Id>\n                <Type>CRS</Type>\n                <Name>941170 NoScript XSS InjectionChecker: Attribute Injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941180</Id>\n                <Type>CRS</Type>\n                <Name>941180 Node-Validator Blacklist Keywords</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941190</Id>\n                <Type>CRS</Type>\n                <Name>941190 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941200</Id>\n                <Type>CRS</Type>\n                <Name>941200 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941210</Id>\n                <Type>CRS</Type>\n                <Name>941210 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941220</Id>\n                <Type>CRS</Type>\n                <Name>941220 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941230</Id>\n                <Type>CRS</Type>\n                <Name>941230 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941240</Id>\n                <Type>CRS</Type>\n                <Name>941240 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941250</Id>\n                <Type>CRS</Type>\n                <Name>941250 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941260</Id>\n                <Type>CRS</Type>\n                <Name>941260 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941270</Id>\n                <Type>CRS</Type>\n                <Name>941270 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941280</Id>\n                <Type>CRS</Type>\n                <Name>941280 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941290</Id>\n                <Type>CRS</Type>\n                <Name>941290 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941300</Id>\n                <Type>CRS</Type>\n                <Name>941300 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941310</Id>\n                <Type>CRS</Type>\n                <Name>941310 US-ASCII Malformed Encoding XSS Filter - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941320</Id>\n                <Type>CRS</Type>\n                <Name>941320 Possible XSS Attack Detected - HTML Tag Handler</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941330</Id>\n                <Type>CRS</Type>\n                <Name>941330 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941340</Id>\n                <Type>CRS</Type>\n                <Name>941340 IE XSS Filters - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941350</Id>\n                <Type>CRS</Type>\n                <Name>941350 UTF-7 Encoding IE XSS - Attack Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941360</Id>\n                <Type>CRS</Type>\n                <Name>941360 JSFuck / Hieroglyphy obfuscation detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941370</Id>\n                <Type>CRS</Type>\n                <Name>941370 JavaScript global variable found</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>941380</Id>\n                <Type>CRS</Type>\n                <Name>941380 AngularJS client side template injection detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942100</Id>\n                <Type>CRS</Type>\n                <Name>942100 SQL Injection Attack Detected via libinjection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942101</Id>\n                <Type>CRS</Type>\n                <Name>942101 SQL Injection Attack Detected via libinjection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942110</Id>\n                <Type>CRS</Type>\n                <Name>942110 SQL Injection Attack: Common Injection Testing Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942120</Id>\n                <Type>CRS</Type>\n                <Name>942120 SQL Injection Attack: SQL Operator Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942130</Id>\n                <Type>CRS</Type>\n                <Name>942130 SQL Injection Attack: SQL Tautology Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942140</Id>\n                <Type>CRS</Type>\n                <Name>942140 SQL Injection Attack: Common DB Names Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942150</Id>\n                <Type>CRS</Type>\n                <Name>942150 SQL Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942160</Id>\n                <Type>CRS</Type>\n                <Name>942160 Detects blind sqli tests using sleep() or benchmark()</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942170</Id>\n                <Type>CRS</Type>\n                <Name>942170 Detects SQL benchmark and sleep injection attempts including conditional queries</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942180</Id>\n                <Type>CRS</Type>\n                <Name>942180 Detects basic SQL authentication bypass attempts 1/3</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942190</Id>\n                <Type>CRS</Type>\n                <Name>942190 Detects MSSQL code execution and information gathering attempts</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942200</Id>\n                <Type>CRS</Type>\n                <Name>942200 Detects MySQL comment-/space-obfuscated injections and backtick termination</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942210</Id>\n                <Type>CRS</Type>\n                <Name>942210 Detects chained SQL injection attempts 1/2</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942220</Id>\n                <Type>CRS</Type>\n                <Name>942220 Looking for integer overflow attacks</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942230</Id>\n                <Type>CRS</Type>\n                <Name>942230 Detects conditional SQL injection attempts</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942240</Id>\n                <Type>CRS</Type>\n                <Name>942240 Detects MySQL charset switch and MSSQL DoS attempts</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942250</Id>\n                <Type>CRS</Type>\n                <Name>942250 Detects MATCH AGAINST</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942251</Id>\n                <Type>CRS</Type>\n                <Name>942251 Detects HAVING injections</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942260</Id>\n                <Type>CRS</Type>\n                <Name>942260 Detects basic SQL authentication bypass attempts 2/3</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942270</Id>\n                <Type>CRS</Type>\n                <Name>942270 Looking for basic sql injection. Common attack string for mysql</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942280</Id>\n                <Type>CRS</Type>\n                <Name>942280 Detects Postgres pg_sleep injection</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942290</Id>\n                <Type>CRS</Type>\n                <Name>942290 Finds basic MongoDB SQL injection attempts</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942300</Id>\n                <Type>CRS</Type>\n                <Name>942300 Detects MySQL comments</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942310</Id>\n                <Type>CRS</Type>\n                <Name>942310 Detects chained SQL injection attempts 2/2</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942320</Id>\n                <Type>CRS</Type>\n                <Name>942320 Detects MySQL and PostgreSQL stored procedure/function injections</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942330</Id>\n                <Type>CRS</Type>\n                <Name>942330 Detects classic SQL injection probings 1/3</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942340</Id>\n                <Type>CRS</Type>\n                <Name>942340 Detects basic SQL authentication bypass attempts 3/3</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942350</Id>\n                <Type>CRS</Type>\n                <Name>942350 Detects MySQL UDF injection and other data/structure manipulation attempts</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942360</Id>\n                <Type>CRS</Type>\n                <Name>942360 Detects concatenated basic SQL injection and SQLLFI attempts</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942361</Id>\n                <Type>CRS</Type>\n                <Name>942361 Detects basic SQL injection based on keyword alter or union</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942370</Id>\n                <Type>CRS</Type>\n                <Name>942370 Detects classic SQL injection probings 2/3</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942380</Id>\n                <Type>CRS</Type>\n                <Name>942380 SQL Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942390</Id>\n                <Type>CRS</Type>\n                <Name>942390 SQL Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942400</Id>\n                <Type>CRS</Type>\n                <Name>942400 SQL Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942410</Id>\n                <Type>CRS</Type>\n                <Name>942410 SQL Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942420</Id>\n                <Type>CRS</Type>\n                <Name>942420 Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (8)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942421</Id>\n                <Type>CRS</Type>\n                <Name>942421 Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942430</Id>\n                <Type>CRS</Type>\n                <Name>942430 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942431</Id>\n                <Type>CRS</Type>\n                <Name>942431 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942432</Id>\n                <Type>CRS</Type>\n                <Name>942432 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (2)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942440</Id>\n                <Type>CRS</Type>\n                <Name>942440 SQL Comment Sequence Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942450</Id>\n                <Type>CRS</Type>\n                <Name>942450 SQL Hex Encoding Identified</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942460</Id>\n                <Type>CRS</Type>\n                <Name>942460 Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942470</Id>\n                <Type>CRS</Type>\n                <Name>942470 SQL Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942480</Id>\n                <Type>CRS</Type>\n                <Name>942480 SQL Injection Attack</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942490</Id>\n                <Type>CRS</Type>\n                <Name>942490 Detects classic SQL injection probings 3/3</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942500</Id>\n                <Type>CRS</Type>\n                <Name>942500 MySQL in-line comment detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942510</Id>\n                <Type>CRS</Type>\n                <Name>942510 SQLi bypass attempt by ticks or backticks detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>942511</Id>\n                <Type>CRS</Type>\n                <Name>942511 SQLi bypass attempt by ticks detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>943100</Id>\n                <Type>CRS</Type>\n                <Name>943100 Possible Session Fixation Attack: Setting Cookie Values in HTML</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>943110</Id>\n                <Type>CRS</Type>\n                <Name>943110 Possible Session Fixation Attack: SessionID Parameter Name with Off-Domain Referer</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>943120</Id>\n                <Type>CRS</Type>\n                <Name>943120 Possible Session Fixation Attack: SessionID Parameter Name with No Referer</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944100</Id>\n                <Type>CRS</Type>\n                <Name>944100 Remote Command Execution: Suspicious Java class detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944110</Id>\n                <Type>CRS</Type>\n                <Name>944110 Remote Command Execution: Java process spawn (CVE-2017-9805)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944120</Id>\n                <Type>CRS</Type>\n                <Name>944120 Remote Command Execution: Java serialization (CVE-2015-4852)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944130</Id>\n                <Type>CRS</Type>\n                <Name>944130 Suspicious Java class detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944200</Id>\n                <Type>CRS</Type>\n                <Name>944200 Magic bytes Detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944210</Id>\n                <Type>CRS</Type>\n                <Name>944210 Magic bytes Detected Base64 Encoded</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944240</Id>\n                <Type>CRS</Type>\n                <Name>944240 Remote Command Execution: Java serialization (CVE-2015-4852)</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944250</Id>\n                <Type>CRS</Type>\n                <Name>944250 Remote Command Execution: Suspicious Java method detected</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>944300</Id>\n                <Type>CRS</Type>\n                <Name>944300 Base64 encoded string matched suspicious keyword</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>950100</Id>\n                <Type>CRS</Type>\n                <Name>950100 The Application Returned a 500-Level Status Code</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>950130</Id>\n                <Type>CRS</Type>\n                <Name>950130 Directory Listing</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>950140</Id>\n                <Type>CRS</Type>\n                <Name>950140 CGI source code leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951110</Id>\n                <Type>CRS</Type>\n                <Name>951110 Microsoft Access SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951120</Id>\n                <Type>CRS</Type>\n                <Name>951120 Oracle SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951130</Id>\n                <Type>CRS</Type>\n                <Name>951130 DB2 SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951140</Id>\n                <Type>CRS</Type>\n                <Name>951140 EMC SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951150</Id>\n                <Type>CRS</Type>\n                <Name>951150 firebird SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951160</Id>\n                <Type>CRS</Type>\n                <Name>951160 Frontbase SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951170</Id>\n                <Type>CRS</Type>\n                <Name>951170 hsqldb SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951180</Id>\n                <Type>CRS</Type>\n                <Name>951180 informix SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951190</Id>\n                <Type>CRS</Type>\n                <Name>951190 ingres SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951200</Id>\n                <Type>CRS</Type>\n                <Name>951200 interbase SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951210</Id>\n                <Type>CRS</Type>\n                <Name>951210 maxDB SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951220</Id>\n                <Type>CRS</Type>\n                <Name>951220 mssql SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951230</Id>\n                <Type>CRS</Type>\n                <Name>951230 mysql SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951240</Id>\n                <Type>CRS</Type>\n                <Name>951240 postgres SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951250</Id>\n                <Type>CRS</Type>\n                <Name>951250 sqlite SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>951260</Id>\n                <Type>CRS</Type>\n                <Name>951260 Sybase SQL Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>952100</Id>\n                <Type>CRS</Type>\n                <Name>952100 Java Source Code Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>952110</Id>\n                <Type>CRS</Type>\n                <Name>952110 Java Errors</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>953100</Id>\n                <Type>CRS</Type>\n                <Name>953100 PHP Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>953110</Id>\n                <Type>CRS</Type>\n                <Name>953110 PHP source code leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>953120</Id>\n                <Type>CRS</Type>\n                <Name>953120 PHP source code leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954100</Id>\n                <Type>CRS</Type>\n                <Name>954100 Disclosure of IIS install location</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954110</Id>\n                <Type>CRS</Type>\n                <Name>954110 Application Availability Error</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954120</Id>\n                <Type>CRS</Type>\n                <Name>954120 IIS Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>954130</Id>\n                <Type>CRS</Type>\n                <Name>954130 IIS Information Leakage</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980100</Id>\n                <Type>CRS</Type>\n                <Name>980100 Correlated Successful Attack Identified: (Total Score: %{tx.anomaly_score}) Inbound Attack (Inbound</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980110</Id>\n                <Type>CRS</Type>\n                <Name>980110 Correlated Attack Attempt Identified: (Total Score: %{tx.anomaly_score}) Inbound Attack (Inbound An</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980120</Id>\n                <Type>CRS</Type>\n                <Name>980120 Inbound Anomaly Score (Total Inbound Score: %{TX.INBOUND_ANOMALY_SCORE} - SQLI=%{tx.sql_injection_s</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980130</Id>\n                <Type>CRS</Type>\n                <Name>980130 Inbound Anomaly Score Exceeded (Total Inbound Score: %{TX.INBOUND_ANOMALY_SCORE} - SQLI=%{tx.sql_in</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980140</Id>\n                <Type>CRS</Type>\n                <Name>980140 Outbound Anomaly Score Exceeded (score %{TX.OUTBOUND_ANOMALY_SCORE}): individual paranoia level sco</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>980150</Id>\n                <Type>CRS</Type>\n                <Name>980150 Outbound Anomaly Score (Total Outbound Score: %{TX.OUTBOUND_ANOMALY_SCORE}): individual paranoia le</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>known</Id>\n                <Type>custom</Type>\n                <Name>known</Name>\n                <Enabled>no</Enabled>\n                <Runfirst>no</Runfirst>\n            </Rule>\n            <Rule>\n                <Id>nextcloud</Id>\n                <Type>workload</Type>\n                <Name>nextcloud</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>dokuwiki</Id>\n                <Type>workload</Type>\n                <Name>dokuwiki</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>cpanel</Id>\n                <Type>workload</Type>\n                <Name>cpanel</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>wordpress</Id>\n                <Type>workload</Type>\n                <Name>wordpress</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>xenforo</Id>\n                <Type>workload</Type>\n                <Name>xenforo</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n            <Rule>\n                <Id>drupal</Id>\n                <Type>workload</Type>\n                <Name>drupal</Name>\n                <Enabled>no</Enabled>\n            </Rule>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"92a4e02f-c288-4cf5-b74e-b2416a7d1258"}],"id":"63538773-2629-4797-a970-2a1e1d223d9f","description":"<p><strong>Note:</strong> Commands used under this section are not supported in the LTSF LoadMaster version yet.</p>\n","_postman_id":"63538773-2629-4797-a970-2a1e1d223d9f"}],"id":"c5b773f5-fe41-4c3b-813f-f91aebd56c7c","description":"<blockquote>\n<p>The following commands only work on a LoadMaster with a WAF-enabled license. </p>\n</blockquote>\n<p>You can configure the following WAF parameters using the <strong>modvs</strong> commands.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><b>Default</b></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>Intercept</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>You can set the <b>Intercept</b> parameter to <b>1</b> to enable Legacy WAF. Setting Intercept to 0 disables WAF.<br /><b>Note: </b>Legacy WAF was deprecated and removed from the LoadMaster in version 7.2.61 - to enable OWASP WAF use the <b>InterceptMode </b>parameter.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>InterceptMode</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Legacy</p><p>2 – OWASP</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>You cannot switch from one WAF mode to another. You must first disable WAF (set <b>InterceptMode </b>to <b>0</b>) and then you can switch to the other mode.<br /><b>Note: </b>Legacy WAF was deprecated and removed from the LoadMaster in version 7.2.61 - to enable OWASP WAF set the <b>InterceptMode </b>parameter to <b>2</b>.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>InterceptOpts</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div>unset</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div>Most of the fields in the WAF Options (Legacy) section of the Virtual Service modify screen in the LoadMaster UI can be set using this parameter. For further details, refer to the following section:<br /><a href=\"#712f0f9b-7cc3-475a-809a-fc883f020446\">WAF InterceptOpts Parameter</a>.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>OwaspOpts</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div>unset</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div>Some of the OWASP WAF Virtual Service parameters can be set using this parameter. For further details, refer to the following section:<br /><a href=\"#bb282454-7d11-4b6e-a2f0-8d19388b5943\">WAF OwaspOpts Parameter</a>.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>BlockingParanoia</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>1</div><div><div><div><div></div></div></div><div></div></div></td><td><div>1 - 4</div><div><div><div><div></div></div></div><div></div></div></td><td><div>The paranoia level at which the OWASP engine blocks the request coming from the server.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>ExecutingParanoia</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>1</div><div><div><div><div></div></div></div><div></div></div></td><td><div>1 - 4</div><div><div><div><div></div></div></div><div></div></div></td><td><div>The paranoia level at which the OWASP engine logs requests that are coming from the server. This value should not be lower than the BlockingParanoia level</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>AnomalyScoringThreshold</div><div><div><div><div></div></div></div><div></div></div></td><td><div>i</div><div><div><div><div></div></div></div><div></div></div></td><td><div>100</div><div><div><div><div></div></div></div><div></div></div></td><td><div>1 - 10000</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Set the Anomaly Scoring Threshold value. Every detection rule in the CRS raises the anomaly score. If the cumulative anomaly score per request hits the configured limit, the request will be blocked</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>pcrelimit</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>10000</div><div><div><div><div></div></div></div><div></div></div></td><td><div>1000 - 9999999</div><div><div><div><div></div></div></div><div></div></div></td><td><div>This setting sets the maximum iterations that the internal PCRE engine will use to resolve a regular expression before failing a match.<br /><b>Note:</b> The default value is 3000 in the LTSF LoadMaster version.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>JSONDLimit</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>10000</div><div><div><div><div></div></div></div><div></div></div></td><td><div>1000 - 99999</div><div><div><div><div></div></div></div><div></div></div></td><td><div>This value sets the maximum depth that will be accepted during JSON parsing. Lower values may cause a valid match to fail. Higher values may cause the WAF engine to run slower.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>AlertThreshold</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0 - disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0 - 100000</div><div><div><div><div></div></div></div><div></div></div></td><td><div>This is the threshold of incidents per hour before sending an alert. Setting this to 0 disables alerting.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>InterceptPOSTOtherContentTypes</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div>unset</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div>When the otherctypesenable parameter is enabled, use the InterceptPOSTOtherContentType s parameter to enter a comma separated list of POST content types allowed for WAF analysis, for example text/plain,text/css. By default, all types (other than XML/JSON) are enabled. To set this to any other content types, set the value to any.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>BodyLimit</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div>1024 – 52428800<br /><b>Note:</b> The maximum value for the BodyLimit parameter on LTSF LoadMasters is 10485760.</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Set the maximum size of POST request bodies (in bytes) that the WAF engine will allow through. Higher values require more memory resources and may impact WAF engine performance. The default value is 1048576 bytes.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>PostOtherContentTypes</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When the otherctypesenable parameter is enabled, use the POSTOtherContentTypes parameter to enter a comma separated list of POST content types allowed for WAF analysis, for example text/plain,text/css. By default, all types (other than XML/JSON) are enabled. To set this to any other content types, set the value to any.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>IPReputationBlocking</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enables the checking of client addresses against the IP reputation database.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>RuleSets</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div>In OWASP CRS rulesets are described by three digit numbers. Specify the three digit number of the rulesets you wish to enable. For example: RuleSets=911, 913, 920….</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>ExcludedWorkLoads</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div>Specify a list of workloads that the customer is running. By default, some workloads cause a lot of false positives, if someone is running one of workloads (drupal, wordpress, nextcloud, dokuwiki, cpanel, xenforo), add its name to the list will stop certain checks that are known to cause problems.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>BlockedCountries</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enter the two letter country codes that are to be blocked.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>AuditParts</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div>ABEFHKZ</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enter a valid string which contains the sections that are to be put in the wafaudit log for each request. Currently, only four values B, E, F, H are enabled.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>CustomRules</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div>Specify a list of custom rules that are to be configured for the Virtual Service.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>DisabledRules</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div>Specify a list of disabled rules.</div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","_postman_id":"c5b773f5-fe41-4c3b-813f-f91aebd56c7c"}],"id":"6f7dbbc3-0c37-4b38-9ff9-1cefd7726875","description":"<p>This section contains details about commands relating to Virtual Service configuration.</p>\n<p>Virtual Services can be addressed either by using the IP address or the index (ID). The index is a numerical value that tracks the Virtual Service internally.</p>\n<p>You can retrieve the ID by using the <strong>showvs</strong> or <strong>listvs</strong> command. Alternatively, you can check the Virtual Service modify screen in the UI, which displays the Virtual Service ID, for example:<br /><strong>Properties for udp/</strong><em><strong>IPAddress</strong></em><strong>:53 (Id:4)</strong>.</p>\n","_postman_id":"6f7dbbc3-0c37-4b38-9ff9-1cefd7726875"},{"name":"Global Balancing","item":[{"name":"Manage Fully Qualified Domain Names (FQDNs)","item":[{"name":"List FQDNs","id":"a7dc44eb-1329-4e0f-bc83-9cc4b7a35e62","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listfqdns","description":"<p>The existing FQDNs can be listed by running the <b>listfqdns</b> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listfqdns"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"3b929b3b-8060-432e-bb3a-2e6d19f3c5f6","name":"List FQDNs","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listfqdns"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 10:21:13 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <fqdn>\n                <Status>Down</Status>\n                <FullyQualifiedDomainName>example.com.</FullyQualifiedDomainName>\n                <SelectionCriteria>rr</SelectionCriteria>\n                <FailTime>0</FailTime>\n                <SiteRecoveryMode>auto</SiteRecoveryMode>\n                <Mapping></Mapping>\n                <failover>N</failover>\n                <publicRequestValue>0</publicRequestValue>\n                <privateRequestValue>0</privateRequestValue>\n                <EcsForPubPriv>0</EcsForPubPriv>\n                <LocalSettings>0</LocalSettings>\n                <UnanimousChecks>N</UnanimousChecks>\n            </fqdn>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"a7dc44eb-1329-4e0f-bc83-9cc4b7a35e62"},{"name":"Add an FQDN","id":"065335dc-e5b9-40fd-ab42-5f0406e160bb","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addfqdn?fqdn=Example3.com","description":"<p>You can add an FQDN by running the <strong>addfqdn</strong> command.</p>\n<blockquote>\n<p>fqdn is a required parameter for this command. </p>\n</blockquote>\n<blockquote>\n<p>As of LoadMaster version 7.2.60.1, underscores are supported in the <strong>fqdn</strong> parameter. </p>\n</blockquote>\n<blockquote>\n<p>The FQDN can be a maximum of 63 characters long.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addfqdn"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example3.com"}],"variable":[]}},"response":[{"id":"5b90f2a7-bbf3-47f4-92bc-fe853978f188","name":"Add an FQDN","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addfqdn?fqdn=Example3.com","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addfqdn"],"query":[{"key":"fqdn","value":"Example3.com"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:11:08 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Added FQDN Example3.com</Success>\n</Response>"}],"_postman_id":"065335dc-e5b9-40fd-ab42-5f0406e160bb"},{"name":"Modify an FQDN","id":"15bcd7f8-6e36-41d0-9308-5772cffdf4c8","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modfqdn?fqdn=Example2.com&SelectionCriteria=wrr","description":"<p>An existing FQDN can be modified by running the <strong>modfqdn</strong> command.</p>\n<p>The <strong>modfqdn</strong> command accepts the following optional parameters:</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Default</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Additional Information</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>SelectionCriteria</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>rr</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>rr = round robin</p><p>wrr = weighted round robin</p><p>fw = fixed weighting</p><p>rsr = real server load</p><p>prx = proximity</p><p>lb = location based</p><p>all = all available</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The selection criteria for addresses associated with the FQDN. For a description of each of these options, refer to the <b>GEO, Feature Description </b>on the <a href=\"https://kemptechnologies.com/documentation\">Documentation Page</a>.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>FailTime</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-1440 (minutes)</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>If a failure delay is not set, normal health checking is performed. If set, this parameter defines the number of minutes to wait after a failure before finally disabling it. Once it is disabled, it will not normally be brought back into operation.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>siterecoverymode</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>auto</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>auto - automatic</p><p>manual - manual</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter defines the Site Recovery Mode.</p><p>If this is set to automatic, upon site recovery the site is brought back into operation immediately.</p><p>If this is set to manual, once the site has failed, the site is disabled. Manual intervention is required to restore normal operation.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>failover</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter is only relevant if the <b>SelectionCriteria </b>is set to <b>lb </b>(Location Based).</p><p>Enable/disable FQDN failover.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>publicRequestValue</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Public Sites Only</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Public Sites Only</p><p>1 – Prefer Public Sites</p><p>2 – Prefer Private Sites</p><p>3- Any Sites</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Restrict responses to clients from public IP addresses to specific classes of site. For an explanation of the different settings and their values please see the section<b> Public Requests &amp; Private Requests  </b>below including the table</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>privateRequestValue</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Private Sites Only</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Private Sites Only</p><p>1 – Prefer Private Sites</p><p>2 – Prefer Public Sites</p><p>3 – Any Sites</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Restrict responses to clients from private IP addresses to specific classes of site. For an explanation of the different settings and their values please see the section <b>Public Requests &amp; Private Requests  </b>below including the table</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>ecsforpubpriv</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>When this parameter is disabled, the device uses the client request’s source IP address to determine if the request is public or private. When enabled, the device uses the EDNS Client Subnet (ECS) value instead (if one is received) to determine if the request is public or private. This option becomes inactive in either of the following conditions:<br />- The <b>EDNS Client Subnet (ECS)</b> option (in <b>Global Balancing &gt; Miscellaneous Params</b>) is disabled.<br /><br />- The <b>Public Requests</b> and <b>Private Requests</b> values are both set to <b>All Sites</b>.<br /><b>Note: </b>This parameter is not supported in the LTSF LoadMaster version yet.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>LocalSettings</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabling this parameter provides two additional parameters for the FQDN – <b>localttl </b>and <b>localsticky</b>.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>localttl</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Defaults to the value of the global <b>ttl </b>value when an FQDN is created.</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>1 to 86400</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The Time To Live (TTL) value dictates how long the reply from the GEO LoadMaster can be cached by other DNS servers or client devices. The time interval is defined in seconds. This value should be as practically low as possible. The default value for this field is 10.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>localsticky</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Defaults to the value of the global <b>persist </b>value when an FQDN is created.</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 to 86400</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Stickiness, also known as persistence, is the property that enables all name resolution requests from an individual client to be sent to the same resources until a specified period of time has elapsed.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>unanimouschecks</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When this parameter is enabled, if any IP addresses fail health checking - the other FQDN IP addresses which belong to the same cluster will be forced down.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>\n\n<p><strong>Public Requests &amp; Private Requests</strong></p>\n<p>The <strong>Public Requests</strong> and <strong>Private Requests</strong> options replace the old Isolate Public/Private Sites option which was available on LoadMasters with firmware up to and including 7.1-28. The new settings offer administrators greater flexibility when configuring an FQDN.</p>\n<p>These new settings allow administrators to selectively respond with public or private sites based on whether the client is from a public or private IP. For example, administrators may wish to allow only private clients to be sent to private sites.</p>\n<p>The following table outlines settings and their configurable values:</p>\n<table><tbody><tr><td><div><p><b>Setting</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Value</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Client Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Site Types Allowed</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>PublicRequests</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Public Only</p><p>Prefer Public</p><p>Prefer Private</p><p>All Sites</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Public</p><p>Public</p><p>Public</p><p>Public</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Public</p><p>Public, Private if no public</p><p>Private, Public if no private</p><p>Private and Public</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Private Requests</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Private Only</p><p>Prefer Private</p><p>Prefer Public</p><p>All Sites</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Private</p><p>Private</p><p>Private</p><p>Private</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Private</p><p>Private, Public if no private</p><p>Public, Private if no public</p><p>Private and Public</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modfqdn"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"SelectionCriteria","value":"wrr"}],"variable":[]}},"response":[{"id":"66c65a51-a87e-4ce2-ad75-418937b94da9","name":"Modify an FQDN","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modfqdn?fqdn=Example2.com&SelectionCriteria=wrr","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modfqdn"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"SelectionCriteria","value":"wrr"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:13:17 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <fqdn>\n                <Status>Down</Status>\n                <FullyQualifiedDomainName>Example2.com.</FullyQualifiedDomainName>\n                <SelectionCriteria>wrr</SelectionCriteria>\n                <FailTime>0</FailTime>\n                <SiteRecoveryMode>auto</SiteRecoveryMode>\n                <Mapping></Mapping>\n                <failover>N</failover>\n                <publicRequestValue>0</publicRequestValue>\n                <privateRequestValue>0</privateRequestValue>\n                <EcsForPubPriv>0</EcsForPubPriv>\n                <LocalSettings>0</LocalSettings>\n                <UnanimousChecks>N</UnanimousChecks>\n            </fqdn>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"15bcd7f8-6e36-41d0-9308-5772cffdf4c8"},{"name":"Show an FQDN","id":"db016a6c-df59-4569-a973-8368debefe9a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showfqdn?fqdn=Example2.com","description":"<p>The <b>showfqdn</b> command displays various details relating to the specified FQDN.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showfqdn"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example2.com"}],"variable":[]}},"response":[{"id":"6201b99e-4413-4ef2-9db8-72ce270c7751","name":"Show an FQDN","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showfqdn?fqdn=Example2.com","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","showfqdn"],"query":[{"key":"fqdn","value":"Example2.com"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:14:44 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <fqdn>\n                <Status>Down</Status>\n                <FullyQualifiedDomainName>Example2.com.</FullyQualifiedDomainName>\n                <SelectionCriteria>wrr</SelectionCriteria>\n                <FailTime>0</FailTime>\n                <SiteRecoveryMode>auto</SiteRecoveryMode>\n                <Mapping></Mapping>\n                <failover>N</failover>\n                <publicRequestValue>0</publicRequestValue>\n                <privateRequestValue>0</privateRequestValue>\n                <EcsForPubPriv>0</EcsForPubPriv>\n                <LocalSettings>0</LocalSettings>\n                <UnanimousChecks>N</UnanimousChecks>\n            </fqdn>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"db016a6c-df59-4569-a973-8368debefe9a"},{"name":"Delete an FQDN","id":"1bd3781c-7e80-4e68-8f7b-37a253abb262","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delfqdn?fqdn=Example.com","description":"<p>An FQDN can be deleted by running the <b>delfqdn</b> command.</p>\n<blockquote>\n<p><b>fqdn</b> is a required parameter for this command.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delfqdn"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example.com"}],"variable":[]}},"response":[{"id":"f3d8e181-39a7-4678-9541-5f9d580378a5","name":"Delete an FQDN","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delfqdn?fqdn=Example.com","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delfqdn"],"query":[{"key":"fqdn","value":"Example.com"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:15:29 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Deleted FQDN Example.com.</Success>\n</Response>"}],"_postman_id":"1bd3781c-7e80-4e68-8f7b-37a253abb262"},{"name":"Add an IP Address to an FQDN","id":"f5aa035f-6bef-4ea6-9b96-949febfa624d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addmap?fqdn=Example2.com&ip=InsertIPAddress&cluster=ExampleCluster","description":"<p>You can add an IP address to an FQDN by running the <strong>addmap</strong> command.</p>\n<blockquote>\n<p>In LoadMaster firmware versions prior to 7.2.57, there is an entry limit of 64 IP addresses per FQDN. If you attempt to add more than this, you get an error message saying Too many IP addresses already specified.<br />The entry limit was increased to 256 IP addresses in LoadMaster firmware version 7.2.57. It is recommended that the LoadMaster should have 8GB memory space to configure the 256 IP addresses per FQDN.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addmap"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"cluster","value":"ExampleCluster"}],"variable":[]}},"response":[{"id":"98ef1bc6-974e-4f14-b782-9ade94ceec38","name":"Add an IP Address to an FQDN","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addmap?fqdn=Example2.com&ip=InsertIPAddress&cluster=ExampleCluster","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addmap"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"cluster","value":"ExampleCluster"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:17:31 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Added Map IPAddressWouldAppearHere to FQDN Example2.com.</Success>\n</Response>"}],"_postman_id":"f5aa035f-6bef-4ea6-9b96-949febfa624d"},{"name":"Configure Settings for an IP Address in an FQDN","id":"e59a2554-16fc-425e-b606-eda80a13bbcb","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modmap?fqdn=Example2.com&ip=InsertIPAddress&checker=icmp","description":"<p>To configure settings for an IP address in an FQDN, run the <strong>modmap</strong> command.</p>\n<p>The <strong>modmap</strong> command accepts the following optional parameters:</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Default</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Additional Information</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Checker</p><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>icmp</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>none</p><p>icmp</p><p>tcp</p><p>clust</p><p>http</p><p>https</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the type of checking to be done on this IP address</p><p>Setting the <b>Checker </b>parameter value to <b>none </b>will delete the health check.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>checkerurl</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div>/</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Maximum of 127 characters</div><div><div><div><div></div></div></div><div></div></div></td><td><div>By default, the health checker tries to access the URL forward slash (/) to determine if the machine is available. You can specify a different URL using the <b>checkerurl </b>parameter. The URL must begin with a forward slash (/). The URL cannot contain <b>http:</b> or <b>https:</b>. The URL can be a maximum of 127 characters.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>checkercodes</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div>300-599</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div>A space-separated list of HTTP status codes that should be treated as successful when received from the server. There is a maximum of 32 codes. There is a limit of 127 characters.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>checkerhost</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div>A hostname can be supplied in the request to the server. If this is not set, the server address is sent as the host. There is a limit of 127 characters. Allowed characters: alphanumerics and <b>-._:</b></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>checkerhttpmethod</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div>get</div><div><div><div><div></div></div></div><div></div></div></td><td><div>1 - GET<br />2 - POST<br />3 - HEAD<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div>When accessing the health check URL, the system can use the <b>GET</b>, the <b>POST</b>,<b> </b>or the <b>HEAD </b>method. If <b>POST </b>is selected, the <b>checkerpostdata </b>parameter is also valid.<br /><b>Note:</b> The <b>HEAD</b> method is not supported in the LTSF LoadMaster version yet.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>checkerpostdata</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Up to 2047 characters of POST data can be passed to the server. This parameter is only relevant if the <b>checkerhttpmethod </b>parameter is set to <b>2 </b>(POST).</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>checkerheaders</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div>You can specify a pipe-separated list of custom header key and value pairs that are to be part of the health check request. The key and value are separated by a colon (in the example below the key for the first key value pair is <b>ab </b>and the value is <b>er</b>). You can specify a maximum of 255 characters for the <b>checkheaders</b> parameter. Allowed characters for header keys (the part before the colon) are alphanumerics and <b>_-</b>. Allowed characters for header values (the part after the colon) are alphanumerics and <b>_-.+=;()</b>.<br />For example:<br /><b>access/modmap?ip=1.1.1.5&amp;fqdn=Example.com&amp;checkerheaders=ab:er|ry:esNote:</b> You can specify a maximum of four custom headers.<br /><b>Note: </b>Setting the <b>checkerheaders</b> parameter will overwrite any previously set values for this parameter.<br /><b>Note:</b> This parameter is not supported in the LTSF LoadMaster version yet.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Weight</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>1000</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>1-65535</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the weight associated with the IP address. The address with the highest weight is returned. This is only relevant if the <b>Selection Criteria </b>for the FQDN is set to <b>Weighted Round Robin</b> or <b>Fixed Weighting</b>.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Enable</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>1 – Enable</p><p>0 – Disable</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enable or disable the IP address.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Cluster</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the ID number of the cluster to associate with the IP address.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>MapAddress</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This is only relevant when the <b>Selection Criteria </b>is set to<b> Real Server Load</b>, the <b>Checker </b>is set to <b>Cluster Checks</b> and the cluster is of type <b>Remote LM</b> or <b>Local LM</b>.</p><p>Enter a Virtual Service IP address to be mapped from the relevant LoadMaster.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>MapPort</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This is only relevant when the <b>Selection Criteria </b>is set to <b>Real Server Load</b>, the <b>Checker </b>is set to <b>Cluster Checks </b>and the cluster is of type <b>Remote LM</b> or Local LM.</p><p>This parameter is used in conjunction with the <b>MapAddress </b>parameter to specify an IP address and port combination to be mapped.</p><p>If this parameter is not set, the health check will check all Virtual Services with the same IP address as the one selected. If one of them is in an “Up” status, the FQDN will show as “Up”. If a port is specified, the health check will only check against the health of that Virtual Service when checking the health of the FQDN.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>\n\n<blockquote>\n<p>The maximum length of an API call is 1024 characters. If you want to make a larger call, use the POST method.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modmap"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"checker","value":"icmp"}],"variable":[]}},"response":[{"id":"e8a17def-3167-4aa4-b47b-f685508d7293","name":"Configure Settings for an IP Address in an FQDN","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modmap?fqdn=Example2.com&ip=InsertIPAddress&checker=icmp","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modmap"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"checker","value":"icmp"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:19:57 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <fqdn>\n                <Status>Up</Status>\n                <FullyQualifiedDomainName>Example2.com.</FullyQualifiedDomainName>\n                <SelectionCriteria>wrr</SelectionCriteria>\n                <FailTime>0</FailTime>\n                <SiteRecoveryMode>auto</SiteRecoveryMode>\n                <Mapping>1</Mapping>\n                <failover>N</failover>\n                <publicRequestValue>0</publicRequestValue>\n                <privateRequestValue>0</privateRequestValue>\n                <EcsForPubPriv>0</EcsForPubPriv>\n                <LocalSettings>0</LocalSettings>\n                <UnanimousChecks>N</UnanimousChecks>\n                <Map>\n                    <Status>Up</Status>\n                    <Index>1</Index>\n                    <IPAddress>IP address would appear here</IPAddress>\n                    <Checker>icmp</Checker>\n                    <CheckerPort>0</CheckerPort>\n                    <CheckerHttpMethod>1</CheckerHttpMethod>\n                    <CheckerHeaders></CheckerHeaders>\n                    <Weight>1000</Weight>\n                    <Enable>Y</Enable>\n                </Map>\n            </fqdn>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"e59a2554-16fc-425e-b606-eda80a13bbcb"},{"name":"Specify the Virtual Service that is Associated with the IP Address","id":"13ffd568-af5a-4ceb-8f6f-fc2786d213a0","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geochangecheckermapping?fqdn=Example2.com&fqdnip=InsertIPAddress&remvip=InsertVirtualServiceIPAddress&remport=80","description":"<p>To specify the Virtual Service that is associated with the IP address, run the <strong>geochangecheckermapping</strong> command. The following parameter combinations are valid to provide when running this command:</p>\n<ul>\n<li><strong>remvip</strong> and <strong>remport</strong> - The Virtual Service IP address and port</li>\n<li><strong>remname</strong> and <strong>remport</strong> - The Virtual Service name and port</li>\n</ul>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geochangecheckermapping"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"fqdnip","value":"InsertIPAddress"},{"key":"remvip","value":"InsertVirtualServiceIPAddress"},{"key":"remport","value":"80"}],"variable":[]}},"response":[{"id":"56fe85fe-2ac3-40bc-bed4-aefcdf5a455c","name":"Specify the Virtual Service that is Associated with the IP Address","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geochangecheckermapping?fqdn=Example2.com&fqdnip=InsertIPAddress&remvip=InsertVirtualServiceIPAddress&remport=80","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","geochangecheckermapping"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"fqdnip","value":"InsertIPAddress"},{"key":"remvip","value":"InsertVirtualServiceIPAddress"},{"key":"remport","value":"80"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 19 Aug 2024 09:58:03 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<response stat=\"200\">\n    <message>Command completed ok</message>\n    <status>ok</status>\n</response>"}],"_postman_id":"13ffd568-af5a-4ceb-8f6f-fc2786d213a0"},{"name":"Change the Location of an IP Address in an FQDN","id":"aabadeff-ebcc-47da-9689-0e61cadc93dd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/changemaploc?fqdn=Example2.com&ip=InsertIPAddress&lat=3661&long=3661","description":"<p>To change the location of an IP address in an FQDN, run the <strong>changemaploc</strong> command.</p>\n<blockquote>\n<p>This command is only relevant when the <strong>Selection Criteria</strong> for the FQDN is set to <strong>Proximity</strong>.</p>\n</blockquote>\n<p>The <strong>lat</strong> and <strong>long</strong> values should be entered as an integer containing the total seconds. This total seconds value is converted to degrees, minutes and seconds when displayed in the UI.</p>\n<blockquote>\n<p>To set north and east coordinates use a positive integer value. To set south and west coordinates use a negative integer value.</p>\n</blockquote>\n<p>There are 60 seconds in a minute and 60 minutes in a degree.</p>\n<p>Degrees = º</p>\n<p>Minutes = ‘</p>\n<p>Seconds = “</p>\n<p>60” = 1’</p>\n<p>3600” = 1º</p>\n<p>3660 = 1º1’</p>\n<p>3661 = 1º1’1”</p>\n<p>You can also represent this as a decimal value for degrees where the minutes and seconds are divided by 3600 to get the decimal value.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","changemaploc"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"lat","value":"3661"},{"key":"long","value":"3661"}],"variable":[]}},"response":[{"id":"915226b3-de88-4b4e-957a-411f93d4e65d","name":"Change the Location of an IP Address in an FQDN","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/changemaploc?fqdn=Example2.com&ip=InsertIPAddress&lat=3661&long=3661","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","changemaploc"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"lat","value":"3661"},{"key":"long","value":"3661"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:25:27 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Map location updated</Success>\n</Response>"}],"_postman_id":"aabadeff-ebcc-47da-9689-0e61cadc93dd"},{"name":"Change Checker Address","id":"da594616-fede-4a4d-abda-7d133d02455d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/changecheckeraddr?fqdn=Example2.com&ip=InsertIPAddress&checkerip=InsertCheckerIPAddress&port=80","description":"<p>To change the address of a checker, run the <strong>changecheckeraddr</strong> command.</p>\n<p>The <strong>changecheckeraddr</strong> command requires the following parameters:</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Range</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>checkerip</p><p> </p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Specify the address used to health check the IP address.</p></td></tr><tr><td><p>port</p></td><td><p>I</p></td><td><p>80</p></td><td><p>1-65530</p></td><td><p>Specify the port used to health check the IP address.</p></td></tr></tbody></table>\n\n<p>Specifying an empty value for the the <strong>checkerip</strong> or <strong>port</strong> parameters sets them to their default values (blank for the <strong>checkerip</strong> and <strong>80</strong> for the port).</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","changecheckeraddr"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"checkerip","value":"InsertCheckerIPAddress"},{"key":"port","value":"80"}],"variable":[]}},"response":[{"id":"f6192543-a81e-4fdc-9f7f-9e40799eb7be","name":"Change Checker Address","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/changecheckeraddr?fqdn=Example2.com&ip=InsertIPAddress&checkerip=InsertCheckerIPAddress&port=80","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","changecheckeraddr"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"checkerip","value":"InsertCheckerIPAddress"},{"key":"port","value":"80"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:27:08 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Checker address: IP address would appear here+80</Success>\n</Response>"}],"_postman_id":"da594616-fede-4a4d-abda-7d133d02455d"},{"name":"Delete an IP Address from an FQDN","id":"aed47f06-6d13-4d76-b14a-e88137a49eee","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delmap?fqdn=Example2.com&ip=InsertIPAddress","description":"<p>To delete an IP address from an FQDN, run the <strong>delmap</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delmap"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"}],"variable":[]}},"response":[{"id":"f1cb1fb2-4246-4c78-acb3-2a2b1e3f0e40","name":"Delete an IP Address from an FQDN","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delmap?fqdn=Example2.com&ip=InsertIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delmap"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:29:36 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success> Deleted Map 1 from FQDN Example2.com.</Success>\n</Response>"}],"_postman_id":"aed47f06-6d13-4d76-b14a-e88137a49eee"},{"name":"Add a Location","id":"1fe22027-deae-46ee-be09-f57e74aaa939","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addcountry?fqdn=Example2.com&ip=InsertIPAddress&countrycode=IE&iscontinent=no","description":"<p>To add a country or continent, run the <b>addcountry</b> command.</p>\n<blockquote>\n<p>This command is only relevant when the <b>Selection Criteria</b> for the FQDN is set to <b>Location Based</b>. Refer to the <a href=\"#102aa9bb-63ef-44a5-9c25-581afc53a1e9\">Modify an FQDN</a> section for details on how to modify the <b>Selection Criteria</b>.</p>\n</blockquote>\n<blockquote>\n<p>The FQDN name is case sensitive.</p>\n</blockquote>\n<blockquote>\n<p>The country code and continent codes used are the standard ISO codes.</p>\n</blockquote>\n<blockquote>\n<p>When adding a country - the <b>iscontinent</b> parameter must be set to <b>no</b>.</p>\n</blockquote>\n<blockquote>\n<p>When adding a continent - the <b>iscontinent</b> parameter must be set to <b>yes</b>.</p>\n</blockquote>\n<blockquote>\n<p>The value for <b>countrycode</b> should be in uppercase.</p>\n</blockquote>\n<blockquote>\n<p>To specify everywhere as the country, type <b>ALL</b> as the country code and set the <b>iscontinent</b> parameter to <b>yes</b>.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addcountry"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"countrycode","value":"IE"},{"key":"iscontinent","value":"no"}],"variable":[]}},"response":[{"id":"14074469-7b4b-435d-a74a-95c2e0bb814c","name":"Add a Location","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addcountry?fqdn=Example2.com&ip=InsertIPAddress&countrycode=IE&iscontinent=no","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addcountry"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"countrycode","value":"IE"},{"key":"iscontinent","value":"no"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:31:41 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Country/Continent updated</Success>\n</Response>"}],"_postman_id":"1fe22027-deae-46ee-be09-f57e74aaa939"},{"name":"Add an Existing Custom Location to an FQDN","id":"990bbdc0-f2ac-404a-aca8-9f034ca5a99e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addcountry?fqdn=Example2.com&ip=InsertIPAddress&customlocation=Limerick","description":"<p>To add a custom location, run the <b>addcountry</b> command.</p>\n<blockquote>\n<p>The custom location must already exist in the <b>IP Range Selection Criteria</b>.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addcountry"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"customlocation","value":"Limerick"}],"variable":[]}},"response":[{"id":"3b5defb7-0dbb-4ea2-826d-cd070c22477c","name":"Add an Existing Custom Location to an FQDN","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:{{vault:authorization-password}}@InsertLoadMasterIPAddress/access/addcountry?fqdn=Example2.com&ip=InsertIPAddress&customlocation=Limerick","protocol":"https","auth":{"user":"bal","password":"{{vault:authorization-password}}"},"host":["InsertLoadMasterIPAddress"],"path":["access","addcountry"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"customlocation","value":"Limerick"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:33:51 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Country/Continent updated</Success>\n</Response>"}],"_postman_id":"990bbdc0-f2ac-404a-aca8-9f034ca5a99e"},{"name":"Add a Country/Continent and Custom Location in One Command","id":"7ee41719-54a0-4af3-bcb1-cb851346bd16","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addcountry?fqdn=Example2.com&ip=InsertIPAddress&countrycode=IE&iscontinent=No&customlocation=Limerick","description":"<p>It is also possible to add a country/continent and a custom location in the one command – simply include all of the parameters.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addcountry"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"countrycode","value":"IE"},{"key":"iscontinent","value":"No"},{"key":"customlocation","value":"Limerick"}],"variable":[]}},"response":[{"id":"fcb9a21a-e796-4e9c-8bed-35105778772b","name":"Add a Country/Continent and Custom Location in One Command","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addcountry?fqdn=Example2.com&ip=InsertIPAddress&countrycode=IE&iscontinent=No&customlocation=Limerick","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addcountry"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"countrycode","value":"IE"},{"key":"iscontinent","value":"No"},{"key":"customlocation","value":"Limerick"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:36:02 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Country/Continent updated</Success>\n</Response>"}],"_postman_id":"7ee41719-54a0-4af3-bcb1-cb851346bd16"},{"name":"Remove a Location","id":"51ee3178-f7d0-465a-abe4-4c04fe45b318","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/removecountry?fqdn=Example2.com&ip=InsertIPAddress&countrycode=IE&iscontinent=no","description":"<p>To remove a location, run the <b>removecountry</b> command.</p>\n<blockquote>\n<p>This command is only relevant when the <b>Selection Criteria</b> for the FQDN is set to <b>Location Based</b>.</p>\n</blockquote>\n<blockquote>\n<p>The FQDN name is case sensitive.</p>\n</blockquote>\n<blockquote>\n<p>The country code and continent codes used are the standard ISO codes.</p>\n</blockquote>\n<blockquote>\n<p>When removing a country - the <b>iscontinent</b> parameter must be set to <b>no</b>.</p>\n</blockquote>\n<blockquote>\n<p>When removing a continent - the <b>iscontinent</b> parameter must be set to <b>yes</b>.</p>\n</blockquote>\n<blockquote>\n<p>The value for <b>countrycode</b> should be in uppercase.</p>\n</blockquote>\n<blockquote>\n<p>To specify everywhere as the country, type <b>ALL</b> as the country code and set the <b>iscontinent</b> parameter to <b>yes</b>.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","removecountry"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"countrycode","value":"IE"},{"key":"iscontinent","value":"no"}],"variable":[]}},"response":[{"id":"53493396-e24d-4240-9529-46bd502fa1eb","name":"Remove a Location","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/removecountry?fqdn=Example2.com&ip=InsertIPAddress&countrycode=IE&iscontinent=no","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","removecountry"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"countrycode","value":"IE"},{"key":"iscontinent","value":"no"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:37:32 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"51ee3178-f7d0-465a-abe4-4c04fe45b318"},{"name":"Remove a Custom Location","id":"3276f7bd-d1b9-489a-933b-001988b0b8f3","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/removecountry?fqdn=Example2.com&ip=InsertIPAddress&customlocation=Limerick","description":"<p>To remove a custom location, run the <b>removecountry</b> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","removecountry"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"customlocation","value":"Limerick"}],"variable":[]}},"response":[{"id":"0e155249-426b-4e83-881d-892710377712","name":"Remove a Custom Location","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/removecountry?fqdn=Example2.com&ip=InsertIPAddress&customlocation=Limerick","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","removecountry"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"customlocation","value":"Limerick"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:38:57 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"3276f7bd-d1b9-489a-933b-001988b0b8f3"},{"name":"Remove a Country/Continent and Custom Location in One Command","id":"9743e81e-b4ec-46df-b2c4-610f553b83ed","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/removecountry?fqdn=Example2.com&ip=InsertIPAddress&countrycode=IE&iscontinent=no&customlocation=Limerick","description":"<p>It is possible to remove a country/continent and a custom location in the one command – simply include all of the parameters.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","removecountry"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"countrycode","value":"IE"},{"key":"iscontinent","value":"no"},{"key":"customlocation","value":"Limerick"}],"variable":[]}},"response":[{"id":"a5dacad3-f34f-43be-8c01-3bb568204d3f","name":"Remove a Country/Continent and Custom Location in One Command","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/removecountry?fqdn=Example2.com&ip=InsertIPAddress&countrycode=IE&iscontinent=no&customlocation=Limerick","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","removecountry"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"ip","value":"InsertIPAddress"},{"key":"countrycode","value":"IE"},{"key":"iscontinent","value":"no"},{"key":"customlocation","value":"Limerick"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:40:31 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"9743e81e-b4ec-46df-b2c4-610f553b83ed"},{"name":"Add a New TXT Record","id":"7859e948-5b74-40e6-abe4-630fc9bd388b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrr?fqdn=Example2.com&type=txt&rdata=ExampleResourceRecordData","description":"<p>You can add a new <strong>TXT</strong> record by running the <strong>addrr</strong> command.</p>\n<blockquote>\n<p>As of LoadMaster version 7.2.60.1, underscores are supported in the <strong>value</strong> parameter.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addrr"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"type","value":"txt"},{"key":"rdata","value":"ExampleResourceRecordData"}],"variable":[]}},"response":[{"id":"6c5714bf-7067-4e81-9410-999c73f46351","name":"Add a New TXT Record","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrr?fqdn=Example2.com&type=txt&rdata=ExampleResourceRecordData","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addrr"],"query":[{"key":"fqdn","value":"Example2.com"},{"key":"type","value":"txt"},{"key":"rdata","value":"ExampleResourceRecordData"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:41:41 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"7859e948-5b74-40e6-abe4-630fc9bd388b"},{"name":"Add a New CNAME Record","id":"65e97539-a4df-43c9-a375-5bf1203bec4c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrr?fqdn=fqdn.ZoneNameExample.com&type=cname&name=www.fqdn.ZoneNameExample.com","description":"<p>You can add a new <strong>CNAME</strong> record by running the <strong>addrr</strong> command.</p>\n<p>You can add an FQDN that is unrelated to the FQDN to which the records are being added using the <strong>RDATA</strong> parameter, if desired.</p>\n<blockquote>\n<p>As of LoadMaster version 7.2.60.1, underscores are supported in the <strong>name</strong> parameter.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addrr"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"fqdn.ZoneNameExample.com"},{"key":"type","value":"cname"},{"key":"name","value":"www.fqdn.ZoneNameExample.com"}],"variable":[]}},"response":[{"id":"7e3f6528-1113-47bc-961d-5959c1e1be1a","name":"Add a New CNAME Record","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrr?fqdn=fqdn.ZoneNameExample.com&type=cname&name=www.fqdn.ZoneNameExample.com","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addrr"],"query":[{"key":"fqdn","value":"fqdn.ZoneNameExample.com"},{"key":"type","value":"cname"},{"key":"name","value":"www.fqdn.ZoneNameExample.com"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:43:13 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"65e97539-a4df-43c9-a375-5bf1203bec4c"},{"name":"Add a New MX Record","id":"3a2ef560-6119-4e64-8cb1-71a77d4a08c5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrr?fqdn=fqdn.ZoneNameExample.com&type=mx&rdata=ResourceRecordData3","description":"<p>You can add a new <strong>MX</strong> record by running the <strong>addrr</strong> command.</p>\n<blockquote>\n<p>As of LoadMaster version 7.2.60.1, underscores are supported in the <strong>rdata</strong> parameter</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addrr"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"fqdn.ZoneNameExample.com"},{"key":"type","value":"mx"},{"key":"rdata","value":"ResourceRecordData3"}],"variable":[]}},"response":[{"id":"6a6721a2-7132-4fe9-8736-171381204302","name":"Add a New MX Record","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrr?fqdn=fqdn.ZoneNameExample.com&type=mx&rdata=ResourceRecordData3","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addrr"],"query":[{"key":"fqdn","value":"fqdn.ZoneNameExample.com"},{"key":"type","value":"mx"},{"key":"rdata","value":"ResourceRecordData3"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:44:25 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"3a2ef560-6119-4e64-8cb1-71a77d4a08c5"},{"name":"Modify a TXT Record","id":"d79f2dcd-bca6-48f1-bda3-bdf1dff76d6d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrr?fqdn=fqdn.ZoneNameExample.com&type=txt&param=rdata&value=UpdatedResourceRecordData&id=4","description":"<p>You can modify an existing <strong>TXT</strong> record by running the <strong>addrr</strong> command.</p>\n<p>To retrieve the ID number of an existing record, run the <strong>showfqdn</strong> command.</p>\n<blockquote>\n<p>As of LoadMaster version 7.2.60.1, underscores are supported in the <strong>value</strong> parameter.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modrr"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"fqdn.ZoneNameExample.com"},{"key":"type","value":"txt"},{"key":"param","value":"rdata"},{"key":"value","value":"UpdatedResourceRecordData"},{"key":"id","value":"4"}],"variable":[]}},"response":[{"id":"c938d3c9-8643-42d7-855f-d37ec5248cd0","name":"Modify a TXT Record","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrr?fqdn=fqdn.ZoneNameExample.com&type=txt&param=rdata&value=UpdatedResourceRecordData&id=4","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modrr"],"query":[{"key":"fqdn","value":"fqdn.ZoneNameExample.com"},{"key":"type","value":"txt"},{"key":"param","value":"rdata"},{"key":"value","value":"UpdatedResourceRecordData"},{"key":"id","value":"4"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:51:29 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"d79f2dcd-bca6-48f1-bda3-bdf1dff76d6d"},{"name":"Modify a CNAME Record","id":"ddc62658-bd6c-473f-9600-0e72e3107f1b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrr?fqdn=fqdn.ZoneNameExample.com&type=cname&param=name&value=www2.fqdn.ZoneNameExample.com&id=2","description":"<p>You can modify an existing <strong>CNAME</strong> record by running the <strong>addrr</strong> command.</p>\n<p>To retrieve the ID number of an existing record, run the <strong>showfqdn</strong> command.</p>\n<p>You can add an FQDN that is unrelated to the FQDN to which the records are being added using the <strong>RDATA</strong> parameter, if desired.</p>\n<p>As of LoadMaster version 7.2.60.1, underscores are supported in the <strong>value</strong> parameter.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modrr"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"fqdn.ZoneNameExample.com"},{"key":"type","value":"cname"},{"key":"param","value":"name"},{"key":"value","value":"www2.fqdn.ZoneNameExample.com"},{"key":"id","value":"2"}],"variable":[]}},"response":[{"id":"90931573-6192-4ee6-b7c6-b9accf458cdb","name":"Modify a CNAME Record","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrr?fqdn=fqdn.ZoneNameExample.com&type=cname&param=name&value=www2.fqdn.ZoneNameExample.com&id=2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modrr"],"query":[{"key":"fqdn","value":"fqdn.ZoneNameExample.com"},{"key":"type","value":"cname"},{"key":"param","value":"name"},{"key":"value","value":"www2.fqdn.ZoneNameExample.com"},{"key":"id","value":"2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:49:08 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"ddc62658-bd6c-473f-9600-0e72e3107f1b"},{"name":"Modify an MX Record","id":"88cea29e-0c81-4f0d-beed-fcd8a2360c2a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrr?fqdn=fqdn.ZoneNameExample.com&type=mx&param=rdata&value=NewValue&id=3","description":"<p>You can modify an existing <strong>MX</strong> record by running the <strong>addrr</strong> command.</p>\n<p>When modifying an MX record, you can specify either <strong>rdata</strong> or <strong>priority</strong> as the param, depending on what parameter you want to modify the value for.</p>\n<p>As of LoadMaster version 7.2.60.1, underscores are supported in the <strong>value</strong> parameter when the <strong>param</strong> is <strong>rdata</strong>.</p>\n<p>To retrieve the ID number of an existing record, run the <strong>showfqdn</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modrr"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"fqdn.ZoneNameExample.com"},{"key":"type","value":"mx"},{"key":"param","value":"rdata"},{"key":"value","value":"NewValue"},{"key":"id","value":"3"}],"variable":[]}},"response":[{"id":"7c772216-a57a-4971-8bde-0a67e7422d1b","name":"Modify an MX Record","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrr?fqdn=fqdn.ZoneNameExample.com&type=mx&param=rdata&value=NewValue&id=3","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modrr"],"query":[{"key":"fqdn","value":"fqdn.ZoneNameExample.com"},{"key":"type","value":"mx"},{"key":"param","value":"rdata"},{"key":"value","value":"NewValue"},{"key":"id","value":"3"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:53:01 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"88cea29e-0c81-4f0d-beed-fcd8a2360c2a"},{"name":"Delete an Additional Record","id":"49fc3799-d3c9-429d-9a79-7015cc7d78c2","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrr?fqdn=fqdn.ZoneNameExample.com&id=3","description":"<p>You can delete an existing <strong>TXT</strong>, <strong>CNAME</strong>, <strong>or MX</strong> record by running the <strong>delrr</strong> command.</p>\n<p>To retrieve the ID number of an existing record, run the <strong>showfqdn</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delrr"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fqdn","value":"fqdn.ZoneNameExample.com"},{"key":"id","value":"3"}],"variable":[]}},"response":[{"id":"90d59572-dba2-465c-9b1d-deaa4ab8a18c","name":"Delete an Additional Record","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrr?fqdn=fqdn.ZoneNameExample.com&id=3","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delrr"],"query":[{"key":"fqdn","value":"fqdn.ZoneNameExample.com"},{"key":"id","value":"3"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:54:07 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"49fc3799-d3c9-429d-9a79-7015cc7d78c2"}],"id":"bd80ef2b-c764-44d0-ad30-4d25c02cb28c","description":"<p>The commands in this section relate to GEO FQDNs.</p>\n","_postman_id":"bd80ef2b-c764-44d0-ad30-4d25c02cb28c"},{"name":"Manage Clusters","item":[{"name":"List Clusters","id":"d81fa061-aeb6-4d7b-85b6-e234b9656540","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listclusters","description":"<p>You can list existing clusters by running the <b>listclusters</b> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listclusters"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"e256f0a6-a5db-4638-846d-3a78dfbb641c","name":"List Clusters","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listclusters"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:54:58 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <cluster>\n                <Index>1</Index>\n                <Status>Up</Status>\n                <Name>ExampleCluster</Name>\n                <ClusterVSAddress></ClusterVSAddress>\n                <IPAddress>IP address would appear here</IPAddress>\n                <Checker>none</Checker>\n                <CheckerPort>80</CheckerPort>\n                <Type>default</Type>\n                <Enable>Y</Enable>\n                <LocationLatitude></LocationLatitude>\n                <LocationLongitude></LocationLongitude>\n            </cluster>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"d81fa061-aeb6-4d7b-85b6-e234b9656540"},{"name":"Add a Cluster","id":"a4ed8a3f-a7c9-454b-b8ed-565e0172ef20","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addcluster?ip=InsertIPAddress&name=ExampleCluster2","description":"<p>You can add a cluster by running the <b>addcluster</b> command.</p>\n<blockquote>\n<p>The <b>ip</b> and <b>name</b> parameters are required for this command.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addcluster"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"ip","value":"InsertIPAddress"},{"key":"name","value":"ExampleCluster2"}],"variable":[]}},"response":[{"id":"90af7a93-771d-4f12-ba98-695eab68372e","name":"Add a Cluster","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addcluster?ip=InsertIPAddress&name=ExampleCluster2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addcluster"],"query":[{"key":"ip","value":"InsertIPAddress"},{"key":"name","value":"ExampleCluster2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 11:56:39 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"a4ed8a3f-a7c9-454b-b8ed-565e0172ef20"},{"name":"Modify a Cluster","id":"d25927d2-1b6a-497c-aad3-e67b434a9820","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modcluster?name=ExampleCluster&ip=InsertIPAddress&type=remoteLM","description":"<p>You can modify an existing cluster by running the <strong>modcluster</strong> command.</p>\n<p>The <strong>modcluster</strong> commands accepts the following optional parameters:</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Range</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>type</p></td><td><p>S</p></td><td><p>Default</p></td><td><p>default</p><p>remoteLM</p><p>localLM</p></td><td><p>Change the type of the cluster</p></td></tr><tr><td><p>name</p></td><td><p>S</p></td><td><p> </p></td><td><p> </p></td><td><p>Specify a name for the cluster</p></td></tr><tr><td><p>checker</p></td><td><p>S</p></td><td><p>none</p></td><td><p>none</p><p>tcp</p><p>icmp</p></td><td><p>Specify the method used to check the status of the cluster</p></td></tr><tr><td><p>checkerport</p></td><td><p>I</p></td><td><p>0</p></td><td><p>1-65530</p></td><td><p>Set the port used for checking the cluster. This parameter is only relevant if the <b>checker </b>is set to <b>tcp</b>.</p></td></tr><tr><td><p>enable</p></td><td><p>B</p></td><td><p>1 – Enabled</p></td><td><p>1 = Enabled</p><p>0 = Disabled</p></td><td><p>Enable/disable the cluster</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modcluster"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"ExampleCluster"},{"key":"ip","value":"InsertIPAddress"},{"key":"type","value":"remoteLM"}],"variable":[]}},"response":[{"id":"9e3c7754-e947-4eb1-921a-17be09a182e7","name":"Modify a Cluster","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modcluster?name=ExampleCluster&ip=InsertIPAddress&type=remoteLM","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modcluster"],"query":[{"key":"name","value":"ExampleCluster"},{"key":"ip","value":"InsertIPAddress"},{"key":"type","value":"remoteLM"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 13:04:57 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <cluster>\n                <Index>1</Index>\n                <Status>Up</Status>\n                <Name>ExampleCluster</Name>\n                <ClusterVSAddress></ClusterVSAddress>\n                <IPAddress>IP address would appear here</IPAddress>\n                <Checker>none</Checker>\n                <CheckerPort>80</CheckerPort>\n                <Type>remoteLM</Type>\n                <Enable>Y</Enable>\n                <LocationLatitude></LocationLatitude>\n                <LocationLongitude></LocationLongitude>\n            </cluster>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"d25927d2-1b6a-497c-aad3-e67b434a9820"},{"name":"Change Cluster Location","id":"1900fc4c-3bf9-4fc5-9f35-444ae6355787","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clustchangeloc?ip=InsertIPAddress&latsecs=3661&longsecs=3661","description":"<p>To change a cluster location, run the <strong>clustchangeloc</strong> command.</p>\n<p>The <strong>latsecs</strong> and <strong>longsecs</strong> values should be entered as an integer containing the total seconds. This total seconds value is converted to degrees, minutes, and seconds when displayed in the UI.</p>\n<p>There are 60 seconds in a minute and 60 minutes in a degree.</p>\n<p>Degrees = º</p>\n<p>Minutes = ‘</p>\n<p>Seconds = “</p>\n<p>60” = 1’</p>\n<p>3600” = 1º</p>\n<p>3660 = 1º1’</p>\n<p>3661 = 1º1’1”</p>\n<p>You can also represent this as a decimal value for degrees where the minutes and seconds are divided by 3600 to get the decimal value.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","clustchangeloc"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"ip","value":"InsertIPAddress"},{"key":"latsecs","value":"3661"},{"key":"longsecs","value":"3661"}],"variable":[]}},"response":[{"id":"3e74b8ba-54fe-44eb-85ba-b4689ecd3ade","name":"Change Cluster Location","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clustchangeloc?ip=InsertIPAddress&latsecs=3661&longsecs=3661","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","clustchangeloc"],"query":[{"key":"ip","value":"InsertIPAddress"},{"key":"latsecs","value":"3661"},{"key":"longsecs","value":"3661"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 13:08:12 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Cluster location updated</Success>\n</Response>"}],"_postman_id":"1900fc4c-3bf9-4fc5-9f35-444ae6355787"},{"name":"Show a Cluster","id":"5fb1b5b7-b6d5-4cb0-8e54-f8b9a0138125","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showcluster?ip=InsertIPAddress","description":"<p>You can display details about a specific cluster by running the <b>showcluster</b> command.</p>\n<blockquote>\n<p><b>ip</b> is a required parameter for this command.\nThe <b>Address</b> entry is deprecated.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showcluster"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"ip","value":"InsertIPAddress"}],"variable":[]}},"response":[{"id":"7316762d-2f69-468a-b1b6-b37b0f1bf8db","name":"Show a Cluster","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showcluster?ip=InsertIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","showcluster"],"query":[{"key":"ip","value":"InsertIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 07 Aug 2024 13:14:14 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <cluster>\n                <Index>1</Index>\n                <Status>Up</Status>\n                <Name>ExampleCluster</Name>\n                <ClusterVSAddress></ClusterVSAddress>\n                <IPAddress>IP address would appear here</IPAddress>\n                <Checker>none</Checker>\n                <CheckerPort>80</CheckerPort>\n                <Type>remoteLM</Type>\n                <Enable>Y</Enable>\n                <LocationLatitude>1</LocationLatitude>\n                <LocationLongitude>1</LocationLongitude>\n            </cluster>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"5fb1b5b7-b6d5-4cb0-8e54-f8b9a0138125"},{"name":"Delete a Cluster","id":"f8dd06b7-0237-4125-ba26-7dbdc84aa2e4","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delcluster?ip=InsertIPAddress","description":"<p>You can delete a cluster by running the <b>delcluster</b> command.</p>\n<blockquote>\n<p>The <b>ip</b> parameter is required for this command.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delcluster"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"ip","value":"InsertIPAddress"}],"variable":[]}},"response":[{"id":"2ccbb369-0a7e-4c0b-b803-7be61c075658","name":"Delete a Cluster","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delcluster?ip=InsertIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delcluster"],"query":[{"key":"ip","value":"InsertIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 14:43:35 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Cluster deleted</Success>\n</Response>"}],"_postman_id":"f8dd06b7-0237-4125-ba26-7dbdc84aa2e4"}],"id":"e43de719-39f4-4b30-a354-fc1fae13a967","description":"<p>These sections contain commands relating to GEO clusters.</p>\n","_postman_id":"e43de719-39f4-4b30-a354-fc1fae13a967"},{"name":"Miscellaneous Params","item":[{"name":"List the Miscellaneous Parameters","id":"c439c12a-00ac-4cdf-9f1a-bf1250f2c19e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listparams","description":"<p>To list the GEO miscellaneous parameters, run the <b>listparams</b> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listparams"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"69ce3b43-a140-409b-a07f-0289d082a3ee","name":"List the Miscellaneous Parameters","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listparams"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 09:21:55 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <soa>\n                <TTL>10</TTL>\n                <persist>60</persist>\n                <PerzoneSoa>N</PerzoneSoa>\n                <DClustUnavail>N</DClustUnavail>\n                <EDNSECS>Y</EDNSECS>\n            </soa>\n            <check>\n                <CheckInterval>120</CheckInterval>\n                <ConnTimeout>20</ConnTimeout>\n                <RetryAttempts>2</RetryAttempts>\n            </check>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"c439c12a-00ac-4cdf-9f1a-bf1250f2c19e"},{"name":"Modify the Miscellaneous Parameters","id":"d24e59e8-b856-4bd3-922b-e5eadd78e814","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modparams?namesrv=ExampeNameServer&SOAEmail=example@example.com","description":"<p>You can modify the miscellaneous GEO parameters by running the <strong>modparams</strong> command.</p>\n<p>The <strong>modparams</strong> command accepts the following optional parameters:</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Default</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Additional Information</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>zone</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the zone name. As of LoadMaster version 7.2.60.1, underscores are supported in this parameter.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>PerZoneSOA</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0 - Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0 - Disabled<br />1 - Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>If this option is enabled, the Source of Authority (SOA) parameters are applied only to the zone. If it is disabled, the SOA parameters apply to all Fully Qualified Domain Names (FQDNs). The Apply to Zone Only option is disabled by default.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>SourceOfAuthority</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Set the response set for Source of Authority requests.</p><p>As of LoadMaster version 7.2.60.1, underscores are supported in this parameter.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>namesrv</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The maximum number of characters permitted for this parameter is 1022.</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Set the response sent for Name Server requests.</p><p>As of LoadMaster version 7.2.60.1, underscores are supported in this parameter.</p><p></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>SOAEmail</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Email address of the person responsible for the zone and to which email may be sent to report errors or problems. This is the email address of a suitable DNS administrator but more commonly the technical contact for the domain.</p><p>By convention (in RFC 2142) it is suggested that the reserved mailbox hostmaster is used for this purpose but any valid email address will work.</p><p>The format is <b>MailboxName.Domain.com</b>, for example, <b>hostmaster.example.com</b> (uses a full stop (<b>.</b>) rather than the usual <b>@</b> symbol because the <b>@</b> symbol has other uses in the zone file) but mail is sent to <b>hostmaster@example.com</b>.</p><p>As of LoadMaster version 7.2.60.1, underscores are supported in this parameter.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>dclustunavail</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0 - Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0 - Disabled<br />1 - Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>This option is disabled by default. When this option is enabled, requests to the cluster are dropped if a GEO cluster is disabled.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>glueip</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div>This option allows you to set the IP address of the name server to return in additional records in a DNS response. To unset the <b>Glue Record IP</b> so that 0.0.0.0 is returned, set the <b>glueip </b>parameter to an empty string.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>TTL</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>unset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>1-86400</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Set the Time To Live (TTL) (in seconds) of the responses returned by the LoadMaster.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>Txt</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div>This option allows you to modify the TXT record.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>EDNSECS</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div></div><div><div><div><div></div></div></div><div></div></div></td><td><div>0 - Disabled<br />1 - Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>The <b>EDNS Client Subnet (ECS) </b>option is enabled by default on new installations but if you are upgrading a LoadMaster that previously used GEO functionality then the option is disabled. When enabled, the ECS field (if included in the request) is used to determine the client location. When disabled, this field is ignored.<br /><b>Note: </b>This parameter is not supported in the LTSF LoadMaster version yet.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>persist</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-86400</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This corresponds with the <b>Stickiness </b>WUI field. This determines how long (in seconds) a specific response will be returned to a host.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>CheckInterval</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>120</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>9-3600</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Set how often (in seconds) that devices will be checked.</p><p><b>Note:</b> The interval value must be greater than the <b>ConnTimeout </b>value multiplied by the <b>RetryAttempts </b>value (Interval &gt; Timeout \\\\\\\\\\\\\\\\* Retry + 1). This is to ensure that the next health check does not start before the previous one completes. If the timeout or retry values are increased to a value that breaks this rule, the interval value will be automatically increased.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ConnTimeout</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>20</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>4-60</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Set the timeout (in seconds) for the check request.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>RetryAttempts</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>2</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>2-10</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Set the number of times the check will be retried before the device is marked as failed.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>\n\n<p>The timeline diagram below illustrates what happens from the time a resource IP is added or enabled, to when it goes down and then comes back up again.</p>\n<img src=\"https://d2uy6b9a6c1fvs.cloudfront.net/files/assets/documents/7.2.48.6.21344-RELEASE/LoadMaster/Interface_Description-RESTful_API/MiscellaneousParams-Diagram.png\" />\n\n<p>When a resource IP is enabled/created, an ICMP request is sent by the LoadMaster to the resource IP. Assuming it responds, the resource is marked UP.</p>\n<p>After 120 seconds have elapsed (the default Check Interval), an ICMP request is sent to the resource IP. If 20 seconds (the default Connection Timeout) elapses and the IP fails to respond, the LoadMaster will send up to two additional requests (the default Retry Attempts) and wait for 20 seconds between each. If all three of these requests receive no response, then the resource is marked down, and the Check Interval timer is reset.</p>\n<p>After 120 seconds elapses, the LoadMaster attempts to send an ICMP request to the resource IP. If the resource has now come back up and responds before the Connection Timeout elapses, the LoadMaster marks it UP and resets the Check Interval timer.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modparams"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"namesrv","value":"ExampeNameServer"},{"key":"SOAEmail","value":"example@example.com"}],"variable":[]}},"response":[{"id":"759907ee-250a-4313-83a6-c79cb2b39d92","name":"Modify the Miscellaneous Parameters","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modparams?namesrv=ExampeNameServer&SOAEmail=example@example.com","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modparams"],"query":[{"key":"namesrv","value":"ExampeNameServer"},{"key":"SOAEmail","value":"example@example.com"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 09:33:12 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <soa>\n                <NameSrv>ExampeNameServer.</NameSrv>\n                <SOAEmail>example@example.com.</SOAEmail>\n                <TTL>10</TTL>\n                <persist>60</persist>\n                <PerzoneSoa>N</PerzoneSoa>\n                <DClustUnavail>N</DClustUnavail>\n                <EDNSECS>Y</EDNSECS>\n            </soa>\n            <check>\n                <CheckInterval>120</CheckInterval>\n                <ConnTimeout>20</ConnTimeout>\n                <RetryAttempts>2</RetryAttempts>\n            </check>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"d24e59e8-b856-4bd3-922b-e5eadd78e814"},{"name":"Upload a Location Data Patch File","id":"aa6b9952-2584-4103-a7c4-0f23d523712d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/Downloads/geodata.patch(1)/geodata.patch/geodata.patch_2024_07_09_1034"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/locdataupdate","description":"<p>You can download a GEO location data patch file from the Progress Kemp Support site. Then, unzip the file and upload it using this command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","locdataupdate"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"16730bc9-60bb-490f-a773-7581cf8303fc","name":"Upload a Location Data Patch File","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/geodata.patch_2024_07_09_1034"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/locdataupdate"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 19 Aug 2024 14:53:47 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"shell-init","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>GEO Database updated successfully:\\nGeoLite2-City: Version 20240705 Library Build 1.3.2  1.3.2 Database and Contents Copyright (c) 2024 MaxMind, Inc.</Success>\n</Response>"}],"_postman_id":"aa6b9952-2584-4103-a7c4-0f23d523712d"}],"id":"09634f26-2d8a-4831-8390-ff7582a078c2","description":"<p>The sections below provide commands relating to the miscellaneous GEO parameters.</p>\n","_postman_id":"09634f26-2d8a-4831-8390-ff7582a078c2"},{"name":"IP Range Selection Criteria","item":[{"name":"List the IP Addresses","id":"7088718c-b898-4d64-a8d6-a7fef4c2f5b0","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listips","description":"<p>To list the IP addresses set for the IP range selection criteria, run the <b>listips</b> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listips"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"51c7d417-cf1a-4d65-8371-66e5cdbb63cf","name":"List the IP Addresses","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listips"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 09:40:15 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <IPAddress>\n                <Index>1</Index>\n                <Ip>IP address would appear here</Ip>\n                <IPAddress>IP address would appear here</IPAddress>\n                <Mask>32</Mask>\n                <IsCustom>N</IsCustom>\n                <CustomLocation></CustomLocation>\n            </IPAddress>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"7088718c-b898-4d64-a8d6-a7fef4c2f5b0"},{"name":"Show IP Address Details","id":"dbe7d30e-b8bd-4f50-b7f8-c8b86d553ac3","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showip?ip=InsertLoadMasterIPAddress","description":"<p>To show details of a specific IP address which is set for the IP range selection criteria, run the <strong>showip</strong> command.</p>\n<blockquote>\n<p><strong>Note:</strong> The latitude and longitude values are shown in seconds (rather than degrees/minutes/seconds).</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showip"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"ip","value":"InsertLoadMasterIPAddress"}],"variable":[]}},"response":[{"id":"1f715c31-4552-4b85-ad81-c21c1e27c76e","name":"Show IP Address Details","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showip?ip=InsertIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","showip"],"query":[{"key":"ip","value":"InsertIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":null,"header":[{"key":"Date","value":"Mon, 11 Aug 2025 07:34:49 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <IPAddress>\n                <Index>1</Index>\n                <Ip>IP address would appear here</Ip>\n                <IPAddress>IP address would appear here</IPAddress>\n                <Mask>32</Mask>\n                <IsCustom>N</IsCustom>\n                <CustomLocation></CustomLocation>\n                <Latitude>101104</Latitude>\n                <Longitude>-277262</Longitude>\n            </IPAddress>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"dbe7d30e-b8bd-4f50-b7f8-c8b86d553ac3"},{"name":"Add an IP Address","id":"af286e94-b29f-4c2f-8d2c-245444a5602c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addip?ip=InsertLoadMasterIPAddress","description":"<p>To add an IP address to the IP range selection criteria, run the <b>addip</b> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addip"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"ip","value":"InsertLoadMasterIPAddress"}],"variable":[]}},"response":[{"id":"88105f27-a4ca-4af7-8a97-2de790fbb09e","name":"Add an IP Address","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addip?ip=InsertLoadMasterIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addip"],"query":[{"key":"ip","value":"InsertLoadMasterIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 09:38:23 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>IP range added</Success>\n</Response>"}],"_postman_id":"af286e94-b29f-4c2f-8d2c-245444a5602c"},{"name":"Delete an IP Address","id":"34f53e12-5e4a-4291-af3d-7cf7d8262d17","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delip?ip=InsertLoadMasterIPAddress","description":"<p>To delete an IP address, run the <strong>delip</strong> command.</p>\n<blockquote>\n<p>Note: You cannot delete IP address ranges if they are configured in an FQDN.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delip"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"ip","value":"InsertLoadMasterIPAddress"}],"variable":[]}},"response":[{"id":"c609d467-cd34-4f26-b454-2b472cf70ece","name":"Delete an IP Address","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delip?ip=InsertLoadMasterIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delip"],"query":[{"key":"ip","value":"InsertLoadMasterIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:26:54 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>IP range deleted</Success>\n</Response>"}],"_postman_id":"34f53e12-5e4a-4291-af3d-7cf7d8262d17"},{"name":"Change the Location of an IP Address","id":"c88bb607-19c2-4e5f-a9a4-5f5a2e57b054","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiploc?ip=InsertLoadMasterIPAddress&lat=3661&long=3661","description":"<p>To change the location for an IP address, run the <strong>modiploc</strong> command.</p>\n<p>The <strong>lat</strong> and <strong>long</strong> values should be entered as an integer containing the total seconds. This total seconds value is converted to degrees, minutes, and seconds when displayed in the UI.</p>\n<p>There are 60 seconds in a minute and 60 minutes in a degree.</p>\n<ul>\n<li>Degrees = º</li>\n<li>Minutes = ‘</li>\n<li>Seconds = “</li>\n<li>60” = 1’</li>\n<li>3600” = 1º</li>\n<li>3660 = 1º1’</li>\n<li>3661 = 1º1’1”</li>\n</ul>\n<p>You can also represent this as a decimal value for degrees where the minutes and seconds are divided by 3600 to get the decimal value.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modiploc"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"ip","value":"InsertLoadMasterIPAddress"},{"key":"lat","value":"3661"},{"key":"long","value":"3661"}],"variable":[]}},"response":[{"id":"cce4480d-749b-4d0c-8ee7-2abac29d328a","name":"Change the Location of an IP Address","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiploc?ip=InsertLoadMasterIPAddress&lat=3661&long=3661","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modiploc"],"query":[{"key":"ip","value":"InsertLoadMasterIPAddress"},{"key":"lat","value":"3661"},{"key":"long","value":"3661"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 09:48:49 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>IP range location updated</Success>\n</Response>"}],"_postman_id":"c88bb607-19c2-4e5f-a9a4-5f5a2e57b054"},{"name":"Delete an IP Location","id":"855af5f9-c028-4efa-98ac-2212d598b504","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deliploc?ip=InsertLoadMasterIPAddress","description":"<p>To delete the location for an IP address, run the <strong>deliploc</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","deliploc"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"ip","value":"InsertLoadMasterIPAddress"}],"variable":[]}},"response":[{"id":"acedcb0e-16da-4a25-ac5a-617d3dbe5a9a","name":"Delete an IP Location","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deliploc?ip=InsertLoadMasterIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","deliploc"],"query":[{"key":"ip","value":"InsertLoadMasterIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 09:55:10 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>IP range location updated</Success>\n</Response>"}],"_postman_id":"855af5f9-c028-4efa-98ac-2212d598b504"},{"name":"Add a Location to an Existing IP Address","id":"14d9d86d-b4b1-450a-9334-cf1ec4bdf3ba","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addipcountry?ip=InsertLoadMasterIPAddress&countrycode=IE","description":"<p>To add a country or custom location association to an existing IP address, run the <strong>addipcountry</strong> command.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Mandatory</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Range</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>countrycode</p></td><td><p>No</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>Valid country code</p></td><td><p>A valid, uppercase, two-digit country code must be used.</p></td></tr><tr><td><p>customloc</p></td><td><p>No</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>Existing custom location</p></td><td><p>The name of an existing custom location.</p></td></tr></tbody></table>\n\n<blockquote>\n<p>Either the <strong>countrycode</strong> or <strong>customloc</strong> parameter must be entered when running the command.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addipcountry"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"ip","value":"InsertLoadMasterIPAddress"},{"key":"countrycode","value":"IE"}],"variable":[]}},"response":[{"id":"eee9bb84-54f6-401b-8723-e863f3aad3e9","name":"Add a Location to an Existing IP Address","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addipcountry?ip=InsertLoadMasterIPAddress&countrycode=IE","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addipcountry"],"query":[{"key":"ip","value":"InsertLoadMasterIPAddress"},{"key":"countrycode","value":"IE"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:00:25 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>IP range country updated</Success>\n</Response>"}],"_postman_id":"14d9d86d-b4b1-450a-9334-cf1ec4bdf3ba"},{"name":"Delete a Location from an IP Address","id":"6a0c6ec0-45e0-4e78-b10c-f11a1dc871dc","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/removeipcountry?ip=InsertLoadMasterIPAddress","description":"<p>To remove the country association from an IP address, run the <strong>removeipcountry</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","removeipcountry"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"ip","value":"InsertLoadMasterIPAddress"}],"variable":[]}},"response":[{"id":"58162585-9feb-4bf2-a9e4-834ee25d2011","name":"Delete a Location from an IP Address","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/removeipcountry?ip=InsertLoadMasterIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","removeipcountry"],"query":[{"key":"ip","value":"InsertLoadMasterIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:04:05 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>IP range country updated</Success>\n</Response>"}],"_postman_id":"6a0c6ec0-45e0-4e78-b10c-f11a1dc871dc"},{"name":"List the Custom Locations","id":"b1c6a278-62fb-4842-bd77-a293f6028b0f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listcustomlocation","description":"<p>To list the existing custom locations, run the <strong>listcustomlocation</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listcustomlocation"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"5c380086-bfb3-42dd-a5a2-2e2f8ee22561","name":"List the Custom Locations","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listcustomlocation"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:13:41 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <location>\n                <Name>Delhi</Name>\n            </location>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"b1c6a278-62fb-4842-bd77-a293f6028b0f"},{"name":"Add a Custom Location","id":"9ba5cdd0-c475-4c2c-88ca-eb5092e41de9","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addcustomlocation?location=Delhi","description":"<p>You can add a custom location by running an <strong>addcustomlocation</strong> command.</p>\n<blockquote>\n<p>The <strong>location</strong> parameter is required.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addcustomlocation"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"location","value":"Delhi"}],"variable":[]}},"response":[{"id":"2d066aa8-04dc-42d8-9455-07a125c3292e","name":"Add a Custom Location","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addcustomlocation?location=Delhi","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addcustomlocation"],"query":[{"key":"location","value":"Delhi"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:09:22 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"9ba5cdd0-c475-4c2c-88ca-eb5092e41de9"},{"name":"Edit a Custom Location","id":"f9e0b422-243d-4b46-a403-a44013956f8d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/editcustomlocation?cloldname=Delhi&clnewname=NewDelhi","description":"<p>To rename an existing custom location, run the <strong>editcustomlocation</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","editcustomlocation"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cloldname","value":"Delhi"},{"key":"clnewname","value":"NewDelhi"}],"variable":[]}},"response":[{"id":"ad767f27-ceeb-45aa-a3bd-4414615e29e0","name":"Edit a Custom Location","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/editcustomlocation?cloldname=Delhi&clnewname=NewDelhi","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","editcustomlocation"],"query":[{"key":"cloldname","value":"Delhi"},{"key":"clnewname","value":"NewDelhi"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:20:46 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"f9e0b422-243d-4b46-a403-a44013956f8d"},{"name":"Delete a Custom Location","id":"b721b89f-9b45-4324-8208-c7646fae8758","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deletecustomlocation?clName=NewDelhi","description":"<p>To remove an existing custom location, run the <strong>deletecustomlocation</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","deletecustomlocation"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"clName","value":"NewDelhi"}],"variable":[]}},"response":[{"id":"cddcb13d-6cdf-40e0-ba15-20593298923e","name":"Delete a Custom Location","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deletecustomlocation?clName=NewDelhi","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","deletecustomlocation"],"query":[{"key":"clName","value":"NewDelhi"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:24:32 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"b721b89f-9b45-4324-8208-c7646fae8758"}],"id":"f5d1cf0e-407c-417c-8c72-ff5fa164a821","description":"<p>The commands in this section relate to the GEO IP Range Selection Criteria.</p>\n","_postman_id":"f5d1cf0e-407c-417c-8c72-ff5fa164a821"},{"name":"IP Access List Settings","item":[{"name":"Retrieve the IP Access List Settings","id":"8c780590-fba0-4f99-9e13-94aba90438b3","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/getsettings","description":"<p>To retrieve the IP access-list settings, run the <strong>geoacl/getsettings</strong> command</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geoacl","getsettings"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"28c33298-0380-46b8-bbdf-3c44ecd46311","name":"Retrieve the IP Access List Settings","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/getsettings"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:31:36 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <GeoAcl>\n                <AutoUpdate>N</AutoUpdate>\n                <LastUpdated>Never</LastUpdated>\n                <AutoInstall>N</AutoInstall>\n                <InstallTimeHour>4</InstallTimeHour>\n                <LastInstalled>Never</LastInstalled>\n            </GeoAcl>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"8c780590-fba0-4f99-9e13-94aba90438b3"},{"name":"Enable/Disable Automatic IP Access List Updates","id":"00b6f741-18c8-449b-8b9f-3d152b00df1b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/setautoupdate?enable=1","description":"<p>To enable/disable automatic updates, run the <strong>geoacl/setautoupdate</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geoacl","setautoupdate"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"enable","value":"1"}],"variable":[]}},"response":[{"id":"45dcb7d2-52e3-4d04-9d91-9dfb671f89b6","name":"Enable/Disable Automatic IP Access List Updates","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/setautoupdate?enable=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","geoacl","setautoupdate"],"query":[{"key":"enable","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:35:04 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"00b6f741-18c8-449b-8b9f-3d152b00df1b"},{"name":"Enable/Disable Automatic Installation of the IP Access List Updates","id":"c1a3fa67-62b7-4ad7-a595-083c5f4a1009","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/setautoinstall?enable=1","description":"<p>To enable/disable automatic updates, run the <strong>geoacl/setautoinstall</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geoacl","setautoinstall"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"enable","value":"1"}],"variable":[]}},"response":[{"id":"776c826c-0c97-40a5-bb7b-07b466c3c23e","name":"Enable/Disable Automatic Installation of the IP Access List Updates","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/setautoinstall?enable=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","geoacl","setautoinstall"],"query":[{"key":"enable","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 11:33:20 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <message>Command completed ok</message>\n</response>"}],"_postman_id":"c1a3fa67-62b7-4ad7-a595-083c5f4a1009"},{"name":"Set the Time of the Automatic Installation","id":"642c7d81-00e1-4cf1-8195-1919a95f9c9f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/setinstalltime?hour=13","description":"<p>To set the time of the automatic installation, run the <strong>geoacl/setinstalltime</strong> command.</p>\n<p>The hour is the hour value from the 24-hour clock (0-23), for example 13 is 1pm.</p>\n<p>The range is 0-23. Minutes cannot be specified. It is not possible to set the install time if automatic installation is disabled.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geoacl","setinstalltime"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"hour","value":"13"}],"variable":[]}},"response":[{"id":"05d169de-d200-459a-93cf-5de1f056a8ef","name":"Set the Time of the Automatic Installation","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/setinstalltime?hour=13","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","geoacl","setinstalltime"],"query":[{"key":"hour","value":"13"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 11:35:01 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <message>Command completed ok</message>\n</response>"}],"_postman_id":"642c7d81-00e1-4cf1-8195-1919a95f9c9f"},{"name":"Download the Updates Now","id":"ade27067-2f37-47b9-9252-9aed7db4693f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/updatenow","description":"<p>To download the updates now, run the <strong>geoacl/updatenow</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geoacl","updatenow"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"dd0888d4-4015-47dd-8c6e-80a555ec8a9b","name":"Download the Updates Now","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/updatenow"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 11:37:50 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <message>Download of new GEO IP Access List data successfully completed</message>\n</response>"}],"_postman_id":"ade27067-2f37-47b9-9252-9aed7db4693f"},{"name":"Install the Updates Now","id":"3df75b9b-b4e7-4323-99e3-26721583c909","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/installnow","description":"<p>To install any downloaded updates now, run the <strong>geoacl/installnow</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geoacl","installnow"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"7f210dba-59cf-4527-9385-4cf8d7b7fa22","name":"Install the Updates Now","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/installnow"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 11:40:43 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <message>Command completed ok</message>\n</response>"}],"_postman_id":"3df75b9b-b4e7-4323-99e3-26721583c909"},{"name":"View the Access List","id":"02175670-fa15-41c1-ae11-02dda9dde4da","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/downloadlist","description":"<p>To retrieve the access-list, run the <strong>geoacl/downloadlist</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geoacl","downloadlist"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"344a2f84-e65f-418d-8626-e4c2302f3919","name":"View the Access List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/downloadlist"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 11:43:08 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <downloadlist>----------------------------------------------\nBlocked IPs (15 Jul 2022 12:00:29)\n----------------------------------------------\nIP addresses would appear here</downloadlist>\n</response>"}],"_postman_id":"02175670-fa15-41c1-ae11-02dda9dde4da"},{"name":"View Changes to the Access List","id":"66dd329c-e482-4e8c-9ac1-9ec1132b84e4","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/downloadchanges","description":"<p>To retrieve a list of changes that were made to the access-list, run the <strong>geoacl/downloadchanges</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geoacl","downloadchanges"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"1674ad9a-99e7-4ba7-b34c-793bba912bdb","name":"View Changes to the Access List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/downloadchanges"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 11:45:49 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <downloadchanges>----------------------------------------------------------------------\n                     Fri Jul 15 12:00:29 UTC 2022                     \n----------------------------------------------------------------------\n== Kemp IP Access List Set CHANGES ==\n\n== Report Bugs/Issues to Kemp Technologies Team ==\nhttp://kemptechnologies.com/load-balancing-support/kemp-support/\n----------------------------------------------------------------------\n----------------------------------------------------------------------\nAddresses removed from the IP Access List Set\n----------------------------------------------------------------------\n----------------------------------------------------------------------\n\n----------------------------------------------------------------------\nAddresses added into the IP Access List Set\n----------------------------------------------------------------------\n----------------------------------------------------------------------</downloadchanges>\n</response>"}],"_postman_id":"66dd329c-e482-4e8c-9ac1-9ec1132b84e4"},{"name":"View the User-Defined Allow List","id":"b102890d-bb86-4f53-bfa0-510d49a64929","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/listcustom","description":"<p>To retrieve the contents of the user-defined allow list (which overrides the access-list), run the <strong>geoacl/listcustom</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geoacl","listcustom"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"1b5de791-de6c-40d9-bbe8-146fc00f0b77","name":"View the User-Defined Allow List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/listcustom"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:59:01 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Allowlist>\n                <addr>IP address would appear here/32</addr>\n            </Allowlist>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"b102890d-bb86-4f53-bfa0-510d49a64929"},{"name":"Add an Address to the Allow List","id":"30893c76-63e9-42a1-bee4-1eff61a89e8a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/addcustom?addr=InsertLoadMasterIPAddress","description":"<p>To add an IP address or network (in CIDR format) to the allow list, run the <strong>geoacl/addcustom</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geoacl","addcustom"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"addr","value":"InsertLoadMasterIPAddress"}],"variable":[]}},"response":[{"id":"c75e48ed-76c3-4655-9bf1-ca7a44b837a0","name":"Add an Address to the Allow List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/addcustom?addr=InsertLoadMasterIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","geoacl","addcustom"],"query":[{"key":"addr","value":"InsertLoadMasterIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:55:02 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"grep","value":"/one4net/geoacl/geowhitelist.txt: No such file or directory"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>IP address would appear here/32 was successfully added to GEO ACL allow IP list</Success>\n</Response>"}],"_postman_id":"30893c76-63e9-42a1-bee4-1eff61a89e8a"},{"name":"Delete an IP Address or Network from the Allow List","id":"57f23f74-b85f-4422-b529-27ae8c46eb55","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/removecustom?addr=InsertLoadMasterIPAddress","description":"<p>To remove an IP address or network from the allow list, run the <strong>geoacl/removecustom</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geoacl","removecustom"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"addr","value":"InsertLoadMasterIPAddress"}],"variable":[]}},"response":[{"id":"1e709ffb-807e-46ea-8c16-37dbfe4ce807","name":"Delete an IP Address or Network from the Allow List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoacl/removecustom?addr=InsertLoadMasterIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","geoacl","removecustom"],"query":[{"key":"addr","value":"InsertLoadMasterIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 11:03:40 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>IP address would appear here/32 was successfully removed from GEO ACL allow IP list</Success>\n</Response>"}],"_postman_id":"57f23f74-b85f-4422-b529-27ae8c46eb55"}],"id":"10b4d1cb-dc34-4a60-990c-a1a26294e706","description":"<p>Refer to the subsections below for details on the RESTful API commands relating to the IP access-list settings.</p>\n","_postman_id":"10b4d1cb-dc34-4a60-990c-a1a26294e706"},{"name":"Configure DNSSEC","item":[{"name":"Generate the Key Signing Keys (KSKs)","id":"7e747135-07ad-4272-a3a1-584348842cc3","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geogenerateksk?algorithm=RSASHA256&keysize=1024","description":"<p>To generate the KSKs, run the <strong>geogenerateksk</strong> command.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Range</b></p></td><td><p><b>Description</b></p></td></tr><tr><td><p>algorithm</p></td><td><p>S</p></td><td><p>RSASHA256</p></td><td><p>RSASHA256, NSEC3RSASHA1, NSEC3RSASHA1</p></td><td><p>Specify the cryptographic algorithm to use. If this parameter is omitted, the default value is used.</p></td></tr><tr><td><p>keysize</p></td><td><p>I</p></td><td><p>2048</p></td><td><p>1024, 2048, 4096</p></td><td><p>Specify the key size (in bits). If this parameter is omitted, the default value is used.</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geogenerateksk"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"algorithm","value":"RSASHA256"},{"key":"keysize","value":"1024"}],"variable":[]}},"response":[{"id":"9f4739ba-efc0-42a5-8ae0-70d37d061793","name":"Generate the Key Signing Keys (KSKs)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geogenerateksk?algorithm=RSASHA256&keysize=1024","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","geogenerateksk"],"query":[{"key":"algorithm","value":"RSASHA256"},{"key":"keysize","value":"1024"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 11:49:04 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"7e747135-07ad-4272-a3a1-584348842cc3"},{"name":"Import the KSKs","id":"c4af597b-a13b-450d-ac7e-f29c9ab03538","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"formdata","formdata":[{"key":"privatekey","type":"file","fileNotInWorkingDirectoryWarning":"This file isn't in your working directory. Teammates you share this request with won't be able to use this file. To make collaboration easier you can setup your working directory in Settings.","filesNotInWorkingDirectory":["/C:/ExampleFiles/Ktest.lan.+008+10264.private"],"src":"/C:/ExampleFiles/Ktest.lan.+008+10264.private"},{"key":"publickey","type":"file","src":"/C:/ExampleFiles/Ktest.lan.+008+10264.key"}]},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoimportksk","description":"<p>To import the KSKs, run the <strong>geoimportksk</strong> command</p>\n<p>This command uploads both KSK files at the same time.</p>\n<p>If you have GEO partners and want to use DNSSEC, you must generate the KSK files outside of the LoadMaster using the BIND <strong>dnssec-keygen</strong> command and import them onto each GEO partner separately, for example:</p>\n<p><code>dnssec-keygen -a RSASHA256 -f KSK -b 2048 -n ZONE</code></p>\n<p>Then, import the generated KSK files onto each GEO LoadMaster separately.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geoimportksk"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"ca02a087-4e48-41a0-964a-86856d7e16d0","name":"Import the KSKs","originalRequest":{"method":"GET","header":[],"body":{"mode":"formdata","formdata":[{"key":"privatekey","type":"file","fileNotInWorkingDirectoryWarning":"This file isn't in your working directory. Teammates you share this request with won't be able to use this file. To make collaboration easier you can setup your working directory in Settings.","filesNotInWorkingDirectory":["/C:/ExampleFiles/Ktest.lan.+008+10264.private"],"src":"/C:/ExampleFiles/Ktest.lan.+008+10264.private"},{"key":"publickey","type":"file","src":"/C:/ExampleFiles/Ktest.lan.+008+10264.key"}],"options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoimportksk"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 11:49:04 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"c4af597b-a13b-450d-ac7e-f29c9ab03538"},{"name":"Delete the KSK Files","id":"3f945dca-a724-463a-b4ac-2b2837188b80","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geodeleteksk","description":"<p>To delete the KSK files, run the <strong>geodeleteksk</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geodeleteksk"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"315db061-61bb-4809-9730-10ec7cb3e84e","name":"Delete the KSK Files","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geodeleteksk"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 11:50:04 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"3f945dca-a724-463a-b4ac-2b2837188b80"},{"name":"Enable/Disable DNSSEC","id":"ab82a365-b8cd-4eb2-af5a-79d6341ac7d4","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geosetdnssec?enable=yes","description":"<p>To enable/disable DNSSEC, run the <strong>geosetdnssec</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geosetdnssec"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"enable","value":"yes"}],"variable":[]}},"response":[{"id":"59f68dff-fae1-4aac-ab92-38b97aab2f7a","name":"Enable/Disable DNSSEC","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geosetdnssec?enable=yes","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","geosetdnssec"],"query":[{"key":"enable","value":"yes"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 11:51:21 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"ab82a365-b8cd-4eb2-af5a-79d6341ac7d4"},{"name":"Retrieve the DNSSEC Configuration Settings","id":"77a01e41-11de-43e3-8234-3269fb769083","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoshowdnssec","description":"<p>To retrieve the DNSSEC settings, run the <strong>geoshowdnssec</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geoshowdnssec"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"fc9874fa-e80b-4df7-b9ab-0f0e2e8b899f","name":"Retrieve the DNSSEC Configuration Settings","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geoshowdnssec"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 11:52:22 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <KSK>\n                <PublicKey>ExampleZone. IN DNSKEY 257 3 8 EXAMPLE EXAMPLE EXAMPLE EXAMPLE</PublicKey>\n                <DS_SHA1>ExampleZone. IN DS 36016 8 1 EXAMPLE</DS_SHA1>\n                <DS_SHA2>ExampleZone. IN DS 36016 8 2 EXAMPLE</DS_SHA2>\n            </KSK>\n            <DNSSEC>\n                <Enable>Y</Enable>\n            </DNSSEC>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"77a01e41-11de-43e3-8234-3269fb769083"}],"id":"6fde7f78-0764-41b4-9277-4b697cdd639c","description":"<p>To configure DNSSEC using the API, use the commands outlined in the below sections.</p>\n","_postman_id":"6fde7f78-0764-41b4-9277-4b697cdd639c"},{"name":"GSLB Statistics","item":[{"name":"GSLB Statistics","id":"ca6ecd93-a618-4a69-8612-1f114d5aafe0","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geostats","description":"<p>To retrieve the Global Server Load Balancing (GSLB) statistics, run the <strong>geostats</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","geostats"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"5459b459-abc7-43c8-aa66-d694327f9b43","name":"GSLB Statistics","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/geostats"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 11:12:55 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <GSLBServiceStatus>\n                <BootTime>Wed, 14 Aug 2024 04:22:00 GMT</BootTime>\n                <LastConfiguration>Wed, 14 Aug 2024 10:26:54 GMT</LastConfiguration>\n            </GSLBServiceStatus>\n            <FQDNStatistics>\r\n</FQDNStatistics>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"ca6ecd93-a618-4a69-8612-1f114d5aafe0"}],"id":"80534df7-cfb0-49b3-906f-8adfa9ff6a05","description":"<p>This section provides commands relating to GSLB statistics.</p>\n","_postman_id":"80534df7-cfb0-49b3-906f-8adfa9ff6a05"},{"name":"Enable/Disable GEO","item":[{"name":"Check if GEO is Enabled","id":"21484bd7-b757-44dc-a1bb-7df3c5d80d6b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/isgeoenabled","description":"<p>To check if GEO is enabled, run the <strong>isgeoenabled</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","isgeoenabled"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"0672d628-6109-416f-b94c-c72660a3711c","name":"Check if GEO is Enabled","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/isgeoenabled"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 11:17:24 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>GEO is enabled</Data>\n    </Success>\n</Response>"}],"_postman_id":"21484bd7-b757-44dc-a1bb-7df3c5d80d6b"},{"name":"Enable GEO","id":"5ff63019-ce7b-433e-ae8f-f2efad731519","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/enablegeo","description":"<p>GEO can be enabled by running the <strong>enablegeo</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","enablegeo"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"b2b126b4-2b55-4aed-bea1-2dd9f135f955","name":"Enable GEO","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/enablegeo"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 11:21:18 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"5ff63019-ce7b-433e-ae8f-f2efad731519"},{"name":"Disable GEO","id":"a954b1ec-1b0f-4d11-89aa-de5a26c92e5c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/disablegeo","description":"<p>GEO can be disabled by running the <strong>disablegeo</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","disablegeo"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"32c15f5e-3505-4723-b4de-d46c6299df9b","name":"Disable GEO","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/disablegeo"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 11:25:50 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"a954b1ec-1b0f-4d11-89aa-de5a26c92e5c"}],"id":"321289bf-5c46-4a7b-8e97-969e081db9d3","description":"<p>This section provides commands relating to enabling and disabling GEO.</p>\n","_postman_id":"321289bf-5c46-4a7b-8e97-969e081db9d3"}],"id":"aab8e8a6-56cf-4179-819f-c43bd7737318","description":"<p>The sections below provide details about the API commands relating to the Global Server Load Balancing (GSLB) functionality in the LoadMaster.</p>\n","_postman_id":"aab8e8a6-56cf-4179-819f-c43bd7737318"},{"name":"Statistics","item":[{"name":"Statistics","id":"2a8a1e52-bc72-4be4-8baf-08c18d5b83fd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/stats","description":"<p>Statistics for all the Virtual Services and Real Servers can be obtained by using the <strong>stats</strong> command.</p>\n<blockquote>\n<p>If you run the <strong>stats</strong> command on the admin node when using LoadMaster clustering – the output will show the combined totals of all machines.</p>\n</blockquote>\n<blockquote>\n<p>The Real Server statistics are returned on a per Virtual Service basis.</p>\n</blockquote>\n<p>The statistics are explained in the table below.</p>\n<table><tbody><tr><td><p><b>Section</b></p></td><td><p><b>Name</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p> </p><p>CPU</p></td><td><p>User</p></td><td><p>The percentage of the CPU spent processing in user mode</p></td></tr><tr><td> </td><td><p>System</p></td><td><p>The percentage of the CPU spent processing in system mode</p></td></tr><tr><td> </td><td><p>Idle</p></td><td><p>The percentage of CPU which is idle</p></td></tr><tr><td> </td><td><p>IOWaiting</p></td><td><p>The percentage of the CPU spent waiting for I/O to complete</p></td></tr><tr><td> </td><td><p>HWInterrupts</p></td><td><p>The percentage of hardware interrupts</p></td></tr><tr><td> </td><td><p>SWInterrupts</p></td><td><p>The percentage of software interrupts</p></td></tr><tr><td><p> </p><p> </p><p>Memory</p></td><td>MBtotal</td><td>The total memory available in Mb</td></tr><tr><td> </td><td><p>Memused</p></td><td><p>The amount of memory in use</p></td></tr><tr><td> </td><td>MBused</td><td>The amount of memory in use in Mb</td></tr><tr><td> </td><td><p>Percentmemused</p></td><td><p>The percentage of memory used</p></td></tr><tr><td> </td><td><p>Memfree</p></td><td><p>The amount of memory free</p></td></tr><tr><td> </td><td>MBfree</td><td>The amount of free memory in Mb</td></tr><tr><td> </td><td><p>Percentmemfree</p></td><td><p>The percentage of free memory</p></td></tr><tr><td>DiskUsage</td><td>Name</td><td>The name of the partition</td></tr><tr><td> </td><td>GBtotal</td><td>The total disk usage in Gb</td></tr><tr><td> </td><td>GBused</td><td>The amount of disk space usage in Gb</td></tr><tr><td> </td><td>Percentused</td><td>The percentage of disk space in use</td></tr><tr><td> </td><td>GBfree</td><td>The amount of disk space free</td></tr><tr><td> </td><td>Percentfree</td><td>The percentage of disk space free</td></tr><tr><td>ClientLimits</td><td>CurrentConnections</td><td>The total number of current connections</td></tr><tr><td> </td><td>CurrentConnectionsBlocked</td><td>The number of connections currently blocked</td></tr><tr><td> </td><td>SuccessfulConnectionAttempts</td><td>The number of successful connection attempts</td></tr><tr><td> </td><td>SuccessfulRequestAttempts</td><td>The number of successful request attempts</td></tr><tr><td> </td><td>SuccessfulMatchedRuleAttempts</td><td>The number of rules that were successfully matched</td></tr><tr><td> </td><td>ConnectionAttemptsBlocked</td><td>The number of connection attempts that were blocked</td></tr><tr><td> </td><td>RequestAttemptsBlocked</td><td>The number of request attempts that were blocked</td></tr><tr><td> </td><td>MatchedRulesBlocked</td><td>The number of connections that were blocked due to a matching rule limit</td></tr><tr><td> </td><td>glbcps</td><td>Global connections per second</td></tr><tr><td> </td><td>glbrps</td><td>Global requests per second</td></tr><tr><td> </td><td>DifferentCountries</td><td>The number of different countries that connections were made from</td></tr><tr><td> </td><td>LastHour</td><td>The number of different countries that connections were made from in the last hour</td></tr><tr><td> </td><td>LastDay</td><td>The number of different countries that connections were made from in the last day</td></tr><tr><td><p> </p><p>Network</p></td><td><p>ifaceID</p></td><td><p>The ID number of the interface</p></td></tr><tr><td> </td><td><p>Speed</p></td><td><p>The speed of the link</p></td></tr><tr><td> </td><td><p>In</p></td><td><p>Inbound</p></td></tr><tr><td> </td><td><p>Out</p></td><td><p>Outbound</p></td></tr><tr><td> </td><td><p>Total (TPS)</p></td><td><p>The total number of Transactions Per Second (TPS)</p></td></tr><tr><td> </td><td><p>SSL (TPS)</p></td><td><p>The total number of SSL Transactions Per Second (TPS)</p></td></tr><tr><td><p> </p><p>VStotals</p></td><td><p>ConnsPerSec</p></td><td><p>The number of connections per second</p></td></tr><tr><td> </td><td>TotalConns</td><td>The total number of Virtual Service connections</td></tr><tr><td> </td><td><p>BitsPerSec</p></td><td><p>The number of bits per second</p></td></tr><tr><td> </td><td><p>BytesPerSec</p></td><td><p>The number of bytes per second</p></td></tr><tr><td> </td><td><p>PktsPerSec</p></td><td><p>The number of packets per second</p></td></tr><tr><td> </td><td>TotalPackets</td><td>The total number of packets transferred</td></tr><tr><td><p> </p><p>Vs</p></td><td><p>VSAddress</p></td><td><p>The IP address of the Virtual Service</p></td></tr><tr><td> </td><td><p>VSPort</p></td><td><p>The port of the Virtual Service</p></td></tr><tr><td> </td><td><p>VSProt</p></td><td><p>The protocol of the Virtual Service. This will either be tcp or udp.</p></td></tr><tr><td> </td><td><p>Index</p></td><td><p>The index (ID) number of the Virtual Service</p></td></tr><tr><td> </td><td><p>ErrorCode</p></td><td><p>The error code</p></td></tr><tr><td> </td><td><p>Enable</p></td><td><p>Displays whether the Virtual Service is enabled (1) or disabled (0)</p></td></tr><tr><td> </td><td><p>TotalConns</p></td><td><p>The total number of connections made</p></td></tr><tr><td> </td><td><p>TotalPkts</p></td><td><p>The total number of packets</p></td></tr><tr><td> </td><td><p>TotalBytes</p></td><td><p>The total number of bytes</p></td></tr><tr><td> </td><td><p>TotalBits</p></td><td><p>The total number of bits</p></td></tr><tr><td> </td><td><p>ActiveConns</p></td><td><p>The total number of connections that are currently active. When using ESP, all connections going through the login process are counted as active connections for the Virtual Service. They are not counted as active connections for the Real Server because they are not actual connections to the Real Server. The WUI page displays the number of active connections associated with the Real Servers, while SNMP displays the number of active connections for the Virtual Service. Without ESP, these values are identical. When using ESP, the Virtual Service counts can be much higher than the final counts going to the Real Servers, due to the above reason.</p></td></tr><tr><td> </td><td><p>BytesRead</p></td><td><p>The total number of bytes read</p></td></tr><tr><td> </td><td><p>BytesWritten</p></td><td><p>The total number of bytes written</p></td></tr><tr><td> </td><td>ConnsPerSec</td><td>The total number of Virtual Service connections per second</td></tr><tr><td> </td><td>ConnsRateBlocked</td><td>The rate at which connections were blocked</td></tr><tr><td> </td><td>RequestsRateBlocked</td><td>The rate at which requested were blocked</td></tr><tr><td> </td><td>MaxConnsBlocked</td><td>The maximum number of connections blocked</td></tr><tr><td> </td><td><p>WafEnable</p></td><td><p>Displays whether WAF is enabled (1) or disabled (0). The WAF statistics below will only be displayed if WAF is enabled on the Virtual Service.</p></td></tr><tr><td><p> </p></td><td><p>Requests</p></td><td><p>The total number of requests handled by the WAF (shows all requests, whether they were blocked or not). Two requests will be recorded for each connection – one incoming and one outgoing request.</p></td></tr><tr><td><p> </p></td><td><p>Incidents</p></td><td><p>The total number of events handled by the WAF (requests that were blocked).</p></td></tr><tr><td><p> </p></td><td><p>Incidents_Hour</p></td><td><p>The number of events that have happened in the current hour (since xx.00.00).</p></td></tr><tr><td><p> </p></td><td><p>Incidents_Day</p></td><td><p>The number of events that have happened since midnight (local time).</p></td></tr><tr><td><p> </p></td><td><p>Incidents_Dayover</p></td><td><p>The number of times the event counter has gone over the configured warning threshold today. For example, if the threshold is set to 10 and there has been 20 events, this counter will be set to 2. The warning threshold is set on a per-Virtual Service basis by setting the AlertThreshold parameter. For further information, refer to the Virtual Service Control section.</p></td></tr><tr><td><p>ChangeTime</p></td><td><p>ChangeTime</p></td><td><p>The time of the last configuration change on the LoadMaster. The configuration has not changed if this value has not changed. This only works if session management is enabled. The time is represented in “Unix time or epoch time” (also known as Portable Operating System Interface (POSIX) time) format. This is a system for describing instants in time, defined as the number of seconds that have elapsed since 00:00:00 Coordinated Universal Time (UTC), Thursday 1st January 1970, not counting leap seconds. For example, 1484150723 is the equivalent of GMT: Wed, 11th January 2017 16:05:23 GMT. There are conversion tools are available online to convert the value to an easily readable format.</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","stats"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"c0446198-efdb-413e-885a-f3df1153c432","name":"Statistics","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/stats"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 23 May 2025 15:42:28 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <CPU>\n                <total>\n                    <User>0</User>\n                    <System>1</System>\n                    <Idle>99</Idle>\n                    <IOWaiting>0</IOWaiting>\n                </total>\n                <cpu0>\n                    <User>0</User>\n                    <System>1</System>\n                    <HWInterrupts>0</HWInterrupts>\n                    <SWInterrupts>0</SWInterrupts>\n                    <Idle>99</Idle>\n                    <IOWaiting>0</IOWaiting>\n                </cpu0>\n                <cpu1>\n                    <User>0</User>\n                    <System>1</System>\n                    <HWInterrupts>0</HWInterrupts>\n                    <SWInterrupts>0</SWInterrupts>\n                    <Idle>98</Idle>\n                    <IOWaiting>0</IOWaiting>\n                </cpu1>\n            </CPU>\n            <Memory>\n                <MBtotal>2003</MBtotal>\n                <memused>251720</memused>\n                <MBused>245</MBused>\n                <percentmemused>12</percentmemused>\n                <memfree>1799464</memfree>\n                <MBfree>1757</MBfree>\n                <percentmemfree>88</percentmemfree>\n            </Memory>\n            <Network>\n                <eth0>\n                    <ifaceID>0</ifaceID>\n                    <speed>10000</speed>\n                    <in>0.0</in>\n                    <inbytes>12</inbytes>\n                    <inbytesTotal>162041</inbytesTotal>\n                    <out>0.0</out>\n                    <outbytes>8</outbytes>\n                    <outbytesTotal>1073861</outbytesTotal>\n                </eth0>\n            </Network>\n            <DiskUsage>\n                <partition>\n                    <name>/var/log</name>\n                    <GBtotal>7.19</GBtotal>\n                    <GBused>0.02</GBused>\n                    <percentused>0</percentused>\n                    <GBfree>7.17</GBfree>\n                    <percentfree>100</percentfree>\n                </partition>\n                <partition>\n                    <name>/var/log/userlog</name>\n                    <GBtotal>7.68</GBtotal>\n                    <GBused>0.02</GBused>\n                    <percentused>0</percentused>\n                    <GBfree>7.67</GBfree>\n                    <percentfree>100</percentfree>\n                </partition>\n            </DiskUsage>\n            <ClientLimits>\n                <Totals>\n                    <CurrentConnections>0</CurrentConnections>\n                    <CurrentConnectionsBlocked>0</CurrentConnectionsBlocked>\n                    <SuccessfulConnectionAttempts>0</SuccessfulConnectionAttempts>\n                    <SuccessfulRequestAttempts>0</SuccessfulRequestAttempts>\n                    <SuccessfulMatchedRuleAttempts>0</SuccessfulMatchedRuleAttempts>\n                    <ConnectionAttemptsBlocked>0</ConnectionAttemptsBlocked>\n                    <RequestAttemptsBlocked>0</RequestAttemptsBlocked>\n                    <MatchedRulesBlocked>0</MatchedRulesBlocked>\n                </Totals>\n            </ClientLimits>\n            <CountryCounts>\n                <DifferentCountries>0</DifferentCountries>\n                <Total>\n</Total>\n                <LastHour>\n</LastHour>\n                <LastDay>\n</LastDay>\n            </CountryCounts>\n            <VStotals>\n                <ConnsPerSec>0</ConnsPerSec>\n                <TotalConns>0</TotalConns>\n                <BitsPerSec>0</BitsPerSec>\n                <TotalBits>0</TotalBits>\n                <BytesPerSec>0</BytesPerSec>\n                <TotalBytes>0</TotalBytes>\n                <PktsPerSec>0</PktsPerSec>\n                <TotalPackets>0</TotalPackets>\n            </VStotals>\n            <Vs>\n                <VSAddress>IPAddressWouldAppearHere</VSAddress>\n                <VSPort>443</VSPort>\n                <VSProt>tcp</VSProt>\n                <Index>1</Index>\n                <Status>down</Status>\n                <ErrorCode>0</ErrorCode>\n                <Enable>1</Enable>\n                <TotalConns>0</TotalConns>\n                <TotalPkts>0</TotalPkts>\n                <TotalBytes>0</TotalBytes>\n                <TotalBits>0</TotalBits>\n                <ActiveConns>0</ActiveConns>\n                <BytesRead>0</BytesRead>\n                <BytesWritten>0</BytesWritten>\n                <ConnsPerSec>0</ConnsPerSec>\n                <ConnsRateBlocked>0</ConnsRateBlocked>\n                <RequestsRateBlocked>0</RequestsRateBlocked>\n                <MaxConnsBlocked>0</MaxConnsBlocked>\n                <WafEnable>0</WafEnable>\n                <InterceptMode>0</InterceptMode>\n            </Vs>\n            <TPS>\n                <Total>0</Total>\n                <SSL>0</SSL>\n            </TPS>\n            <Timestamp>\n                <Sec>1748014947</Sec>\n                <Usec>942527</Usec>\n                <Period>5006168</Period>\n            </Timestamp>\n            <ChangeTime>1748014475</ChangeTime>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"2a8a1e52-bc72-4be4-8baf-08c18d5b83fd"}],"id":"c719b0d1-50e1-4803-ab38-ef50549b3330","description":"<p>This section provides details about the <strong>stats</strong> command.</p>\n","_postman_id":"c719b0d1-50e1-4803-ab38-ef50549b3330"},{"name":"Real Servers","item":[{"name":"Real Server Commands","item":[{"name":"Add a Real Server (using IP Address, Port, and Protocol)","id":"1ed948fc-ace9-42a2-9b28-cb055c0272bd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrs?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=InsertRealServerIPAddress&rsport=443","description":"<p>A new Real Server can be added by running the <strong>addrs</strong> command.</p>\n<p>To add a non-local Real Server, set the <strong>non_local</strong> parameter to <strong>1</strong>.</p>\n<p>For more details on additional (optional) parameters, refer to the <a href=\"#99a4f465-9493-44d7-ad55-e5809076603b\">Modify a Real Server (using IP Address, Port, and Protocol)</a> section.</p>\n<blockquote>\n<p>Frequently adding or deleting Real Servers or SubVSs at a high velocity is not the recommended best practice. If you need to modify parameters, use the <strong>modrs</strong> command. If you need to constantly modify Real Server IP addresses, moving to FQDNs (rather than IP addresses) is the recommended best practice.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addrs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"}],"variable":[]}},"response":[{"id":"826439c4-2a0f-424e-970c-7e48ebc267e4","name":"Add a Real Server (using IP Address, Port, and Protocol)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrs?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=InsertRealServerIPAddress&rsport=443","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addrs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 10:57:27 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Rs>\n                <Status>Down</Status>\n                <VSIndex>1</VSIndex>\n                <RsIndex>1</RsIndex>\n                <Addr>IP address would appear here</Addr>\n                <Port>443</Port>\n                <DnsName></DnsName>\n                <Forward>nat</Forward>\n                <Weight>1000</Weight>\n                <Limit>0</Limit>\n                <RateLimit>0</RateLimit>\n                <Follow>0</Follow>\n                <Enable>Y</Enable>\n                <Critical>N</Critical>\n                <Nrules>0</Nrules>\n            </Rs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"1ed948fc-ace9-42a2-9b28-cb055c0272bd"},{"name":"Add a Real Server (using the Virtual Service ID)","id":"b0bf130d-3383-4581-9e9a-06761c6cd948","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showrs?vs=1&rs=InsertRealServerIPAddress&rsport=443","description":"<p>A new Real Server can be added by running the <strong>addrs</strong> command. This section shows how to add a Real Server to a Virtual Service using the Virtual Service ID.</p>\n<p>To add a non-local Real Server, set the <strong>non_local</strong> parameter to <strong>1</strong>.</p>\n<p>For more details on additional (optional) parameters, refer to the <a href=\"#99a4f465-9493-44d7-ad55-e5809076603b\">Modify a Real Server (using IP Address, Port, and Protocol)</a> section.</p>\n<blockquote>\n<p>Frequently adding or deleting Real Servers or SubVSs at a high velocity is not the recommended best practice. If you need to modify parameters, use the <strong>modrs</strong> command. If you need to constantly modify Real Server IP addresses, moving to FQDNs (rather than IP addresses) is the recommended best practice.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showrs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"1"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"}],"variable":[]}},"response":[{"id":"9fe792e5-7776-44c8-9344-5126602e5ef4","name":"Add a Real Server (using the Virtual Service ID)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showrs?vs=1&rs=InsertRealServerIPAddress&rsport=443","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","showrs"],"query":[{"key":"vs","value":"1"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 11:08:33 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Rs>\n                <Status>Down</Status>\n                <VSIndex>1</VSIndex>\n                <RsIndex>2</RsIndex>\n                <Addr>IP address would appear here</Addr>\n                <Port>443</Port>\n                <DnsName></DnsName>\n                <Forward>nat</Forward>\n                <Weight>1000</Weight>\n                <Limit>0</Limit>\n                <RateLimit>0</RateLimit>\n                <Follow>0</Follow>\n                <Enable>Y</Enable>\n                <Critical>N</Critical>\n                <Nrules>0</Nrules>\n            </Rs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"b0bf130d-3383-4581-9e9a-06761c6cd948"},{"name":"Modify a Real Server (using IP Address, Port, and Protocol)","id":"fd58657d-f51e-4771-a24e-48a2821b5e70","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrs?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=InsertRealServerIPAddress&rsport=443","description":"<p>To modify Real Server settings, run the <strong>modrs</strong> command.</p>\n<p><strong>addrs</strong> and <strong>modrs</strong> accept the following additional (optional) parameters.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Range</b></p></td><td><p><b>Description</b></p></td></tr><tr><td>addtoallsubvs<br /></td><td>B<br /></td><td>0<br /></td><td>0 - Disabled<br />1 - Enabled</td><td><p>Enable this option when adding a Real Server to all SubVSs of a Virtual Service.</p><p>When using this parameter, ensure you set the <b>vs</b> parameter to the ID of the SubVS rather than the parent Virtual Service.</p><p>Run the <b>listvs</b> command to retrieve the <b>VSIndex</b> of the SubVS.</p></td></tr><tr><td><p>weight</p></td><td><p>I</p></td><td><p>1000</p></td><td><p>1-65535</p></td><td><p>When using weighted round robin scheduling, the weight of a Real Server is used to indicate what relative proportion of traffic should be sent to the server. Servers with higher values will receive more traffic.</p><p>The weight of a SubVS can also be updated using the <b>modrs</b> command - set the <b>rs</b> to the number that appears in the <b>Id</b> column for the relevant SubVS in the parent Virtual Service modify screen.</p></td></tr><tr><td><p>newport</p></td><td><p>I</p></td><td><p>unset</p></td><td><p>3-65535 (change the Port of the Real Server)</p></td><td><p>The port on the Real Server to be used.</p></td></tr><tr><td><p>forward</p></td><td><p>S</p></td><td><p>nat</p></td><td><p>nat, route</p></td><td><p>The type of forwarding method used. The default method is NAT. Direct server return can only be used with Layer 4 services.</p></td></tr><tr><td><p>enable</p></td><td><p>B</p></td><td><p>1</p></td><td><p> </p></td><td><p>Enable or disable the Real Server.</p></td></tr><tr><td><p>limit</p></td><td><p>I</p></td><td><p>0</p></td><td><p>0-100000</p></td><td><p>The maximum number of open connections that can be sent to a Real Server before it is taken out of rotation.</p></td></tr><tr><td><p>non_local</p></td><td><p>B</p></td><td><p>0</p></td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td><p>By default only Real Servers on local networks can be assigned to a Virtual Service. Enabling this option will allow a non-local Real Server to be assigned to the Virtual Service.</p><p>This option will only be available if <b>nonlocalrs</b> has been enabled and the <b>Transparent</b> option has been disabled on the relevant Virtual Service.</p></td></tr><tr><td><p>critical</p></td><td><p>B</p></td><td><p>0</p></td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td><p>Enabling this parameter indicates that the Real Server is required for the Virtual Service to be considered available. The Virtual Service will be marked as down if the Real Server has failed or is disabled.</p></td></tr><tr><td><p>follow</p></td><td><p>I</p></td><td><p></p></td><td><p>RsIndex of Real Server to follow</p></td><td><p>Specify what Real Server the health check is based on by setting this parameter to the <b>RsIndex</b> of the Real Server to be followed. This can either be set to the <b>RsIndex</b> of the same Real Server to health check based on that particular Real Server status, or another Real Server can be specified. For example – if Real Server 1 is down, any Real Servers which have their health check based on Real Server 1 will also be marked as down, regardless of their actual Real Server status.</p></td></tr></tbody></table>\n\n<blockquote>\n<p>If the service is a Layer 7 service then setting the ‘forward’ parameter to ‘route’ will have no effect.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modrs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"}],"variable":[]}},"response":[{"id":"77afcb0f-c291-47ab-a69e-8114196012ab","name":"Modify a Real Server (using IP Address, Port, and Protocol)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrs?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=InsertRealServerIPAddress&rsport=443","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modrs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 11:02:39 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"fd58657d-f51e-4771-a24e-48a2821b5e70"},{"name":"Modify a Real Server using VSIndex","id":"143e6045-17ac-4e86-9c5c-0035ba746a1b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrs?vs=1&rs=InsertRealServerIPAddress&rsport=443","description":"<p>You can modify the SubVS parameters, such as <strong>critical</strong> using the <strong>RsIndex</strong> of the SubVS. To modify Real Server settings, run the <strong>modrs</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modrs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"1"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"}],"variable":[]}},"response":[{"id":"e251e68c-798c-4eae-83b4-ac6b4e35ff6e","name":"Modify a Real Server using VSIndex","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrs?vs=1&rs=InsertRealServerIPAddress&rsport=443","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modrs"],"query":[{"key":"vs","value":"1"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 11:10:28 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"143e6045-17ac-4e86-9c5c-0035ba746a1b"},{"name":"Modify a Real Server using SubVS Index","id":"946720f8-acb4-4818-a444-7862a2e53838","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrs?vs=1&rs=!1&critical=0","description":"<p>To modify the settings of a Real Server that has been added to a SubVS, use the VS <strong>Index</strong> of the SubVS and the <strong>RsIndex</strong> of the Real Server.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modrs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"1"},{"key":"rs","value":"!1"},{"key":"critical","value":"0"}],"variable":[]}},"response":[{"id":"95e5a91f-1f42-462c-90c9-07970134ba8f","name":"Modify a Real Server using SubVS Index","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrs?vs=1&rs=!1&critical=0","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modrs"],"query":[{"key":"vs","value":"1"},{"key":"rs","value":"!1"},{"key":"critical","value":"0"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 11:20:08 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"946720f8-acb4-4818-a444-7862a2e53838"},{"name":"Show a Real Server (using IP Address, Port, and Protocol)","id":"c7613d04-83e7-4db3-a770-0b6aca30f306","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrs?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=InsertRealServerIPAddress&rsport=443","description":"<p>To display details about a particular Real Server, run the <strong>showrs</strong> command.</p>\n<p>The Real Server IP address (that the <strong>rs</strong> parameter can be set to) can be in either IPv4 or IPv6 formats.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addrs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"}],"variable":[]}},"response":[{"id":"1c2e17f2-8c42-4f17-88a5-2643a4122064","name":"Show a Real Server (using IP Address, Port, and Protocol)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrs?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=InsertRealServerIPAddress&rsport=443","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addrs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 11:06:13 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Rs>\n                <Status>Down</Status>\n                <VSIndex>1</VSIndex>\n                <RsIndex>2</RsIndex>\n                <Addr>IP address would appear here</Addr>\n                <Port>443</Port>\n                <DnsName></DnsName>\n                <Forward>nat</Forward>\n                <Weight>1000</Weight>\n                <Limit>0</Limit>\n                <RateLimit>0</RateLimit>\n                <Follow>0</Follow>\n                <Enable>Y</Enable>\n                <Critical>N</Critical>\n                <Nrules>0</Nrules>\n            </Rs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"c7613d04-83e7-4db3-a770-0b6aca30f306"},{"name":"Delete a Real Server (using IP Address, Port, and Protocol)","id":"e9d05134-ee42-4f13-9348-7fdbbc4893f5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrs?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=InsertRealServerIPAddress&rsport=443","description":"<p>To delete a Real Server from a Virtual Service, run the <strong>delrs</strong> command.</p>\n<blockquote>\n<p>Frequently adding or deleting Real Servers or SubVSs at a high velocity is not the recommended best practice. If you need to modify parameters, use the <strong>modrs</strong> command. If you need to constantly modify Real Server IP addresses, moving to FQDNs (rather than IP addresses) is the recommended best practice.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delrs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"}],"variable":[]}},"response":[{"id":"5a39dfd7-9514-4b5b-adc7-3c6a66c9f0eb","name":"Delete a Real Server (using IP Address, Port, and Protocol)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrs?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=InsertRealServerIPAddress&rsport=443","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delrs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 11:21:44 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"e9d05134-ee42-4f13-9348-7fdbbc4893f5"},{"name":"Delete a Real Server (using Real Server ID)","id":"ba1b0831-0b07-47c1-839e-544380c2e747","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrs?vs=1&rs=InsertRealServerIPAddress&rsport=443","description":"<p>To delete a Real Server from a Virtual Service using Real Server ID, run the <strong>delrs</strong> command.</p>\n<blockquote>\n<p>Frequently adding or deleting Real Servers or SubVSs at a high velocity is not the recommended best practice. If you need to modify parameters, use the <strong>modrs</strong> command. If you need to constantly modify Real Server IP addresses, moving to FQDNs (rather than IP addresses) is the recommended best practice.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delrs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"1"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"}],"variable":[]}},"response":[{"id":"96041a10-eb98-4d96-a36a-d5b5b4a373bc","name":"Delete a Real Server (using Real Server ID)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrs?vs=1&rs=InsertRealServerIPAddress&rsport=443","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delrs"],"query":[{"key":"vs","value":"1"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 11:22:56 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"ba1b0831-0b07-47c1-839e-544380c2e747"}],"id":"85111db8-d0e2-486e-bb8c-e987e0d775de","description":"<p>The <strong>rs</strong> parameter accepts integers (ID), service names (for SubVSs), and IP addresses. The ID can be found in the element when doing a <strong>showvs</strong> command.</p>\n<p>Alternatively, check the <strong>Modify Virtual Service</strong> screen in the UI, which lists Real Server ID in the <strong>Id</strong> column in the <strong>Real Servers</strong> section.</p>\n<p>For the <strong>rs</strong> parameter, when using <strong>RSIndex</strong>, always precede it with an exclamation mark (‘!’).</p>\n","_postman_id":"85111db8-d0e2-486e-bb8c-e987e0d775de"},{"name":"Enabling/Disabling Real Servers","item":[{"name":"Globally Enable a Real Server","id":"74775501-2ea7-4a44-a419-46bd63e552bd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/enablers?rs=InsertRealServerIPAddress","description":"<p>You can enable Real Server globally, that is, for all Virtual Services by using the <strong>enablers</strong> command.</p>\n<p>The Real Server IP address (that the rs parameter can be set to) can be in either IPv4 or IPv6 formats.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","enablers"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"rs","value":"InsertRealServerIPAddress"}],"variable":[]}},"response":[{"id":"411f09b2-02c7-4800-92cf-258cf596bed3","name":"Globally Enable a Real Server","originalRequest":{"method":"POST","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/enablers?rs=InsertRealServerIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","enablers"],"query":[{"key":"rs","value":"InsertRealServerIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 11:25:36 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"74775501-2ea7-4a44-a419-46bd63e552bd"},{"name":"Locally Enable a Real Server","id":"615ade85-b34a-44af-a3c4-535261101177","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rs=InsertRealServerIPAddress&rsport=80&enable=y","description":"<p>You can enable Real Server locally, that is, for specific Virtual Service by using the <strong>modrs</strong> command.</p>\n<p>The Real Server IP address (that the rs parameter can be set to) can be in either IPv4 or IPv6 formats.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modrs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"80"},{"key":"enable","value":"y"}],"variable":[]}},"response":[{"id":"3a80507a-2f41-41ee-a31c-7350db5edf48","name":"Locally Enable a Real Server","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrs?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=InsertRealServerIPAddress&rsport=443&enable=y","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addrs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"},{"key":"enable","value":"y"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 11:28:23 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Rs>\n                <Status>Down</Status>\n                <VSIndex>1</VSIndex>\n                <RsIndex>2</RsIndex>\n                <Addr>IP address would appear here</Addr>\n                <Port>443</Port>\n                <DnsName></DnsName>\n                <Forward>nat</Forward>\n                <Weight>1000</Weight>\n                <Limit>0</Limit>\n                <RateLimit>0</RateLimit>\n                <Follow>0</Follow>\n                <Enable>Y</Enable>\n                <Critical>N</Critical>\n                <Nrules>0</Nrules>\n            </Rs>\n        </Data>\n    </Success>\n</Response>"},{"id":"52afe0ef-cd41-4d1f-a513-037e6f7de511","name":"Locally Enable a Real Server","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rs=InsertRealServerIPAddress&rsport=80&enable=y","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modrs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"80"},{"key":"enable","value":"y"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 29 Aug 2024 13:18:14 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"615ade85-b34a-44af-a3c4-535261101177"},{"name":"Globally Disable a Real Server","id":"3ab0b3df-1e2d-4294-bf18-53430b2c1439","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/disablers?rs=InsertRealServerIPAddress","description":"<p>You can disable Real Server globally, that is, for all Virtual Services by using the <strong>disablers</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","disablers"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"rs","value":"InsertRealServerIPAddress"}],"variable":[]}},"response":[{"id":"589cdc5d-318e-4f5c-b99b-3907fead5c69","name":"Globally Disable a Real Server","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/disablers?rs=InsertRealServerIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","disablers"],"query":[{"key":"rs","value":"InsertRealServerIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 01 Aug 2024 11:30:18 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"3ab0b3df-1e2d-4294-bf18-53430b2c1439"},{"name":"Locally Disable a Real Server","id":"f79da8e5-ac11-4ee2-a383-6b47232af6c6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rs=InsertRealServerIPAddress&rsport=80&enable=n","description":"<p>You can disable Real Server locally, that is, for specific Virtual Service by using the <strong>modrs</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modrs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"80"},{"key":"enable","value":"n"}],"variable":[]}},"response":[{"id":"3e4181f0-9e9e-4f08-be40-2d62f361cc95","name":"Locally Disable a Real Server","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rs=InsertRealServerIPAddress&rsport=80&enable=n","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modrs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"80"},{"key":"enable","value":"n"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 29 Aug 2024 13:17:20 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"f79da8e5-ac11-4ee2-a383-6b47232af6c6"},{"name":"Locally Enable a Real Server within a SubVS","id":"ef6415d2-897a-4f6f-8891-0a41c9ff654b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrs?vs=2&rs=InsertRealServerIPAddress&rsport=80&enable=y","description":"<p>You can enable Real Server locally, that is, for specific SubVS by using the <strong>modrs</strong> command and setting the <strong>vs</strong> parameter to the <strong>VSIndex</strong> of the SubVS.</p>\n<p>The Real Server IP address (that the <strong>rs</strong> parameter can be set to) can be in either IPv4 or IPv6 format.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modrs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"2"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"80"},{"key":"enable","value":"y"}],"variable":[]}},"response":[{"id":"508982e5-5016-479e-8d0e-74f255a2c353","name":"Locally Enable a Real Server within a SubVS","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrs?vs=2&rs=InsertRealServerIPAddress&rsport=80&enable=y","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modrs"],"query":[{"key":"vs","value":"2"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"80"},{"key":"enable","value":"y"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 29 Aug 2024 13:11:18 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"ef6415d2-897a-4f6f-8891-0a41c9ff654b"},{"name":"Locally Disable a Real Server within a SubVS","id":"8d37a00b-1838-458c-b2bb-84e174675452","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrs?vs=2&rs=InsertRealServerIPAddress&rsport=80&enable=n","description":"<p>You can disable Real Server locally, that is, for specific SubVS by using the <strong>modrs</strong> command and setting the <strong>vs</strong> parameter to the <strong>VSIndex</strong> of the SubVS.</p>\n<p>The Real Server IP address (that the <strong>rs</strong> parameter can be set to) can be in either IPv4 or IPv6 format.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modrs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"2"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"80"},{"key":"enable","value":"n"}],"variable":[]}},"response":[{"id":"8b757a37-6c30-411b-9935-04bca94d6094","name":"Locally Enable a Real Server within a SubVS","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrs?vs=2&rs=InsertRealServerIPAddress&rsport=80&enable=n","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modrs"],"query":[{"key":"vs","value":"2"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"80"},{"key":"enable","value":"n"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 29 Aug 2024 13:14:14 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"8d37a00b-1838-458c-b2bb-84e174675452"}],"id":"f86d4cad-4fd6-462e-bed2-3c4ab69b751b","description":"<p>This section provides commands relating to enabling or disabling Real Servers.</p>\n","_postman_id":"f86d4cad-4fd6-462e-bed2-3c4ab69b751b"}],"id":"e3ca8b4f-7662-4393-9bdc-d90b9b617341","description":"<p>This section provides commands relating to the Real Servers.</p>\n","_postman_id":"e3ca8b4f-7662-4393-9bdc-d90b9b617341"},{"name":"Rules & Checking","item":[{"name":"Show Rules","item":[{"name":"Show Rules","id":"93c23069-17eb-44cf-b50f-dc1659f0c090","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showrule?name=Example02","description":"<p>The rules which are in use within the system can be displayed by using the <strong>showrule</strong> command.</p>\n<p>Running the <strong>showrule</strong> command with no parameters will list all of the existing rules. You can reduce the list by either specifying the <strong>name</strong> parameter of a rule or the <strong>type</strong> of the rules.<br />The type is one of the following:</p>\n<table><tbody><tr><td><p><b>Value</b></p></td><td><p><b>Type</b></p></td><td><p><b>Description</b></p></td></tr><tr><td><p>0</p></td><td><p>MatchContentRule</p></td><td><p>The original rules.</p></td></tr><tr><td><p>1</p></td><td><p>AddHeaderRule</p></td><td><p>Rule to Add header field</p></td></tr><tr><td><p>2</p></td><td><p>DeleteHeaderRule</p></td><td><p>Rule to Delete a header field.</p></td></tr><tr><td><p>3</p></td><td><p>ReplaceHeaderRule</p></td><td><p>Rule to modify a header field.</p></td></tr><tr><td><p>4</p></td><td><p>ModifyURLRule</p></td><td><p>URL rewrite rule.</p></td></tr><tr><td><p>5</p></td><td><p>ReplaceBodyRule</p></td><td><p>Rule to replace a body string.</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"Example02"}],"variable":[]}},"response":[{"id":"aa82d455-1a86-401f-8892-dd6cd24d0014","name":"Show Rules","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showrule?name=Example02","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","showrule"],"query":[{"key":"name","value":"Example02"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 06:33:22 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <MatchContentRule>\n                <Name>Example02</Name>\n                <Pattern>s</Pattern>\n                <MatchType>Regex</MatchType>\n                <AddHost>N</AddHost>\n                <Negate>N</Negate>\n                <CaseIndependent>N</CaseIndependent>\n                <IncludeQuery>N</IncludeQuery>\n                <Header>addheader</Header>\n                <MustFail>N</MustFail>\n            </MatchContentRule>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"93c23069-17eb-44cf-b50f-dc1659f0c090"}],"id":"76c91197-829b-4366-a19f-46afe23d021f","description":"<p>This section provide details about the <strong>showrule</strong> command.</p>\n","_postman_id":"76c91197-829b-4366-a19f-46afe23d021f"},{"name":"Add/Modify a Rule on the System","item":[{"name":"Add a Rule on the System","id":"25bd410e-960d-4b26-9f4c-5d02271ac0f5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrule?name=Example02&pattern=s","description":"<p>You can add a rule by using the <strong>addrule</strong> command.</p>\n<p>When creating a Rule - if the <strong>type</strong> parameter is not specified, it will default to zero, that is, a MatchContentRule. For more details on the <strong>type</strong> parameter, refer to the <a href=\"#22c26349-88a4-4a28-8fde-4e1ff397dc35\">Modify a Rule on the System</a> section.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"Example02"},{"key":"pattern","value":"s"}],"variable":[]}},"response":[{"id":"5669c3de-a179-46f0-8f47-32b9ffa15506","name":"Add a Rule on the System","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrule?name=Example02&pattern=s","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addrule"],"query":[{"key":"name","value":"Example02"},{"key":"pattern","value":"s"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 06:29:53 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <MatchContentRule>\n                <Name>Example02</Name>\n                <Pattern>s</Pattern>\n                <MatchType>Regex</MatchType>\n                <AddHost>N</AddHost>\n                <Negate>N</Negate>\n                <CaseIndependent>N</CaseIndependent>\n                <IncludeQuery>N</IncludeQuery>\n                <Header></Header>\n                <MustFail>N</MustFail>\n            </MatchContentRule>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"25bd410e-960d-4b26-9f4c-5d02271ac0f5"},{"name":"Modify a Rule on the System","id":"1005aeb1-4586-41b7-92ef-57bdb2b17e8d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrule?name=Example02&pattern=s&header=addheader","description":"<p>You can modify the rules by using the <strong>modrule</strong> command.</p>\n<p>The following parameters can be set (dependent on the type of rule). When creating a Rule - If <strong>type</strong> parameter is not specified when performing a modify operation, the type will not be changed.</p>\n<p>Unless modifying/adding an <strong>AddHeaderRule</strong>, the <strong>pattern</strong> parameter must be supplied.</p>\n<p><strong>Type 0 (MatchContentRule)</strong></p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Range</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>matchtype</p></td><td><p>S</p></td><td><p>regex</p></td><td><ul><li><p>regex</p></li><li><p>prefix</p></li><li><p>postfix</p></li></ul></td><td><p>The type of matching to be performed by the rule.</p></td></tr><tr><td><p>inchost</p></td><td><p>B</p></td><td><p>N</p></td><td><p> </p></td><td><p>Prepend the hostname to request URI before performing the match.</p></td></tr><tr><td><p>nocase</p></td><td><p>B</p></td><td><p>N</p></td><td><p> </p></td><td><p>Ignore case when comparing the strings.</p></td></tr><tr><td><p>negate</p></td><td><p>B</p></td><td><p>N</p></td><td><p> </p></td><td><p>Invert the sense of the match.</p></td></tr><tr><td><p>incquery</p></td><td><p>B</p></td><td><p>N</p></td><td><p> </p></td><td><p>Append the query string to the URI before performing a match.</p></td></tr><tr><td><p>header</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>See below</p></td><td><p>The header field name that should be matched. If no header field is set, the default is to match in the URL. Set this to <b>body</b> to match on the body of a request.</p></td></tr><tr><td><p>pattern</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>The pattern to be matched.</p></td></tr><tr><td><p>setonmatch</p></td><td><p>I</p></td><td><p>unset</p></td><td><p>0-9</p></td><td><p>If the rule is successfully matched, set the specified flag.</p></td></tr><tr><td><p>onlyonflag</p></td><td><p>I</p></td><td><p>unset</p></td><td><p>0-9</p></td><td><p>Only try to execute this rule if the specified flag is set.</p><p>Using the <b>onlyonflag</b>, <b>onlyonnoflag</b>, and <b>setonmatch</b> parameters, it is possible to make rules dependent on each other, that is, only execute a particular rule if another rule has been successfully matched. For more detailed instructions on ‘chaining’ rules, refer to the <a href=\"https://kemptechnologies.com/documentation/latestga/203125019\">Content Rules, Feature Description</a> document.</p></td></tr><tr><td>onlyonnoflag</td><td>I</td><td>unset</td><td>0-9</td><td>Only try to execute this rule if the specified flag is not set.</td></tr><tr><td><p>mustfail</p></td><td><p>B</p></td><td><p>0 - Disabled</p></td><td><p>0 – Disabled</p><p>1 - Enabled</p></td><td><p>If this rule is matched, then always fail to connect.</p></td></tr></tbody></table>\n\n<blockquote>\n<p>The <strong>header</strong> parameter is optional and is the header in which the match is to be performed.</p>\n</blockquote>\n<p><strong>Type 1 (AddHeaderRule)</strong></p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>header</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>Name of the header field to be added.</p></td></tr><tr><td><p>replacement</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>The replacement string. You can enter a maximum of 255 characters in this parameter.</p></td></tr><tr><td><p>onlyonflag</p></td><td><p>I</p></td><td><p>unset</p></td><td><p>Range: 1-9</p><p>Only try to execute this rule if the specified flag is set.</p><p>Using the <b>onlyonflag</b>, <b>onlyonnoflag</b>, and <b>setonmatch</b> parameters, it is possible to make rules dependent on each other, that is, only execute a particular rule if another rule has been successfully matched. For more detailed instructions on ‘chaining’ rules, refer to the <a href=\"https://kemptechnologies.com/documentation/latestga/203125019\">Content Rules, Feature Description</a> document.</p></td></tr><tr><td>onlyonnoflag</td><td>I</td><td>unset</td><td><p>Range: 1-9</p><p>Only try to execute this rule if the specified flag is not set.</p></td></tr></tbody></table>\n\n<p><strong>Type 2 (DeleteHeaderRule)</strong></p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>pattern</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>The pattern to be matched.</p></td></tr><tr><td><p>onlyonflag</p></td><td><p>I</p></td><td><p>unset</p></td><td><p>Range: 1-9</p><p>Only try to execute this rule if the specified flag is set.</p><p>Using the <b>onlyonflag</b>, <b>onlyonnoflag</b>, and <b>setonmatch</b> parameters, it is possible to make rules dependent on each other, that is, only execute a particular rule if another rule has been successfully matched. For more detailed instructions on ‘chaining’ rules, refer to the <a href=\"https://kemptechnologies.com/documentation/latestga/203125019\">Content Rules, Feature Description</a> document.</p></td></tr><tr><td>onlyonnoflag</td><td>I</td><td>unset</td><td><p>Range: 1-9</p><p>Only try to execute this rule if the specified flag is not set.</p></td></tr></tbody></table>\n\n<p><strong>Type 3 (ReplaceHeaderRule)</strong></p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>header</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>The header field name where the substitution should be performed.</p></td></tr><tr><td><p>replacement</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>The replacement string.</p></td></tr><tr><td><p>pattern</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>The pattern to be matched.</p></td></tr><tr><td><p>onlyonflag</p></td><td><p>I</p></td><td><p>unset</p></td><td><p>Range: 1-9</p><p>Only try to execute this rule if the specified flag is set.</p><p>Using the <b>onlyonflag</b>, <b>onlyonnoflag</b>, and <b>setonmatch</b> parameters, it is possible to make rules dependent on each other, that is, only execute a particular rule if another rule has been successfully matched. For more detailed instructions on ‘chaining’ rules, refer to the <a href=\"https://kemptechnologies.com/documentation/latestga/203125019\">Content Rules, Feature Description</a> document.</p></td></tr><tr><td>onlyonnoflag</td><td>I</td><td>unset</td><td><p>Range: 1-9</p><p>Only try to execute this rule if the specified flag is not set.</p></td></tr></tbody></table>\n\n<p><strong>Type 4 (ModifyURLRule)</strong></p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>replacement</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>How the URL is to be modified.</p></td></tr><tr><td><p>pattern</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>The pattern to be matched.</p></td></tr><tr><td><p>onlyonflag</p></td><td><p>I</p></td><td><p>unset</p></td><td><p>Range: 1-9</p><p>Only try to execute this rule if the specified flag is set.</p><p>Using the <b>onlyonflag</b>, <b>onlyonnoflag</b>, and <b>setonmatch</b> parameters, it is possible to make rules dependent on each other, that is, only execute a particular rule if another rule has been successfully matched. For more detailed instructions on ‘chaining’ rules, refer to the <a href=\"https://kemptechnologies.com/documentation/latestga/203125019\">Content Rules, Feature Description</a> document.</p></td></tr><tr><td>onlyonnoflag</td><td>I</td><td>unset</td><td><p>Range: 1-9</p><p>Only try to execute this rule if the specified flag is not set.</p></td></tr></tbody></table>\n\n<p><strong>Type 5 (ReplaceBodyRule)</strong></p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>replacement</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>The replacement string.</p></td></tr><tr><td><p>pattern</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>The pattern to be matched.</p></td></tr><tr><td><p>onlyonflag</p></td><td><p>I</p></td><td><p>unset</p></td><td><p>Range: 1-9</p><p>Only try to execute this rule if the specified flag is set.</p><p>Using the <b>onlyonflag</b>, <b>onlyonnoflag</b>, and <b>setonmatch</b> parameters, it is possible to make rules dependent on each other, that is, only execute a particular rule if another rule has been successfully matched. For more detailed instructions on ‘chaining’ rules, refer to the <a href=\"https://kemptechnologies.com/documentation/latestga/203125019\">Content Rules, Feature Description</a> document.</p></td></tr><tr><td><p>caseindependent</p></td><td><p>B</p></td><td><p>0 – Disabled</p></td><td><p>Enable this parameter to ignore the case of the strings when comparing.</p><p>0 – Disabled</p><p>1 - Enabled</p></td></tr><tr><td>onlyonnoflag</td><td>I</td><td>unset</td><td><p>Range: 1-9</p><p>Only try to execute this rule if the specified flag is not set.</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"Example02"},{"key":"pattern","value":"s"},{"key":"header","value":"addheader"}],"variable":[]}},"response":[{"id":"ee6fbc19-7564-4e83-bc72-403ca54093c5","name":"Modify a Rule on the System","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modrule?name=Example02&pattern=s&header=addheader","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modrule"],"query":[{"key":"name","value":"Example02"},{"key":"pattern","value":"s"},{"key":"header","value":"addheader"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 06:32:11 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <MatchContentRule>\n                <Name>Example02</Name>\n                <Pattern>s</Pattern>\n                <MatchType>Regex</MatchType>\n                <AddHost>N</AddHost>\n                <Negate>N</Negate>\n                <CaseIndependent>N</CaseIndependent>\n                <IncludeQuery>N</IncludeQuery>\n                <Header>addheader</Header>\n                <MustFail>N</MustFail>\n            </MatchContentRule>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"1005aeb1-4586-41b7-92ef-57bdb2b17e8d"}],"id":"7d4d4b35-66db-4cdf-82a4-f270141fd114","description":"<p>This section provides commands relating to adding or modifying a rule on the system.</p>\n","_postman_id":"7d4d4b35-66db-4cdf-82a4-f270141fd114"},{"name":"Delete a Rule from the System","item":[{"name":"Delete a Rule from the System","id":"f188efaa-e7db-4e68-bdb5-d13dd11e6337","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrule?name=Example02","description":"<p>You can delete the rule by using the <strong>delrule</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"Example02"}],"variable":[]}},"response":[{"id":"7ce49a2c-2f4a-4b37-96ad-b61cf555d701","name":"Delete a Rule from the System","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrule?name=Example02","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delrule"],"query":[{"key":"name","value":"Example02"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 06:36:37 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"f188efaa-e7db-4e68-bdb5-d13dd11e6337"}],"id":"a571d571-0956-4108-9f19-047bf5ba1089","description":"<p>This section provides details about the command to delete a rule from the system.</p>\n","_postman_id":"a571d571-0956-4108-9f19-047bf5ba1089"},{"name":"Add/Delete Real Server Rule","item":[{"name":"Add Real Server Rule","id":"e8831aca-afba-4887-b440-7a94a24ef219","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrsrule?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=InsertRealServerIPAddress&rsport=443&rule=Example02","description":"<p>You can add rules to Real Servers by using the <strong>addrsrule</strong> command.</p>\n<p>The <strong>rs</strong> parameter also accepts integers (ID). The ID (Real Server index) can be found in the <strong>RSIndex</strong> element when doing a <strong>showvs</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addrsrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"},{"key":"rule","value":"Example02"}],"variable":[]}},"response":[{"id":"a265861c-2512-4d33-a619-74311af25ba0","name":"Add Real Server Rule","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrsrule?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=InsertRealServerIPAddress&rsport=443&rule=Example02","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addrsrule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"},{"key":"rule","value":"Example02"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 07:06:16 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"e8831aca-afba-4887-b440-7a94a24ef219"},{"name":"Delete Real Server Rule","id":"40056072-5fbf-4b0c-a7d2-3cf66185c6fc","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrsrule?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=InsertRealServerIPAddress&rsport=443&rule=Example02","description":"<p>You can delete rules from Real Servers by using the <strong>delrsrule</strong> commands.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delrsrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"},{"key":"rule","value":"Example02"}],"variable":[]}},"response":[{"id":"3aacaa75-b1da-4394-9c8d-c20b50b1cfe2","name":"Delete Real Server Rule","originalRequest":{"method":"POST","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrsrule?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=InsertRealServerIPAddress&rsport=443&rule=Example02","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delrsrule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"},{"key":"rule","value":"Example02"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 07:08:02 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"40056072-5fbf-4b0c-a7d2-3cf66185c6fc"}],"id":"b8cafca0-f525-483f-bd5e-acbee0e8bae4","description":"<p>This section provides commands relating to adding or deleting a Real Server rule.</p>\n","_postman_id":"b8cafca0-f525-483f-bd5e-acbee0e8bae4"},{"name":"Add/Delete SubVS Rule","item":[{"name":"Add SubVS Rule","id":"347ba451-b864-4517-a2fa-0f64b1a2c777","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrsrule?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=!3&rule=Example02","description":"<p>Content rules can be added from SubVSs by using the <strong>addrsrule</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addrsrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"!3"},{"key":"rule","value":"Example02"}],"variable":[]}},"response":[{"id":"2b92c282-240f-4d9e-8bb7-b01e1fed8d61","name":"Add SubVS Rule","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrsrule?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=!3&rule=Example02","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addrsrule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"!3"},{"key":"rule","value":"Example02"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 07:36:26 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"347ba451-b864-4517-a2fa-0f64b1a2c777"},{"name":"Add a Content Rule to a Real Server within a SubVS","id":"32922bb9-700b-431c-886a-ad981dc31167","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrsrule?vs=1&rs=InsertRealServerIPAddress&rsport=443&rule=Example02","description":"<p>To add a content rule to a Real Server which is assigned to a SubVS, run the <strong>addrsrule</strong> command.</p>\n<p>Content rules can be added to a SubVS, by using the <strong>addprerule</strong>, <strong>addresponserule</strong>, and <strong>addrequestrule</strong> commands, depending on the type of rule being added.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addrsrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"1"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"},{"key":"rule","value":"Example02"}],"variable":[]}},"response":[{"id":"dfd5dcb4-9e61-4a48-a2af-271ebbf708ed","name":"Add a Content Rule to a Real Server within a SubVS","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrsrule?vs=1&rs=InsertRealServerIPAddress&rsport=443&rule=Example02","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addrsrule"],"query":[{"key":"vs","value":"1"},{"key":"rs","value":"InsertRealServerIPAddress"},{"key":"rsport","value":"443"},{"key":"rule","value":"Example02"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 07:39:13 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"32922bb9-700b-431c-886a-ad981dc31167"},{"name":"Delete SubVS Rule","id":"c1695291-ab36-4c30-8d43-67d21981faaa","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrsrule?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=!3&rule=Example02","description":"<p>Rules can be deleted from SubVS by using the <strong>delrsrule</strong> command.</p>\n<p>The <strong>rs</strong> parameter value must be set to an exclamation mark (<strong>!</strong>), followed by the Real Server ID of the SubVS. You can get the Real Server ID of the SubVS by going to the Virtual Service modify screen, expanding the <strong>SubVSs</strong> section and checking the <strong>Id</strong> number.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delrsrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"!3"},{"key":"rule","value":"Example02"}],"variable":[]}},"response":[{"id":"229c3589-b3cc-4daa-a461-535b1e3adae9","name":"Delete SubVS Rule","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrsrule?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rs=!3&rule=Example02","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delrsrule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rs","value":"!3"},{"key":"rule","value":"Example02"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 07:40:26 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"c1695291-ab36-4c30-8d43-67d21981faaa"}],"id":"7479a7d3-ff2a-4aba-8962-06bcb85c4602","description":"<blockquote>\n<p>Virtual Services and SubVSs share the same attributes. If you want to apply a content rule to a SubVS, you must know the <strong>RsIndex</strong> (ID) of the SubVS. To find the <strong>RsIndex</strong>, run the <strong>listvs</strong> command and scroll down to find the <strong>RsIndex</strong> parameter you want to edit.</p>\n</blockquote>\n<p>To get the <strong>RsIndex</strong> or <strong>VsIndex</strong>, run the <strong>listvs</strong> command. For further information, refer to the <a href=\"#2f003e15-0511-4cbd-97d9-db13383da658\">List All Virtual Services</a> section.</p>\n","_postman_id":"7479a7d3-ff2a-4aba-8962-06bcb85c4602"},{"name":"Add Virtual Service Rules","item":[{"name":"Add Virtual Service Rule (Prerule)","id":"47a93178-b640-4d01-8604-17ef942b66f3","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addprerule?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rule=Example02","description":"<p>You can add rules to Virtual Services by using the <strong>addprerule</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addprerule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rule","value":"Example02"}],"variable":[]}},"response":[{"id":"31ea446f-3ac0-48df-9844-213ad8ca9491","name":"Add Virtual Service Rule (Prerule)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addprerule?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rule=Example02","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addprerule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rule","value":"Example02"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 06:59:59 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"47a93178-b640-4d01-8604-17ef942b66f3"},{"name":"Add Virtual Service Rule (Responserule)","id":"c86511fa-520b-46e6-bb81-755b3289b49e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addresponserule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=ExampleRule2","description":"<p>You can add rules to Virtual Services by using the <strong>addresponserule</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addresponserule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"ExampleRule2"}],"variable":[]}},"response":[{"id":"26d9a089-a2cd-4d25-a277-a4f2e21300be","name":"Add Virtual Service Rule (Responserule)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addresponserule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=ExampleRule2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addresponserule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"ExampleRule2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:05:50 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"c86511fa-520b-46e6-bb81-755b3289b49e"},{"name":"Add Virtual Service Rule (Requestrule)","id":"934adfda-1215-477c-acc4-abfde6068afd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrequestrule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=ExampleRequestRule2","description":"<p>You can add rules to Virtual Services by using the <strong>addrequestrule</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addrequestrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"ExampleRequestRule2"}],"variable":[]}},"response":[{"id":"804dd291-db4c-4019-bed3-399175e28c9f","name":"Add Virtual Service Rule (Requestrule)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addrequestrule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=ExampleRequestRule2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addrequestrule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"ExampleRequestRule2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:01:36 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"934adfda-1215-477c-acc4-abfde6068afd"},{"name":"Add Virtual Service Rule (Responsebodyrule)","id":"c27736b5-b674-415c-a388-a24af90cfa14","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addresponsebodyrule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=ExampleResponseRule2","description":"<p>You can add <strong>Replace String in Response Body</strong> rules to Virtual Services by using the <strong>addresponsebodyrule</strong> command.</p>\n<blockquote>\n<p>If Kerberos Constrained Delegation (KCD) is enabled on the Virtual Service, it is not possible to add a response body rule.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addresponsebodyrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"ExampleResponseRule2"}],"variable":[]}},"response":[{"id":"c94f1f77-bb4b-415e-9ac9-fc09ac120f12","name":"Add Virtual Service Rule (Responsebodyrule)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addresponsebodyrule?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&rule=ExampleResponseRule2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addresponsebodyrule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"rule","value":"ExampleResponseRule2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 14:03:30 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"c27736b5-b674-415c-a388-a24af90cfa14"}],"id":"f8c4b552-cb64-4648-904e-876f236e9c6e","description":"<p>This section provides commands relating to adding Virtual Service rules.</p>\n","_postman_id":"f8c4b552-cb64-4648-904e-876f236e9c6e"},{"name":"Delete Virtual Service Rules","item":[{"name":"Delete Virtual Service Rule (Prerule)","id":"1f7a4cfe-f689-48d7-88e2-c7f51464a751","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delprerule?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rule=Example02","description":"<p>You can delete rules from Virtual Service by using the <strong>delprerule</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delprerule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rule","value":"Example02"}],"variable":[]}},"response":[{"id":"ad2c709c-9983-46b5-8218-d6ca0a150b2d","name":"Delete Virtual Service Rule (Prerule)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delprerule?vs=InsertVirtualServiceIPAddress&port=443&prot=tcp&rule=Example02","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delprerule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"443"},{"key":"prot","value":"tcp"},{"key":"rule","value":"Example02"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 05 Aug 2024 08:57:30 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"1f7a4cfe-f689-48d7-88e2-c7f51464a751"},{"name":"Delete Virtual Service Rule (Responserule)","id":"91263d69-9759-4915-b55d-9d1019cd7f3b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delresponserule?vs=InsertVirtualServiceIPAddress&port=8810&prot=tcp&rule=ExampleResponseRule3","description":"<p>You can delete rules from Virtual Service by using the <strong>delresponserule</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delresponserule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"8810"},{"key":"prot","value":"tcp"},{"key":"rule","value":"ExampleResponseRule3"}],"variable":[]}},"response":[{"id":"efeb289a-dac1-4849-bfd5-dd49b2cb1091","name":"Delete Virtual Service Rule (Responserule)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delresponserule?vs=InsertVirtualServiceIPAddress&port=8810&prot=tcp&rule=ExampleResponseRule3","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delresponserule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"8810"},{"key":"prot","value":"tcp"},{"key":"rule","value":"ExampleResponseRule3"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 11:48:51 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"91263d69-9759-4915-b55d-9d1019cd7f3b"},{"name":"Delete Virtual Service Rule (Requestrule)","id":"79a7d27d-f6c7-4caf-8a17-e6f9d3a32f1c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrequestrule?vs=InsertVirtualServiceIPAddress&prot=tcp&port=8810&rule=ExampleRequestRule2","description":"<p>You can delete rules from Virtual Service by using the <strong>delrequestrule</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delrequestrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"prot","value":"tcp"},{"key":"port","value":"8810"},{"key":"rule","value":"ExampleRequestRule2"}],"variable":[]}},"response":[{"id":"5d99fe0d-6f6e-4430-9572-e63a21d2f107","name":"Delete Virtual Service Rule (Requestrule)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delrequestrule?vs=InsertVirtualServiceIPAddress&prot=tcp&port=8810&rule=ExampleRequestRule2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delrequestrule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"prot","value":"tcp"},{"key":"port","value":"8810"},{"key":"rule","value":"ExampleRequestRule2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 09:52:05 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"79a7d27d-f6c7-4caf-8a17-e6f9d3a32f1c"},{"name":"Delete Virtual Service Rule (Responsebodyrule)","id":"03ea7537-d6a9-4b0a-b196-bdc6c262fc10","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delresponsebodyrule?vs=InsertVirtualServiceIPAddress&port=8810&prot=tcp&rule=ExampleResponseRule","description":"<p>You can delete rules from Virtual Service by using the <strong>delresponsebodyrule</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delresponsebodyrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"8810"},{"key":"prot","value":"tcp"},{"key":"rule","value":"ExampleResponseRule"}],"variable":[]}},"response":[{"id":"3e17df65-d8e4-44f6-8c75-affcf6aa6d61","name":"Delete Virtual Service Rule (Responsebodyrule)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delresponsebodyrule?vs=InsertVirtualServiceIPAddress&port=8810&prot=tcp&rule=ExampleResponseRule","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delresponsebodyrule"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"8810"},{"key":"prot","value":"tcp"},{"key":"rule","value":"ExampleResponseRule"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 11:55:08 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"03ea7537-d6a9-4b0a-b196-bdc6c262fc10"}],"id":"7cfedbcc-4c6d-49a0-b454-876b8406a410","description":"<p>This section provides commands relating to deleting Virtual Service rules.</p>\n","_postman_id":"7cfedbcc-4c6d-49a0-b454-876b8406a410"},{"name":"Check Parameters","item":[{"name":"Show a Health Check Parameter","id":"f06cb2b6-6b6b-4c7e-a090-3eec9d3babb2","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showhealth","description":"<p>The Service Check Parameters can be obtained by using the <strong>showhealth</strong> command.</p>\n<p>The output of the <strong>showhealth</strong> command will display the <strong>RetryInterval</strong>, <strong>Timeout</strong>, and <strong>RetryCount</strong> values.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showhealth"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"bf66cf26-6eda-401a-8d85-1a375bc74ba1","name":"Show a Health Check Parameter","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showhealth"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 05 Aug 2024 09:02:46 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <RetryInterval>9</RetryInterval>\n            <Timeout>4</Timeout>\n            <RetryCount>2</RetryCount>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"f06cb2b6-6b6b-4c7e-a090-3eec9d3babb2"},{"name":"Modify a Health Check Parameter","id":"172f5a97-af45-465f-8dce-9db77efc5d46","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modhealth","description":"<p>You can modify the Service Check Parameters by using the <strong>modhealth</strong> command.</p>\n<blockquote>\n<p><strong>Note:</strong> This section describes how to set the global adaptive parameters. By default, these values are used when the <strong>Schedule</strong> parameter for a Virtual Service is set to <strong>adaptive</strong>. However, you can configure these adaptive parameters on a per-Virtual Service basis, if needed. Refer to the following section for further details on how to do this: <strong>Virtual Services &gt; Virtual Service Parameters &gt; Standard Options</strong>. </p>\n</blockquote>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Default</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Additional Information</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Mandatory</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>RetryInterval</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>9-120 (901)</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>9</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Defined in seconds, this is the delay between health checks. This includes clusters and FQDNs.</p><p>Recommended and default value: <b>9 seconds</b></p><p>Valid values range from the (9) to the (901).</p><p>The is <b>RetryCount</b> \\\\* <b>Timeout</b>  + 1, that is, a value of 9 by default.</p><p>The is 901 [because that is what 60 (maximum Timeout) \\\\* 15 (maximum RetryCount) + 1 is].</p><p>You can manually set the <b>RetryInterval</b> to up to 120 seconds. The <b>RetryInterval</b> value may go above 120 if the <b>Timeout</b> and <b>RetryCount</b> parameters are configured with high enough values.</p><p>If the <b>RetryInterval</b> is above 120 seconds, you must adjust the <b>Timeout </b>and <b>RetryCount</b> values to modify the <b>RetryInterval</b>.</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>N</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Timeout</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>4-60</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>4</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Defined in seconds, this is the allowed maximum wait time for a reply to a health check.</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>N</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>RetryCount</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>2-15</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>2</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This is the consecutive number of times in which a health check must fail before it is marked down and removed from the load balancing pool.</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>N</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>\n\n<p>To configure all three parameters, you must first set the <strong>Timeout</strong> and/or <strong>RetryCount</strong> in one request. Then, set the <strong>RetryInterval</strong> in the second request.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modhealth"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"96526d92-e101-4dd9-9876-cd993a08d63c","name":"Modify a Health Check Parameter","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modhealth"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 05 Aug 2024 09:03:39 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <RetryInterval>9</RetryInterval>\n            <Timeout>4</Timeout>\n            <RetryCount>2</RetryCount>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"172f5a97-af45-465f-8dce-9db77efc5d46"},{"name":"Set the Timeout and RetryCount value","id":"b41f888e-98d8-4daa-897f-0a85aa5cfc82","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modhealth?Timeout=5&RetryCount=3","description":"<p>Set the value of <strong>Timeout</strong> and <strong>RetryCount</strong> parameters using the <strong>modhealth</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modhealth"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"Timeout","value":"5"},{"key":"RetryCount","value":"3"}],"variable":[]}},"response":[{"id":"e207abea-7b6b-44b7-9978-639295cfa55b","name":"Set the Timeout and RetryCount value","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modhealth?Timeout=5&RetryCount=3","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modhealth"],"query":[{"key":"Timeout","value":"5"},{"key":"RetryCount","value":"3"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 05 Aug 2024 09:06:19 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <RetryInterval>16</RetryInterval>\n            <Timeout>5</Timeout>\n            <RetryCount>3</RetryCount>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"b41f888e-98d8-4daa-897f-0a85aa5cfc82"},{"name":"Set the RetryInterval","id":"1ed179a5-bd38-47d6-bc8b-beaa7a0a1d6a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modhealth?RetryInterval=18","description":"<p>Set the value of <strong>RetryInterval</strong> parameter using the <strong>modhealth</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modhealth"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"RetryInterval","value":"18"}],"variable":[]}},"response":[{"id":"0a0136f7-9c93-4e80-8ee5-32edafbc6984","name":"Set the RetryInterval","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modhealth?RetryInterval=18","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modhealth"],"query":[{"key":"RetryInterval","value":"18"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 05 Aug 2024 09:07:18 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <RetryInterval>18</RetryInterval>\n            <Timeout>5</Timeout>\n            <RetryCount>3</RetryCount>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"1ed179a5-bd38-47d6-bc8b-beaa7a0a1d6a"},{"name":"Show the Adaptive Check Parameter","id":"bdb98a6b-1952-491c-9706-3d567e5688bc","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showadaptive?=","description":"<p>The Adaptive Check parameters can be obtained by using the <strong>showadaptive</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showadaptive"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"","value":""}],"variable":[]}},"response":[{"id":"7e80e4d8-aba9-4d0b-86bf-87a6904f2be3","name":"Show the Adaptive Check Parameter","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showadaptive?","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","showadaptive"],"query":[{"key":"","value":null}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 05 Aug 2024 09:08:37 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <AdaptiveURL>/load</AdaptiveURL>\n            <AdaptivePort>80</AdaptivePort>\n            <AdaptiveInterval>10</AdaptiveInterval>\n            <MinPercent>5</MinPercent>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"bdb98a6b-1952-491c-9706-3d567e5688bc"},{"name":"Modify the Adaptive Check Parameter","id":"ca22ed20-fddf-4bea-867f-7680a89093ab","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modadaptive?AdaptiveURL=/load&AdaptivePort=80&AdaptiveInterval=11&MinPercent=10","description":"<p>You can modify the Adaptive Check parameters by using the <strong>modadaptive</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modadaptive"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"AdaptiveURL","value":"/load"},{"key":"AdaptivePort","value":"80"},{"key":"AdaptiveInterval","value":"11"},{"key":"MinPercent","value":"10"}],"variable":[]}},"response":[{"id":"353a7dc2-59f3-4adc-bdbe-83e35878e104","name":"Modify the Adaptive Check Parameter","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modadaptive?AdaptiveURL=/load&AdaptivePort=80&AdaptiveInterval=11&MinPercent=10","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modadaptive"],"query":[{"key":"AdaptiveURL","value":"/load"},{"key":"AdaptivePort","value":"80"},{"key":"AdaptiveInterval","value":"11"},{"key":"MinPercent","value":"10"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 04:12:06 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <AdaptiveURL>/load</AdaptiveURL>\n            <AdaptivePort>80</AdaptivePort>\n            <AdaptiveInterval>11</AdaptiveInterval>\n            <MinPercent>10</MinPercent>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"ca22ed20-fddf-4bea-867f-7680a89093ab"}],"id":"55b31ecb-f377-408a-ba2a-9fc42c37de09","description":"<p>This section provides commands relating to the check parameters.</p>\n","_postman_id":"55b31ecb-f377-408a-ba2a-9fc42c37de09"}],"id":"e05d6d65-7211-4c04-a2e3-b661a705ce95","description":"<p>Content Rules can be managed using the RESTful API.</p>\n","_postman_id":"e05d6d65-7211-4c04-a2e3-b661a705ce95"},{"name":"Certificates & Security","item":[{"name":"Certificate Management","item":[{"name":"List the Installed Certificates","id":"c44caac3-08b9-4285-b51b-c6f4e514eebc","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listcert","description":"<p>To list the currently installed certificates and their fingerprints, run the <strong>listcert</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listcert"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"0c21ea25-e3a0-45fa-b5b9-1a67cd861056","name":"List the Installed Certificates","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:{{vault:authorization-password}}@InsertLoadMasterIPAddress/access/listcert"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 10:15:07 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <cert>\n                <name>certificate</name>\n                <type>RSA</type>\n                <modulus>Modulus would appear here</modulus>\n            </cert>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"c44caac3-08b9-4285-b51b-c6f4e514eebc"},{"name":"List the Installed Intermediate Certificates","id":"6eb04b68-0120-40a7-81fa-938dd6f6312c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listintermediate","description":"<p>To list the currently installed intermediate certificates, run the <strong>listintermediate</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listintermediate"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"3d85566a-f334-43b7-848b-7de882fe7079","name":"List the Installed Intermediate Certificates","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:{{vault:authorization-password}}@InsertLoadMasterIPAddress/access/listintermediate"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 10:13:56 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <cert>\n                <name>Cert</name>\n                <type>RSA</type>\n                <modulus>Modulus would appear here</modulus>\n            </cert>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"6eb04b68-0120-40a7-81fa-938dd6f6312c"},{"name":"Return an Existing Certificate as a BLOB","id":"2e1367d5-c0cf-4941-a198-10bbd4cfe4b3","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/readcert?cert=Certificate","description":"<p>To return an existing certificate as a Binary Large Object (BLOB), run the <strong>readcert</strong> command.</p>\n<p>By default the BLOB is in PEM format. There is an optional parameter called outform that can be used to specify the format – either PEM or DER.<br />DER is Base64-encoded because it is a binary format.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","readcert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cert","value":"Certificate"}],"variable":[]}},"response":[{"id":"4d346943-b056-4f94-bee1-165d70019ac5","name":"Return an Existing Certificate as a BLOB","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:{{vault:authorization-password}}@InsertLoadMasterIPAddress/access/readcert?cert=Certificate","protocol":"https","auth":{"user":"bal","password":"{{vault:authorization-password}}"},"host":["InsertLoadMasterIPAddress"],"path":["access","readcert"],"query":[{"key":"cert","value":"Certificate"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 10:15:41 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <certificate>-----BEGIN CERTIFICATE-----\nCertificte content would appear here\n-----END CERTIFICATE-----\n</certificate>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"2e1367d5-c0cf-4941-a198-10bbd4cfe4b3"},{"name":"Return an Existing Intermediate Certificate as a BLOB","id":"67c48048-5ca7-450a-bb6b-a45ae58eced8","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/readintermediate?cert=Cert","description":"<p>To return an existing intermediate certificate as a BLOB, run the <strong>readintermediate</strong> command.</p>\n<p>By default the BLOB is in PEM format. There is an optional parameter called outform that can be used to specify the format – either PEM or DER.<br />DER is Base64-encoded because it is a binary format.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","readintermediate"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cert","value":"Cert"}],"variable":[]}},"response":[{"id":"79eecf01-0018-44a6-9830-c4e1cd1226d1","name":"Return an Existing Intermediate Certificate as a BLOB","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:{{vault:authorization-password}}@InsertLoadMasterIPAddress/access/readintermediate?cert=Cert","protocol":"https","auth":{"user":"bal","password":"{{vault:authorization-password}}"},"host":["InsertLoadMasterIPAddress"],"path":["access","readintermediate"],"query":[{"key":"cert","value":"Cert"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 10:17:39 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <certificate>-----BEGIN CERTIFICATE-----\nCertificate content would appear here\n-----END CERTIFICATE-----\n</certificate>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"67c48048-5ca7-450a-bb6b-a45ae58eced8"},{"name":"Upload a Certificate","id":"f8e45c84-8b35-492d-8ac7-491c59df58c8","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/certificate.pem"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addcert?cert=Certificate","description":"<p>To upload a certificate, run the <strong>addcert</strong> command.</p>\n<blockquote>\n<p>If a command requires binary data (file uploads), this data must be passed in the \"data\" string and be base64-encoded.</p>\n</blockquote>\n<blockquote>\n<p>If you are uploading a certificate and key file, insert both the certificate and key in the same file.</p>\n</blockquote>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Additional Information</b></p></td><td><p><b>Mandatory</b></p></td></tr><tr><td><p>cert</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>The identifier that the certificate is known as on the LoadMaster.</p><p> </p></td><td><p>Y</p></td></tr><tr><td><p>password</p></td><td><p>S</p></td><td><p>unset</p></td><td><p>The (optional) passphrase that was used to protect the certificate when it was created.</p></td><td><p>N</p></td></tr><tr><td><p>replace</p></td><td><p>B</p></td><td><p>unset</p></td><td><p>0 - Not replacing</p><p>1 - Replacing</p><p>If you are replacing a certificate that already exists in the LoadMaster, set the <b>replace </b>parameter to <b>1</b>. If you are uploading a new certificate, set replace to <b>0</b>.</p></td><td><p>N</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addcert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cert","value":"Certificate"}],"variable":[]}},"response":[{"id":"a12d180d-6c31-4e8d-af83-c3dec74139ac","name":"Upload a Certificate","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/certificate.pem"}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addcert?cert=Certificate","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addcert"],"query":[{"key":"cert","value":"Certificate"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 10:22:06 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Certificate Successfully Installed</Success>\n</Response>"}],"_postman_id":"f8e45c84-8b35-492d-8ac7-491c59df58c8"},{"name":"Delete a Certificate","id":"768ac95c-36db-4c60-9a7a-34b4ab4a83bd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delcert?cert=certificate","description":"<p>To delete a certificate, run the <strong>delcert</strong> command.</p>\n<blockquote>\n<p>It is not possible to delete a certificate assigned to a Virtual Service. Remove the certificate from any Virtual Services before deleting.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delcert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cert","value":"certificate"}],"variable":[]}},"response":[{"id":"00eaaacc-1544-466f-8526-78904c01f0b7","name":"Delete a Certificate","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delcert?cert=certificate","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delcert"],"query":[{"key":"cert","value":"certificate"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 10:18:21 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"768ac95c-36db-4c60-9a7a-34b4ab4a83bd"},{"name":"Add an Intermediate Certificate","id":"5b423a5d-dd6f-4a10-a81d-096b7f3082e3","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/rdpdoc.net.crt"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addintermediate?cert=Cert","description":"<p>To upload an intermediate certificate, run the <strong>addintermediate</strong> command.</p>\n<blockquote>\n<p>If a command requires binary data (file uploads), this data must be passed in the \"data\" string and be base64-encoded.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addintermediate"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cert","value":"Cert"}],"variable":[]}},"response":[{"id":"1a1b79b4-dd33-4b5c-8cdd-f09e007aca26","name":"Add an Intermediate Certificate","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/rdpdoc.net.crt"}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addintermediate?cert=Cert","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addintermediate"],"query":[{"key":"cert","value":"Cert"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 10:21:22 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"shell-init","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"job-working-directory","value":"error retrieving current directory: getcwd: cannot access parent directories: No such file or directory"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Certificate Installed</Success>\n</Response>"}],"_postman_id":"5b423a5d-dd6f-4a10-a81d-096b7f3082e3"},{"name":"Delete an Intermediate Certificate","id":"c8f84ba1-72b2-4af4-8d04-abefde020500","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delintermediate?cert=cert","description":"<p>To delete an intermediate certificate, run the <strong>delintermediate</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delintermediate"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cert","value":"cert"}],"variable":[]}},"response":[{"id":"d49795e3-b37d-4e2c-a38b-985320a9068b","name":"Delete an Intermediate Certificate","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delintermediate?cert=cert","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delintermediate"],"query":[{"key":"cert","value":"cert"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 10:19:27 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"c8f84ba1-72b2-4af4-8d04-abefde020500"},{"name":"Back up Certificates","id":"5da757b3-8425-4f54-9664-f84e5025e9ba","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/backupcert?password=ExamplePassword","description":"<p>To back up all certificates, run the <strong>backupcert</strong> command.</p>\n<p>The password (passphrase) must be alpha numeric and is case-sensitive. The minimum number of characters is 7 with a maximum of 64.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","backupcert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"password","value":"ExamplePassword"}],"variable":[]}},"response":[{"id":"82e4853d-c2d1-4d83-b2d6-38b4bc12c39b","name":"Back up Certificates","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/backupcert?password=ExamplePassword","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","backupcert"],"query":[{"key":"password","value":"ExamplePassword"}]}},"status":"OK","code":200,"_postman_previewlanguage":"raw","header":[{"key":"Date","value":"Fri, 09 Aug 2024 10:24:27 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/octet-stream"},{"key":"Content-Disposition","value":"inline; filename=EXAMPLE"}],"cookie":[],"responseTime":null,"body":"To save the file, in Postman - go to the Body of the response, click the three dots on the right, and click Save response to file."}],"_postman_id":"5da757b3-8425-4f54-9664-f84e5025e9ba"},{"name":"Restore the Certificates","id":"19b4143b-37f4-4000-8559-32f21c69d7c0","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/CertBackup_2024_08_14.13.52"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/restorecert?password=InsertPassword&type=full","description":"<p>To restore certificates, run the <strong>restorecert</strong> command.</p>\n<blockquote>\n<p>If a command requires binary data (file uploads), this data must be passed in the \"data\" string and be base64-encoded.</p>\n</blockquote>\n<p>The password (passphrase) must be alpha numeric and is case-sensitive. The minimum number of characters is 7 with a maximum of 64.</p>\n<p>The type parameter has three possible values:</p>\n<ul>\n<li><strong>full</strong> - All Virtual Service and intermediate certificates</li>\n<li><strong>third</strong> - Intermediate certificates only</li>\n<li><strong>vs</strong> - Virtual Service certificates only</li>\n</ul>\n<blockquote>\n<p>The values for the <strong>type</strong> parameter are case-sensitive. Ensure to use lowercase when setting this parameter.</p>\n</blockquote>\n<p><strong>Replace</strong> is a boolean value that tells the LoadMaster whether to replace an existing certificate with the same name or not.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","restorecert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"password","value":"InsertPassword"},{"key":"type","value":"full"}],"variable":[]}},"response":[{"id":"2374c180-907a-41c6-8f68-c36b9f727db0","name":"Restore the Certificates","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/CertBackup_2024_08_14.13.52"}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/restorecert?password=InsertPassword&type=full","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","restorecert"],"query":[{"key":"password","value":"InsertPassword"},{"key":"type","value":"full"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 13:53:42 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Certificates Restored</Success>\n</Response>"}],"_postman_id":"19b4143b-37f4-4000-8559-32f21c69d7c0"},{"name":"Get or Set the AdminCert or LocalCert","id":"c41a1673-ca81-49b6-8eb5-e9e83ea78f17","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=admincert","description":"<p>You can retrieve or configure the <strong>admincert</strong> or <strong>localcert</strong> parameter values using the <strong>get</strong> or <strong>set</strong> commands.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>admincert</p></td><td><p>S</p></td><td><p> </p></td></tr><tr><td><p>localcert</p></td><td><p>S</p></td><td><p>This parameter is only relevant when using HA.</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","get"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"admincert"}],"variable":[]}},"response":[{"id":"fb3a62cb-caaf-4dcb-909e-77357f1d297f","name":"Get the AdminCert or LocalCert","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=admincert","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","get"],"query":[{"key":"param","value":"admincert"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 13:58:34 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <admincert>ExampleCert</admincert>\n        </Data>\n    </Success>\n</Response>"},{"id":"f102f63d-2b43-48e5-8549-1a1d90ecc4cd","name":"Set the AdminCert or LocalCert","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=admincert&value=ExampleCert","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","set"],"query":[{"key":"param","value":"admincert"},{"key":"value","value":"ExampleCert"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 13:59:45 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"c41a1673-ca81-49b6-8eb5-e9e83ea78f17"}],"id":"ac971238-aa57-4cbc-b3fd-721e70ae6693","description":"<p>You can manage certificates using the following commands.</p>\n","_postman_id":"ac971238-aa57-4cbc-b3fd-721e70ae6693"},{"name":"ACME Certificates","item":[{"name":"Let's Encrypt-specific Operations","item":[{"name":"Get an Existing Let's Encrypt Account","id":"ba6fe0cc-6700-401d-90d5-9811b225a41b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/fetchleaccount?password=ExamplePassword&data=Example","description":"<p>To get an existing Let's Encrypt account registered with other ACME clients such as Certbot, run the <strong>fetchleaccount</strong> command using the <strong>password</strong> parameter.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","fetchleaccount"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"password","value":"ExamplePassword"},{"key":"data","value":"Example"}],"variable":[]}},"response":[{"id":"07ad9bf9-24e3-496b-95f2-d24ed0372037","name":"Get an Existing Let's Encrypt Account","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:{{vault:authorization-password}}@InsertLoadMasterIPAddress/access/fetchleaccount?password=ExamplePassword&data=Example","protocol":"https","auth":{"user":"bal","password":"{{vault:authorization-password}}"},"host":["InsertLoadMasterIPAddress"],"path":["access","fetchleaccount"],"query":[{"key":"password","value":"ExamplePassword"},{"key":"data","value":"Example"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 13:32:14 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <message>Account details successfully fetched from Let's Encrypt CA</message>\n</response>"}],"_postman_id":"ba6fe0cc-6700-401d-90d5-9811b225a41b"},{"name":"Register a Let's Encrypt Account","id":"c381cd3f-5139-40ef-a25f-6cd9274fc5d5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/registeracmeaccount?acmetype=1","description":"<p>To register a Let's Encrypt account to the LoadMaster, run the <strong>registeracmeaccount</strong> command.</p>\n<p>You can also register a Let's Encrypt account using the optional parameter <strong>email</strong>.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","registeracmeaccount"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"acmetype","value":"1"}],"variable":[]}},"response":[{"id":"cce13ec4-9fbc-4bb0-805a-882248922d51","name":"Register a Let's Encrypt Account","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/registeracmeaccount?acmetype=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","registeracmeaccount"],"query":[{"key":"acmetype","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 10:47:42 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Let's Encrypt ACME Account Successfully Registered</Success>\n</Response>"}],"_postman_id":"c381cd3f-5139-40ef-a25f-6cd9274fc5d5"},{"name":"Get the Let's Encrypt Account Information","id":"6306770e-dd46-4197-be70-d37da1545118","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/leaccountinfo","description":"<p>To get the Let's Encrypt account information from the LoadMaster, run the <strong>leaccountinfo</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","leaccountinfo"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"5c0afd15-7261-440d-9be3-c945b6c75ae1","name":"Get the Let's Encrypt Account Information","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/leaccountinfo"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 25 Mar 2025 14:49:54 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <AccountID>https://acme-v02.api.letsencrypt.org/acme/acct/NumberWouldAppearHere</AccountID>\n            <AccountEmail>example@email.com</AccountEmail>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"6306770e-dd46-4197-be70-d37da1545118"},{"name":"Get the Let's Encrypt Directory URL Information","id":"4d4bf68e-55ae-4cd7-9e6b-35ebedc67cbe","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=directoryurl","description":"<p>To get the Let's Encrypt directory URL information, run the <strong>get</strong> command for the <strong>directoryurl</strong> parameter.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","get"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"directoryurl"}],"variable":[]}},"response":[{"id":"c5bb6686-7bdb-40c3-84b5-f258c2f04191","name":"Get the Let's Encrypt Directory URL Information","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=directoryurl","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","get"],"query":[{"key":"param","value":"directoryurl"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 25 Mar 2025 15:21:52 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <directoryurl>https://acme-v02.api.letsencrypt.org/directory</directoryurl>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"4d4bf68e-55ae-4cd7-9e6b-35ebedc67cbe"},{"name":"Set the Let's Encrypt Directory URL Information","id":"e2337e8c-318c-48c8-9a4e-73f87b913259","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=directoryurl&value=https://acme-staging-v02.api.letsencrypt.org/directory","description":"<p>To set the Let's Encrypt directory URL information, run the <strong>set</strong> command for the <strong>directoryurl</strong> parameter.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","set"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"directoryurl"},{"key":"value","value":"https://acme-staging-v02.api.letsencrypt.org/directory"}],"variable":[]}},"response":[{"id":"853d64b3-e363-47c9-b4cb-39a5b91e1562","name":"Get the Let's Encrypt Directory URL Information","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=directoryurl","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","get"],"query":[{"key":"param","value":"directoryurl"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 25 Mar 2025 15:21:52 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"e2337e8c-318c-48c8-9a4e-73f87b913259"},{"name":"List the Let's Encrypt Certificates","id":"059f741c-8706-4a41-adb5-569d801032fa","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listlecert","description":"<p>To list the Let's Encrypt certificates that are installed on the LoadMaster, run the <strong>listlecert</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listlecert"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"9a5aa32e-db68-430b-9db3-df0214cbfb44","name":"List the Let's Encrypt Certificates","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listlecert"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 10:47:42 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n<Success><Data>\n<Certificate>\n<Identifier>test-cert</Identifier>\n<DomainName>example.domain.com</DomainName>\n<ExpiryDate>March 14 07:02:30 2025 GMT</ExpiryDate>\n<SubjectAlternateNames></SubjectAlternateNames>\n<Type>rsa</Type>\n<KeySize>2048</KeySize>\n<HTTPChallengeVS>IPAddressWouldAppearHere:80</HTTPChallengeVS>\n<VirtualServices></VirtualServices>\n</Certificate>\n</Data></Success>\n</Response>"}],"_postman_id":"059f741c-8706-4a41-adb5-569d801032fa"},{"name":"Get the Details about a Specific Let's Encrypt Certificate","id":"a93a393f-8e04-4aca-bd41-778b02844f55","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getlecert?cert=test-cert","description":"<p>To get the details of a specific Let's Encrypt certificate from the LoadMaster, run the <strong>getlecert</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getlecert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cert","value":"test-cert"}],"variable":[]}},"response":[{"id":"de85ee31-42a0-4aee-a538-b8e98be0bfaa","name":"Get the details about a Specific Let's Encrypt Certificate","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getlecert?cert=test-cert","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","getlecert"],"query":[{"key":"cert","value":"test-cert"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 10:47:42 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n<Success><Data>\n<Certificate>\n<Identifier>test-cert</Identifier>\n<DomainName>example.domain.com</DomainName>\n<ExpiryDate>March 14 07:02:30 2025 GMT</ExpiryDate>\n<SubjectAlternateNames></SubjectAlternateNames>\n<Type>rsa</Type>\n<KeySize>2048</KeySize>\n<HTTPChallengeVS>IPAddressWouldAppearHere:80</HTTPChallengeVS>\n<VirtualServices></VirtualServices>\n</Certificate>\n</Data></Success>\n</Response>"}],"_postman_id":"a93a393f-8e04-4aca-bd41-778b02844f55"},{"name":"Request a New Certificate from Let's Encrypt","id":"e375d303-7f34-48b2-8eb3-c08a474a78b8","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addlecert?cert=CertificateIdentifier&cn=fqdn.example.com&vid=1","description":"<p>To request a new certificate from Let's Encrypt, run the <strong>addlecert</strong> command specifying <strong>cert</strong>, <strong>cn</strong>, and <strong>vid</strong> as mandatory parameters.</p>\n<p>Other optional parameters are also available, such as:<br />san1,san2,..,san10, vid1,vid2,...vid10 are for SAN and their respective VID, country, state, city, company, organization, email, key_size, and so on.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addlecert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cert","value":"CertificateIdentifier"},{"key":"cn","value":"fqdn.example.com"},{"key":"vid","value":"1"}],"variable":[]}},"response":[{"id":"518d6488-c418-4c6e-b008-e00e297bdcac","name":"Request a new Certificate from Let's Encrypt","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addlecert?cert=CertificateIdentifier&cn=fqdn.example.com&vid=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addlecert"],"query":[{"key":"cert","value":"CertificateIdentifier"},{"key":"cn","value":"fqdn.example.com"},{"key":"vid","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 25 Mar 2025 14:49:54 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Message>Certificate 2048-cert successfully registered</Message>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"e375d303-7f34-48b2-8eb3-c08a474a78b8"},{"name":"Renew a Let's Encrypt Certificate","id":"bd82fd51-6f8a-41b6-aa62-d532b84726e6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/renewlecert?cert=vs_le_cert","description":"<p>To renew a Let's Encrypt certificate, run the <strong>renewlecert</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","renewlecert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cert","value":"vs_le_cert"}],"variable":[]}},"response":[{"id":"b2dc7f78-73c9-4e1b-916f-b358c9ba90ce","name":"Renew a Let's Encrypt Certificate","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/renewlecert?cert=vs_le_cert","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","renewlecert"],"query":[{"key":"cert","value":"vs_le_cert"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 25 Mar 2025 14:49:54 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Message>Certificate vs_le_cert successfully renewed</Message>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"bd82fd51-6f8a-41b6-aa62-d532b84726e6"},{"name":"Delete a Let's Encrypt Certificate","id":"6d1597e2-e9be-42f2-81c2-0c10f166b063","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/dellecert?cert=vs_le_cert","description":"<p>To delete a Let's Encrypt certificate from the LoadMaster, run the <strong>dellecert</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","dellecert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cert","value":"vs_le_cert"}],"variable":[]}},"response":[{"id":"3d18527a-cd2f-45d1-9c7c-75799c70e717","name":"Delete a Let's Encrypt Certificate","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/dellecert?cert=vs_le_cert","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","dellecert"],"query":[{"key":"cert","value":"vs_le_cert"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 25 Mar 2025 14:49:54 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"6d1597e2-e9be-42f2-81c2-0c10f166b063"},{"name":"Get the Renew Period","id":"f0f6d8c8-2ee5-4a2e-ba21-af28eb41b4c9","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=renewperiod","description":"<p>To get the details of the <strong>Renew Period</strong> for the Let's Encrypt certificates, run the <strong>get</strong> command for the <strong>renewperiod</strong> parameter.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","get"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"renewperiod"}],"variable":[]}},"response":[{"id":"520280ab-6758-421a-bc19-f1c0248dc0ef","name":"Get the Renew Period","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=renewperiod","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","get"],"query":[{"key":"param","value":"renewperiod"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 25 Mar 2025 15:16:06 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <renewperiod>30</renewperiod>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"f0f6d8c8-2ee5-4a2e-ba21-af28eb41b4c9"},{"name":"Set the Renew Period","id":"5282a535-fc31-4b4a-8b21-34b6b9eb7775","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=renewperiod&value=40","description":"<p>To set the <strong>Renew Period</strong> for the Let's Encrypt certificates, run the <strong>set</strong> command for the <strong>renewperiod</strong> parameter.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","set"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"renewperiod"},{"key":"value","value":"40"}],"variable":[]}},"response":[{"id":"e4763fdb-b36f-4032-8982-f5d2e5c8789f","name":"Set the Renew Period","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=renewperiod&value=40","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","set"],"query":[{"key":"param","value":"renewperiod"},{"key":"value","value":"40"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 25 Mar 2025 15:17:02 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"5282a535-fc31-4b4a-8b21-34b6b9eb7775"}],"id":"d4f78d1d-2faf-4238-a2df-a1beb2c782fc","description":"<p>There are a number of legacy Let's Encrypt-specific commands that still work for backwards compatibility such as <strong>registerleaccount</strong>, <strong>addlecert</strong>, <strong>renewlecert</strong>, <strong>dellecert</strong>, <strong>listlecert</strong>, <strong>leaccountinfo</strong>, and <strong>getlecert</strong>. These legacy Let's Encrypt-specific commands work on LTSF LoadMasters. The <strong>acme</strong> commands mentioned for Let's Encrypt in the sections below are not supported in the LTSF LoadMaster version yet.</p>\n","_postman_id":"d4f78d1d-2faf-4238-a2df-a1beb2c782fc"},{"name":"DigiCert-specific Operations","item":[{"name":"Set the DigiCert Key ID","id":"ace8db52-d08a-48e8-920d-e74fd92f44f9","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setacmekid?kid=1&acmetype=2","description":"<p>The account <strong>Key ID</strong> is used for identification on the DigiCert account.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setacmekid"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"kid","value":"1"},{"key":"acmetype","value":"2"}],"variable":[]}},"response":[{"id":"8c18b695-26ae-479d-a827-740ab0832b0e","name":"Set the DigiCert Key ID","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setacmekid?kid=1&acmetype=2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setacmekid"],"query":[{"key":"kid","value":"1"},{"key":"acmetype","value":"2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 10:50:59 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"ace8db52-d08a-48e8-920d-e74fd92f44f9"},{"name":"Set the DigiCert HMAC","id":"935f8eb1-7412-4a86-93a0-fad891a78fa4","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setacmehmac?hmac=1&acmetype=2","description":"<p>The Hash-Based Message Authentication Code (HMAC) key used to authenticate to the DigiCert account.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setacmehmac"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"hmac","value":"1"},{"key":"acmetype","value":"2"}],"variable":[]}},"response":[{"id":"a6fa7bc3-9b8f-4bbc-a6bb-9763d2e26ae7","name":"Set the DigiCert HMAC","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setacmehmac?hmac=1&acmetype=2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setacmehmac"],"query":[{"key":"hmac","value":"1"},{"key":"acmetype","value":"2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 10:52:02 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"935f8eb1-7412-4a86-93a0-fad891a78fa4"}],"id":"8ace4584-b552-45e9-b327-a131965ed4c8","description":"<p>The sections below describe the DigiCert-specific operations.</p>\n","_postman_id":"8ace4584-b552-45e9-b327-a131965ed4c8"},{"name":"ACME Certificate Commands","item":[{"name":"Get the Renew Period","id":"d428225c-950d-4c42-95a4-2e9cc349e7f9","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getacmerenewperiod?acmetype=1","description":"<p>Retrieve the renew period value.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getacmerenewperiod"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"acmetype","value":"1"}],"variable":[]}},"response":[{"id":"cfe4e8e3-ba62-4238-aabe-263c7dd16757","name":"Get the Renew Period","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getacmerenewperiod?acmetype=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","getacmerenewperiod"],"query":[{"key":"acmetype","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 11:09:41 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <renewperiod>20</renewperiod>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"d428225c-950d-4c42-95a4-2e9cc349e7f9"},{"name":"Set the Renew Period","id":"2b3d4b2f-3742-40ad-bf6a-8b04d06df746","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setacmerenewperiod?renewperiod=20&acmetype=1","description":"<p>Valid values for the <strong>Renew Period</strong> range from 1 to 60 (days).</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setacmerenewperiod"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"renewperiod","value":"20"},{"key":"acmetype","value":"1"}],"variable":[]}},"response":[{"id":"18476773-cda6-4e7d-a337-b1115811ad51","name":"Set the Renew Period","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setacmerenewperiod?renewperiod=20&acmetype=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setacmerenewperiod"],"query":[{"key":"renewperiod","value":"20"},{"key":"acmetype","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 11:08:52 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"2b3d4b2f-3742-40ad-bf6a-8b04d06df746"},{"name":"Get the ACME Directory URL Information","id":"e32b110b-30d0-44a4-857f-c631f078e496","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getacmedirectoryurl?acmetype=1","description":"<p>Retrieve the ACME Directory URL information.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getacmedirectoryurl"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"acmetype","value":"1"}],"variable":[]}},"response":[{"id":"40d73bca-6935-465f-8a18-a814a87a69eb","name":"Get the ACME Directory URL Information","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getacmedirectoryurl?acmetype=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","getacmedirectoryurl"],"query":[{"key":"acmetype","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 11:12:45 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <directoryurl>DirectoryURLWouldAppearHere</directoryurl>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"e32b110b-30d0-44a4-857f-c631f078e496"},{"name":"Set the ACME Directory URL Information","id":"726c72a1-c870-477d-bc2b-cd118b1b0fea","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setacmedirectoryurl?directoryurl=https://acme-v02.api.letsencrypt.org/directory&acmetype=1","description":"<p>Set the ACME Directory URL.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setacmedirectoryurl"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"directoryurl","value":"https://acme-v02.api.letsencrypt.org/directory"},{"key":"acmetype","value":"1"}],"variable":[]}},"response":[{"id":"c1bbac78-742b-4211-98d7-9c4f9225309d","name":"Set the ACME Directory URL Information","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setacmedirectoryurl?directoryurl=https://acme-v02.api.letsencrypt.org/directory&acmetype=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setacmedirectoryurl"],"query":[{"key":"directoryurl","value":"https://acme-v02.api.letsencrypt.org/directory"},{"key":"acmetype","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 14:07:11 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"726c72a1-c870-477d-bc2b-cd118b1b0fea"},{"name":"Delete the ACME Configuration Parameters","id":"19a4c3b3-768e-46f5-81c2-ecc7fc08440d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delacmeconfig?acmetype=1","description":"<p>To delete the ACME configuration parameters (which allows you to configure either the Let's Encrypt or DigiCert configuration from the start), run the <strong>delacmeconfig</strong> command.</p>\n<blockquote>\n<p>You can only delete the configuration if there are no ACME certificates.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delacmeconfig"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"acmetype","value":"1"}],"variable":[]}},"response":[{"id":"bb8a521d-dd73-4a5c-819c-b10bc91c7662","name":"Delete the ACME Configuration Parameters","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delacmeconfig?acmetype=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delacmeconfig"],"query":[{"key":"acmetype","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 14:08:18 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"19a4c3b3-768e-46f5-81c2-ecc7fc08440d"},{"name":"Request a New ACME Certificate","id":"b09f2b7e-9982-4d1d-afb2-69d4080bdb21","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addacmecert?cert=Identifier&cn=example4.ddns.net&vsid=1&keysize=2048&acmetype=1","description":"<p>To request a new ACME certificate, run the <strong>addacmecert</strong> command using <strong>cert</strong>, <strong>cn</strong>, <strong>vid</strong> (Virtual Service ID), and <strong>acmetype</strong> as mandatory parameters.</p>\n<p>To request a wildcard certificate using ACME, run the <strong>addacmecert</strong> command using <strong>cert</strong>, <strong>cn</strong> (for wildcard certificates, the common name must start with <strong>*.</strong>), <strong>vid</strong> (Virtual Service ID), <strong>dnsapi</strong>, <strong>dnsapiparams</strong>, and <strong>acmetype</strong> as mandatory parameters.</p>\n<p>Other optional parameters are also available, such as:<br />san1,san2,..,san10, vid1,vid2,...vid10 which are for SANs and their respective VIDs, country, state, city, company, organization, email, key_size, and so on.</p>\n<blockquote>\n<p>When requesting a Let’s Encrypt certificate, you can optionally specify an <strong>email</strong> parameter. You cannot specify an <strong>email</strong> parameter when requesting a DigiCert certificate.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addacmecert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cert","value":"Identifier"},{"key":"cn","value":"example4.ddns.net"},{"key":"vsid","value":"1"},{"key":"keysize","value":"2048"},{"key":"acmetype","value":"1"}],"variable":[]}},"response":[{"id":"0d00f43a-5079-4736-8f60-156b61166760","name":"Request a New ACME Certificate","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addacmecert?cert=Identifier&cn=example4.ddns.net&vsid=1&keysize=2048&acmetype=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addacmecert"],"query":[{"key":"cert","value":"Identifier"},{"key":"cn","value":"example4.ddns.net"},{"key":"vsid","value":"1"},{"key":"keysize","value":"2048"},{"key":"acmetype","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 13:36:16 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <message>Certificate 2048-cert successfully registered</message>\n</response>"}],"_postman_id":"b09f2b7e-9982-4d1d-afb2-69d4080bdb21"},{"name":"Request a Wildcard Certificate","id":"0ea4ffa2-de93-4629-b0f9-2aa742d540d3","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addacmecert?cert=Identifier&cn=*.postman.kempqa2.com&vid=1&dnsapi=godaddy.com&dnsapiparams={{DNSapiparamsvalue}}&keysize=2048&acmetype=1","description":"<p>To request a wildcard certificate using ACME, you must run the <strong>addacmecert</strong> command and:</p>\n<ul>\n<li><p>Specify a Common Name (<strong>cn</strong>) beginning with <strong>*.</strong>,</p>\n</li>\n<li><p>Specify the DNS provider using the <strong>dnsapi</strong> parameter, and</p>\n</li>\n<li><p>Specify the access credential parameters using the <strong>dnsapiparams</strong> parameter for the selected DNS provider</p>\n</li>\n</ul>\n<p>You can specify multiple credentials parameters using a comma-separated list. For example, if you specify <strong>Progress-LM-GEO</strong> as the DNS provider then you must set the <strong>dnsapiparams</strong> parameter to the DNS URL followed by the DNS API key in a comma-separated list. The access credential parameters differ depending on the DNS provider selected. A list of DNS providers and their credential parameters are detailed in the below table.</p>\n<div class=\"click-to-expand-wrapper is-table-wrapper\"><table>\n<thead>\n<tr>\n<th>DNS Provider (dnsapi value)</th>\n<th>Credential Parameters (dnsapiparams value)</th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>Progress-LM-GEO</td>\n<td>DNS URL / Address Endpoint, DNS API Access Key</td>\n</tr>\n<tr>\n<td>CloudFlare</td>\n<td>DNS API Username, DNS API Access Key</td>\n</tr>\n<tr>\n<td>GoDaddy.com</td>\n<td>DNS API Access Key, DNS API access secret/password</td>\n</tr>\n<tr>\n<td>Azure-DNS</td>\n<td>DNS API Subscription ID, DNS API Username, DNS API Application ID, DNS API access secret/password</td>\n</tr>\n<tr>\n<td>DNSMadeEasy</td>\n<td>DNS API Access Key, DNS API access secret/password</td>\n</tr>\n<tr>\n<td>DigitalOcean</td>\n<td>DNS API Access Key</td>\n</tr>\n<tr>\n<td>NS1.com</td>\n<td>DNS API Access Key</td>\n</tr>\n<tr>\n<td>Amazon-Route53</td>\n<td>DNS API Access Key, DNS API access secret/password</td>\n</tr>\n</tbody>\n</table>\n</div>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addacmecert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cert","value":"Identifier"},{"key":"cn","value":"*.postman.kempqa2.com"},{"key":"vid","value":"1"},{"key":"dnsapi","value":"godaddy.com"},{"key":"dnsapiparams","value":"{{DNSapiparamsvalue}}"},{"key":"keysize","value":"2048"},{"key":"acmetype","value":"1"}],"variable":[]}},"response":[{"id":"553a5438-cf6f-4f27-ad19-51c1d8d4abbf","name":"Request a Wildcard Certificate","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addacmecert?cert=Identifier&cn=*.postman.kempqa2.com&vid=1&dnsapi=godaddy.com&dnsapiparams={{DNSapiparamsvalue}}&keysize=2048&acmetype=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addacmecert"],"query":[{"key":"cert","value":"Identifier"},{"key":"cn","value":"*.postman.kempqa2.com"},{"key":"vid","value":"1"},{"key":"dnsapi","value":"godaddy.com"},{"key":"dnsapiparams","value":"{{DNSapiparamsvalue}}"},{"key":"keysize","value":"2048"},{"key":"acmetype","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 13:42:11 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <message>Certificate Identifier successfully registered</message>\n    <status>ok</status>\n</response>"}],"_postman_id":"0ea4ffa2-de93-4629-b0f9-2aa742d540d3"},{"name":"Renew an ACME Certificate","id":"60a75585-9ffd-40b9-a9fe-6b4bce698f36","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/renewacmecert?cert=vs_le_cert&acmetype=1","description":"<p>To renew an ACME certificate, run the <strong>renewacmecert</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","renewacmecert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cert","value":"vs_le_cert"},{"key":"acmetype","value":"1"}],"variable":[]}},"response":[{"id":"0ea18e8f-4c66-4b56-8511-08970db3891c","name":"Renew an ACME Certificate","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/renewacmecert?cert=vs_le_cert&acmetype=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","renewacmecert"],"query":[{"key":"cert","value":"vs_le_cert"},{"key":"acmetype","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 13:46:19 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <message>Certificate vs_le_cert successfully renewed</message>\n</response>"}],"_postman_id":"60a75585-9ffd-40b9-a9fe-6b4bce698f36"},{"name":"Delete an ACME Certificate","id":"9a22800e-190f-4b7c-adfb-49103391596e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delacmecert?cert=CertificateName&acmetype=1","description":"<p>To delete an ACME certificate from the LoadMaster, run the <strong>delacmecert</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delacmecert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cert","value":"CertificateName"},{"key":"acmetype","value":"1"}],"variable":[]}},"response":[{"id":"9db0a954-b25d-456c-9ddb-1f05289680cf","name":"Delete an ACME Certificate","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delacmecert?cert=CertificateName&acmetype=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delacmecert"],"query":[{"key":"cert","value":"CertificateName"},{"key":"acmetype","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 13:54:06 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<response stat=\"200\">\n    <message>Command completed ok</message>\n    <status>ok</status>\n</response>"}],"_postman_id":"9a22800e-190f-4b7c-adfb-49103391596e"},{"name":"List the ACME Certificates","id":"195779e4-ddfd-48a7-acb9-e0adf541d582","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listacmecert?acmetype=1","description":"<p>To list the ACME certificates that are installed on the LoadMaster, run the <strong>listacmecert</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listacmecert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"acmetype","value":"1"}],"variable":[]}},"response":[{"id":"918b6bca-7585-497e-a3ea-0c3b5efc349e","name":"List the ACME Certificates","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"{\r\n    \"cmd\": \"listacmecert\",\r\n    \"apikey\": \"InsertAPIKey\"\r\n}","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listacmecert?acmetype=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","listacmecert"],"query":[{"key":"acmetype","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Content-Type","value":"application/xml","description":"","type":"text"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<response stat=\"200\">\n    <Success>\n        <Data>\n            <Certificate>\n                <Identifier>vs_le_cert</Identifier>\n                <DomainName>DomainWouldAppearHere</DomainName>\n                <ExpiryDate>Sep 16 09:30:57 2021 GMT</ExpiryDate>\n                <SubjectAlternateNames></SubjectAlternateNames>\n                <Type>rsa</Type>\n                <KeySize>2048</KeySize>\n                <HTTPChallengeVS>IP address would appear here:80</HTTPChallengeVS>\n            </Certificate>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"195779e4-ddfd-48a7-acb9-e0adf541d582"},{"name":"Get the ACME Account Information","id":"8f8698a5-7249-40e1-beb8-c7eb240e9ebe","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/acmeaccountinfo?acmetype=1","description":"<p>To get the ACME account information from the LoadMaster, run the <strong>acmeaccountinfo</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","acmeaccountinfo"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"acmetype","value":"1"}],"variable":[]}},"response":[{"id":"15b24500-2d55-4f90-be28-e85773f97cc1","name":"Get the ACME Account Information","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/acmeaccountinfo?acmetype=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","acmeaccountinfo"],"query":[{"key":"acmetype","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 11:19:14 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <AccountType>Let's Encrypt</AccountType>\n            <AccountID>AccountIDWouldAppearHere</AccountID>\n            <AccountDirectory>DirectoryWouldAppearHere</AccountDirectory>\n            <AccountEmail></AccountEmail>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"8f8698a5-7249-40e1-beb8-c7eb240e9ebe"},{"name":"Get Details about a Specific ACME Certificate","id":"956bfa53-2844-4b04-a047-be80b814e17f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getacmecert?cert=CertificateName&acmetype=1","description":"<p>To get the details of a specific ACME certificate from the LoadMaster, run the <strong>getacmecert</strong> command using the <strong>cert</strong> and <strong>acmetype</strong> parameters.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getacmecert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"cert","value":"CertificateName"},{"key":"acmetype","value":"1"}],"variable":[]}},"response":[{"id":"f82cacbf-4117-4b97-826d-c04573d605cf","name":"Get Details about a Specific ACME Certificate","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getacmecert?cert=CertificateName&acmetype=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","getacmecert"],"query":[{"key":"cert","value":"CertificateName"},{"key":"acmetype","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 13:58:43 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Data>\n        <Identifier>vs_le_cert</Identifier>\n        <DomainName>DomainNameWouldAppearHere</DomainName>\n        <ExpiryDate>Sep 21 10:03:12 2021 GMT</ExpiryDate>\n        <SubjectAlternateNames></SubjectAlternateNames>\n        <Type>rsa</Type>\n        <KeySize>2048</KeySize>\n        <HTTPChallengeVS>:80</HTTPChallengeVS>\n        <VirtualServices></VirtualServices>\n    </Data>\n</response>"}],"_postman_id":"956bfa53-2844-4b04-a047-be80b814e17f"}],"id":"6ff0489f-9c52-4589-bf5b-dd1ab891f730","description":"<p>This section contains details about the ACME API commands and parameters.</p>\n<blockquote>\n<p>There are a number of legacy Let's Encrypt-specific commands that still work for backwards compatibility such as <strong>registerleaccount</strong>, <strong>addlecert</strong>, <strong>renewlecert</strong>, <strong>dellecert</strong>, <strong>listlecert</strong>, <strong>leaccountinfo</strong>, and <strong>getlecert</strong>. These legacy Let's Encrypt-specific commands work on LTSF LoadMasters. The <strong>acme</strong> commands mentioned for Let's Encrypt in the sections below are not supported in the LTSF LoadMaster version yet.</p>\n</blockquote>\n","_postman_id":"6ff0489f-9c52-4589-bf5b-dd1ab891f730"}],"id":"93664be2-90a9-4045-b32d-bef793c913d1","description":"<p>The LoadMaster provides an option of two Automated Certificate Management Environment (ACME) providers:<br />• Let's Encrypt<br />• DigiCert<br />The API commands and parameters relating to ACME certificates are mostly the same, apart from a few exceptions that are specific to Let's Encrypt and DigiCert. Refer to the relevant sections below for further details.</p>\n<p>The acmetype parameter is required for a lot of these commands. This relates to the ACME provider:</p>\n<ul>\n<li><p><strong>1</strong> - Let's Encrypt</p>\n</li>\n<li><p><strong>2</strong> - DigiCert</p>\n</li>\n</ul>\n<blockquote>\n<p>There are a number of legacy Let's Encrypt-specific commands that still work for backwards compatibility such as <strong>registerleaccount</strong>, <strong>addlecert</strong>, <strong>renewlecert</strong>, <strong>dellecert</strong>, <strong>listlecert</strong>, <strong>leaccountinfo</strong>, and <strong>getlecert</strong>. These legacy Let's Encrypt-specific commands work on LTSF LoadMasters. The <strong>acme</strong> commands mentioned for Let's Encrypt in the sections below are not supported in the LTSF LoadMaster version yet. </p>\n</blockquote>\n<blockquote>\n<p><strong>Note:</strong> The DigiCert-specific commands are not supported in the LTSF LoadMaster version yet.</p>\n</blockquote>\n","_postman_id":"93664be2-90a9-4045-b32d-bef793c913d1"},{"name":"Cipher Sets","item":[{"name":"Modify a Custom Cipher Set/Create a New Custom Cipher Set","id":"ce6c6b89-e2ef-4a36-a1d4-c8cdb5a9502f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modifycipherset?name=ExampleCipherSet&value=InsertCipher(s)","description":"<p>The <strong>modifycipherset</strong> command can be used to update an existing custom cipher set or create a new custom cipher set.</p>\n<blockquote>\n<p>If the name of an existing custom cipher set is specified, that cipher set will be updated. If a new name is used, a new cipher set will be created.</p>\n</blockquote>\n<p>Multiple ciphers can be assigned by separating them with a colon (<strong>:</strong>).</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modifycipherset"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"ExampleCipherSet"},{"key":"value","value":"InsertCipher(s)"}],"variable":[]}},"response":[{"id":"0c13fe09-7625-42aa-9c67-1d397620955e","name":"Modify a Custom Cipher Set/Create a New Custom Cipher Set","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modifycipherset?name=ExampleCipherSet&value=InsertCipher(s)","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modifycipherset"],"query":[{"key":"name","value":"ExampleCipherSet"},{"key":"value","value":"InsertCipher(s)"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 11:31:13 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Cipher set updated</Success>\n</Response>"}],"_postman_id":"ce6c6b89-e2ef-4a36-a1d4-c8cdb5a9502f"},{"name":"Retrieve the Details of an Existing Cipher Set","id":"3fde0e49-8958-479b-9e9a-a8bc9311d52b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getcipherset?name=ExampleCipherSet","description":"<p>You can use the <strong>getcipherset</strong> command to retrieve the list of ciphers that are in the specified cipher set.</p>\n<p>The valid values for the <strong>name</strong> parameter are below:</p>\n<ul>\n<li>Default</li>\n<li>Default_NoRc4</li>\n<li>BestPractices</li>\n<li>Intermediate_compatibility</li>\n<li>Backward_compatibility</li>\n<li>WUI</li>\n<li>FIPS</li>\n<li>Legacy</li>\n</ul>\n<blockquote>\n<p>These values are case-sensitive.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getcipherset"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"ExampleCipherSet"}],"variable":[]}},"response":[{"id":"9bfd1a91-0b39-4d9e-8299-d519556a19f2","name":"Retrieve the Details of an Existing Cipher Set","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getcipherset?name=ExampleCipherSet","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","getcipherset"],"query":[{"key":"name","value":"ExampleCipherSet"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 11:32:33 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <cipherset>Ciphers would appear here</cipherset>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"3fde0e49-8958-479b-9e9a-a8bc9311d52b"},{"name":"Delete a Custom Cipher Set","id":"1185eba6-656c-4905-8b85-675901c5ad0d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delcipherset?name=ExampleCipherSet","description":"<p>You can use the <strong>delcipherset</strong> command to delete an existing custom cipher set.</p>\n<blockquote>\n<p>A custom cipher set cannot be deleted if it is assigned to any Virtual Services. If this command is run when a cipher set is assigned to a Virtual Service, an error message will be returned which says <strong>Command Failed: Cipher set in use</strong>.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delcipherset"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"ExampleCipherSet"}],"variable":[]}},"response":[{"id":"df6d4e2d-181b-4540-bf9f-41ba6d0eb621","name":"Delete a Custom Cipher Set","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delcipherset?name=ExampleCipherSet","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delcipherset"],"query":[{"key":"name","value":"ExampleCipherSet"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 11:33:51 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Cipher set deleted</Success>\n</Response>"}],"_postman_id":"1185eba6-656c-4905-8b85-675901c5ad0d"}],"id":"e7ef7479-6a52-484a-a9ee-e268c45fabeb","description":"<p>Custom cipher sets can be manipulated using the commands below.</p>\n<blockquote>\n<p>It is not possible to modify or delete system-defined cipher sets.</p>\n</blockquote>\n","_postman_id":"e7ef7479-6a52-484a-a9ee-e268c45fabeb"},{"name":"Remote Access","item":[{"name":"Set Admin Access and Get GEO Partner Status","item":[{"name":"Set Admin Access","id":"85e4f6fb-247b-4efc-83a1-81d5fe95cac5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setadminaccess?wuiiface=0&wuiport=443","description":"<p>The web administrative access interface and the administrative default gateway can be set in one step by running the <strong>setadminaccess</strong> command with the associated parameters.</p>\n<p>Parameters relating to the <strong>setadminaccess</strong> command are shown in the following table:</p>\n<table><tbody><tr><td><p><b>Parameter</b></p></td><td><p><b>Type</b></p></td><td><p><b>Range</b></p></td><td><p><b>Additional Information</b></p></td><td><p><b>Mandatory</b></p></td></tr><tr><td><p>wuiiface</p></td><td><p>I</p></td><td><p>Valid interface index</p></td><td><p>The index of an existing interface. This index number corresponds to the interface number in the LoadMaster UI, for example, the index for <b>eth0 </b>is <b>0</b>.</p></td><td><p>Y</p></td></tr><tr><td><p>wuiport</p></td><td><p>I</p></td><td><p>3-65535</p></td><td><p>Specify the port used to access the administrative web interface.</p></td><td><p>Y</p></td></tr><tr><td><p>wuidefaultgateway</p></td><td><p>S</p></td><td><p>Valid IP address</p></td><td><p>When administering the LoadMaster from a non-default interface, a different default gateway for administrative traffic only can be specified using this parameter.</p></td><td><p>N</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setadminaccess"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"wuiiface","value":"0"},{"key":"wuiport","value":"443"}],"variable":[]}},"response":[{"id":"b2de388a-3fe2-4626-a786-4ee72d1bc6c4","name":"Set Admin Access","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setadminaccess?wuiiface=0&wuiport=443","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setadminaccess"],"query":[{"key":"wuiiface","value":"0"},{"key":"wuiport","value":"443"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 12 Aug 2024 04:37:15 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"85e4f6fb-247b-4efc-83a1-81d5fe95cac5"},{"name":"Get GEO Partner Status","id":"bbbf1530-38f3-4c99-a8d3-1708ce48a38d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getgeopartnerstatus","description":"<p>To return the status of all configured GEO partners, run the <strong>getgeopartnerstatus</strong> command.</p>\n<p>An empty list is returned if there are no GEO partners configured. If the status of a particular partner is not known, it is reported as “Unknown”.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getgeopartnerstatus"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"03645ea4-ef95-4c06-90e6-df12a1c8ead1","name":"Get GEO Partner Status","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getgeopartnerstatus"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 12 Aug 2024 04:31:21 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <GeoPartners></GeoPartners>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"bbbf1530-38f3-4c99-a8d3-1708ce48a38d"}],"id":"8b0c7579-1755-4957-bfa6-fcaff0d42e28","description":"<p>Refer to the sections below for commands to set the admin access and get the GEO partner status.</p>\n","_postman_id":"8b0c7579-1755-4957-bfa6-fcaff0d42e28"},{"name":"WUI Authentication and Authorization Options","item":[],"id":"7d761318-7f17-4b6c-a0cf-09e9b8fa38e2","description":"<p>Parameters relating to WUI Authentication and Authorization Options that can be managed using <strong>get</strong> and <strong>set</strong> commands are detailed in the following table. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for the get and set commands.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>wuildapep</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div>A valid LDAP endpoint name</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Specify the name of the LDAP endpoint to use for UI authentication.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ldapbackupserver</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the backup LDAP server for authentication.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ldapsecurity</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 = Not Encrypted</p><p>1 = StartTLS</p><p>2 = LDAPS</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the security mode for LDAP authentication.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ldapserver</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the LDAP server to use for authentication.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ldaprevalidateinterval</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies how often to revalidate the authentication to the LDAP server.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>wuiservercertval</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>This option is only relevant when the LDAP endpoint has either StartTLS or LDAPS selected as the LDAP Protocol.<br />When the <b>wuiservercertval</b> parameter is enabled, it ensures that the host name or IP address that was used to initiate the secure connection resides in the Certificate Subject or Subject Alternative Names (SAN) of the certificate.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>wuiusergroups</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enter a space-separated list of existing remote user groups to assign, for example <b>testgroup testgroup2</b>. Set the parameter to an empty value to remove all assigned groups, for example <b>value=</b>.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>wuinestedgroups</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 = Disabled</p><p>1 = Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enable or disable nested remote user groups.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>wuidomain</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div>Specify the domain to use if no domain is provided in the username when group UI authentication is in use. It is always used as the domain for group search if the Windows logon is used in the format <i>prefix</i>\\<i>username</i>.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>radiusbackupport</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>3-65535</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the TCP port for the backup RADIUS server.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>radiusbackupsecret</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the password (secret) to the backup RADIUS server.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>radiusbackupserver</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the backup RADIUS server to use for authentication.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>radiusport</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>3-65535</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the TCP port for communication to the RADIUS server.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>radiusrevalidateinterval</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>10-86400</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies when to revalidate the authentication to the RADIUS server.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>radiussendnasid</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>If this parameter is disabled (default), a NAS identifier is not sent to the RADIUS server. If it is enabled, a Network Access Server (NAS) identifier string is sent to the RADIUS server. By default, this is the hostname. Alternatively, if you specify a value in the <b>radiusnasid</b> parameter, this value is used as the NAS identifier. If the NAS identifier cannot be added, the RADIUS access request is still processed.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>radiusnasid</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>If the <b>radius_send_nas_id</b> parameter is enabled, the <b>radius_nas_id</b> parameter is relevant. When specified, this value is used as the NAS identifier. Otherwise, the hostname is used as the NAS identifier. If the NAS identifier cannot be added, the RADIUS access request is still processed.</p><p>This parameter is only relevant if the <b>radiussendnasid</b> parameter is enabled.<br /></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>radiussendvendorspec</div><div><div><div><div></div></div></div><div></div></div></td><td><div>b</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>If this parameter is disabled (default), an Attribute Value Pair (AVP) is not send to the RADIUS server. If it is enabled, an Attribute Value Pair in the RADIUS request sent to the server doing the authentication against the user trying to log in to the LoadMaster UI.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>radiussecret</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the password (secret) to the RADIUS server.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>radiusserver</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the RADIUS server to use for authentication.</p><p><b>Note: </b>IPv6 is not supported for RADIUS authentication.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>sessionlocalauth</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enables or disables local authentication.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>sessionauthmode</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Refer to the table below.</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the authentication mode for the load balancer.</p><p> </p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>\n\n<p>The following table describes the RADIUS, LDAP and Local user options that are selected depending on the value given to the <b>sessionauthmode </b>parameter</p>\n\n<table><tbody><tr><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Radius</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>LDAP</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Local</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p><b>Value</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Authent.</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Author.</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Authent.</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Authent.</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Author.</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>7</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>263</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>775</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>23</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>22</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>788</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>790</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>791</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>789</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>773</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>262</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>774</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>772</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>278</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>279</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","_postman_id":"7d761318-7f17-4b6c-a0cf-09e9b8fa38e2"},{"name":"Partner Communications","item":[{"name":"Set the Partner Shared Secret","id":"181a9983-de76-4ff0-bb57-f44aef382ea1","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setlmcommsecret?secret=ExampleSecret","description":"<p>This secret must have a minimum of 8 and a maximum of 127 characters. The following characters are supported:</p>\n<ul>\n<li>Numeric: 0-9</li>\n<li>Uppercase alphabetic: A-Z</li>\n<li>Lowercase alphabetic: a-z</li>\n<li>Special characters: !\"#$%&amp;()*+,-./:;&lt;=&gt;?[\\~]^_@`{|}</li>\n</ul>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setlmcommsecret"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"secret","value":"ExampleSecret"}],"variable":[]}},"response":[{"id":"27a824fe-c5e3-4978-8d84-f3da06d96e94","name":"Set the Partner Shared Secret","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setlmcommsecret?secret=ExampleSecret","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setlmcommsecret"],"query":[{"key":"secret","value":"ExampleSecret"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 12 Aug 2024 04:33:39 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"181a9983-de76-4ff0-bb57-f44aef382ea1"}],"id":"918f5135-a31d-417b-bc3e-d03d76a1d09e","description":"<p>The <strong>Partner Shared Secret</strong> is required to secure communications between partner devices and must be enabled on all High Availability (HA) partners, all LoadMasters in a cluster, and all GEO partners. The <strong>Partner Shared Secret</strong> must be the same on:</p>\n<ul>\n<li>Both units in a HA setup</li>\n<li>All units in a LoadMaster cluster</li>\n<li>All remote GEO machines that retrieve Virtual Services from this device</li>\n</ul>\n<p>When an incoming shared secret does not match the local <strong>Partner Shared Secret</strong> (including if only one side is providing a shared secret), a warn-level log message is recorded that says <strong>Unauthorized Remote Machine connection from</strong> and the connection fails.</p>\n","_postman_id":"918f5135-a31d-417b-bc3e-d03d76a1d09e"}],"id":"8ad68425-e090-479f-a2e4-8d27f2d42564","description":"<p>Parameters relating to Remote Access that can be managed using <strong>get</strong> and <strong>set</strong> commands are detailed in the following table. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details on the <strong>get</strong> and <strong>set</strong> commands.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Additional Information</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>admingw</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When administering the LoadMaster from a non-default interface, this option allows the user to specify a different default gateway for administrative traffic only.</p><p>To unset this, set the value to an empty string.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>enableapi</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>no (or 0) – Disabled</p><p>yes - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enables and disables the RESTful API Interface described in this document.</p><p>To enable the API, you must send a <b>GET</b> command along with <b>\"param\": \"enableapi\", \"value\": \"yes\"</b> – in that order. (The value <b>1</b> is not supported and returns an error.)</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>eccerts</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - RSA self-signed certs</p><p>1 - EC certs with a RSA signature</p><p>2 - EC certs with an EC signature</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the type of self-signed certificates that the system will use. The options are described below:</p><ul><li><p><b>RSA self-signed certs:</b> By default, these are RSA certificates that are signed with the Progress Kemp RSA root certificate.</p></li><li><p><b>EC certs with a RSA signature:</b> The LoadMaster can generate an EC certificate also signed by the original RSA Progress Kemp root certificate.</p></li><li><p><b>EC certs with an EC signature:</b> The LoadMaster can generate an EC certificate signed by the Progress Kemp EC root certificate. In this mode, any CSRs generated will also be EC.</p></li></ul><p>You should not switch from <b>RSA self-signed certs</b> to <b>EC certs with an EC signature</b> directly. If you do this, connections will fail because there is no EC Progress Kemp Certificate Authority (CA) certificate. To work around this, you must first switch from <b>RSA self-signed certs</b> to <b>EC certs with a RSA signature</b>.</p><p>Then, download the new EC Progress Kemp CA certificate by clicking <b>Download ECC Root Cert</b> in the bottom-right of the WUI under the main menu after refreshing the page. After you have downloaded the certificate, you can switch to <b>EC certs with an EC signature</b> with no loss of connection.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>outboundcipherset</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The valid values are below:</p><p>Default</p><p>Default_NoRc4</p><p>BestPractices</p><p>Intermediate_compatibility</p><p>Backward_compatibility</p><p>WUI</p><p>FIPS</p><p>Legacy</p><p>Null_Ciphers</p><p>ECDSA_Default</p><p>ECDSA_BestPractices</p><p></p><p>- This resets to the default value (<b>None - Outbound Default</b>).</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the cipher set to use on outbound connections (OCSP, email, LDAP, and so on). This is global for all outbound connections. For information on each of the cipher sets available, refer to the <a href=\"https://kemptechnologies.com/documentation/latestga/203125829\">SSL Accelerated Services Feature Description</a>.</p><p>Re-encrypt connections are not affected by the outbound cipher set.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>adminclientaccess</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Password only access (default)</p><p>1 – Password or client certificate</p><p>2 – Client certificate required</p><p>3 – Client certificate required (verify via OCSP)</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter is only relevant if Session Management is enabled.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>allownolocaluserclientcert</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabling this parameter allows client certificate logins for local users even if the client certificate has been deleted from the LoadMaster. By default, this option is disabled. Legacy local certificate login is not secure. Only enable this option if necessary.<br />Note: When enabling this option, a confirmation warning appears.<br /><b>Note:</b> In the LTSF version, this parameter is enabled by default.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>tethering</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enable or disable the Kemp Analytics feature that enables statistical and usage data to be sent to Progress Kemp for analysis. This data is strictly about product usage, enhanced capabilities, and statistics. No sensitive user data or traffic of any kind is either collected or communicated. For more information, visit<a href=\"https://kemp.ax/KempAnalytics\">https://kemp.ax/KempAnalytics</a>.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>geoclients</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Set the addresses of the GEO LoadMasters that can retrieve service status information from the LoadMaster. Multiple GEO LoadMasters addresses can be specified using a comma-separated list.</p><p>To unset this, set the value to an empty string.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>geosshport</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>3-65530</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The port over which GEO LoadMasters will communicate with each other.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>sshaccess</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify over which addresses remote administrative SSH access to the LoadMaster is allowed.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>sshiface</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the addresses over which remote administrative SSH access to the LoadMaster is allowed.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>sshport</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>3-65530</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the port used to access the LoadMaster using the SSH protocol.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>wuiaccess</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enables or disables WUI access.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>wuiiface</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the interface for WUI.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>wuiport</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the port to access the WUI.</p><p>This has a default value of 443.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>geopartners</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Set the IP address of the GEO LoadMaster partner(s). These GEO LoadMasters will keep their DNS configurations in sync.</p><p>To unset this, set the value to an empty string.</p><p><b>Note:</b> Before partnering GEO LoadMasters, a backup should be taken of the relevant GEO LoadMaster that has the correct/preferred configuration. This backup should then be restored to the other LoadMasters that will be partnered with the original LoadMaster. For more information and step-by-step instructions, refer to the <a href=\"https://kemptechnologies.com/documentation/latestga/203125189\">GEO, Feature Description</a>.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>multihomedwui</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Allow WUI access from multiple interfaces. Apart from the main administrative interface, each interface can then be enabled to allow WUI access.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>apiport</div><div><div><div><div></div></div></div><div></div></div></td><td><div>l</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div>Specify the port used to access the API interface. If the port is unset, you can access the API over the web interface port.<br />Some things to note are as follows:<br />- If you try to use the API on a port other than one on which its running, the LoadMaster returns a HTML 404 (not found) response.<br />- If you try to use the WUI on the port configured specifically for the API, an unreadable page and/or 404 response is displayed (depending on the browser used).<br />- You can set the <b>apiport </b>value to an empty string which will unset the value. If the API port is not set, the WUI port is used.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>SSHPreAuth</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Up to 5,000 characters</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Set the SSH pre-authentication banner, which is displayed before the login prompt when logging in using SSH. Space characters should be escaped by entering .</p><p>This field accepts up to 5,000 characters. Anything past the 5,000 character limit will not be displayed.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>geo_ssh_iface</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the ID of the GEO interface in which the SSH partner tunnel is created, for example setting this to 0 means the interface eth0. This is the interface that the GEO</p><p>partners will communicate through.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","_postman_id":"8ad68425-e090-479f-a2e4-8d27f2d42564"},{"name":"Admin WUI Access","item":[],"id":"c78157f2-e5a8-465b-b791-324016c9975b","description":"<p>Parameters relating to Admin WUI Access that can be managed using <strong>get</strong> and <strong>set</strong> commands are detailed in the following table. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details on the <strong>get</strong> and <strong>set</strong> commands.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>wuicipherset</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The valid values are below:</p><p>Default</p><p>Default_NoRc4</p><p>BestPractices</p><p>Intermediate_compatibility</p><p>Backward_compatibility</p><p>WUI</p><p>FIPS</p><p>Legacy</p><p>Null_Ciphers</p><p>ECDSA_Default</p><p>ECDSA_BestPractices</p><p></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the cipher set to use for the LoadMaster UI.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>WUITLS13Ciphersets</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div>All TLS1.3 available cipher sets</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify which TLS1.3 cipher sets to use for UI access. Multiple ciphers can be specified using a space or comma separated list. Also, setting this parameter value to an empty string will select the default value (that is, a combination of ciphers <b>TLS_AES_256_GCM_SHA384</b>, <b>TLS_CHACHA20_POLY1305_SHA256</b>, and <b>TLS_AES_128_GCM_SHA256</b>).</p><p>The list of supported TLS1.3 Ciphers is as follows:</p><p>- TLS_AES_256_GCM_SHA384</p><p>- TLS_CHACHA20_POLY1305_SHA256</p><p>- TLS_AES_128_GCM_SHA256</p><p>- TLS_AES_128_CCM_8_SHA256</p><p>- TLS_AES_128_CCM_SHA256<br /></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>WUICACertList</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div> </div><div><div><div><div></div></div></div><div></div></div></td><td><div>When assigning multiple certificates for UI authentication, the certificates must be specified in a single space-separated list.<br /></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>sessioncontrol</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enables or disables session control.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>sessionbasicauth</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>If the <b>sessioncontrol </b>and <b>sessionbasicauth </b>parameters are both enabled, there are two levels of authentication enforced to access the LoadMaster UI. The initial level is Basic Authentication where users log in using the bal or user logins, which are default usernames defined by the system.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>sessionidletime</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>60-86400</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specifies the number of seconds that the UI can be idle before logging the user out. This can be set from 60 to 86400 seconds.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>sessionmaxfailattempts</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>1-999</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Number of failed attempts before locking the user account. </p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>sessionconcurrent</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-9</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Limit the maximum number of concurrent logins that a single user can have to the LoadMaster UI (a value of 0 means there is no limit).</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>WUIPreAuth</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Up to 5,000 characters</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Set the pre-authentication click through banner which will be displayed before the LoadMaster login page. This parameter can contain plain text or HTML code. The field cannot contain JavaScript.</p><p>This field accepts up to 5,000 characters. Anything past the 5,000 character limit will not be displayed.</p><p></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>WUITLSProtocols</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – 30 bitmask</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify whether or not it is possible to connect to the LoadMaster UI using the following protocols; SSLv3, TLS1.0, TLS1.1, TLS1.2, or TLS1.3. The protocols can be enabled and disabled using a bitmask value. Refer to the following table to find out which number corresponds to which settings.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>\n\n<p><strong>Note:</strong> To add line breaks to the <strong>WUIPreAuth</strong> message, use HTML code, such as the following tags:</p>\n<img src=\"https://content.pstmn.io/9a95f202-5bec-4cd1-91cf-a4c1d2e30740/UG9zdG1hbi0wMS5wbmc=\" />\n\n<p>cURL responses do not show HTML code as it would be shown in the WUI, for example,<br />appears as:</p>\n<img src=\"https://content.pstmn.io/b3d0e93d-4f7c-46c7-b2a4-1656c9a45fde/aW1hZ2UucG5n\" width=\"147\" height=\"37\" />\n\n<table><tbody><tr><td><div><p><b>Number</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>SSLv3</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>TLS1.0</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>TLS1.1</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>TLS1.2</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>TLS1.3</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>0</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>1</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>2</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>3</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>4</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>5</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>6</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>7</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>8</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>9</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>10</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>11</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>12</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>13</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>14</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>15</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>16</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>17</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>18</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>19</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>20</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>21</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>22</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>23</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>24</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>25</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>26</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>27</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>28</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>29</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>30</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Disabled</div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","_postman_id":"c78157f2-e5a8-465b-b791-324016c9975b"},{"name":"OCSP Configuration","item":[],"id":"a667d962-6a4f-4058-8333-dd6217541da8","description":"<p>Parameters relating to the Online Certificate Status Protocol (OCSP) configuration that can be managed using <strong>get</strong> and <strong>set</strong> commands are detailed in the table below. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details on the <strong>get</strong> and <strong>set</strong> commands.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>OCSPPort</p></td><td><p>I</p></td><td><p>The port of the OCSP server.</p></td></tr><tr><td><p>OCSPUseSSL</p></td><td><p>B</p></td><td><p>Use SSL to connect to the OCSP server.</p></td></tr><tr><td><p>OCSPOnServerFail</p></td><td><p>B</p></td><td><p>Treat an OCSP server connection failure or timeout as if the OCSP server had returned a valid response, that is, treat the client certificate as valid.</p></td></tr><tr><td><p>OCSPServer</p></td><td><p>A</p></td><td><p>The address of the OCSP server. This can either be in IP address or Fully Qualified Domain Name (FQDN) format.</p></td></tr><tr><td><p>OCSPUrl</p></td><td><p>S</p></td><td><p>The URL to access on the OCSP server.</p></td></tr><tr><td>OCSPcertChecking</td><td>B</td><td>Enabling the <b>OCSPcertChecking</b> parameter enables the LoadMaster to perform OCSP checks on certain outbound connections. This is disabled by default.</td></tr><tr><td><p>SSLStapling</p></td><td><p>B</p></td><td><p>Enable this parameter to enable the LoadMaster to respond to OCSP stapling requests. If a client connects using SSL and asks for an OCSP response, this is returned. Only Virtual Service certificates are validated. The system holds a cache of OCSP responses that are sent back to the client. This cache is maintained by the OCSP daemon. When the OCSP daemon sends a request to the server, it uses the name specified in the certificate (in the <b>Authority Information Access </b>field). If it cannot resolve this name, then it uses the default OCSP server specified in the <b>OCSPServer </b>parameter.</p></td></tr><tr><td><p>SSLRefreshInterval</p></td><td><p>I</p></td><td><p>Specify how often the LoadMaster should refresh the OCSP stapling information. The OCSP daemon caches the entry for up to the amount of time specified here, after which it is refreshed.</p><p>Valid values range from 3600 (1 hour (default)) to 86400 seconds (24 hours).</p></td></tr></tbody></table>","_postman_id":"a667d962-6a4f-4058-8333-dd6217541da8"},{"name":"LDAP Configuration","item":[{"name":"Retrieve the Details of All LDAP Endpoints","id":"46e799d0-05cf-4313-b255-37abd4bd1d1e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showldaplist","description":"<p>To retrieve the details of all existing LDAP endpoints, run the <strong>showldaplist</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showldaplist"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"3388d377-d893-4643-9b47-801566a9531b","name":"Retrieve the Details of All LDAP Endpoints","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showldaplist"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 12 Aug 2024 04:44:22 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Endpoint>\n                <name>EXAMPLEENDPOINT</name>\n                <ldaptype>Unencrypted</ldaptype>\n                <vinterval>60</vinterval>\n                <refcnt>0</refcnt>\n                <timeout>5</timeout>\n            </Endpoint>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"46e799d0-05cf-4313-b255-37abd4bd1d1e"},{"name":"Add an LDAP Endpoint","id":"7951c3c9-4d3e-439c-895a-5b6bcaf62333","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addldapendpoint?name=ExampleEndpoint","description":"<p>Add a new LDAP endpoint by running the <strong>addldapendpoint</strong> command.</p>\n<blockquote>\n<p>The name cannot contain any spaces or special characters, for example:<br />!@#$%^^&amp;*()+={}[]|\\:;\"'&lt;&gt;?/</p>\n</blockquote>\n<p>You can also specify the following optional parameters when running the <strong>addldapendpoint</strong> command. If you do not specify these parameters – default values are used.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Description</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>ldaptype</p></td><td><p>I</p></td><td><p>Specify the transport protocol to use when communicating with the LDAP server.</p></td><td><p>0 – Unencrypted (default)</p><p>1 – StartTLS</p><p>2 – LDAPS</p></td></tr><tr><td><p>server</p></td><td><p>S</p></td><td><p>Specify the address, or addresses, of the LDAP server to be used.</p></td><td><p>You can also specify a port number, if desired. Separate multiple addresses with a space.</p></td></tr><tr><td><p>vinterval</p></td><td><p>I</p></td><td><p>Specify how often to revalidate the user the with the LDAP server.</p></td><td><p>Range:</p><p>10 – 86400 seconds</p><p>Default: 60</p></td></tr><tr><td><p>referralcount</p></td><td><p>I</p></td><td><p>The LoadMaster offers beta functionality to support LDAP referral replies from Active Directory Domain Controllers. If this is set to 0, referral support is not enabled. Set this field to a value between 1 and 10 to enable referral chasing. The number specified will limit the number of hops (referrals chased).</p></td><td><p>Multiple hops may increase authentication latency. There is a performance impact that depends on the number and depth of referrals required in your configuration.</p><p>You must have intimate knowledge of your Active Directory structure to set the referral limit appropriately. The same credentials are used for all lookups, and so on.</p><p>The use of Active Directory Global Catalog (GC) is the preferred configuration as the primary means of resolution instead of enabling LDAP referral chasing. A GC query can be used to query the GC cache instead of relying on LDAP and the referral process. Using Active Directory GC has little or no performance drag on the LoadMaster. For steps on how to add/remove the GC, refer to the following TechNet article: <a href=\"https://technet.microsoft.com/en-us/library/cc755257(v=ws.11).aspx\">https://technet.microsoft.com/en-us/library/cc755257(v=ws.11).aspx</a></p></td></tr><tr><td>timeout</td><td>I</td><td>Specify the LDAP server timeout in seconds.</td><td>The default value is <b>5</b>. Valid values range from <b>5</b> to <b>60</b>.</td></tr><tr><td><p>adminuser</p></td><td><p>S</p></td><td><p>Specify the username of an administrator user.</p></td><td><p>The username that is used to check the LDAP server.</p></td></tr><tr><td><p>adminpass</p></td><td><p>S</p></td><td><p>Specify the password for the specified administrator user.</p></td><td><p>The password that is used to check the LDAP server.</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addldapendpoint"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"ExampleEndpoint"}],"variable":[]}},"response":[{"id":"cd46c819-13e0-4558-8a96-926b2aaa2bdb","name":"Add an LDAP Endpoint","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addldapendpoint?name=ExampleEndpoint","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addldapendpoint"],"query":[{"key":"name","value":"ExampleEndpoint"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 12 Aug 2024 04:43:21 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"7951c3c9-4d3e-439c-895a-5b6bcaf62333"},{"name":"Modify an LDAP Endpoint","id":"e0dc3f4e-ec62-410d-8dcf-d7a2aad68a36","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modifyldapendpoint?name=ExampleEndpoint&ldaptype=1","description":"<p>Modify an existing LDAP endpoint by running the <strong>modifyldapendpoint</strong> command.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Description</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>ldaptype</p></td><td><p>I</p></td><td><p>Specify the transport protocol to use when communicating with the LDAP server.</p></td><td><p>0 – Unencrypted (default)</p><p>1 – StartTLS</p><p>2 – LDAPS</p></td></tr><tr><td><p>server</p></td><td><p>S</p></td><td><p>Specify the address, or addresses, of the LDAP server to be used.</p></td><td><p>You can also specify a port number, if desired. Separate multiple addresses with a space.</p></td></tr><tr><td><p>vinterval</p></td><td><p>I</p></td><td><p>Specify how often to revalidate the user the with the LDAP server.</p></td><td><p>Range:</p><p>10 – 86400 seconds</p><p>Default: 60</p></td></tr><tr><td><p>referralcount</p></td><td><p>I</p></td><td><p>The LoadMaster offers beta functionality to support LDAP referral replies from Active Directory Domain Controllers. If this is set to <b>0</b>, referral support is not enabled. Set this field to a value between <b>1 </b>and <b>10 </b>to enable referral chasing. The number specified will limit the number of hops (referrals chased).</p></td><td><p>Multiple hops may increase authentication latency. There is a performance impact that depends on the number and depth of referrals required in your configuration.</p><p>You must have intimate knowledge of your Active Directory structure to set the referral limit appropriately. The same credentials are used for all lookups, and so on.</p><p>The use of Active Directory Global Catalog (GC) is the preferred configuration as the primary means of resolution instead of enabling LDAP referral chasing. A GC query can be used to query the GC cache instead of relying on LDAP and the referral process. Using Active Directory GC has little or no performance drag on the LoadMaster. For steps on how to add/remove the GC, refer to the following TechNet article: <a href=\"https://technet.microsoft.com/en-us/library/cc755257(v=ws.11).aspx\">https://technet.microsoft.com/en-us/library/cc755257(v=ws.11).aspx</a></p></td></tr><tr><td>timeout</td><td>I</td><td>Specify the LDAP server timeout in seconds.</td><td>The default value is <b>5</b>. Valid values range from <b>5</b> to <b>60</b>.</td></tr><tr><td><p>adminuser</p></td><td><p>S</p></td><td><p>Specify the username of an administrator user.</p></td><td><p>The username that is used to check the LDAP server.</p></td></tr><tr><td><p>adminpass</p></td><td><p>S</p></td><td><p>Specify the password for the specified administrator user.</p></td><td><p>The password that is used to check the LDAP server.</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modifyldapendpoint"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"ExampleEndpoint"},{"key":"ldaptype","value":"1"}],"variable":[]}},"response":[{"id":"0506c63b-8454-4504-8092-cc378c2bb4f4","name":"Modify an LDAP Endpoint","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modifyldapendpoint?name=ExampleEndpoint&ldaptype=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modifyldapendpoint"],"query":[{"key":"name","value":"ExampleEndpoint"},{"key":"ldaptype","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 12 Aug 2024 04:47:11 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"e0dc3f4e-ec62-410d-8dcf-d7a2aad68a36"},{"name":"Retrieve Details of a Specific LDAP Endpoint","id":"bdacf10f-fdaf-4d02-bb34-95064ff465a4","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showldapendpoint?name=ExampleEndpoint","description":"<p>To retrieve the details of a specific LDAP endpoint, run the <strong>showldapendpoint</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showldapendpoint"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"ExampleEndpoint"}],"variable":[]}},"response":[{"id":"a721b67b-dd5c-45cc-9d56-45ce85350721","name":"Retrieve Details of a Specific LDAP Endpoint","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showldapendpoint?name=ExampleEndpoint","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","showldapendpoint"],"query":[{"key":"name","value":"ExampleEndpoint"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 12 Aug 2024 04:45:29 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <name>EXAMPLEENDPOINT</name>\n            <ldaptype>Unencrypted</ldaptype>\n            <vinterval>60</vinterval>\n            <refcnt>0</refcnt>\n            <timeout>5</timeout>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"bdacf10f-fdaf-4d02-bb34-95064ff465a4"},{"name":"Delete an LDAP Endpoint","id":"673aebb3-9068-4e5c-943a-781ac92130d4","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deleteldapendpoint?name=ExampleEndpoint","description":"<p>Delete an existing LDAP endpoint by running the <strong>deleteldapendpoint</strong> command.</p>\n<blockquote>\n<p>It is not possible to delete an LDAP endpoint that is currently in use.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","deleteldapendpoint"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"ExampleEndpoint"}],"variable":[]}},"response":[{"id":"20a3bf11-6e29-4bdd-aa4d-42636e00abb6","name":"Delete an LDAP Endpoint","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deleteldapendpoint?name=ExampleEndpoint","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","deleteldapendpoint"],"query":[{"key":"name","value":"ExampleEndpoint"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 12 Aug 2024 05:19:00 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"673aebb3-9068-4e5c-943a-781ac92130d4"}],"id":"193d03e1-7948-4715-93f5-cc1163326ae8","description":"<p>Refer to the sections below for details about the different RESTful API commands relating to LDAP endpoint configuration.</p>\n","_postman_id":"193d03e1-7948-4715-93f5-cc1163326ae8"},{"name":"Intrusion Detection Options (IPS/IDS)","item":[{"name":"Update the Intrusion Detection Rules","id":"07dfb784-f730-4e67-80a0-084a637bb223","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/community-rules(1).tar.gz"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/updatedetect","description":"<p>The Intrusion Detection Rules can be updated using the <strong>updatedetect</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","updatedetect"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"9535214c-3dc4-49b8-a919-cb041943f1e7","name":"Update the Intrusion Detection Rules","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/community-rules(1).tar.gz"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/updatedetect"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 16 Aug 2024 10:52:58 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Rules correctly installed</Success>\n</Response>"}],"_postman_id":"07dfb784-f730-4e67-80a0-084a637bb223"},{"name":"Modify the Detection Level","id":"e170b70a-7f9e-48ef-9e09-fae4332b1208","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=paranoia&value=2","description":"<p>You can retrieve or modify the Detection Level using the <strong>get</strong> or <strong>set</strong> commands.\nRefer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details on the <strong>get</strong> and <strong>set</strong> commands.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Range</b></p></td><td><p><b>Description</b></p></td></tr><tr><td><p>paranoia</p></td><td><p>I</p></td><td><p>0 = Low</p><p>1 = Default</p><p>2 = High</p><p>3 = Paranoid</p></td><td><p>Sets the sensitivity of the Intrusion Detection System (IDS) detection.</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","set"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"paranoia"},{"key":"value","value":"2"}],"variable":[]}},"response":[{"id":"4f6120fe-6f66-4cb6-9506-dbeb81730345","name":"Modify the Detection Level","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=paranoia&value=2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","set"],"query":[{"key":"param","value":"paranoia"},{"key":"value","value":"2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 14:08:37 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"e170b70a-7f9e-48ef-9e09-fae4332b1208"}],"id":"203c9244-efad-49c1-bf45-398e4cb8b93c","description":"<p>Refer to the section below for details on the IPS/IDS RESTful API command and parameter.</p>\n","_postman_id":"203c9244-efad-49c1-bf45-398e4cb8b93c"}],"id":"0f395bf4-b3bf-45bc-b06c-c27fc229ea19","description":"<p>The following sections provide details on the RESTful API commands and parameters relating to the <strong>Certificates &amp; Security</strong> section of the LoadMaster.</p>\n","_postman_id":"0f395bf4-b3bf-45bc-b06c-c27fc229ea19"},{"name":"Web Application Firewall","item":[{"name":"Access Settings","item":[{"name":"Enable Automatic Commercial Rule File Updates","id":"86d88543-adf6-4170-82e3-40bfc3119f83","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setwafautoupdate?enable=1","description":"<p>The <strong>setwafautoupdate</strong> command allows you to enable the automatic downloading of updates to commercial WAF rule files. When this option is enabled, updated rules are downloaded on a daily basis from Progress Kemp. The default installation time for these rule updates is 4am. The time at which the installation of these rule file updates can be set by running the <strong>SetWafInstallTime</strong> command. For more information, refer to the <a href=\"#e3cd63ed-768d-400b-82b6-7842c143c09b\">Set the Time of the Automatic Commercial Rule File Installation</a> section.</p>\n<p>You can see what this is currently set to by running the <strong>GetWafSettings</strong> command. For more information, refer to the following section:</p>\n<p><a href=\"#68a6e8cb-bc27-4a58-836a-6e9d977d5b32\">Display the Commercial WAF Rule Settings</a></p>\n<p><strong>Related UI Item</strong></p>\n<p>Web Application Firewall &gt; Access Settings</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setwafautoupdate"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"enable","value":"1"}],"variable":[]}},"response":[{"id":"8bf6866a-046d-47de-b589-11441ba33107","name":"Enable Automatic Commercial Rule File Updates","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setwafautoupdate?enable=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setwafautoupdate"],"query":[{"key":"enable","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 16 Aug 2024 15:25:08 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"86d88543-adf6-4170-82e3-40bfc3119f83"},{"name":"Download WAF Commercial Rule File Updates Now","id":"82a6b541-6a15-4caf-9d5a-f1c8dd3a3259","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/downloadwafrules","description":"<p>The WAF commercial rule file updates can be manually downloaded to the LoadMaster by running the <strong>downloadwafrules</strong> command. This relates to the <strong>Download Now</strong> button in the <strong>Access Settings</strong> screen in the UI.</p>\n<p><strong>Related UI Item</strong></p>\n<p>Web Application Firewall &gt; Access Settings</p>\n<blockquote>\n<p>If there are no updates because the latest rules have already been downloaded, a message will be displayed which says <strong>No updates available</strong>.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","downloadwafrules"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"cfd5c74f-bc95-46b8-bb24-10270b1b8c8e","name":"Download WAF Commercial Rule File Updates Now","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/downloadwafrules"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 16 Aug 2024 15:25:42 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <message>Download of new rules successfully completed</message>\n</response>"}],"_postman_id":"82a6b541-6a15-4caf-9d5a-f1c8dd3a3259"},{"name":"Enable/Disable Automatic Installation of Commercial Rule File Updates","id":"5c2ff72a-c06b-45e9-a9c2-b29c1cb9ffc1","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setwafautoinstall?enable=0","description":"<p>Automatic installation of updated commercial rule files can be enabled/disabled by running the following command.</p>\n<p><strong>Related WUI Item</strong></p>\n<p>Web Application Firewall &gt; Access Settings</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setwafautoinstall"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"enable","value":"0"}],"variable":[]}},"response":[{"id":"44610dba-8b7b-4877-a007-fddc0ef52a0b","name":"Enable/Disable Automatic Installation of Commercial Rule File Updates","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setwafautoinstall?enable=0","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setwafautoinstall"],"query":[{"key":"enable","value":"0"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 16 Aug 2024 15:28:29 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"5c2ff72a-c06b-45e9-a9c2-b29c1cb9ffc1"},{"name":"Set the Time of the Automatic Commercial Rule File Installation","id":"99bd8bd7-30aa-48f4-ae31-129da8971b9f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setwafinstalltime?hour=13","description":"<p>The time of day of the automatic commercial rule file installation can be set by running the following command. This relates to the <strong>When to Install</strong> drop-down menu in the <strong>Access Settings</strong> screen in the WUI.</p>\n<p><strong>Related WUI Items</strong></p>\n<p>Web Application Firewall &gt; Access Settings</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setwafinstalltime"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"hour","value":"13"}],"variable":[]}},"response":[{"id":"bfec383d-74c9-4bfa-9f43-1bb83c94dc83","name":"Set the Time of the Automatic Commercial Rule File Installation","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setwafinstalltime?hour=13","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setwafinstalltime"],"query":[{"key":"hour","value":"13"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 16 Aug 2024 15:28:57 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"99bd8bd7-30aa-48f4-ae31-129da8971b9f"},{"name":"Display the WAF Rule Change Log","id":"c24d69bc-6d48-40c3-9ccc-f37c24b51bc4","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getwafchangelog","description":"<p>A log of the changes which have been made to the Progress Kemp WAF rule set can be downloaded by running the following command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getwafchangelog"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"1e608cd9-1446-4c76-86ce-f1998e7aea2a","name":"Display the WAF Rule Change Log","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getwafchangelog"},"status":"Internal Server Error","code":500,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 16 Aug 2024 15:29:25 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <changes>\n        <![CDATA[\n        == Kemp Rule Set CHANGES ==\n\n        == Changes from 06/24/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/23/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/22/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/21/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/20/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/19/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/18/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/17/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/16/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/15/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/14/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/13/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/12/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/11/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/10/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/09/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/08/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/07/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/06/2021 ==\n        * Updated TOR exit nodes\n        * Updated current IP blocklist\n\n        == Changes from 06/05/2021 ==\n        * Updated TOR exit nodes\n        ]]>\n    </changes>\n</response>"}],"_postman_id":"c24d69bc-6d48-40c3-9ccc-f37c24b51bc4"},{"name":"Manually Install Commercial Rule Files","id":"fceb0b10-18bd-40ec-84ab-9f95b3bedc89","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/maninstallwafrules","description":"<p>The commercial rule files can be manually installed by running the following command. This relates to the <strong>Install Now</strong> button in the <strong>Access Settings</strong> screen in the WUI.</p>\n<p><strong>Related WUI Item</strong></p>\n<p>Web Application Firewall &gt; Access Settings</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","maninstallwafrules"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"dbb33cb8-87a8-409c-9052-23b96f7f2916","name":"Manually Install Commercial Rule Files","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/maninstallwafrules"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 19 Aug 2024 15:26:18 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"fceb0b10-18bd-40ec-84ab-9f95b3bedc89"}],"id":"012fc862-aaa7-4179-9f7a-056fc5062770","description":"<p>The commands in this section are all related to commercial rule files.</p>\n","_postman_id":"012fc862-aaa7-4179-9f7a-056fc5062770"},{"name":"Export Logs","item":[{"name":"Set the WAF Logging Format","id":"95d81b0d-9328-4d92-bac2-256b67c959d1","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setwaflogformat?logformat=json","description":"<p>Set the WAF logging format by using the <strong>setwaflogformat</strong> command.</p>\n<p>Valid values for the <strong>logformat</strong> parameter are:</p>\n<ul>\n<li>native</li>\n<li>json</li>\n<li>splunk</li>\n</ul>\n<blockquote>\n<p>To enable Splunk as the <strong>logformat</strong>, run the <strong>enablewafremotelogging</strong> command first, followed by the <strong>setwaflogformat</strong> command.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setwaflogformat"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"logformat","value":"json"}],"variable":[]}},"response":[{"id":"ab8056ec-6fd9-47cc-b9f9-7040a4506bef","name":"Set the WAF Logging Format","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setwaflogformat?logformat=json","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setwaflogformat"],"query":[{"key":"logformat","value":"json"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 16 Aug 2024 15:38:44 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"95d81b0d-9328-4d92-bac2-256b67c959d1"},{"name":"Disable Remote Logging","id":"43e210f7-19b2-4c29-ba53-37d8b152ff5a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/disablewafremotelogging","description":"<p>WAF remote logging can be disabled by running the <b>disablewafremotelogging</b> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","disablewafremotelogging"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"db00ee84-d972-4910-a930-dc3a1105c9e4","name":"Disable Remote Logging","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/disablewafremotelogging"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 16 Aug 2024 15:39:15 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"mlogc","value":"no process found"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"43e210f7-19b2-4c29-ba53-37d8b152ff5a"},{"name":"Enable Remote Logging","id":"fdf4f3b3-5761-416a-b954-ef696472ae2b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/enablewafremotelogging?remoteuri=https://Example.com&username=ExampleRemoteUser&passwd=ExampleRemotePassword","description":"<p>WAF remote logging can be enabled by running the <strong>enablewafremotelogging</strong> command.</p>\n<p>To enable remote logging when using Splunk as the logging format, specify any random string as the <strong>username</strong> and the Splunk token as in the <strong>passwd</strong>.</p>\n<p>Do not use <strong>SPLUNK</strong> as the <strong>username</strong> if you are using a logging format other than Splunk.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","enablewafremotelogging"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"remoteuri","value":"https://Example.com"},{"key":"username","value":"ExampleRemoteUser"},{"key":"passwd","value":"ExampleRemotePassword"}],"variable":[]}},"response":[{"id":"5f780350-b99d-4d59-acde-cc594c6f61e9","name":"Enable Remote Logging","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/enablewafremotelogging?remoteuri=https://Example.com&username=ExampleRemoteUser&passwd=ExampleRemotePassword","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","enablewafremotelogging"],"query":[{"key":"remoteuri","value":"https://Example.com"},{"key":"username","value":"ExampleRemoteUser"},{"key":"passwd","value":"ExampleRemotePassword"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 16 Aug 2024 15:40:05 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"fdf4f3b3-5761-416a-b954-ef696472ae2b"}],"id":"aa7c1e2b-e3c1-4896-ac45-bf89d48d8e30","description":"<p>The commands in this section relate to the WAF remote logging feature which allows the WAF audit logs to be sent to a central log repository.</p>\n","_postman_id":"aa7c1e2b-e3c1-4896-ac45-bf89d48d8e30"},{"name":"Custom Rules","item":[{"name":"Upload a Custom Rule File","id":"263ce42a-5e0c-4489-adaa-d704570c5673","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/modsecurity_crs_42_tight_security.conf"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addwafcustomrule?filename=known","description":"<p>You can upload a WAF custom rule file by running the <strong>addwafcustomrule</strong> command.</p>\n<blockquote>\n<p>If a command requires binary data (file uploads), this data must be passed in the \"data\" string and be base64-encoded.</p>\n</blockquote>\n<p>This relates to the <strong>Custom Rules</strong> section in the <strong>WAF Settings</strong> screen in the LoadMaster UI.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addwafcustomrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"filename","value":"known"}],"variable":[]}},"response":[{"id":"f54a208e-dd83-465f-b119-9ba92730c170","name":"Upload a Custom Rule File","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/modsecurity_crs_42_tight_security.conf"}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addwafcustomrule?filename=known","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addwafcustomrule"],"query":[{"key":"filename","value":"known"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 19 Aug 2024 15:21:10 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Custom WAF rule(s) installed</Success>\n</Response>"}],"_postman_id":"263ce42a-5e0c-4489-adaa-d704570c5673"},{"name":"Upload a Custom Rule Set","id":"149d09cf-7c29-4967-8820-d2aec6393ff0","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/Users/lbarry/OneDrive - Progress Software Corporation/documentation updates/WAF/SpiderLabs-owasp-modsecurity-crs-2.2.9-5-gebe8790.tar.gz"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addwafcustomrule?filename=SpiderLabs-owasp-modsecurity-crs-2.2.9-5-gebe8790.tar.gz","description":"<p>In addition to uploading individual custom rule files, you can also upload custom rule sets (.tar.gz files).</p>\n<blockquote>\n<p>If a command requires binary data (file uploads), this data must be passed in the \"data\" string and be base64-encoded.</p>\n</blockquote>\n<p>This relates to the <strong>Custom Rules</strong> section in the <strong>WAF Settings</strong> screen in the LoadMaster UI.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addwafcustomrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"filename","value":"SpiderLabs-owasp-modsecurity-crs-2.2.9-5-gebe8790.tar.gz"}],"variable":[]}},"response":[{"id":"6902b93d-08d9-441b-8bc1-84755120cb05","name":"Upload a Custom Rule Set","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/SpiderLabs-owasp-modsecurity-crs-2.2.9-5-gebe8790.tar.gz"}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addwafcustomrule?filename=SpiderLabs-owasp-modsecurity-crs-2.2.9-5-gebe8790.tar.gz","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addwafcustomrule"],"query":[{"key":"filename","value":"SpiderLabs-owasp-modsecurity-crs-2.2.9-5-gebe8790.tar.gz"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 19 Aug 2024 15:22:21 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Custom rule(s) installed - Added 41 - Ignored 12 file(s)\\n\\nThe following files have not been installed. This could be\\nbecause they contain no rules or have an invalid syntax.\\n\\nmodsecurity_crs_55_application_defects.conf\\nmodsecurity_crs_49_header_tagging.conf\\nmodsecurity_crs_43_csrf_protection.conf\\nmodsecurity_crs_16_username_tracking.conf\\nmodsecurity_crs_16_authentication_tracking.conf\\nmodsecurity_crs_11_avs_traffic.conf\\nmodsecurity_crs_61_ip_forensics.conf\\nmodsecurity_crs_42_csp_enforcement.conf\\nmodsecurity_crs_40_appsensor_detection_point_3.0_end.conf\\nmodsecurity_crs_16_scanner_integration.conf\\nmodsecurity_crs_11_slow_dos_protection.conf\\nmodsecurity_crs_11_proxy_abuse.conf</Success>\n</Response>"}],"_postman_id":"149d09cf-7c29-4967-8820-d2aec6393ff0"},{"name":"Delete a Custom Rule File","id":"351d1ff3-2e1f-4d9b-b657-4ea7c624242c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delwafcustomrule?filename=modsecurity_crs_11_brute_force","description":"<p>You can delete a custom rule by running the <strong>delwafcustomrule</strong> command.</p>\n<blockquote>\n<p>This does not delete the associated data file. </p>\n</blockquote>\n<p><strong>Related UI Item</strong></p>\n<p>Web Application Firewall &gt; Custom Rules &gt; Delete</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delwafcustomrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"filename","value":"modsecurity_crs_11_brute_force"}],"variable":[]}},"response":[{"id":"20ace37b-e749-430a-942d-b65d55f310ce","name":"Delete a Custom Rule File","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delwafcustomrule?filename=modsecurity_crs_11_brute_force","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delwafcustomrule"],"query":[{"key":"filename","value":"modsecurity_crs_11_brute_force"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 19 Aug 2024 15:22:53 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"351d1ff3-2e1f-4d9b-b657-4ea7c624242c"},{"name":"Download a Custom Rule File","id":"eafe8e8b-0546-411d-9d0c-e8d05ece6818","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/downloadwafcustomrule?filename=modsecurity_crs_11_dos_protection","description":"<p>You can download a custom rule file cto your local machine by running the <strong>downloadwafcustomrule</strong> command.</p>\n<p>If you run this command using cURL the file will be downloaded to your working directory in Linux.</p>\n<p><strong>Related UI Item</strong></p>\n<p>Web Application Firewall &gt; Custom Rules &gt; WAF Custom Rule Data &gt; Download</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","downloadwafcustomrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"filename","value":"modsecurity_crs_11_dos_protection"}],"variable":[]}},"response":[{"id":"606b19a7-1f73-4701-8a2e-c106c12673f6","name":"Download a Custom Rule File","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/downloadwafcustomrule?filename=modsecurity_crs_11_dos_protection","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","downloadwafcustomrule"],"query":[{"key":"filename","value":"modsecurity_crs_11_dos_protection"}]}},"status":"OK","code":200,"_postman_previewlanguage":"raw","header":[{"key":"Date","value":"Mon, 19 Aug 2024 15:23:13 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/octet-stream"},{"key":"Content-Disposition","value":"inline; filename=\"modsecurity_crs_11_dos_protection.conf\""}],"cookie":[],"responseTime":null,"body":"#\n# Anti-Automation rule set for detecting Denial of Service Attacks. \n#\n\nRule details would appear here"}],"_postman_id":"eafe8e8b-0546-411d-9d0c-e8d05ece6818"},{"name":"Upload a Custom Rule Data File","id":"3989cc2e-5b5e-4679-9f66-19233e0277d6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/owasp_cust.data"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addwafcustomdata?filename=owasp_cust.data","description":"<p>You can upload a custom rule data file by running a cURL command with the <strong>addwafcustomdata</strong> command.</p>\n<blockquote>\n<p>If a command requires binary data (file uploads), this data must be passed in the \"data\" string and be base64-encoded.</p>\n</blockquote>\n<p>This relates to the <strong>Custom Rules</strong> section in the <strong>WAF Settings</strong> screen in the LoadMaster UI.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addwafcustomdata"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"filename","value":"owasp_cust.data"}],"variable":[]}},"response":[{"id":"584d41b5-9dbe-49fc-b339-8b38073d61db","name":"Upload a Custom Rule Data File","originalRequest":{"method":"GET","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/owasp_cust.data"}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addwafcustomdata?filename=owasp_cust.data","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addwafcustomdata"],"query":[{"key":"filename","value":"owasp_cust.data"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 19 Aug 2024 15:24:18 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"3989cc2e-5b5e-4679-9f66-19233e0277d6"},{"name":"Delete a Custom Rule Data File","id":"5fcb0c86-fc1d-47a3-9c45-7e6e956a9552","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delwafcustomdata?filename=modsecurity_35_bad_robots.data","description":"<p>You can delete a custom rule data file by running the <strong>delwafcustomdata</strong> command.</p>\n<p><strong>Related UI Item</strong></p>\n<p>Web Application Firewall &gt; Custom Rules &gt; WAF Custom Rule Data &gt; Delete</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delwafcustomdata"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"filename","value":"modsecurity_35_bad_robots.data"}],"variable":[]}},"response":[{"id":"5cdf0cc8-b47e-4658-903b-bc6680e684c9","name":"Delete a Custom Rule Data File","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delwafcustomdata?filename=modsecurity_35_bad_robots.data","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delwafcustomdata"],"query":[{"key":"filename","value":"modsecurity_35_bad_robots.data"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 19 Aug 2024 15:24:41 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"5fcb0c86-fc1d-47a3-9c45-7e6e956a9552"},{"name":"Download a Custom Rule Data File","id":"350b930c-ba85-49a5-a246-9016d8831e2c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/downloadwafcustomdata?filename=modsecurity_46_slr_et_sqli.data","description":"<p>You can download a custom rule data file by running the <strong>downloadwafcustomdata</strong> command.</p>\n<p><strong>Related UI Item</strong></p>\n<p>Web Application Firewall &gt; Custom Rules &gt; WAF Custom Rule Data &gt; Download</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","downloadwafcustomdata"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"filename","value":"modsecurity_46_slr_et_sqli.data"}],"variable":[]}},"response":[{"id":"fcac00f1-8521-4830-97e6-34b785858e40","name":"Download a Custom Rule Data File","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/downloadwafcustomdata?filename=modsecurity_46_slr_et_sqli.data","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","downloadwafcustomdata"],"query":[{"key":"filename","value":"modsecurity_46_slr_et_sqli.data"}]}},"status":"OK","code":200,"_postman_previewlanguage":"raw","header":[{"key":"Date","value":"Mon, 19 Aug 2024 15:25:13 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/octet-stream"},{"key":"Content-Disposition","value":"inline; filename=\"modsecurity_46_slr_et_sqli.data\""}],"cookie":[],"responseTime":null,"body":"Data file contents would appear here"}],"_postman_id":"350b930c-ba85-49a5-a246-9016d8831e2c"}],"id":"f12e37f7-41fc-4a00-b3f3-055ae73bd814","description":"<p>The commands in this section are all related to custom rules.</p>\n","_postman_id":"f12e37f7-41fc-4a00-b3f3-055ae73bd814"}],"id":"fff71c13-d12b-450a-882e-3e9e77713626","description":"<p>Refer to the following sections for details on the LoadMaster RESTful API commands relating to the <strong>Web Application Firewall</strong>.</p>\n","_postman_id":"fff71c13-d12b-450a-882e-3e9e77713626"},{"name":"Interfaces","item":[{"name":"Get/Modify Interface Details","item":[{"name":"Get Interface Details","id":"779b8dc5-a3b5-4782-96e7-0ff629129794","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showiface?interface=0","description":"<p>Get the interface details by using the <strong>showiface</strong> command.</p>\n<p>To view the interface ID for each of the interfaces, run the <strong>stats</strong> command. The interface IDs are displayed as the <strong>ifaceID</strong> in the output. For further information on the stats command, refer to the <a href=\"#f4cfbb58-6037-4e47-bf39-71b9c4815e02\">Statistics</a> section.<br />Running the <strong>showiface</strong> command without using the interface parameter displays details for all existing interfaces.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showiface"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"0"}],"variable":[]}},"response":[{"id":"7cf0047b-afd3-41c3-ac6c-9b74ef6ffd7a","name":"Get Interface Details","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showiface?interface=0","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","showiface"],"query":[{"key":"interface","value":"0"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 08:02:34 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Interface>\n                <Id>0</Id>\n                <IPAddress>IP address would appear here/24</IPAddress>\n                <Mtu>1500</Mtu>\n                <InterfaceType>Port</InterfaceType>\n                <GeoTrafficEnable>Y</GeoTrafficEnable>\n                <DefaultInterface>yes</DefaultInterface>\n            </Interface>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"779b8dc5-a3b5-4782-96e7-0ff629129794"},{"name":"Modify Interface Details","id":"b7dfd8c3-7f61-4521-9eda-eaa7920c0b98","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiface?interface=0&mtu=512","description":"<p>You can modify interface parameters using the <strong>modiface</strong> command.</p>\n<blockquote>\n<p>Only one parameter can be changed on each call. The parameters are checked in the order below.</p>\n</blockquote>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Description</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>interface</p></td><td><p>I</p></td><td><p>The number of the interface to modify</p></td><td><p>To view the interface ID for each of the interfaces, run the <b>stats </b>command. The interface IDs are displayed as the <b>ifaceID </b>in the output. For further information on the <b>stats </b>command, refer to the <a href=\"#f4cfbb58-6037-4e47-bf39-71b9c4815e02\">Statistics </a>section.</p></td></tr><tr><td><p>addr</p></td><td><p>S</p></td><td><p>IP address</p></td><td><p>Specify the internet address of this interface.</p></td></tr><tr><td><p>mtu</p></td><td><p>I</p></td><td><p>MTU size</p><p>Range: 512-9216</p></td><td><p>Change the maximum size of the Ethernet frame that will be sent from this interface.</p></td></tr><tr><td><p>hacheck</p></td><td><p>B</p></td><td><p>0 – Not used for HA/cluster checks</p><p>1 – Used for HA/cluster checks</p></td><td><p>This parameter is only relevant in a HA/cluster configuration. Specify whether or not to use this interface for HA/cluster checks.</p><p>The default interface used for checking is eth0. When this option is enabled for an interface, you are prevented from disabling it on that interface. To switch to another interface, specify hacheck=yes/1 for a different interface. You cannot disable this parameter by specifying hacheck=no/0.</p></td></tr><tr><td><p>clupdate</p></td><td><p>B</p></td><td><p>Use this interface for cluster synchronization operations.</p></td><td><p>There must be exactly one interface that is configured for cluster updates. The default interface used for updates is eth0. When this option is enabled for an interface, you are prevented from disabling it on that interface. To switch to another interface, specify clupdate=yes/1 for a different interface. You cannot disable this parameter by specifying clupdate=no/0.</p></td></tr><tr><td><p>gwiface</p></td><td><p>B</p></td><td><p>Use this interface as the default gateway</p><p>0 - Disabled</p><p>1 - Enabled</p></td><td><p>Specifies if this is a network gateway interface.</p><p>If enabling this option, you must then set the <b>dfltgw </b>parameter to an empty string.</p></td></tr><tr><td><p>bondmode</p></td><td><p>I</p></td><td><p>1 = active-backup</p><p>4 = 802.3ad</p></td><td><p>The bondmode determines the way in which traffic sent out of the bonded interface is actually dispersed over the real interfaces.</p></td></tr><tr><td><p>partner</p></td><td><p>A</p></td><td><p>IP address of the partner machine (HA only)</p></td><td><p>This parameter is only relevant for LoadMasters in HA mode</p></td></tr><tr><td><p>shared</p></td><td><p>A</p></td><td><p>IP address of the shared address (HA only)</p></td><td><p>This parameter is only relevant for LoadMasters in HA mode</p></td></tr><tr><td><p>adminwuienable</p></td><td><p>B</p></td><td><p>This option can only be set to yes (1) if the <b>multihomedwui </b>parameter is set to yes.</p></td><td><p>When both of the <b>adminwuienable </b>and <b>multihomedwui </b>parameters are enabled, the WUI can be accessed from the IP address of the relevant interface, and any Additional addresses set up for that interface.</p><p>Refer to the <a href=\"#a53b7969-3547-4404-9364-174ddb83e67d\">Remote Access</a> section for further information on the <b>multihomedwui </b>parameter.</p></td></tr><tr><td><p>geotraffic</p></td><td><p>B</p></td><td><p>0 – Do not use for GEO requests and responses</p><p>1 – Use for GEO requests and responses</p></td><td><p>Specify whether or not to use this interface for GEO responses and requests.</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modiface"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"0"},{"key":"mtu","value":"512"}],"variable":[]}},"response":[{"id":"5eaf8213-ba10-41f1-8636-118b02b13534","name":"Modify Interface Details","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiface?interface=0&mtu=512","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modiface"],"query":[{"key":"interface","value":"0"},{"key":"mtu","value":"512"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 08:04:31 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"b7dfd8c3-7f61-4521-9eda-eaa7920c0b98"}],"id":"667d4509-93b4-4d08-8bf7-d299ea67e0bb","description":"<p>This section provides commands relating to retrieving and modifying interface details.</p>\n","_postman_id":"667d4509-93b4-4d08-8bf7-d299ea67e0bb"},{"name":"Additional Addresses","item":[{"name":"Add an Additional Address","id":"e7147cf6-58ea-4da7-9a68-cc22eccc62f6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addadditional?interface=0&addr=InsertAdditionalAddress/Prefix","description":"<p>You can add an additional address to an interface by using the <strong>addadditional</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addadditional"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"0"},{"key":"addr","value":"InsertAdditionalAddress/Prefix"}],"variable":[]}},"response":[{"id":"e8523c89-4132-49ef-86d8-facd73efaca9","name":"Add an Additional Address","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addadditional?interface=0&addr=InsertAdditionalAddress/Prefix","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addadditional"],"query":[{"key":"interface","value":"0"},{"key":"addr","value":"InsertAdditionalAddress/Prefix"}]}},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Wed, 20 Jul 2022 11:22:04 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/json"}],"cookie":[],"responseTime":null,"body":"This command may return an error even if it ran successfully. You can run the showiface command or check the User Interface (UI) to see if the additional address was added successfully."}],"_postman_id":"e7147cf6-58ea-4da7-9a68-cc22eccc62f6"},{"name":"Delete an Additional Address","id":"96837e33-10fe-4eba-94fe-1ce32a556775","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deladditional?interface=0&addr=InsertAdditionalAddress/Prefix","description":"<p>You can delete an additional addresses from an interface by using the <strong>deladditional</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","deladditional"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"0"},{"key":"addr","value":"InsertAdditionalAddress/Prefix"}],"variable":[]}},"response":[{"id":"4833c480-c2d2-4c84-b6c2-7fc55ed0c360","name":"Delete an Additional Address","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deladditional?interface=0&addr=InsertAdditionalAddress/Prefix","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","deladditional"],"query":[{"key":"interface","value":"0"},{"key":"addr","value":"InsertAdditionalAddress/Prefix"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 05:12:25 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"96837e33-10fe-4eba-94fe-1ce32a556775"}],"id":"7d1f417a-c7ee-4db8-b7a3-ebef47f55d61","description":"<p>Refer to the sections below for commands to add and delete additional addresses.</p>\n","_postman_id":"7d1f417a-c7ee-4db8-b7a3-ebef47f55d61"},{"name":"Bonded Interfaces","item":[{"name":"Create a Bonded Interface","id":"20963c71-05dc-4a79-bf19-d5090c7802c1","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/createbond?interface=1","description":"<p>You can create a bonded interface by using the <strong>createbond</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","createbond"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"1"}],"variable":[]}},"response":[{"id":"7633a80f-47fc-4331-ba59-12b4886805f6","name":"Create a Bonded Interface","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/createbond?interface=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","createbond"],"query":[{"key":"interface","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 08:20:06 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok. Converted Interface to be used as bonded device</Success>\n</Response>"}],"_postman_id":"20963c71-05dc-4a79-bf19-d5090c7802c1"},{"name":"Add an Interface to a Bonded Interface","id":"5d1374bb-ff32-4833-903f-475c684ff1b9","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addbond?interface=1&bond=2","description":"<p>You can add an interface to a bonded interface by using the <strong>addbond</strong> command.</p>\n<p>The <strong>interface</strong> and <strong>bond</strong> parameters are reversed - so:</p>\n<p>*   For the <strong>interface</strong> parameter, specify the bond value, and;\n*   For the <strong>bond</strong> parameter, specify the interface value.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addbond"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"1"},{"key":"bond","value":"2"}],"variable":[]}},"response":[{"id":"ca73aa7a-8998-4377-9e76-a5090703e6a6","name":"Add an Interface to a Bonded Interface","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addbond?interface=1&bond=2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addbond"],"query":[{"key":"interface","value":"1"},{"key":"bond","value":"2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 11:56:23 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<response stat=\"200\">\n    <message>Command completed ok</message>\n    <status>ok</status>\n</response>"}],"_postman_id":"5d1374bb-ff32-4833-903f-475c684ff1b9"},{"name":"Remove an Interface from a Bonded Interface","id":"504d68ca-fe7f-45fb-9ea4-f041971d0d78","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delbond?interface=1&bond=2","description":"<p>You can remove an interface from a bonded interface by using the <strong>delbond</strong> command.</p>\n<p>The <strong>interface</strong> and <strong>bond</strong> parameters are reversed - so:</p>\n<p>* For the <strong>interface</strong> parameter, specify the bond value, and;<br />* For the <strong>bond</strong> parameter, specify the interface value.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delbond"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"1"},{"key":"bond","value":"2"}],"variable":[]}},"response":[{"id":"427a2a70-80f8-49af-b68d-6923b1b2dfa5","name":"Remove an Interface from a Bonded Interface","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delbond?interface=1&bond=2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delbond"],"query":[{"key":"interface","value":"1"},{"key":"bond","value":"2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 11:58:53 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<response stat=\"200\">\n    <message>Command completed ok</message>\n    <status>ok</status>\n</response>"}],"_postman_id":"504d68ca-fe7f-45fb-9ea4-f041971d0d78"},{"name":"Unbond an Interface","id":"09107cb3-571c-40e0-a89e-8dbe9f6ea345","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/unbond?interface=1","description":"<p>You can convert a bond back to a port by using the <strong>unbond</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","unbond"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"1"}],"variable":[]}},"response":[{"id":"33ccd51b-2a29-49e1-be48-1d7a09c202af","name":"Unbond an Interface","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/unbond?interface=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","unbond"],"query":[{"key":"interface","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 09:05:42 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok. Deleted bonding support from Interface</Success>\n</Response>"}],"_postman_id":"09107cb3-571c-40e0-a89e-8dbe9f6ea345"}],"id":"89b13cc6-db4d-42d5-88dc-8c5968359966","description":"<p>Refer to the following sections for RESTful API commands and parameters relating to bonded interfaces.</p>\n<p>To view the interface ID for each of the interfaces, run the <strong>stats</strong> command. The interface IDs are displayed as the <strong>ifaceID</strong> in the output. For further information on the stats command, refer to the <a href=\"#f4cfbb58-6037-4e47-bf39-71b9c4815e02\">Statistics</a> section.<br />The <strong>BondID</strong> is the number of the bond in the Interfaces section of the main menu in the UI. For example, <strong>bnd2</strong> will have a BondID of <strong>2</strong>.</p>\n","_postman_id":"89b13cc6-db4d-42d5-88dc-8c5968359966"},{"name":"VLANs","item":[{"name":"Add a VLAN to an Interface","id":"20c42db9-0830-4158-9015-698ac17b1570","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addvlan?interface=0&vlanid=1","description":"<p>You can add a new VLAN to an interface using the <strong>addvlan</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addvlan"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"0"},{"key":"vlanid","value":"1"}],"variable":[]}},"response":[{"id":"d2318c76-fbd3-4246-891f-bce44712e294","name":"Add a VLAN to an Interface","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addvlan?interface=0&vlanid=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addvlan"],"query":[{"key":"interface","value":"0"},{"key":"vlanid","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 09:14:24 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Created VLAN Interface id 2</Success>\n</Response>"}],"_postman_id":"20c42db9-0830-4158-9015-698ac17b1570"},{"name":"Remove a VLAN from an Interface","id":"f6906444-5347-4cde-969e-1c535b704ebb","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delvlan?interface=2&vlanid=1","description":"<p>You can remove a VLAN from an interface using the <strong>delvlan</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delvlan"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"2"},{"key":"vlanid","value":"1"}],"variable":[]}},"response":[{"id":"659afc1d-3686-4b74-ab62-24ff5288c5b5","name":"Remove a VLAN from an Interface","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delvlan?interface=2&vlanid=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delvlan"],"query":[{"key":"interface","value":"2"},{"key":"vlanid","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 02 Aug 2024 09:16:04 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"f6906444-5347-4cde-969e-1c535b704ebb"}],"id":"5bba8d3a-e0ae-43a6-9078-86280c844699","description":"<p>Refer to the sections below for details on adding and deleting VLANs.</p>\n","_postman_id":"5bba8d3a-e0ae-43a6-9078-86280c844699"},{"name":"VXLANs","item":[{"name":"Add a VXLAN (using the group parameter)","id":"691f8a5d-f61f-442b-b0c3-5471653f208d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addvxlan?interface=1&vni=1&group=InsertIPAddress","description":"<p>You can add a VXLAN by running the <strong>addvxlan</strong> command with the <strong>remote</strong> parameter.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addvxlan"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"1"},{"key":"vni","value":"1"},{"key":"group","value":"InsertIPAddress"}],"variable":[]}},"response":[{"id":"d904fa3b-6e57-482b-85a1-e24a1558eb8f","name":"Add a VXLAN (using the group parameter)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:{{vault:authorization-password}}@InsertLoadMasterIPAddress/access/addvxlan?interface=1&vni=1&group=InsertIPAddress","protocol":"https","auth":{"user":"bal","password":"{{vault:authorization-password}}"},"host":["InsertLoadMasterIPAddress"],"path":["access","addvxlan"],"query":[{"key":"interface","value":"1"},{"key":"vni","value":"1"},{"key":"group","value":"InsertIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 13:20:06 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n<Success>Created VXLAN Interface id 5</Success>\n</Response>"}],"_postman_id":"691f8a5d-f61f-442b-b0c3-5471653f208d"},{"name":"Add a VXLAN (using the remote parameter)","id":"2bad1a6d-2591-4dc2-96ed-b31bbfd7fb84","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addvxlan?interface=0&vni=2&remote=InsertRemoteIPAddress","description":"<p>You can add a VXLAN by running the <strong>addvxlan</strong> command with the <strong>remote</strong> parameter.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addvxlan"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"0"},{"key":"vni","value":"2"},{"key":"remote","value":"InsertRemoteIPAddress"}],"variable":[]}},"response":[{"id":"122421ce-aab5-4aba-b3a9-67a0507f6e33","name":"Add a VXLAN (using the remote parameter)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addvxlan?interface=0&vni=2&remote=InsertRemoteIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addvxlan"],"query":[{"key":"interface","value":"0"},{"key":"vni","value":"2"},{"key":"remote","value":"InsertRemoteIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 15:37:37 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Created VXLAN Interface id 3</Success>\n</Response>"}],"_postman_id":"2bad1a6d-2591-4dc2-96ed-b31bbfd7fb84"},{"name":"Modify a VXLAN","id":"aadbc01c-1922-4d6f-9392-6c0691b813ca","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiface?interface=1&mtu=9216","description":"<p>To modify VXLAN details (for example set the IP address) use the <strong>modiface</strong> command.</p>\n<p>Only one parameter can be changed on each call. The parameters are checked in the order outlined in the <a href=\"#ff94f634-a03c-49b6-8ad8-e2898cc35064\">Modify Interface Details</a> section.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modiface"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"1"},{"key":"mtu","value":"9216"}],"variable":[]}},"response":[{"id":"af7c6d9f-c98e-422c-9c2e-89b6b174207f","name":"Modify a VXLAN","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiface?interface=1&mtu=9216","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modiface"],"query":[{"key":"interface","value":"1"},{"key":"mtu","value":"9216"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 15:39:41 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"SIOCSIFMTU","value":"Invalid argument"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"aadbc01c-1922-4d6f-9392-6c0691b813ca"},{"name":"Retrieve VXLAN Details","id":"48802820-62ec-4ae9-b01c-f69225ef70c0","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showiface","description":"<p>To retrieve VXLAN details, use the <strong>showiface</strong> command.</p>\n<p>To view the interface ID for each of the interfaces, run the <strong>stats</strong> command. The interface IDs are displayed as the <strong>ifaceID</strong> in the output. For further information on the stats command, refer to the <a href=\"#f4cfbb58-6037-4e47-bf39-71b9c4815e02\">Statistics</a> section.<br />Running the <strong>showiface</strong> command without using the interface parameter displays details for all existing interfaces.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showiface"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"ea8a1fe2-fa8d-4dab-88fa-46533ab2945f","name":"Retrieve VXLAN Details","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showiface"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 15:40:36 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Interface>\n                <Id>0</Id>\n                <IPAddress>IP address would appear here/24</IPAddress>\n                <Mtu>1500</Mtu>\n                <AdditionalAddresses>\n                    <IPaddress>IP address would appear here/24</IPaddress>\n                </AdditionalAddresses>\n                <NBondMembers>1</NBondMembers>\n                <BondMembers>\n                    <RealInterface>0</RealInterface>\n                </BondMembers>\n                <Mode>802.3ad</Mode>\n                <InterfaceType>Bonded</InterfaceType>\n                <GeoTrafficEnable>Y</GeoTrafficEnable>\n                <DefaultInterface>yes</DefaultInterface>\n            </Interface>\n            <Interface>\n                <Id>1</Id>\n                <IPAddress></IPAddress>\n                <InterfaceType>Port</InterfaceType>\n                <GeoTrafficEnable>N</GeoTrafficEnable>\n                <DefaultInterface>no</DefaultInterface>\n            </Interface>\n            <Interface>\n                <Id>2</Id>\n                <IPAddress></IPAddress>\n                <VNI>1</VNI>\n                <RemoteAddress>IP address would appear here</RemoteAddress>\n                <RealInterface>0</RealInterface>\n                <InterfaceType>VXlan</InterfaceType>\n                <GeoTrafficEnable>N</GeoTrafficEnable>\n                <DefaultInterface>no</DefaultInterface>\n            </Interface>\n            <Interface>\n                <Id>3</Id>\n                <IPAddress></IPAddress>\n                <VNI>2</VNI>\n                <RemoteAddress>IP address would appear here</RemoteAddress>\n                <RealInterface>0</RealInterface>\n                <InterfaceType>VXlan</InterfaceType>\n                <GeoTrafficEnable>N</GeoTrafficEnable>\n                <DefaultInterface>no</DefaultInterface>\n            </Interface>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"48802820-62ec-4ae9-b01c-f69225ef70c0"},{"name":"Delete a VXLAN","id":"56cb1d77-7316-49c6-b8ab-b92e5d22b2a5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delvxlan?interface=2","description":"<p>You can delete a VXLAN by running the <strong>delvxlan</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delvxlan"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"2"}],"variable":[]}},"response":[{"id":"c91f0f1e-536d-4cae-a800-51b830e6179c","name":"Delete a VXLAN","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delvxlan?interface=2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delvxlan"],"query":[{"key":"interface","value":"2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 09 Aug 2024 15:41:58 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"56cb1d77-7316-49c6-b8ab-b92e5d22b2a5"}],"id":"0686c59d-e594-4d9a-88d0-e0042792d1ef","description":"<p>Refer to the following sections for details on the RESTful API commands relating to VXLANs.</p>\n","_postman_id":"0686c59d-e594-4d9a-88d0-e0042792d1ef"}],"id":"baa66ebf-3d15-49a3-9a04-7f59410ac3de","description":"<p>Refer to the sections below for details on the RESTful API commands and parameters relating to interfaces.</p>\n","_postman_id":"baa66ebf-3d15-49a3-9a04-7f59410ac3de"},{"name":"Host & DNS Configuration","item":[{"name":"Host & DNS Configuration Parameters","item":[],"id":"217c13c1-ff12-414f-aaac-bcd56d2f23aa","description":"<p>Some parameters relating to Host &amp; DNS Configuration can be managed using the <strong>get</strong> and <strong>set</strong> commands. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details about the <strong>get</strong> and <strong>set</strong> commands.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>Hostname</p></td><td><p>S</p></td><td><p>Set the hostname of the local machine.</p></td></tr><tr><td><p>ha1hostname</p></td><td><p>S</p></td><td><p>Set the hostname for the active LoadMaster</p></td></tr><tr><td><p>ha2hostname</p></td><td><p>S</p></td><td><p>Set the hostname for the standby LoadMaster</p></td></tr><tr><td><p>namserver</p></td><td><p>A</p></td><td><p>The IP address of a DNS server which is to be used to resolve names locally on the LoadMaster. Setting this parameter to an empty string will delete the name servers. The last remaining name server cannot be deleted if the <b>dnssecclient </b>parameter is enabled.</p><p>This parameter has been deprecated and replaced with the nameserver parameter.</p></td></tr><tr><td><p>nameserver</p></td><td><p>A</p></td><td><p>The IP address of a DNS server to resolve names locally on the LoadMaster. Setting this parameter to an empty string will delete the name servers. The last remaining name server cannot be deleted if the <b>dnssecclient </b>parameter is enabled.</p></td></tr><tr><td><p>searchlist</p></td><td><p>S</p></td><td><p>Specify the domain name that is to be prepended to requests to the DNS name server.</p></td></tr><tr><td><p>dnssecclient</p></td><td><p>B</p></td><td><p>Enable or disable DNSSEC client capabilities on the LoadMaster. At least one name server must be configured before DNSSEC can be enabled. After changing this setting, the LoadMaster must be rebooted for the change to be applied. Once the setting is changed, it cannot be changed again until the LoadMaster has been rebooted. If using HA, please set the parameter on both devices separately.</p><p>0 - Disabled</p><p>1 – Enabled</p></td></tr><tr><td><p>DNSNamesEnable</p></td><td><p>B</p></td><td><p>When this option is enabled, the LoadMaster automatically attempts to update any changedDNS names (based on the update interval)::</p><p>If the address is not found, or if it is the same as before – nothing is done (except a log entry is generated).</p><p>If the address is different, the Real Server entry will be updated with the new address, if possible.</p><p>If the new address is invalid for some reason, for example if it is a non-local address and the nonlocalrs option has been disabled, no changes are made and a log is generated.</p></td></tr><tr><td>dnsupdateinterval</td><td>I</td><td>Set the update interval for DNS entries. Valid values range from 1 to 60 (minutes). The default value is 60.</td></tr><tr><td>dnsreloadonerror</td><td>B</td><td>If this parameter is enabled, DNS entries are reloaded when health checks have errors and an FQDN is associated with the Real Server IP address.</td></tr></tbody></table>","_postman_id":"217c13c1-ff12-414f-aaac-bcd56d2f23aa"},{"name":"Resolve DNS Names Now","item":[{"name":"Resolve DNS Names Now","id":"a29be26b-cecc-4bbd-a317-f462dce6a4b4","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/resolvenow","description":"<p>The LoadMaster will try to resolve the DNS names:</p>\n<ul>\n<li>If the address is not found or if it is the same as before – nothing is done (except a log entry is generated).</li>\n<li>If the address is different, the Real Server entry will be updated with the new address, if possible.</li>\n<li>If the new address is invalid for some reason, for example, if it is a non-local address and the <strong>nonlocalrs</strong> parameter has been disabled, no changes are made and a log is generated. The log is found in the normal syslog messages. The message \"DNS update failed\" appears and includes the reason why. It is a descriptive error message based on what is incorrect.</li>\n</ul>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","resolvenow"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"c3aaaa62-a338-4eae-9919-db2572efc308","name":"Resolve DNS Names Now","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/resolvenow"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 09:44:00 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"a29be26b-cecc-4bbd-a317-f462dce6a4b4"}],"id":"36c70069-cf4e-461c-b867-92aa400f6037","description":"<p>To force a new resolution of DNS names, run the <strong>resolvenow</strong> command.</p>\n","_postman_id":"36c70069-cf4e-461c-b867-92aa400f6037"},{"name":"Hosts for Local Resolution","item":[{"name":"List the Existing Hosts for Local Resolution","id":"2a9ac1e8-8886-474f-8253-507f0d6cd5fd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/gethosts","description":"<p>To list the existing hosts for local resolution, run the <strong>gethosts</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","gethosts"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"ad70b3a4-d2e1-4e10-be8c-f76d9aac9f2b","name":"List the Existing Hosts for Local Resolution","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/gethosts"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 09:50:26 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <HostsEntry>\n                <HostIPAddress>IP address would appear here</HostIPAddress>\n                <HostFqdn>example.com</HostFqdn>\n            </HostsEntry>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"2a9ac1e8-8886-474f-8253-507f0d6cd5fd"},{"name":"Add a Host IP Address and Host FQDN","id":"f787d5c0-2bd1-45dd-a558-5aadce5312f2","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addhostsentry?hostip=InsertHostIPAddress&hostfqdn=example.com","description":"<p>To add a host IP address and host FQDN, run the <strong>addhostsentry</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addhostsentry"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"hostip","value":"InsertHostIPAddress"},{"key":"hostfqdn","value":"example.com"}],"variable":[]}},"response":[{"id":"e6a065f9-97e2-4bee-9c02-5ca592d6c444","name":"Add a Host IP Address and Host FQDN","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addhostsentry?hostip=InsertHostIPAddress&hostfqdn=example.com","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addhostsentry"],"query":[{"key":"hostip","value":"InsertHostIPAddress"},{"key":"hostfqdn","value":"example.com"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 09:49:09 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"f787d5c0-2bd1-45dd-a558-5aadce5312f2"},{"name":"Delete a Host IP Address and Host FQDN","id":"63ed7153-5b15-4b32-bf3c-c855589089fc","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delhostsentry?hostip=InsertHostIPAddress","description":"<p>To delete a host IP address and host FQDN, run the <strong>delhostsentry</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delhostsentry"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"hostip","value":"InsertHostIPAddress"}],"variable":[]}},"response":[{"id":"e21ff7ff-6e53-4143-94fc-f7a6dc8d84b8","name":"Delete a Host IP Address and Host FQDN","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delhostsentry?hostip=InsertHostIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delhostsentry"],"query":[{"key":"hostip","value":"InsertHostIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 09:52:40 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"63ed7153-5b15-4b32-bf3c-c855589089fc"}],"id":"31a48b17-d769-4b6b-a672-0649989f2a68","description":"<p>Refer to the following sections for commands relating to hosts for local resolution.</p>\n","_postman_id":"31a48b17-d769-4b6b-a672-0649989f2a68"}],"id":"d83ca603-2ef6-4a1e-89c0-0e0e8da9a585","description":"<p>Refer to the following sections for details on the Host &amp; DNS Configuration RESTful API commands and parameters.</p>\n","_postman_id":"d83ca603-2ef6-4a1e-89c0-0e0e8da9a585"},{"name":"Route Management","item":[{"name":"Default Gateway","item":[{"name":"Set the Network Interface Address","id":"fd788e84-f8d2-4838-a314-4d589de866a8","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiface?interface=1&gwiface=1","description":"<p>Before setting the default gateway, you must configure the network interface addresses.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modiface"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"1"},{"key":"gwiface","value":"1"}],"variable":[]}},"response":[{"id":"a85ac360-c1d0-4108-9d42-83b267a181d8","name":"Set the Network Interface Address","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiface?interface=1&gwiface=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modiface"],"query":[{"key":"interface","value":"1"},{"key":"gwiface","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 06:49:29 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"fd788e84-f8d2-4838-a314-4d589de866a8"},{"name":"Get/Set the Default Gateway","id":"16d7fe04-3d81-46b5-806a-dc15bf0ee901","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=dfltgw","description":"<p>You can retrieve or modify the default gateway by running the <strong>get</strong> or <strong>set</strong> command.</p>\n<p>Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details about the <strong>get</strong> and <strong>set</strong> commands.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>dfltgw</p></td><td><p>A (IPv4)</p></td><td><p>unset</p></td><td><p>Specify the IPv4 default gateway that is to be used for communicating with the internet.</p></td></tr><tr><td><p>dfltgwv6</p></td><td><p>A (IPv6)</p></td><td><p>unset</p></td><td><p>Specify the IPv6 default gateway that is to be used for communicating with the internet.</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","get"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"dfltgw"}],"variable":[]}},"response":[{"id":"52767134-d245-4efa-9749-475d63aa9562","name":"Get/Set the Default Gateway","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=dfltgw","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","get"],"query":[{"key":"param","value":"dfltgw"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 06:48:03 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <dfltgw>IP address would appear here</dfltgw>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"16d7fe04-3d81-46b5-806a-dc15bf0ee901"}],"id":"2c26b6e2-74b9-4160-a1f1-c90e7abc094a","description":"<p>Refer to the sections below for details about the Default Gateway RESTful API parameters.</p>\n","_postman_id":"2c26b6e2-74b9-4160-a1f1-c90e7abc094a"},{"name":"Additional Routes","item":[{"name":"List Existing Additional Routes","id":"c624f847-59bb-431a-8606-989a964c120a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showroute","description":"<p>List existing Additional Routes by running the <strong>showroute</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showroute"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"b954deea-c1e0-4e59-9b6f-65af58571751","name":"List Existing Additional Routes","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showroute"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 06:55:25 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Route>\n                <Destination>IP address would appear here/32</Destination>\n                <Gateway>IP address would appear here</Gateway>\n            </Route>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"c624f847-59bb-431a-8606-989a964c120a"},{"name":"Add an Additional Route","id":"112e8c2c-2d53-4c70-9099-519c65c0abaf","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addroute?dest=InsertDestinationIPAddress&gateway=InsertGatewayIPAddress","description":"<p>You can add an Additional Route by running the <strong>addroute</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addroute"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"dest","value":"InsertDestinationIPAddress"},{"key":"gateway","value":"InsertGatewayIPAddress"}],"variable":[]}},"response":[{"id":"d999e414-8f13-43a5-a09c-e302ea6168b0","name":"Add an Additional Route","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addroute?dest=InsertDestinationIPAddress&gateway=InsertGatewayIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addroute"],"query":[{"key":"dest","value":"InsertDestinationIPAddress"},{"key":"gateway","value":"InsertGatewayIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 06:54:11 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"112e8c2c-2d53-4c70-9099-519c65c0abaf"},{"name":"Delete an Additional Route","id":"6c70e177-9cac-4256-b6c4-018aca7a6cd9","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delroute?dest=InsertDestinationIPAddress","description":"<p>You can delete an Additional Route by running the <strong>delroute</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","delroute"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"dest","value":"InsertDestinationIPAddress"}],"variable":[]}},"response":[{"id":"2f196293-d3f2-444a-9e2b-6cbef00fe6db","name":"Delete an Additional Route","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/delroute?dest=InsertDestinationIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","delroute"],"query":[{"key":"dest","value":"InsertDestinationIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 06:58:48 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"6c70e177-9cac-4256-b6c4-018aca7a6cd9"}],"id":"587da3ba-2fa9-4281-9231-d4214d496b1e","description":"<p>Refer to the following sections for details about the RESTful API commands and parameters relating to Additional Routes.</p>\n","_postman_id":"587da3ba-2fa9-4281-9231-d4214d496b1e"},{"name":"Packet Routing Filter","item":[{"name":"Check if the Packet Routing Filter is Enabled","id":"13194946-3994-487a-a6c5-ef1c853eb198","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?isenabled=","description":"<p>To check if the packet routing filter is enabled, run the <strong>aclcontrol?isenabled</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"isenabled","value":""}],"variable":[]}},"response":[{"id":"1e74a7a5-9a66-42ce-835e-61aa2025849a","name":"Check if the Packet Routing Filter is Enabled","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?isenabled","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"isenabled","value":null}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 07:18:59 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <aclstatus>disable</aclstatus>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"13194946-3994-487a-a6c5-ef1c853eb198"},{"name":"Enable/Disable the Packet Routing Filter","id":"8715a989-c497-4764-a926-b32def390e32","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?enable=1","description":"<p>To enable/disable the packet routing filter, run the <strong>aclcontrol</strong> command and set the <strong>enable</strong> parameter.</p>\n<blockquote>\n<p>It is not possible to disable the packet routing filter if GEO is enabled. If you try to disable the packet routing filter with GEO enabled, you get the following error:<br /><strong>Cannot disable aclcontrol while GSLB is enabled</strong></p>\n</blockquote>\n<p>The remaining ACL control parameters in the sections below can only be set if the packet filter is enabled.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"enable","value":"1"}],"variable":[]}},"response":[{"id":"222939cc-a405-4eaf-b0ec-e2c98a7d2b71","name":"Enable/Disable the Packet Routing Filter","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?enable=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"enable","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 07:20:49 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"8715a989-c497-4764-a926-b32def390e32"},{"name":"Check if the Connection is Dropped or Rejected When it is on the Blocked List","id":"9db389e0-9438-4848-90f7-6bb7f86d8a69","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?isdrop=","description":"<p>Check if the connection is dropped or rejected when it is on the block list.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"isdrop","value":""}],"variable":[]}},"response":[{"id":"5bf258ca-6849-4eaa-a56a-e78847eda90d","name":"Check if the Connection is Dropped or Rejected When it is on the Blocked List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?isdrop","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"isdrop","value":null}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 07:22:00 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <aclmethod>drop</aclmethod>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"9db389e0-9438-4848-90f7-6bb7f86d8a69"},{"name":"Enable Dropping of Block List Entries","id":"1eb2208a-3208-4571-88cd-fd5225059f79","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?drop=1","description":"<p>Enable dropping of block list entries.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"drop","value":"1"}],"variable":[]}},"response":[{"id":"a3ea86b3-c002-47e6-893f-c340dadb5028","name":"Enable Dropping of Block List Entries","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?drop=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"drop","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 07:23:17 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"1eb2208a-3208-4571-88cd-fd5225059f79"},{"name":"Disable Dropping of Block List Entries","id":"d5eed37c-91a9-401f-8871-313a0c51d493","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?drop=0","description":"<p>Disable dropping of block list entries.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"drop","value":"0"}],"variable":[]}},"response":[{"id":"aa9ae9e6-2142-4746-a31e-7b5ffee592a2","name":"Disable Dropping of Block List Entries","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?drop=0","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"drop","value":"0"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 07:25:15 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"d5eed37c-91a9-401f-8871-313a0c51d493"},{"name":"Check if the Restrict Traffic to Interfaces Option is Enabled","id":"e8c3f322-deca-411c-88a8-71f2cd43c601","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?isifblock=","description":"<p>When the <strong>Restrict traffic to Interfaces</strong> option is enabled, restrictions are enforced upon routing between attached subnets. To check if the <strong>Restrict traffic to Interfaces</strong> option is enabled or disabled, run the <strong>aclcontrol.isifblock</strong> command.</p>\n<ul>\n<li><strong>block</strong> - enabled</li>\n<li><strong>free</strong> - disabled</li>\n</ul>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"isifblock","value":""}],"variable":[]}},"response":[{"id":"348a8fde-5616-4fa8-b570-ac5637ed560e","name":"Check if the Restrict Traffic to Interfaces Option is Enabled","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?isifblock","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"isifblock","value":null}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 07:26:49 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <aclblockall>free</aclblockall>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"e8c3f322-deca-411c-88a8-71f2cd43c601"},{"name":"Enable the Restrict Traffic to Interfaces Option","id":"ff936061-4c7f-4f0d-9bf1-66f990f5908c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?ifblock=1","description":"<p>Enable the <strong>Restrict traffic to Interfaces</strong> option.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"ifblock","value":"1"}],"variable":[]}},"response":[{"id":"394f190f-757a-4ebc-a871-18cb83120743","name":"Enable the Restrict Traffic to Interfaces Option","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?ifblock=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"ifblock","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 07:29:57 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"ff936061-4c7f-4f0d-9bf1-66f990f5908c"},{"name":"Disable the Restrict Traffic to Interfaces Option","id":"402e95c4-8c05-46e0-9592-899e78e9a101","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?ifblock=0","description":"<p>Disable the <strong>Restrict traffic to Interfaces</strong> option.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"ifblock","value":"0"}],"variable":[]}},"response":[{"id":"feedefa1-af9a-41fa-9233-654b3a229da4","name":"Disable the Restrict Traffic to Interfaces Option","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?ifblock=0","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"ifblock","value":"0"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 07:32:42 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"402e95c4-8c05-46e0-9592-899e78e9a101"},{"name":"Check if the Include WUI in IP Access Lists Option is Enabled","id":"93e67c98-8e81-46bf-ba8c-90f18dcd4d61","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?iswuiblock=","description":"<p>If the <strong>Include WUI in IP Access Lists</strong> option is enabled, access to the UI is also controlled by the packet filter. In this case, the client that enabled the <strong>Include WUI in IP Access Lists</strong> option will still have access. If this option is disabled, access to the UI is not affected by the packet filter.<br />To check if <strong>Include WUI in IP Access Lists</strong> is enabled or disabled, run the <strong>aclcontrol.iswuiblock</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"iswuiblock","value":""}],"variable":[]}},"response":[{"id":"d774e008-d66d-495e-940f-3636f0dd3c54","name":"Check if the Include WUI in IP Access Lists Option is Enabled","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?iswuiblock","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"iswuiblock","value":null}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 07:33:35 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <aclwuiblock>no</aclwuiblock>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"93e67c98-8e81-46bf-ba8c-90f18dcd4d61"},{"name":"Enable the Include WUI in IP Access Lists Option","id":"bf185c90-e4a2-4863-a1ba-d303b11ae3ab","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?wuiblock=1","description":"<p>To enable the <strong>Include WUI in IP Access Lists</strong> option, run the <strong>aclcontrol</strong> command and enable the <strong>wuiblock</strong> parameter.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"wuiblock","value":"1"}],"variable":[]}},"response":[{"id":"3a142cb8-0493-4601-807a-077037481f05","name":"Enable the Include WUI in IP Access Lists Option","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?wuiblock=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"wuiblock","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 07:35:41 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"bf185c90-e4a2-4863-a1ba-d303b11ae3ab"},{"name":"Disable the Include WUI in IP Access Lists Option","id":"737994f8-cb80-4961-a427-68e47031cfd7","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?wuiblock=0","description":"<p>To disable the <strong>Include WUI in IP Access Lists</strong> option, run the <strong>aclcontrol</strong> command and disable the <strong>wuiblock</strong> parameter.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"wuiblock","value":"0"}],"variable":[]}},"response":[{"id":"b0869371-017c-4f90-9ed8-696d12d557a8","name":"Disable the Include WUI in IP Access Lists Option","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?wuiblock=0","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"wuiblock","value":"0"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 07:36:34 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"737994f8-cb80-4961-a427-68e47031cfd7"},{"name":"Check the IP Address of the Last Client that Changed the Packet Filter","id":"9ff8bbee-cc0b-42b4-b209-cd2f25eb9954","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?wuiaddr=","description":"<p>To check the IP address of the last client that changed the packet filter (that is, the host that is allowed in), run the <strong>aclcontrol.wuiaddr</strong> command.</p>\n<blockquote>\n<p>The <strong>wuiaddr</strong> command is only relevant if the <strong>Include WUI in IP Access Lists</strong> option is enabled.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"wuiaddr","value":""}],"variable":[]}},"response":[{"id":"c43f4a93-e3be-4011-96c6-7ea68f73be4e","name":"Check the IP Address of the Last Client that Changed the Packet Filter","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?wuiaddr","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"wuiaddr","value":null}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 07:37:26 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <wuiaddr>IP address would appear here</wuiaddr>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"9ff8bbee-cc0b-42b4-b209-cd2f25eb9954"}],"id":"1446e194-025f-4cfb-9042-6d2d88130f4e","description":"<p>The commands in this section relate to the global packet routing filter option. Packet filtering is enabled by default. It is not possible to disable the packet routing filter if GEO is enabled. Refer to the <a href=\"#2160d558-4fd9-43b6-9ced-965d8e1dc0c5\">Enable/Disable GEO</a> section for commands to enable and disable GEO.</p>\n","_postman_id":"1446e194-025f-4cfb-9042-6d2d88130f4e"},{"name":"VPN Management","item":[{"name":"VPN Commands","item":[{"name":"Create a New VPN Connection","id":"55b26953-16d7-419f-a3a7-b6c6b36626a7","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/createvpncon?name=VPNname","description":"<p>To create a new Virtual Private Network (VPN) connection, run the <strong>createvpncon</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","createvpncon"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"VPNname"}],"variable":[]}},"response":[{"id":"6a32760e-5c13-4669-ae28-93cd0d0afd3f","name":"Create a New VPN Connection","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/createvpncon?name=VPNname","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","createvpncon"],"query":[{"key":"name","value":"VPNname"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 07:42:26 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>ipsec_setup: Starting Openswan IPsec U2.6.42/K4.14.137...\nipsec_setup: multiple ip addresses, using  <IPaddresswouldappearhere> on eth0\n\n        <Data>\n            <status>Down</status>\n            <defaultLocalIP>IP address would appear here</defaultLocalIP>\n            <defaultLocalSubnets>IP address would appear here/32</defaultLocalSubnets>\n            <defaultLocalID>IP address would appear here</defaultLocalID>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"55b26953-16d7-419f-a3a7-b6c6b36626a7"},{"name":"Delete an Existing IPSec Connection","id":"addc2b50-cb77-4526-b932-caf38c534215","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deletevpncon?name=VPNname","description":"<p>You can delete an existing IPsec connection by running the <strong>deletevpncon</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","deletevpncon"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"VPNname"}],"variable":[]}},"response":[{"id":"7a20bf76-f07d-46bc-a7d5-a4c14a25a7c0","name":"Delete an Existing IPSec Connection","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deletevpncon?name=VPNname","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","deletevpncon"],"query":[{"key":"name","value":"VPNname"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 07:46:03 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>ipsec_setup: Stopping Openswan IPsec...\nCommand completed ok</Success>\n</Response>"}],"_postman_id":"addc2b50-cb77-4526-b932-caf38c534215"},{"name":"Set the VPN Addresses","id":"6ad7a044-3e2c-45a8-bfe2-0d50f26e8cba","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnaddr?name=VPNname&localip=InsertLocalIPAddress&localsubnets=InsertLocalSubnetAddress&remoteip=InsertRemoteIPAddress&remotesubnets=InsertRemoteSubnetAddress","description":"<p>You can set all of the VPN addresses at the same time by running the <strong>setvpnaddr</strong> command.</p>\n<p>All of the parameters in the following table are required when running the <strong>setvpnaddr</strong> command.</p>\n<blockquote>\n<p>You can also set these parameters individually by running the commands listed in the following sections.</p>\n<p>Multiple IP addresses can be specified using a comma-separated list.</p>\n</blockquote>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>localip</p></td><td><p>String</p></td><td><p>See additional information</p></td><td><p>In non-HA mode, the default is the LoadMaster IP address, that is, the IP address of the default gateway interface.</p><p>In HA-mode, the default is the shared IP address.</p></td></tr><tr><td><p>localsubnets</p></td><td><p>String</p></td><td><p>See additional information</p></td><td><p>Set the subnet for the local side of the connection. The local IP can be the only participant if applicable, given the /32 CIDR. When the <b>localip </b>is set, the <b>localsubnet </b>is automatically populated. Multiple local subnets can be specified using a comma-separated list. Up to 10 IP addresses can be specified.</p></td></tr><tr><td><p>remoteip</p></td><td><p>String</p></td><td><p>unset</p></td><td><p>Set the IP address for the remote side of the connection.</p></td></tr><tr><td><p>remotesubnets</p></td><td><p>String</p></td><td><p>unset</p></td><td><p>Set the subnet for the remote side of the connection. Multiple remote subnets can be specified using a comma-separated list. Up to 10 IP addresses can be specified.</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setvpnaddr"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"VPNname"},{"key":"localip","value":"InsertLocalIPAddress"},{"key":"localsubnets","value":"InsertLocalSubnetAddress"},{"key":"remoteip","value":"InsertRemoteIPAddress"},{"key":"remotesubnets","value":"InsertRemoteSubnetAddress"}],"variable":[]}},"response":[{"id":"38ae0df9-87d7-49c3-af8f-df0de5d02008","name":"Set the VPN Addresses","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnaddr?name=VPNname&localip=InsertLocalIPAddress&localsubnets=InsertLocalSubnetAddress&remoteip=InsertRemoteIPAddress&remotesubnets=InsertRemoteSubnetAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setvpnaddr"],"query":[{"key":"name","value":"VPNname"},{"key":"localip","value":"InsertLocalIPAddress"},{"key":"localsubnets","value":"InsertLocalSubnetAddress"},{"key":"remoteip","value":"InsertRemoteIPAddress"},{"key":"remotesubnets","value":"InsertRemoteSubnetAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 09:57:31 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <status>Down</status>\n            <localIP>IP address would appear here</localIP>\n            <localSubnets>IP address would appear here/32</localSubnets>\n            <remoteIP>IP address would appear here</remoteIP>\n            <remoteSubnets>IP address would appear here/32</remoteSubnets>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"6ad7a044-3e2c-45a8-bfe2-0d50f26e8cba"},{"name":"Set the Local IP Address","id":"5043e7de-218a-4456-80f4-1799de1ad35c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnlocalip?name=VPNname&localip=InsertLocalIPAddress","description":"<p>To set the <strong>Local IP Address</strong>, run the <strong>setvpnlocalip</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setvpnlocalip"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"VPNname"},{"key":"localip","value":"InsertLocalIPAddress"}],"variable":[]}},"response":[{"id":"fdbd6972-8ac3-4117-b6a6-193c3692e8b4","name":"Set the Local IP Address","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnlocalip?name=VPNname&localip=InsertLocalIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setvpnlocalip"],"query":[{"key":"name","value":"VPNname"},{"key":"localip","value":"InsertLocalIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 10:11:42 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"5043e7de-218a-4456-80f4-1799de1ad35c"},{"name":"Set the Local Subnet Address","id":"33256eef-ba22-4916-98b2-de07115e9539","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnlocalsubnets?name=VPNname&localsubnets=InsertLocalSubnetAddress","description":"<p>To set the <strong>Local Subnet Address</strong>, run the <strong>setvpnlocalsubnets</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setvpnlocalsubnets"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"VPNname"},{"key":"localsubnets","value":"InsertLocalSubnetAddress"}],"variable":[]}},"response":[{"id":"b2388f2c-a16a-4acf-bc38-e3f138a3f227","name":"Set the Local Subnet Address","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnlocalsubnets?name=VPNname&localsubnets=InsertLocalSubnetAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setvpnlocalsubnets"],"query":[{"key":"name","value":"VPNname"},{"key":"localsubnets","value":"InsertLocalSubnetAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 10:25:38 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"33256eef-ba22-4916-98b2-de07115e9539"},{"name":"Set the Remote IP Address","id":"2ff9f0e8-8cbd-4535-bc10-d255d1acea0f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnremoteip?name=VPNname&remoteip=InsertRemoteIPAddress","description":"<p>To set the <strong>Remote IP Address</strong>, run the <strong>setvpnremoteip</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setvpnremoteip"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"VPNname"},{"key":"remoteip","value":"InsertRemoteIPAddress"}],"variable":[]}},"response":[{"id":"8afd1e04-02d2-4f37-8f07-b2440c54e07f","name":"Set the Remote IP Address","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnremoteip?name=VPNname&remoteip=InsertRemoteIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setvpnremoteip"],"query":[{"key":"name","value":"VPNname"},{"key":"remoteip","value":"InsertRemoteIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 10:30:44 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"2ff9f0e8-8cbd-4535-bc10-d255d1acea0f"},{"name":"Set the Remote Subnet Address","id":"11089b53-1bcb-46c0-938c-795425b0c559","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnremotesubnets?name=VPNname&remotesubnets=InsertRemoteSubnetAddress","description":"<p>To set the <strong>Remote Subnet Address</strong>, run the <strong>setvpnremoteubnets</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setvpnremotesubnets"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"VPNname"},{"key":"remotesubnets","value":"InsertRemoteSubnetAddress"}],"variable":[]}},"response":[{"id":"04a6b32e-2f57-4ffb-b166-67003e0f973d","name":"Set the Remote Subnet Address","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnremotesubnets?name=VPNname&remotesubnets=InsertRemoteSubnetAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setvpnremotesubnets"],"query":[{"key":"name","value":"VPNname"},{"key":"remotesubnets","value":"InsertRemoteSubnetAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 10:32:43 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"11089b53-1bcb-46c0-938c-795425b0c559"}],"id":"52bd5d6e-50a4-48e8-9f6b-fa61e6d7aadb","description":"<p>Refer to the following sections for details on some VPN RESTful API commands.</p>\n","_postman_id":"52bd5d6e-50a4-48e8-9f6b-fa61e6d7aadb"},{"name":"Set the Perfect Forward Secrecy Option","item":[{"name":"Enable the Perfect Forward Secrecy Option","id":"64c3c670-5a19-40f1-9ff4-48e88d7844c5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnpfsenable?name=VPNname","description":"<p>To enable the <strong>Perfect Forward Secrecy</strong> option on a particular connection, run the <strong>setvpnpfsenable</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setvpnpfsenable"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"VPNname"}],"variable":[]}},"response":[{"id":"acae28e4-fa9b-4bda-b2ec-d96bd3f601ba","name":"Enable the Perfect Forward Secrecy Option","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnpfsenable?name=VPNname","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setvpnpfsenable"],"query":[{"key":"name","value":"VPNname"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 08:16:40 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"64c3c670-5a19-40f1-9ff4-48e88d7844c5"},{"name":"Disable the Perfect Forward Secrecy Option","id":"5ef27586-a0d0-405e-92b1-d43004f2f457","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnpfsdisable?name=VPNname","description":"<p>To disable the <strong>Perfect Forward Secrecy</strong> option on a particular connection, run the <strong>setvpnpfsdisable</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setvpnpfsdisable"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"VPNname"}],"variable":[]}},"response":[{"id":"cb4aa13c-aa8f-4fd2-b058-6ed2bf8538f8","name":"Disable the Perfect Forward Secrecy Option","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnpfsdisable?name=VPNname","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setvpnpfsdisable"],"query":[{"key":"name","value":"VPNname"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 08:17:39 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"5ef27586-a0d0-405e-92b1-d43004f2f457"}],"id":"b801f252-663a-4bc8-ab48-dc546884e33c","description":"<p>Refer to the following commands for details on how to enable or disable the <strong>Perfect Forward Secrecy</strong> option.</p>\n","_postman_id":"b801f252-663a-4bc8-ab48-dc546884e33c"},{"name":"VPN Connection Commands","item":[{"name":"Set the Connection Secret","id":"46e8c5b7-7d48-41a7-af6e-3e151d1bee47","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnsecret?name=VPNname&localid=InsertLocalIPAddress&remoteid=InsertRemoteIPAddress&key=PreSharedKeyExample","description":"<p>To set the connection secret details, run the <strong>setvpnsecret</strong> command.</p>\n<p>All of the parameters are required for this command to work.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>localid</p></td><td><p>String</p></td><td><p>Same as the <b>localip</b></p></td><td><p>Identification for the local side of the connection</p></td></tr><tr><td><p>remoteid</p></td><td><p>String</p></td><td><p>unset</p></td><td><p>Identification for the remote side of the connection. This can be the <b>remoteip</b>.</p></td></tr><tr><td><p>key</p></td><td><p>String</p></td><td><p>unset</p></td><td><p>The Pre Shared Key (PSK) string. This is the <b>Shared key</b> which is generated and managed on the Azure side. The key length should be at least 16 and at most 64 characters.</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setvpnsecret"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"VPNname"},{"key":"localid","value":"InsertLocalIPAddress"},{"key":"remoteid","value":"InsertRemoteIPAddress"},{"key":"key","value":"PreSharedKeyExample"}],"variable":[]}},"response":[{"id":"1e0d0c62-7ae6-4427-858e-82fb59816d35","name":"Set the Connection Secret","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setvpnsecret?name=VPNname&localid=InsertLocalIPAddress&remoteid=InsertRemoteIPAddress&key=PreSharedKeyExample","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setvpnsecret"],"query":[{"key":"name","value":"VPNname"},{"key":"localid","value":"InsertLocalIPAddress"},{"key":"remoteid","value":"InsertRemoteIPAddress"},{"key":"key","value":"PreSharedKeyExample"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 11:00:05 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"whack","value":"Pluto is not running (no \"/var/run/pluto/pluto.ctl\")"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <status>Down</status>\n            <localID>IP address would appear here</localID>\n            <remoteID>IP address would appear here</remoteID>\n            <key>PreSharedKeyExample</key>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"46e8c5b7-7d48-41a7-af6e-3e151d1bee47"},{"name":"Start the Connection","id":"3fdc9501-2cf8-44b1-96d2-e5002fc80f92","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/startvpncon?name=VPNname","description":"<p>To start the connection, run the <strong>startvpncon</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","startvpncon"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"VPNname"}],"variable":[]}},"response":[{"id":"e87ecdac-4d5a-4be2-902f-17598d00b515","name":"Start the Connection","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/startvpncon?name=VPNname","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","startvpncon"],"query":[{"key":"name","value":"VPNname"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 11:03:36 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"3fdc9501-2cf8-44b1-96d2-e5002fc80f92"},{"name":"Stop the Connection","id":"2fe78b9b-5cb9-4238-b2f8-470f685ed42c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/stopvpncon?name=VPNname","description":"<p>To stop the connection, run the <strong>stopvpncon</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","stopvpncon"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"VPNname"}],"variable":[]}},"response":[{"id":"8b4a9908-692b-4ed3-9a58-42855f6b15cd","name":"Stop the Connection","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/stopvpncon?name=VPNname","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","stopvpncon"],"query":[{"key":"name","value":"VPNname"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 11:08:08 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"2fe78b9b-5cb9-4238-b2f8-470f685ed42c"},{"name":"Get the Connection Status","id":"1708e943-b460-4b43-af44-526111760bf0","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getvpnstatus?name=VPNname","description":"<p>To view the status of the connection, run the <strong>getvpnstatus</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getvpnstatus"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"VPNname"}],"variable":[]}},"response":[{"id":"8ded3c65-6343-4e64-8183-0cfec37447be","name":"Get the Connection Status","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getvpnstatus?name=VPNname","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","getvpnstatus"],"query":[{"key":"name","value":"VPNname"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 11:06:18 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <status>Down</status>\n            <localIP>IP address would appear here</localIP>\n            <localSubnets>IP address would appear here/32</localSubnets>\n            <remoteIP>IP address would appear here</remoteIP>\n            <remoteSubnets>IP address would appear here/32</remoteSubnets>\n            <localID>IP address would appear here</localID>\n            <remoteID>IP address would appear here</remoteID>\n            <key>PreSharedKeyExample</key>\n            <pfs>disabled</pfs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"1708e943-b460-4b43-af44-526111760bf0"},{"name":"List All Existing Connections","id":"ec03b123-aea3-4062-acfc-20d8389e679d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listvpns","description":"<p>To list the details about all of the existing VPN connections, run the <strong>listvpns</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listvpns"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"1c2a1a6b-553c-4064-bbee-00b36d5f5370","name":"List All Existing Connections","originalRequest":{"method":"POST","header":[],"body":{"mode":"raw","raw":"{\r\n    \"cmd\": \"listvpns\",\r\n    \"apikey\": \"InsertAPIKey\"\r\n}","options":{"raw":{"language":"json"}}},"url":"https://InsertLoadMasterIPAddress/accessv2"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Fri, 22 Jul 2022 15:42:04 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/json"}],"cookie":[],"responseTime":null,"body":"{\n    \"code\": 200,\n    \"VPN\": [\n        {\n            \"name\": \"VPNname\",\n            \"status\": \"Down\",\n            \"localIP\": \"IP address would appear here\",\n            \"localSubnets\": \"IP address would appear here/32\",\n            \"remoteIP\": \"IP address would appear here\",\n            \"remoteSubnets\": \"<IPAddressWouldAppearHere>/32,<IPAddressWouldAppearHere>/32\",\n            \"localID\": \"IP address would appear here\",\n            \"remoteID\": \"IP address would appear here\",\n            \"key\": \"PreSharedKeyExample\",\n            \"pfs\": \"disabled\"\n        }\n    ],\n    \"status\": \"ok\"\n}"},{"id":"8d6e5811-907c-47d0-923f-e59e03875051","name":"List All Existing Connections","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listvpns"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 11:08:54 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <VPN>\n                <name>VPNname</name>\n                <status>Down</status>\n                <localIP>IP address would appear here</localIP>\n                <localSubnets>IP address would appear here/32</localSubnets>\n                <remoteIP>IP address would appear here</remoteIP>\n                <remoteSubnets>IP address would appear here/32</remoteSubnets>\n                <localID>IP address would appear here</localID>\n                <remoteID>IP address would appear here</remoteID>\n                <key>PreSharedKeyExample</key>\n                <pfs>disabled</pfs>\n            </VPN>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"ec03b123-aea3-4062-acfc-20d8389e679d"}],"id":"1afba649-d5b1-4287-bd40-053e79a7f491","description":"<p>Refer to the following sections for details on the VPN connection RESTful API commands.</p>\n","_postman_id":"1afba649-d5b1-4287-bd40-053e79a7f491"},{"name":"IKE Daemon Commands","item":[{"name":"Stop the IKE Daemon","id":"30503702-ad9e-4513-bbb1-e58f0948e0d3","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/stopikedaemon","description":"<p>To list the details about all of the existing VPN connections, run the <strong>listvpns</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","stopikedaemon"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"092a803d-9fc3-429e-8e55-993c00c87ab7","name":"Stop the IKE Daemon","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/stopikedaemon"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 09:34:55 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"30503702-ad9e-4513-bbb1-e58f0948e0d3"},{"name":"Start the IKE Daemon","id":"46e35c53-88ae-4971-a440-048b0449dfa1","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/startvpncon?name=VPNname","description":"<p>To start the IKE daemon, run the <strong>startikedaemon</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","startvpncon"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"VPNname"}],"variable":[]}},"response":[{"id":"5b230fdb-1352-4ac1-a5b2-4f553e9b120e","name":"Start the IKE Daemon","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/startvpncon?name=VPNname","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","startvpncon"],"query":[{"key":"name","value":"VPNname"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 08:23:33 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"46e35c53-88ae-4971-a440-048b0449dfa1"},{"name":"Get the IKE Daemon Status","id":"af4fa82d-24f0-4b99-8415-4519fa457a72","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getvpnstatus?name=VPNname","description":"<p>To view the status of the IKE daemon, run the <strong>statusikedaemon</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getvpnstatus"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"VPNname"}],"variable":[]}},"response":[{"id":"88226a37-633d-4689-a8f5-44f8e683348b","name":"Get the IKE Daemon Status","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getvpnstatus?name=VPNname","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","getvpnstatus"],"query":[{"key":"name","value":"VPNname"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 08:24:47 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <status>Down</status>\n            <localIP>IP address would appear here</localIP>\n            <localSubnets>IP address would appear here/32</localSubnets>\n            <remoteIP></remoteIP>\n            <remoteSubnets></remoteSubnets>\n            <localID>IP address would appear here</localID>\n            <remoteID></remoteID>\n            <key></key>\n            <pfs>disabled</pfs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"af4fa82d-24f0-4b99-8415-4519fa457a72"}],"id":"f55a191a-0427-43ae-ab20-afb98916a7fd","description":"<p>Refer to the following sections for RESTful API commands relating to the IKE Daemon.</p>\n","_postman_id":"f55a191a-0427-43ae-ab20-afb98916a7fd"}],"id":"88dee221-19f4-4a7c-8f35-572344cd876c","description":"<p>Refer to the following sections for details on the RESTful API commands and parameters relating to VPN Management.</p>\n","_postman_id":"88dee221-19f4-4a7c-8f35-572344cd876c"}],"id":"31e78076-ff74-4ec0-8409-2ed8dbdebd1f","description":"<p>Refer to the following sections for details on the Route Management RESTful API commands and parameters.</p>\n","_postman_id":"31e78076-ff74-4ec0-8409-2ed8dbdebd1f"},{"name":"Access Lists","item":[{"name":"List the Block or Allow List for a Specific Virtual Service","id":"2616bdf1-9536-45d0-b98d-07c59b01f10b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?listvs=block&vsip=InsertVirtualServiceIPAddress&vsprot=tcp&vsport=443","description":"<p>List the block or allow list for a specific Virtual Service by using <strong>aclcontrol</strong> command.</p>\n<table><tbody><tr><td><p><b>Virtual Server Protocol</b></p></td></tr><tr><td><p>tcp</p></td></tr><tr><td><p>udp</p></td></tr></tbody></table>\n\n<blockquote>\n<p>If the CIDR is not specified, the system will use its own default value which is /32.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"listvs","value":"block"},{"key":"vsip","value":"InsertVirtualServiceIPAddress"},{"key":"vsprot","value":"tcp"},{"key":"vsport","value":"443"}],"variable":[]}},"response":[{"id":"5f2e0b19-f38f-451d-9df7-98433bcd9cb4","name":"List the Block or Allow List for a Specific Virtual Service","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?listvs=allow&vsip=InsertVirtualServiceIPAddress&vsprot=tcp&vsport=443","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"listvs","value":"allow"},{"key":"vsip","value":"InsertVirtualServiceIPAddress"},{"key":"vsprot","value":"tcp"},{"key":"vsport","value":"443"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:20:47 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <VS>\n                <VID>1</VID>\n                <VS_IP>IP address would appear here</VS_IP>\n                <VS_Port>443</VS_Port>\n                <VS_Protocol>tcp</VS_Protocol>\n                <Blocklist>\n</Blocklist>\n            </VS>\n        </Data>\n    </Success>\n</Response>"},{"id":"5c1685c1-7f8a-42f9-8827-589e9f2a2f19","name":"List the Allow List for a Specific Virtual Service","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?listvs=allow&vsip=InsertVirtualServiceIPAddress&vsprot=tcp&vsport=443","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"listvs","value":"allow"},{"key":"vsip","value":"InsertVirtualServiceIPAddress"},{"key":"vsprot","value":"tcp"},{"key":"vsport","value":"443"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:21:56 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <VS>\n                <VID>1</VID>\n                <VS_IP>IP address would appear here</VS_IP>\n                <VS_Port>443</VS_Port>\n                <VS_Protocol>tcp</VS_Protocol>\n                <Allowlist>\n</Allowlist>\n            </VS>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"2616bdf1-9536-45d0-b98d-07c59b01f10b"},{"name":"Retrieve the Virtual Service Index","id":"ae4f56c1-1408-4ee5-bb41-998e4ec2f078","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listvs","description":"<p>To retrieve the Virtual Service index, run the <strong>listvs</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listvs"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"53e3f096-0856-494c-a6c2-f7c098d6525e","name":"Retrieve the Virtual Service Index","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listvs"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:25:01 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <VS>\n                <Status>Down</Status>\n                <Index>1</Index>\n                <VSAddress>IP address would appear here</VSAddress>\n                <VSPort>443</VSPort>\n                <Layer>7</Layer>\n                <NickName>Example Virtual Service</NickName>\n                <Enable>Y</Enable>\n                <SSLReverse>N</SSLReverse>\n                <SSLReencrypt>N</SSLReencrypt>\n                <InterceptMode>0</InterceptMode>\n                <Intercept>N</Intercept>\n                <InterceptOpts>\n                    <Opt>opnormal</Opt>\n                    <Opt>auditrelevant</Opt>\n                    <Opt>reqdatadisable</Opt>\n                    <Opt>resdatadisable</Opt>\n                </InterceptOpts>\n                <AlertThreshold>0</AlertThreshold>\n                <OwaspOpts>\n                    <Opt>opnormal</Opt>\n                    <Opt>auditnone</Opt>\n                    <Opt>reqdatadisable</Opt>\n                    <Opt>resdatadisable</Opt>\n                </OwaspOpts>\n                <BlockingParanoia>0</BlockingParanoia>\n                <IPReputationBlocking>N</IPReputationBlocking>\n                <ExecutingParanoia>0</ExecutingParanoia>\n                <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n                <PCRELimit>0</PCRELimit>\n                <JSONDLimit>0</JSONDLimit>\n                <BodyLimit>0</BodyLimit>\n                <Transactionlimit>0</Transactionlimit>\n                <Transparent>N</Transparent>\n                <SubnetOriginating>Y</SubnetOriginating>\n                <ServerInit>0</ServerInit>\n                <StartTLSMode>0</StartTLSMode>\n                <Idletime>660</Idletime>\n                <Cache>N</Cache>\n                <Compress>N</Compress>\n                <Verify>0</Verify>\n                <UseforSnat>N</UseforSnat>\n                <ForceL4>N</ForceL4>\n                <ForceL7>Y</ForceL7>\n                <MultiConnect>N</MultiConnect>\n                <ClientCert>0</ClientCert>\n                <SecurityHeaderOptions>0</SecurityHeaderOptions>\n                <SameSite>0</SameSite>\n                <VerifyBearer>N</VerifyBearer>\n                <ErrorCode>0</ErrorCode>\n                <CertFile>e36aa5a6aeac195c9dfdd5d5af21acfb</CertFile>\n                <CheckUse1.1>N</CheckUse1.1>\n                <MatchLen>0</MatchLen>\n                <CheckUseGet>0</CheckUseGet>\n                <SSLRewrite>0</SSLRewrite>\n                <VStype>http</VStype>\n                <FollowVSID>0</FollowVSID>\n                <Protocol>tcp</Protocol>\n                <Schedule>rr</Schedule>\n                <CheckType>http</CheckType>\n                <PersistTimeout>0</PersistTimeout>\n                <SSLAcceleration>Y</SSLAcceleration>\n                <CheckPort>0</CheckPort>\n                <HTTPReschedule>N</HTTPReschedule>\n                <NRules>0</NRules>\n                <NRequestRules>0</NRequestRules>\n                <NResponseRules>0</NResponseRules>\n                <NMatchBodyRules>0</NMatchBodyRules>\n                <NPreProcessRules>0</NPreProcessRules>\n                <EspEnabled>N</EspEnabled>\n                <InputAuthMode>0</InputAuthMode>\n                <OutputAuthMode>0</OutputAuthMode>\n                <MasterVS>0</MasterVS>\n                <MasterVSID>0</MasterVSID>\n                <IsTransparent>2</IsTransparent>\n                <AddVia>0</AddVia>\n                <QoS>0</QoS>\n                <TlsType>3</TlsType>\n                <NeedHostName>N</NeedHostName>\n                <OCSPVerify>N</OCSPVerify>\n                <AllowHTTP2>N</AllowHTTP2>\n                <PassCipher>N</PassCipher>\n                <PassSni>N</PassSni>\n                <ChkInterval>0</ChkInterval>\n                <ChkTimeout>0</ChkTimeout>\n                <ChkRetryCount>0</ChkRetryCount>\n                <AdaptivePort>0</AdaptivePort>\n                <AdaptiveInterval>0</AdaptiveInterval>\n                <AdaptiveMinPercent>0</AdaptiveMinPercent>\n                <Bandwidth>0</Bandwidth>\n                <ConnsPerSecLimit>0</ConnsPerSecLimit>\n                <RequestsPerSecLimit>0</RequestsPerSecLimit>\n                <MaxConnsLimit>0</MaxConnsLimit>\n                <RefreshPersist>N</RefreshPersist>\n                <ResponseStatusRemap>N</ResponseStatusRemap>\n                <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n                <EnhancedHealthChecks>N</EnhancedHealthChecks>\n                <RsMinimum>0</RsMinimum>\n                <CipherSet>Default</CipherSet>\n                <NumberOfRSs>0</NumberOfRSs>\n            </VS>\n            <VS>\n                <Status>Down</Status>\n                <Index>3</Index>\n                <VSAddress>10.35.48.46</VSAddress>\n                <VSPort>80</VSPort>\n                <Layer>7</Layer>\n                <Enable>Y</Enable>\n                <SSLReverse>N</SSLReverse>\n                <SSLReencrypt>N</SSLReencrypt>\n                <InterceptMode>0</InterceptMode>\n                <Intercept>N</Intercept>\n                <InterceptOpts>\n                    <Opt>opnormal</Opt>\n                    <Opt>auditrelevant</Opt>\n                    <Opt>reqdatadisable</Opt>\n                    <Opt>resdatadisable</Opt>\n                </InterceptOpts>\n                <AlertThreshold>0</AlertThreshold>\n                <OwaspOpts>\n                    <Opt>opnormal</Opt>\n                    <Opt>auditnone</Opt>\n                    <Opt>reqdatadisable</Opt>\n                    <Opt>resdatadisable</Opt>\n                </OwaspOpts>\n                <BlockingParanoia>0</BlockingParanoia>\n                <IPReputationBlocking>N</IPReputationBlocking>\n                <ExecutingParanoia>0</ExecutingParanoia>\n                <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n                <PCRELimit>0</PCRELimit>\n                <JSONDLimit>0</JSONDLimit>\n                <BodyLimit>0</BodyLimit>\n                <Transactionlimit>0</Transactionlimit>\n                <Transparent>N</Transparent>\n                <SubnetOriginating>Y</SubnetOriginating>\n                <ServerInit>0</ServerInit>\n                <StartTLSMode>0</StartTLSMode>\n                <Idletime>660</Idletime>\n                <Cache>N</Cache>\n                <Compress>N</Compress>\n                <Verify>0</Verify>\n                <UseforSnat>N</UseforSnat>\n                <ForceL4>N</ForceL4>\n                <ForceL7>Y</ForceL7>\n                <MultiConnect>N</MultiConnect>\n                <ClientCert>0</ClientCert>\n                <SecurityHeaderOptions>0</SecurityHeaderOptions>\n                <SameSite>0</SameSite>\n                <VerifyBearer>N</VerifyBearer>\n                <ErrorCode>0</ErrorCode>\n                <CheckUse1.1>N</CheckUse1.1>\n                <MatchLen>0</MatchLen>\n                <CheckUseGet>0</CheckUseGet>\n                <SSLRewrite>0</SSLRewrite>\n                <VStype>http</VStype>\n                <FollowVSID>0</FollowVSID>\n                <Protocol>tcp</Protocol>\n                <Schedule>rr</Schedule>\n                <CheckType>http</CheckType>\n                <PersistTimeout>0</PersistTimeout>\n                <CheckPort>0</CheckPort>\n                <HTTPReschedule>N</HTTPReschedule>\n                <NRules>0</NRules>\n                <NRequestRules>0</NRequestRules>\n                <NResponseRules>0</NResponseRules>\n                <NMatchBodyRules>0</NMatchBodyRules>\n                <NPreProcessRules>0</NPreProcessRules>\n                <EspEnabled>N</EspEnabled>\n                <InputAuthMode>0</InputAuthMode>\n                <OutputAuthMode>0</OutputAuthMode>\n                <MasterVS>0</MasterVS>\n                <MasterVSID>0</MasterVSID>\n                <IsTransparent>2</IsTransparent>\n                <AddVia>0</AddVia>\n                <QoS>0</QoS>\n                <TlsType>0</TlsType>\n                <NeedHostName>N</NeedHostName>\n                <OCSPVerify>N</OCSPVerify>\n                <AllowHTTP2>N</AllowHTTP2>\n                <PassCipher>N</PassCipher>\n                <PassSni>N</PassSni>\n                <ChkInterval>0</ChkInterval>\n                <ChkTimeout>0</ChkTimeout>\n                <ChkRetryCount>0</ChkRetryCount>\n                <AdaptivePort>0</AdaptivePort>\n                <AdaptiveInterval>0</AdaptiveInterval>\n                <AdaptiveMinPercent>0</AdaptiveMinPercent>\n                <Bandwidth>17</Bandwidth>\n                <ConnsPerSecLimit>10</ConnsPerSecLimit>\n                <RequestsPerSecLimit>10</RequestsPerSecLimit>\n                <MaxConnsLimit>40</MaxConnsLimit>\n                <RefreshPersist>N</RefreshPersist>\n                <ResponseStatusRemap>N</ResponseStatusRemap>\n                <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n                <EnhancedHealthChecks>N</EnhancedHealthChecks>\n                <RsMinimum>0</RsMinimum>\n                <NumberOfRSs>0</NumberOfRSs>\n            </VS>\n            <VS>\n                <Status>Down</Status>\n                <Index>2</Index>\n                <VSAddress>10.35.48.47</VSAddress>\n                <VSPort>80</VSPort>\n                <Layer>7</Layer>\n                <NickName>Example Virtual Service02</NickName>\n                <Enable>Y</Enable>\n                <SSLReverse>N</SSLReverse>\n                <SSLReencrypt>N</SSLReencrypt>\n                <InterceptMode>0</InterceptMode>\n                <Intercept>N</Intercept>\n                <InterceptOpts>\n                    <Opt>opnormal</Opt>\n                    <Opt>auditrelevant</Opt>\n                    <Opt>reqdatadisable</Opt>\n                    <Opt>resdatadisable</Opt>\n                </InterceptOpts>\n                <AlertThreshold>0</AlertThreshold>\n                <OwaspOpts>\n                    <Opt>opnormal</Opt>\n                    <Opt>auditnone</Opt>\n                    <Opt>reqdatadisable</Opt>\n                    <Opt>resdatadisable</Opt>\n                </OwaspOpts>\n                <BlockingParanoia>0</BlockingParanoia>\n                <IPReputationBlocking>N</IPReputationBlocking>\n                <ExecutingParanoia>0</ExecutingParanoia>\n                <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n                <PCRELimit>0</PCRELimit>\n                <JSONDLimit>0</JSONDLimit>\n                <BodyLimit>0</BodyLimit>\n                <Transactionlimit>0</Transactionlimit>\n                <Transparent>N</Transparent>\n                <SubnetOriginating>Y</SubnetOriginating>\n                <ServerInit>0</ServerInit>\n                <StartTLSMode>0</StartTLSMode>\n                <Idletime>660</Idletime>\n                <Cache>N</Cache>\n                <Compress>N</Compress>\n                <Verify>0</Verify>\n                <UseforSnat>N</UseforSnat>\n                <ForceL4>N</ForceL4>\n                <ForceL7>Y</ForceL7>\n                <MultiConnect>N</MultiConnect>\n                <ClientCert>0</ClientCert>\n                <SecurityHeaderOptions>0</SecurityHeaderOptions>\n                <SameSite>0</SameSite>\n                <VerifyBearer>N</VerifyBearer>\n                <ErrorCode>0</ErrorCode>\n                <CheckUse1.1>N</CheckUse1.1>\n                <MatchLen>0</MatchLen>\n                <CheckUseGet>0</CheckUseGet>\n                <SSLRewrite>0</SSLRewrite>\n                <VStype>http</VStype>\n                <FollowVSID>0</FollowVSID>\n                <Protocol>tcp</Protocol>\n                <Schedule>rr</Schedule>\n                <CheckType>http</CheckType>\n                <PersistTimeout>0</PersistTimeout>\n                <CheckPort>0</CheckPort>\n                <HTTPReschedule>N</HTTPReschedule>\n                <NRules>0</NRules>\n                <NRequestRules>0</NRequestRules>\n                <NResponseRules>0</NResponseRules>\n                <NMatchBodyRules>0</NMatchBodyRules>\n                <NPreProcessRules>0</NPreProcessRules>\n                <EspEnabled>N</EspEnabled>\n                <InputAuthMode>0</InputAuthMode>\n                <OutputAuthMode>0</OutputAuthMode>\n                <MasterVS>0</MasterVS>\n                <MasterVSID>0</MasterVSID>\n                <IsTransparent>2</IsTransparent>\n                <AddVia>0</AddVia>\n                <QoS>0</QoS>\n                <TlsType>0</TlsType>\n                <NeedHostName>N</NeedHostName>\n                <OCSPVerify>N</OCSPVerify>\n                <AllowHTTP2>N</AllowHTTP2>\n                <PassCipher>N</PassCipher>\n                <PassSni>N</PassSni>\n                <ChkInterval>0</ChkInterval>\n                <ChkTimeout>0</ChkTimeout>\n                <ChkRetryCount>0</ChkRetryCount>\n                <AdaptivePort>0</AdaptivePort>\n                <AdaptiveInterval>0</AdaptiveInterval>\n                <AdaptiveMinPercent>0</AdaptiveMinPercent>\n                <Bandwidth>0</Bandwidth>\n                <ConnsPerSecLimit>0</ConnsPerSecLimit>\n                <RequestsPerSecLimit>0</RequestsPerSecLimit>\n                <MaxConnsLimit>0</MaxConnsLimit>\n                <RefreshPersist>N</RefreshPersist>\n                <ResponseStatusRemap>N</ResponseStatusRemap>\n                <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n                <EnhancedHealthChecks>N</EnhancedHealthChecks>\n                <RsMinimum>0</RsMinimum>\n                <NumberOfRSs>0</NumberOfRSs>\n            </VS>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"ae4f56c1-1408-4ee5-bb41-998e4ec2f078"},{"name":"List the Block or Allow List for a Specific Virtual Service (using Virtual Service Index)","id":"09d23aec-84fd-45b1-bec0-4ced346b2c75","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?listvs=allow&vs=1","description":"<p>To list the block or allow list using the Virtual Service index for a specific Virtual Service, run the <strong>aclcontrol</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"listvs","value":"allow"},{"key":"vs","value":"1"}],"variable":[]}},"response":[{"id":"94dd9993-e680-4268-adf2-f732bcedc25a","name":"List the Block or Allow List for a Specific Virtual Service (using Virtual Service Index)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?listvs=block&vs=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"listvs","value":"block"},{"key":"vs","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:28:07 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <VS>\n                <VID>1</VID>\n                <VS_IP>IP address would appear here</VS_IP>\n                <VS_Port>443</VS_Port>\n                <VS_Protocol>tcp</VS_Protocol>\n                <Allowlist>\n</Allowlist>\n            </VS>\n        </Data>\n    </Success>\n</Response>"},{"id":"188c3dfa-f96b-4770-b307-8a9b828b58be","name":"List the Block List for a Specific Virtual Service (using Virtual Service Index)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?listvs=block&vs=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"listvs","value":"block"},{"key":"vs","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:28:40 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <VS>\n                <VID>1</VID>\n                <VS_IP>IP address would appear here</VS_IP>\n                <VS_Port>443</VS_Port>\n                <VS_Protocol>tcp</VS_Protocol>\n                <Blocklist>\n</Blocklist>\n            </VS>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"09d23aec-84fd-45b1-bec0-4ced346b2c75"},{"name":"Add an Address to the Global Block or Allow List","id":"0fa70025-0096-4f48-8663-4d2df2af5e53","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?add=allow&addr=InsertVirtualServiceIPAddress","description":"<p>To add an address to the global block or allow list, run the <strong>aclcontrol</strong> command.</p>\n<blockquote>\n<p>The <strong>addr</strong> can be an IPv4 or an IPv6 address. If the CIDR is not specified, the system uses a default of /32.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"add","value":"allow"},{"key":"addr","value":"InsertVirtualServiceIPAddress"}],"variable":[]}},"response":[{"id":"6e79c6f0-73dd-4bb0-8b0a-2217e636a9b1","name":"Add an Address to the Global Allow List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?add=allow&addr=InsertVirtualServiceIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"add","value":"allow"},{"key":"addr","value":"InsertVirtualServiceIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:34:29 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command successfully completed</Success>\n</Response>"},{"id":"b0f0f3a2-1057-45d4-bedd-9d156fbda7ac","name":"Add an Address to the Global Block List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?add=block&addr=InsertVirtualServiceIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"add","value":"block"},{"key":"addr","value":"InsertVirtualServiceIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:35:25 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command successfully completed</Success>\n</Response>"}],"_postman_id":"0fa70025-0096-4f48-8663-4d2df2af5e53"},{"name":"Add an Address to a Virtual Service Block or Allow List","id":"62f4532d-58f8-4e4b-a5c7-48631fb013bc","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?addvs=block&vsip=InsertVirtualServiceIPAddress&vsprot=tcp&vsport=443&addr=InsertVirtualServiceIPAddress&comment=Add a service","description":"<p>To add an address to a Virtual Service block or allow list, run the <strong>aclcontrol</strong> command.</p>\n<p>The <strong>comment</strong> parameter is optional. The <strong>comment</strong> parameter accepts a maximum of 127 characters.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"addvs","value":"block"},{"key":"vsip","value":"InsertVirtualServiceIPAddress"},{"key":"vsprot","value":"tcp"},{"key":"vsport","value":"443"},{"key":"addr","value":"InsertVirtualServiceIPAddress"},{"key":"comment","value":"Add a service"}],"variable":[]}},"response":[{"id":"dc0fe039-61f2-48c5-a8f9-56086bef8d87","name":"Add an Address to a Virtual Service Allow List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?addvs=allow&vsip=InsertVirtualServiceIPAddress&vsprot=tcp&vsport=443&addr=InsertVirtualServiceIPAddress&comment=Add a service","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"addvs","value":"allow"},{"key":"vsip","value":"InsertVirtualServiceIPAddress"},{"key":"vsprot","value":"tcp"},{"key":"vsport","value":"443"},{"key":"addr","value":"InsertVirtualServiceIPAddress"},{"key":"comment","value":"Add a service"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:39:07 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command successfully completed</Success>\n</Response>"},{"id":"af647629-b9e8-490f-9c41-d46d4c4bc6ca","name":"Add an Address to a Virtual Service Block List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?addvs=block&vsip=InsertVirtualServiceIPAddress&vsprot=tcp&vsport=443&addr=InsertVirtualServiceIPAddress&comment=Add a service","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"addvs","value":"block"},{"key":"vsip","value":"InsertVirtualServiceIPAddress"},{"key":"vsprot","value":"tcp"},{"key":"vsport","value":"443"},{"key":"addr","value":"InsertVirtualServiceIPAddress"},{"key":"comment","value":"Add a service"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:40:54 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command successfully completed</Success>\n</Response>"}],"_postman_id":"62f4532d-58f8-4e4b-a5c7-48631fb013bc"},{"name":"Add an Address to a Virtual Service Block or Allow List (using Virtual Service Index)","id":"92d8e443-5ea5-4ce4-a1cc-153053d38e2b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?addvs=allow&vs=1&addr=InsertVirtualServiceIPAddress&comment=Add a service","description":"<p>To add an address to a Virtual Service block or allow list (using Virtual Service index), run the <strong>aclcontrol</strong> command.</p>\n<p>The <strong>comment</strong> parameter is optional. The <strong>comment</strong> parameter accepts a maximum of 127 characters.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"addvs","value":"allow"},{"key":"vs","value":"1"},{"key":"addr","value":"InsertVirtualServiceIPAddress"},{"key":"comment","value":"Add a service"}],"variable":[]}},"response":[{"id":"9f5c7c80-49c9-41ec-941e-29862d71dced","name":"Add an Address to a Virtual Service Block or Allow List (using Virtual Service Index)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?addvs=allow&vs=1&addr=InsertVirtualServiceIPAddress&comment=Add a service","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"addvs","value":"allow"},{"key":"vs","value":"1"},{"key":"addr","value":"InsertVirtualServiceIPAddress"},{"key":"comment","value":"Add a service"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:46:13 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command successfully completed</Success>\n</Response>"}],"_postman_id":"92d8e443-5ea5-4ce4-a1cc-153053d38e2b"},{"name":"Show the Addresses on the Global Block or Allow List","id":"66ea155f-9009-4fa8-bc3d-36a5c396c252","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?list=block","description":"<p>To display the addresses on the global block or allow list, run the <strong>aclcontrol</strong> command.</p>\n<table><tbody><tr><td><p><b>List Type</b><br /></p></td></tr><tr><td><p>block</p></td></tr><tr><td><p>allow</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"list","value":"block"}],"variable":[]}},"response":[{"id":"9e0cae52-d22f-4a3e-aa99-4c9ac6ad961f","name":"Show the Addresses on the Global Allow List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?list=allow","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"list","value":"allow"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:48:32 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Allowlist>\n                <IP>\n                    <addr>IP address would appear here/32</addr>\n                    <comment></comment>\n                </IP>\n            </Allowlist>\n        </Data>\n    </Success>\n</Response>"},{"id":"44df1ae5-d672-4529-a943-e435099252ab","name":"Show the Addresses on the Global Block List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?list=block","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"list","value":"block"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:49:04 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Blocklist>\n                <IP>\n                    <addr>IP address would appear here/32</addr>\n                    <comment></comment>\n                </IP>\n            </Blocklist>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"66ea155f-9009-4fa8-bc3d-36a5c396c252"},{"name":"Delete an Address from Global Block or Allow List","id":"e565e47a-34c4-4d25-9a9a-329eeb6761a2","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?del=block&addr=InsertVirtualServiceIPAddress","description":"<p>To delete an address from the global block or allow list, run the <strong>aclcontrol</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"del","value":"block"},{"key":"addr","value":"InsertVirtualServiceIPAddress"}],"variable":[]}},"response":[{"id":"0e988612-6efc-4feb-8c37-aabe640df1ac","name":"Delete an Address from Global Block or Allow List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?del=allow&addr=InsertVirtualServiceIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"del","value":"allow"},{"key":"addr","value":"InsertVirtualServiceIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:53:35 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command successfully completed</Success>\n</Response>"},{"id":"bbfb9d40-4552-432e-be76-17ed36fad290","name":"Delete an Address from Global Block or Allow List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?del=block&addr=InsertVirtualServiceIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"del","value":"block"},{"key":"addr","value":"InsertVirtualServiceIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:54:09 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command successfully completed</Success>\n</Response>"}],"_postman_id":"e565e47a-34c4-4d25-9a9a-329eeb6761a2"},{"name":"Delete an Address from a Virtual Service Block or Allow List","id":"2c207cf2-4f2f-4786-8719-7ccba328f4db","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?delvs=allow&vsip=InsertVirtualServiceIPAddress&vsprot=tcp&vsport=443&addr=InsertVirtualServiceIPAddress&comment=Delete a service","description":"<p>To delete an address from a Virtual Service block or allow list, run the <strong>aclcontrol</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"delvs","value":"allow"},{"key":"vsip","value":"InsertVirtualServiceIPAddress"},{"key":"vsprot","value":"tcp"},{"key":"vsport","value":"443"},{"key":"addr","value":"InsertVirtualServiceIPAddress"},{"key":"comment","value":"Delete a service"}],"variable":[]}},"response":[{"id":"6cdcf6e0-3232-435d-b089-7a3af5fe15a6","name":"Delete an Address from a Virtual Service Block List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?delvs=block&vsip=InsertVirtualServiceIPAddress&vsprot=tcp&vsport=443&addr=InsertVirtualServiceIPAddress&comment=Delete a service","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"delvs","value":"block"},{"key":"vsip","value":"InsertVirtualServiceIPAddress"},{"key":"vsprot","value":"tcp"},{"key":"vsport","value":"443"},{"key":"addr","value":"InsertVirtualServiceIPAddress"},{"key":"comment","value":"Delete a service"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:57:51 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command successfully completed</Success>\n</Response>"},{"id":"73cd1aaa-7df0-4b27-bce0-9c21176a9034","name":"Delete an Address from a Virtual Service Allow List","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?delvs=allow&vsip=InsertVirtualServiceIPAddress&vsprot=tcp&vsport=443&addr=InsertVirtualServiceIPAddress&comment=Delete a service","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"delvs","value":"allow"},{"key":"vsip","value":"InsertVirtualServiceIPAddress"},{"key":"vsprot","value":"tcp"},{"key":"vsport","value":"443"},{"key":"addr","value":"InsertVirtualServiceIPAddress"},{"key":"comment","value":"Delete a service"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 06:58:48 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command successfully completed</Success>\n</Response>"}],"_postman_id":"2c207cf2-4f2f-4786-8719-7ccba328f4db"},{"name":"Delete an Address to a Virtual Service Block or Allow List (using Virtual Service Index)","id":"4a54b55d-ca0a-4cbc-a0b2-11d8c0e10d10","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?delvs=allow&vs=1&addr=InsertVirtualServiceIPAddress&comment=Delete a service","description":"<p>To delete an address from a Virtual Service block or allow list (using Virtual Service index), run the <strong>aclcontrol</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","aclcontrol"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"delvs","value":"allow"},{"key":"vs","value":"1"},{"key":"addr","value":"InsertVirtualServiceIPAddress"},{"key":"comment","value":"Delete a service"}],"variable":[]}},"response":[{"id":"22cbb225-cc3e-4314-82c8-59f8aecae9ac","name":"Delete an Address to a Virtual Service Block or Allow List (using Virtual Service Index)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/aclcontrol?delvs=allow&vs=1&addr=InsertVirtualServiceIPAddress&comment=Delete a service","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","aclcontrol"],"query":[{"key":"delvs","value":"allow"},{"key":"vs","value":"1"},{"key":"addr","value":"InsertVirtualServiceIPAddress"},{"key":"comment","value":"Delete a service"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 07:01:09 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command successfully completed</Success>\n</Response>"}],"_postman_id":"4a54b55d-ca0a-4cbc-a0b2-11d8c0e10d10"}],"id":"d3e409a6-3693-42db-82df-6fb0d3dd99b7","description":"<blockquote>\n<p>The Access Control List (ACL) commands allow you to switch on or off the ACL and set or get the related parameters. When running an ACL command without a specified Virtual Service IP address, the command is run for the global ACL. If a Virtual Service IP address is set, the command is only run for the ACL for that specific Virtual Service.<br />Only users with ‘All Permissions’ can run the global commands.<br />Users with ‘All Permissions’ and ‘Virtual Service’ permissions can run the Virtual Service-specific commands.</p>\n</blockquote>\n","_postman_id":"d3e409a6-3693-42db-82df-6fb0d3dd99b7"},{"name":"HA Parameters","item":[{"name":"Force Partner Update","id":"8a946b40-ca75-44dd-b8b4-dadb11ca1cc5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/forceupdatepartner","description":"<p>Immediately forces the configuration from the active to standby unit without waiting for a normal update.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","forceupdatepartner"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"9f439469-ccc0-40cf-a216-7d9a97eabc08","name":"Force Partner Update","originalRequest":{"method":"GET","header":[],"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/forceupdatepartner"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 19 Mar 2025 09:24:12 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"8a946b40-ca75-44dd-b8b4-dadb11ca1cc5"}],"id":"3a8edf2c-9c7b-4907-b73b-db342caa5a25","description":"<blockquote>\n<p>If using the LoadMaster for Azure product, please refer to the next section. </p>\n</blockquote>\n<p>Parameters relating to HA Parameters that can be managed using get and set commands are detailed in the following table.</p>\n<p>Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for the <strong>get</strong> and <strong>set</strong> commands.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>hastatus</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Normal HA:</p><p>Active, Standby, Passive (all as expected).</p><p>Cloud HA:</p><p>Active, Standby, Passive (if status not yet set).</p><p>Cluster:</p><p>Active (if master), Standby (if slave), Passive (if disabled). For clusters, there is one master and all of the others are standby.</p><p>If HA is not configured, <b>HA not configured</b> is returned.</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Retrieve the status of a HA or cluster unit. This is a read-only parameter and cannot be set.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>haif</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The network interface used when synchronising the configuration between the members of the HA cluster</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>hainitial</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Perform extra network checks at boot time. This may cause instability and should not be used.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>macglobal</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>By default, the LoadMaster uses an IP multicast address when sending CARP packets. Enabling this option forces the use of the IP broadcast address instead.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>haprefered</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 = No preferred host</p><p>1 = Prefer First HA</p><p>2 = Prefer Second HA</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>By default, neither partner in a HA cluster has priority. When a machine restarts after a switchover that machine becomes a standby. Specifying a preferred host means that when this machine restarts it will always become active and the partner will revert to standby mode.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>hastyle</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 = legacy heart beat</p><p>1 = carp</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>By default, the system uses a version of VRRP (carp) to check the status of the partner. The system can also support the legacy Heartbeat program. This option only takes effect when both machines are rebooted</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>hatimeout</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>1 = 3 seconds</p><p>2 = 6 seconds</p><p>3 = 9 second</p><p>4 = 12 seconds</p><p>5 = 15 seconds</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The time the active must be unavailable before a switchover occurs.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>havhid</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>1-255</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When using multiple HA LoadMasters on the same network, this value identifies each cluster so that there are no potential unwanted interactions.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>hawait</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-200</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This is how long (in seconds) after the initial boot, before the LoadMaster becomes active. If the partner machine is running this value is ignored. This value can be changed to mitigate the time taken for some intelligent switches to detect that the LoadMaster has started and to bring up the link.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>mcast</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The network interface used for multicast traffic which is used to synchronize Layer 4 and Layer 7 traffic when Inter HA Updates are enabled.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>vmac</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This option creates a shared MAC address for both units. When failover occurs, the LoadMaster handles the MAC address handover too. This allows the switches to keep the MAC address and not worry about ARP caches or stale records.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>Tcpfailover</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disable</p><p>1 – Enable</p><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When using L4 services, enabling updates allows L4 connection maintenance across a HA switchover. This option is ignored for L7 services.</p><p>This parameter is now deprecated and has been replaced with the <b>hal4update </b>parameter.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>hal4update</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disable</p><p>1 – Enable</p><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When using L4 services, enabling updates allows L4 connection maintenance across a HA switchover. This option is ignored for L7 services.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>L4SyncThreshold</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>1-(L4SyncPeriod-1)</div><div><div><div><div></div></div></div><div></div></div></td><td><div>The minimum number of incoming packets that a connection needs to receive before the connection will be synchronized.<br /><br />Default value: 3 seconds<br /><br />Valid values range from the 1 to the L4SyncPeriod-1.<br />For example, if the L4SyncPeriod is set to 50, the maximum L4SyncThreshold is 49.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>L4SyncPeriod</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>(L4SyncThreshold+1)-255</div><div><div><div><div></div></div></div><div></div></div></td><td><div>A connection gets synchronized every time the number of its incoming packets modulus sync_period equals the threshold.<br /><br />Default value: 50 seconds<br /><br />Valid values range from the L4SyncThreshold+1 to 255.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>L4SyncRefreshPeriod</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0-10</div><div><div><div><div></div></div></div><div></div></div></td><td><div>This is the allowed difference time (in seconds) in the reported connection timer that triggers a new sync message.<br /><br />Default value: 0<br /><br />Valid values range from 0 to 10.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>cookieupdate</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disable</p><p>1 – Enable</p><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When using L7 services, enabling this option allows sharing of persistency information between HA partners. If a HA switchover occurs, the persistency information will then not be lost. Enabling this option can have a significant performance impact.</p><p>This parameter is now deprecated and has been replaced with the <b>hal7update </b>parameter.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>hal7update</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disable</p><p>1 – Enable</p><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When using L7 services, enabling this option allows sharing of persistency information between HA partners. If a HA switchover occurs, the persistency information will then not be lost. Enabling this option can have a significant performance impact.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>finalpersist</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0, 60-86400</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When a Real Server is disabled, the sessions persisting on that Real Server continue to be served until the Drain Time has expired or until no more sessions are being handled by the Real Server. No new sessions will be handled by the Real Server.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>hamode</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – HA mode disabled</p><p>1 – HA 1 mode</p><p>2 – HA 2 mode</p><p>3 – System is using cloud HA</p><p>4 – System is in a cluster</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the HA mode. If only using a single LoadMaster, use Non-HA Mode. In non-cloud HA mode, one LoadMaster must be specified as the first and another as second. HA will not work if both LoadMasters are specified the same.</p><p>HA enables two physical or virtual LoadMasters to become one logical device. Only one of these units is active and handling traffic at any one time (HA 1 mode) while the other is a hot standby (passive - HA 2 mode).</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>hacheck</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disable</p><p>1 - Enable</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enable HA health checking. At least one interface must be enabled.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>halinkfailreboot</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disable</p><p>1 - Enable</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Enables LoadMaster to reboot if there is a link failure.</div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>\n\n<p>Simply changing the HA mode does not switch between non-HA and HA. The partner and Virtual IP (VIP) Addresses also need to be set and a reboot is needed before the system is fully switched over. For instructions on how to set up HA using the RESTful API, refer to the <a href=\"#129b1c7d-bfc7-430c-92b1-a7e715214428\">Setting Up HA using the RESTful API</a> section.</p>\n<blockquote>\n<p>After changing the <strong>hastyle</strong> or <strong>hamode</strong> a reboot is required for the changes to take effect.</p>\n</blockquote>\n","_postman_id":"3a8edf2c-9c7b-4907-b73b-db342caa5a25"},{"name":"Cloud HA Parameters","item":[{"name":"Generic Gloud Commands","item":[{"name":"Get the Cloud HA Parameters","id":"e8b633a4-a71e-48ff-8e96-e3baade4972c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/getCloudHaParams","description":"<p>You can retrieve the HA parameters for a cloud LoadMaster by running the <strong>getCloudHaParams</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","port":"8443","path":["access","getCloudHaParams"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"d0ae8a96-8078-418b-9c86-f4411d629776","name":"Get the Cloud HA Parameters","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/getCloudHaParams"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:21:17 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <AzureHA>\n                <HaMode>master</HaMode>\n                <HaPrefered>1</HaPrefered>\n                <Partner>IP address would appear here</Partner>\n                <Port>8443</Port>\n                <HealthCheckAllInterfaces>unset</HealthCheckAllInterfaces>\n            </AzureHA>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"e8b633a4-a71e-48ff-8e96-e3baade4972c"},{"name":"Set the Cloud HA Mode","id":"7f05e27c-7601-4b66-860c-f2b7d3bdc675","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/setcloudhamode?hamode=second","description":"<p>You can set the cloud HA mode by running the <strong>setcloudhamode</strong> command.</p>\n<p>Valid values for the <strong>hamode</strong> parameter are as follows:</p>\n<ul>\n<li><strong>first</strong></li>\n<li><strong>second</strong></li>\n<li><strong>single</strong></li>\n</ul>\n<p>Setting the <strong>hamode</strong> to <strong>single</strong> disables HA (the LoadMaster is treated as a single unit).</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","port":"8443","path":["access","setcloudhamode"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"hamode","value":"second"}],"variable":[]}},"response":[{"id":"90856960-549a-478c-b5e9-939340edc6f4","name":"Set the Cloud HA Mode","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/setcloudhamode?hamode=second","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"port":"8443","path":["access","setcloudhamode"],"query":[{"key":"hamode","value":"second"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:23:14 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"7f05e27c-7601-4b66-860c-f2b7d3bdc675"},{"name":"Set the Cloud HA Parameters","id":"728c8ff7-378b-4c12-bfe7-acc30188f0d5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/setcloudhaparam?hcp=443","description":"<p>You can set the cloud HA parameters by running the <strong>setcloudhaparam</strong> command.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Range</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>partner</p></td><td><p>S</p></td><td><p>Must be a valid IP address</p></td><td><p>Specify the hostname or IP address of the HA partner unit.</p></td></tr><tr><td><p>hcp</p></td><td><p>I</p></td><td><p>Must be a valid port value</p></td><td><p>Set the port to run the health check on. The port must be the same on both the active and standby unit for HA to function correctly.</p></td></tr><tr><td><p>haprefered</p></td><td><p>B</p></td><td><p>0 – No Preferred Host</p><p>1 – Prefer First</p></td><td><p>There are two possible values to set:</p><p>0 - No Preferred Host: Each unit takes over when the other unit fails. No switchover is performed when the partner is restarted.</p><p>1 - Prefer First: The active unit always takes over. This is the default option.</p></td></tr><tr><td>hcai</td><td>B</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>When this option is enabled, the health check listens on all interfaces. This is required when using a multi-arm configuration. If this is disabled, the health check listens on the primary eth0 address (this is the default behavior).</td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","port":"8443","path":["access","setcloudhaparam"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"hcp","value":"443"}],"variable":[]}},"response":[{"id":"21557940-b612-4963-8a77-6178281cc3ae","name":"Set the Cloud HA Parameters","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/setcloudhaparam?hcp=443","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"port":"8443","path":["access","setcloudhaparam"],"query":[{"key":"hcp","value":"443"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:25:11 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"728c8ff7-378b-4c12-bfe7-acc30188f0d5"}],"id":"438609ee-c19a-4a43-a673-838cedde25cc","description":"<p>Refer to the sections below for details on some RESTful API HA commands that work for both Azure and AWS LoadMasters.</p>\n","_postman_id":"438609ee-c19a-4a43-a673-838cedde25cc"},{"name":"Azure HA Parameters","item":[{"name":"Get the Azure HA Parameters","id":"bdafa2f3-8893-4a01-9b45-fc41b1e070d6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/getazurehaparams","description":"<p>You can retrieve the Azure HA parameters by using the <strong>getazurehaparams</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","port":"8443","path":["access","getazurehaparams"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"05573e37-3c26-4889-9f10-f069fa66a0e3","name":"Get the Azure HA Parameters","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/getazurehaparams"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:26:52 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <AzureHA>\n                <HaMode>slave</HaMode>\n                <HaPrefered>1</HaPrefered>\n                <Partner>IP address would appear here</Partner>\n                <Port>443</Port>\n                <HealthCheckAllInterfaces>unset</HealthCheckAllInterfaces>\n            </AzureHA>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"bdafa2f3-8893-4a01-9b45-fc41b1e070d6"},{"name":"Set the Azure HA Mode","id":"a8090278-0583-4c99-ab03-62d32426d619","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehamode?hamode=first","description":"<p>You can set the Azure HA mode by running the <strong>azurehamode</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","port":"8443","path":["access","azurehamode"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"hamode","value":"first"}],"variable":[]}},"response":[{"id":"6d905b6d-fc61-4f68-aea1-36e150503e39","name":"Set the Azure HA Mode","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehamode?hamode=first","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"port":"8443","path":["access","azurehamode"],"query":[{"key":"hamode","value":"first"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:28:25 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"a8090278-0583-4c99-ab03-62d32426d619"},{"name":"Set the Azure HA Parameters","id":"5ec2f598-7feb-4540-9737-e583a96e5212","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehaparam?hcp=8443","description":"<p>You can set the Azure HA parameters by running the <strong>azurehaparam</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","port":"8443","path":["access","azurehaparam"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"hcp","value":"8443"}],"variable":[]}},"response":[{"id":"872157a3-0e20-4e36-9ecf-6c077f482fc5","name":"Set the Azure HA Parameters","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehaparam?hcp=8443","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"port":"8443","path":["access","azurehaparam"],"query":[{"key":"hcp","value":"8443"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:29:53 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"5ec2f598-7feb-4540-9737-e583a96e5212"}],"id":"c75faa95-d5f8-4f1c-81a2-031ba6ab66da","description":"<p>These commands are only relevant to the LoadMasters running in an Azure environment.</p>\n","_postman_id":"c75faa95-d5f8-4f1c-81a2-031ba6ab66da"},{"name":"AWS HA Parameters","item":[{"name":"Get the AWS HA Parameters","id":"317aa664-7fc7-4cae-b1ca-5db2f35efa05","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertCloudIPAddress/access/getawshaparams","description":"<p>You can retrieve the AWS HA parameters by using the <strong>getawshaparams</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getawshaparams"],"host":["InsertCloudIPAddress"],"query":[],"variable":[]}},"response":[{"id":"9c2f3a11-c6f9-491d-b870-e39e5b6e3899","name":"Get the AWS HA Parameters","originalRequest":{"method":"GET","header":[{"key":"Content-Type","value":"text/plain","type":"text"}],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"text"}}},"url":"https://bal:InsertPassword@InsertCloudIPAddress/access/getawshaparams"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 30 Sep 2022 10:21:51 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/xml","description":"","type":"text"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <HaMode>slave</HaMode>\n    <HaPrefered>0</HaPrefered>\n    <Partner>IP address would appear here</Partner>\n    <Port>8444</Port>\n    <HealthCheckAllInterfaces>unset</HealthCheckAllInterfaces>\n</response>"}],"_postman_id":"317aa664-7fc7-4cae-b1ca-5db2f35efa05"},{"name":"Set the AWS HA Mode","id":"78a80a32-1f67-4701-8eb7-320dce94e965","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertCloudIPAddress/access/awshamode?hamode=second","description":"<p>You can set the AWS HA mode by using the <strong>awshamode</strong> command.</p>\n<p>Valid values for the <strong>hamode</strong> parameter are:</p>\n<p>*   <strong>first</strong>\n*   <strong>second</strong>\n*   <strong>single</strong></p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","awshamode"],"host":["InsertCloudIPAddress"],"query":[{"key":"hamode","value":"second"}],"variable":[]}},"response":[{"id":"14dba850-4280-481e-aefa-2b32e37dab6d","name":"Set the AWS HA Mode","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertCloudIPAddress/access/awshamode?hamode=second","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertCloudIPAddress"],"path":["access","awshamode"],"query":[{"key":"hamode","value":"second"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 30 Sep 2022 10:28:57 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/xml","description":"","type":"text"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<response stat=\"200\">\n    <message>Command completed ok</message>\n    <status>ok</status>\n</response>"}],"_postman_id":"78a80a32-1f67-4701-8eb7-320dce94e965"},{"name":"Set the AWS HA Parameters","id":"4673f1c9-d9b6-4a41-b836-6c97ab18c401","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertCloudIPAddress/access/awshaparam?hcp=8444","description":"<p>You can set the AWS HA parameters by using the <strong>awshaparam</strong> command.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Range</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>partner</p></td><td><p>S</p></td><td><p>Must be a valid IP address</p></td><td><p>Specify the host name or IP address of the HA partner unit.</p></td></tr><tr><td><p>hcp</p></td><td><p>I</p></td><td><p>Must be a valid port value</p></td><td><p>Set the port over which the health check will be run. The port must be the same on both the active and standby unit for HA to function correctly.</p></td></tr><tr><td><p>haprefered</p></td><td><p>B</p></td><td><p>0 – No Preferred Host</p><p>1 – Prefer First</p></td><td><p>There are two possible values to set:</p><p>0 - No Preferred Host: Each unit takes over when the other unit fails. No switchover is performed when the partner is restarted.</p><p>1 - Prefer First: The HA1 (active) unit always takes over. This is the default option.</p></td></tr><tr><td>hcai</td><td>B</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>When this option is enabled, the health check listens on all interfaces. This is required when using a multi-arm configuration. If this is disabled, the health check listens on the primary eth0 address (this is the default behavior).</td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","awshaparam"],"host":["InsertCloudIPAddress"],"query":[{"key":"hcp","value":"8444"}],"variable":[]}},"response":[{"id":"98fd29e4-7a78-46e7-9161-a3c96e8ff787","name":"Set the AWS HA Parameters","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertCloudIPAddress/access/awshaparam?hcp=8444","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertCloudIPAddress"],"path":["access","awshaparam"],"query":[{"key":"hcp","value":"8444"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 30 Sep 2022 10:25:51 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/xml","description":"","type":"text"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<response stat=\"200\">\n    <message>Command completed ok</message>\n    <status>ok</status>\n</response>"}],"_postman_id":"4673f1c9-d9b6-4a41-b836-6c97ab18c401"}],"id":"c52f7013-c751-4a2c-baa5-6131496de5a3","description":"<p>These commands are only relevant to LoadMasters running in AWS.</p>\n","_postman_id":"c52f7013-c751-4a2c-baa5-6131496de5a3"}],"id":"32d1dc3a-5303-422d-a0fb-bda5fadf684d","description":"<p>Refer to the following sections for details on the cloud HA parameters.</p>\n","_postman_id":"32d1dc3a-5303-422d-a0fb-bda5fadf684d"},{"name":"QoS/Limiting","item":[{"name":"QOS/Limiting Commands","item":[{"name":"Example Get Command","id":"086b7d79-f720-48b7-9a5b-8f72a12f98aa","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=MaxConnsLimit","description":"<p>To get the <strong>MaxConnsLimit</strong> parameter value, run the <strong>get</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","get"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"MaxConnsLimit"}],"variable":[]}},"response":[{"id":"3df404a6-61ba-454f-accf-222cecccb986","name":"Example Get Command","originalRequest":{"method":"POST","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=MaxConnsLimit","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","get"],"query":[{"key":"param","value":"MaxConnsLimit"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 05 Aug 2024 09:19:00 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <MaxConnsLimit>0</MaxConnsLimit>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"086b7d79-f720-48b7-9a5b-8f72a12f98aa"},{"name":"Example Set Command","id":"923c3901-0382-482a-a10f-3fada756b1c2","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=MaxConnsLimit&value=80000","description":"<p>To set the <strong>MaxConnsLimit</strong> parameter value, run the <strong>set</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","set"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"MaxConnsLimit"},{"key":"value","value":"80000"}],"variable":[]}},"response":[{"id":"fafea4c6-241d-4437-ae5f-6fdb3d27d212","name":"Example Set Command","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=MaxConnsLimit&value=80000","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","set"],"query":[{"key":"param","value":"MaxConnsLimit"},{"key":"value","value":"80000"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 05 Aug 2024 09:20:03 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"923c3901-0382-482a-a10f-3fada756b1c2"}],"id":"295a2ce2-1242-4297-b540-bb1cec39f323","description":"<p>The sections below provide an example <strong>get</strong> and example <strong>set</strong> command. You can use these commands to retrieve and configure the parameters mentioned in the previous section.</p>\n","_postman_id":"295a2ce2-1242-4297-b540-bb1cec39f323"},{"name":"Maximum Client Concurrent Connection Limit","item":[{"name":"List the Client Concurrent Connection Limits","id":"58453511-8df0-4d0a-afa6-d6a83645d2e1","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientmaxclimitlist","description":"<p>To list the existing client concurrent connection limits, run the <strong>clientmaxclimitlist</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","clientmaxclimitlist"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"bc069b8c-9b48-4055-8b2e-a165556fe564","name":"List the Client Concurrent Connection Limits","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientmaxclimitlist"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:12:20 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <ClientMaxcLimit>\n                <Address>IP address would appear here</Address>\n                <Mask>32</Mask>\n                <Limit>10</Limit>\n            </ClientMaxcLimit>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"58453511-8df0-4d0a-afa6-d6a83645d2e1"},{"name":"Add a New Client Concurrent Connection Limit","id":"ff47e721-a097-4724-b348-90ac0f6ae819","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientmaxclimitadd?l7addr=InsertVirtualServiceIPAddress&l7limit=10","description":"<p>To add a new client concurrent connection limit, run the <strong>clientmaxclimitadd</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","clientmaxclimitadd"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"},{"key":"l7limit","value":"10"}],"variable":[]}},"response":[{"id":"6eeaf27b-c049-459a-a5e7-203dbf002b12","name":"Add a New Client Concurrent Connection Limit","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientmaxclimitadd?l7addr=InsertVirtualServiceIPAddress&l7limit=10","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","clientmaxclimitadd"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"},{"key":"l7limit","value":"10"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:11:50 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"ff47e721-a097-4724-b348-90ac0f6ae819"},{"name":"Delete an Existing Client Concurrent Connection Limit","id":"832eb49a-1673-4845-ae39-ec0971398aee","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientmaxclimitdel?l7addr=InsertVirtualServiceIPAddress","description":"<p>To delete an existing client concurrent connection limit, run the <strong>clientmaxclimitdel</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","clientmaxclimitdel"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"}],"variable":[]}},"response":[{"id":"606fd0c9-c66a-4a14-ba6d-0feae8e321ee","name":"Delete an Existing Client Concurrent Connection Limit","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientmaxclimitdel?l7addr=InsertVirtualServiceIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","clientmaxclimitdel"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:15:33 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"832eb49a-1673-4845-ae39-ec0971398aee"}],"id":"43e0986d-1a07-47b1-9cdb-68d0013d44de","description":"<p>This section provides commands relating to the maximum client concurrent connection limit.</p>\n","_postman_id":"43e0986d-1a07-47b1-9cdb-68d0013d44de"},{"name":"Client CPS Limit","item":[{"name":"List the Existing Connections Per Second (CPS) Limits","id":"e8249910-9770-4c09-84f6-159fcd4a1721","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientcpslimitlist","description":"<p>To list the existing Connections Per Second (CPS) limits, run the <strong>clientcpslimitlist</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","clientcpslimitlist"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"46025e62-5a67-415d-bb2d-cb7501e37538","name":"List the Existing Connections Per Second (CPS) Limits","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientcpslimitlist"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:17:50 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <ClientCpsLimit>\n                <Address>IP address would appear here</Address>\n                <Mask>32</Mask>\n                <Limit>12</Limit>\n            </ClientCpsLimit>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"e8249910-9770-4c09-84f6-159fcd4a1721"},{"name":"Add a New CPS limit","id":"a3046d6a-2cab-4162-a211-ddc17afae873","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientcpslimitadd?l7addr=InsertVirtualServiceIPAddress&l7limit=12","description":"<p>To add a new CPS limit, run the <strong>clientcpslimitadd</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","clientcpslimitadd"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"},{"key":"l7limit","value":"12"}],"variable":[]}},"response":[{"id":"4c94aa44-57b3-4b09-bdec-bf5a1b3cde63","name":"Add a New CPS limit","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientcpslimitadd?l7addr=InsertVirtualServiceIPAddress&l7limit=12","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","clientcpslimitadd"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"},{"key":"l7limit","value":"12"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:17:10 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"a3046d6a-2cab-4162-a211-ddc17afae873"},{"name":"Delete an Existing CPS Limit","id":"dd5144ac-39b3-467c-bd77-39b29c1a1a4e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientcpslimitdel?l7addr=InsertVirtualServiceIPAddress","description":"<p>To delete an existing CPS limit, run the <strong>clientcpslimitdel</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","clientcpslimitdel"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"}],"variable":[]}},"response":[{"id":"efb3c085-cf58-406c-9c37-e14d3a3a3efc","name":"Delete an Existing CPS Limit","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientcpslimitdel?l7addr=InsertVirtualServiceIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","clientcpslimitdel"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:19:35 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"dd5144ac-39b3-467c-bd77-39b29c1a1a4e"}],"id":"0082caab-a687-4938-abff-ae2cf96780f6","description":"<p>This section provides commands relating to the client CPS limit.</p>\n","_postman_id":"0082caab-a687-4938-abff-ae2cf96780f6"},{"name":"Legacy Client CPS Limit Commands","item":[{"name":"Limit the Maximum Number of Connection Attempts","id":"35195fbd-fb31-48bf-9ceb-b585a97bc791","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=l7limitinput&value=25","description":"<p>Client limiting can be used to limit the default maximum number of connection attempts (per second) from a specified host. The limit can be set using the <strong>set</strong> parameter.</p>\n<p>Setting the limit to zero disables the option.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","set"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"l7limitinput"},{"key":"value","value":"25"}],"variable":[]}},"response":[{"id":"7ec3890b-d722-46de-b15b-649f5a521168","name":"Limit the Maximum Number of Connection Attempts","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=l7limitinput&value=25","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","set"],"query":[{"key":"param","value":"l7limitinput"},{"key":"value","value":"25"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:26:07 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"35195fbd-fb31-48bf-9ceb-b585a97bc791"},{"name":"List the Addresses and their Limits","id":"6afb752a-9532-45e8-bad9-36304c43f27a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/afeclientlimitlist?=","description":"<p>To list the addresses and their limits, run the <strong>afeclientlimitlist</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","afeclientlimitlist"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"","value":""}],"variable":[]}},"response":[{"id":"ce300bc4-8452-4073-a28b-4e5450118235","name":"List the Addresses and their Limits","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/afeclientlimitlist?","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","afeclientlimitlist"],"query":[{"key":"","value":null}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:28:11 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <ClientCpsLimit>\n                <Address>IP address would appear here</Address>\n                <Mask>32</Mask>\n                <Limit>14</Limit>\n            </ClientCpsLimit>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"6afb752a-9532-45e8-bad9-36304c43f27a"},{"name":"Add an Address and its Limit","id":"63ede42b-f60b-4d41-bc0f-562c11a8f42c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/afeclientlimitadd?l7addr=InsertVirtualServiceIPAddress&l7limit=14","description":"<p>A number of addresses or networks can be specified to be limited. To add an address, run the <strong>afeclientlimitadd</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","afeclientlimitadd"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"},{"key":"l7limit","value":"14"}],"variable":[]}},"response":[{"id":"b3973467-ea9d-4227-96da-c67462f2e24f","name":"Add an Address and its Limit","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/afeclientlimitadd?l7addr=InsertVirtualServiceIPAddress&l7limit=14","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","afeclientlimitadd"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"},{"key":"l7limit","value":"14"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:27:39 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"63ede42b-f60b-4d41-bc0f-562c11a8f42c"},{"name":"Delete an Address","id":"70f0a46c-aa9d-4ac7-8bb7-601accd9b6e6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/afeclientlimitdel?l7addr=InsertVirtualServiceIPAddress","description":"<p>To delete an address, run the <strong>afeclientlimitdel</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","afeclientlimitdel"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"}],"variable":[]}},"response":[{"id":"f2c2e16f-9608-416d-addc-e5bcdc7e8cf6","name":"Delete an Address","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/afeclientlimitdel?l7addr=InsertVirtualServiceIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","afeclientlimitdel"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:29:55 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"70f0a46c-aa9d-4ac7-8bb7-601accd9b6e6"}],"id":"9914881a-196d-49c7-8a22-56a4278c31a9","description":"<p>Before the rate limiting functionality was improved in LoadMaster version 7.2.52, you could run the following commands relating to client CPS limits.</p>\n<blockquote>\n<p>Although these commands still work - we recommend using the new commands outlined in the <strong>Client CPS Limit</strong> section above.</p>\n</blockquote>\n","_postman_id":"9914881a-196d-49c7-8a22-56a4278c31a9"},{"name":"Client RPS Limit","item":[{"name":"List the Existing RPS Limits","id":"a7b9a025-6fc7-4a02-8ab5-b8ea32647ead","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientrpslimitlist","description":"<p>To list the existing RPS limits, run the <strong>clientrpslimitlist</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","clientrpslimitlist"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"7aaad279-29ac-4b82-9efb-2b34ded1f220","name":"List the Existing RPS Limits","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientrpslimitlist"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:36:53 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <ClientRpsLimit>\n                <Address>IP address would appear here</Address>\n                <Mask>32</Mask>\n                <Limit>16</Limit>\n            </ClientRpsLimit>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"a7b9a025-6fc7-4a02-8ab5-b8ea32647ead"},{"name":"Add a New RPS Limit","id":"1c9e1363-6f00-4a2a-8e0d-e2d61713cd35","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientrpslimitadd?l7addr=InsertVirtualServiceIPAddress&l7limit=16","description":"<p>To add a new RPS limit, run the <strong>clientrpslimitadd</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","clientrpslimitadd"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"},{"key":"l7limit","value":"16"}],"variable":[]}},"response":[{"id":"84a7cdef-859f-48c0-859e-0f2d7d50ee8b","name":"Add a New RPS Limit","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientrpslimitadd?l7addr=InsertVirtualServiceIPAddress&l7limit=16","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","clientrpslimitadd"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"},{"key":"l7limit","value":"16"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:36:15 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"1c9e1363-6f00-4a2a-8e0d-e2d61713cd35"},{"name":"Delete an Existing RPS Limit","id":"ee62fbc5-65bb-4375-9060-9bb212955dad","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientrpslimitdel?l7addr=InsertVirtualServiceIPAddress","description":"<p>To delete an existing RPS limit, run the <strong>clientrpslimitdel</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","clientrpslimitdel"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"}],"variable":[]}},"response":[{"id":"556df0ee-af3d-4f80-b075-d1f4215938d7","name":"Delete an Existing RPS Limit","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientrpslimitdel?l7addr=InsertVirtualServiceIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","clientrpslimitdel"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:38:12 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"ee62fbc5-65bb-4375-9060-9bb212955dad"}],"id":"21be3dba-b259-474f-ac43-cbf2bdab0885","description":"<p>This section provides commands relating to the client RPS limit.</p>\n","_postman_id":"21be3dba-b259-474f-ac43-cbf2bdab0885"},{"name":"Client Bandwidth Limit","item":[{"name":"List the Existing Client Bandwidth Limits","id":"e4e8f99e-9014-401b-8ead-a2affbef610c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientbandwidthlimitlist","description":"<p>To list the existing client bandwidth limits, run the <strong>clientbandwidthlimitlist</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","clientbandwidthlimitlist"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"31333189-b234-45ea-8e6c-c9c1a53e414c","name":"List the Existing Client Bandwidth Limits","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientbandwidthlimitlist"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:45:46 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <ClientBandwidthLimit>\n                <Address>IP address would appear here</Address>\n                <Mask>32</Mask>\n                <Limit>18</Limit>\n            </ClientBandwidthLimit>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"e4e8f99e-9014-401b-8ead-a2affbef610c"},{"name":"Add a New Client Bandwidth Limit","id":"045a2d3f-ea6b-4f02-b820-e5d228058fdc","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientbandwidthlimitadd?l7addr=InsertVirtualServiceIPAddress&l7limit=18","description":"<p>To add a new client bandwidth limit, run the <strong>clientbandwidthlimitadd</strong> command.</p>\n<blockquote>\n<p>The global client maximum bandwidth limit (<strong>ClientMaxBandwidthLimit</strong>) must be set before you add a specific client bandwidth limit.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","clientbandwidthlimitadd"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"},{"key":"l7limit","value":"18"}],"variable":[]}},"response":[{"id":"e31bbe71-65ea-4c8f-8cee-e16e8ceacf60","name":"Add a New Client Bandwidth Limit","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientbandwidthlimitadd?l7addr=InsertVirtualServiceIPAddress&l7limit=18","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","clientbandwidthlimitadd"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"},{"key":"l7limit","value":"18"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:41:06 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"045a2d3f-ea6b-4f02-b820-e5d228058fdc"},{"name":"Delete an Existing Client Bandwidth Limit","id":"1bc40526-0293-4d07-acf0-0e313ab1418d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientbandwidthlimitdel?l7addr=InsertVirtualServiceIPAddress","description":"<p>To delete an existing client bandwidth limit, run the <strong>clientbandwidthlimitdel</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","clientbandwidthlimitdel"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"}],"variable":[]}},"response":[{"id":"064d5539-0447-4b59-b4dd-87ce58646cfb","name":"Delete an Existing Client Bandwidth Limit","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/clientbandwidthlimitdel?l7addr=InsertVirtualServiceIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","clientbandwidthlimitdel"],"query":[{"key":"l7addr","value":"InsertVirtualServiceIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:47:25 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"1bc40526-0293-4d07-acf0-0e313ab1418d"}],"id":"a57659da-9430-4013-89cb-97b6fa29f784","description":"<p>This section provides commands relating to the client bandwidth limit.</p>\n","_postman_id":"a57659da-9430-4013-89cb-97b6fa29f784"},{"name":"Per-Virtual Service Limits","item":[{"name":"Add a New Virtual Service with Limits","id":"d4d2ca96-ee6b-430b-8644-e8f959080ddc","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addvs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&ConnsPerSecLimit=10&RequestsPerSecLimit=10&MaxConnsLimit=50&bandwidth=17","description":"<p>To add a new Virtual Service with limits, run the <strong>addvs</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"ConnsPerSecLimit","value":"10"},{"key":"RequestsPerSecLimit","value":"10"},{"key":"MaxConnsLimit","value":"50"},{"key":"bandwidth","value":"17"}],"variable":[]}},"response":[{"id":"3f38972b-723a-4e50-a8e7-41ab935d9f82","name":"Add a New Virtual Service with Limits","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addvs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&ConnsPerSecLimit=10&RequestsPerSecLimit=10&MaxConnsLimit=50&bandwidth=17","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addvs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"ConnsPerSecLimit","value":"10"},{"key":"RequestsPerSecLimit","value":"10"},{"key":"MaxConnsLimit","value":"50"},{"key":"bandwidth","value":"17"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 05:55:45 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>3</Index>\n            <VSAddress>IP address would appear here</VSAddress>\n            <VSPort>80</VSPort>\n            <Layer>7</Layer>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>0</InterceptMode>\n            <Intercept>N</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditrelevant</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>0</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>0</ExecutingParanoia>\n            <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n            <PCRELimit>0</PCRELimit>\n            <JSONDLimit>0</JSONDLimit>\n            <BodyLimit>0</BodyLimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>N</Transparent>\n            <SubnetOriginating>Y</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <SameSite>0</SameSite>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>0</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>rr</Schedule>\n            <CheckType>http</CheckType>\n            <PersistTimeout>0</PersistTimeout>\n            <CheckPort>0</CheckPort>\n            <HTTPReschedule>N</HTTPReschedule>\n            <NRules>0</NRules>\n            <NRequestRules>0</NRequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>0</MasterVS>\n            <MasterVSID>0</MasterVSID>\n            <IsTransparent>2</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>0</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <AdaptivePort>0</AdaptivePort>\n            <AdaptiveInterval>0</AdaptiveInterval>\n            <AdaptiveMinPercent>0</AdaptiveMinPercent>\n            <Bandwidth>17</Bandwidth>\n            <ConnsPerSecLimit>10</ConnsPerSecLimit>\n            <RequestsPerSecLimit>10</RequestsPerSecLimit>\n            <MaxConnsLimit>50</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <ResponseStatusRemap>N</ResponseStatusRemap>\n            <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n            <EnhancedHealthChecks>N</EnhancedHealthChecks>\n            <RsMinimum>0</RsMinimum>\n            <NumberOfRSs>0</NumberOfRSs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"d4d2ca96-ee6b-430b-8644-e8f959080ddc"},{"name":"Modify the Limits for an Existing Virtual Service","id":"0094db93-cf3c-4a29-b969-b568ee64edb7","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&ConnsPerSecLimit=10&RequestsPerSecLimit=10&MaxConnsLimit=40&bandwidth=17","description":"<p>To modify the limits for an existing Virtual Service, run the <strong>modvs</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"ConnsPerSecLimit","value":"10"},{"key":"RequestsPerSecLimit","value":"10"},{"key":"MaxConnsLimit","value":"40"},{"key":"bandwidth","value":"17"}],"variable":[]}},"response":[{"id":"a5d4ebc9-52fc-487b-a21e-c7627a2afffb","name":"Modify the Limits for an Existing Virtual Service","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=InsertVirtualServiceIPAddress&port=80&prot=tcp&ConnsPerSecLimit=10&RequestsPerSecLimit=10&MaxConnsLimit=40&bandwidth=17","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modvs"],"query":[{"key":"vs","value":"InsertVirtualServiceIPAddress"},{"key":"port","value":"80"},{"key":"prot","value":"tcp"},{"key":"ConnsPerSecLimit","value":"10"},{"key":"RequestsPerSecLimit","value":"10"},{"key":"MaxConnsLimit","value":"40"},{"key":"bandwidth","value":"17"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 06:02:15 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>3</Index>\n            <VSAddress>IP address would appear here</VSAddress>\n            <VSPort>80</VSPort>\n            <Layer>7</Layer>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>0</InterceptMode>\n            <Intercept>N</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditrelevant</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>0</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>0</ExecutingParanoia>\n            <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n            <PCRELimit>0</PCRELimit>\n            <JSONDLimit>0</JSONDLimit>\n            <BodyLimit>0</BodyLimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>N</Transparent>\n            <SubnetOriginating>Y</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <SameSite>0</SameSite>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>0</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>rr</Schedule>\n            <CheckType>http</CheckType>\n            <PersistTimeout>0</PersistTimeout>\n            <CheckPort>0</CheckPort>\n            <HTTPReschedule>N</HTTPReschedule>\n            <NRules>0</NRules>\n            <NRequestRules>0</NRequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>0</MasterVS>\n            <MasterVSID>0</MasterVSID>\n            <IsTransparent>2</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>0</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <AdaptivePort>0</AdaptivePort>\n            <AdaptiveInterval>0</AdaptiveInterval>\n            <AdaptiveMinPercent>0</AdaptiveMinPercent>\n            <Bandwidth>17</Bandwidth>\n            <ConnsPerSecLimit>10</ConnsPerSecLimit>\n            <RequestsPerSecLimit>10</RequestsPerSecLimit>\n            <MaxConnsLimit>40</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <ResponseStatusRemap>N</ResponseStatusRemap>\n            <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n            <EnhancedHealthChecks>N</EnhancedHealthChecks>\n            <RsMinimum>0</RsMinimum>\n            <NumberOfRSs>0</NumberOfRSs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"0094db93-cf3c-4a29-b969-b568ee64edb7"},{"name":"Modify the Limits for an Existing SubVS","id":"cf8df952-82f5-42a1-aa36-fc2bde7949da","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=3&ConnsPerSecLimit=10&RequestsPerSecLimit=10&MaxConnsLimit=40&bandwidth=17","description":"<p>To modify the limits for an existing SubVS, run the <strong>modvs</strong> command.</p>\n<p>You can retrieve the SubVS <strong>Index</strong> by running the <strong>listvs</strong> command or by checking the <strong>Id</strong> at the top of the SubVS modify screen.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modvs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"vs","value":"3"},{"key":"ConnsPerSecLimit","value":"10"},{"key":"RequestsPerSecLimit","value":"10"},{"key":"MaxConnsLimit","value":"40"},{"key":"bandwidth","value":"17"}],"variable":[]}},"response":[{"id":"be680f7a-f0bb-4611-b7c8-f43e7a9f1cf6","name":"Modify the Limits for an Existing SubVS","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modvs?vs=3&ConnsPerSecLimit=10&RequestsPerSecLimit=10&MaxConnsLimit=40&bandwidth=17","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modvs"],"query":[{"key":"vs","value":"3"},{"key":"ConnsPerSecLimit","value":"10"},{"key":"RequestsPerSecLimit","value":"10"},{"key":"MaxConnsLimit","value":"40"},{"key":"bandwidth","value":"17"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 06:04:52 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Status>Down</Status>\n            <Index>3</Index>\n            <VSAddress>IP address would appear here</VSAddress>\n            <VSPort>80</VSPort>\n            <Layer>7</Layer>\n            <Enable>Y</Enable>\n            <SSLReverse>N</SSLReverse>\n            <SSLReencrypt>N</SSLReencrypt>\n            <InterceptMode>0</InterceptMode>\n            <Intercept>N</Intercept>\n            <InterceptOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditrelevant</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </InterceptOpts>\n            <AlertThreshold>0</AlertThreshold>\n            <OwaspOpts>\n                <Opt>opnormal</Opt>\n                <Opt>auditnone</Opt>\n                <Opt>reqdatadisable</Opt>\n                <Opt>resdatadisable</Opt>\n            </OwaspOpts>\n            <BlockingParanoia>0</BlockingParanoia>\n            <IPReputationBlocking>N</IPReputationBlocking>\n            <ExecutingParanoia>0</ExecutingParanoia>\n            <AnomalyScoringThreshold>0</AnomalyScoringThreshold>\n            <PCRELimit>0</PCRELimit>\n            <JSONDLimit>0</JSONDLimit>\n            <BodyLimit>0</BodyLimit>\n            <Transactionlimit>0</Transactionlimit>\n            <Transparent>N</Transparent>\n            <SubnetOriginating>Y</SubnetOriginating>\n            <ServerInit>0</ServerInit>\n            <StartTLSMode>0</StartTLSMode>\n            <Idletime>660</Idletime>\n            <Cache>N</Cache>\n            <Compress>N</Compress>\n            <Verify>0</Verify>\n            <UseforSnat>N</UseforSnat>\n            <ForceL4>N</ForceL4>\n            <ForceL7>Y</ForceL7>\n            <MultiConnect>N</MultiConnect>\n            <ClientCert>0</ClientCert>\n            <SecurityHeaderOptions>0</SecurityHeaderOptions>\n            <SameSite>0</SameSite>\n            <VerifyBearer>N</VerifyBearer>\n            <ErrorCode>0</ErrorCode>\n            <CheckUse1.1>N</CheckUse1.1>\n            <MatchLen>0</MatchLen>\n            <CheckUseGet>0</CheckUseGet>\n            <SSLRewrite>0</SSLRewrite>\n            <VStype>http</VStype>\n            <FollowVSID>0</FollowVSID>\n            <Protocol>tcp</Protocol>\n            <Schedule>rr</Schedule>\n            <CheckType>http</CheckType>\n            <PersistTimeout>0</PersistTimeout>\n            <CheckPort>0</CheckPort>\n            <HTTPReschedule>N</HTTPReschedule>\n            <NRules>0</NRules>\n            <NRequestRules>0</NRequestRules>\n            <NResponseRules>0</NResponseRules>\n            <NMatchBodyRules>0</NMatchBodyRules>\n            <NPreProcessRules>0</NPreProcessRules>\n            <EspEnabled>N</EspEnabled>\n            <InputAuthMode>0</InputAuthMode>\n            <OutputAuthMode>0</OutputAuthMode>\n            <MasterVS>0</MasterVS>\n            <MasterVSID>0</MasterVSID>\n            <IsTransparent>2</IsTransparent>\n            <AddVia>0</AddVia>\n            <QoS>0</QoS>\n            <TlsType>0</TlsType>\n            <NeedHostName>N</NeedHostName>\n            <OCSPVerify>N</OCSPVerify>\n            <AllowHTTP2>N</AllowHTTP2>\n            <PassCipher>N</PassCipher>\n            <PassSni>N</PassSni>\n            <ChkInterval>0</ChkInterval>\n            <ChkTimeout>0</ChkTimeout>\n            <ChkRetryCount>0</ChkRetryCount>\n            <AdaptivePort>0</AdaptivePort>\n            <AdaptiveInterval>0</AdaptiveInterval>\n            <AdaptiveMinPercent>0</AdaptiveMinPercent>\n            <Bandwidth>17</Bandwidth>\n            <ConnsPerSecLimit>10</ConnsPerSecLimit>\n            <RequestsPerSecLimit>10</RequestsPerSecLimit>\n            <MaxConnsLimit>40</MaxConnsLimit>\n            <RefreshPersist>N</RefreshPersist>\n            <ResponseStatusRemap>N</ResponseStatusRemap>\n            <ResponseRemapMsgFormat>0</ResponseRemapMsgFormat>\n            <EnhancedHealthChecks>N</EnhancedHealthChecks>\n            <RsMinimum>0</RsMinimum>\n            <NumberOfRSs>0</NumberOfRSs>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"cf8df952-82f5-42a1-aa36-fc2bde7949da"}],"id":"d3c1737d-4572-4bc6-ae9f-6f32d37ff8a2","description":"<p>This section provides commands relating to the per-Virtual Service limits.</p>\n","_postman_id":"d3c1737d-4572-4bc6-ae9f-6f32d37ff8a2"},{"name":"URL-Based Limiting Rules","item":[{"name":"List the Existing URL-Based Limiting Rules","id":"f3f82f50-4c9a-4ab2-bea0-57b5840fe8ed","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listlimitrules","description":"<p>You can list the existing URL-based limiting rules by running the <strong>listlimitrules</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listlimitrules"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"2e2fd24a-917d-4e17-a504-d894fb5efc96","name":"List the Existing URL-Based Limiting Rules","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listlimitrules"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 06:09:12 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <limits>\n                <name>ExampleRule</name>\n                <position>1</position>\n                <type>0</type>\n                <limit>5</limit>\n                <pattern>/test/a.html</pattern>\n            </limits>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"f3f82f50-4c9a-4ab2-bea0-57b5840fe8ed"},{"name":"Add a New URL-Based Limiting Rule","id":"1469acec-30ce-4b10-aaa4-3546d15aa440","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addlimitrule?name=ExampleRule&pattern=/test/a.html&limit=5&match=0","description":"<p>You can add a new URL-based limiting rule by running the <strong>addlimitrule</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addlimitrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"ExampleRule"},{"key":"pattern","value":"/test/a.html"},{"key":"limit","value":"5"},{"key":"match","value":"0"}],"variable":[]}},"response":[{"id":"93657cd9-4df5-4dca-a0ec-f64e0660e8db","name":"Add a New URL-Based Limiting Rule","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addlimitrule?name=ExampleRule&pattern=/test/a.html&limit=5&match=0","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","addlimitrule"],"query":[{"key":"name","value":"ExampleRule"},{"key":"pattern","value":"/test/a.html"},{"key":"limit","value":"5"},{"key":"match","value":"0"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 06:08:30 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"1469acec-30ce-4b10-aaa4-3546d15aa440"},{"name":"Modify an Existing URL-Based Limiting Rule","id":"25914fb0-d5d5-49e7-b628-02da53b3d480","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modlimitrule?name=ExampleRule&pattern=/test/b.html&limit=5&match=0","description":"<p>You can modify an existing URL-based limiting rule by running the <strong>modlimitrule</strong> command.</p>\n<p>Valid values for the match parameter are as follows:</p>\n<ul>\n<li>0 - Request</li>\n<li>1 - Host</li>\n<li>2 - User Agent</li>\n<li>64 - !Request</li>\n<li>65 - !Host</li>\n<li>66 - !UserAgent</li>\n</ul>\n<blockquote>\n<p>The values with an exclamation mark (<strong>!</strong>) before them matches the inverse, for example, not a specific request or not a specific user agent.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modlimitrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"ExampleRule"},{"key":"pattern","value":"/test/b.html"},{"key":"limit","value":"5"},{"key":"match","value":"0"}],"variable":[]}},"response":[{"id":"aa068e98-46af-4678-a2e2-6ba9ff77f90a","name":"Modify an Existing URL-Based Limiting Rule","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modlimitrule?name=ExampleRule&pattern=/test/b.html&limit=5&match=0","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modlimitrule"],"query":[{"key":"name","value":"ExampleRule"},{"key":"pattern","value":"/test/b.html"},{"key":"limit","value":"5"},{"key":"match","value":"0"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 06:10:31 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"25914fb0-d5d5-49e7-b628-02da53b3d480"},{"name":"Delete an Existing URL-Based Limiting Rule","id":"2b22a835-8ab3-4aa6-84a7-09ef35d3620c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/dellimitrule?name=ExampleRule","description":"<p>You can delete an existing URL-based limiting rule by running the <strong>dellimitrule</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","dellimitrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"ExampleRule"}],"variable":[]}},"response":[{"id":"18fa5f51-9f81-4c40-a36e-9f4237f92bf1","name":"Delete an Existing URL-Based Limiting Rule","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/dellimitrule?name=ExampleRule","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","dellimitrule"],"query":[{"key":"name","value":"ExampleRule"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 06:11:29 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"2b22a835-8ab3-4aa6-84a7-09ef35d3620c"},{"name":"Move the Position of an Existing URL-Based Limiting Rule","id":"11e1f08a-a787-427d-ac91-e2615e45706e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/movelimitrule?name=ExampleRule&position=1","description":"<p>You can move the position of an existing URL-based limiting rule by running the <strong>movelimitrule</strong> command.</p>\n<p>Setting the <strong>position</strong> parameter to a value larger than the size of the list will move the rule to the end of the list.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","movelimitrule"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"ExampleRule"},{"key":"position","value":"1"}],"variable":[]}},"response":[{"id":"3726be88-67a6-48e0-97e6-35ace883f5e3","name":"Move the Position of an Existing URL-Based Limiting Rule","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/movelimitrule?name=ExampleRule&position=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","movelimitrule"],"query":[{"key":"name","value":"ExampleRule"},{"key":"position","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 06:12:38 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"11e1f08a-a787-427d-ac91-e2615e45706e"}],"id":"392cbe89-14d0-4990-99e5-346f8b1568e4","description":"<p>This section provides commands relating to URL-based limiting rules.</p>\n","_postman_id":"392cbe89-14d0-4990-99e5-346f8b1568e4"}],"id":"ec2d2b1a-0726-4e95-bda7-ff93e011c41c","description":"<p>This section contains details about the QoS/Limiting API commands and parameters. You can retrieve or configure each of these parameters using the <strong>get</strong> or <strong>set</strong> RESTful API commands. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details about the <strong>get</strong> and <strong>set</strong> commands.</p>\n<p>The following limiting parameters can be retrieved or configured using the get or set commands:</p>\n<ul>\n<li><p><strong>MaxConnsLimit:</strong> The maximum number of simultaneous connections (TCP and UDP).</p>\n</li>\n<li><p><strong>MaxCPSLimit:</strong> The global connection limit (per second).</p>\n</li>\n<li><p><strong>MaxRPSLimit:</strong> The global request limit (per second).</p>\n</li>\n<li><p><strong>MaxBandwidthLimit:</strong> The global bandwidth limit (kilobits per second)</p>\n</li>\n<li><p><strong>SendRateLimitError:</strong> This parameter accepts the following values:</p>\n<ul>\n<li>0 - no error response (the connection is simply dropped)</li>\n<li>1 - <strong>Send 429 Too Many Requests</strong> error response</li>\n<li>2 - <strong>Send 503 Service Unavailable</strong> error response</li>\n</ul>\n</li>\n<li><p><strong>RateLimitFail:</strong> Fail on rate limit. This parameter accepts the following values:</p>\n<ul>\n<li>0 - disabled the LoadMasterttempts to select a different RS or SubVS to use for the connection)</li>\n<li>1 - enabled (forces an error)</li>\n</ul>\n</li>\n<li><p><strong>LimitLogging:</strong> Generate a summary log entry every 5 seconds. This parameter accepts the following values:</p>\n<ul>\n<li>0 - disabled</li>\n<li>1 - enabled</li>\n</ul>\n</li>\n<li><p><strong>ClientRepeatDelay:</strong> Set the minimum time after a client is no longer limited before a new message is generated. If a client generates a message and continues to be blocked for continuously hitting the limit, no new message is generated. Only if the client goes quiet for the delay period will a new message be generated. Valid values range from 10 - 86400 seconds.</p>\n</li>\n<li><p><strong>ClientMaxConnsLimit:</strong> This limits the default maximum number of concurrent connection attempts (per second) from a specific host. Setting the limit to 0 disables this option. Valid values range from 0 - 1000000.</p>\n</li>\n<li><p><strong>ClientCPSLimit:</strong> The global client connection limit.</p>\n</li>\n<li><p><strong>ClientRPSLimit:</strong> The global client request limit.</p>\n</li>\n<li><p><strong>ClientMaxBandwidthLimit:</strong> The global client maximum bandwidth limit.</p>\n</li>\n</ul>\n","_postman_id":"ec2d2b1a-0726-4e95-bda7-ff93e011c41c"},{"name":"System Administration","item":[{"name":"User Management","item":[{"name":"List All Local Users","id":"56396f4b-efe1-46aa-9833-b5d0119334c9","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/userlist","description":"<p>To list all local users and their permissions, run the <strong>userlist</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","userlist"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"9208cbe5-950d-4c65-9f26-3e543994565b","name":"List All Local Users","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/userlist"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 06:38:21 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <User>\n                <Name>bal01</Name>\n                <Perms>ReadOnly</Perms>\n            </User>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"56396f4b-efe1-46aa-9833-b5d0119334c9"},{"name":"Add a New Local User","id":"dacac643-93d1-4e2d-9136-c208f4d27fe4","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/useraddlocal?user=bal01&password=ExamplePassword","description":"<p>To add a new local user, run the <strong>useraddlocal</strong> command.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Description</b></p></td><td><p><b>Mandatory</b></p></td></tr><tr><td><p>user</p></td><td><p>String</p></td><td><p>The username of the new user.</p></td><td><p>Yes</p></td></tr><tr><td><p>password</p></td><td><p>String</p></td><td><p>The password of the new user.</p></td><td><p>Yes – unless <b>nopass</b> or <b>radius</b> is set to yes.</p></td></tr><tr><td><p>radius</p></td><td><p>Boolean</p></td><td><p>Determines whether the user will use RADIUS server authentication or not when logging in to the LoadMaster. The RADIUS server details must be set up before this option can be enabled.</p></td><td><p>No</p></td></tr><tr><td><p>nopass</p></td><td><p>Boolean</p></td><td><p>This option is only valid if session management is enabled. Set this option to yes to create a user with no password. This can be used to allow certificate-based access. For further information, please refer to the <b>Local Certificate Management</b> section.</p></td><td><p>No</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","useraddlocal"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"user","value":"bal01"},{"key":"password","value":"ExamplePassword"}],"variable":[]}},"response":[{"id":"007d6822-5a25-401c-a8d1-b545cbf6e3d0","name":"Add a New Local User","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/useraddlocal?user=bal01&password=ExamplePassword","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","useraddlocal"],"query":[{"key":"user","value":"bal01"},{"key":"password","value":"ExamplePassword"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 06:37:03 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"dacac643-93d1-4e2d-9136-c208f4d27fe4"},{"name":"Change the Password of a Local User","id":"b6d111eb-d694-41a2-ab6d-3026d805f0b9","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/userchangelocpass?user=bal01&password=InsertPassword&radius=0","description":"<p>To change the password of a local user, run the <strong>userchangelocpass</strong> command.</p>\n<blockquote>\n<p>The username is case sensitive - ensure to enter the username exactly as it has been set.</p>\n</blockquote>\n<p>All parameters are required. The <strong>radius</strong> parameter determines whether the user will use RADIUS server authentication or not when logging in to the LoadMaster. The RADIUS server details must be set up before this option can be used.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","userchangelocpass"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"user","value":"bal01"},{"key":"password","value":"InsertPassword"},{"key":"radius","value":"0"}],"variable":[]}},"response":[{"id":"8ecc4954-711c-4c21-ab8e-3fd2dc0471d0","name":"Change the Password of a Local User","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/userchangelocpass?user=bal01&password=InsertPassword&radius=0","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","userchangelocpass"],"query":[{"key":"user","value":"bal01"},{"key":"password","value":"InsertPassword"},{"key":"radius","value":"0"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 06:42:00 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"b6d111eb-d694-41a2-ab6d-3026d805f0b9"},{"name":"Change the System Password","id":"13cebbd5-69db-4a1c-9fbc-10551ab05b3b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/usersetsyspassword?currpassword=InsertPassword&password=InsertNewPassword","description":"<p>To change the password of the default <strong>bal</strong> user, run the <strong>usersetsyspassword</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","usersetsyspassword"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"currpassword","value":"InsertPassword"},{"key":"password","value":"InsertNewPassword"}],"variable":[]}},"response":[{"id":"7abfa377-a834-450b-8f10-151fb3457a83","name":"Change the System Password","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/usersetsyspassword?currpassword=InsertPassword&password=InsertNewPassword","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","usersetsyspassword"],"query":[{"key":"currpassword","value":"InsertPassword"},{"key":"password","value":"InsertNewPassword"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 08:24:43 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Password Changed</Success>\n</Response>"}],"_postman_id":"13cebbd5-69db-4a1c-9fbc-10551ab05b3b"},{"name":"Set the Minimum Password Length","id":"bc87d490-93ed-4eb9-92df-20a866fbf457","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=minpassword&value=8","description":"<p>To set the minimum password length for local users, run the <strong>set</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","set"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"minpassword"},{"key":"value","value":"8"}],"variable":[]}},"response":[{"id":"cd28229c-42d3-4913-8d63-4427a2cbf375","name":"Set the Minimum Password Length","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=minpassword&value=8","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","set"],"query":[{"key":"param","value":"minpassword"},{"key":"value","value":"8"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 08:27:56 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"bc87d490-93ed-4eb9-92df-20a866fbf457"},{"name":"Show Permissions for a Particular Local User","id":"f21357b3-1ed9-401e-8e21-12ca8a32f368","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/usershow?user=bal01","description":"<p>To display permissions for a particular local user, run the <strong>showlist</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","usershow"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"user","value":"bal01"}],"variable":[]}},"response":[{"id":"1c8ed781-57bc-45b3-8c35-9fbd1077b4c8","name":"Show Permissions for a Particular Local User","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/usershow?user=bal01","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","usershow"],"query":[{"key":"user","value":"bal01"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 08:31:06 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <User>\n                <Name>bal01</Name>\n                <Perms>ReadOnly</Perms>\n            </User>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"f21357b3-1ed9-401e-8e21-12ca8a32f368"},{"name":"Set Permissions for a Local User","id":"ede5ca0b-7316-4bb0-85a5-d89d480b6d4c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/usersetperms?user=bal01&perms=real,vs","description":"<p>To set permissions for a local user, run the <strong>usersetperms</strong> command.</p>\n<p>Multiple permissions can be set at the same time by separating the values with a comma.</p>\n<blockquote>\n<p>Running this command will overwrite any previous permissions for this user. For example, if a user had the <strong>rules</strong> permission and you ran the command listed above, the user would no longer have the <strong>rules</strong> permission but would have the <strong>real</strong> and <strong>vs</strong> permission. </p>\n</blockquote>\n<p>Valid values for the perms parameter are listed and described in the table below.</p>\n<table><tbody><tr><td><div><p><b>Value</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>real</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This role permits enabling and disabling Real Servers. Users with the Real Servers permission cannot add SubVSs.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>vs</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This role relates to managing Virtual Services. This includes SubVSs. Virtual Service actions permitted vary depending on whether or not the <b>extendedperms</b> parameter is enabled. For further information, refer to the <a href=\"https://docs.progress.com/bundle/loadmaster-feature-description-user-management-ga\">User Management Feature Description</a>.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>rules</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This role permits managing Rules. Rule modifications permitted include add, delete and modify.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>backup</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This role permits performing system backups.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>certs</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This role permits managing SSL Certificates. Certificate management includes adding, deleting and modifying SSL Certificates.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>cert3</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This role permits managing intermediate Certificates. Certificate management includes the ability to add and delete intermediate certificates.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>certbackup</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This role permits the ability to export and import certificates.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>users</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This role is allowed access to all functionality within the <b>System Configuration &gt; System Administration &gt; User Management </b>WUI screen.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>root</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This role gives users all permissions except the permission to change the bal password and the permission to create or delete other users.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>geo</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This role is used only with the LoadMaster GEO product. For more information on GEO and the Global Server Load Balancing (GSLB) Feature Pack, refer to the <a href=\"https://docs.progress.com/bundle/loadmaster-feature-description-geo-ga\">GEO Feature Description</a>.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>addvs</div><div><div><div><div></div></div></div><div></div></div></td><td><div>This parameter can only be enabled if the <b>extendedperms</b> parameter is enabled. This role relates to managing Virtual Services. This includes SubVSs. Refer to the <a href=\"https://docs.progress.com/bundle/loadmaster-feature-description-user-management-ga\">User Management Feature Description </a>for further details on the permissions provided by this option.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>To set the permissions to none, leave the parameter blank, for example <b>&amp;perms=</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","usersetperms"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"user","value":"bal01"},{"key":"perms","value":"real,vs"}],"variable":[]}},"response":[{"id":"1bc9b01d-b342-4312-8710-3f949dc2c796","name":"Set Permissions for a Local User","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/usersetperms?user=bal01&perms=real,vs","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","usersetperms"],"query":[{"key":"user","value":"bal01"},{"key":"perms","value":"real,vs"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 08:34:03 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"ede5ca0b-7316-4bb0-85a5-d89d480b6d4c"},{"name":"Return a Previously Generated Certificate for a User","id":"276a5340-21cf-4af8-9c05-dc3b127e5d32","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/userreadcert?user=bal01","description":"<p>To return a previously generated certificate for a user, run the <strong>userreadcert</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","userreadcert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"user","value":"bal01"}],"variable":[]}},"response":[{"id":"1a826dd1-22c2-45ed-8842-65d4a3c7ec15","name":"Return a Previously Generated Certificate for a User","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:{{vault:authorization-password}}@InsertLoadMasterIPAddress/access/userreadcert?user=bal01","protocol":"https","auth":{"user":"bal","password":"{{vault:authorization-password}}"},"host":["InsertLoadMasterIPAddress"],"path":["access","userreadcert"],"query":[{"key":"user","value":"bal01"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 08:45:42 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>-----BEGIN CERTIFICATE-----\nCertificate contents would appear here\n-----END RSA PRIVATE KEY-----\n</Data>\n    </Success>\n</Response>"}],"_postman_id":"276a5340-21cf-4af8-9c05-dc3b127e5d32"},{"name":"Download a Previously Generated Certificate for a User","id":"265ebf98-bd42-47e9-acb4-f9863014ec6b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/userdownloadcert?user=bal01","description":"<p>To download a previously generated certificate for a user, run the <strong>userdownloadcert</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","userdownloadcert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"user","value":"bal01"}],"variable":[]}},"response":[{"id":"4feb13c5-6793-45fb-a423-1417d77409d3","name":"Download a Previously Generated Certificate for a User","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:{{vault:authorization-password}}@InsertLoadMasterIPAddress/access/userdownloadcert?user=bal01","protocol":"https","auth":{"user":"bal","password":"{{vault:authorization-password}}"},"host":["InsertLoadMasterIPAddress"],"path":["access","userdownloadcert"],"query":[{"key":"user","value":"bal01"}]}},"status":"OK","code":200,"_postman_previewlanguage":"raw","header":[{"key":"Date","value":"Tue, 13 Aug 2024 08:44:14 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/octet-stream"},{"key":"Content-Disposition","value":"inline; filename=\"EXAMPLE\""}],"cookie":[],"responseTime":null,"body":"-----BEGIN CERTIFICATE-----\nCertificate contents would appear here\n-----END RSA PRIVATE KEY-----\n"}],"_postman_id":"265ebf98-bd42-47e9-acb4-f9863014ec6b"},{"name":"Generate a New Certificate for a User","id":"3da8b19e-54f1-48d4-bf88-de89b1fe3e36","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/usernewcert?user=bal01&passphrase=ExamplePassphrase","description":"<p>To generate a new certificate for a user, run the <strong>usernewcert</strong> command.</p>\n<blockquote>\n<p>The passphrase is optional. If entered, it will be used to encrypt the private key.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","usernewcert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"user","value":"bal01"},{"key":"passphrase","value":"ExamplePassphrase"}],"variable":[]}},"response":[{"id":"638fe069-9fdd-4914-868d-c26adefa4513","name":"Generate a New Certificate for a User","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/usernewcert?user=bal01&passphrase=ExamplePassphrase","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","usernewcert"],"query":[{"key":"user","value":"bal01"},{"key":"passphrase","value":"ExamplePassphrase"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 08:43:01 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>New Certificate generated</Success>\n</Response>"}],"_postman_id":"3da8b19e-54f1-48d4-bf88-de89b1fe3e36"},{"name":"Delete an Existing User Certificate","id":"4cee223b-410f-4052-aabf-b3fa6879b119","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/userdelcert?user=bal01","description":"<p>To delete an existing user certificate, run the <strong>userdelcert</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","userdelcert"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"user","value":"bal01"}],"variable":[]}},"response":[{"id":"cd9708ad-712b-4bcd-9667-23c070a45669","name":"Delete an Existing User Certificate","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/userdelcert?user=bal01","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","userdelcert"],"query":[{"key":"user","value":"bal01"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 09:09:36 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"4cee223b-410f-4052-aabf-b3fa6879b119"},{"name":"Delete a Local User","id":"111471d6-85e6-4cb6-9735-bc342129ef10","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/userdellocal?user=bal01","description":"<p>To delete a local user, run the <strong>userdellocal</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","userdellocal"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"user","value":"bal01"}],"variable":[]}},"response":[{"id":"36d02b8e-37ac-4ed0-a5a6-c7763117ddda","name":"Delete a Local User","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/userdellocal?user=bal01","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","userdellocal"],"query":[{"key":"user","value":"bal01"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 09:15:03 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"111471d6-85e6-4cb6-9735-bc342129ef10"},{"name":"Return a List of Existing Groups","id":"f42a9053-eb68-4742-b8bc-f5e0f5461c2b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/grouplist","description":"<p>To return a list of existing groups and their associated permissions, run the <strong>grouplist</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","grouplist"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"f379a2f9-5a0d-48da-bca4-7103ea9d7209","name":"Return a List of Existing Groups","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/grouplist"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 09:32:06 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <RemoteUserGroup>\n                <Name>Test01</Name>\n                <Perms>real,vs\n</Perms>\n            </RemoteUserGroup>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"f42a9053-eb68-4742-b8bc-f5e0f5461c2b"},{"name":"Show Permissions for a Specific User Group","id":"c335825e-7533-4921-b88e-608c9bc12f67","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/groupshow?group=Test01","description":"<p>To display permissions for a specific user group, run the <strong>groupshow</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","groupshow"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"group","value":"Test01"}],"variable":[]}},"response":[{"id":"c9ef411a-0460-46c6-b9b6-209f9ecc90d0","name":"Show Permissions for a Specific User Group","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/groupshow?group=Test01","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","groupshow"],"query":[{"key":"group","value":"Test01"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 09:30:57 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <RemoteUserGroup>\n                <Name>Test01</Name>\n                <Perms>real,vs\n</Perms>\n            </RemoteUserGroup>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"c335825e-7533-4921-b88e-608c9bc12f67"},{"name":"Add a New Group","id":"a9c660a8-b14d-4eb4-96db-b0017615661f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/groupaddremote?group=Test01","description":"<p>To add a new group, run the <strong>groupaddremote</strong> command.</p>\n<blockquote>\n<p>The following characters are permitted in the group name: alphanumeric characters, spaces, or the following special symbols: <strong>=~^._+#,@/-</strong>.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","groupaddremote"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"group","value":"Test01"}],"variable":[]}},"response":[{"id":"3f5a1982-48e7-45a9-8b62-575bf1dd9081","name":"Add a New Group","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/groupaddremote?group=Test01","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","groupaddremote"],"query":[{"key":"group","value":"Test01"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 09:17:26 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"a9c660a8-b14d-4eb4-96db-b0017615661f"},{"name":"Configure Permissions for a Group","id":"c60578e4-c7c2-40a2-a737-56b04c39dc30","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/groupsetperms?group=Test01&perms=real,vs","description":"<p>To configure permissions for a group, run the <strong>groupsetperms</strong> command.</p>\n<p>Enter a comma-separated list of permissions in the <strong>perms</strong> parameter. The valid values for the <strong>perms</strong> parameter are the same as the ones for the <strong>usersetperms</strong> command, as outlined in the <a href=\"#6ca94676-5e01-44ab-8db2-6072a28e2438\">Set Permissions for a Local User</a> section.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","groupsetperms"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"group","value":"Test01"},{"key":"perms","value":"real,vs"}],"variable":[]}},"response":[{"id":"2f1f2ed4-4fef-4cc1-9c10-f80872e6699b","name":"Configure Permissions for a Group","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/groupsetperms?group=Test01&perms=real,vs","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","groupsetperms"],"query":[{"key":"group","value":"Test01"},{"key":"perms","value":"real,vs"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 09:29:02 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"c60578e4-c7c2-40a2-a737-56b04c39dc30"},{"name":"Delete an Existing Group","id":"904e7003-0efb-4054-8f1d-13fca1e36a01","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/groupdelremote?group=Test01","description":"<p>To delete an existing group, run the <strong>groupdelremote</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","groupdelremote"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"group","value":"Test01"}],"variable":[]}},"response":[{"id":"737d52e3-de46-4455-aadc-5cce6405bd44","name":"Delete an Existing Group","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/groupdelremote?group=Test01","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","groupdelremote"],"query":[{"key":"group","value":"Test01"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 09:39:32 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"904e7003-0efb-4054-8f1d-13fca1e36a01"},{"name":"Enable or Disable the Extended Permissions Parameter","id":"8665d79e-0483-4aac-8b46-f241fc4cf21b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=extendedperms","description":"<p>The Virtual Service operations permitted to vary depending on whether or not the extendedperms parameter is enabled. For further information, refer to the <a href=\"https://kemptechnologies.com/documentation/latestga/208807246\">User Management Feature Description</a> document on the Documentation Page.</p>\n<p>The <strong>extendedperms</strong> parameter can be managed using the <strong>get</strong> and <strong>set</strong> commands. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for further information on how to use these commands.</p>\n<p>The <strong>extendedperms</strong> parameter is Boolean - set it to <strong>1</strong> to enable extended permissions, or <strong>0</strong> to disable extended permissions.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","get"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"extendedperms"}],"variable":[]}},"response":[{"id":"e9c158b4-22fc-4718-8e3f-bed0718f4906","name":"Enable or Disable the Extended Permissions Parameter","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=extendedperms","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","get"],"query":[{"key":"param","value":"extendedperms"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 09:36:13 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <extendedperms>no</extendedperms>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"8665d79e-0483-4aac-8b46-f241fc4cf21b"}],"id":"89635da7-73ac-4538-822a-6cc5ee1eb84c","description":"<p>Refer to the following sections for details on the RESTful API commands and parameters relating to LoadMaster user management.</p>\n","_postman_id":"89635da7-73ac-4538-822a-6cc5ee1eb84c"},{"name":"Licensing","item":[{"name":"License the LoadMaster using Online Licensing","id":"d5478b06-9908-4c64-9aa2-531cdf6da588","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/alsilicense?kempid=InsertProgressID&password=InsertProgressIDPassword","description":"<p>The <strong>AlsiLicense</strong> command updates the LoadMaster’s license online. To cause the LoadMaster to query the Progress Kemp licensing system for an updated license, and update the license if one is available, run the <strong>AlsiLicense</strong> command:</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Mandatory</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>kempid</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>String</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The email address used when registering for a Progress ID.</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>password</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>String</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The Progress ID account password.</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>http_proxy</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>String</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the HTTP(S) proxy server and port, in the format <b>ProxyAddress:Port</b>.</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>No</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>lic_type_id</div><div><div><div><div></div></div></div><div></div></div></td><td><div>String</div><div><div><div><div></div></div></div><div></div></div></td><td><div>The license type ID. If you specify an order ID, the license type ID is not required.<br />To retrieve the license ID, run the <b>alsilicensetypes </b>command. Refer to the<a href=\"#c9f1036c-23a4-44a8-9af1-b3493da9a78c\">Retrieve the Available License Types</a>section for further details.</div><div><div><div><div></div></div></div><div></div></div></td><td><div>No</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>orderid</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>String</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the order ID received from Progress Kemp. The order ID is usually provided by Progress Kemp after purchasing the license in the <b>Kemp VLM Activation Instructions</b> document.</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Yes</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","alsilicense"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"kempid","value":"InsertProgressID"},{"key":"password","value":"InsertProgressIDPassword"}],"variable":[]}},"response":[{"id":"1aab787c-6853-4af4-b3df-74b240f96599","name":"License the LoadMaster using Online Licensing","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:{{vault:authorization-password}}@InsertLoadMasterIPAddress/access/alsilicense?kempid=InsertProgressID&password=InsertProgressIDPassword","protocol":"https","auth":{"user":"bal","password":"{{vault:authorization-password}}"},"host":["InsertLoadMasterIPAddress"],"path":["access","alsilicense"],"query":[{"key":"kempid","value":"InsertProgressID"},{"key":"password","value":"InsertProgressIDPassword"}]}},"status":"Unprocessable Entity (WebDAV) (RFC 4918)","code":422,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 16 Aug 2024 10:55:12 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"rm","value":"cannot remove '/tmp/.liccreds': No such file or directory"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<response stat=\"200\">\n    <message>Command completed ok</message>\n    <status>ok</status>\n</response>"}],"_postman_id":"d5478b06-9908-4c64-9aa2-531cdf6da588"},{"name":"License the LoadMaster using Offline Licensing","id":"f772d2f1-6594-46f6-acab-137eeed421e7","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/LicenseBlob5.txt"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/license","description":"<p>The LoadMaster’s license can be updated offline by using the <strong>license</strong> command.<br />The License BLOB is emailed to the customer when requested. Each time a license is updated a new BLOB is needed.</p>\n<p>The BLOB is the body of text from the word <strong>begin</strong> to the word <strong>end</strong>. The BLOB must be copied and pasted into a text file (in the following example the file is called license.txt). For more information on licensing (including details on how to retrieve a BLOB), please refer to the <a href=\"https://kemptechnologies.com/documentation/latestga/203125319\">Licensing, Feature Description</a>.</p>\n<p>This command uploads the BLOB file to the LoadMaster. The command assumes that the license.txt file is in the current directory. If the license.txt file is stored elsewhere, specify the path to the file after the @ symbol.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","license"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"63bc6a51-e404-4be3-9a4b-9e249e187fe6","name":"License","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/LicenseBlob5.txt"},"options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/license"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 26 Jul 2022 14:28:35 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/xml","description":"","type":"text"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<response stat=\"200\">\n    <message>Command completed ok</message>\n    <status>ok</status>\n</response>"}],"_postman_id":"f772d2f1-6594-46f6-acab-137eeed421e7"},{"name":"Get the Licensing Access Key","id":"f51c7d87-01a1-40f4-9d34-8812eda5ada7","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/accesskey?=","description":"<p>The licensing access key can be obtained by the <strong>accesskey</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","accesskey"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"","value":""}],"variable":[]}},"response":[{"id":"44b581b6-b06e-4f25-bc41-6ecbf4614dd6","name":"Get the Licensing Access Key","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/accesskey?","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","accesskey"],"query":[{"key":"","value":null}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 09:57:00 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <AccessKey>Access key would appear here</AccessKey>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"f51c7d87-01a1-40f4-9d34-8812eda5ada7"},{"name":"Kill ASL Instance","id":"dcc97592-4703-404d-a6be-f87e1c660d10","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/killaslinstance","description":"<p>If the Activation Server Lite (ASL) functionality was used to license a LoadMaster, the <strong>KillASLInstance</strong> command can be run to deactivate the client LoadMaster license.</p>\n<blockquote>\n<p>We strongly recommend deregistering a LoadMaster using the Kemp 360 Central UI/API, rather than the LoadMaster UI/API. Deregistering a LoadMaster from the LoadMaster UI/API can lead to the LoadMaster having an unknown state in Kemp 360 Central. In these cases, it is not easy to remove the LoadMaster from Kemp 360 Central and the unknown LoadMaster is still taking up an available license.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","killaslinstance"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"345348ec-2a96-4cf2-bbdb-d384dc7e3e24","name":"Kill ASL Instance","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/killaslinstance"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 15:35:38 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok. The machine has been killed - please relicense</Success>\n</Response>"}],"_postman_id":"dcc97592-4703-404d-a6be-f87e1c660d10"},{"name":"Deactivate a non-SPLA License","id":"91745067-5ba8-4df4-9908-208941168a81","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/kill_instance?name=InsertProgressID&passwd=InsertProgressIDPassword&kill=1","description":"<p>To deactivate a non-SPLA (Service Provider License Agreement) client LoadMaster license, run the <strong>kill_instance</strong> command.</p>\n<blockquote>\n<p>Do not run this command unless instructed to by Kemp Support.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","kill_instance"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"InsertProgressID"},{"key":"passwd","value":"InsertProgressIDPassword"},{"key":"kill","value":"1"}],"variable":[]}},"response":[{"id":"b18969e1-145b-4e16-8f80-a4ef8082fbca","name":"Deactivate a non-SPLA License","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:{{vault:authorization-password}}@InsertLoadMasterIPAddress/access/kill_instance?name=InsertProgressID&passwd=InsertProgressIDPassword&kill=1","protocol":"https","auth":{"user":"bal","password":"{{vault:authorization-password}}"},"host":["InsertLoadMasterIPAddress"],"path":["access","kill_instance"],"query":[{"key":"name","value":"InsertProgressID"},{"key":"passwd","value":"InsertProgressIDPassword"},{"key":"kill","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Fri, 16 Aug 2024 11:10:09 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <message>Command completed ok. The machine has been killed - please relicense</message>\n</response>   "}],"_postman_id":"91745067-5ba8-4df4-9908-208941168a81"}],"id":"2ef0ad59-b077-4f65-8367-16a64815b676","description":"<p>Similar to when initially licensing a LoadMaster, a license may be updated using the online or offline method.<br />Offline licensing requires a Binary Large OBject (BLOB) file which is provided by Progress Kemp.<br />When updating online, only a Progress ID and password are needed.<br />For further information on licensing, refer to the <a href=\"https://kemptechnologies.com/documentation/latestga/203125319\">Licensing, Feature Description</a>.</p>\n","_postman_id":"2ef0ad59-b077-4f65-8367-16a64815b676"},{"name":"Shut Down or Reboot the LoadMaster","item":[{"name":"Shut Down the LoadMaster","id":"4ced7265-ea60-4011-8df0-2dcffbf7ccf1","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/shutdown","description":"<p>The LoadMaster can be shut down using the <strong>shutdown</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","shutdown"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"e2820abc-521a-465f-90a2-4f76417e0de3","name":"Shut Down the LoadMaster","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/shutdown"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 13:04:09 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"4ced7265-ea60-4011-8df0-2dcffbf7ccf1"},{"name":"Reboot the LoadMaster","id":"30b0e722-070e-4b7a-b904-9a6b0498a9aa","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/reboot","description":"<p>The LoadMaster can be rebooted using the <strong>reboot</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","reboot"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"f8d2ad71-63ae-4c3b-b2fe-0e496f306f1c","name":"Reboot the LoadMaster","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/reboot"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 10:22:46 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"30b0e722-070e-4b7a-b904-9a6b0498a9aa"}],"id":"1c69f97a-0463-4c0e-ac41-231b8001ca54","description":"<p>Refer to the following sections for details on commands to shut down and reboot the LoadMaster.</p>\n","_postman_id":"1c69f97a-0463-4c0e-ac41-231b8001ca54"},{"name":"Update Software","item":[{"name":"Upgrade to a Newer Version of Software","id":"48e12399-d99a-4b0b-80ac-28de4161f137","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/7.2.60.0.22525.DEV.PATCH-64-MULTICORE"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/installpatch","description":"<p>The LoadMaster can be upgraded to a new version of software by using the <strong>installpatch</strong> command.</p>\n<blockquote>\n<p>When upgrading to LoadMaster version 7.2.61 or above, you must set the <strong>confirm</strong> parameter to <strong>yes</strong> to successfully install the patch. </p>\n</blockquote>\n<blockquote>\n<p>The file being uploaded must be a valid patch file. If the file does not work in the UI it will not work using a RESTful API command. </p>\n</blockquote>\n<blockquote>\n<p>When updating LoadMaster hardware, starting with 7.2.54.5, you can only update a hardware LoadMaster with an image that supports the boot method used by the hardware. The newer NG models (introduced in 2023) use the UEFI boot method, while earlier models use the BIOS boot method. If you attempt to update a hardware appliance with an updated image that doesn’t support the boot method used by the appliance, the update process stops and the following message is displayed:<br />The system cannot be updated with the provided image, which is not supported on the hardware platform on which you are attempting to install it. </p>\n</blockquote>\n<blockquote>\n<p>All LoadMaster -NG hardware models (introduced in 2023) require UEFI-capable patches, and so cannot be updated with any patch earlier than 7.2.54.6, or between 7.2.55.0 and 7.2.59.1 (inclusive).</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","installpatch"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"512ef9b2-debb-4a68-9acd-38521f022f9a","name":"Upgrade to a Newer Version of Software","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/7.2.60.0.22525.DEV.PATCH-64-MULTICORE"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/installpatch"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 13:19:54 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"48e12399-d99a-4b0b-80ac-28de4161f137"},{"name":"Check the Previously Installed Firmware Version","id":"69be2d73-59ce-4ac2-bb54-296a811937fb","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getpreviousversion","description":"<p>You may want to check the previously installed LoadMaster firmware version in certain situations, for example, before you roll back to a previous firmware version. To check the previously installed firmware version, run the <strong>getpreviousversion</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getpreviousversion"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"f0fa7e35-5696-457a-b1e2-1f72db0ae9b9","name":"Check the Previously Installed Firmware Version","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getpreviousversion"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 13:26:04 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <PreviousVersion>7.2.60.0.22478.DEV\n</PreviousVersion>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"69be2d73-59ce-4ac2-bb54-296a811937fb"},{"name":"Restore to a Previously Installed Version of Software","id":"a0a03b54-388b-4a54-8453-e1c07130c360","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/restorepatch","description":"<p>The previous version of firmware on the LoadMaster can be restored by using the <strong>restorepatch</strong> command.</p>\n<p>The machine needs to be rebooted for the change to take place.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","restorepatch"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"c2f971be-2f51-42e2-acf4-ea2a05b718bc","name":"Restore to a Previously Installed Version of Software","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/restorepatch"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 13:27:09 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Previous version of Software restored\\nPlease reboot to reactivate.</Success>\n</Response>"}],"_postman_id":"a0a03b54-388b-4a54-8453-e1c07130c360"},{"name":"List the Installed Add-On Packs","id":"1f21fc38-f18c-40df-819d-e8e5a67d9d64","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listaddon","description":"<p>A list of any add-on packages that are installed on the LoadMaster can be displayed by running the <strong>listaddon</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","listaddon"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"9cf12d62-5a6f-4597-856f-bd21f68599eb","name":"List the Installed Add-On Packs","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/listaddon"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 10:36:05 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Packages>\n                <Package>\n                    <Name>Flowmon</Name>\n                    <Installed>Thu Jul 25 10:15:04 2024</Installed>\n                    <Version>7.2.61.0.22555.DEV</Version>\n                    <Started>Y</Started>\n                </Package>\n                <Package>\n                    <Name>Vmtoolsd</Name>\n                    <Installed>Thu Jul 25 10:14:52 2024</Installed>\n                    <Version>7.2.61.0.22555.DEV</Version>\n                    <Started>Y</Started>\n                </Package>\n            </Packages>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"1f21fc38-f18c-40df-819d-e8e5a67d9d64"},{"name":"Upload or Update an Add-On Pack","id":"6ea55d3e-abda-4ecd-8c92-c5056453c7a5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/lmingress-7.2.60.0.22520.RELEASE"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addaddon","description":"<p>Add-on packs can be uploaded by running the <strong>addaddon</strong> POST command.</p>\n<blockquote>\n<p>If the add-on pack already exists, the add-on pack will be updated to the version being uploaded.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","addaddon"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"5c666205-fcf5-464a-b745-2371a53199ea","name":"Upload or Update an Add-On Pack","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/lmingress-7.2.60.0.22520.RELEASE"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/addaddon"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 13:33:47 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Addon Package 'lmingress' Correctly installed - addon now running.</Success>\n</Response>"}],"_postman_id":"6ea55d3e-abda-4ecd-8c92-c5056453c7a5"},{"name":"Delete Add-On Pack","id":"72cec606-e554-4221-a091-bef6b9bc91a4","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deladdon?name=Flowmon","description":"<p>Add-on packs can be deleted by running the <strong>deladdon</strong> command.</p>\n<p>The name of the existing add-on packs can be displayed by running the <strong>listaddon</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","deladdon"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"name","value":"Flowmon"}],"variable":[]}},"response":[{"id":"eec5519f-ea7b-4c2d-87e3-6ddcbafc1bbd","name":"Delete Add-On Pack","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/deladdon?name=Flowmon","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","deladdon"],"query":[{"key":"name","value":"Flowmon"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 10:43:13 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Package deleted</Success>\n</Response>"}],"_postman_id":"72cec606-e554-4221-a091-bef6b9bc91a4"}],"id":"a5c7a786-b1c2-4375-af20-1d9617df1c71","description":"<p>Refer to the following sections for RESTful API commands relating to LoadMaster firmware and add-ons.</p>\n","_postman_id":"a5c7a786-b1c2-4375-af20-1d9617df1c71"},{"name":"Backup/Restore","item":[{"name":"Backup/Restore Commands","item":[{"name":"Backup LoadMaster Configuration","id":"3f6f43f2-0c4e-404a-8ae5-450ea3844f00","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/backup","description":"<p>LoadMaster configurations can be backed up using the <strong>backup</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","backup"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"1cb2e209-96a5-4827-ad29-5391004de001","name":"Backup LoadMaster Configuration","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/backup"},"status":"OK","code":200,"_postman_previewlanguage":"raw","header":[{"key":"Date","value":"Wed, 14 Aug 2024 13:36:03 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/octet-stream"},{"key":"Content-Disposition","value":"inline; filename=LMBackups_lb100_2024_08_14.13_36"}],"cookie":[],"responseTime":null,"body":"To save the file, in Postman - go to the Body of the response, click the three dots on the right, and click Save response to file."}],"_postman_id":"3f6f43f2-0c4e-404a-8ae5-450ea3844f00"},{"name":"Restore LoadMaster Configuration","id":"d0b33f07-c8bc-4959-b456-2de2f23aa96d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/LMBackups_lb100_2024_08_14.13_37"}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/restore?type=2","description":"<p>You can resore a LoadMaster configurations by using the <strong>restore</strong> command.</p>\n<p><strong>type</strong> takes the integer range from 1 to 15:</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Range</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>type</p></td><td><p>Integer</p></td><td><p>1-15</p></td><td><p>1 = LoadMaster Base configuration</p><p>2 = Virtual Service configuration</p><p>3 = Base and Virtual Service configuration</p><p>4 = GEO configuration</p><p>5 = Base and GEO configuration</p><p>6 = Virtual Service and GEO configuration</p><p>7 = Base, Virtual Service and GEO configuration</p><p>8 = ESP SSO configuration</p><p>9 = ESP SSO and base configuration</p><p>10 = ESP SSO and Virtual Service configuration</p><p>11 = ESP SSO, Virtual Service and base configuration</p><p>12 = ESP SSO and GEO configuration</p><p>13 = ESP SSO, GEO and base configuration</p><p>14 = ESP SSO, GEO and Virtual Service configuration</p><p>15 = ESP SSO, GEO, Virtual Service and Base configuration</p></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","restore"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"type","value":"2"}],"variable":[]}},"response":[{"id":"613a216e-4e9c-4a22-8165-06981c46c3ae","name":"Restore LoadMaster Configuration","originalRequest":{"method":"POST","header":[],"body":{"mode":"file","file":{"src":"/C:/ExampleFiles/LMBackups_lb100_2024_08_14.13_37"}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/restore?type=2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","restore"],"query":[{"key":"type","value":"2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 13:38:05 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"d0b33f07-c8bc-4959-b456-2de2f23aa96d"}],"id":"68667c3e-6da5-4f1a-a053-3c8b4fa187aa","description":"<p>Refer to the following sections for the backup and restore LoadMaster commands.</p>\n","_postman_id":"68667c3e-6da5-4f1a-a053-3c8b4fa187aa"},{"name":"Automated Backups","item":[],"id":"aa8b3a52-82d7-4e52-b2b9-ca4faf496a52","description":"<p>Parameters relating to automated backups that can be managed using get and set commands are detailed in the following table. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details about the <strong>get</strong> and <strong>set</strong> commands.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Range</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>backupday</p></td><td><p>Integer</p></td><td><p>Daily</p></td><td><p>0-7</p></td><td><p>Specify which day to perform the automated backup (or daily):</p><p>0 = Daily</p><p>1 = Monday</p><p>2 = Tuesday</p><p>3 = Wednesday</p><p>4 = Thursday</p><p>5 = Friday</p><p>6 = Saturday</p><p>7 = Sunday</p></td></tr><tr><td><p>backupenable</p></td><td><p>Boolean</p></td><td><p>N</p></td><td><p> </p></td><td><p>Enable automated timed backups (using FTP, SCP, or SFTP).</p></td></tr><tr><td><p>backuphost</p></td><td><p>String</p></td><td><p> </p></td><td><p> </p></td><td><p>Set the IP address or hostname of the remote host to which you want the backup archives sent, optionally followed by a colon and the port number. If no port is specified, the default port for the selected protocol is used.</p></td></tr><tr><td><p>backuphour</p></td><td><p>Integer</p></td><td><p>0</p></td><td><p>0-23</p></td><td><p>The hour to perform the automated backup.</p><p>0 = Midnight</p><p>23 = 11pm</p></td></tr><tr><td><p>backupminute</p></td><td><p>Integer</p></td><td><p>0</p></td><td><p>0-59</p></td><td><p>The minute to perform the automated backup.</p><p>Note the range values are full minutes</p></td></tr><tr><td><p>backupsecure</p></td><td><p>Boolean</p></td><td><p>0 - ftp</p></td><td><p>0 – ftp (insecure)</p><p>1 – scp (secure)</p></td><td><p>Specify the file transfer method for automated backups. This is a legacy parameter. You cannot specify <b>sftp (secure)</b> if using this parameter. To set the <b>Backup Method</b> to <b>sftp (secure)</b> use the <b>backupmethod </b>parameter.</p></td></tr><tr><td>backupmethod</td><td>String</td><td>wput</td><td> </td><td>Specify the file transfer method for automated backups. Takes a string that can be either <b>wput</b>, <b>scp</b>, or <b>sftp</b>. Setting the backupmethod to <b>wput</b> sets the <b>Backup Method</b> field to <b>Ftp (insecure)</b>.</td></tr><tr><td><p>backuppassword</p></td><td><p>String</p></td><td><p> </p></td><td><p> </p></td><td><p>The password of the remote user. This parameter is used when the <b>backupsecure</b> method is set to <b>0</b> (<b>Ftp (insecure)</b>).</p></td></tr><tr><td><p>backupident</p></td><td><p>File</p></td><td><p> </p></td><td><p> </p></td><td><p>If using <b>scp </b>or <b>sftp </b>as the <b>backupmethod</b>, the remote identity value must be provided. This is the SSH private key generated using ssh-keygen on the remote scp server.</p><p>The key file must be encoded in base64 before uploading.</p><p>This parameter can only be set – running a get on this parameter returns some asterisks.</p></td></tr><tr><td><p>backuppath</p></td><td><p>String</p></td><td><p> </p></td><td><p> </p></td><td><p>Specify the remote path name.</p></td></tr><tr><td><p>backupuser</p></td><td><p>String</p></td><td><p> </p></td><td><p> </p></td><td><p>Specify the remote username.</p></td></tr></tbody></table>\n\n<blockquote>\n<p>You cannot use the <strong>Test Automated Backups</strong> functionality using the API. You can do this using the UI if needed.</p>\n</blockquote>\n","_postman_id":"aa8b3a52-82d7-4e52-b2b9-ca4faf496a52"}],"id":"a441bb8e-b75b-44d1-9309-7f5e7cf1e7c5","description":"<p>Refer to the following sections for RESTful API commands relating to backing up and restoring the LoadMaster configuration.</p>\n","_postman_id":"a441bb8e-b75b-44d1-9309-7f5e7cf1e7c5"},{"name":"Date/Time Settings","item":[],"id":"696bc9cb-e2a8-4600-ac40-31342f299ec4","description":"<p>Parameters relating to the date and time that can be managed using get and set commands are detailed in the following table. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details about the <strong>get</strong> and <strong>set</strong> commands.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>ntphost</p></td><td><p>S</p></td><td><p>Specify the host from which the LoadMaster will set the time. Multiple hosts can be specified in a space-separated list. Please escape the spaces using 20 percent. The time will be set from the first host to return a valid answer.</p></td></tr><tr><td><p>time</p></td><td><p>I</p></td><td><p>The time in hours, minutes and seconds.</p></td></tr><tr><td><p>timezone</p></td><td><p>S</p></td><td><p>The timezone where the LoadMaster is located</p></td></tr><tr><td><p>ntpkeyid</p></td><td><p>I</p></td><td><p>The NTP key ID. Valid values range from 1 to 99.</p></td></tr><tr><td><p>ntpkeysecret</p></td><td><p>S</p></td><td><p>The NTP shared secret string. The NTP secret can be a maximum of 40 characters long. If the secret is more than 20 characters long, it is treated as a hex string. Setting this value to an empty string will disable the NTPv4 feature.</p></td></tr><tr><td><p>ntpkeytype</p></td><td><p>S</p></td><td><p>Specify the NTP Key Type. The valid values are</p><p>SHA-1 (<b>SHA1</b>), legacy SHA (<b>SHA</b>), and MD5 (<b>M</b>). Note that the values are case sensitive and must be in uppercase.</p></td></tr></tbody></table>\n\n<blockquote>\n<p>It is not possible to set the time using a RESTful API command.</p>\n</blockquote>\n","_postman_id":"696bc9cb-e2a8-4600-ac40-31342f299ec4"}],"id":"5f81f3cc-841c-4145-8b12-c614b160fc4b","description":"<p>Various system administration tasks can be completed using the RESTful API.</p>\n","_postman_id":"5f81f3cc-841c-4145-8b12-c614b160fc4b"},{"name":"Logging Options","item":[{"name":"Manage System Logs","item":[{"name":"List System Log Files","id":"f4cd7f91-dbb1-4454-83d7-3efb587f8bd5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/listsyslogfiles","description":"<p>To list the existing system log files, run the <strong>logging/listsyslogfiles</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","listsyslogfiles"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"29832ff1-b86d-4937-b702-4abce5d4bb63","name":"List System Log Files","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/listsyslogfiles"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 12 Aug 2024 11:12:00 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <SyslogFiles>\n                <File1>authlog</File1>\n                <File2>boot.msg</File2>\n                <File3>check_addons_nodel</File3>\n                <File4>messages</File4>\n                <File5>named.log</File5>\n                <File6>vmware-vmsvc.log</File6>\n                <File7>wafeventlog</File7>\n                <File8>warn</File8>\n            </SyslogFiles>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"f4cd7f91-dbb1-4454-83d7-3efb587f8bd5"},{"name":"Clear the System Log Files","id":"0be53708-3a9e-48e3-b097-023da6e57e9c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/clearlogs","description":"<p>To clear all the system log files, run the <strong>clearlogs</strong> command.</p>\n<blockquote>\n<p>The legacy command before <strong>clearlogs</strong> was <strong>resetlogs</strong>.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","clearlogs"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"1062b4a2-87bc-4182-a20e-7f2e2d77fab9","name":"Clear the System Log Files","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/clearlogs"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 12 Aug 2024 11:19:14 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"0be53708-3a9e-48e3-b097-023da6e57e9c"},{"name":"Clear a Specific Log File","id":"c3f2a0c3-169d-4be9-9092-36a6a10623c0","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/clearlogs?fsel=check_addons_nodel","description":"<p>To clear a specific log file, run the <strong>clearlogs</strong> command with the <strong>fsel</strong> parameter.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","clearlogs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fsel","value":"check_addons_nodel"}],"variable":[]}},"response":[{"id":"e570857a-ebcd-485d-b492-882517bf47b6","name":"Clear a Specific Log File","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/clearlogs?fsel=check_addons_nodel","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","logging","clearlogs"],"query":[{"key":"fsel","value":"check_addons_nodel"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 12 Aug 2024 11:14:20 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>check_addons_nodel truncated</Success>\n</Response>"}],"_postman_id":"c3f2a0c3-169d-4be9-9092-36a6a10623c0"},{"name":"Save the System Log Files","id":"0d4a0fec-86d5-40e5-8e70-ad2f01b08e25","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/savelogs","description":"<p>To save all the system log files, run the <strong>savelogs</strong> command.</p>\n<p>If you run this command in the command line, ensure to add the output parameter, for example, <strong>--output</strong> or <strong>-o</strong> when using cURL.</p>\n<blockquote>\n<p>The legacy command before <strong>savelogs</strong> was <strong>downloadlogs</strong>.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","savelogs"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"bdab33d6-2b9e-4c23-8188-265685e42bfd","name":"Save the System Log Files","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/savelogs"},"status":"OK","code":200,"_postman_previewlanguage":"raw","header":[{"key":"Date","value":"Mon, 12 Aug 2024 11:16:08 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/octet-stream"},{"key":"Content-Disposition","value":"inline; filename=LM_lb100_2024_08_12.11.16.tar.gz"}],"cookie":[],"responseTime":null,"body":"To save the file, in Postman - go to the Body of the response, click the three dots on the right, and click Save response to file."}],"_postman_id":"0d4a0fec-86d5-40e5-8e70-ad2f01b08e25"},{"name":"Save a Specific Log File","id":"8ec5da7c-a7a5-41bf-9cf4-bd944e98a324","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/savelogs?fsel=boot.msg","description":"<p>To save a specific log file, run the <strong>savelogs</strong> command with the <strong>fsel</strong> parameter.</p>\n<p>If you run this command in the command line, ensure to add the output parameter, for example, <strong>--output</strong> or <strong>-o</strong> when using cURL.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","savelogs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fsel","value":"boot.msg"}],"variable":[]}},"response":[{"id":"5f46782b-98df-43f5-a0c6-b77440c11529","name":"Save a Specific Log File","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/savelogs?fsel=boot.msg","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","logging","savelogs"],"query":[{"key":"fsel","value":"boot.msg"}]}},"status":"OK","code":200,"_postman_previewlanguage":"raw","header":[{"key":"Date","value":"Tue, 13 Aug 2024 15:29:08 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/octet-stream"},{"key":"Content-Disposition","value":"inline; filename=LM_lb100_2024_08_13.15.29.tar.gz"}],"cookie":[],"responseTime":null,"body":"To save the file, in Postman - go to the Body of the response, click the three dots on the right, and click Save response to file."}],"_postman_id":"8ec5da7c-a7a5-41bf-9cf4-bd944e98a324"}],"id":"17a6492d-6def-4077-a7af-45e163c7956c","description":"<p>Refer to the following sections for details on RESTful API commands relating to managing system logs.</p>\n","_postman_id":"17a6492d-6def-4077-a7af-45e163c7956c"},{"name":"Ping Host","item":[{"name":"Perform a Ping","id":"3824568f-868f-4779-b240-ca593ace0da5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/ping?addr=progress.com","description":"<p>To perform a ping, run the <strong>ping</strong> command.</p>\n<table><tbody><tr><td><p><b>Parameter</b></p></td><td><p><b>Parameter Type</b></p></td><td><p><b>Parameter Description</b></p></td><td><p><b>Mandatory</b></p></td></tr><tr><td><p>addr</p></td><td><p>Address</p></td><td><p>Specify the host to perform the ping on. This parameter accepts an IPv4 address, IPv6 address, FQDN, or hostname.</p></td><td><p>Yes</p></td></tr><tr><td><p>intf</p></td><td><p>Integer</p></td><td><p>Specify the ID of the interface from which the ping should be sent from. If the interface is not specified here, the correct interface to ping an address on a particular network will be automatically selected.</p></td><td><p>No</p></td></tr></tbody></table>\n\n<p>The LoadMaster tries to auto-detect what type of ping to use (ping for IPv4 and ping6 for IPv6).</p>\n<blockquote>\n<p>The ping command returns a 200 OK success message even if an incorrect or non-existing interface is provided.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","ping"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"addr","value":"progress.com"}],"variable":[]}},"response":[{"id":"e4f9abe4-518a-48ae-a884-87057526c9d5","name":"Perform a Ping","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/ping?addr=progress.com","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","logging","ping"],"query":[{"key":"addr","value":"progress.com"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 12 Aug 2024 11:27:22 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>PING progress.com (<IP address would appear here>) 56(84) bytes of data. 64 bytes from <IP address would appear here>: icmp_seq=1 ttl=237 time=107 ms 64 bytes from <IP address would appear here>: icmp_seq=2 ttl=237 time=108 ms 64 bytes from 184.106.1.3: icmp_seq=3 ttl=237 time=108 ms --- progress.com ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2002ms rtt min/avg/max/mdev = 107.948/108.296/108.690/0.304 ms</Success>\n</Response>"}],"_postman_id":"3824568f-868f-4779-b240-ca593ace0da5"},{"name":"Perform a Ping (IPv6)","id":"8373038e-eb10-4f5f-bcca-2ff0aa567bec","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/ping6?addr=InsertIPv6Address","description":"<p>To force a ping6 on an IPv6 address, run the <strong>ping6</strong> command.</p>\n<blockquote>\n<p>The ping command returns a 200 OK success message even if an incorrect or non-existing interface is provided.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","ping6"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"addr","value":"InsertIPv6Address"}],"variable":[]}},"response":[{"id":"06ed3977-4244-452b-8e3d-a0119c486b3b","name":"Perform a Ping (IPv6)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:{{vault:authorization-password}}@InsertLoadMasterIPAddress/access/logging/ping6?addr=InsertIPv6Address","protocol":"https","auth":{"user":"bal","password":"{{vault:authorization-password}}"},"host":["InsertLoadMasterIPAddress"],"path":["access","logging","ping6"],"query":[{"key":"addr","value":"InsertIPv6Address"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 12 Aug 2024 11:30:54 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>connect: Network is unreachable</Success>\n</Response>"}],"_postman_id":"8373038e-eb10-4f5f-bcca-2ff0aa567bec"}],"id":"ecf72e99-150c-4cf6-b19f-577a1a7bbbfe","description":"<p>The following sections provide details on the ping RESTful API commands.</p>\n","_postman_id":"ecf72e99-150c-4cf6-b19f-577a1a7bbbfe"},{"name":"Run a Traceroute","item":[{"name":"Perform a Traceroute","id":"a3d71b6b-9cca-474d-83b6-25b29cfb513e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/traceroute?addr=progress.com","description":"<p>To perform a traceroute, run the <strong>logging/traceroute</strong> command.</p>\n<p>The <strong>addr</strong> parameter accepts an IPv4 address, IPv6 address, FQDN, or hostname.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","traceroute"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"addr","value":"progress.com"}],"variable":[]}},"response":[{"id":"56b9f220-b11d-4a91-80cf-aa88fc730f01","name":"Perform a Traceroute","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/traceroute?addr=progress.com","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","logging","traceroute"],"query":[{"key":"addr","value":"progress.com"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 05:18:36 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>traceroute to progress.com (<IP address would appear here>), 30 hops max, 60 byte packets#1  <IP address would appear here>  1.305 ms  1.292 ms  1.280 ms#2  <IP address would appear here>  5.673 ms  7.105 ms  5.736 ms#3  * * *#4  * * *#5  <IP address would appear here>  110.454 ms  110.421 ms  110.432 ms#6  * * *#7  <IP address would appear here>  108.971 ms <IP address would appear here>  108.901 ms <IP address would appear here>  108.476 ms#8  <IP address would appear here>  108.078 ms <IP address would appear here>  108.784 ms <IP address would appear here>  108.924 ms#9  <IP address would appear here>  108.663 ms  108.645 ms <IP address would appear here>  108.229 ms#10  * * *#11  * * *#12  * * *#13  * * *#14  * * *#15  * * *#16  * * *#17  * * *#18  * * *#19  * * *#20  * * *#21  * * *#22  * * *#23  * * *#24  * * *#25  * * *#26  * * *#27  * * *#28  * * *#29  * * *#30  * * *#</Data>\n    </Success>\n</Response>"}],"_postman_id":"a3d71b6b-9cca-474d-83b6-25b29cfb513e"}],"id":"bb4f9e5d-0bcf-459d-bc2a-169357386f3b","description":"<p>Refer to the following section for details on the <strong>traceroute</strong> command.</p>\n","_postman_id":"bb4f9e5d-0bcf-459d-bc2a-169357386f3b"},{"name":"Debug Options","item":[{"name":"Get/Set Debug Options","item":[],"id":"bbf7bcd9-0812-419f-82a9-0bd8f5685abf","description":"<p>Parameters relating to Debug Options that can be managed using <strong>get</strong> and <strong>set</strong> commands are detailed in the table below. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details on the get and set commands.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Parameter Description</b></p></td></tr><tr><td>irqpinning</td><td>B<br /></td><td><p>You can use this parameter to enable or disable Interrupt Request Line (IRQ) pinning. This is disabled by default.</p><p><b>Warning: </b>Only enable this option in consultation with Progress Kemp Support.<br /></p><p><b>Note: </b>When you change the IRQ pinning option from off to on, IRQ pinning is enabled on all network interfaces that are assigned an IP address. When IRQ pinning is enabled and you add an IP address to an unconfigured interface, that interface will not have IRQ pinning enabled until you either toggle the IRQ pinning off and back on again, or the system is rebooted.</p></td></tr><tr><td><p>irqbalance</p></td><td><p>B</p></td><td><p>The purpose of IRQBalance is distribute hardware interrupts across processors on a multiprocessor system. This should only be enabled after consultation with Progress Kemp technical support.</p></td></tr><tr><td>tcpsack</td><td>B</td><td><p>Use this parameter to enable or disable TCP SACK (Selective ACKnowledgement) processing. This is a global setting that affects all Layer 7 Virtual Services. It only works if TCP SACK is enabled on a Virtual Service client and the LoadMaster.</p></td></tr><tr><td>IPV6forwarding</td><td>B</td><td>Enable this parameter to enable Layer 4 IPv6 forwarding. Disable this option for full IPv6 conformance.</td></tr><tr><td>EnableISetupCli</td><td>B</td><td>Enable or disable the Command Line Interface (CLI) Service Management function.</td></tr><tr><td><p>linearesplogs</p></td><td><p>B</p></td><td><p>By default, the LoadMaster deletes older log files. If this parameter is enabled, older log files will no longer be deleted. If the filesystem fills up, further access using the LoadMaster is blocked.</p></td></tr><tr><td>dhcpv6</td><td>B</td><td>When this parameter is enabled, the DHCPv6 client will run on the primary interface. This provides the capability to obtain an IPv6 address on boot. If you want DHCPv6 to be run on every boot, keep this option enabled. However, this is a long running process and it keeps running in the background when it is enabled so if you only need an IPv6 address to be assigned and you do not need to renew and release the IPv6 address you should disable this option after the IPv6 address is assigned.</td></tr></tbody></table>","_postman_id":"bbf7bcd9-0812-419f-82a9-0bd8f5685abf"},{"name":"RAID Information Commands","item":[{"name":"Retrieve RAID Information","id":"37b81e8b-7c0c-447b-82c8-62bca2646f0c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getraidinfo","description":"<p>Display the RAID controller details, including the model name, serial number, capacity, state, status, level, and total members in the RAID, by running the <strong>getraidinfo</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getraidinfo"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"daab98a0-5723-4414-bff5-57622aa29510","name":"Retrieve RAID Information","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getraidinfo"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 14:13:49 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <raidinfo>\n        <![CDATA[\n        10\n        255\n        /dev/sda\n        427491329\n        0\n        2\n\n        0\n        H/W RAID1\n        EXAMPLE\n        0\n        0\n        14903 (465 GB)\n        0\n        Active\n        Normal\n        Raid 1 (mirror)\n        0\n        15\n        0\n        3\n        0\n        2\n\n        0\n        1\n        1\n        0\n        0\n        0\n        14903\n\n        1\n        1\n        1\n        0\n        1\n        0\n        14903\n        ]]>\n    </raidinfo>\n    <status>ok</status>\n</response>"}],"_postman_id":"37b81e8b-7c0c-447b-82c8-62bca2646f0c"},{"name":"Retrieve RAID Disk Information","id":"c618c3d7-7c21-405d-bafb-0a26876eea88","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getraiddisksinfo","description":"<p>Display details about the RAID disks, including the model name, serial number, firmware version, capacity, type, and speed, by running the <strong>getraiddisksinfo</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","getraiddisksinfo"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"40c5b9c6-50af-43da-934e-788d684c6950","name":"Retrieve RAID Disk Information","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/getraiddisksinfo"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 14:16:13 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <disks>\n        <![CDATA[\n        0\n        EXAMPLE\n        EXAMPLE\n        01.01A01\n        1\n        15\n        465 GB\n        RAID\n        2 (GB)\n\n        0\n        2\n        0\n        0\n\n        0\n        14903\n        0\n\n        1\n        0\n        0\n        0\n\n        0\n        0\n        0\n\n        1\n        EXAMPLE\n        EXAMPLE\n        01.01A01\n        1\n        15\n        465 GB\n        RAID\n        2 (GB)\n\n        0\n        2\n        0\n        1\n        H/W RAID1                               \n        EXAMPLE\n        0\n        14903\n        0\n\n        1\n        0\n        0\n        0\n\n        0\n        0\n        0\n        ]]>\n    </disks>\n</response>"}],"_postman_id":"c618c3d7-7c21-405d-bafb-0a26876eea88"}],"id":"3089a229-62c0-4fdb-a40c-068a1ca9a71d","description":"<p>Refer to the following sections for details on how to retrieve Redundant Array of Independent Disks (RAID) controller details.</p>\n","_postman_id":"3089a229-62c0-4fdb-a40c-068a1ca9a71d"},{"name":"Other Debug Commands","item":[{"name":"Reset Statistics","id":"4e60863c-3e10-4265-bc3e-082316621aaf","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/resetstats","description":"<p>Reset the statistics by running the <strong>resetstats</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","resetstats"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"b86a372e-6939-41a6-8a23-0595ea810729","name":"Reset Statistics","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/resetstats"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 04:45:48 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"4e60863c-3e10-4265-bc3e-082316621aaf"},{"name":"Flush the SSO Authentication Cache","id":"19e2ea88-38ef-471f-aa6f-70a1f5ecb12e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/ssoflush","description":"<p>You can flush the SSO authentication cache by running the <strong>logging/ssoflush</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","ssoflush"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"4b274e60-8c0c-494c-acb4-4e9d88add805","name":"Flush the SSO Authentication Cache","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/ssoflush"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 04:46:47 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"19e2ea88-38ef-471f-aa6f-70a1f5ecb12e"}],"id":"23f5d714-edcc-4587-8ceb-a4dc71cc73d9","description":"<p>Refer to the following sections for details on some other debugging options.</p>\n","_postman_id":"23f5d714-edcc-4587-8ceb-a4dc71cc73d9"}],"id":"ce79c936-a61a-4049-b57d-8e82b42a6c03","description":"<p>Refer to the following sections for details on the debug option RESTful API parameters.</p>\n","_postman_id":"ce79c936-a61a-4049-b57d-8e82b42a6c03"},{"name":"Extended Log Files","item":[{"name":"List the Extended Log Files","id":"883c8f40-95c4-4f6d-a555-5481f27b5c7e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/listextlogfiles","description":"<p>To list the existing extended log files, run the <strong>logging/listextlogfiles</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","listextlogfiles"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"35667e3b-2f49-4b80-9101-d89d9221d8e6","name":"List the Extended Log Files","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/listextlogfiles"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 04:51:13 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <ExtlogFiles>\n                <File1>user\n</File1>\n            </ExtlogFiles>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"883c8f40-95c4-4f6d-a555-5481f27b5c7e"},{"name":"Clear Extended Log Files","id":"afa1044f-0422-4f5d-9833-302a94c02803","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/clearextlogs?fsel=lmingress.log","description":"<p>To clear the extended log files, run the <strong>clearextlogs</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","clearextlogs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fsel","value":"lmingress.log"}],"variable":[]}},"response":[{"id":"feefe5ae-bb1d-427d-a22c-59dfebef7476","name":"Clear Extended Log Files","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/clearextlogs?fsel=lmingress.log","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","logging","clearextlogs"],"query":[{"key":"fsel","value":"lmingress.log"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 15:41:38 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>lmingress.log truncated</Success>\n</Response>"}],"_postman_id":"afa1044f-0422-4f5d-9833-302a94c02803"},{"name":"Save Extended Log Files","id":"babf34b2-bbb7-4b94-96cb-07cf841bb064","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/saveextlogs?fsel=lmingress.log","description":"<p>To save the extended log files, run the <strong>saveextlogs</strong> command.</p>\n<p>To save all non-rotated log files, omit the <strong>fsel</strong> parameter.</p>\n<p>If you run this command in the command line, ensure to add the output paramter, for example, <strong>\\--output</strong> or <strong>\\-o</strong> when using cURL.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","saveextlogs"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"fsel","value":"lmingress.log"}],"variable":[]}},"response":[{"id":"01301a9a-3c01-45eb-8feb-25baece0ea54","name":"Save Extended Log Files","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/saveextlogs?fsel=lmingress.log","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","logging","saveextlogs"],"query":[{"key":"fsel","value":"lmingress.log"}]}},"status":"OK","code":200,"_postman_previewlanguage":"raw","header":[{"key":"Date","value":"Tue, 13 Aug 2024 15:44:18 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/octet-stream"},{"key":"Content-Disposition","value":"inline; filename=LM_lb100_EXTLOG_2024_08_13.15.44.tar.gz"}],"cookie":[],"responseTime":null,"body":"To save the file, in Postman - go to the Body of the response, click the three dots on the right, and click Save response to file."}],"_postman_id":"babf34b2-bbb7-4b94-96cb-07cf841bb064"},{"name":"Check if Extended ESP Logging is Enabled","id":"3905852a-0f10-453a-b977-616083682830","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/isextesplogenabled","description":"<p>To check if the <strong>Local Extended ESP Logs</strong> option is currently enabled, run the <strong>isextesplogenabled</strong> command.</p>\n<p>If <strong>Disable Local Extended ESP Logs</strong> is disabled (the default option), messages are written to the extended ESP logs expediently and are not sent to any remote syslog servers that are defined.<br />If <strong>Disable Local Extended ESP Logs</strong> is enabled, no messages are written to the extended ESP logs and messages are only sent to the remote logger (if one is defined). If a remote logger is not defined, no logs are recorded.<br />You can no longer configure the system to both populate the local extended ESP logs and send the same messages to remote syslog servers, as it was in previous releases.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","isextesplogenabled"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"f92e21c2-b987-462b-8104-d59923db9e95","name":"Check if Extended ESP Logging is Enabled","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/isextesplogenabled"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 05:02:41 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>Extended ESP logging is enabled</Data>\n    </Success>\n</Response>"}],"_postman_id":"3905852a-0f10-453a-b977-616083682830"},{"name":"Disable Extended ESP Logging","id":"bd027c68-57cb-40cc-a5a7-6cfb6c9ee0a7","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/disableextesplog","description":"<p>To disable extended ESP logging, run the <strong>disableextesplog</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","disableextesplog"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"4e20097a-4cde-4a45-8f96-c9e6dca2e9d5","name":"Disable Extended ESP Logging","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/disableextesplog"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 05:04:28 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"bd027c68-57cb-40cc-a5a7-6cfb6c9ee0a7"},{"name":"Enable Extended ESP Logging","id":"6c80a392-ebcc-4bb8-adf8-d66125b0a305","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/enableextesplog","description":"<p>To enable extended ESP logging, run the <strong>enableextesplog</strong> command.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","enableextesplog"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"8d953f53-83f7-4ea4-88e4-0897de0c2e85","name":"Enable Extended ESP Logging","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/enableextesplog"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 05:07:35 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"6c80a392-ebcc-4bb8-adf8-d66125b0a305"}],"id":"52ebcd9a-18b7-4987-beb1-79099b372b5b","description":"<p>Refer to the following sections for details about the RESTful API commands relating to extended log files.</p>\n","_postman_id":"52ebcd9a-18b7-4987-beb1-79099b372b5b"},{"name":"Syslog Options","item":[{"name":"Delete All Hosts for a Syslog Level","id":"719dc6e8-7e97-405f-a9e8-b068c2cfd2a9","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=syslognotice&value=","description":"<p>To delete all hosts for a syslog level, set the value of the syslog level to an empty string.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","set"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"syslognotice"},{"key":"value","value":""}],"variable":[]}},"response":[{"id":"06ab7971-fc9f-4932-b64d-86d1e5656001","name":"Delete All Hosts for a Syslog Level","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=syslognotice&value=","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","set"],"query":[{"key":"param","value":"syslognotice"},{"key":"value","value":""}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 05:14:19 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"719dc6e8-7e97-405f-a9e8-b068c2cfd2a9"},{"name":"Get the Syslog Message Prefix","id":"9336b1f0-0d8e-438b-8ba1-217ea85a1972","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=syslogprefix","description":"<p>Use this option to get details of prefix added to the beginning of all syslog messages.</p>\n<p>This prefix is used to include identifiers such as a license key, which may be required by remote syslog consumers for authentication or tracking purposes.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","get"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"syslogprefix"}],"variable":[]}},"response":[{"id":"819cad8c-2f18-4eca-971d-b180c9cc8498","name":"Get the Syslog Message Prefix","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/get?param=syslogprefix","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","get"],"query":[{"key":"param","value":"syslogprefix"}]}},"status":"OK","code":200,"_postman_previewlanguage":null,"header":[{"key":"Date","value":"Wed, 20 Aug 2025 02:08:21 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <SyslogPrefix>PrefixExample</SyslogPrefix>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"9336b1f0-0d8e-438b-8ba1-217ea85a1972"},{"name":"Set the Syslog Message Prefix","id":"a6f3b815-0c51-49db-b187-f15fb27a7e20","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=syslogprefix&value=PrefixExample","description":"<p>Use this option to add prefix to the beginning of all syslog messages. You can use this prefix to include identifiers such as a license key, which may be required by remote syslog consumers for authentication or tracking purposes. There is a limit of 80 characters for the prefix. Most characters are supported.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","set"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"syslogprefix"},{"key":"value","value":"PrefixExample"}],"variable":[]}},"response":[{"id":"858a0436-bb6f-4f78-b7fc-a1a8b52f6306","name":"Set the Syslog Message Prefix","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=syslogprefix&value=PrefixExample","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","set"],"query":[{"key":"param","value":"syslogprefix"},{"key":"value","value":"PrefixExample"}]}},"status":"OK","code":200,"_postman_previewlanguage":null,"header":[{"key":"Date","value":"Wed, 20 Aug 2025 02:07:10 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>X-Frame-Options: SAMEORIGIN</Success>\n</Response>"}],"_postman_id":"a6f3b815-0c51-49db-b187-f15fb27a7e20"}],"id":"f38b726c-e4c4-44b8-ad5a-d9b37a1d1ad9","description":"<p>Parameters relating to Syslog Options that can be managed using <strong>get</strong> and <strong>set</strong> commands are detailed in the table below. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details about the <strong>get</strong> and <strong>set</strong> commands.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p><p><b>(</b><i><b>SyslogLevelParam</b></i><b>)</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Parameter Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>syslogemergency</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Use this option to set the host(s) which will receive <b>Emergency </b>events only. Entries must be comma-separated. Up to 10 entries are supported in total for all levels.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>syslogcritical</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Use this option to set the host(s) which will receive <b>Emergency </b>and <b>Critical </b>events. Entries must be comma-separated. Up to 10 entries are supported in total for all levels.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>syslogerror</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Use this option to set the host(s) which will receive <b>Emergency</b>, <b>Critical</b>,<b> </b>and <b>Error </b>events. Entries must be comma-separated. Up to 10 entries are supported in total for all levels.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>syslogwarn</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Use this option to set the host(s) which will receive <b>Emergency</b>, <b>Critical</b>, <b>Error</b>,<b> </b>and <b>Warning </b>events. Entries must be comma-separated. Up to 10 entries are supported in total for all levels.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>syslognotice</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Use this option to set the host(s) which will receive Emergency, <b>Critical</b>, <b>Error</b>, <b>Warning</b>,<b> </b>and <b>Notice </b>events. Entries must be comma-separated. Up to 10 entries are supported in total for all levels.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>sysloginfo</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Use this option to set the host(s) which will receive <b>All </b>events. Entries must be comma-separated. Up to 10 entries are supported in total for all levels.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>syslognone</div><div><div><div><div></div></div></div><div></div></div></td><td><div>A</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Use this option to delete a host, or hosts, from any syslog level. Because you can only assign a specific host to one level, you do not need to specify the syslog level to remove the host from. Entries must be comma-separated. Up to 10 entries can be deleted at once.</p><p>The <b>get</b> command does not retrieve anything for this parameter.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>syslogport</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the port that syslog messages are sent to on the receiving hosts.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>syslogprefix</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div>You can use this prefix to include identifiers such as a license key, which may be required by remote syslog consumers for authentication or tracking purposes. There is a limit of 80 characters for the Prefix field. Most characters are supported.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>syslogprot</div><div><div><div><div></div></div></div><div></div></div></td><td><div>S</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Specify what protocol to use for the connection to a remote syslog server. Valid values are <b>tcp</b>, <b>udp</b>, and <b>tls</b>.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>syslogcert</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div>This parameter is only relevant when <b>tls</b> is specified as the <b>syslogprot</b>.<br />When <b>syslogcert</b> is enabled, it ensures that the host name or IP address that was used to initiate the secure connection resides in the Certificate Subject or Subject Alternative Names (SAN) of the certificate.</div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>\n\n<p>Up to 10 individual IP addresses and/or hostnames can be specified for each of the Syslog fields. Multiple IP addresses/hostnames must be differentiated using a comma-separated list.</p>\n<blockquote>\n<p>You cannot configure the same host for multiple levels.</p>\n</blockquote>\n","_postman_id":"f38b726c-e4c4-44b8-ad5a-d9b37a1d1ad9"},{"name":"SNMP Options","item":[],"id":"f4648ea6-051d-414b-b6eb-e182c60b29ca","description":"<p>Parameters relating to SNMP Logging Options that can be managed using get and set commands are detailed in the following table. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details about the <strong>get</strong> and <strong>set</strong> commands.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Additional Information</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>snmpcommunity</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the SNMP community string.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>snmpcontact</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the contact address that is sent in SNMP responses.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>snmpenable</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p><p> </p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>snmptrapenable</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enable the generation of SNMP events whenever a significant event occurs.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>snmpv1sink</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the sink address for SNMP type 1 traps.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>snmpv2sink</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the sink address for SNMP type 2 traps.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>snmpV3enable</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enable/disable SNMP V3.</p><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>snmpv3user</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the username.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>snmpv3userpasswd</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>A</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the user password.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>snmplocation</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the location that is sent in SNMP responses.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>snmpclient</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the list of machines that can access the SNMP subsystem. If no clients are specified, anyone can access SNMP.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>snmpHATrap</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Send SNMP traps from the shared IP address. This option is only available when the LoadMaster is in HA mode.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>snmpAuthProt</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the relevant authentication protocol:</p><p>MD5</p><p>SHA</p><p>SHA is a more secure protocol.</p><p><b>Note:</b> These values are case sensitive - please enter them in uppercase.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>snmpV3Privenable</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enable the SNMP V3 private password.</p><p>0 - Disabled</p><p>1 - Enabled</p><p><b>Note:</b> This parameter is not supported in the LTSF LoadMaster version yet.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>snmpv3privpasswd</div><div><div><div><div></div></div></div><div></div></div></td><td><div>A</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Specify the private password.<br /><b>Note:</b> This parameter is not supported in the LTSF LoadMaster version yet.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>snmpPrivProt</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the relevant privacy protocol:</p><p>- DES</p><p>- AES<br /></p><p>AES is a more secure protocol.</p><p><b>Note:</b> These values are case sensitive - enter them in uppercase.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","_postman_id":"f4648ea6-051d-414b-b6eb-e182c60b29ca"},{"name":"Email Options","item":[],"id":"714805f8-f14f-4ca9-8915-ae23bb3ebcb8","description":"<p>Parameters relating to Email Logging Options that can be managed using get and set commands are detailed in the following table. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details about the <strong>get</strong> and <strong>set</strong> commands.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Additional Information</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>emailcritical</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The email address to receive critical messages.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>emaildomain</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The domain, if required, for the user account authentication.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>emailemergency</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The email address to receive emergency messages.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>emailenable</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enables or disables the email logging options.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>emailerror</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The email address to receive error messages.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>emailinfo</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The email address to receive informational messages.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>emailnotice</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The email address to receive notices.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>emailpassword</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The email user's password.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>emailport</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-65535</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The TCP port on which your mail server accepts connections (usually 25).</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>emailserver</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The host name or address of the SMTP server to send mail messages through.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>emailsslmode</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-3</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the type of security protocol that should be used on the connection:</p><p>0 = None</p><p>1 = STARTTLS, if available</p><p>2 = STARTTLS</p><p>3 = SSL/TLS</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>emailuser</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The user account with access to send email messages.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>emailwarn</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The email address to receive warnings.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","_postman_id":"714805f8-f14f-4ca9-8915-ae23bb3ebcb8"}],"id":"257061dc-a7cc-42ba-ba1b-1f7e96b75836","description":"<p>Refer to the following sections for details on RESTful API commands relating to logging options.</p>\n","_postman_id":"257061dc-a7cc-42ba-ba1b-1f7e96b75836"},{"name":"Troubleshooting","item":[{"name":"Get/Set Debug Options","item":[],"id":"07bd5cba-f61d-4ede-a5ef-c0a512a18af0","description":"<p>Parameters relating to Troubleshooting that can be managed using <strong>get</strong> and <strong>set</strong> commands are detailed in the table below. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details about the <strong>get</strong> and <strong>set</strong> commands.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Parameter Description</b></p></td></tr><tr><td><p>backupnetstat</p></td><td><p>B</p></td><td><p>By default, the LoadMaster includes a Netstat output in backups taken. When this is included, backups take longer to complete. You can stop the Netstat output from being included by disabling this parameter.</p></td></tr><tr><td><p>netconsole</p></td><td><p>A</p></td><td><p>Netconsole is a kernel module which logs kernel printk messages over UDP allowing debugging of problems where disk logging fails. If this parameter is populated, the syslog daemon on a specific host will receive all critical kernel messages. This can help in understanding why a LoadMaster is rebooting. Netconsole is mainly used for capturing kernel panic output.</p><p>To unset this, set the value to an empty string.</p></td></tr><tr><td><p>netconsoleinterface</p></td><td><p>I</p></td><td><p>The interface which hosts the Netconsole.</p></td></tr></tbody></table>","_postman_id":"07bd5cba-f61d-4ede-a5ef-c0a512a18af0"},{"name":"Run a Top","item":[{"name":"Run a Top","id":"1887a809-fdf5-428b-ac8b-7c1213a4db84","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/top","description":"<p>Perform a top by running the <strong>logging/top</strong> command.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Parameter Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>iterations<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the number of samples (the default is 10 samples).</p><p>Range: 1-30</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>interval</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the interval between them (the default is a 1 second interval).</p><p>Range: 1-30</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>threads</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enable this option to show process threads (disabled by default).</p><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>mem</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>By default, the results are sorted by CPU usage (so the <b>mem</b> parameter is defaulted at 0 - Disabled). Enable the <b>mem</b> parameter to sort by memory usage instead.<br /></p><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","top"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"1620542f-8a53-4023-aa6f-cd0017e27a2a","name":"Run a Top","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/top"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 05:20:27 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <top>top - 05:20:27 up 5 days, 19:20,  0 users,  load average: 0.00, 0.04, 0.05\nTasks: 122 total,   1 running,  90 sleeping,   0 stopped,   0 zombie\n%Cpu(s):  0.4 us,  0.7 sy,  0.1 ni, 98.9 id,  0.0 wa,  0.0 hi,  0.0 si,  0.0 st\nKiB Mem:   2051184 total,   377616 used,  1673568 free,     1728 buffers\nKiB Swap:        0 total,        0 used,        0 free.   115728 cached Mem\n\n  PID USER      PR  NI    VIRT    RES    SHR S  %CPU %MEM     TIME+ COMMAND\n    1 root      20   0    4356   1400   1292 S   0.0  0.1   0:04.83 init\n    2 root      20   0       0      0      0 S   0.0  0.0   0:00.01 kthreadd\n    4 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/0:+\n    6 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 mm_percpu_+\n    7 root      20   0       0      0      0 S   0.0  0.0   0:12.13 ksoftirqd/0\n    8 root      20   0       0      0      0 I   0.0  0.0   0:49.61 rcu_sched\n    9 root      20   0       0      0      0 I   0.0  0.0   0:00.00 rcu_bh\n   10 root      rt   0       0      0      0 S   0.0  0.0   0:01.58 migration/0\n   11 root      rt   0       0      0      0 S   0.0  0.0   0:00.85 watchdog/0\n   12 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/0\n   13 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/1\n   14 root      rt   0       0      0      0 S   0.0  0.0   0:00.67 watchdog/1\n   15 root      rt   0       0      0      0 S   0.0  0.0   0:01.60 migration/1\n   16 root      20   0       0      0      0 S   0.0  0.0   0:11.08 ksoftirqd/1\n   17 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/1:0\n   18 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/1:+\n   19 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 netns\n   20 root      20   0       0      0      0 I   0.0  0.0   0:43.68 kworker/0:1\n   21 root      20   0       0      0      0 I   0.0  0.0   0:15.02 kworker/1:1\n   22 root      20   0       0      0      0 S   0.0  0.0   0:00.12 khungtaskd\n   23 root      20   0       0      0      0 S   0.0  0.0   0:00.00 oom_reaper\n   24 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 writeback\n   25 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kcompactd0\n   26 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 crypto\n   27 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kblockd\n   28 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ata_sff\n   29 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 watchdogd\n   43 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kswapd0\n   76 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 acpi_therm+\n   78 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_exch_wo+\n   79 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_rport_eq\n   80 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_event+\n   81 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_fip_q\n   82 root      20   0       0      0      0 S   0.0  0.0   0:00.00 scsi_eh_0\n   83 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 scsi_tmf_0\n   84 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 vmw_pvscsi+\n   85 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 nvme-wq\n   86 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ixgbevf\n   87 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/0:2\n   88 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ipv6_addrc+\n   89 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ext4-rsv-c+\n  146 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/0:+\n  280 bal       20   0   26844   1268    852 S   0.0  0.1   0:01.38 nscd\n  313 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop0\n  314 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/1:+\n  403 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop1\n  533 root      20   0    6992    696    612 S   0.0  0.0   0:00.00 dhclient\n  535 root      20   0   10168   3780   2676 S   0.0  0.2   0:01.02 dhclient\n  652 root      20   0   36868   2288   1784 S   0.0  0.1   0:00.00 syslog-ng\n  653 root      20   0  193260  14564   5112 S   0.0  0.7   0:02.51 syslog-ng\n  660 root      20   0    4488   1312   1208 S   0.0  0.1   0:00.00 klogd\n  696 root      20   0   15228   1580   1400 S   0.0  0.1   0:01.15 cron\n  744 root      20   0   11792   4840   2372 S   0.0  0.2  11:16.97 rrd-upd-al+\n  755 root      20   0    6508    124      0 S   0.0  0.0   0:11.46 inotifywait\n  800 root      20   0    9536   2592   2376 S   0.0  0.1   0:00.00 startDaemon\n  812 root      20   0   18728   4472   3928 S   0.0  0.2   0:00.99 ocspd\n  871 root      20   0    6728   1620   1504 S   0.0  0.1   0:00.05 httpd\n  901 root      20   0    9540   2584   2364 S   0.0  0.1   0:00.00 startDaemon\n  907 root      20   0   18820   5548   4612 S   0.0  0.3   0:03.53 sslproxy\n  935 root      20   0    9536   2628   2412 S   0.0  0.1   0:00.00 startDaemon\n  948 root      20   0   18464   1696   1352 S   0.0  0.1   0:00.01 occheck\n 1008 root      20   0  119772   5832   4100 S   0.0  0.3   4:46.40 vmtoolsd\n 1033 root      20   0    4540   1516   1404 S   0.0  0.1   0:05.01 flowd\n 1116 root      20   0    8680   1620   1516 S   0.0  0.1   0:00.00 mingetty\n 1117 root      20   0    8680   1560   1456 S   0.0  0.1   0:00.00 mingetty\n 1118 root      20   0    8680   1664   1568 S   0.0  0.1   0:00.00 mingetty\n 1119 root      20   0    8680   1632   1528 S   0.0  0.1   0:00.00 mingetty\n 1120 root      20   0    8680   1596   1492 S   0.0  0.1   0:00.00 mingetty\n 1121 root      20   0    8680   1616   1516 S   0.0  0.1   0:00.00 mingetty\n 1122 root      20   0    4360   1608   1496 S   0.0  0.1   0:00.01 getty\n 1756 root      20   0    9540   2628   2416 S   0.0  0.1   0:00.00 startDaemon\n 1764 root      20   0   47604   4156   3612 S   0.0  0.2   0:05.34 wafd\n 2085 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 l7comp\n 2150 root      20   0   13980   4676   3984 S   0.0  0.2   0:05.65 l7d\n 2153 root      20   0    4232    816    740 S   0.0  0.0   0:00.62 l7log\n 2160 root      20   0    9540   2576   2364 S   0.0  0.1   0:00.00 startDaemon\n 2168 root      20   0  123108   7136   6272 S   0.0  0.3   0:05.86 ssomgr\n 2176 root      20   0    9540   2588   2376 S   0.0  0.1   0:00.00 startDaemon\n 2190 root      20   0    4620   1952   1672 S   0.0  0.1   1:06.18 stats\n 2207 root      20   0    9536   2540   2324 S   0.0  0.1   0:00.00 startDaemon\n 2216 root      12  -8   18132   3400   2760 S   0.0  0.2   0:10.72 l4d\n 2275 root      20   0    9540   2588   2372 S   0.0  0.1   0:00.00 startDaemon\n 2281 root      20   0   18492   3112   2628 S   0.0  0.2   0:05.26 vsslproxy\n 2316 root      20   0    5004   2008   1324 S   0.0  0.1   0:00.36 binddb\n 2318 root      20   0   16672   2844   2160 S   0.0  0.1   0:01.92 geocheck\n 2322 root      20   0  370384  14648   7092 S   0.0  0.7   0:06.80 named\n 2337 root      20   0    9916   2960   2364 S   0.0  0.1  12:42.06 geomon\n 2377 root      20   0   18568   1756   1332 S   0.0  0.1   0:00.00 sshd\n 5508 root      20   0       0      0      0 I   0.0  0.0   0:00.01 kworker/u4+\n 9411 root      10 -10       0      0      0 S   0.0  0.0   0:00.59 l7s 2\n 9412 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 2\n 9413 root      10 -10       0      0      0 S   0.0  0.0   0:00.71 l7s 1\n 9414 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9415 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9416 root      20   0       0      0      0 S   0.0  0.0   0:00.65 l7flow 1\n 9417 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9418 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 1\n 9419 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 2\n 9420 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9421 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 2\n 9422 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 1\n 9423 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 2\n 9424 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9425 root      20   0       0      0      0 S   0.0  0.0   0:01.30 l7flow 2\n 9426 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 1\n 9427 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 2\n 9428 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n15503 root      10 -10  283812   4952   4224 S   0.0  0.2   0:02.42 vsslproxy\n18618 root      20   0    6740    116      0 S   0.0  0.0   0:00.00 httpd\n18652 bal       20   0   14232   1012    900 S   0.0  0.0   0:00.00 access\n18660 bal       20   0   11444   1920   1740 R   0.0  0.1   0:00.00 top\n18665 root      20   0    4348    804    728 S   0.0  0.0   0:00.00 sleep\n28203 root      10 -10       0      0      0 S   0.0  0.0   0:01.28 l7s 3\n28204 root      20   0       0      0      0 S   0.0  0.0   0:00.85 l7flow 3\n28205 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28206 root      20   0       0      0      0 S   0.0  0.0   0:01.31 l7flow 3\n28207 root      20   0       0      0      0 S   0.0  0.0   0:00.83 l7flow 3\n28208 root      20   0       0      0      0 S   0.0  0.0   0:00.80 l7flow 3\n28209 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28210 root      20   0       0      0      0 S   0.0  0.0   0:00.81 l7flow 3\n28211 root      20   0       0      0      0 S   0.0  0.0   0:01.35 l7flow 3\n32332 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/u4+\n\ntop - 05:20:28 up 5 days, 19:20,  0 users,  load average: 0.00, 0.04, 0.05\nTasks: 122 total,   1 running,  90 sleeping,   0 stopped,   0 zombie\n%Cpu(s):  0.5 us,  0.5 sy,  0.0 ni, 99.0 id,  0.0 wa,  0.0 hi,  0.0 si,  0.0 st\nKiB Mem:   2051184 total,   377616 used,  1673568 free,     1728 buffers\nKiB Swap:        0 total,        0 used,        0 free.   115728 cached Mem\n\n  PID USER      PR  NI    VIRT    RES    SHR S  %CPU %MEM     TIME+ COMMAND\n    1 root      20   0    4356   1400   1292 S   0.0  0.1   0:04.83 init\n    2 root      20   0       0      0      0 S   0.0  0.0   0:00.01 kthreadd\n    4 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/0:+\n    6 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 mm_percpu_+\n    7 root      20   0       0      0      0 S   0.0  0.0   0:12.13 ksoftirqd/0\n    8 root      20   0       0      0      0 I   0.0  0.0   0:49.61 rcu_sched\n    9 root      20   0       0      0      0 I   0.0  0.0   0:00.00 rcu_bh\n   10 root      rt   0       0      0      0 S   0.0  0.0   0:01.58 migration/0\n   11 root      rt   0       0      0      0 S   0.0  0.0   0:00.85 watchdog/0\n   12 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/0\n   13 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/1\n   14 root      rt   0       0      0      0 S   0.0  0.0   0:00.67 watchdog/1\n   15 root      rt   0       0      0      0 S   0.0  0.0   0:01.60 migration/1\n   16 root      20   0       0      0      0 S   0.0  0.0   0:11.08 ksoftirqd/1\n   17 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/1:0\n   18 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/1:+\n   19 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 netns\n   20 root      20   0       0      0      0 I   0.0  0.0   0:43.68 kworker/0:1\n   21 root      20   0       0      0      0 I   0.0  0.0   0:15.02 kworker/1:1\n   22 root      20   0       0      0      0 S   0.0  0.0   0:00.12 khungtaskd\n   23 root      20   0       0      0      0 S   0.0  0.0   0:00.00 oom_reaper\n   24 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 writeback\n   25 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kcompactd0\n   26 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 crypto\n   27 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kblockd\n   28 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ata_sff\n   29 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 watchdogd\n   43 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kswapd0\n   76 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 acpi_therm+\n   78 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_exch_wo+\n   79 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_rport_eq\n   80 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_event+\n   81 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_fip_q\n   82 root      20   0       0      0      0 S   0.0  0.0   0:00.00 scsi_eh_0\n   83 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 scsi_tmf_0\n   84 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 vmw_pvscsi+\n   85 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 nvme-wq\n   86 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ixgbevf\n   87 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/0:2\n   88 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ipv6_addrc+\n   89 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ext4-rsv-c+\n  146 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/0:+\n  280 bal       20   0   26844   1268    852 S   0.0  0.1   0:01.38 nscd\n  313 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop0\n  314 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/1:+\n  403 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop1\n  533 root      20   0    6992    696    612 S   0.0  0.0   0:00.00 dhclient\n  535 root      20   0   10168   3780   2676 S   0.0  0.2   0:01.02 dhclient\n  652 root      20   0   36868   2288   1784 S   0.0  0.1   0:00.00 syslog-ng\n  653 root      20   0  193260  14564   5112 S   0.0  0.7   0:02.51 syslog-ng\n  660 root      20   0    4488   1312   1208 S   0.0  0.1   0:00.00 klogd\n  696 root      20   0   15228   1580   1400 S   0.0  0.1   0:01.15 cron\n  744 root      20   0   11792   4840   2372 S   0.0  0.2  11:16.97 rrd-upd-al+\n  755 root      20   0    6508    124      0 S   0.0  0.0   0:11.46 inotifywait\n  800 root      20   0    9536   2592   2376 S   0.0  0.1   0:00.00 startDaemon\n  812 root      20   0   18728   4472   3928 S   0.0  0.2   0:00.99 ocspd\n  871 root      20   0    6728   1620   1504 S   0.0  0.1   0:00.05 httpd\n  901 root      20   0    9540   2584   2364 S   0.0  0.1   0:00.00 startDaemon\n  907 root      20   0   18820   5548   4612 S   0.0  0.3   0:03.53 sslproxy\n  935 root      20   0    9536   2628   2412 S   0.0  0.1   0:00.00 startDaemon\n  948 root      20   0   18464   1696   1352 S   0.0  0.1   0:00.01 occheck\n 1008 root      20   0  119772   5832   4100 S   0.0  0.3   4:46.40 vmtoolsd\n 1033 root      20   0    4540   1516   1404 S   0.0  0.1   0:05.01 flowd\n 1116 root      20   0    8680   1620   1516 S   0.0  0.1   0:00.00 mingetty\n 1117 root      20   0    8680   1560   1456 S   0.0  0.1   0:00.00 mingetty\n 1118 root      20   0    8680   1664   1568 S   0.0  0.1   0:00.00 mingetty\n 1119 root      20   0    8680   1632   1528 S   0.0  0.1   0:00.00 mingetty\n 1120 root      20   0    8680   1596   1492 S   0.0  0.1   0:00.00 mingetty\n 1121 root      20   0    8680   1616   1516 S   0.0  0.1   0:00.00 mingetty\n 1122 root      20   0    4360   1608   1496 S   0.0  0.1   0:00.01 getty\n 1756 root      20   0    9540   2628   2416 S   0.0  0.1   0:00.00 startDaemon\n 1764 root      20   0   47604   4156   3612 S   0.0  0.2   0:05.34 wafd\n 2085 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 l7comp\n 2150 root      20   0   13980   4676   3984 S   0.0  0.2   0:05.65 l7d\n 2153 root      20   0    4232    816    740 S   0.0  0.0   0:00.62 l7log\n 2160 root      20   0    9540   2576   2364 S   0.0  0.1   0:00.00 startDaemon\n 2168 root      20   0  123108   7136   6272 S   0.0  0.3   0:05.86 ssomgr\n 2176 root      20   0    9540   2588   2376 S   0.0  0.1   0:00.00 startDaemon\n 2190 root      20   0    4620   1952   1672 S   0.0  0.1   1:06.18 stats\n 2207 root      20   0    9536   2540   2324 S   0.0  0.1   0:00.00 startDaemon\n 2216 root      12  -8   18132   3400   2760 S   0.0  0.2   0:10.72 l4d\n 2275 root      20   0    9540   2588   2372 S   0.0  0.1   0:00.00 startDaemon\n 2281 root      20   0   18492   3112   2628 S   0.0  0.2   0:05.26 vsslproxy\n 2316 root      20   0    5004   2008   1324 S   0.0  0.1   0:00.36 binddb\n 2318 root      20   0   16672   2844   2160 S   0.0  0.1   0:01.92 geocheck\n 2322 root      20   0  370384  14648   7092 S   0.0  0.7   0:06.80 named\n 2337 root      20   0    9916   2960   2364 S   0.0  0.1  12:42.06 geomon\n 2377 root      20   0   18568   1756   1332 S   0.0  0.1   0:00.00 sshd\n 5508 root      20   0       0      0      0 I   0.0  0.0   0:00.01 kworker/u4+\n 9411 root      10 -10       0      0      0 S   0.0  0.0   0:00.59 l7s 2\n 9412 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 2\n 9413 root      10 -10       0      0      0 S   0.0  0.0   0:00.71 l7s 1\n 9414 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9415 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9416 root      20   0       0      0      0 S   0.0  0.0   0:00.65 l7flow 1\n 9417 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9418 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 1\n 9419 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 2\n 9420 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9421 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 2\n 9422 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 1\n 9423 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 2\n 9424 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9425 root      20   0       0      0      0 S   0.0  0.0   0:01.30 l7flow 2\n 9426 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 1\n 9427 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 2\n 9428 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n15503 root      10 -10  283812   4952   4224 S   0.0  0.2   0:02.42 vsslproxy\n18618 root      20   0    6740    116      0 S   0.0  0.0   0:00.00 httpd\n18652 bal       20   0   14232   1012    900 S   0.0  0.0   0:00.00 access\n18660 bal       20   0   11452   2204   1868 R   0.0  0.1   0:00.00 top\n18669 root      20   0    4348    752    676 S   0.0  0.0   0:00.00 sleep\n28203 root      10 -10       0      0      0 S   0.0  0.0   0:01.28 l7s 3\n28204 root      20   0       0      0      0 S   0.0  0.0   0:00.85 l7flow 3\n28205 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28206 root      20   0       0      0      0 S   0.0  0.0   0:01.31 l7flow 3\n28207 root      20   0       0      0      0 S   0.0  0.0   0:00.83 l7flow 3\n28208 root      20   0       0      0      0 S   0.0  0.0   0:00.80 l7flow 3\n28209 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28210 root      20   0       0      0      0 S   0.0  0.0   0:00.81 l7flow 3\n28211 root      20   0       0      0      0 S   0.0  0.0   0:01.35 l7flow 3\n32332 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/u4+\n\ntop - 05:20:29 up 5 days, 19:20,  0 users,  load average: 0.00, 0.04, 0.05\nTasks: 122 total,   1 running,  90 sleeping,   0 stopped,   0 zombie\n%Cpu(s):  0.5 us,  0.5 sy,  0.0 ni, 99.0 id,  0.0 wa,  0.0 hi,  0.0 si,  0.0 st\nKiB Mem:   2051184 total,   377616 used,  1673568 free,     1728 buffers\nKiB Swap:        0 total,        0 used,        0 free.   115728 cached Mem\n\n  PID USER      PR  NI    VIRT    RES    SHR S  %CPU %MEM     TIME+ COMMAND\n    1 root      20   0    4356   1400   1292 S   0.0  0.1   0:04.83 init\n    2 root      20   0       0      0      0 S   0.0  0.0   0:00.01 kthreadd\n    4 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/0:+\n    6 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 mm_percpu_+\n    7 root      20   0       0      0      0 S   0.0  0.0   0:12.13 ksoftirqd/0\n    8 root      20   0       0      0      0 I   0.0  0.0   0:49.61 rcu_sched\n    9 root      20   0       0      0      0 I   0.0  0.0   0:00.00 rcu_bh\n   10 root      rt   0       0      0      0 S   0.0  0.0   0:01.58 migration/0\n   11 root      rt   0       0      0      0 S   0.0  0.0   0:00.85 watchdog/0\n   12 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/0\n   13 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/1\n   14 root      rt   0       0      0      0 S   0.0  0.0   0:00.67 watchdog/1\n   15 root      rt   0       0      0      0 S   0.0  0.0   0:01.60 migration/1\n   16 root      20   0       0      0      0 S   0.0  0.0   0:11.08 ksoftirqd/1\n   17 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/1:0\n   18 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/1:+\n   19 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 netns\n   20 root      20   0       0      0      0 I   0.0  0.0   0:43.68 kworker/0:1\n   21 root      20   0       0      0      0 I   0.0  0.0   0:15.02 kworker/1:1\n   22 root      20   0       0      0      0 S   0.0  0.0   0:00.12 khungtaskd\n   23 root      20   0       0      0      0 S   0.0  0.0   0:00.00 oom_reaper\n   24 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 writeback\n   25 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kcompactd0\n   26 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 crypto\n   27 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kblockd\n   28 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ata_sff\n   29 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 watchdogd\n   43 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kswapd0\n   76 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 acpi_therm+\n   78 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_exch_wo+\n   79 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_rport_eq\n   80 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_event+\n   81 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_fip_q\n   82 root      20   0       0      0      0 S   0.0  0.0   0:00.00 scsi_eh_0\n   83 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 scsi_tmf_0\n   84 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 vmw_pvscsi+\n   85 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 nvme-wq\n   86 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ixgbevf\n   87 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/0:2\n   88 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ipv6_addrc+\n   89 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ext4-rsv-c+\n  146 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/0:+\n  280 bal       20   0   26844   1268    852 S   0.0  0.1   0:01.38 nscd\n  313 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop0\n  314 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/1:+\n  403 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop1\n  533 root      20   0    6992    696    612 S   0.0  0.0   0:00.00 dhclient\n  535 root      20   0   10168   3780   2676 S   0.0  0.2   0:01.02 dhclient\n  652 root      20   0   36868   2288   1784 S   0.0  0.1   0:00.00 syslog-ng\n  653 root      20   0  193260  14564   5112 S   0.0  0.7   0:02.51 syslog-ng\n  660 root      20   0    4488   1312   1208 S   0.0  0.1   0:00.00 klogd\n  696 root      20   0   15228   1580   1400 S   0.0  0.1   0:01.15 cron\n  744 root      20   0   11792   4840   2372 S   0.0  0.2  11:16.97 rrd-upd-al+\n  755 root      20   0    6508    124      0 S   0.0  0.0   0:11.46 inotifywait\n  800 root      20   0    9536   2592   2376 S   0.0  0.1   0:00.00 startDaemon\n  812 root      20   0   18728   4472   3928 S   0.0  0.2   0:00.99 ocspd\n  871 root      20   0    6728   1620   1504 S   0.0  0.1   0:00.05 httpd\n  901 root      20   0    9540   2584   2364 S   0.0  0.1   0:00.00 startDaemon\n  907 root      20   0   18820   5548   4612 S   0.0  0.3   0:03.53 sslproxy\n  935 root      20   0    9536   2628   2412 S   0.0  0.1   0:00.00 startDaemon\n  948 root      20   0   18464   1696   1352 S   0.0  0.1   0:00.01 occheck\n 1008 root      20   0  119772   5832   4100 S   0.0  0.3   4:46.40 vmtoolsd\n 1033 root      20   0    4540   1516   1404 S   0.0  0.1   0:05.01 flowd\n 1116 root      20   0    8680   1620   1516 S   0.0  0.1   0:00.00 mingetty\n 1117 root      20   0    8680   1560   1456 S   0.0  0.1   0:00.00 mingetty\n 1118 root      20   0    8680   1664   1568 S   0.0  0.1   0:00.00 mingetty\n 1119 root      20   0    8680   1632   1528 S   0.0  0.1   0:00.00 mingetty\n 1120 root      20   0    8680   1596   1492 S   0.0  0.1   0:00.00 mingetty\n 1121 root      20   0    8680   1616   1516 S   0.0  0.1   0:00.00 mingetty\n 1122 root      20   0    4360   1608   1496 S   0.0  0.1   0:00.01 getty\n 1756 root      20   0    9540   2628   2416 S   0.0  0.1   0:00.00 startDaemon\n 1764 root      20   0   47604   4156   3612 S   0.0  0.2   0:05.34 wafd\n 2085 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 l7comp\n 2150 root      20   0   13980   4676   3984 S   0.0  0.2   0:05.65 l7d\n 2153 root      20   0    4232    816    740 S   0.0  0.0   0:00.62 l7log\n 2160 root      20   0    9540   2576   2364 S   0.0  0.1   0:00.00 startDaemon\n 2168 root      20   0  123108   7136   6272 S   0.0  0.3   0:05.86 ssomgr\n 2176 root      20   0    9540   2588   2376 S   0.0  0.1   0:00.00 startDaemon\n 2190 root      20   0    4620   1952   1672 S   0.0  0.1   1:06.18 stats\n 2207 root      20   0    9536   2540   2324 S   0.0  0.1   0:00.00 startDaemon\n 2216 root      12  -8   18132   3400   2760 S   0.0  0.2   0:10.72 l4d\n 2275 root      20   0    9540   2588   2372 S   0.0  0.1   0:00.00 startDaemon\n 2281 root      20   0   18492   3112   2628 S   0.0  0.2   0:05.26 vsslproxy\n 2316 root      20   0    5004   2008   1324 S   0.0  0.1   0:00.36 binddb\n 2318 root      20   0   16672   2844   2160 S   0.0  0.1   0:01.92 geocheck\n 2322 root      20   0  370384  14648   7092 S   0.0  0.7   0:06.80 named\n 2337 root      20   0    9916   2960   2364 S   0.0  0.1  12:42.06 geomon\n 2377 root      20   0   18568   1756   1332 S   0.0  0.1   0:00.00 sshd\n 5508 root      20   0       0      0      0 I   0.0  0.0   0:00.01 kworker/u4+\n 9411 root      10 -10       0      0      0 S   0.0  0.0   0:00.59 l7s 2\n 9412 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 2\n 9413 root      10 -10       0      0      0 S   0.0  0.0   0:00.71 l7s 1\n 9414 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9415 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9416 root      20   0       0      0      0 S   0.0  0.0   0:00.65 l7flow 1\n 9417 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9418 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 1\n 9419 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 2\n 9420 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9421 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 2\n 9422 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 1\n 9423 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 2\n 9424 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9425 root      20   0       0      0      0 S   0.0  0.0   0:01.30 l7flow 2\n 9426 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 1\n 9427 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 2\n 9428 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n15503 root      10 -10  283812   4952   4224 S   0.0  0.2   0:02.42 vsslproxy\n18618 root      20   0    6740    116      0 S   0.0  0.0   0:00.00 httpd\n18652 bal       20   0   14232   1012    900 S   0.0  0.0   0:00.00 access\n18660 bal       20   0   11452   2204   1868 R   0.0  0.1   0:00.00 top\n18673 root      20   0    4348    808    732 S   0.0  0.0   0:00.00 sleep\n28203 root      10 -10       0      0      0 S   0.0  0.0   0:01.28 l7s 3\n28204 root      20   0       0      0      0 S   0.0  0.0   0:00.85 l7flow 3\n28205 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28206 root      20   0       0      0      0 S   0.0  0.0   0:01.31 l7flow 3\n28207 root      20   0       0      0      0 S   0.0  0.0   0:00.83 l7flow 3\n28208 root      20   0       0      0      0 S   0.0  0.0   0:00.80 l7flow 3\n28209 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28210 root      20   0       0      0      0 S   0.0  0.0   0:00.81 l7flow 3\n28211 root      20   0       0      0      0 S   0.0  0.0   0:01.35 l7flow 3\n32332 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/u4+\n\ntop - 05:20:30 up 5 days, 19:20,  0 users,  load average: 0.00, 0.04, 0.05\nTasks: 122 total,   1 running,  90 sleeping,   0 stopped,   0 zombie\n%Cpu(s):  0.5 us,  0.5 sy,  0.0 ni, 99.0 id,  0.0 wa,  0.0 hi,  0.0 si,  0.0 st\nKiB Mem:   2051184 total,   377748 used,  1673436 free,     1728 buffers\nKiB Swap:        0 total,        0 used,        0 free.   115728 cached Mem\n\n  PID USER      PR  NI    VIRT    RES    SHR S  %CPU %MEM     TIME+ COMMAND\n    1 root      20   0    4356   1400   1292 S   0.0  0.1   0:04.83 init\n    2 root      20   0       0      0      0 S   0.0  0.0   0:00.01 kthreadd\n    4 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/0:+\n    6 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 mm_percpu_+\n    7 root      20   0       0      0      0 S   0.0  0.0   0:12.13 ksoftirqd/0\n    8 root      20   0       0      0      0 I   0.0  0.0   0:49.61 rcu_sched\n    9 root      20   0       0      0      0 I   0.0  0.0   0:00.00 rcu_bh\n   10 root      rt   0       0      0      0 S   0.0  0.0   0:01.58 migration/0\n   11 root      rt   0       0      0      0 S   0.0  0.0   0:00.85 watchdog/0\n   12 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/0\n   13 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/1\n   14 root      rt   0       0      0      0 S   0.0  0.0   0:00.67 watchdog/1\n   15 root      rt   0       0      0      0 S   0.0  0.0   0:01.60 migration/1\n   16 root      20   0       0      0      0 S   0.0  0.0   0:11.08 ksoftirqd/1\n   17 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/1:0\n   18 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/1:+\n   19 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 netns\n   20 root      20   0       0      0      0 I   0.0  0.0   0:43.68 kworker/0:1\n   21 root      20   0       0      0      0 I   0.0  0.0   0:15.02 kworker/1:1\n   22 root      20   0       0      0      0 S   0.0  0.0   0:00.12 khungtaskd\n   23 root      20   0       0      0      0 S   0.0  0.0   0:00.00 oom_reaper\n   24 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 writeback\n   25 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kcompactd0\n   26 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 crypto\n   27 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kblockd\n   28 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ata_sff\n   29 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 watchdogd\n   43 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kswapd0\n   76 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 acpi_therm+\n   78 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_exch_wo+\n   79 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_rport_eq\n   80 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_event+\n   81 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_fip_q\n   82 root      20   0       0      0      0 S   0.0  0.0   0:00.00 scsi_eh_0\n   83 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 scsi_tmf_0\n   84 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 vmw_pvscsi+\n   85 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 nvme-wq\n   86 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ixgbevf\n   87 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/0:2\n   88 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ipv6_addrc+\n   89 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ext4-rsv-c+\n  146 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/0:+\n  280 bal       20   0   26844   1268    852 S   0.0  0.1   0:01.38 nscd\n  313 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop0\n  314 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/1:+\n  403 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop1\n  533 root      20   0    6992    696    612 S   0.0  0.0   0:00.00 dhclient\n  535 root      20   0   10168   3780   2676 S   0.0  0.2   0:01.02 dhclient\n  652 root      20   0   36868   2288   1784 S   0.0  0.1   0:00.00 syslog-ng\n  653 root      20   0  193260  14564   5112 S   0.0  0.7   0:02.51 syslog-ng\n  660 root      20   0    4488   1312   1208 S   0.0  0.1   0:00.00 klogd\n  696 root      20   0   15228   1580   1400 S   0.0  0.1   0:01.15 cron\n  744 root      20   0   11792   4840   2372 S   0.0  0.2  11:16.97 rrd-upd-al+\n  755 root      20   0    6508    124      0 S   0.0  0.0   0:11.46 inotifywait\n  800 root      20   0    9536   2592   2376 S   0.0  0.1   0:00.00 startDaemon\n  812 root      20   0   18728   4472   3928 S   0.0  0.2   0:00.99 ocspd\n  871 root      20   0    6728   1620   1504 S   0.0  0.1   0:00.05 httpd\n  901 root      20   0    9540   2584   2364 S   0.0  0.1   0:00.00 startDaemon\n  907 root      20   0   18820   5548   4612 S   0.0  0.3   0:03.53 sslproxy\n  935 root      20   0    9536   2628   2412 S   0.0  0.1   0:00.00 startDaemon\n  948 root      20   0   18464   1696   1352 S   0.0  0.1   0:00.01 occheck\n 1008 root      20   0  119772   5832   4100 S   0.0  0.3   4:46.40 vmtoolsd\n 1033 root      20   0    4540   1516   1404 S   0.0  0.1   0:05.01 flowd\n 1116 root      20   0    8680   1620   1516 S   0.0  0.1   0:00.00 mingetty\n 1117 root      20   0    8680   1560   1456 S   0.0  0.1   0:00.00 mingetty\n 1118 root      20   0    8680   1664   1568 S   0.0  0.1   0:00.00 mingetty\n 1119 root      20   0    8680   1632   1528 S   0.0  0.1   0:00.00 mingetty\n 1120 root      20   0    8680   1596   1492 S   0.0  0.1   0:00.00 mingetty\n 1121 root      20   0    8680   1616   1516 S   0.0  0.1   0:00.00 mingetty\n 1122 root      20   0    4360   1608   1496 S   0.0  0.1   0:00.01 getty\n 1756 root      20   0    9540   2628   2416 S   0.0  0.1   0:00.00 startDaemon\n 1764 root      20   0   47604   4156   3612 S   0.0  0.2   0:05.34 wafd\n 2085 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 l7comp\n 2150 root      20   0   13980   4676   3984 S   0.0  0.2   0:05.65 l7d\n 2153 root      20   0    4232    816    740 S   0.0  0.0   0:00.62 l7log\n 2160 root      20   0    9540   2576   2364 S   0.0  0.1   0:00.00 startDaemon\n 2168 root      20   0  123108   7136   6272 S   0.0  0.3   0:05.86 ssomgr\n 2176 root      20   0    9540   2588   2376 S   0.0  0.1   0:00.00 startDaemon\n 2190 root      20   0    4620   1952   1672 S   0.0  0.1   1:06.18 stats\n 2207 root      20   0    9536   2540   2324 S   0.0  0.1   0:00.00 startDaemon\n 2216 root      12  -8   18132   3400   2760 S   0.0  0.2   0:10.72 l4d\n 2275 root      20   0    9540   2588   2372 S   0.0  0.1   0:00.00 startDaemon\n 2281 root      20   0   18492   3112   2628 S   0.0  0.2   0:05.26 vsslproxy\n 2316 root      20   0    5004   2008   1324 S   0.0  0.1   0:00.36 binddb\n 2318 root      20   0   16672   2844   2160 S   0.0  0.1   0:01.92 geocheck\n 2322 root      20   0  370384  14648   7092 S   0.0  0.7   0:06.80 named\n 2337 root      20   0    9916   2960   2364 S   0.0  0.1  12:42.06 geomon\n 2377 root      20   0   18568   1756   1332 S   0.0  0.1   0:00.00 sshd\n 5508 root      20   0       0      0      0 I   0.0  0.0   0:00.01 kworker/u4+\n 9411 root      10 -10       0      0      0 S   0.0  0.0   0:00.59 l7s 2\n 9412 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 2\n 9413 root      10 -10       0      0      0 S   0.0  0.0   0:00.71 l7s 1\n 9414 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9415 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9416 root      20   0       0      0      0 S   0.0  0.0   0:00.65 l7flow 1\n 9417 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9418 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 1\n 9419 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 2\n 9420 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9421 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 2\n 9422 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 1\n 9423 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 2\n 9424 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9425 root      20   0       0      0      0 S   0.0  0.0   0:01.30 l7flow 2\n 9426 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 1\n 9427 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 2\n 9428 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n15503 root      10 -10  283812   4952   4224 S   0.0  0.2   0:02.42 vsslproxy\n18618 root      20   0    6740    116      0 S   0.0  0.0   0:00.00 httpd\n18652 bal       20   0   14232   1012    900 S   0.0  0.0   0:00.00 access\n18660 bal       20   0   11452   2204   1868 R   0.0  0.1   0:00.00 top\n18677 root      20   0    4348    700    624 S   0.0  0.0   0:00.00 sleep\n28203 root      10 -10       0      0      0 S   0.0  0.0   0:01.28 l7s 3\n28204 root      20   0       0      0      0 S   0.0  0.0   0:00.85 l7flow 3\n28205 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28206 root      20   0       0      0      0 S   0.0  0.0   0:01.31 l7flow 3\n28207 root      20   0       0      0      0 S   0.0  0.0   0:00.83 l7flow 3\n28208 root      20   0       0      0      0 S   0.0  0.0   0:00.80 l7flow 3\n28209 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28210 root      20   0       0      0      0 S   0.0  0.0   0:00.81 l7flow 3\n28211 root      20   0       0      0      0 S   0.0  0.0   0:01.35 l7flow 3\n32332 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/u4+\n\ntop - 05:20:31 up 5 days, 19:20,  0 users,  load average: 0.00, 0.04, 0.05\nTasks: 122 total,   1 running,  90 sleeping,   0 stopped,   0 zombie\n%Cpu(s):  0.5 us,  0.5 sy,  0.0 ni, 99.0 id,  0.0 wa,  0.0 hi,  0.0 si,  0.0 st\nKiB Mem:   2051184 total,   377748 used,  1673436 free,     1728 buffers\nKiB Swap:        0 total,        0 used,        0 free.   115728 cached Mem\n\n  PID USER      PR  NI    VIRT    RES    SHR S  %CPU %MEM     TIME+ COMMAND\n 2337 root      20   0    9916   2960   2364 S   1.0  0.1  12:42.07 geomon\n    1 root      20   0    4356   1400   1292 S   0.0  0.1   0:04.83 init\n    2 root      20   0       0      0      0 S   0.0  0.0   0:00.01 kthreadd\n    4 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/0:+\n    6 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 mm_percpu_+\n    7 root      20   0       0      0      0 S   0.0  0.0   0:12.13 ksoftirqd/0\n    8 root      20   0       0      0      0 I   0.0  0.0   0:49.61 rcu_sched\n    9 root      20   0       0      0      0 I   0.0  0.0   0:00.00 rcu_bh\n   10 root      rt   0       0      0      0 S   0.0  0.0   0:01.58 migration/0\n   11 root      rt   0       0      0      0 S   0.0  0.0   0:00.85 watchdog/0\n   12 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/0\n   13 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/1\n   14 root      rt   0       0      0      0 S   0.0  0.0   0:00.67 watchdog/1\n   15 root      rt   0       0      0      0 S   0.0  0.0   0:01.60 migration/1\n   16 root      20   0       0      0      0 S   0.0  0.0   0:11.08 ksoftirqd/1\n   17 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/1:0\n   18 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/1:+\n   19 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 netns\n   20 root      20   0       0      0      0 I   0.0  0.0   0:43.68 kworker/0:1\n   21 root      20   0       0      0      0 I   0.0  0.0   0:15.02 kworker/1:1\n   22 root      20   0       0      0      0 S   0.0  0.0   0:00.12 khungtaskd\n   23 root      20   0       0      0      0 S   0.0  0.0   0:00.00 oom_reaper\n   24 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 writeback\n   25 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kcompactd0\n   26 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 crypto\n   27 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kblockd\n   28 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ata_sff\n   29 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 watchdogd\n   43 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kswapd0\n   76 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 acpi_therm+\n   78 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_exch_wo+\n   79 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_rport_eq\n   80 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_event+\n   81 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_fip_q\n   82 root      20   0       0      0      0 S   0.0  0.0   0:00.00 scsi_eh_0\n   83 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 scsi_tmf_0\n   84 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 vmw_pvscsi+\n   85 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 nvme-wq\n   86 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ixgbevf\n   87 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/0:2\n   88 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ipv6_addrc+\n   89 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ext4-rsv-c+\n  146 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/0:+\n  280 bal       20   0   26844   1268    852 S   0.0  0.1   0:01.38 nscd\n  313 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop0\n  314 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/1:+\n  403 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop1\n  533 root      20   0    6992    696    612 S   0.0  0.0   0:00.00 dhclient\n  535 root      20   0   10168   3780   2676 S   0.0  0.2   0:01.02 dhclient\n  652 root      20   0   36868   2288   1784 S   0.0  0.1   0:00.00 syslog-ng\n  653 root      20   0  193260  14564   5112 S   0.0  0.7   0:02.51 syslog-ng\n  660 root      20   0    4488   1312   1208 S   0.0  0.1   0:00.00 klogd\n  696 root      20   0   15228   1580   1400 S   0.0  0.1   0:01.15 cron\n  744 root      20   0   11792   4840   2372 S   0.0  0.2  11:16.97 rrd-upd-al+\n  755 root      20   0    6508    124      0 S   0.0  0.0   0:11.46 inotifywait\n  800 root      20   0    9536   2592   2376 S   0.0  0.1   0:00.00 startDaemon\n  812 root      20   0   18728   4472   3928 S   0.0  0.2   0:00.99 ocspd\n  871 root      20   0    6728   1620   1504 S   0.0  0.1   0:00.05 httpd\n  901 root      20   0    9540   2584   2364 S   0.0  0.1   0:00.00 startDaemon\n  907 root      20   0   18820   5548   4612 S   0.0  0.3   0:03.53 sslproxy\n  935 root      20   0    9536   2628   2412 S   0.0  0.1   0:00.00 startDaemon\n  948 root      20   0   18464   1696   1352 S   0.0  0.1   0:00.01 occheck\n 1008 root      20   0  119772   5832   4100 S   0.0  0.3   4:46.40 vmtoolsd\n 1033 root      20   0    4540   1516   1404 S   0.0  0.1   0:05.01 flowd\n 1116 root      20   0    8680   1620   1516 S   0.0  0.1   0:00.00 mingetty\n 1117 root      20   0    8680   1560   1456 S   0.0  0.1   0:00.00 mingetty\n 1118 root      20   0    8680   1664   1568 S   0.0  0.1   0:00.00 mingetty\n 1119 root      20   0    8680   1632   1528 S   0.0  0.1   0:00.00 mingetty\n 1120 root      20   0    8680   1596   1492 S   0.0  0.1   0:00.00 mingetty\n 1121 root      20   0    8680   1616   1516 S   0.0  0.1   0:00.00 mingetty\n 1122 root      20   0    4360   1608   1496 S   0.0  0.1   0:00.01 getty\n 1756 root      20   0    9540   2628   2416 S   0.0  0.1   0:00.00 startDaemon\n 1764 root      20   0   47604   4156   3612 S   0.0  0.2   0:05.34 wafd\n 2085 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 l7comp\n 2150 root      20   0   13980   4676   3984 S   0.0  0.2   0:05.65 l7d\n 2153 root      20   0    4232    816    740 S   0.0  0.0   0:00.62 l7log\n 2160 root      20   0    9540   2576   2364 S   0.0  0.1   0:00.00 startDaemon\n 2168 root      20   0  123108   7136   6272 S   0.0  0.3   0:05.86 ssomgr\n 2176 root      20   0    9540   2588   2376 S   0.0  0.1   0:00.00 startDaemon\n 2190 root      20   0    4620   1952   1672 S   0.0  0.1   1:06.18 stats\n 2207 root      20   0    9536   2540   2324 S   0.0  0.1   0:00.00 startDaemon\n 2216 root      12  -8   18132   3400   2760 S   0.0  0.2   0:10.72 l4d\n 2275 root      20   0    9540   2588   2372 S   0.0  0.1   0:00.00 startDaemon\n 2281 root      20   0   18492   3112   2628 S   0.0  0.2   0:05.26 vsslproxy\n 2316 root      20   0    5004   2008   1324 S   0.0  0.1   0:00.36 binddb\n 2318 root      20   0   16672   2844   2160 S   0.0  0.1   0:01.92 geocheck\n 2322 root      20   0  370384  14648   7092 S   0.0  0.7   0:06.80 named\n 2377 root      20   0   18568   1756   1332 S   0.0  0.1   0:00.00 sshd\n 5508 root      20   0       0      0      0 I   0.0  0.0   0:00.01 kworker/u4+\n 9411 root      10 -10       0      0      0 S   0.0  0.0   0:00.59 l7s 2\n 9412 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 2\n 9413 root      10 -10       0      0      0 S   0.0  0.0   0:00.71 l7s 1\n 9414 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9415 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9416 root      20   0       0      0      0 S   0.0  0.0   0:00.65 l7flow 1\n 9417 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9418 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 1\n 9419 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 2\n 9420 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9421 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 2\n 9422 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 1\n 9423 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 2\n 9424 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9425 root      20   0       0      0      0 S   0.0  0.0   0:01.30 l7flow 2\n 9426 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 1\n 9427 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 2\n 9428 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n15503 root      10 -10  283812   4952   4224 S   0.0  0.2   0:02.42 vsslproxy\n18618 root      20   0    6740    116      0 S   0.0  0.0   0:00.00 httpd\n18652 bal       20   0   14232   1012    900 S   0.0  0.0   0:00.00 access\n18660 bal       20   0   11452   2204   1868 R   0.0  0.1   0:00.00 top\n18681 root      20   0    4348    632    560 S   0.0  0.0   0:00.00 sleep\n28203 root      10 -10       0      0      0 S   0.0  0.0   0:01.28 l7s 3\n28204 root      20   0       0      0      0 S   0.0  0.0   0:00.85 l7flow 3\n28205 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28206 root      20   0       0      0      0 S   0.0  0.0   0:01.31 l7flow 3\n28207 root      20   0       0      0      0 S   0.0  0.0   0:00.83 l7flow 3\n28208 root      20   0       0      0      0 S   0.0  0.0   0:00.80 l7flow 3\n28209 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28210 root      20   0       0      0      0 S   0.0  0.0   0:00.81 l7flow 3\n28211 root      20   0       0      0      0 S   0.0  0.0   0:01.35 l7flow 3\n32332 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/u4+\n\ntop - 05:20:32 up 5 days, 19:20,  0 users,  load average: 0.00, 0.04, 0.05\nTasks: 122 total,   1 running,  90 sleeping,   0 stopped,   0 zombie\n%Cpu(s):  1.0 us,  2.0 sy,  0.0 ni, 97.0 id,  0.0 wa,  0.0 hi,  0.0 si,  0.0 st\nKiB Mem:   2051184 total,   377748 used,  1673436 free,     1728 buffers\nKiB Swap:        0 total,        0 used,        0 free.   115728 cached Mem\n\n  PID USER      PR  NI    VIRT    RES    SHR S  %CPU %MEM     TIME+ COMMAND\n  744 root      20   0   11792   4840   2372 S   1.0  0.2  11:16.98 rrd-upd-al+\n18660 bal       20   0   11452   2204   1868 R   1.0  0.1   0:00.01 top\n    1 root      20   0    4356   1400   1292 S   0.0  0.1   0:04.83 init\n    2 root      20   0       0      0      0 S   0.0  0.0   0:00.01 kthreadd\n    4 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/0:+\n    6 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 mm_percpu_+\n    7 root      20   0       0      0      0 S   0.0  0.0   0:12.13 ksoftirqd/0\n    8 root      20   0       0      0      0 I   0.0  0.0   0:49.61 rcu_sched\n    9 root      20   0       0      0      0 I   0.0  0.0   0:00.00 rcu_bh\n   10 root      rt   0       0      0      0 S   0.0  0.0   0:01.58 migration/0\n   11 root      rt   0       0      0      0 S   0.0  0.0   0:00.85 watchdog/0\n   12 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/0\n   13 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/1\n   14 root      rt   0       0      0      0 S   0.0  0.0   0:00.67 watchdog/1\n   15 root      rt   0       0      0      0 S   0.0  0.0   0:01.60 migration/1\n   16 root      20   0       0      0      0 S   0.0  0.0   0:11.08 ksoftirqd/1\n   17 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/1:0\n   18 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/1:+\n   19 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 netns\n   20 root      20   0       0      0      0 I   0.0  0.0   0:43.68 kworker/0:1\n   21 root      20   0       0      0      0 I   0.0  0.0   0:15.02 kworker/1:1\n   22 root      20   0       0      0      0 S   0.0  0.0   0:00.12 khungtaskd\n   23 root      20   0       0      0      0 S   0.0  0.0   0:00.00 oom_reaper\n   24 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 writeback\n   25 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kcompactd0\n   26 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 crypto\n   27 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kblockd\n   28 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ata_sff\n   29 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 watchdogd\n   43 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kswapd0\n   76 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 acpi_therm+\n   78 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_exch_wo+\n   79 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_rport_eq\n   80 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_event+\n   81 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_fip_q\n   82 root      20   0       0      0      0 S   0.0  0.0   0:00.00 scsi_eh_0\n   83 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 scsi_tmf_0\n   84 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 vmw_pvscsi+\n   85 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 nvme-wq\n   86 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ixgbevf\n   87 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/0:2\n   88 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ipv6_addrc+\n   89 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ext4-rsv-c+\n  146 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/0:+\n  280 bal       20   0   26844   1268    852 S   0.0  0.1   0:01.38 nscd\n  313 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop0\n  314 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/1:+\n  403 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop1\n  533 root      20   0    6992    696    612 S   0.0  0.0   0:00.00 dhclient\n  535 root      20   0   10168   3780   2676 S   0.0  0.2   0:01.02 dhclient\n  652 root      20   0   36868   2288   1784 S   0.0  0.1   0:00.00 syslog-ng\n  653 root      20   0  193260  14564   5112 S   0.0  0.7   0:02.51 syslog-ng\n  660 root      20   0    4488   1312   1208 S   0.0  0.1   0:00.00 klogd\n  696 root      20   0   15228   1580   1400 S   0.0  0.1   0:01.15 cron\n  755 root      20   0    6508    124      0 S   0.0  0.0   0:11.46 inotifywait\n  800 root      20   0    9536   2592   2376 S   0.0  0.1   0:00.00 startDaemon\n  812 root      20   0   18728   4472   3928 S   0.0  0.2   0:00.99 ocspd\n  871 root      20   0    6728   1620   1504 S   0.0  0.1   0:00.05 httpd\n  901 root      20   0    9540   2584   2364 S   0.0  0.1   0:00.00 startDaemon\n  907 root      20   0   18820   5548   4612 S   0.0  0.3   0:03.53 sslproxy\n  935 root      20   0    9536   2628   2412 S   0.0  0.1   0:00.00 startDaemon\n  948 root      20   0   18464   1696   1352 S   0.0  0.1   0:00.01 occheck\n 1008 root      20   0  119772   5832   4100 S   0.0  0.3   4:46.40 vmtoolsd\n 1033 root      20   0    4540   1516   1404 S   0.0  0.1   0:05.01 flowd\n 1116 root      20   0    8680   1620   1516 S   0.0  0.1   0:00.00 mingetty\n 1117 root      20   0    8680   1560   1456 S   0.0  0.1   0:00.00 mingetty\n 1118 root      20   0    8680   1664   1568 S   0.0  0.1   0:00.00 mingetty\n 1119 root      20   0    8680   1632   1528 S   0.0  0.1   0:00.00 mingetty\n 1120 root      20   0    8680   1596   1492 S   0.0  0.1   0:00.00 mingetty\n 1121 root      20   0    8680   1616   1516 S   0.0  0.1   0:00.00 mingetty\n 1122 root      20   0    4360   1608   1496 S   0.0  0.1   0:00.01 getty\n 1756 root      20   0    9540   2628   2416 S   0.0  0.1   0:00.00 startDaemon\n 1764 root      20   0   47604   4156   3612 S   0.0  0.2   0:05.34 wafd\n 2085 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 l7comp\n 2150 root      20   0   13980   4676   3984 S   0.0  0.2   0:05.65 l7d\n 2153 root      20   0    4232    816    740 S   0.0  0.0   0:00.62 l7log\n 2160 root      20   0    9540   2576   2364 S   0.0  0.1   0:00.00 startDaemon\n 2168 root      20   0  123108   7136   6272 S   0.0  0.3   0:05.86 ssomgr\n 2176 root      20   0    9540   2588   2376 S   0.0  0.1   0:00.00 startDaemon\n 2190 root      20   0    4620   1952   1672 S   0.0  0.1   1:06.18 stats\n 2207 root      20   0    9536   2540   2324 S   0.0  0.1   0:00.00 startDaemon\n 2216 root      12  -8   18132   3400   2760 S   0.0  0.2   0:10.72 l4d\n 2275 root      20   0    9540   2588   2372 S   0.0  0.1   0:00.00 startDaemon\n 2281 root      20   0   18492   3112   2628 S   0.0  0.2   0:05.26 vsslproxy\n 2316 root      20   0    5004   2008   1324 S   0.0  0.1   0:00.36 binddb\n 2318 root      20   0   16672   2844   2160 S   0.0  0.1   0:01.92 geocheck\n 2322 root      20   0  370384  14648   7092 S   0.0  0.7   0:06.80 named\n 2337 root      20   0    9916   2960   2364 S   0.0  0.1  12:42.07 geomon\n 2377 root      20   0   18568   1756   1332 S   0.0  0.1   0:00.00 sshd\n 5508 root      20   0       0      0      0 I   0.0  0.0   0:00.01 kworker/u4+\n 9411 root      10 -10       0      0      0 S   0.0  0.0   0:00.59 l7s 2\n 9412 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 2\n 9413 root      10 -10       0      0      0 S   0.0  0.0   0:00.71 l7s 1\n 9414 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9415 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9416 root      20   0       0      0      0 S   0.0  0.0   0:00.65 l7flow 1\n 9417 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9418 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 1\n 9419 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 2\n 9420 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9421 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 2\n 9422 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 1\n 9423 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 2\n 9424 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9425 root      20   0       0      0      0 S   0.0  0.0   0:01.30 l7flow 2\n 9426 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 1\n 9427 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 2\n 9428 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n15503 root      10 -10  283812   4952   4224 S   0.0  0.2   0:02.42 vsslproxy\n18618 root      20   0    6740    116      0 S   0.0  0.0   0:00.00 httpd\n18652 bal       20   0   14232   1012    900 S   0.0  0.0   0:00.00 access\n18718 root      20   0    4348    648    568 S   0.0  0.0   0:00.00 sleep\n28203 root      10 -10       0      0      0 S   0.0  0.0   0:01.28 l7s 3\n28204 root      20   0       0      0      0 S   0.0  0.0   0:00.85 l7flow 3\n28205 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28206 root      20   0       0      0      0 S   0.0  0.0   0:01.31 l7flow 3\n28207 root      20   0       0      0      0 S   0.0  0.0   0:00.83 l7flow 3\n28208 root      20   0       0      0      0 S   0.0  0.0   0:00.80 l7flow 3\n28209 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28210 root      20   0       0      0      0 S   0.0  0.0   0:00.81 l7flow 3\n28211 root      20   0       0      0      0 S   0.0  0.0   0:01.35 l7flow 3\n32332 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/u4+\n\ntop - 05:20:33 up 5 days, 19:20,  0 users,  load average: 0.00, 0.04, 0.05\nTasks: 122 total,   1 running,  90 sleeping,   0 stopped,   0 zombie\n%Cpu(s):  0.5 us,  0.5 sy,  0.0 ni, 99.0 id,  0.0 wa,  0.0 hi,  0.0 si,  0.0 st\nKiB Mem:   2051184 total,   378012 used,  1673172 free,     1728 buffers\nKiB Swap:        0 total,        0 used,        0 free.   115728 cached Mem\n\n  PID USER      PR  NI    VIRT    RES    SHR S  %CPU %MEM     TIME+ COMMAND\n    1 root      20   0    4356   1400   1292 S   0.0  0.1   0:04.83 init\n    2 root      20   0       0      0      0 S   0.0  0.0   0:00.01 kthreadd\n    4 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/0:+\n    6 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 mm_percpu_+\n    7 root      20   0       0      0      0 S   0.0  0.0   0:12.13 ksoftirqd/0\n    8 root      20   0       0      0      0 I   0.0  0.0   0:49.61 rcu_sched\n    9 root      20   0       0      0      0 I   0.0  0.0   0:00.00 rcu_bh\n   10 root      rt   0       0      0      0 S   0.0  0.0   0:01.58 migration/0\n   11 root      rt   0       0      0      0 S   0.0  0.0   0:00.85 watchdog/0\n   12 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/0\n   13 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/1\n   14 root      rt   0       0      0      0 S   0.0  0.0   0:00.67 watchdog/1\n   15 root      rt   0       0      0      0 S   0.0  0.0   0:01.60 migration/1\n   16 root      20   0       0      0      0 S   0.0  0.0   0:11.08 ksoftirqd/1\n   17 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/1:0\n   18 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/1:+\n   19 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 netns\n   20 root      20   0       0      0      0 I   0.0  0.0   0:43.68 kworker/0:1\n   21 root      20   0       0      0      0 I   0.0  0.0   0:15.02 kworker/1:1\n   22 root      20   0       0      0      0 S   0.0  0.0   0:00.12 khungtaskd\n   23 root      20   0       0      0      0 S   0.0  0.0   0:00.00 oom_reaper\n   24 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 writeback\n   25 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kcompactd0\n   26 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 crypto\n   27 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kblockd\n   28 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ata_sff\n   29 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 watchdogd\n   43 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kswapd0\n   76 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 acpi_therm+\n   78 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_exch_wo+\n   79 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_rport_eq\n   80 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_event+\n   81 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_fip_q\n   82 root      20   0       0      0      0 S   0.0  0.0   0:00.00 scsi_eh_0\n   83 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 scsi_tmf_0\n   84 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 vmw_pvscsi+\n   85 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 nvme-wq\n   86 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ixgbevf\n   87 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/0:2\n   88 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ipv6_addrc+\n   89 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ext4-rsv-c+\n  146 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/0:+\n  280 bal       20   0   26844   1268    852 S   0.0  0.1   0:01.38 nscd\n  313 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop0\n  314 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/1:+\n  403 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop1\n  533 root      20   0    6992    696    612 S   0.0  0.0   0:00.00 dhclient\n  535 root      20   0   10168   3780   2676 S   0.0  0.2   0:01.02 dhclient\n  652 root      20   0   36868   2288   1784 S   0.0  0.1   0:00.00 syslog-ng\n  653 root      20   0  193260  14564   5112 S   0.0  0.7   0:02.51 syslog-ng\n  660 root      20   0    4488   1312   1208 S   0.0  0.1   0:00.00 klogd\n  696 root      20   0   15228   1580   1400 S   0.0  0.1   0:01.15 cron\n  744 root      20   0   11792   4840   2372 S   0.0  0.2  11:16.98 rrd-upd-al+\n  755 root      20   0    6508    124      0 S   0.0  0.0   0:11.46 inotifywait\n  800 root      20   0    9536   2592   2376 S   0.0  0.1   0:00.00 startDaemon\n  812 root      20   0   18728   4472   3928 S   0.0  0.2   0:00.99 ocspd\n  871 root      20   0    6728   1620   1504 S   0.0  0.1   0:00.05 httpd\n  901 root      20   0    9540   2584   2364 S   0.0  0.1   0:00.00 startDaemon\n  907 root      20   0   18820   5548   4612 S   0.0  0.3   0:03.53 sslproxy\n  935 root      20   0    9536   2628   2412 S   0.0  0.1   0:00.00 startDaemon\n  948 root      20   0   18464   1696   1352 S   0.0  0.1   0:00.01 occheck\n 1008 root      20   0  119772   5832   4100 S   0.0  0.3   4:46.40 vmtoolsd\n 1033 root      20   0    4540   1516   1404 S   0.0  0.1   0:05.01 flowd\n 1116 root      20   0    8680   1620   1516 S   0.0  0.1   0:00.00 mingetty\n 1117 root      20   0    8680   1560   1456 S   0.0  0.1   0:00.00 mingetty\n 1118 root      20   0    8680   1664   1568 S   0.0  0.1   0:00.00 mingetty\n 1119 root      20   0    8680   1632   1528 S   0.0  0.1   0:00.00 mingetty\n 1120 root      20   0    8680   1596   1492 S   0.0  0.1   0:00.00 mingetty\n 1121 root      20   0    8680   1616   1516 S   0.0  0.1   0:00.00 mingetty\n 1122 root      20   0    4360   1608   1496 S   0.0  0.1   0:00.01 getty\n 1756 root      20   0    9540   2628   2416 S   0.0  0.1   0:00.00 startDaemon\n 1764 root      20   0   47604   4156   3612 S   0.0  0.2   0:05.34 wafd\n 2085 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 l7comp\n 2150 root      20   0   13980   4676   3984 S   0.0  0.2   0:05.65 l7d\n 2153 root      20   0    4232    816    740 S   0.0  0.0   0:00.62 l7log\n 2160 root      20   0    9540   2576   2364 S   0.0  0.1   0:00.00 startDaemon\n 2168 root      20   0  123108   7136   6272 S   0.0  0.3   0:05.86 ssomgr\n 2176 root      20   0    9540   2588   2376 S   0.0  0.1   0:00.00 startDaemon\n 2190 root      20   0    4620   1952   1672 S   0.0  0.1   1:06.18 stats\n 2207 root      20   0    9536   2540   2324 S   0.0  0.1   0:00.00 startDaemon\n 2216 root      12  -8   18132   3400   2760 S   0.0  0.2   0:10.72 l4d\n 2275 root      20   0    9540   2588   2372 S   0.0  0.1   0:00.00 startDaemon\n 2281 root      20   0   18492   3112   2628 S   0.0  0.2   0:05.26 vsslproxy\n 2316 root      20   0    5004   2008   1324 S   0.0  0.1   0:00.36 binddb\n 2318 root      20   0   16672   2844   2160 S   0.0  0.1   0:01.92 geocheck\n 2322 root      20   0  370384  14648   7092 S   0.0  0.7   0:06.80 named\n 2337 root      20   0    9916   2960   2364 S   0.0  0.1  12:42.07 geomon\n 2377 root      20   0   18568   1756   1332 S   0.0  0.1   0:00.00 sshd\n 5508 root      20   0       0      0      0 I   0.0  0.0   0:00.01 kworker/u4+\n 9411 root      10 -10       0      0      0 S   0.0  0.0   0:00.59 l7s 2\n 9412 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 2\n 9413 root      10 -10       0      0      0 S   0.0  0.0   0:00.71 l7s 1\n 9414 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9415 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9416 root      20   0       0      0      0 S   0.0  0.0   0:00.65 l7flow 1\n 9417 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9418 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 1\n 9419 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 2\n 9420 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9421 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 2\n 9422 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 1\n 9423 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 2\n 9424 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9425 root      20   0       0      0      0 S   0.0  0.0   0:01.30 l7flow 2\n 9426 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 1\n 9427 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 2\n 9428 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n15503 root      10 -10  283812   4952   4224 S   0.0  0.2   0:02.42 vsslproxy\n18618 root      20   0    6740    116      0 S   0.0  0.0   0:00.00 httpd\n18652 bal       20   0   14232   1012    900 S   0.0  0.0   0:00.00 access\n18660 bal       20   0   11452   2204   1868 R   0.0  0.1   0:00.01 top\n18722 root      20   0    4348    640    564 S   0.0  0.0   0:00.00 sleep\n28203 root      10 -10       0      0      0 S   0.0  0.0   0:01.28 l7s 3\n28204 root      20   0       0      0      0 S   0.0  0.0   0:00.85 l7flow 3\n28205 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28206 root      20   0       0      0      0 S   0.0  0.0   0:01.31 l7flow 3\n28207 root      20   0       0      0      0 S   0.0  0.0   0:00.83 l7flow 3\n28208 root      20   0       0      0      0 S   0.0  0.0   0:00.80 l7flow 3\n28209 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28210 root      20   0       0      0      0 S   0.0  0.0   0:00.81 l7flow 3\n28211 root      20   0       0      0      0 S   0.0  0.0   0:01.35 l7flow 3\n32332 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/u4+\n\ntop - 05:20:34 up 5 days, 19:20,  0 users,  load average: 0.00, 0.04, 0.05\nTasks: 122 total,   1 running,  90 sleeping,   0 stopped,   0 zombie\n%Cpu(s):  0.5 us,  0.5 sy,  0.0 ni, 99.0 id,  0.0 wa,  0.0 hi,  0.0 si,  0.0 st\nKiB Mem:   2051184 total,   378012 used,  1673172 free,     1728 buffers\nKiB Swap:        0 total,        0 used,        0 free.   115728 cached Mem\n\n  PID USER      PR  NI    VIRT    RES    SHR S  %CPU %MEM     TIME+ COMMAND\n18660 bal       20   0   11452   2204   1868 R   1.0  0.1   0:00.02 top\n    1 root      20   0    4356   1400   1292 S   0.0  0.1   0:04.83 init\n    2 root      20   0       0      0      0 S   0.0  0.0   0:00.01 kthreadd\n    4 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/0:+\n    6 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 mm_percpu_+\n    7 root      20   0       0      0      0 S   0.0  0.0   0:12.13 ksoftirqd/0\n    8 root      20   0       0      0      0 I   0.0  0.0   0:49.61 rcu_sched\n    9 root      20   0       0      0      0 I   0.0  0.0   0:00.00 rcu_bh\n   10 root      rt   0       0      0      0 S   0.0  0.0   0:01.58 migration/0\n   11 root      rt   0       0      0      0 S   0.0  0.0   0:00.85 watchdog/0\n   12 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/0\n   13 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/1\n   14 root      rt   0       0      0      0 S   0.0  0.0   0:00.67 watchdog/1\n   15 root      rt   0       0      0      0 S   0.0  0.0   0:01.60 migration/1\n   16 root      20   0       0      0      0 S   0.0  0.0   0:11.08 ksoftirqd/1\n   17 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/1:0\n   18 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/1:+\n   19 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 netns\n   20 root      20   0       0      0      0 I   0.0  0.0   0:43.68 kworker/0:1\n   21 root      20   0       0      0      0 I   0.0  0.0   0:15.02 kworker/1:1\n   22 root      20   0       0      0      0 S   0.0  0.0   0:00.12 khungtaskd\n   23 root      20   0       0      0      0 S   0.0  0.0   0:00.00 oom_reaper\n   24 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 writeback\n   25 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kcompactd0\n   26 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 crypto\n   27 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kblockd\n   28 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ata_sff\n   29 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 watchdogd\n   43 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kswapd0\n   76 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 acpi_therm+\n   78 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_exch_wo+\n   79 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_rport_eq\n   80 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_event+\n   81 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_fip_q\n   82 root      20   0       0      0      0 S   0.0  0.0   0:00.00 scsi_eh_0\n   83 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 scsi_tmf_0\n   84 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 vmw_pvscsi+\n   85 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 nvme-wq\n   86 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ixgbevf\n   87 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/0:2\n   88 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ipv6_addrc+\n   89 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ext4-rsv-c+\n  146 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/0:+\n  280 bal       20   0   26844   1268    852 S   0.0  0.1   0:01.38 nscd\n  313 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop0\n  314 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/1:+\n  403 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop1\n  533 root      20   0    6992    696    612 S   0.0  0.0   0:00.00 dhclient\n  535 root      20   0   10168   3780   2676 S   0.0  0.2   0:01.02 dhclient\n  652 root      20   0   36868   2288   1784 S   0.0  0.1   0:00.00 syslog-ng\n  653 root      20   0  193260  14564   5112 S   0.0  0.7   0:02.51 syslog-ng\n  660 root      20   0    4488   1312   1208 S   0.0  0.1   0:00.00 klogd\n  696 root      20   0   15228   1580   1400 S   0.0  0.1   0:01.15 cron\n  744 root      20   0   11792   4840   2372 S   0.0  0.2  11:16.98 rrd-upd-al+\n  755 root      20   0    6508    124      0 S   0.0  0.0   0:11.46 inotifywait\n  800 root      20   0    9536   2592   2376 S   0.0  0.1   0:00.00 startDaemon\n  812 root      20   0   18728   4472   3928 S   0.0  0.2   0:00.99 ocspd\n  871 root      20   0    6728   1620   1504 S   0.0  0.1   0:00.05 httpd\n  901 root      20   0    9540   2584   2364 S   0.0  0.1   0:00.00 startDaemon\n  907 root      20   0   18820   5548   4612 S   0.0  0.3   0:03.53 sslproxy\n  935 root      20   0    9536   2628   2412 S   0.0  0.1   0:00.00 startDaemon\n  948 root      20   0   18464   1696   1352 S   0.0  0.1   0:00.01 occheck\n 1008 root      20   0  119772   5832   4100 S   0.0  0.3   4:46.40 vmtoolsd\n 1033 root      20   0    4540   1516   1404 S   0.0  0.1   0:05.01 flowd\n 1116 root      20   0    8680   1620   1516 S   0.0  0.1   0:00.00 mingetty\n 1117 root      20   0    8680   1560   1456 S   0.0  0.1   0:00.00 mingetty\n 1118 root      20   0    8680   1664   1568 S   0.0  0.1   0:00.00 mingetty\n 1119 root      20   0    8680   1632   1528 S   0.0  0.1   0:00.00 mingetty\n 1120 root      20   0    8680   1596   1492 S   0.0  0.1   0:00.00 mingetty\n 1121 root      20   0    8680   1616   1516 S   0.0  0.1   0:00.00 mingetty\n 1122 root      20   0    4360   1608   1496 S   0.0  0.1   0:00.01 getty\n 1756 root      20   0    9540   2628   2416 S   0.0  0.1   0:00.00 startDaemon\n 1764 root      20   0   47604   4156   3612 S   0.0  0.2   0:05.34 wafd\n 2085 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 l7comp\n 2150 root      20   0   13980   4676   3984 S   0.0  0.2   0:05.65 l7d\n 2153 root      20   0    4232    816    740 S   0.0  0.0   0:00.62 l7log\n 2160 root      20   0    9540   2576   2364 S   0.0  0.1   0:00.00 startDaemon\n 2168 root      20   0  123108   7136   6272 S   0.0  0.3   0:05.86 ssomgr\n 2176 root      20   0    9540   2588   2376 S   0.0  0.1   0:00.00 startDaemon\n 2190 root      20   0    4620   1952   1672 S   0.0  0.1   1:06.18 stats\n 2207 root      20   0    9536   2540   2324 S   0.0  0.1   0:00.00 startDaemon\n 2216 root      12  -8   18132   3400   2760 S   0.0  0.2   0:10.72 l4d\n 2275 root      20   0    9540   2588   2372 S   0.0  0.1   0:00.00 startDaemon\n 2281 root      20   0   18492   3112   2628 S   0.0  0.2   0:05.26 vsslproxy\n 2316 root      20   0    5004   2008   1324 S   0.0  0.1   0:00.36 binddb\n 2318 root      20   0   16672   2844   2160 S   0.0  0.1   0:01.92 geocheck\n 2322 root      20   0  370384  14648   7092 S   0.0  0.7   0:06.80 named\n 2337 root      20   0    9916   2960   2364 S   0.0  0.1  12:42.07 geomon\n 2377 root      20   0   18568   1756   1332 S   0.0  0.1   0:00.00 sshd\n 5508 root      20   0       0      0      0 I   0.0  0.0   0:00.01 kworker/u4+\n 9411 root      10 -10       0      0      0 S   0.0  0.0   0:00.59 l7s 2\n 9412 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 2\n 9413 root      10 -10       0      0      0 S   0.0  0.0   0:00.71 l7s 1\n 9414 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9415 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9416 root      20   0       0      0      0 S   0.0  0.0   0:00.65 l7flow 1\n 9417 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9418 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 1\n 9419 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 2\n 9420 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9421 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 2\n 9422 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 1\n 9423 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 2\n 9424 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9425 root      20   0       0      0      0 S   0.0  0.0   0:01.30 l7flow 2\n 9426 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 1\n 9427 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 2\n 9428 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n15503 root      10 -10  283812   4952   4224 S   0.0  0.2   0:02.42 vsslproxy\n18618 root      20   0    6740    116      0 S   0.0  0.0   0:00.00 httpd\n18652 bal       20   0   14232   2200   1980 S   0.0  0.1   0:00.00 access\n18726 root      20   0    4348    640    564 S   0.0  0.0   0:00.00 sleep\n28203 root      10 -10       0      0      0 S   0.0  0.0   0:01.28 l7s 3\n28204 root      20   0       0      0      0 S   0.0  0.0   0:00.85 l7flow 3\n28205 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28206 root      20   0       0      0      0 S   0.0  0.0   0:01.31 l7flow 3\n28207 root      20   0       0      0      0 S   0.0  0.0   0:00.83 l7flow 3\n28208 root      20   0       0      0      0 S   0.0  0.0   0:00.80 l7flow 3\n28209 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28210 root      20   0       0      0      0 S   0.0  0.0   0:00.81 l7flow 3\n28211 root      20   0       0      0      0 S   0.0  0.0   0:01.35 l7flow 3\n32332 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/u4+\n\ntop - 05:20:35 up 5 days, 19:20,  0 users,  load average: 0.00, 0.04, 0.05\nTasks: 122 total,   1 running,  90 sleeping,   0 stopped,   0 zombie\n%Cpu(s):  0.0 us,  0.5 sy,  0.0 ni, 99.5 id,  0.0 wa,  0.0 hi,  0.0 si,  0.0 st\nKiB Mem:   2051184 total,   378012 used,  1673172 free,     1728 buffers\nKiB Swap:        0 total,        0 used,        0 free.   115728 cached Mem\n\n  PID USER      PR  NI    VIRT    RES    SHR S  %CPU %MEM     TIME+ COMMAND\n 1008 root      20   0  119772   5832   4100 S   1.0  0.3   4:46.41 vmtoolsd\n    1 root      20   0    4356   1400   1292 S   0.0  0.1   0:04.83 init\n    2 root      20   0       0      0      0 S   0.0  0.0   0:00.01 kthreadd\n    4 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/0:+\n    6 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 mm_percpu_+\n    7 root      20   0       0      0      0 S   0.0  0.0   0:12.13 ksoftirqd/0\n    8 root      20   0       0      0      0 I   0.0  0.0   0:49.61 rcu_sched\n    9 root      20   0       0      0      0 I   0.0  0.0   0:00.00 rcu_bh\n   10 root      rt   0       0      0      0 S   0.0  0.0   0:01.58 migration/0\n   11 root      rt   0       0      0      0 S   0.0  0.0   0:00.85 watchdog/0\n   12 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/0\n   13 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/1\n   14 root      rt   0       0      0      0 S   0.0  0.0   0:00.67 watchdog/1\n   15 root      rt   0       0      0      0 S   0.0  0.0   0:01.60 migration/1\n   16 root      20   0       0      0      0 S   0.0  0.0   0:11.08 ksoftirqd/1\n   17 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/1:0\n   18 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/1:+\n   19 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 netns\n   20 root      20   0       0      0      0 I   0.0  0.0   0:43.68 kworker/0:1\n   21 root      20   0       0      0      0 I   0.0  0.0   0:15.02 kworker/1:1\n   22 root      20   0       0      0      0 S   0.0  0.0   0:00.12 khungtaskd\n   23 root      20   0       0      0      0 S   0.0  0.0   0:00.00 oom_reaper\n   24 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 writeback\n   25 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kcompactd0\n   26 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 crypto\n   27 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kblockd\n   28 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ata_sff\n   29 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 watchdogd\n   43 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kswapd0\n   76 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 acpi_therm+\n   78 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_exch_wo+\n   79 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_rport_eq\n   80 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_event+\n   81 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_fip_q\n   82 root      20   0       0      0      0 S   0.0  0.0   0:00.00 scsi_eh_0\n   83 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 scsi_tmf_0\n   84 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 vmw_pvscsi+\n   85 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 nvme-wq\n   86 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ixgbevf\n   87 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/0:2\n   88 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ipv6_addrc+\n   89 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ext4-rsv-c+\n  146 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/0:+\n  280 bal       20   0   26844   1268    852 S   0.0  0.1   0:01.38 nscd\n  313 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop0\n  314 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/1:+\n  403 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop1\n  533 root      20   0    6992    696    612 S   0.0  0.0   0:00.00 dhclient\n  535 root      20   0   10168   3780   2676 S   0.0  0.2   0:01.02 dhclient\n  652 root      20   0   36868   2288   1784 S   0.0  0.1   0:00.00 syslog-ng\n  653 root      20   0  193260  14564   5112 S   0.0  0.7   0:02.51 syslog-ng\n  660 root      20   0    4488   1312   1208 S   0.0  0.1   0:00.00 klogd\n  696 root      20   0   15228   1580   1400 S   0.0  0.1   0:01.15 cron\n  744 root      20   0   11792   4840   2372 S   0.0  0.2  11:16.98 rrd-upd-al+\n  755 root      20   0    6508    124      0 S   0.0  0.0   0:11.46 inotifywait\n  800 root      20   0    9536   2592   2376 S   0.0  0.1   0:00.00 startDaemon\n  812 root      20   0   18728   4472   3928 S   0.0  0.2   0:00.99 ocspd\n  871 root      20   0    6728   1620   1504 S   0.0  0.1   0:00.05 httpd\n  901 root      20   0    9540   2584   2364 S   0.0  0.1   0:00.00 startDaemon\n  907 root      20   0   18820   5548   4612 S   0.0  0.3   0:03.53 sslproxy\n  935 root      20   0    9536   2628   2412 S   0.0  0.1   0:00.00 startDaemon\n  948 root      20   0   18464   1696   1352 S   0.0  0.1   0:00.01 occheck\n 1033 root      20   0    4540   1516   1404 S   0.0  0.1   0:05.01 flowd\n 1116 root      20   0    8680   1620   1516 S   0.0  0.1   0:00.00 mingetty\n 1117 root      20   0    8680   1560   1456 S   0.0  0.1   0:00.00 mingetty\n 1118 root      20   0    8680   1664   1568 S   0.0  0.1   0:00.00 mingetty\n 1119 root      20   0    8680   1632   1528 S   0.0  0.1   0:00.00 mingetty\n 1120 root      20   0    8680   1596   1492 S   0.0  0.1   0:00.00 mingetty\n 1121 root      20   0    8680   1616   1516 S   0.0  0.1   0:00.00 mingetty\n 1122 root      20   0    4360   1608   1496 S   0.0  0.1   0:00.01 getty\n 1756 root      20   0    9540   2628   2416 S   0.0  0.1   0:00.00 startDaemon\n 1764 root      20   0   47604   4156   3612 S   0.0  0.2   0:05.34 wafd\n 2085 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 l7comp\n 2150 root      20   0   13980   4676   3984 S   0.0  0.2   0:05.65 l7d\n 2153 root      20   0    4232    816    740 S   0.0  0.0   0:00.62 l7log\n 2160 root      20   0    9540   2576   2364 S   0.0  0.1   0:00.00 startDaemon\n 2168 root      20   0  123108   7136   6272 S   0.0  0.3   0:05.86 ssomgr\n 2176 root      20   0    9540   2588   2376 S   0.0  0.1   0:00.00 startDaemon\n 2190 root      20   0    4620   1952   1672 S   0.0  0.1   1:06.18 stats\n 2207 root      20   0    9536   2540   2324 S   0.0  0.1   0:00.00 startDaemon\n 2216 root      12  -8   18132   3400   2760 S   0.0  0.2   0:10.72 l4d\n 2275 root      20   0    9540   2588   2372 S   0.0  0.1   0:00.00 startDaemon\n 2281 root      20   0   18492   3112   2628 S   0.0  0.2   0:05.26 vsslproxy\n 2316 root      20   0    5004   2008   1324 S   0.0  0.1   0:00.36 binddb\n 2318 root      20   0   16672   2844   2160 S   0.0  0.1   0:01.92 geocheck\n 2322 root      20   0  370384  14648   7092 S   0.0  0.7   0:06.80 named\n 2337 root      20   0    9916   2960   2364 S   0.0  0.1  12:42.07 geomon\n 2377 root      20   0   18568   1756   1332 S   0.0  0.1   0:00.00 sshd\n 5508 root      20   0       0      0      0 I   0.0  0.0   0:00.01 kworker/u4+\n 9411 root      10 -10       0      0      0 S   0.0  0.0   0:00.59 l7s 2\n 9412 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 2\n 9413 root      10 -10       0      0      0 S   0.0  0.0   0:00.71 l7s 1\n 9414 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9415 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9416 root      20   0       0      0      0 S   0.0  0.0   0:00.65 l7flow 1\n 9417 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9418 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 1\n 9419 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 2\n 9420 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9421 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 2\n 9422 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 1\n 9423 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 2\n 9424 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9425 root      20   0       0      0      0 S   0.0  0.0   0:01.30 l7flow 2\n 9426 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 1\n 9427 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 2\n 9428 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n15503 root      10 -10  283812   4952   4224 S   0.0  0.2   0:02.42 vsslproxy\n18618 root      20   0    6740    116      0 S   0.0  0.0   0:00.00 httpd\n18652 bal       20   0   14232   2200   1980 S   0.0  0.1   0:00.00 access\n18660 bal       20   0   11452   2204   1868 R   0.0  0.1   0:00.02 top\n18730 root      20   0    4348    636    560 S   0.0  0.0   0:00.00 sleep\n28203 root      10 -10       0      0      0 S   0.0  0.0   0:01.28 l7s 3\n28204 root      20   0       0      0      0 S   0.0  0.0   0:00.85 l7flow 3\n28205 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28206 root      20   0       0      0      0 S   0.0  0.0   0:01.31 l7flow 3\n28207 root      20   0       0      0      0 S   0.0  0.0   0:00.83 l7flow 3\n28208 root      20   0       0      0      0 S   0.0  0.0   0:00.80 l7flow 3\n28209 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28210 root      20   0       0      0      0 S   0.0  0.0   0:00.81 l7flow 3\n28211 root      20   0       0      0      0 S   0.0  0.0   0:01.35 l7flow 3\n32332 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/u4+\n\ntop - 05:20:36 up 5 days, 19:20,  0 users,  load average: 0.00, 0.04, 0.05\nTasks: 122 total,   1 running,  90 sleeping,   0 stopped,   0 zombie\n%Cpu(s):  0.5 us,  0.5 sy,  0.0 ni, 99.0 id,  0.0 wa,  0.0 hi,  0.0 si,  0.0 st\nKiB Mem:   2051184 total,   378004 used,  1673180 free,     1728 buffers\nKiB Swap:        0 total,        0 used,        0 free.   115728 cached Mem\n\n  PID USER      PR  NI    VIRT    RES    SHR S  %CPU %MEM     TIME+ COMMAND\n    1 root      20   0    4356   1400   1292 S   0.0  0.1   0:04.83 init\n    2 root      20   0       0      0      0 S   0.0  0.0   0:00.01 kthreadd\n    4 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/0:+\n    6 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 mm_percpu_+\n    7 root      20   0       0      0      0 S   0.0  0.0   0:12.13 ksoftirqd/0\n    8 root      20   0       0      0      0 I   0.0  0.0   0:49.61 rcu_sched\n    9 root      20   0       0      0      0 I   0.0  0.0   0:00.00 rcu_bh\n   10 root      rt   0       0      0      0 S   0.0  0.0   0:01.58 migration/0\n   11 root      rt   0       0      0      0 S   0.0  0.0   0:00.85 watchdog/0\n   12 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/0\n   13 root      20   0       0      0      0 S   0.0  0.0   0:00.00 cpuhp/1\n   14 root      rt   0       0      0      0 S   0.0  0.0   0:00.67 watchdog/1\n   15 root      rt   0       0      0      0 S   0.0  0.0   0:01.60 migration/1\n   16 root      20   0       0      0      0 S   0.0  0.0   0:11.08 ksoftirqd/1\n   17 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/1:0\n   18 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kworker/1:+\n   19 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 netns\n   20 root      20   0       0      0      0 I   0.0  0.0   0:43.68 kworker/0:1\n   21 root      20   0       0      0      0 I   0.0  0.0   0:15.02 kworker/1:1\n   22 root      20   0       0      0      0 S   0.0  0.0   0:00.12 khungtaskd\n   23 root      20   0       0      0      0 S   0.0  0.0   0:00.00 oom_reaper\n   24 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 writeback\n   25 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kcompactd0\n   26 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 crypto\n   27 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 kblockd\n   28 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ata_sff\n   29 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 watchdogd\n   43 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kswapd0\n   76 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 acpi_therm+\n   78 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_exch_wo+\n   79 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fc_rport_eq\n   80 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_event+\n   81 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 fnic_fip_q\n   82 root      20   0       0      0      0 S   0.0  0.0   0:00.00 scsi_eh_0\n   83 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 scsi_tmf_0\n   84 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 vmw_pvscsi+\n   85 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 nvme-wq\n   86 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ixgbevf\n   87 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/0:2\n   88 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ipv6_addrc+\n   89 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 ext4-rsv-c+\n  146 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/0:+\n  280 bal       20   0   26844   1268    852 S   0.0  0.1   0:01.38 nscd\n  313 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop0\n  314 root       0 -20       0      0      0 I   0.0  0.0   0:00.03 kworker/1:+\n  403 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 loop1\n  533 root      20   0    6992    696    612 S   0.0  0.0   0:00.00 dhclient\n  535 root      20   0   10168   3780   2676 S   0.0  0.2   0:01.02 dhclient\n  652 root      20   0   36868   2288   1784 S   0.0  0.1   0:00.00 syslog-ng\n  653 root      20   0  193260  14564   5112 S   0.0  0.7   0:02.51 syslog-ng\n  660 root      20   0    4488   1312   1208 S   0.0  0.1   0:00.00 klogd\n  696 root      20   0   15228   1580   1400 S   0.0  0.1   0:01.15 cron\n  744 root      20   0   11792   4840   2372 S   0.0  0.2  11:16.98 rrd-upd-al+\n  755 root      20   0    6508    124      0 S   0.0  0.0   0:11.46 inotifywait\n  800 root      20   0    9536   2592   2376 S   0.0  0.1   0:00.00 startDaemon\n  812 root      20   0   18728   4472   3928 S   0.0  0.2   0:00.99 ocspd\n  871 root      20   0    6728   1620   1504 S   0.0  0.1   0:00.05 httpd\n  901 root      20   0    9540   2584   2364 S   0.0  0.1   0:00.00 startDaemon\n  907 root      20   0   18820   5548   4612 S   0.0  0.3   0:03.53 sslproxy\n  935 root      20   0    9536   2628   2412 S   0.0  0.1   0:00.00 startDaemon\n  948 root      20   0   18464   1696   1352 S   0.0  0.1   0:00.01 occheck\n 1008 root      20   0  119772   5832   4100 S   0.0  0.3   4:46.41 vmtoolsd\n 1033 root      20   0    4540   1516   1404 S   0.0  0.1   0:05.01 flowd\n 1116 root      20   0    8680   1620   1516 S   0.0  0.1   0:00.00 mingetty\n 1117 root      20   0    8680   1560   1456 S   0.0  0.1   0:00.00 mingetty\n 1118 root      20   0    8680   1664   1568 S   0.0  0.1   0:00.00 mingetty\n 1119 root      20   0    8680   1632   1528 S   0.0  0.1   0:00.00 mingetty\n 1120 root      20   0    8680   1596   1492 S   0.0  0.1   0:00.00 mingetty\n 1121 root      20   0    8680   1616   1516 S   0.0  0.1   0:00.00 mingetty\n 1122 root      20   0    4360   1608   1496 S   0.0  0.1   0:00.01 getty\n 1756 root      20   0    9540   2628   2416 S   0.0  0.1   0:00.00 startDaemon\n 1764 root      20   0   47604   4156   3612 S   0.0  0.2   0:05.34 wafd\n 2085 root       0 -20       0      0      0 I   0.0  0.0   0:00.00 l7comp\n 2150 root      20   0   13980   4676   3984 S   0.0  0.2   0:05.65 l7d\n 2153 root      20   0    4232    816    740 S   0.0  0.0   0:00.62 l7log\n 2160 root      20   0    9540   2576   2364 S   0.0  0.1   0:00.00 startDaemon\n 2168 root      20   0  123108   7136   6272 S   0.0  0.3   0:05.86 ssomgr\n 2176 root      20   0    9540   2588   2376 S   0.0  0.1   0:00.00 startDaemon\n 2190 root      20   0    4620   1952   1672 S   0.0  0.1   1:06.18 stats\n 2207 root      20   0    9536   2540   2324 S   0.0  0.1   0:00.00 startDaemon\n 2216 root      12  -8   18132   3400   2760 S   0.0  0.2   0:10.72 l4d\n 2275 root      20   0    9540   2588   2372 S   0.0  0.1   0:00.00 startDaemon\n 2281 root      20   0   18492   3112   2628 S   0.0  0.2   0:05.26 vsslproxy\n 2316 root      20   0    5004   2008   1324 S   0.0  0.1   0:00.36 binddb\n 2318 root      20   0   16672   2844   2160 S   0.0  0.1   0:01.92 geocheck\n 2322 root      20   0  370384  14648   7092 S   0.0  0.7   0:06.80 named\n 2337 root      20   0    9916   2960   2364 S   0.0  0.1  12:42.07 geomon\n 2377 root      20   0   18568   1756   1332 S   0.0  0.1   0:00.00 sshd\n 5508 root      20   0       0      0      0 I   0.0  0.0   0:00.01 kworker/u4+\n 9411 root      10 -10       0      0      0 S   0.0  0.0   0:00.59 l7s 2\n 9412 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 2\n 9413 root      10 -10       0      0      0 S   0.0  0.0   0:00.71 l7s 1\n 9414 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9415 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9416 root      20   0       0      0      0 S   0.0  0.0   0:00.65 l7flow 1\n 9417 root      20   0       0      0      0 S   0.0  0.0   0:00.61 l7flow 2\n 9418 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 1\n 9419 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 2\n 9420 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9421 root      20   0       0      0      0 S   0.0  0.0   0:00.57 l7flow 2\n 9422 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 1\n 9423 root      20   0       0      0      0 S   0.0  0.0   0:00.62 l7flow 2\n 9424 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n 9425 root      20   0       0      0      0 S   0.0  0.0   0:01.30 l7flow 2\n 9426 root      20   0       0      0      0 S   0.0  0.0   0:00.60 l7flow 1\n 9427 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 2\n 9428 root      20   0       0      0      0 S   0.0  0.0   0:00.56 l7flow 1\n15503 root      10 -10  283812   4952   4224 S   0.0  0.2   0:02.42 vsslproxy\n18618 root      20   0    6740    116      0 S   0.0  0.0   0:00.00 httpd\n18652 bal       20   0   14232   2200   1980 S   0.0  0.1   0:00.00 access\n18660 bal       20   0   11452   2204   1868 R   0.0  0.1   0:00.02 top\n18734 root      20   0    4348    696    616 S   0.0  0.0   0:00.00 sleep\n28203 root      10 -10       0      0      0 S   0.0  0.0   0:01.28 l7s 3\n28204 root      20   0       0      0      0 S   0.0  0.0   0:00.85 l7flow 3\n28205 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28206 root      20   0       0      0      0 S   0.0  0.0   0:01.31 l7flow 3\n28207 root      20   0       0      0      0 S   0.0  0.0   0:00.83 l7flow 3\n28208 root      20   0       0      0      0 S   0.0  0.0   0:00.80 l7flow 3\n28209 root      20   0       0      0      0 S   0.0  0.0   0:00.84 l7flow 3\n28210 root      20   0       0      0      0 S   0.0  0.0   0:00.81 l7flow 3\n28211 root      20   0       0      0      0 S   0.0  0.0   0:01.35 l7flow 3\n32332 root      20   0       0      0      0 I   0.0  0.0   0:00.00 kworker/u4+\n</top>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"1887a809-fdf5-428b-ac8b-7c1213a4db84"},{"name":"Run a Top Command using Optional Parameters","id":"58478c28-5863-4a41-b126-056f7f53277d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/top?iterations=4&interval=3&threads=1&mem=1","description":"<p>Perform a top by running the <strong>logging/top</strong> command.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Parameter Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>iterations<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the number of samples (the default is 10 samples).</p><p>Range: 1-30</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>interval</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify the interval between them (the default is a 1 second interval).</p><p>Range: 1-30</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>threads</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enable this option to show process threads (disabled by default).</p><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>mem</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>By default, the results are sorted by CPU usage (so the <b>mem</b> parameter is defaulted at 0 - Disabled). Enable the <b>mem</b> parameter to sort by memory usage instead.<br /></p><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","top"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"iterations","value":"4"},{"key":"interval","value":"3"},{"key":"threads","value":"1"},{"key":"mem","value":"1"}],"variable":[]}},"response":[{"id":"4c7bb93b-befe-41e1-a436-39d8b0dd7161","name":"Run a Top Command using Optional Parameters","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/top?iterations=4&interval=3&threads=1&mem=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","logging","top"],"query":[{"key":"iterations","value":"4"},{"key":"interval","value":"3"},{"key":"threads","value":"1"},{"key":"mem","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 05:22:21 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <top>top - 05:22:21 up 5 days, 19:22,  0 users,  load average: 0.02, 0.04, 0.04\nThreads: 132 total,   1 running, 100 sleeping,   0 stopped,   0 zombie\n%Cpu(s):  0.4 us,  0.7 sy,  0.1 ni, 98.9 id,  0.0 wa,  0.0 hi,  0.0 si,  0.0 st\nKiB Mem:   2051184 total,   378344 used,  1672840 free,     1728 buffers\nKiB Swap:        0 total,        0 used,        0 free.   115728 cached Mem\n\n  PID USER      PR  NI    VIRT    RES    SHR S %CPU %MEM     TIME+ COMMAND\n 2322 root      20   0  370384  14648   7092 S  0.0  0.7   0:00.00 named\n 2323 root      20   0  370384  14648   7092 S  0.0  0.7   0:02.08 isc-net-0000\n 2324 root      20   0  370384  14648   7092 S  0.0  0.7   0:04.70 isc-timer\n 2325 root      20   0  370384  14648   7092 S  0.0  0.7   0:00.00 isc-socket-0\n 3097 root      20   0  370384  14648   7092 S  0.0  0.7   0:00.00 isc-net-0000\n  653 root      20   0  193260  14564   5112 S  0.0  0.7   0:01.03 syslog-ng\n 2168 root      20   0  123108   7136   6272 S  0.0  0.3   0:03.81 ssomgr\n 2171 root      20   0  123108   7136   6272 S  0.0  0.3   0:02.05 ssomgr\n 1008 root      20   0  119772   5832   4100 S  0.0  0.3   4:46.46 vmtoolsd\n 1014 root      20   0  119772   5832   4100 S  0.0  0.3   0:00.00 gmain\n  907 root      20   0   18820   5548   4612 S  0.0  0.3   0:03.54 sslproxy\n15503 root      10 -10  283812   4952   4224 S  0.0  0.2   0:00.50 vsslproxy\n15522 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.48 vsslproxy\n15523 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.47 vsslproxy\n15524 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.48 vsslproxy\n15525 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.47 vsslproxy\n  744 root      20   0   11792   4840   2372 S  0.0  0.2  11:17.14 rrd-upd-all+\n 2150 root      20   0   13980   4676   3984 S  0.0  0.2   0:05.65 l7d\n  812 root      20   0   18728   4472   3928 S  0.0  0.2   0:01.00 ocspd\n 1764 root      20   0   47604   4156   3612 S  0.0  0.2   0:05.34 wafd\n  535 root      20   0   10168   3780   2676 S  0.0  0.2   0:01.02 dhclient\n 2216 root      12  -8   18132   3400   2760 S  0.0  0.2   0:10.73 l4d\n 2281 root      20   0   18492   3112   2628 S  0.0  0.2   0:05.26 vsslproxy\n 2337 root      20   0    9916   2960   2364 S  0.0  0.1  12:42.23 geomon\n 2318 root      20   0   16672   2844   2160 S  0.0  0.1   0:01.94 geocheck\n  935 root      20   0    9536   2628   2412 S  0.0  0.1   0:00.00 startDaemon\n 1756 root      20   0    9540   2628   2416 S  0.0  0.1   0:00.00 startDaemon\n  800 root      20   0    9536   2592   2376 S  0.0  0.1   0:00.00 startDaemon\n 2176 root      20   0    9540   2588   2376 S  0.0  0.1   0:00.00 startDaemon\n 2275 root      20   0    9540   2588   2372 S  0.0  0.1   0:00.00 startDaemon\n  901 root      20   0    9540   2584   2364 S  0.0  0.1   0:00.00 startDaemon\n 2160 root      20   0    9540   2576   2364 S  0.0  0.1   0:00.00 startDaemon\n 2207 root      20   0    9536   2540   2324 S  0.0  0.1   0:00.00 startDaemon\n  652 root      20   0   36868   2288   1784 S  0.0  0.1   0:00.00 syslog-ng\n 2316 root      20   0    5004   2008   1324 S  0.0  0.1   0:00.36 binddb\n 2190 root      20   0    4620   1952   1672 S  0.0  0.1   1:06.19 stats\n19868 bal       20   0   11444   1908   1724 R  0.0  0.1   0:00.00 top\n 2377 root      20   0   18568   1756   1332 S  0.0  0.1   0:00.00 sshd\n  948 root      20   0   18464   1696   1352 S  0.0  0.1   0:00.01 occheck\n 1118 root      20   0    8680   1664   1568 S  0.0  0.1   0:00.00 mingetty\n 1119 root      20   0    8680   1632   1528 S  0.0  0.1   0:00.00 mingetty\n  871 root      20   0    6728   1620   1504 S  0.0  0.1   0:00.05 httpd\n 1116 root      20   0    8680   1620   1516 S  0.0  0.1   0:00.00 mingetty\n 1121 root      20   0    8680   1616   1516 S  0.0  0.1   0:00.00 mingetty\n 1122 root      20   0    4360   1608   1496 S  0.0  0.1   0:00.01 getty\n 1120 root      20   0    8680   1596   1492 S  0.0  0.1   0:00.00 mingetty\n  696 root      20   0   15228   1580   1400 S  0.0  0.1   0:01.15 cron\n 1117 root      20   0    8680   1560   1456 S  0.0  0.1   0:00.00 mingetty\n 1033 root      20   0    4540   1516   1404 S  0.0  0.1   0:05.01 flowd\n    1 root      20   0    4356   1400   1292 S  0.0  0.1   0:04.83 init\n  660 root      20   0    4488   1312   1208 S  0.0  0.1   0:00.00 klogd\n  280 bal       20   0   26844   1268    852 S  0.0  0.1   0:01.38 nscd\n19860 bal       20   0   14232   1060    948 S  0.0  0.1   0:00.00 access\n 2153 root      20   0    4232    816    740 S  0.0  0.0   0:00.62 l7log\n  533 root      20   0    6992    696    612 S  0.0  0.0   0:00.00 dhclient\n19864 root      20   0    4348    644    568 S  0.0  0.0   0:00.00 sleep\n  755 root      20   0    6508    124      0 S  0.0  0.0   0:11.46 inotifywait\n19856 root      20   0    6740    116      0 S  0.0  0.0   0:00.00 httpd\n    2 root      20   0       0      0      0 S  0.0  0.0   0:00.01 kthreadd\n    4 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 kworker/0:0H\n    6 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 mm_percpu_wq\n    7 root      20   0       0      0      0 S  0.0  0.0   0:12.14 ksoftirqd/0\n    8 root      20   0       0      0      0 I  0.0  0.0   0:49.63 rcu_sched\n    9 root      20   0       0      0      0 I  0.0  0.0   0:00.00 rcu_bh\n   10 root      rt   0       0      0      0 S  0.0  0.0   0:01.59 migration/0\n   11 root      rt   0       0      0      0 S  0.0  0.0   0:00.85 watchdog/0\n   12 root      20   0       0      0      0 S  0.0  0.0   0:00.00 cpuhp/0\n   13 root      20   0       0      0      0 S  0.0  0.0   0:00.00 cpuhp/1\n   14 root      rt   0       0      0      0 S  0.0  0.0   0:00.67 watchdog/1\n   15 root      rt   0       0      0      0 S  0.0  0.0   0:01.61 migration/1\n   16 root      20   0       0      0      0 S  0.0  0.0   0:11.08 ksoftirqd/1\n   17 root      20   0       0      0      0 I  0.0  0.0   0:00.00 kworker/1:0\n   18 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 kworker/1:0H\n   19 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 netns\n   20 root      20   0       0      0      0 I  0.0  0.0   0:43.69 kworker/0:1\n   21 root      20   0       0      0      0 I  0.0  0.0   0:15.03 kworker/1:1\n   22 root      20   0       0      0      0 S  0.0  0.0   0:00.12 khungtaskd\n   23 root      20   0       0      0      0 S  0.0  0.0   0:00.00 oom_reaper\n   24 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 writeback\n   25 root      20   0       0      0      0 S  0.0  0.0   0:00.00 kcompactd0\n   26 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 crypto\n   27 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 kblockd\n   28 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ata_sff\n   29 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 watchdogd\n   43 root      20   0       0      0      0 S  0.0  0.0   0:00.00 kswapd0\n   76 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 acpi_therma+\n   78 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fc_exch_wor+\n   79 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fc_rport_eq\n   80 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fnic_event_+\n   81 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fnic_fip_q\n   82 root      20   0       0      0      0 S  0.0  0.0   0:00.00 scsi_eh_0\n   83 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 scsi_tmf_0\n   84 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 vmw_pvscsi_+\n   85 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 nvme-wq\n   86 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ixgbevf\n   87 root      20   0       0      0      0 I  0.0  0.0   0:00.00 kworker/0:2\n   88 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ipv6_addrco+\n   89 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ext4-rsv-co+\n  146 root       0 -20       0      0      0 I  0.0  0.0   0:00.03 kworker/0:1H\n  313 root       0 -20       0      0      0 S  0.0  0.0   0:00.00 loop0\n  314 root       0 -20       0      0      0 I  0.0  0.0   0:00.03 kworker/1:1H\n  403 root       0 -20       0      0      0 S  0.0  0.0   0:00.00 loop1\n 2085 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 l7comp\n 5508 root      20   0       0      0      0 I  0.0  0.0   0:00.01 kworker/u4:4\n 9411 root      10 -10       0      0      0 S  0.0  0.0   0:00.60 l7s 2\n 9412 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 2\n 9413 root      10 -10       0      0      0 S  0.0  0.0   0:00.72 l7s 1\n 9414 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 1\n 9415 root      20   0       0      0      0 S  0.0  0.0   0:00.62 l7flow 2\n 9416 root      20   0       0      0      0 S  0.0  0.0   0:00.66 l7flow 1\n 9417 root      20   0       0      0      0 S  0.0  0.0   0:00.62 l7flow 2\n 9418 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 1\n 9419 root      20   0       0      0      0 S  0.0  0.0   0:00.60 l7flow 2\n 9420 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 1\n 9421 root      20   0       0      0      0 S  0.0  0.0   0:00.58 l7flow 2\n 9422 root      20   0       0      0      0 S  0.0  0.0   0:00.63 l7flow 1\n 9423 root      20   0       0      0      0 S  0.0  0.0   0:00.63 l7flow 2\n 9424 root      20   0       0      0      0 S  0.0  0.0   0:00.56 l7flow 1\n 9425 root      20   0       0      0      0 S  0.0  0.0   0:01.31 l7flow 2\n 9426 root      20   0       0      0      0 S  0.0  0.0   0:00.61 l7flow 1\n 9427 root      20   0       0      0      0 S  0.0  0.0   0:00.85 l7flow 2\n 9428 root      20   0       0      0      0 S  0.0  0.0   0:00.56 l7flow 1\n28203 root      10 -10       0      0      0 S  0.0  0.0   0:01.29 l7s 3\n28204 root      20   0       0      0      0 S  0.0  0.0   0:00.86 l7flow 3\n28205 root      20   0       0      0      0 S  0.0  0.0   0:00.84 l7flow 3\n28206 root      20   0       0      0      0 S  0.0  0.0   0:01.32 l7flow 3\n28207 root      20   0       0      0      0 S  0.0  0.0   0:00.84 l7flow 3\n28208 root      20   0       0      0      0 S  0.0  0.0   0:00.80 l7flow 3\n28209 root      20   0       0      0      0 S  0.0  0.0   0:00.84 l7flow 3\n28210 root      20   0       0      0      0 S  0.0  0.0   0:00.81 l7flow 3\n28211 root      20   0       0      0      0 S  0.0  0.0   0:01.36 l7flow 3\n32332 root      20   0       0      0      0 I  0.0  0.0   0:00.00 kworker/u4:1\n\ntop - 05:22:24 up 5 days, 19:22,  0 users,  load average: 0.02, 0.04, 0.04\nThreads: 132 total,   1 running, 100 sleeping,   0 stopped,   0 zombie\n%Cpu(s):  0.7 us,  0.8 sy,  0.0 ni, 98.5 id,  0.0 wa,  0.0 hi,  0.0 si,  0.0 st\nKiB Mem:   2051184 total,   378196 used,  1672988 free,     1728 buffers\nKiB Swap:        0 total,        0 used,        0 free.   115728 cached Mem\n\n  PID USER      PR  NI    VIRT    RES    SHR S %CPU %MEM     TIME+ COMMAND\n 2322 root      20   0  370384  14648   7092 S  0.0  0.7   0:00.00 named\n 2323 root      20   0  370384  14648   7092 S  0.0  0.7   0:02.08 isc-net-0000\n 2324 root      20   0  370384  14648   7092 S  0.0  0.7   0:04.70 isc-timer\n 2325 root      20   0  370384  14648   7092 S  0.0  0.7   0:00.00 isc-socket-0\n 3097 root      20   0  370384  14648   7092 S  0.0  0.7   0:00.00 isc-net-0000\n  653 root      20   0  193260  14564   5112 S  0.0  0.7   0:01.03 syslog-ng\n 2168 root      20   0  123108   7136   6272 S  0.0  0.3   0:03.81 ssomgr\n 2171 root      20   0  123108   7136   6272 S  0.0  0.3   0:02.05 ssomgr\n 1008 root      20   0  119772   5832   4100 S  0.0  0.3   4:46.46 vmtoolsd\n 1014 root      20   0  119772   5832   4100 S  0.0  0.3   0:00.00 gmain\n  907 root      20   0   18820   5548   4612 S  0.0  0.3   0:03.54 sslproxy\n15503 root      10 -10  283812   4952   4224 S  0.0  0.2   0:00.50 vsslproxy\n15522 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.48 vsslproxy\n15523 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.47 vsslproxy\n15524 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.48 vsslproxy\n15525 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.47 vsslproxy\n  744 root      20   0   11792   4840   2372 S  0.0  0.2  11:17.14 rrd-upd-all+\n 2150 root      20   0   13980   4676   3984 S  0.0  0.2   0:05.65 l7d\n  812 root      20   0   18728   4472   3928 S  0.0  0.2   0:01.00 ocspd\n 1764 root      20   0   47604   4156   3612 S  0.0  0.2   0:05.34 wafd\n  535 root      20   0   10168   3780   2676 S  0.0  0.2   0:01.02 dhclient\n 2216 root      12  -8   18132   3400   2760 S  0.0  0.2   0:10.73 l4d\n 2281 root      20   0   18492   3112   2628 S  0.0  0.2   0:05.26 vsslproxy\n 2337 root      20   0    9916   2960   2364 S  0.3  0.1  12:42.24 geomon\n 2318 root      20   0   16672   2844   2160 S  0.0  0.1   0:01.94 geocheck\n  935 root      20   0    9536   2628   2412 S  0.0  0.1   0:00.00 startDaemon\n 1756 root      20   0    9540   2628   2416 S  0.0  0.1   0:00.00 startDaemon\n  800 root      20   0    9536   2592   2376 S  0.0  0.1   0:00.00 startDaemon\n 2176 root      20   0    9540   2588   2376 S  0.0  0.1   0:00.00 startDaemon\n 2275 root      20   0    9540   2588   2372 S  0.0  0.1   0:00.00 startDaemon\n  901 root      20   0    9540   2584   2364 S  0.0  0.1   0:00.00 startDaemon\n 2160 root      20   0    9540   2576   2364 S  0.0  0.1   0:00.00 startDaemon\n 2207 root      20   0    9536   2540   2324 S  0.0  0.1   0:00.00 startDaemon\n  652 root      20   0   36868   2288   1784 S  0.0  0.1   0:00.00 syslog-ng\n19868 bal       20   0   11452   2140   1784 R  0.0  0.1   0:00.00 top\n 2316 root      20   0    5004   2008   1324 S  0.0  0.1   0:00.36 binddb\n 2190 root      20   0    4620   1952   1672 S  0.0  0.1   1:06.19 stats\n 2377 root      20   0   18568   1756   1332 S  0.0  0.1   0:00.00 sshd\n  948 root      20   0   18464   1696   1352 S  0.0  0.1   0:00.01 occheck\n 1118 root      20   0    8680   1664   1568 S  0.0  0.1   0:00.00 mingetty\n 1119 root      20   0    8680   1632   1528 S  0.0  0.1   0:00.00 mingetty\n  871 root      20   0    6728   1620   1504 S  0.0  0.1   0:00.05 httpd\n 1116 root      20   0    8680   1620   1516 S  0.0  0.1   0:00.00 mingetty\n 1121 root      20   0    8680   1616   1516 S  0.0  0.1   0:00.00 mingetty\n 1122 root      20   0    4360   1608   1496 S  0.0  0.1   0:00.01 getty\n 1120 root      20   0    8680   1596   1492 S  0.0  0.1   0:00.00 mingetty\n  696 root      20   0   15228   1580   1400 S  0.0  0.1   0:01.15 cron\n 1117 root      20   0    8680   1560   1456 S  0.0  0.1   0:00.00 mingetty\n 1033 root      20   0    4540   1516   1404 S  0.0  0.1   0:05.01 flowd\n    1 root      20   0    4356   1400   1292 S  0.0  0.1   0:04.83 init\n  660 root      20   0    4488   1312   1208 S  0.0  0.1   0:00.00 klogd\n  280 bal       20   0   26844   1268    852 S  0.0  0.1   0:01.38 nscd\n19860 bal       20   0   14232   1060    948 S  0.0  0.1   0:00.00 access\n 2153 root      20   0    4232    816    740 S  0.0  0.0   0:00.62 l7log\n  533 root      20   0    6992    696    612 S  0.0  0.0   0:00.00 dhclient\n19913 root      20   0    4348    664    584 S  0.0  0.0   0:00.00 sleep\n  755 root      20   0    6508    124      0 S  0.0  0.0   0:11.46 inotifywait\n19856 root      20   0    6740    116      0 S  0.0  0.0   0:00.00 httpd\n    2 root      20   0       0      0      0 S  0.0  0.0   0:00.01 kthreadd\n    4 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 kworker/0:0H\n    6 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 mm_percpu_wq\n    7 root      20   0       0      0      0 S  0.0  0.0   0:12.14 ksoftirqd/0\n    8 root      20   0       0      0      0 I  0.0  0.0   0:49.63 rcu_sched\n    9 root      20   0       0      0      0 I  0.0  0.0   0:00.00 rcu_bh\n   10 root      rt   0       0      0      0 S  0.0  0.0   0:01.59 migration/0\n   11 root      rt   0       0      0      0 S  0.0  0.0   0:00.85 watchdog/0\n   12 root      20   0       0      0      0 S  0.0  0.0   0:00.00 cpuhp/0\n   13 root      20   0       0      0      0 S  0.0  0.0   0:00.00 cpuhp/1\n   14 root      rt   0       0      0      0 S  0.0  0.0   0:00.67 watchdog/1\n   15 root      rt   0       0      0      0 S  0.0  0.0   0:01.61 migration/1\n   16 root      20   0       0      0      0 S  0.0  0.0   0:11.08 ksoftirqd/1\n   17 root      20   0       0      0      0 I  0.0  0.0   0:00.00 kworker/1:0\n   18 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 kworker/1:0H\n   19 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 netns\n   20 root      20   0       0      0      0 I  0.0  0.0   0:43.69 kworker/0:1\n   21 root      20   0       0      0      0 I  0.0  0.0   0:15.03 kworker/1:1\n   22 root      20   0       0      0      0 S  0.0  0.0   0:00.12 khungtaskd\n   23 root      20   0       0      0      0 S  0.0  0.0   0:00.00 oom_reaper\n   24 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 writeback\n   25 root      20   0       0      0      0 S  0.0  0.0   0:00.00 kcompactd0\n   26 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 crypto\n   27 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 kblockd\n   28 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ata_sff\n   29 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 watchdogd\n   43 root      20   0       0      0      0 S  0.0  0.0   0:00.00 kswapd0\n   76 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 acpi_therma+\n   78 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fc_exch_wor+\n   79 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fc_rport_eq\n   80 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fnic_event_+\n   81 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fnic_fip_q\n   82 root      20   0       0      0      0 S  0.0  0.0   0:00.00 scsi_eh_0\n   83 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 scsi_tmf_0\n   84 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 vmw_pvscsi_+\n   85 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 nvme-wq\n   86 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ixgbevf\n   87 root      20   0       0      0      0 I  0.0  0.0   0:00.00 kworker/0:2\n   88 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ipv6_addrco+\n   89 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ext4-rsv-co+\n  146 root       0 -20       0      0      0 I  0.0  0.0   0:00.03 kworker/0:1H\n  313 root       0 -20       0      0      0 S  0.0  0.0   0:00.00 loop0\n  314 root       0 -20       0      0      0 I  0.0  0.0   0:00.03 kworker/1:1H\n  403 root       0 -20       0      0      0 S  0.0  0.0   0:00.00 loop1\n 2085 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 l7comp\n 5508 root      20   0       0      0      0 I  0.0  0.0   0:00.01 kworker/u4:4\n 9411 root      10 -10       0      0      0 S  0.0  0.0   0:00.60 l7s 2\n 9412 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 2\n 9413 root      10 -10       0      0      0 S  0.0  0.0   0:00.72 l7s 1\n 9414 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 1\n 9415 root      20   0       0      0      0 S  0.0  0.0   0:00.62 l7flow 2\n 9416 root      20   0       0      0      0 S  0.0  0.0   0:00.66 l7flow 1\n 9417 root      20   0       0      0      0 S  0.0  0.0   0:00.62 l7flow 2\n 9418 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 1\n 9419 root      20   0       0      0      0 S  0.0  0.0   0:00.60 l7flow 2\n 9420 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 1\n 9421 root      20   0       0      0      0 S  0.0  0.0   0:00.58 l7flow 2\n 9422 root      20   0       0      0      0 S  0.0  0.0   0:00.63 l7flow 1\n 9423 root      20   0       0      0      0 S  0.0  0.0   0:00.63 l7flow 2\n 9424 root      20   0       0      0      0 S  0.0  0.0   0:00.56 l7flow 1\n 9425 root      20   0       0      0      0 S  0.0  0.0   0:01.31 l7flow 2\n 9426 root      20   0       0      0      0 S  0.0  0.0   0:00.61 l7flow 1\n 9427 root      20   0       0      0      0 S  0.0  0.0   0:00.85 l7flow 2\n 9428 root      20   0       0      0      0 S  0.0  0.0   0:00.56 l7flow 1\n28203 root      10 -10       0      0      0 S  0.0  0.0   0:01.29 l7s 3\n28204 root      20   0       0      0      0 S  0.0  0.0   0:00.86 l7flow 3\n28205 root      20   0       0      0      0 S  0.0  0.0   0:00.84 l7flow 3\n28206 root      20   0       0      0      0 S  0.0  0.0   0:01.32 l7flow 3\n28207 root      20   0       0      0      0 S  0.0  0.0   0:00.84 l7flow 3\n28208 root      20   0       0      0      0 S  0.0  0.0   0:00.80 l7flow 3\n28209 root      20   0       0      0      0 S  0.0  0.0   0:00.84 l7flow 3\n28210 root      20   0       0      0      0 S  0.0  0.0   0:00.81 l7flow 3\n28211 root      20   0       0      0      0 S  0.0  0.0   0:01.36 l7flow 3\n32332 root      20   0       0      0      0 I  0.0  0.0   0:00.00 kworker/u4:1\n\ntop - 05:22:27 up 5 days, 19:22,  0 users,  load average: 0.01, 0.04, 0.04\nThreads: 132 total,   1 running, 100 sleeping,   0 stopped,   0 zombie\n%Cpu(s):  0.5 us,  0.8 sy,  0.0 ni, 98.7 id,  0.0 wa,  0.0 hi,  0.0 si,  0.0 st\nKiB Mem:   2051184 total,   378468 used,  1672716 free,     1728 buffers\nKiB Swap:        0 total,        0 used,        0 free.   115728 cached Mem\n\n  PID USER      PR  NI    VIRT    RES    SHR S %CPU %MEM     TIME+ COMMAND\n 2322 root      20   0  370384  14648   7092 S  0.0  0.7   0:00.00 named\n 2323 root      20   0  370384  14648   7092 S  0.0  0.7   0:02.08 isc-net-0000\n 2324 root      20   0  370384  14648   7092 S  0.0  0.7   0:04.70 isc-timer\n 2325 root      20   0  370384  14648   7092 S  0.0  0.7   0:00.00 isc-socket-0\n 3097 root      20   0  370384  14648   7092 S  0.0  0.7   0:00.00 isc-net-0000\n  653 root      20   0  193260  14564   5112 S  0.0  0.7   0:01.03 syslog-ng\n 2168 root      20   0  123108   7136   6272 S  0.0  0.3   0:03.81 ssomgr\n 2171 root      20   0  123108   7136   6272 S  0.0  0.3   0:02.05 ssomgr\n 1008 root      20   0  119772   5832   4100 S  0.3  0.3   4:46.47 vmtoolsd\n 1014 root      20   0  119772   5832   4100 S  0.0  0.3   0:00.00 gmain\n  907 root      20   0   18820   5548   4612 S  0.0  0.3   0:03.54 sslproxy\n15503 root      10 -10  283812   4952   4224 S  0.0  0.2   0:00.50 vsslproxy\n15522 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.48 vsslproxy\n15523 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.47 vsslproxy\n15524 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.48 vsslproxy\n15525 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.47 vsslproxy\n  744 root      20   0   11792   4840   2372 S  0.3  0.2  11:17.15 rrd-upd-all+\n 2150 root      20   0   13980   4676   3984 S  0.0  0.2   0:05.65 l7d\n  812 root      20   0   18728   4472   3928 S  0.0  0.2   0:01.00 ocspd\n 1764 root      20   0   47604   4156   3612 S  0.0  0.2   0:05.34 wafd\n  535 root      20   0   10168   3780   2676 S  0.0  0.2   0:01.02 dhclient\n 2216 root      12  -8   18132   3400   2760 S  0.0  0.2   0:10.73 l4d\n 2281 root      20   0   18492   3112   2628 S  0.0  0.2   0:05.26 vsslproxy\n 2337 root      20   0    9916   2960   2364 S  0.0  0.1  12:42.24 geomon\n 2318 root      20   0   16672   2844   2160 S  0.0  0.1   0:01.94 geocheck\n  935 root      20   0    9536   2628   2412 S  0.0  0.1   0:00.00 startDaemon\n 1756 root      20   0    9540   2628   2416 S  0.0  0.1   0:00.00 startDaemon\n  800 root      20   0    9536   2592   2376 S  0.0  0.1   0:00.00 startDaemon\n 2176 root      20   0    9540   2588   2376 S  0.0  0.1   0:00.00 startDaemon\n 2275 root      20   0    9540   2588   2372 S  0.0  0.1   0:00.00 startDaemon\n  901 root      20   0    9540   2584   2364 S  0.0  0.1   0:00.00 startDaemon\n 2160 root      20   0    9540   2576   2364 S  0.0  0.1   0:00.00 startDaemon\n 2207 root      20   0    9536   2540   2324 S  0.0  0.1   0:00.00 startDaemon\n  652 root      20   0   36868   2288   1784 S  0.0  0.1   0:00.00 syslog-ng\n19868 bal       20   0   11452   2140   1784 R  0.0  0.1   0:00.00 top\n 2316 root      20   0    5004   2008   1324 S  0.0  0.1   0:00.36 binddb\n 2190 root      20   0    4620   1952   1672 S  0.0  0.1   1:06.19 stats\n 2377 root      20   0   18568   1756   1332 S  0.0  0.1   0:00.00 sshd\n  948 root      20   0   18464   1696   1352 S  0.0  0.1   0:00.01 occheck\n 1118 root      20   0    8680   1664   1568 S  0.0  0.1   0:00.00 mingetty\n 1119 root      20   0    8680   1632   1528 S  0.0  0.1   0:00.00 mingetty\n  871 root      20   0    6728   1620   1504 S  0.0  0.1   0:00.05 httpd\n 1116 root      20   0    8680   1620   1516 S  0.0  0.1   0:00.00 mingetty\n 1121 root      20   0    8680   1616   1516 S  0.0  0.1   0:00.00 mingetty\n 1122 root      20   0    4360   1608   1496 S  0.0  0.1   0:00.01 getty\n 1120 root      20   0    8680   1596   1492 S  0.0  0.1   0:00.00 mingetty\n  696 root      20   0   15228   1580   1400 S  0.0  0.1   0:01.15 cron\n 1117 root      20   0    8680   1560   1456 S  0.0  0.1   0:00.00 mingetty\n 1033 root      20   0    4540   1516   1404 S  0.0  0.1   0:05.01 flowd\n    1 root      20   0    4356   1400   1292 S  0.0  0.1   0:04.83 init\n  660 root      20   0    4488   1312   1208 S  0.0  0.1   0:00.00 klogd\n  280 bal       20   0   26844   1268    852 S  0.0  0.1   0:01.38 nscd\n19860 bal       20   0   14232   1060    948 S  0.0  0.1   0:00.00 access\n 2153 root      20   0    4232    816    740 S  0.0  0.0   0:00.62 l7log\n  533 root      20   0    6992    696    612 S  0.0  0.0   0:00.00 dhclient\n19958 root      20   0    4348    648    568 S  0.0  0.0   0:00.00 sleep\n  755 root      20   0    6508    124      0 S  0.0  0.0   0:11.46 inotifywait\n19856 root      20   0    6740    116      0 S  0.0  0.0   0:00.00 httpd\n    2 root      20   0       0      0      0 S  0.0  0.0   0:00.01 kthreadd\n    4 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 kworker/0:0H\n    6 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 mm_percpu_wq\n    7 root      20   0       0      0      0 S  0.0  0.0   0:12.14 ksoftirqd/0\n    8 root      20   0       0      0      0 I  0.0  0.0   0:49.63 rcu_sched\n    9 root      20   0       0      0      0 I  0.0  0.0   0:00.00 rcu_bh\n   10 root      rt   0       0      0      0 S  0.0  0.0   0:01.59 migration/0\n   11 root      rt   0       0      0      0 S  0.0  0.0   0:00.85 watchdog/0\n   12 root      20   0       0      0      0 S  0.0  0.0   0:00.00 cpuhp/0\n   13 root      20   0       0      0      0 S  0.0  0.0   0:00.00 cpuhp/1\n   14 root      rt   0       0      0      0 S  0.0  0.0   0:00.67 watchdog/1\n   15 root      rt   0       0      0      0 S  0.0  0.0   0:01.61 migration/1\n   16 root      20   0       0      0      0 S  0.0  0.0   0:11.08 ksoftirqd/1\n   17 root      20   0       0      0      0 I  0.0  0.0   0:00.00 kworker/1:0\n   18 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 kworker/1:0H\n   19 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 netns\n   20 root      20   0       0      0      0 I  0.0  0.0   0:43.69 kworker/0:1\n   21 root      20   0       0      0      0 I  0.0  0.0   0:15.03 kworker/1:1\n   22 root      20   0       0      0      0 S  0.0  0.0   0:00.12 khungtaskd\n   23 root      20   0       0      0      0 S  0.0  0.0   0:00.00 oom_reaper\n   24 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 writeback\n   25 root      20   0       0      0      0 S  0.0  0.0   0:00.00 kcompactd0\n   26 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 crypto\n   27 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 kblockd\n   28 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ata_sff\n   29 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 watchdogd\n   43 root      20   0       0      0      0 S  0.0  0.0   0:00.00 kswapd0\n   76 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 acpi_therma+\n   78 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fc_exch_wor+\n   79 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fc_rport_eq\n   80 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fnic_event_+\n   81 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fnic_fip_q\n   82 root      20   0       0      0      0 S  0.0  0.0   0:00.00 scsi_eh_0\n   83 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 scsi_tmf_0\n   84 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 vmw_pvscsi_+\n   85 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 nvme-wq\n   86 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ixgbevf\n   87 root      20   0       0      0      0 I  0.0  0.0   0:00.00 kworker/0:2\n   88 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ipv6_addrco+\n   89 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ext4-rsv-co+\n  146 root       0 -20       0      0      0 I  0.0  0.0   0:00.03 kworker/0:1H\n  313 root       0 -20       0      0      0 S  0.0  0.0   0:00.00 loop0\n  314 root       0 -20       0      0      0 I  0.0  0.0   0:00.03 kworker/1:1H\n  403 root       0 -20       0      0      0 S  0.0  0.0   0:00.00 loop1\n 2085 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 l7comp\n 5508 root      20   0       0      0      0 I  0.0  0.0   0:00.01 kworker/u4:4\n 9411 root      10 -10       0      0      0 S  0.0  0.0   0:00.60 l7s 2\n 9412 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 2\n 9413 root      10 -10       0      0      0 S  0.0  0.0   0:00.72 l7s 1\n 9414 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 1\n 9415 root      20   0       0      0      0 S  0.0  0.0   0:00.62 l7flow 2\n 9416 root      20   0       0      0      0 S  0.0  0.0   0:00.66 l7flow 1\n 9417 root      20   0       0      0      0 S  0.0  0.0   0:00.62 l7flow 2\n 9418 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 1\n 9419 root      20   0       0      0      0 S  0.0  0.0   0:00.60 l7flow 2\n 9420 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 1\n 9421 root      20   0       0      0      0 S  0.0  0.0   0:00.58 l7flow 2\n 9422 root      20   0       0      0      0 S  0.0  0.0   0:00.63 l7flow 1\n 9423 root      20   0       0      0      0 S  0.0  0.0   0:00.63 l7flow 2\n 9424 root      20   0       0      0      0 S  0.0  0.0   0:00.56 l7flow 1\n 9425 root      20   0       0      0      0 S  0.0  0.0   0:01.31 l7flow 2\n 9426 root      20   0       0      0      0 S  0.0  0.0   0:00.61 l7flow 1\n 9427 root      20   0       0      0      0 S  0.0  0.0   0:00.85 l7flow 2\n 9428 root      20   0       0      0      0 S  0.0  0.0   0:00.56 l7flow 1\n28203 root      10 -10       0      0      0 S  0.0  0.0   0:01.29 l7s 3\n28204 root      20   0       0      0      0 S  0.0  0.0   0:00.86 l7flow 3\n28205 root      20   0       0      0      0 S  0.0  0.0   0:00.84 l7flow 3\n28206 root      20   0       0      0      0 S  0.0  0.0   0:01.32 l7flow 3\n28207 root      20   0       0      0      0 S  0.0  0.0   0:00.84 l7flow 3\n28208 root      20   0       0      0      0 S  0.0  0.0   0:00.80 l7flow 3\n28209 root      20   0       0      0      0 S  0.0  0.0   0:00.84 l7flow 3\n28210 root      20   0       0      0      0 S  0.0  0.0   0:00.81 l7flow 3\n28211 root      20   0       0      0      0 S  0.0  0.0   0:01.36 l7flow 3\n32332 root      20   0       0      0      0 I  0.0  0.0   0:00.00 kworker/u4:1\n\ntop - 05:22:30 up 5 days, 19:22,  0 users,  load average: 0.01, 0.04, 0.04\nThreads: 132 total,   1 running, 100 sleeping,   0 stopped,   0 zombie\n%Cpu(s):  0.3 us,  0.5 sy,  0.0 ni, 99.2 id,  0.0 wa,  0.0 hi,  0.0 si,  0.0 st\nKiB Mem:   2051184 total,   378352 used,  1672832 free,     1728 buffers\nKiB Swap:        0 total,        0 used,        0 free.   115728 cached Mem\n\n  PID USER      PR  NI    VIRT    RES    SHR S %CPU %MEM     TIME+ COMMAND\n 2322 root      20   0  370384  14648   7092 S  0.0  0.7   0:00.00 named\n 2323 root      20   0  370384  14648   7092 S  0.0  0.7   0:02.08 isc-net-0000\n 2324 root      20   0  370384  14648   7092 S  0.0  0.7   0:04.70 isc-timer\n 2325 root      20   0  370384  14648   7092 S  0.0  0.7   0:00.00 isc-socket-0\n 3097 root      20   0  370384  14648   7092 S  0.0  0.7   0:00.00 isc-net-0000\n  653 root      20   0  193260  14564   5112 S  0.0  0.7   0:01.03 syslog-ng\n 2168 root      20   0  123108   7136   6272 S  0.0  0.3   0:03.81 ssomgr\n 2171 root      20   0  123108   7136   6272 S  0.0  0.3   0:02.05 ssomgr\n 1008 root      20   0  119772   5832   4100 S  0.0  0.3   4:46.47 vmtoolsd\n 1014 root      20   0  119772   5832   4100 S  0.0  0.3   0:00.00 gmain\n  907 root      20   0   18820   5548   4612 S  0.0  0.3   0:03.54 sslproxy\n15503 root      10 -10  283812   4952   4224 S  0.0  0.2   0:00.50 vsslproxy\n15522 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.48 vsslproxy\n15523 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.47 vsslproxy\n15524 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.48 vsslproxy\n15525 root      20   0  283812   4952   4224 S  0.0  0.2   0:00.47 vsslproxy\n  744 root      20   0   11792   4840   2372 S  0.0  0.2  11:17.15 rrd-upd-all+\n 2150 root      20   0   13980   4676   3984 S  0.0  0.2   0:05.65 l7d\n  812 root      20   0   18728   4472   3928 S  0.0  0.2   0:01.00 ocspd\n 1764 root      20   0   47604   4156   3612 S  0.0  0.2   0:05.34 wafd\n  535 root      20   0   10168   3780   2676 S  0.0  0.2   0:01.02 dhclient\n 2216 root      12  -8   18132   3400   2760 S  0.0  0.2   0:10.73 l4d\n 2281 root      20   0   18492   3112   2628 S  0.0  0.2   0:05.26 vsslproxy\n 2337 root      20   0    9916   2960   2364 S  0.3  0.1  12:42.25 geomon\n 2318 root      20   0   16672   2844   2160 S  0.0  0.1   0:01.94 geocheck\n  935 root      20   0    9536   2628   2412 S  0.0  0.1   0:00.00 startDaemon\n 1756 root      20   0    9540   2628   2416 S  0.0  0.1   0:00.00 startDaemon\n  800 root      20   0    9536   2592   2376 S  0.0  0.1   0:00.00 startDaemon\n 2176 root      20   0    9540   2588   2376 S  0.0  0.1   0:00.00 startDaemon\n 2275 root      20   0    9540   2588   2372 S  0.0  0.1   0:00.00 startDaemon\n  901 root      20   0    9540   2584   2364 S  0.0  0.1   0:00.00 startDaemon\n 2160 root      20   0    9540   2576   2364 S  0.0  0.1   0:00.00 startDaemon\n 2207 root      20   0    9536   2540   2324 S  0.0  0.1   0:00.00 startDaemon\n  652 root      20   0   36868   2288   1784 S  0.0  0.1   0:00.00 syslog-ng\n19868 bal       20   0   11452   2140   1784 R  0.3  0.1   0:00.01 top\n 2316 root      20   0    5004   2008   1324 S  0.0  0.1   0:00.36 binddb\n 2190 root      20   0    4620   1952   1672 S  0.0  0.1   1:06.19 stats\n 2377 root      20   0   18568   1756   1332 S  0.0  0.1   0:00.00 sshd\n  948 root      20   0   18464   1696   1352 S  0.0  0.1   0:00.01 occheck\n 1118 root      20   0    8680   1664   1568 S  0.0  0.1   0:00.00 mingetty\n 1119 root      20   0    8680   1632   1528 S  0.0  0.1   0:00.00 mingetty\n  871 root      20   0    6728   1620   1504 S  0.0  0.1   0:00.05 httpd\n 1116 root      20   0    8680   1620   1516 S  0.0  0.1   0:00.00 mingetty\n 1121 root      20   0    8680   1616   1516 S  0.0  0.1   0:00.00 mingetty\n 1122 root      20   0    4360   1608   1496 S  0.0  0.1   0:00.01 getty\n 1120 root      20   0    8680   1596   1492 S  0.0  0.1   0:00.00 mingetty\n  696 root      20   0   15228   1580   1400 S  0.0  0.1   0:01.15 cron\n 1117 root      20   0    8680   1560   1456 S  0.0  0.1   0:00.00 mingetty\n 1033 root      20   0    4540   1516   1404 S  0.0  0.1   0:05.01 flowd\n    1 root      20   0    4356   1400   1292 S  0.0  0.1   0:04.83 init\n  660 root      20   0    4488   1312   1208 S  0.0  0.1   0:00.00 klogd\n  280 bal       20   0   26844   1268    852 S  0.0  0.1   0:01.38 nscd\n19860 bal       20   0   14232   1060    948 S  0.0  0.1   0:00.00 access\n 2153 root      20   0    4232    816    740 S  0.0  0.0   0:00.62 l7log\n  533 root      20   0    6992    696    612 S  0.0  0.0   0:00.00 dhclient\n19970 root      20   0    4348    660    584 S  0.0  0.0   0:00.00 sleep\n  755 root      20   0    6508    124      0 S  0.0  0.0   0:11.46 inotifywait\n19856 root      20   0    6740    116      0 S  0.0  0.0   0:00.00 httpd\n    2 root      20   0       0      0      0 S  0.0  0.0   0:00.01 kthreadd\n    4 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 kworker/0:0H\n    6 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 mm_percpu_wq\n    7 root      20   0       0      0      0 S  0.0  0.0   0:12.14 ksoftirqd/0\n    8 root      20   0       0      0      0 I  0.0  0.0   0:49.63 rcu_sched\n    9 root      20   0       0      0      0 I  0.0  0.0   0:00.00 rcu_bh\n   10 root      rt   0       0      0      0 S  0.0  0.0   0:01.59 migration/0\n   11 root      rt   0       0      0      0 S  0.0  0.0   0:00.85 watchdog/0\n   12 root      20   0       0      0      0 S  0.0  0.0   0:00.00 cpuhp/0\n   13 root      20   0       0      0      0 S  0.0  0.0   0:00.00 cpuhp/1\n   14 root      rt   0       0      0      0 S  0.0  0.0   0:00.67 watchdog/1\n   15 root      rt   0       0      0      0 S  0.0  0.0   0:01.61 migration/1\n   16 root      20   0       0      0      0 S  0.0  0.0   0:11.08 ksoftirqd/1\n   17 root      20   0       0      0      0 I  0.0  0.0   0:00.00 kworker/1:0\n   18 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 kworker/1:0H\n   19 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 netns\n   20 root      20   0       0      0      0 I  0.0  0.0   0:43.69 kworker/0:1\n   21 root      20   0       0      0      0 I  0.0  0.0   0:15.03 kworker/1:1\n   22 root      20   0       0      0      0 S  0.0  0.0   0:00.12 khungtaskd\n   23 root      20   0       0      0      0 S  0.0  0.0   0:00.00 oom_reaper\n   24 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 writeback\n   25 root      20   0       0      0      0 S  0.0  0.0   0:00.00 kcompactd0\n   26 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 crypto\n   27 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 kblockd\n   28 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ata_sff\n   29 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 watchdogd\n   43 root      20   0       0      0      0 S  0.0  0.0   0:00.00 kswapd0\n   76 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 acpi_therma+\n   78 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fc_exch_wor+\n   79 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fc_rport_eq\n   80 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fnic_event_+\n   81 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 fnic_fip_q\n   82 root      20   0       0      0      0 S  0.0  0.0   0:00.00 scsi_eh_0\n   83 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 scsi_tmf_0\n   84 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 vmw_pvscsi_+\n   85 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 nvme-wq\n   86 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ixgbevf\n   87 root      20   0       0      0      0 I  0.0  0.0   0:00.00 kworker/0:2\n   88 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ipv6_addrco+\n   89 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 ext4-rsv-co+\n  146 root       0 -20       0      0      0 I  0.0  0.0   0:00.03 kworker/0:1H\n  313 root       0 -20       0      0      0 S  0.0  0.0   0:00.00 loop0\n  314 root       0 -20       0      0      0 I  0.0  0.0   0:00.03 kworker/1:1H\n  403 root       0 -20       0      0      0 S  0.0  0.0   0:00.00 loop1\n 2085 root       0 -20       0      0      0 I  0.0  0.0   0:00.00 l7comp\n 5508 root      20   0       0      0      0 I  0.0  0.0   0:00.01 kworker/u4:4\n 9411 root      10 -10       0      0      0 S  0.0  0.0   0:00.60 l7s 2\n 9412 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 2\n 9413 root      10 -10       0      0      0 S  0.0  0.0   0:00.72 l7s 1\n 9414 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 1\n 9415 root      20   0       0      0      0 S  0.0  0.0   0:00.62 l7flow 2\n 9416 root      20   0       0      0      0 S  0.0  0.0   0:00.66 l7flow 1\n 9417 root      20   0       0      0      0 S  0.0  0.0   0:00.62 l7flow 2\n 9418 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 1\n 9419 root      20   0       0      0      0 S  0.0  0.0   0:00.60 l7flow 2\n 9420 root      20   0       0      0      0 S  0.0  0.0   0:00.57 l7flow 1\n 9421 root      20   0       0      0      0 S  0.0  0.0   0:00.58 l7flow 2\n 9422 root      20   0       0      0      0 S  0.0  0.0   0:00.63 l7flow 1\n 9423 root      20   0       0      0      0 S  0.0  0.0   0:00.63 l7flow 2\n 9424 root      20   0       0      0      0 S  0.0  0.0   0:00.56 l7flow 1\n 9425 root      20   0       0      0      0 S  0.0  0.0   0:01.31 l7flow 2\n 9426 root      20   0       0      0      0 S  0.0  0.0   0:00.61 l7flow 1\n 9427 root      20   0       0      0      0 S  0.0  0.0   0:00.85 l7flow 2\n 9428 root      20   0       0      0      0 S  0.0  0.0   0:00.56 l7flow 1\n28203 root      10 -10       0      0      0 S  0.0  0.0   0:01.29 l7s 3\n28204 root      20   0       0      0      0 S  0.0  0.0   0:00.86 l7flow 3\n28205 root      20   0       0      0      0 S  0.0  0.0   0:00.84 l7flow 3\n28206 root      20   0       0      0      0 S  0.0  0.0   0:01.32 l7flow 3\n28207 root      20   0       0      0      0 S  0.0  0.0   0:00.84 l7flow 3\n28208 root      20   0       0      0      0 S  0.0  0.0   0:00.80 l7flow 3\n28209 root      20   0       0      0      0 S  0.0  0.0   0:00.84 l7flow 3\n28210 root      20   0       0      0      0 S  0.0  0.0   0:00.81 l7flow 3\n28211 root      20   0       0      0      0 S  0.0  0.0   0:01.36 l7flow 3\n32332 root      20   0       0      0      0 I  0.0  0.0   0:00.00 kworker/u4:1\n</top>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"58478c28-5863-4a41-b126-056f7f53277d"},{"name":"Enable the BackupTop Parameter","id":"6c82d78c-f808-43d4-b3fb-2a7434710df0","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=backuptop&value=1","description":"<p>By default, the LoadMaster does not include <strong>top</strong> command output in LoadMaster system backups. To include it, enable the <strong>backuptop</strong> parameter using the <strong>set</strong> command.</p>\n<p>When included in LoadMaster system backups, <strong>top</strong> is run using the default parameters (regardless of what is configured in the UI) and is sorted by memory usage.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","set"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"backuptop"},{"key":"value","value":"1"}],"variable":[]}},"response":[{"id":"176ba19c-2f2a-4292-b663-573dce14dce7","name":"Enable the BackupTop Parameter","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=backuptop&value=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","set"],"query":[{"key":"param","value":"backuptop"},{"key":"value","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 05:24:14 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"6c82d78c-f808-43d4-b3fb-2a7434710df0"}],"id":"672db560-1d3f-4d3b-926b-52da1d425b00","description":"<p>Performing a top displays memory, CPU, and I/O usage for the LoadMaster. You can specify the number of samples and an interval between them (the default is 10 samples and a 1 second interval). You can also show threads and/or sort by memory usage by selecting the appropriate check boxes.</p>\n","_postman_id":"672db560-1d3f-4d3b-926b-52da1d425b00"},{"name":"Run the Other Debug Options","item":[{"name":"Run the Other Debug Options","id":"7006b093-8528-4332-b7f6-db5d3891b462","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/meminfo","description":"<p>These other debug options commands can be run using the API:</p>\n<ul>\n<li><p>logging/ps</p>\n</li>\n<li><p>logging/meminfo</p>\n</li>\n<li><p>logging/ifconfig</p>\n</li>\n<li><p>listifconfig</p>\n</li>\n<li><p>logging/netstat</p>\n</li>\n<li><p>logging/interrupts</p>\n</li>\n<li><p>logging/partitions</p>\n</li>\n<li><p>logging/cpuinfo</p>\n</li>\n<li><p>logging/df</p>\n</li>\n<li><p>logging/lspci</p>\n</li>\n<li><p>logging/lsmod</p>\n</li>\n<li><p>logging/slabinfo</p>\n</li>\n</ul>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","logging","meminfo"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"94c6467e-d73e-4bf8-9122-22419ca1a02c","name":"Run the Other Debug Options","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/logging/meminfo"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 05:25:22 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <meminfo>\nMemTotal:        2051184 kB\nMemFree:         1669196 kB\nMemAvailable:    1764200 kB\nBuffers:            1728 kB\nCached:           115832 kB\nSwapCached:            0 kB\nActive:           132224 kB\nInactive:          24348 kB\nActive(anon):      39328 kB\nInactive(anon):       80 kB\nActive(file):      92896 kB\nInactive(file):    24268 kB\nUnevictable:           0 kB\nMlocked:               0 kB\nSwapTotal:             0 kB\nSwapFree:              0 kB\nDirty:                56 kB\nWriteback:             0 kB\nAnonPages:         39024 kB\nMapped:            22276 kB\nShmem:               396 kB\nSlab:              32324 kB\nSReclaimable:       5600 kB\nSUnreclaim:        26724 kB\nKernelStack:        2192 kB\nPageTables:         2412 kB\nNFS_Unstable:          0 kB\nBounce:                0 kB\nWritebackTmp:          0 kB\nCommitLimit:     1025592 kB\nCommitted_AS:     103700 kB\nVmallocTotal:   34359738367 kB\nVmallocUsed:           0 kB\nVmallocChunk:          0 kB\nDirectMap4k:       38848 kB\nDirectMap2M:     2058240 kB\nDirectMap1G:           0 kB\n</meminfo>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"7006b093-8528-4332-b7f6-db5d3891b462"}],"id":"41e1bb29-5e5d-4346-87f9-e4beac44331d","description":"<p>This section provides commands relating to other debug options.</p>\n","_postman_id":"41e1bb29-5e5d-4346-87f9-e4beac44331d"},{"name":"Run a TCP Dump","item":[{"name":"Run a TCP Dump","id":"b75f8df7-fb06-44f2-b93f-a2a58945576f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/tcpdump","description":"<p>Run a TCP dump using the <strong>tcpdump</strong> command.</p>\n<p>All parameters are optional.</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Parameter Description</b></p></td><td><p><b>Mandatory</b></p></td></tr><tr><td><p>maxpackets</p></td><td><p>I</p></td><td><p>The maximum number of packets to capture. The default value for this parameter is 10000. Valid values range from 1 to 200000.</p></td><td><p>N</p></td></tr><tr><td><p>maxtime</p></td><td><p>I</p></td><td><p>The maximum number of seconds to capture. The default value for this parameter is 10. Valid values range from 1 to 600.</p></td><td><p>N</p></td></tr><tr><td><p>interface</p></td><td><p>I</p></td><td><p>The interface(s) to monitor. The default interface is eth0. A TCP dump can be captured either by one or all Ethernet ports.</p></td><td><p>N</p></td></tr><tr><td><p>port</p></td><td><p>I</p></td><td><p>The port to be monitored.</p></td><td><p>N</p></td></tr><tr><td><p>address</p></td><td><p>I</p></td><td><p>The (optional) address to be monitored.</p></td><td><p>N</p></td></tr><tr><td><p>tcpoptions</p></td><td><p>S</p></td><td><p>Any optional parameters needed. The maximum number of characters permitted is 255. You can use any options that you can have in a tcp dump command. For example, if you do not set the port parameter, you could set the port in the <b>tcpoptions</b> parameter. You could also set the protocol to udp. You can enter multiple options.</p></td><td><p>N</p></td></tr></tbody></table>\n\n<p>The output of a TCP dump is a .pcap file, which is downloaded. You can use an application such as Wireshark to view the output.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","tcpdump"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"f09d4302-c675-443f-aefc-e98c17bd8ffb","name":"Run a TCP Dump","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/tcpdump"},"status":"OK","code":200,"_postman_previewlanguage":"raw","header":[{"key":"Date","value":"Thu, 08 Aug 2024 05:27:38 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/vnd.tcpdump.pcap"},{"key":"Content-Disposition","value":"inline; filename=\"tcpdump.pcap\""}],"cookie":[],"responseTime":null,"body":"To save the file, in Postman - go to the Body of the response, click the three dots on the right, and click Save response to file."}],"_postman_id":"b75f8df7-fb06-44f2-b93f-a2a58945576f"}],"id":"2af9a579-b7b5-4484-8014-51c53e3c20e1","description":"<p>Refer to the section below for details on how to run a TCP dump using the RESTful API.</p>\n","_postman_id":"2af9a579-b7b5-4484-8014-51c53e3c20e1"}],"id":"5fe9dc4a-a8d6-4bf0-8e46-3f7419506cd4","description":"<p>This section provides commands relating to troubleshooting.</p>\n","_postman_id":"5fe9dc4a-a8d6-4bf0-8e46-3f7419506cd4"},{"name":"Miscellaneous Options","item":[{"name":"WUI Settings","item":[{"name":"View the Third Party Acknowledgements File","id":"f59cf7c0-fb11-417e-a4ef-dfee7b97be69","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/notice","description":"<p>You can view the third-party acknowledgments file applicable to the LoadMaster release you are running by using the <strong>notice</strong> command.</p>\n<blockquote>\n<p>When viewing the response in Postman, some special characters may not display correctly. If you download the file, the special characters are rendered correctly.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","notice"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"ba2dc4c9-a28e-4649-aa9e-0c484c274571","name":"View the Third Party Acknowledgements File","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/notice"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 08 Aug 2024 11:06:10 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\r\n<Response stat=\"200\" code=\"ok\">\r\n    <Success>\r\n        <Data>\r\n            <NOTICE>Third party acknowledgements would appear here\r\n</NOTICE>\r\n        </Data>\r\n    </Success>\r\n</Response>"}],"_postman_id":"f59cf7c0-fb11-417e-a4ef-dfee7b97be69"}],"id":"ea553ca0-010c-447f-a733-a6878dda0f69","description":"<p>Parameters relating to WUI Settings that can be managed using get and set commands are detailed in the following table. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for the get and set commands.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>hoverhelp</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disable</p><p>1 - Enable</p><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This option allows the display of descriptive text when a cursor rests on a clickable option in the UI screen.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>autosave</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disable</p><p>1 - Enable</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Disabling auto-save is currently a beta feature. Auto-save is enabled by default. If it is disabled, this option modifies the several default<br />UI behaviors. For further details refer to the <a href=\"https://kemptechnologies.com/documentation/latestga/213906303\">Web User Interface (WUI) Configuration Guide</a>.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>motd</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This is the Message of the Day (MOTD). Either plain text or a text file can be used.</p><p>The maximum number of characters is 5,000.</p><p>An error will be displayed if the MOTD is greater than 5,000 characters.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>wuidisplaylines</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>10-100</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Set the maximum number of lines which can be displayed on a single statistics page.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>\n\n<blockquote>\n<p>If the Message Of The Day (MOTD) is specified using the <strong>set</strong> command as above, the maximum number of characters that can be entered is 5,000. </p>\n</blockquote>\n<p><strong>Note:</strong> To add line breaks to the <strong>motd</strong> message, use HTML code, such as the following tags:</p>\n<img src=\"https://content.pstmn.io/9a95f202-5bec-4cd1-91cf-a4c1d2e30740/UG9zdG1hbi0wMS5wbmc=\" />\n\n<p>cURL responses do not show HTML code as it would be shown in the WUI, for example,<br />appears as:</p>\n<img src=\"https://content.pstmn.io/b3d0e93d-4f7c-46c7-b2a4-1656c9a45fde/aW1hZ2UucG5n\" width=\"147\" height=\"37\" />","_postman_id":"ea553ca0-010c-447f-a733-a6878dda0f69"},{"name":"L7 Configuration","item":[],"id":"b5fd1339-be8c-4114-b8d7-05984ddfbd9f","description":"<p>Parameters relating to L7 Configuration that can be managed using <strong>get</strong> and <strong>set</strong> commands are detailed in the following table. StartFragment</p>\n<p>Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for the get and set commands.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><p><b>Related UI Option</b></p></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Description</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>addcookieport</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Add Port to Active Cookie</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When using the LoadMaster behind a NATing gateway, all client addresses are the same. To create individual cookies the remote port can also be added to the cookie. Enabling this option when not needed wastes resources.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>addvia</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Add Via Header In Cache Responses</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When enabled, a VIA header field will be added to all cache responses. The Virtual Service address will be the address used.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>allowemptyposts</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Allow Empty POSTs</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>By default the LoadMaster blocks POSTs that do not contain a Content-Length or Transfer-Encoding header to indicate the length of the requests payload. When this parameter is set to true, such requests are assumed to have no payload data and are therefore not rejected.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>forcefullrsmatch</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Force Complete RS Match</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>By default, when the LoadMaster is trying to locate a Real Server for use with content switching, it tries to use the same Real Server as currently selected, even if the port is not the same. Enabling this parameter forces the port to also be compared.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>alwayspersist</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Always Check Persist</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 = Only check persist on the first request of a HTTP/1.1 connection</p><p>1 = Check the persist on every request</p><p>2 = All persistent changes will be saved, even in the middle of a connection</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This parameter also accepts <b>no </b>and <b>yes </b>as valid values. <b>No </b>and <b>yes </b>correspond to 0 and 1 respectively.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>closeonerror</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Close on Error</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When enabled, the LoadMaster will always close the client connection when it sends back an error response. For Example, this changes the behaviour of the LoadMaster when sending back a 304 File not changed message after receiving an If-Modified-Since HTTP header.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>dropatdrainend</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Drop at Drain Time End</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>If enabled, all open connections to disabled Real Servers will be dropped at the end of the Real Servers Drain Stop Time OR immediately if there are no Persist entries associated with the Real Server.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>droponfail</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Drop Connections on RS failure</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>By default, existing connections are not closed if a Real Server fails. Enabling this feature causes all connections to be immediately dropped on Real Server failure</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>expect100</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>100-Continue Handling</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - RFC-2616 Compliant</p><p>1 - Require 100-Continue</p><p>2 - RFC-7231 Compliant</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Determines how 100-Continue Handling messages are handled. The available options are:</p><p>- RFC-2616 Compliant (<b>0</b>): conforms with the behavior as outlined in RFC-2616</p><p>- Require 100-Continue (<b>1</b>): forces the LoadMaster to wait for the 100-Continue message</p><p>- RFC-7231 Compliant (<b>2</b>): ensures the LoadMaster does not wait for 100-Continue messages. This is the default value.</p><p>Modifying how 100 Continue messages are handled by the system requires an understanding of the relevant technologies as described in the RFCs listed above. It is recommended that you speak with a Kemp Technical Support engineer before making changes to these settings.</p><p> </p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>rfcconform</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Conform to RFC</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>By default, the LoadMaster conforms to the RFC when parsing HTTP headers. Disabling this will allow interworking with some broken browsers.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>rsarelocal</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Real Servers are Local</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When checking to see if a client is on the local subnet, also check to see if the client is actually a Real Server.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>localbind</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Allow connection scaling over 64K Connections</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>In very high load situations, local port exhaustion can occur. Enabling this option allows the setting of alternate source addresses. This can be used to expand the number of available local ports.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>transparent</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>L7 Transparency</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Globally enable or disable the transparent handling of connections using the L7 subsystem. L4 connections are ALWAYS handled transparently.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>slowstart</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Least Connection Slow Start</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-600</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When using the Least Connection (or Weighted Least Connection) scheduling method, specify the time (in seconds) over which the load to a Real Server which has just come online will be throttled.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>addforwardheader</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Additional L7 Header</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - X-ClientSide</p><p>1 - X-Forwarded-For</p><p>2 - None</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This option (which is only available when<b> L7 Transparency</b> is disabled) allows the addition of either <b>X-ClientSide </b>or <b>X-Forwarded For </b>to the HTTP header. The default value is <b>X-Forwarded-For</b>.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>logsplitinterval</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Log Insight Message Split Interval</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>1-100</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When using Log Insight Scheduling this is the number of messages which are received on a connection before the stream is rescheduled. The default value is 10.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>authtimeout</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>L7 Authentication Timeout (secs)</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>30 – 300</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The duration (in seconds) that a connection remains open for while authentication is ongoing. This value can be between 30 and 300.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>authpostwait</div><div><div><div><div></div></div></div><div></div></div></td><td><div>L7 Wait after POST(ms)</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>1-2000</div><div><div><div><div></div></div></div><div></div></div></td><td><div>When using KCD backend authentication, the length of time to wait for a 401 response from a POST before sending the remainder of the POST body.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>clienttokentimeout</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>L7 Client Token Timeout (secs)</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>60-300</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The duration (in seconds) to wait for the client token while the process of authentication is ongoing (used for RSA SecurID and RADIUS authentication). The default value for this parameter is 120.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>ShareSubVSPersist</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Share SubVS Persistence</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>By default, each SubVS has an independent persistence table. Enabling this parameter will allow the SubVS to share this information.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>loguseragent</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Include User Agent Header in User Logs</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div>When enabled, the User Agent header field is added to the User Logs.</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>CEFmsgFormat</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Use CEF Log Format</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When enabled, the ESP logs are generated in Common Event Format (CEF). CEF log format is easily consumable for Security Information and Event Management (SIEM) tools, such as; Splunk, SolarWinds, LogRhythm, AlienVault, and so on.<br /></p><p>This option is disabled by default.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>L7SameSite</div><div><div><div><div></div></div></div><div></div></div></td><td><div>Default ESP Cookie SameSite Processing</div><div><div><div><div></div></div></div><div></div></div></td><td><div>I</div><div><div><div><div></div></div></div><div></div></div></td><td><div>0 – SameSite Option Not Added<br /><br />1 – SameSite=None<br /><br />2 - SameSite=LAX<br /><br />3 - SameSite=Strict<br /></div><div><div><div><div></div></div></div><div></div></div></td><td><div>Set the default value for SameSite option for cookies sent by the LoadMaster during ESP processing. The default value is<b> 0</b> (<b>SameSite option Not Added</b>).</div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>L7NTLMProxy</div><div><div><div><div></div></div></div><div></div></div></td><td><div>NTLM Proxy Mode</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When <b>L7NTLMProxy</b> is enabled, NTLM authorization works against the Real Servers. If <b>L7NTLMProxy</b> is disabled, the old insecure NTLM processing is performed.</p><p><b>Note: </b>Kemp highly recommends ensuring that <b>L7NTLMProxy</b> is enabled.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","_postman_id":"b5fd1339-be8c-4114-b8d7-05984ddfbd9f"},{"name":"Network Options","item":[{"name":"Show the Local Reserved Ports","id":"d555d884-98bf-4edb-93b5-8446a7d88446","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showlocalreservedports","description":"<p>Show the <strong>Local Reserved Ports</strong>.</p>\n<blockquote>\n<p><strong>Note:</strong> This command is not supported in the LTSF LoadMaster version yet.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showlocalreservedports"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"8829a34f-4e58-45d8-8602-20ab95e3f9b1","name":"Show the Local Reserved Ports","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"{\r\n    \"cmd\": \"showlocalreservedports\",\r\n    \"apikey\": \"InsertAPIKey\"\r\n}","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showlocalreservedports"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 20 Aug 2024 09:37:07 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/xml","description":"","type":"text"}],"cookie":[],"responseTime":null,"body":"<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <LocalReservedPorts>2034,2035</LocalReservedPorts>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"d555d884-98bf-4edb-93b5-8446a7d88446"},{"name":"Set the Local Reserved Ports","id":"9a532fce-47eb-4953-840f-82df0bae39bd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setlocalreservedports?ports=2034,2035","description":"<p>Specify a single port, or list of comma-separated ports, that will not be used when initiating connections to Real Servers. Some things to note about this field are as follows:</p>\n<ul>\n<li><p>Ports specified in the list must be between 1024 and 63999 (inclusive).</p>\n</li>\n<li><p>A port cannot appear more than once in the list.</p>\n</li>\n<li><p>The total length of the list cannot exceed 128 characters.</p>\n</li>\n<li><p>If you are making changes to an existing list, the entire list of ports must be specified.</p>\n</li>\n</ul>\n<blockquote>\n<p><strong>Warning:</strong> To protect against port exhaustion during periods of heavy traffic, LoadMaster uses a wide set of ports (1024 to 63999). Significantly reducing the number of these ports available for connections to Real Servers could lead to port exhaustion (that is, dropped server-side connections), so best practice is to keep the number of ports removed low – a single-digit percentage of all ports. </p>\n</blockquote>\n<p>For more information, refer to the <a href=\"https://docs.progress.com/bundle/loadmaster-configuration-guide-web-user-interface-wui-ga/page/Network-Options.html\"></a><a href=\"https://docs.progress.com/bundle/loadmaster-configuration-guide-web-user-interface-wui-ga/page/Network-Options.html\">Network Options section of the Web User Interface (WUI) Configuration Guide</a>.</p>\n<blockquote>\n<p><strong>Note:</strong> This command is not supported in the LTSF LoadMaster version yet.</p>\n</blockquote>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setlocalreservedports"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"ports","value":"2034,2035"}],"variable":[]}},"response":[{"id":"bd0f501b-20cc-4e36-be6a-f954527e6513","name":"Set the Local Reserved Ports","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setlocalreservedports?ports=2034,2035","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setlocalreservedports"],"query":[{"key":"ports","value":"2034,2035"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 20 Aug 2024 09:39:04 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"application/xml","description":"","type":"text"}],"cookie":[],"responseTime":null,"body":"<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"9a532fce-47eb-4953-840f-82df0bae39bd"}],"id":"8f5803e6-91a6-46be-afbf-bc0c0760f220","description":"<p>Parameters relating to Network Options that can be managed using <strong>get</strong> and <strong>set</strong> commands are detailed in the following table.</p>\n<p>Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for the <strong>get</strong> and <strong>set</strong> commands.</p>\n<table><tbody><tr><td><div><p><b>Name</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Type</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Range</b></p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p><b>Additional Information</b></p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>snat</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enabling this option allows the LoadMaster to NAT connections from the Real Servers to the internet.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>allowupload</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The LoadMaster has been optimized with HTTP workloads in mind. Enabling this option allows non HTTP uploads to work correctly.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>conntimeout</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>I</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0-86400</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Specify (in seconds) the time a connection can be idle before it is closed. This is independent of Persistency Timeout. Setting a value of 0 resets to the default value of 660 seconds.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>keepalive</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>By default, the system uses TCP keepalives to check for failed clients. Enabling this option improves the reliability of older TCP connections (SSH sessions). This is not normally required for normal HTTP/HTTPS services.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>multigw</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Use this option to enable the ability to move the default gateway to a different interface.</p><p><b>Note: </b>Alternate default gateway support is not permitted in a cloud environment.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>nonlocalrs</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enable this option to permit non-local Real Servers to be assigned to Virtual Services.</p><p>This option is enabled by default.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>onlydefaultroutes</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>Enable this option to force traffic from Virtual Services, which have default route entries set, to be routed to the interface where the Virtual Service’s default route is located.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>resetclose</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When enabled, the LoadMaster will close its connection to the Real Servers by using TCP RESET instead of the normal close handshake.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>subnetorigin</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When transparency is disabled for a Virtual Service, the source IP address of connections to Real Servers is the Virtual Service. When enabled, the source IP address is the local address of the LoadMaster. If the Real Server is on a subnet, the subnet address of the LoadMaster will be used.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>subnetoriginating</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When transparency is disabled for a Virtual Service, the source IP address of connections to Real Servers is the Virtual Service. When enabled, the source IP address is the local address of the LoadMaster. If the Real Server is on a subnet, the subnet address of the LoadMaster will be used.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>tcptimestamp</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>The LoadMaster can include a timestamp in the SYN when connecting to Real Servers. Only enable this only on request from Kemp Support.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>routefilter</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>When enabled, this option only accepts IP frames from a host over the interface where the routing algorithm would route frames to the host. This is known as strict source route validation.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>sslforceserververify</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>B</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 – Disabled</p><p>1 – Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>By default, when re-encrypting traffic the LoadMaster does not check the certificate provided by the Real Server. Enabling this option forces the LoadMaster to verify that the certificate on the Real Server is valid, that is, the certificate authority and expiration are OK. This includes all intermediate certificates.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div><p>http_proxy</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>S</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p> </p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This option allows clients to specify the HTTP(S) proxy server and port the LoadMaster will use to access the internet.</p><p> </p></div><div><div><div><div></div></div></div><div></div></div></td></tr><tr><td><div>tcpnorecycle</div><div><div><div><div></div></div></div><div></div></div></td><td><div>B</div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>0 - Disabled</p><p>1 - Enabled</p></div><div><div><div><div></div></div></div><div></div></div></td><td><div><p>This option is disabled by default. Enable this option to revert to the legacy mode of reusing TCP timewait connections.</p><p><b>Note: </b>Only enable this after consulting with Kemp Support.</p></div><div><div><div><div></div></div></div><div></div></div></td></tr></tbody></table>","_postman_id":"8f5803e6-91a6-46be-afbf-bc0c0760f220"}],"id":"f0c93406-1d1f-49af-ab94-970b9e901472","description":"<p>Refer to the sections below for details on the RESTful API commands and parameters relating to the sections within <strong>System Configuration &gt; Miscellaneous Options</strong> in the LoadMaster User Interface (UI).</p>\n","_postman_id":"f0c93406-1d1f-49af-ab94-970b9e901472"},{"name":"Network Telemetry","item":[{"name":"Check if Network Telemetry Monitoring is Enabled on All Interfaces","id":"0ccdd7b9-d8f6-44b8-a944-c1c92da4b010","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showtelemetry?interface=0","description":"<p>To check if network telemetry monitoring is enabled or disabled on all interfaces, run the <strong>showtelemetry</strong> command with no parameters.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showtelemetry"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"0"}],"variable":[]}},"response":[{"id":"3baa468d-bc15-4ec2-9958-1e4660ec578c","name":"Check if Network Telemetry Monitoring is Enabled on All Interfaces","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showtelemetry?interface=0","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","showtelemetry"],"query":[{"key":"interface","value":"0"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 06 Aug 2024 11:19:31 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Interface>\n                <Id>0</Id>\n                <Name>eth0</Name>\n                <Enabled>N</Enabled>\n            </Interface>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"0ccdd7b9-d8f6-44b8-a944-c1c92da4b010"},{"name":"Check if Network Telemetry is Enabled or Disabled on a Specific Interface","id":"1d9d67b4-7b63-40e4-b0fb-1f7d8a479980","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showtelemetry?interface=0","description":"<p>To check if network telemetry monitoring is enabled or disabled on a specific interface, run the<br /><strong>showtelemetry</strong> command with the <strong>interface</strong> parameter.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","showtelemetry"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"0"}],"variable":[]}},"response":[{"id":"f34b7268-5902-4703-a648-b3cc5a69414e","name":"Check if Network Telemetry is Enabled or Disabled on a Specific Interface","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/showtelemetry?interface=0","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","showtelemetry"],"query":[{"key":"interface","value":"0"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 14:42:20 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>\n        <Data>\n            <Interface>\n                <Id>0</Id>\n                <Name>eth0</Name>\n                <Enabled>N</Enabled>\n            </Interface>\n        </Data>\n    </Success>\n</Response>"}],"_postman_id":"1d9d67b4-7b63-40e4-b0fb-1f7d8a479980"},{"name":"Enable or Disable Network Telemetry on a Particular Interface","id":"1a05b468-a4ce-4b48-86bf-98b96c330d8e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/enabletelemetry?interface=0&enable=1","description":"<p>To enable or disable network telemetry monitoring on a particular interface, run the<br /><strong>enabletelemetry</strong> command.</p>\n<blockquote>\n<p>The <strong>Collector Endpoint</strong> (<strong>TelemetryServer</strong> parameter) must be set before you enable network telemetry monitoring on an interface.</p>\n</blockquote>\n<p>Valid values for <strong>enable</strong> are:</p>\n<ul>\n<li>0 - Disabled</li>\n<li>1 - Enabled</li>\n</ul>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","enabletelemetry"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"0"},{"key":"enable","value":"1"}],"variable":[]}},"response":[{"id":"988e4156-4b48-49bc-8e6d-f8030b15e65f","name":"Enable or Disable Network Telemetry on a Particular Interface","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/enabletelemetry?interface=0&enable=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","enabletelemetry"],"query":[{"key":"interface","value":"0"},{"key":"enable","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Thu, 15 Aug 2024 14:44:38 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<response stat=\"200\">\n    <message>Command completed ok</message>\n    <status>ok</status>\n</response>"}],"_postman_id":"1a05b468-a4ce-4b48-86bf-98b96c330d8e"}],"id":"2f8fd3bb-8f53-4790-95fc-7911e95eb842","description":"<p>A number of parameters relating to network telemetry can be retrieved and configured using the <strong>get</strong> and <strong>set</strong> commands. Refer to the <a href=\"#579ea067-16d9-48df-8947-e155e77a5a65\">Using get and set commands</a> section for details on the <strong>get</strong> and <strong>set</strong> commands. The details of parameters are available in below table:</p>\n<table><tbody><tr><td><p><b>Name</b></p></td><td><p><b>Type</b></p></td><td><p><b>Default</b></p></td><td><p><b>Range</b></p></td><td><p><b>Additional Information</b></p></td></tr><tr><td><p>TelemetryServer</p></td><td><p>S</p></td><td><p>unset</p></td><td><p> </p></td><td><p>Define the destination IP address or Fully Qualified Domain Name (FQDN) and port number of your IPFIX collector (for example, <b>1.1.1.1:2055</b> or <b>collector.local:3000</b>). The IPFIX export runs over the UDP protocol and you must ensure that the collector is reachable over the network from the LoadMaster.</p></td></tr><tr><td>TelemetryActiveTimeout</td><td>I</td><td>300</td><td>10 - 6000</td><td>The global active timeout value.</td></tr><tr><td>TelemetryInactiveTimeout</td><td>I</td><td>30</td><td>1 - 59</td><td>The global inactive timeout value.</td></tr><tr><td>TelemetryOptArp</td><td>B</td><td>1 - Enabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>Specify whether or not to collect ARP values.</td></tr><tr><td>TelemetryOptDhcp</td><td>B</td><td>1 - Enabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>Specify whether or not to collect DHCP values.</td></tr><tr><td>TelemetryOptDns</td><td>B</td><td>1 - Enabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>Specify whether or not to collect DNS values.</td></tr><tr><td>TelemetryOptHttp</td><td>B</td><td>1 - Enabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>Specify whether or not to collect HTTP values.</td></tr><tr><td>TelemetryOptMail</td><td>B</td><td>1 - Enabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>Specify whether or not to collect email values.</td></tr><tr><td>TelemetryOptNbar2</td><td>B</td><td>1 - Enabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>Specify whether or not to collect NBAR2 values.</td></tr><tr><td>TelemetryOptSamba</td><td>B</td><td>1 - Enabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>Specify whether or not to collect Samba values.</td></tr><tr><td>TelemetryOptExtendedVoip</td><td>B</td><td>1 - Enabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>Specify whether or not to collect VoIP values.</td></tr><tr><td>TelemetryOptMsSql</td><td>B</td><td>1 - Enabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>Specify whether or not to collect MSSQL values.</td></tr><tr><td>TelemetryOptPostgres</td><td>B</td><td>1 - Enabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>Specify whether or not to collect PostgresSQL values.</td></tr><tr><td>TelemetryOptMySql</td><td>B</td><td>1 - Enabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>Specify whether or not to collect MySQL values.</td></tr><tr><td>TelemetryOptNpm</td><td>B</td><td>1 - Enabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>Specify whether or not to collect NPM values.</td></tr><tr><td>TelemetryOptExtendedNpm</td><td>B</td><td>1 - Enabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>Specify whether or not to collect Extended NPM values.</td></tr><tr><td>TelemetryOptVxlan</td><td>B</td><td>1 - Enabled</td><td><p>0 - Disabled</p><p>1 - Enabled</p></td><td>Specify whether or not to collect VXLAN values.</td></tr></tbody></table>","_postman_id":"2f8fd3bb-8f53-4790-95fc-7911e95eb842"},{"name":"Setting Up HA using the RESTful API","item":[{"name":"Set up HA on a Regular LoadMaster using RESTful API","item":[{"name":"Set the Partner Shared Secret","id":"c0d4c307-a6b6-459a-a645-1ef42e2375d5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setlmcommsecret?secret=ExampleSecret","description":"<p>This secret must have a minimum of 8 and a maximum of 127 characters. The following characters are supported:</p>\n<ul>\n<li>Numeric: 0-9</li>\n<li>Uppercase alphabetic: A-Z</li>\n<li>Lowercase alphabetic: a-z</li>\n<li>Special characters: !\"#$%&amp;()*+,-./:;&lt;=&gt;?[\\~]^_@`{|}</li>\n</ul>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setlmcommsecret"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"secret","value":"ExampleSecret"}],"variable":[]}},"response":[{"id":"1f809085-02f9-487b-a407-fe40ee39f0e9","name":"Set the Partner Shared Secret","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setlmcommsecret?secret=ExampleSecret","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setlmcommsecret"],"query":[{"key":"secret","value":"ExampleSecret"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 12 Aug 2024 04:33:39 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"c0d4c307-a6b6-459a-a645-1ef42e2375d5"},{"name":"Set Device 1 to HA1","id":"9a7bfc50-a019-4533-84a9-01229299c768","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=hamode&value=1","description":"<ol>\n<li>Set device 1 to HA1.</li>\n</ol>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","set"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"hamode"},{"key":"value","value":"1"}],"variable":[]}},"response":[{"id":"a5ee6b6c-62d2-4bb8-8c7d-c2cb60779b70","name":"Set Device 1 to HA1","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=hamode&value=1","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","set"],"query":[{"key":"param","value":"hamode"},{"key":"value","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 11:47:53 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"9a7bfc50-a019-4533-84a9-01229299c768"},{"name":"Reboot HA1","id":"af00b747-5ef4-47a6-b66d-af7712ff53ac","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/reboot","description":"<p>2. Reboot HA1.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","reboot"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"4fa12709-3ca7-430d-b7b5-42da279e530d","name":"Reboot HA1","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/reboot"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 04:18:27 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"af00b747-5ef4-47a6-b66d-af7712ff53ac"},{"name":"Set HA1's Partner's Address (HA2 Address)","id":"3d486835-a3cc-4ed7-b062-e96b443ca9ef","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiface?interface=0&PartnerIPAddress=InsertPartnerIPAddress","description":"<p>3. Set HA1’s partner’s address (HA2 address).</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modiface"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"0"},{"key":"PartnerIPAddress","value":"InsertPartnerIPAddress"}],"variable":[]}},"response":[{"id":"93a9475e-9795-4222-951d-1ec5df75e7bb","name":"Set HA1's Partner's Address (HA2 Address)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiface?interface=0&PartnerIPAddress=InsertPartnerIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modiface"],"query":[{"key":"interface","value":"0"},{"key":"PartnerIPAddress","value":"InsertPartnerIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 11:54:12 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"3d486835-a3cc-4ed7-b062-e96b443ca9ef"},{"name":"Set the Shared IP Address for the HA Pair","id":"7aca5fb4-e7a8-45a5-9066-6663639066ea","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiface?interface=0&SharedIPAddress=InsertSharedIPAddress","description":"<p>4. Set the shared IP address for the HA pair.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modiface"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"0"},{"key":"SharedIPAddress","value":"InsertSharedIPAddress"}],"variable":[]}},"response":[{"id":"3602ad51-f259-4330-9725-6031feec5daa","name":"Set the Shared IP Address for the HA Pair","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiface?interface=0&SharedIPAddress=InsertSharedIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modiface"],"query":[{"key":"interface","value":"0"},{"key":"SharedIPAddress","value":"InsertSharedIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 12:03:16 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Shared address set</Success>\n</Response>"}],"_postman_id":"7aca5fb4-e7a8-45a5-9066-6663639066ea"},{"name":"Set HA2 to Secondary","id":"e4e31929-80d0-48fd-b822-5f80360ced63","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=hamode&value=2","description":"<p>5. Set HA2 to secondary.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","set"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"hamode"},{"key":"value","value":"2"}],"variable":[]}},"response":[{"id":"0a58547e-dd7c-4a90-8a18-2769a50cc8b3","name":"Set HA2 to Secondary","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/set?param=hamode&value=2","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","set"],"query":[{"key":"param","value":"hamode"},{"key":"value","value":"2"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Tue, 13 Aug 2024 12:06:51 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"e4e31929-80d0-48fd-b822-5f80360ced63"},{"name":"Reboot HA2","id":"51c49944-3a36-424a-af79-142c265291df","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/reboot","description":"<p>6. Reboot HA2.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","reboot"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"b806af42-b42f-4aa3-82fb-691e88db0097","name":"Reboot HA2","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/reboot"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 04:31:02 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"51c49944-3a36-424a-af79-142c265291df"},{"name":"Set HA2's Partner's Address (HA1's Address)","id":"2a513077-a492-404b-b8fb-4b5f201147bf","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiface?interface=0&partner=InsertLoadMasterIPAddress","description":"<p>7. Set HA2’s partner’s address (HA1’s address).</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modiface"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"0"},{"key":"partner","value":"InsertLoadMasterIPAddress"}],"variable":[]}},"response":[{"id":"27dfc434-c404-4915-855b-8c5ed026431e","name":"Set HA2's Partner's Address (HA1's Address)","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiface?interface=0&partner=InsertLoadMasterIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modiface"],"query":[{"key":"interface","value":"0"},{"key":"partner","value":"InsertLoadMasterIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 04:50:17 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"2a513077-a492-404b-b8fb-4b5f201147bf"},{"name":"Set the Shared IP Address for the HA Pair","id":"61d9c5aa-8aeb-48cc-982d-d1f6a16c024d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiface?interface=0&SharedIPAddress=InsertSharedIPAddress","description":"<p>8. Set the Shared IP Address for the HA Pair.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","modiface"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"interface","value":"0"},{"key":"SharedIPAddress","value":"InsertSharedIPAddress"}],"variable":[]}},"response":[{"id":"32e090dd-dc41-41c3-8647-8099aa5b3e71","name":"Set the Shared IP Address for the HA Pair","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/modiface?interface=0&SharedIPAddress=InsertSharedIPAddress","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","modiface"],"query":[{"key":"interface","value":"0"},{"key":"SharedIPAddress","value":"InsertSharedIPAddress"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 05:27:34 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Shared address set</Success>\n</Response>"}],"_postman_id":"61d9c5aa-8aeb-48cc-982d-d1f6a16c024d"}],"id":"860fd627-5d53-4b44-9dc2-31158663aa11","description":"<p>The example commands that are needed to set up HA using the RESTful API on a regular LoadMaster are in order below.</p>\n<blockquote>\n<p>Commands such as <strong>reboot</strong> take several seconds for the LoadMaster to complete. If scripting, allow for a proper delay after the <strong>reboot</strong> command.</p>\n</blockquote>\n","_postman_id":"860fd627-5d53-4b44-9dc2-31158663aa11"},{"name":"Remove HA from Regular LoadMasters","item":[{"name":"Set to non-HA","id":"54f480e2-06b0-458f-9156-b73c8e5a129c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/set?param=hamode&value=0","description":"<ol>\n<li>Set to non-HA.</li>\n</ol>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","port":"8443","path":["access","set"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"param","value":"hamode"},{"key":"value","value":"0"}],"variable":[]}},"response":[{"id":"50435cc5-2c31-4634-9ca6-5443fc07ab7a","name":"Set to non-HA","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/set?param=hamode&value=0","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"port":"8443","path":["access","set"],"query":[{"key":"param","value":"hamode"},{"key":"value","value":"0"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:39:51 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"54f480e2-06b0-458f-9156-b73c8e5a129c"},{"name":"Reboot","id":"576e975a-6e54-41c6-99d8-2235fe7929a4","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPasswordl@InsertLoadMasterIPAddress/access/reboot","description":"<p>2. Reboot.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPasswordl"},"protocol":"https","path":["access","reboot"],"host":["InsertLoadMasterIPAddress"],"query":[],"variable":[]}},"response":[{"id":"befa59b0-53df-4cf8-b891-fc1b16579a9c","name":"Reboot","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPasswordl@InsertLoadMasterIPAddress/access/reboot"},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 04:21:29 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"576e975a-6e54-41c6-99d8-2235fe7929a4"}],"id":"bfd6ad43-a537-44b6-8519-d13d549f0f2c","description":"<p>To remove HA, run the commands below.</p>\n","_postman_id":"bfd6ad43-a537-44b6-8519-d13d549f0f2c"},{"name":"Set up HA on an Azure LoadMaster","item":[{"name":"Set the Partner Shared Secret","id":"19af5ad8-2537-4c4b-a32d-7108ec840979","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setlmcommsecret?secret=ExampleSecret","description":"<p>This secret must have a minimum of 8 and a maximum of 127 characters. The following characters are supported:</p>\n<ul>\n<li>Numeric: 0-9</li>\n<li>Uppercase alphabetic: A-Z</li>\n<li>Lowercase alphabetic: a-z</li>\n<li>Special characters: !\"#$%&amp;()*+,-./:;&lt;=&gt;?[\\~]^_@`{|}</li>\n</ul>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","path":["access","setlmcommsecret"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"secret","value":"ExampleSecret"}],"variable":[]}},"response":[{"id":"6a8b163b-8c61-4135-a682-93d16110e61d","name":"Set the Partner Shared Secret","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress/access/setlmcommsecret?secret=ExampleSecret","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"path":["access","setlmcommsecret"],"query":[{"key":"secret","value":"ExampleSecret"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Mon, 12 Aug 2024 04:33:39 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"19af5ad8-2537-4c4b-a32d-7108ec840979"},{"name":"Set the Active Unit to First HA Mode","id":"1a83f4f6-5aeb-4a30-a266-b06a249cdf50","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehamode?hamode=first","description":"<p>Set the active unit to first HA mode.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","port":"8443","path":["access","azurehamode"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"hamode","value":"first"}],"variable":[]}},"response":[{"id":"1473dd01-8343-45db-8037-4943c681f0a0","name":"Set the Active Unit to First HA Mode","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehamode?hamode=first","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"port":"8443","path":["access","azurehamode"],"query":[{"key":"hamode","value":"first"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:41:16 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"1a83f4f6-5aeb-4a30-a266-b06a249cdf50"},{"name":"Set the HA Parameters (Partner Address and Health Check Port) for the Active Unit","id":"ccdcc5cc-5fe1-41ef-b6c8-30228dc5b79f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehaparam?partner=InsertLoadMasterIPAddress&hcp=443","description":"<p>Set the HA parameters (partner address and health check port) for the active unit.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","port":"8443","path":["access","azurehaparam"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"partner","value":"InsertLoadMasterIPAddress"},{"key":"hcp","value":"443"}],"variable":[]}},"response":[{"id":"d28e1dc9-564e-44c2-abfd-f6467d2ba9ac","name":"Set the HA Parameters (Partner Address and Health Check Port) for the Active Unit","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehaparam?partner=InsertLoadMasterIPAddress&hcp=443","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"port":"8443","path":["access","azurehaparam"],"query":[{"key":"partner","value":"InsertLoadMasterIPAddress"},{"key":"hcp","value":"443"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:42:59 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"ccdcc5cc-5fe1-41ef-b6c8-30228dc5b79f"},{"name":"Set the Standby Unit to Second HA Mode","id":"60ff8156-ef9a-43cc-9279-8aeac0325ad8","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehamode?hamode=second","description":"<p>Set the standby unit to second HA mode.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","port":"8443","path":["access","azurehamode"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"hamode","value":"second"}],"variable":[]}},"response":[{"id":"e7ee9e3a-22b7-43f5-b5c7-f5e26dee44cd","name":"Set the Standby Unit to Second HA Mode","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehamode?hamode=second","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"port":"8443","path":["access","azurehamode"],"query":[{"key":"hamode","value":"second"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:44:46 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"60ff8156-ef9a-43cc-9279-8aeac0325ad8"},{"name":"Set the HA Parameters (Partner Address and Health Check Port) for the Standby Unit","id":"fb7b1962-3676-4582-ae3b-8ce63c4915cd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehaparam?partner=InsertLoadMasterIPAddress&hcp=443","description":"<p>Set the HA parameters (partner address and health check port) for the standby.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","port":"8443","path":["access","azurehaparam"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"partner","value":"InsertLoadMasterIPAddress"},{"key":"hcp","value":"443"}],"variable":[]}},"response":[{"id":"0f665bf1-b9cd-4882-96b5-2faf2ff7e8f7","name":"Set the HA Parameters (Partner Address and Health Check Port) for the Standby Unit","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehaparam?partner=InsertLoadMasterIPAddress&hcp=443","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"port":"8443","path":["access","azurehaparam"],"query":[{"key":"partner","value":"InsertLoadMasterIPAddress"},{"key":"hcp","value":"443"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:45:58 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"fb7b1962-3676-4582-ae3b-8ce63c4915cd"}],"id":"55963a78-3c7f-440d-a06f-c3b77f2ab845","description":"<p>Refer to the following sections for example commands that you can use to set up HA on a LoadMaster for Azure using the RESTful API.</p>\n","_postman_id":"55963a78-3c7f-440d-a06f-c3b77f2ab845"},{"name":"Remove HA from Azure LoadMasters","item":[{"name":"Set the Active Unit to Single Mode","id":"39944278-6a74-41b6-baaf-fe85a4eefe82","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehamode?hamode=single","description":"<p>Set the active unit to single mode.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","port":"8443","path":["access","azurehamode"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"hamode","value":"single"}],"variable":[]}},"response":[{"id":"14e26acb-85ac-4985-a0ab-e17cb2556ce6","name":"Set the Active Unit to Single Mode","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehamode?hamode=single","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"port":"8443","path":["access","azurehamode"],"query":[{"key":"hamode","value":"single"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:47:19 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"39944278-6a74-41b6-baaf-fe85a4eefe82"},{"name":"Set the Standby Unit to Single Mode","id":"9b807b0a-a660-4c8c-b339-eba287a45c5b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehamode?hamode=single","description":"<p>Set the standby unit to single mode.</p>\n","urlObject":{"auth":{"user":"bal","password":"InsertPassword"},"protocol":"https","port":"8443","path":["access","azurehamode"],"host":["InsertLoadMasterIPAddress"],"query":[{"key":"hamode","value":"single"}],"variable":[]}},"response":[{"id":"11ee6746-e9aa-4425-a743-89958fd058e7","name":"Set the Standby Unit to Single Mode","originalRequest":{"method":"GET","header":[],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":{"raw":"https://bal:InsertPassword@InsertLoadMasterIPAddress:8443/access/azurehamode?hamode=single","protocol":"https","auth":{"user":"bal","password":"InsertPassword"},"host":["InsertLoadMasterIPAddress"],"port":"8443","path":["access","azurehamode"],"query":[{"key":"hamode","value":"single"}]}},"status":"OK","code":200,"_postman_previewlanguage":"xml","header":[{"key":"Date","value":"Wed, 14 Aug 2024 10:48:24 GMT"},{"key":"Connection","value":"Keep-Alive"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Content-Type","value":"text/xml"}],"cookie":[],"responseTime":null,"body":"<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>\n<Response stat=\"200\" code=\"ok\">\n    <Success>Command completed ok</Success>\n</Response>"}],"_postman_id":"9b807b0a-a660-4c8c-b339-eba287a45c5b"}],"id":"40f654e9-a75c-41de-895f-6fc9f5c1e80e","description":"<p>To remove HA, use the following commands.</p>\n","_postman_id":"40f654e9-a75c-41de-895f-6fc9f5c1e80e"}],"id":"649636ff-2d17-4a7d-9b69-1765d92ca890","description":"<p>The two sections below provide step-by-step instructions on how to set up HA using the RESTful API on a regular LoadMaster and a LoadMaster for Azure.</p>\n","_postman_id":"649636ff-2d17-4a7d-9b69-1765d92ca890"},{"name":"Scripting Examples with the LoadMaster RESTful API","item":[],"id":"e67368eb-ff93-40b9-a89d-24eaa823f31d","description":"<p>The LoadMaster RESTful API can be used in conjunction with many scripting methods and applications to allow users and applications to directly access the LoadMaster.<br />Refer to the <a href=\"https://kemptechnologies.com/documentation/latestga/203756799\">RESTful API Programmers Guide, Technical Note</a> for some detailed examples of how the RESTful API can be used.</p>\n","_postman_id":"e67368eb-ff93-40b9-a89d-24eaa823f31d"},{"name":"References","item":[],"id":"d1a45179-262b-49ac-a750-707625094434","description":"<p>This document provides details on the RESTful API commands and parameters but it does not go into detail about the various LoadMaster features available. Refer to the <a href=\"http://kemptechnologies.com/documentation\">Kemp Documentation page</a> for further details on each of the LoadMaster features.</p>\n<p>Here is a list of useful links to some LoadMaster documents:</p>\n<ul>\n<li><a href=\"https://kemptechnologies.com/documentation/latestga/213906303\">WUI, Configuration Guide</a></li>\n<li><a href=\"https://kemptechnologies.com/documentation/latestga/204373265\">Kemp LoadMaster, Product Overview</a></li>\n<li><a href=\"https://kemptechnologies.com/documentation/latestga/203125829\">SSL Accelerated Services, Feature Description</a></li>\n<li><a href=\"https://kemptechnologies.com/documentation/latestga/203125189\">GEO, Feature Description</a></li>\n<li><a href=\"https://kemptechnologies.com/documentation/latestga/203756799\">RESTful API Programmers Guide, Technical Note</a></li>\n<li><a href=\"https://kemptechnologies.com/documentation/latestga/203125319\">Licensing, Feature Description</a></li>\n<li><a href=\"https://kemptechnologies.com/documentation/latestga/203128129\">CLI, Interface Description</a></li>\n<li><a href=\"https://kemptechnologies.com/documentation/latestga/207481206\">LoadMaster Clustering, Feature Description</a></li>\n<li><a href=\"https://kemptechnologies.com/documentation/latestga/203126599\">Custom Authentication Form, Technical Note</a></li>\n<li><a href=\"https://kemptechnologies.com/documentation/latestga/208807246\">User Management, Feature Description</a></li>\n<li><a href=\"https://kemptechnologies.com/documentation/latestga/203125019\">Content Rules, Feature Description</a></li>\n</ul>\n","_postman_id":"d1a45179-262b-49ac-a750-707625094434"}],"event":[{"listen":"prerequest","script":{"id":"912523ae-b2f5-48ae-ad6c-5b10939f7663","type":"text/javascript","exec":[""]}},{"listen":"test","script":{"id":"5fa527e0-6da5-4268-b510-ea0200c41e19","type":"text/javascript","exec":[""]}}],"variable":[{"id":"3cddc52f-18a3-4b7e-8ad2-6c9ef15d94a4","key":"LoadMasterIPAddress","value":"InsertLoadMasterIPAddress"},{"id":"a731aff7-36b2-4634-b8a6-ca9393c88f88","key":"APIKey","value":"InsertAPIKey"},{"id":"49b21378-17a3-48e5-8877-31838ddf0742","key":"VirtualServiceIPAddress","value":"InsertVirtualServiceIPAddress"},{"id":"029c8f0e-4350-44ea-a60a-8971fe301863","key":"APIPass","value":"InsertPassword"},{"id":"98cc1555-8517-4e65-8122-c6dcb05328ea","key":"ExampleUserPass","value":"InsertPassword"},{"id":"113dc90c-9b1c-4ae0-95c3-93720db06142","key":"NewVirtualServiceIPAddress","value":"InsertVirtualServiceIPAddress"},{"id":"b404ce7e-6df3-42fc-bef8-03621d76f2fa","key":"ClusterNodeIPAddress","value":"InsertClusterNodeIPAddress"},{"id":"2314b745-1330-4a00-a4ec-602e6a610752","key":"PartnerIPAddress","value":"InsertPartnerIPAddress"},{"id":"0c105283-0a7c-4cac-8068-f413961eae4e","key":"SharedIPAddress","value":"InsertSharedIPAddress"},{"id":"65fb50ec-1de4-4c37-8dd0-8ac30fe8a594","key":"NewLoadMasterIPAddress","value":"InsertNewLoadMasterIPAddress"},{"id":"407e6cf4-9d08-4833-ba81-044156c313f0","key":"ProgressID","value":"InsertProgressID"},{"id":"77f9fa35-9813-4d33-b03b-bfbb715a31d3","key":"ProgressIDPassword","value":"InsertProgressIDPassword"},{"id":"47cc853d-dc20-49c9-9a3b-84570145a75d","key":"AdditionalAddress/Prefix","value":"InsertAdditionalAddress/Prefix"},{"id":"694c7143-b953-4fc8-a8af-7033eb694bb8","key":"HostIPAddress","value":"InsertHostIPAddress"},{"id":"d06a2215-1359-4b55-8f6b-d44330443a6c","key":"DestinationIPAddress","value":"InsertDestinationIPAddress"},{"id":"0b0214ca-a12f-4660-9231-265ecccd2ed0","key":"GatewayIPAddress","value":"InsertGatewayIPAddress"},{"id":"cddf539a-a7c8-4b0d-9d6d-95d5ed7b4d69","key":"LocalIPAddress","value":"InsertLocalIPAddress"},{"id":"8f6e43c6-bb53-4e2a-b14f-8feea39e43c9","key":"LocalSubnetAddress","value":"InsertLocalSubnetAddress"},{"id":"c5901972-6090-4161-91b1-b7b884920e14","key":"RemoteIPAddress","value":"InsertRemoteIPAddress"},{"id":"ed5ba795-362e-484b-9fa3-b89a191726c6","key":"RemoteSubnetAddress","value":"InsertRemoteSubnetAddress"},{"id":"a159d991-cc11-4279-9d4b-7c15d282ed80","key":"CloudIPAddress","value":"InsertCloudIPAddress"},{"id":"e3678435-02cc-4fb7-ac82-42bd95e3f23b","key":"CloudAPIKey","value":"InsertCloudAPIKey"},{"id":"4cf799bb-1a84-4fda-a845-66fd0167c53f","key":"CloudPartnerAddress","value":"InsertCloudPartnerAddress"},{"id":"dc5cc700-06ff-4b87-a5fc-275bbd1a2165","key":"CloudPartnerAPIKey","value":"InsertCloudPartnerAPIKey"},{"id":"bc51dc83-f70c-47c8-8842-15ec5e2d97ad","key":"LoadMaster2IPAddress","value":"InsertLoadMasterIPAddress"},{"id":"e791889e-c6ec-4c1e-b12f-ce6a52a8ef13","key":"LoadMaster2APIKey","value":"InsertAPIKey"},{"id":"6fe17c04-d774-46a3-b8f5-dd4e9ce695de","key":"RealServerIPAddress","value":"InsertRealServerIPAddress"},{"id":"1ac13fff-5f09-4366-94b2-ac3cd14596eb","key":"VirtualServiceIPAddress2","value":"InsertVirtualServiceIPAddress"},{"id":"e01cce9c-3121-45d1-b312-d31ecd7b3910","key":"ExampleNewPass","value":"InsertNewPassword"},{"id":"11a73e4b-cb2c-4323-a2a9-a9663f929176","key":"Kemp360IPaddress","value":"InsertKemp360CentralIPAddress"},{"id":"62f15cb2-7028-4c85-b570-1fdf91532990","key":"APIKeyToDelete","value":"InsertAPIKey"},{"id":"c047f640-cdfa-43ba-8e84-8f4ca1711fca","key":"NODE_OPTIONS","value":"InsertValue"},{"id":"1655e077-7d65-40a9-b037-4edcae798143","key":"IPAddress","value":"InsertIPAddress"},{"id":"7e72d918-a220-4650-aaac-056896b35f6e","key":"MagicString","value":"InsertMagicString"},{"id":"b5fba638-de51-4ce3-acbd-7ea7182da8ad","key":"RealServerIPAddress2","value":"InsertRealServerIPAddress"},{"id":"808421b3-bfb9-4483-a9c6-114feb6e778c","key":"CheckerIPAddress","value":"InsertCheckerIPAddress"},{"id":"9891cb49-9c3d-4069-9deb-7e112bab73e7","key":"ExampleIPv6Address","value":"InsertIPv6Address"},{"id":"96263168-5f69-42b2-9906-4b53a18c154c","key":"ExamplePassword","value":"InsertPassword"},{"id":"e61a6c41-c5b4-49da-b839-7d7f3a9fbf1c","key":"Ciphers","value":"InsertCipher(s)"}]}