PEM::InterceptionEndpoint¶
Introduced : BIG-IP_v11.4.0
You can use the interception-endpoint interface to configure
interception-endpoint definitions for the Policy Enforcement Manager.
The interception-endpoint is used to clone all traffic. The endpoint
will always point to a single pool. According to source-ip or
destination-ip, the subsequent traffic can be directed to the same
pool member, which is called persistence. The persistence feature can
be disabled. Note: Before you create a cloning-endpoint you have to
create a valid pool.
Methods¶
Method | Description | Introduced |
create | Creates a set of PEM interception-endpoints. | BIG-IP_v11.4.0 |
delete_all_interception_endpoints | Deletes all user defined interception-endpoints. | BIG-IP_v11.4.0 |
delete_interception_endpoint | Deletes the specified interception-endpoints. | BIG-IP_v11.4.0 |
get_list | Gets a list of all interception-endpoints. | BIG-IP_v11.4.0 |
get_persistence_type | Gets the persistence types of the specified interception-endpoints. | BIG-IP_v11.4.0 |
get_pool | Gets the pools for the specified interception-endpoints. | BIG-IP_v11.4.0 |
get_version | Gets the version information for this interface. | BIG-IP_v11.4.0 |
set_persistence_type | Sets the persistence types of the specified interception-endpoints which specifies whether traffic persists with pool members. If you want specific traffic to go to the same pool member, set the persistence type to source or destination IP address. | BIG-IP_v11.4.0 |
set_pool | Sets the pools for the specified interception-endpoints. | BIG-IP_v11.4.0 |
See Also¶
iControl ::
Warning
The links to the sample code below are remnants of the old DevCentral wiki and will result in a 404 error. For best results, please copy the link text and search the codeshare directly on DevCentral.
Sample Code¶
The BIG-IP API Reference documentation contains community-contributed content. F5 does not monitor or control community code contributions. We make no guarantees or warranties regarding the available code, and it may contain errors, defects, bugs, inaccuracies, or security vulnerabilities. Your access to and use of any code available in the BIG-IP API reference guides is solely at your own risk.