pem interception-endpointΒΆ

pem interception-endpoint(1)  BIG-IP TMSH Manual  pem interception-endpoint(1)



NAME
       interception-endpoint - Configures interception endpoints for the
       Policy Enforcement Manager (PEM).

MODULE
       pem

SYNTAX
       Modify the interception-endpoint component within the pem module using
       the syntax shown in the following sections.

   CREATE/MODIFY
	create interception-endpoint [name]
	modify interception-endpoint [name]
	  options:
	    app-service [[string] | none]
	    persistence [destination-ip | disabled | source-ip]
	    pool [name]

	edit interception-endpoint [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all-properties
	    non-default-properties

   DISPLAY
	list interception-endpoint
	list interception-endpoint [ [ [name] | [glob] | [regex] ] ... ]
	show running-config interception-endpoint
	show running-config interception-endpoint [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all-properties
	    non-default-properties
	    one-line
	    partition

   DELETE
	delete interception-endpoint [name]

       Note: You must remove all references to an interception-endpoint before
       you can delete the interception-endpoint.

DESCRIPTION
       You can use the interception-endpoint component to configure
       interception-endpoint definitions for the Policy Enforcement Manager.
       The interception-endpoint is used to clone all traffic.	Note: Before
       you create a cloning-endpoint you have to create a valid pool.  Please
       refer to ltm pool for more information about how to create a pool.

EXAMPLES
       create interception-endpoint my_endpoint { pool pool1 }

       Creates a Policy Enforcement Manager interception-endpoint named
       my_endpoint.

       delete interception-endpoint my_endpoint

       Deletes the interception-endpoint named my_endpoint.

       list interception-endpoint my_endpoint

       Displays the properties of the interception-endpoint named my_endpoint.

OPTIONS
       app-service
	    Specifies the name of the application service to which the object
	    belongs. The default value is none. Note: If the strict-updates
	    option is enabled on the application service that owns the object,
	    you cannot modify or delete the object. Only the application
	    service can modify or delete the object.

       persistence
	    Specifies the persistence that is based on either the source or
	    destination IP addresses only.

       pool Specifies the pool. It is mandatory to specify a pool when
	    creating any interception-endpoint. Before you create an
	    interception-endpoint you have to create a valid pool.

SEE ALSO
       create, delete, edit, glob, list, modify, pem forwarding-endpoint, pem
       listener, pem policy, pem profile diameter-endpoint, pem profile spm,
       pem reporting format-script, pem service-chain-endpoint, pem
       subscriber, pem subscribers, regex, show, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or
       by any means, electronic or mechanical, including photocopying,
       recording, or information storage and retrieval systems, for any
       purpose other than the purchaser's personal use, without the express
       written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2012-2013. All rights reserved.



BIG-IP				  2013-03-21	  pem interception-endpoint(1)