You are here: Using the CLI > Context Command Summaries > Cluster and Match Rule Commands

Cluster and Match Rule Commands

Each cluster has its own context and the settings available in the cluster’s context depends on the cluster’s proto parameter -- this parameter must be specified first on the command line when creating a cluster. A Layer 7 cluster may have one or more match rules associated with it, each with its own context. Cluster and match rule commands are summarized in the tables below.

CollapsedUsing cluster commands in the global context:
CollapsedUsing cluster commands in a cluster specific context:
CollapsedUsing match rule commands in the global context:
CollapsedUsing match rule commands in a match rule specific context:

Cluster and Match Rule Command Notes

Cluster Flags

A flag may be turned off by prefixing with "!".

Cluster 'proto' Flag Description

tcp and udp

dsr

Enables “direct server return" -- servers respond directly to clients rather than through FortiADC.

 

ics

Enables “inter-cluster sticky” -- Layer 4 persistence is preserved across clusters and server ports.

 

spoof

Disables Source NAT (SNAT) -- the client IP address is used as the source IP in packets sent to servers.

http and https

abort_server

Close server connections without waiting.

 

always

Always insert a cookie into server responses.

 

client_ip

Include the client IP address in headers.

 

compress

Compress server responses.

 

ignore_case

Do not consider case when evaluating a match rule.

 

no_header_rewrite

Do not rewrite Location headers in server responses.

 

once_only

Evaluate the first set of headers in a client connection only.

 

persist

Insert a cookie in server responses if the server did not.

 

spoof

Use the client IP as source IP in packets sent to servers.

 

tcp_mux

Enables TCP multiplexing for a cluster. TCP multiplexing must also be enabled on at least one server instance in the server pool assigned to the cluster (or one of its match rules). See the section.

https only

allow_sslv2

Enable SSLv2 for client connections.

 

allow_sslv3

Enable SSLv3 for client connections. This option is enabled by default.

 

push_client_cert

Send the entire client certificate to the back-end server. This allows the server to confirm that the client connection is authenticated without having to do a complete SSL renegotiation.

 

require_client_cert

Require that clients present certificates.

 

software_ssl_only

This flag appears only on systems that are equipped with Hardware SSL Acceleration. When enabled, it specifies that all SSL operations will be performed in software, instead of being performed using the SSL accelerator hardware. This flag does not appear on systems that are not equipped with Hardware SSL Acceleration, since on these units SSL operations are always performed in software. This flag is disabled by default.

 

 

Please note that enabling this option will reduce the processor and memory resources generally available for processing cluster traffic, since performing SSL operations in software requires use of the system CPU and system memory (instead of the dedicated SSL acceleration hardware CPU and memory).

 

allow_tls10

This option enables and disables support for the TLSv1.0 protocol. Enabled by default. If multiple TLS versions are enabled, the first supported TLS version negotiated by a client will be used.

 

allow_tls11

This option enables and disables support for the TLSv1.1 protocol. Disabled by default. If multiple TLS versions are enabled, the first supported TLS version negotiated by a client will be used.

  allow_tls12

This option enables and disables support for the TLSv1.1 protocol. Disabled by default. If multiple TLS versions are enabled, the first supported TLS version negotiated by a client will be used.

 

rewrite_redirects

When enabled, forces FortiADC to pass responses from an HTTPS cluster’s servers without rewriting them. In the typical FortiADC setup, you configure servers in an HTTPS cluster to listen and respond using HTTP; FortiADC communicates with the clients using SSL. If a server sends an HTTP redirect using the Location: header, this URL most likely will not include the https: protocol. FortiADC rewrites responses from the server so that they are HTTPS. You can direct FortiADC to pass responses from the server without rewriting them by enabling this option.
  ignore_critical_extns

Control whether FortiADC will process "CRL Distribution Point" extensions in client certificates. This option only affects the processing of the "CRL Distribution Point" extension in client certificates:

 

When Ignore Critical Extensions is disabled, a client certificate presented to FortiADC that includes any extension will be rejected by FortiADC. This is the behavior in previous releases.

When Ignore Critical Extensions is enabled (the default), a client certificate presented to FortiADC that has a CRL Distribution Point extension will be processed and the CRL critical extension will be ignored. Note, however, that if other extensions are present in a client certificate they are not ignored and will cause the client certificate to be rejected by FortiADC.

 

strict_crl_chain

Check the validity of all certificates in a certificate chain against the CRL associated with the cluster. If any of the certificates in the chain cannot be validated, return an error. If this option is disabled (the default), only the last certificate in the chain is checked for validity.