pem interception-endpoint
pem interception-endpoint(1) BIG-IP TMSH Manual pem interception-endpoint(1)
NAME
interception-endpoint - Configures interception endpoints for the Policy Enforcement Manager (PEM).
MODULE
pem
SYNTAX
Modify the interception-endpoint component within the pem module using the syntax shown in the following sections.
CREATE/MODIFY
create interception-endpoint [name]
modify interception-endpoint [name]
options:
app-service [[string] | none]
persistence [destination-ip | disabled | source-ip]
pool [name]
edit interception-endpoint [ [ [name] | [glob] | [regex] ] ... ]
options:
all-properties
non-default-properties
DISPLAY
list interception-endpoint
list interception-endpoint [ [ [name] | [glob] | [regex] ] ... ]
show running-config interception-endpoint
show running-config interception-endpoint [ [ [name] | [glob] | [regex] ] ... ]
options:
all-properties
non-default-properties
one-line
partition
DELETE
delete interception-endpoint [name]
Note: You must remove all references to an interception-endpoint before you can delete the interception-endpoint.
DESCRIPTION
You can use the interception-endpoint component to configure interception-endpoint definitions for the Policy Enforcement
Manager. The interception-endpoint is used to clone all traffic. Note: Before you create a cloning-endpoint you have to
create a valid pool. Please refer to ltm pool for more information about how to create a pool.
EXAMPLES
create interception-endpoint my_endpoint { pool pool1 }
Creates a Policy Enforcement Manager interception-endpoint named my_endpoint.
delete interception-endpoint my_endpoint
Deletes the interception-endpoint named my_endpoint.
list interception-endpoint my_endpoint
Displays the properties of the interception-endpoint named my_endpoint.
OPTIONS
app-service
Specifies the name of the application service to which the object belongs. The default value is none. Note: If the
strict-updates option is enabled on the application service that owns the object, you cannot modify or delete the
object. Only the application service can modify or delete the object.
persistence
Specifies the persistence that is based on either the source or destination IP addresses only.
pool Specifies the pool. It is mandatory to specify a pool when creating any interception-endpoint. Before you create an
interception-endpoint you have to create a valid pool.
SEE ALSO
create, delete, edit, glob, list, modify, pem forwarding-endpoint, pem listener, pem policy, pem profile diameter-endpoint,
pem profile spm, pem reporting format-script, pem service-chain-endpoint, pem subscriber, pem subscribers, regex, show,
tmsh
COPYRIGHT
No part of this program may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
photocopying, recording, or information storage and retrieval systems, for any purpose other than the purchaser's personal
use, without the express written permission of F5 Networks, Inc.
F5 Networks and BIG-IP (c) Copyright 2012-2013. All rights reserved.
BIG-IP 2013-03-21 pem interception-endpoint(1)