pem interception-endpoint
pem interception-endpoint(1) BIG-IP TMSH Manual pem interception-endpoint(1)
NAME
interception-endpoint - Configures interception endpoints for the Policy Enforcement Manager (PEM).
MODULE
pem
SYNTAX
Modify the interception-endpoint component within the pem module using the syntax shown in the following
sections.
CREATE/MODIFY
create interception-endpoint [name]
modify interception-endpoint [name]
options:
app-service [[string] | none]
persistence [destination-ip | disabled | source-ip]
pool [name]
edit interception-endpoint [ [ [name] | [glob] | [regex] ] ... ]
options:
all-properties
non-default-properties
DISPLAY
list interception-endpoint
list interception-endpoint [ [ [name] | [glob] | [regex] ] ... ]
show running-config interception-endpoint
show running-config interception-endpoint [ [ [name] | [glob] | [regex] ] ... ]
options:
all-properties
non-default-properties
one-line
partition
DELETE
delete interception-endpoint [name]
Note: You must remove all references to an interception-endpoint before you can delete the interception-
endpoint.
DESCRIPTION
You can use the interception-endpoint component to configure interception-endpoint definitions for the Policy
Enforcement Manager. The interception-endpoint is used to clone all traffic. Note: Before you create a
cloning-endpoint you have to create a valid pool. Please refer to ltm pool for more information about how to
create a pool.
EXAMPLES
create interception-endpoint my_endpoint { pool pool1 }
Creates a Policy Enforcement Manager interception-endpoint named my_endpoint.
delete interception-endpoint my_endpoint
Deletes the interception-endpoint named my_endpoint.
list interception-endpoint my_endpoint
Displays the properties of the interception-endpoint named my_endpoint.
OPTIONS
app-service
Specifies the name of the application service to which the object belongs. The default value is none.
Note: If the strict-updates option is enabled on the application service that owns the object, you cannot
modify or delete the object. Only the application service can modify or delete the object.
persistence
Specifies the persistence that is based on either the source or destination IP addresses only.
pool Specifies the pool. It is mandatory to specify a pool when creating any interception-endpoint. Before you
create an interception-endpoint you have to create a valid pool.
SEE ALSO
create, delete, edit, glob, list, modify, pem forwarding-endpoint, pem listener, pem policy, pem profile
diameter-endpoint, pem profile spm, pem reporting format-script, pem service-chain-endpoint, pem subscriber,
pem subscribers, regex, show, tmsh
COPYRIGHT
No part of this program may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose
other than the purchaser's personal use, without the express written permission of F5 Networks, Inc.
F5 Networks and BIG-IP (c) Copyright 2012-2013. All rights reserved.
BIG-IP 2013-03-21 pem interception-endpoint(1)