pem interception-endpointΒΆ

pem interception-endpoint(1)			  BIG-IP TMSH Manual			 pem interception-endpoint(1)

NAME
       interception-endpoint - Configures interception endpoints for the Policy Enforcement Manager (PEM).

MODULE
       pem

SYNTAX
       Modify the interception-endpoint component within the pem module using the syntax shown in the following
       sections.

   CREATE/MODIFY
	create interception-endpoint [name]
	modify interception-endpoint [name]
	  options:
	    app-service [[string] | none]
	    persistence [destination-ip | disabled | source-ip]
	    pool [name]

	edit interception-endpoint [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all-properties
	    non-default-properties

   DISPLAY
	list interception-endpoint
	list interception-endpoint [ [ [name] | [glob] | [regex] ] ... ]
	show running-config interception-endpoint
	show running-config interception-endpoint [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all-properties
	    non-default-properties
	    one-line
	    partition

   DELETE
	delete interception-endpoint [name]

       Note: You must remove all references to an interception-endpoint before you can delete the interception-
       endpoint.

DESCRIPTION
       You can use the interception-endpoint component to configure interception-endpoint definitions for the Policy
       Enforcement Manager.  The interception-endpoint is used to clone all traffic.  Note: Before you create a
       cloning-endpoint you have to create a valid pool.  Please refer to ltm pool for more information about how to
       create a pool.

EXAMPLES
       create interception-endpoint my_endpoint { pool pool1 }

       Creates a Policy Enforcement Manager interception-endpoint named my_endpoint.

       delete interception-endpoint my_endpoint

       Deletes the interception-endpoint named my_endpoint.

       list interception-endpoint my_endpoint

       Displays the properties of the interception-endpoint named my_endpoint.

OPTIONS
       app-service
	    Specifies the name of the application service to which the object belongs. The default value is none.
	    Note: If the strict-updates option is enabled on the application service that owns the object, you cannot
	    modify or delete the object. Only the application service can modify or delete the object.

       persistence
	    Specifies the persistence that is based on either the source or destination IP addresses only.

       pool Specifies the pool. It is mandatory to specify a pool when creating any interception-endpoint. Before you
	    create an interception-endpoint you have to create a valid pool.

SEE ALSO
       create, delete, edit, glob, list, modify, pem forwarding-endpoint, pem listener, pem policy, pem profile
       diameter-endpoint, pem profile spm, pem reporting format-script, pem service-chain-endpoint, pem subscriber,
       pem subscribers, regex, show, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or by any means, electronic or
       mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose
       other than the purchaser's personal use, without the express written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2012-2013. All rights reserved.

BIG-IP						      2013-03-21			 pem interception-endpoint(1)