Академический Документы
Профессиональный Документы
Культура Документы
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or
translated into any language or computer language, in any form or by any means, electronic mechanical,
magnetic, optical manual or otherwise, or by prior written permission of ARA Networks, Inc.
ARA Networks
Tel +822-3446-6070
Tel +8242-867-7729
Shinkasumigaseki Bldg. 18F KIICA Tokyo., 3-3-2 kasumigaseki, Chiyoda-ku, Tokyo. 100-0013
Tel +813-5501-0731
Tel +1310-397-8888
http://www.aranetworks.com
global@aranetworks.com
Table of Contents
In This Manual........................................................................................... 5
1. Introduction of Web Administration Tool ..................................................... 6
1.1. Introduction ....................................................................................................... 6
1.2. How to Access .................................................................................................... 7
1.3. Quick Menu ........................................................................................................ 8
1.4. Login Session Timeout ......................................................................................... 9
1.5. Contents Composition .........................................................................................10
2. Monitoring ........................................................................................... 11
2.1. Cluster Information ............................................................................................11
2.2. Current Status ...................................................................................................13
2.2.1.Stored Object Distributions ............................................................................... 16
2.2.2.Served Object Distributions ............................................................................... 17
2.2.3.Disk Information .............................................................................................. 18
2.2.4.System Information ......................................................................................... 20
2.3. Virus Filtering Information ...................................................................................21
2.4. Dynamic IP Bypass Information ............................................................................22
2.5. Object Information .............................................................................................24
2.6. URL Category Info ..............................................................................................25
2.7. DNS Information ................................................................................................26
2.8. MRTG ...............................................................................................................27
3. Configuration ....................................................................................... 29
3.1. System ............................................................................................................29
3.1.1.Network .......................................................................................................... 29
3.1.2.DNS ........................................................................................................... 33
3.1.3.Time ........................................................................................................... 34
3.2. Protocol ............................................................................................................35
3.2.1.Cache ........................................................................................................... 35
3.2.2.HTTP ........................................................................................................... 48
3.2.3.FTP ........................................................................................................... 66
3.2.4.Cache Cooperation ........................................................................................... 67
3.2.5.ICAP ........................................................................................................... 71
3.2.6.WCCP ........................................................................................................... 76
3.2.7.SNMP ........................................................................................................... 81
3.2.8.Proxy ........................................................................................................... 83
3.2.9.SSL ........................................................................................................... 85
3.2.10.Option .......................................................................................................... 87
3.3. Access Control ...................................................................................................93
ARA Networks.Co,Ltd..3
JAGUAR 5000 Web Admin
3.3.1.Custom Category.............................................................................................. 95
3.4. Authentication................................................................................................... 97
3.5. Bypass........................................................................................................... 100
3.5.1.Cache Bypass ................................................................................................ 100
3.5.2.Static IP Bypass ............................................................................................. 102
3.5.3.Dynamic IP Bypass ......................................................................................... 103
3.5.4.Bypass Exception ........................................................................................... 106
3.6. Download Ratelimit .......................................................................................... 107
3.6.1.Ratelimit Class ................................................................................................. 107
3.6.2.Ratelimit Map ................................................................................................. 109
3.7. Virus Filtering ................................................................................................. 111
3.8. Contents Preloading ......................................................................................... 112
3.9. SGLB Agent (Plag in) ........................................................................................ 114
3.9.1.SGLB Agent ................................................................................................... 114
3.9.2.SGLB Domain................................................................................................. 115
3.10.Static Page .................................................................................................... 116
3.11.IP Address Geolocation DB ............................................................................... 117
3.12.Log ...................................................................................................... 118
3.12.1.Log Unit ...................................................................................................... 121
3.12.2.Log Profile ................................................................................................... 125
3.12.3.Log File Management .................................................................................... 127
3.13.Maintenance .................................................................................................. 128
3.13.1.Account ....................................................................................................... 128
3.13.2.Alert E-mail ................................................................................................. 129
3.13.3.Send Debug Information ............................................................................... 130
3.13.4.Admin Access Control .................................................................................... 132
3.13.5.Firewall ....................................................................................................... 133
3.13.6.Option ......................................................................................................... 134
3.13.7.Restart/Shutdown ......................................................................................... 135
4. Appendix ............................................................................................ 136
4.1. Profile Condition Type ....................................................................................... 136
4.2. Designating an Address Range using Bitmask ....................................................... 138
4.3. Example of Regular Expression .......................................................................... 139
4.4. User Defined Log Format .................................................................................. 140
4.5. Result Code of Access Records ........................................................................... 146
4.6. Cache Operation Related Log and SNMP Trap ........................................................ 148
4.7. SNMP Mib....................................................................................................... 155
4.8. enterprises.aratech.jaguar.revers. .......................................................................... 161
In This Manual
This manual introduces the JAGUAR 5000 Web Administration (hereafter Web Admin), an
administrative tool of the JAGUAR 5000 and shows how to use it.
Section 2. Monitoring
Describes how to check the system of the JAGUAR 5000 and traffic status.
Section 4.APPENDIX
ARA Networks.Co,Ltd..5
JAGUAR 5000 Web Admin
1.1. Introduction
Web Administration (hereafter Web Admin') Tool is a web Graphical User Interface (GUI) tool
based SSL/HTTPS protocol. As it provides strong security and categorized GUI based on RSA
(Rivest Shamir Adleman) public key infrastructure of SSL (Secure Sockets Layer), it enables easy
set up of the JAGUAR 5000 by access with a web browser at any place.
Figure 1
After installation, the Web Admin can make access without any extra procedures.
To access, use HTTPS protocol, the hostname of the JAGUAR 5000, or No. 8500 port of IP address.
For instance, if an IP address is 192.168.1.190, access to the address,
https://192.168.1.190:8500/ with a browser. If connection is completed, connection window will
appear like Figure 1.
It will require ID and passwords. Initially, the default ID is admin while the password is smart. It
is possible to add ID or change passwords on the Maintenance>>Account menu later on.
Note
If your Internet Explorer is 7, select 'Continue to this website (not recommended) like
below.
ARA Networks.Co,Ltd..7
JAGUAR 5000 Web Admin
Figure 2
There is Quick menu for frequest usaging in top right part of the Web Admin screen of JAGUAR
5000.
Usable quick menus are Cluster Info, Current Status, Log, Restart and Logout.
When no operation is made in the menus such as Configuation longer than 30 minutes, excluding
the monitoring items which can be used for a long time without any operation of the UI, the
session is terminated and the account is logged out whih message below;
Figure 3
ARA Networks.Co,Ltd..9
JAGUAR 5000 Web Admin
Figure 4
Web Admin is divided into two parts: Monitoring and Configuration. In the Monitoring part, you
can monitor the JAGUAR 5000, its clusters status and traffic processing. In the Configuration part,
you can setup the system and cache operation of the JAGUAR 5000 and its cluster.
2. Monitoring
This menu checks the service or operation status of the JAGUAR 5000. The page is updated
regularly and pressing REFRESH button on the upper right of the menu updates the information.
Also, pressing HELP button on the menu displays help.
Figure 5
It shows the status of accessed the JAGUAR 5000 and the cluster of registered the JAGUAR 5000.
The followings are details of each item on the list of the JAGUAR 5000 Cluster Information.
A. Request
The average number of requests for HTTP per second for the last five minutes. Click this to
see the average values of a five-minute MRTG (Multi Router Traffic Grapher) graph of all
the JAGUAR 5000s for a day. If you click each graph, you will see graphs for the average
values for five minutes (last 43 hours), the average values for 30 minutes (last 11 days),
the average values for two hours (last 6 weeks), and the average values for a day (last 17
months).
B. Hit Ratio
The average cache hit rates for the last five minutes. Cache hit rates refer to the proportion
of the total number of web objects that have been cached to the number of the entire web
objects served in the JAGUAR 5000 upon request. To check MRTG graph, use in the same
way detailed in the A. Request items of Cluster Information.
C. Bandwidth Gain
The rate of external network bandwidth use gained by the JAGUAR 5000, it refers to the
proportion of the total size of the requested web objects to the size of web objects served
in the JAGUAR 5000. It is an average value for five minutes. To check MRTG graph, use in
the same way detailed in the A. Request items of Cluster Information. Though cache hit
rates and the amounts of bandwidth gained tend to be proportional, they can differ from
each other depending on the size of web objects.
ARA Networks.Co,Ltd..11
JAGUAR 5000 Web Admin
D. Session
The number of system descriptors currently used by the JAGUAR 5000. It has a similar
value to the current number of accesses. To check MRTG graph, use in the same way
detailed in the A. Request items of Cluster Information.
E. Throughput
A Bit per Second (BPS) between the JAGUAR 5000 and clients. It is an average value of
the last five minutes. To check MRTG graph, use in the same way detailed in the A.
Request items of Cluster Information.
F. CPU
A CPU usage of the JAGUAR 5000. It is an average value of the last five minutes. To check
MRTG graph, use in the same way detailed in the A. Request items of Cluster Information.
G. Status
A service status of the JAGUAR 5000. If it is blue, it indicates that it is normal, otherwise,
it will be displayed in red.
H.Disk
A status of the JAGUAR 5000. Blue indicates normal condition. If there is a problem in a
disk, it will be displayed in red.
Figure 6
This item allows detailed information of the JAGUAR 5000 on a host accessed via the Web Admin.
It shows you various operational statuses of the JAGUAR 5000 including current network
connection status, service status, memory and disk usage, etc.
I HTTP Information
A. Number of Request (Total/Served/Filtered)
It indicates the total numbers of requests made so far (Total), the number of served
requests (Served), and the number of denied request (Filtered). The sum of the number of
served requests and the number of filtered request equals the number of requests served
in normal circumstances.
ARA Networks.Co,Ltd..13
JAGUAR 5000 Web Admin
D. Hit Ratio
A service ratio of web objects in a cache that has been requested in the last five minutes.
E. Bandwidth Gain
The ratio of the size of web objects served in a cache to the total size of requested web
objects in the last five minutes.
H. Req/Sec (RPS)
The average number of requests per second for the last one minute/five minutes.
I. Served RPS
The number of requests served normally per second for the last one minute/five minutes.
J. Filtered RPS
The number of requests denied per second for the last one minute/five minutes.
M. Hit Ratio
A service ratio of web objects in a cache that has been requested in the last one
minute/five minutes.
N. Client Throughput
The average transfer rates between clients and a cache for the last one minute/five
minutes.
O. Server Throughput
The average transfer rates between servers and a cache for the last one minute/five
minutes.
G. Session (Cur/Max)
The number of system descriptors currently used in the JAGUAR 5000. As the number of
system descriptors is similar to the value of the number of the connected accesses, it can
be viewed as the current number of accesses made and the maximum number of possible
accesses.
ARA Networks.Co,Ltd..15
JAGUAR 5000 Web Admin
Figure 7
It shows the distribution of currently stored web objects in the JAGUAR 5000 in terms of their
sizes in a circle graph.
Figure 8
It shows the distribution of the web objects that have been served clients so far by hitting through
the JAGUAR 5000 in terms of sizes in a circle graph.
ARA Networks.Co,Ltd..17
JAGUAR 5000 Web Admin
Figure 9
It shows the list of logic disks currently used as cache disk in the JAGUAR 5000 and their
individual statuses. It can also manage disk replacement with the HotSwap function, which
restores disks with physical problems.
A. Device
A name of device in the disk system. Click Device name to see DISK I/O MRTG-Daily MRTG
graph and click one more for Disk Load (/dev/sdb) MRTG graph.
B. Used / Size
It shows the status of disk capacity, displayed in the form of current usage/total disk
capacity.
C. Load
It shows the disk load as a percentage.
D. Status
Disk status. Blue color indicates normal while any problem with disk will be displayed in red.
E. Hot Swap
A button for disk replacement. If you press Stop button, the JAGUAR 5000 does not use the
disk and allows the disk to be physically eliminated. Start button is used to allow the
JAGUAR 5000 to use the disk after inserting a new disk.
Note
The HotSwap function operates only in Raid controller of specific hardware.
Followings are hard ware and Raid controller to support the HotSwap function of the
JAGUAR 5000.
-SCSI: MegaRaid (Dell PowerEdge 2970, 2950)
-CSISS: SmartArray (HP Proliant DL380, DL385)
<Disk Status>
ARA Networks.Co,Ltd..19
JAGUAR 5000 Web Admin
Figure 10
It shows the software version and builds number of the JAGUAR 5000 as well as the hardware
specifications of a system in which the JAGUAR 5000 is installed.
Note
If Smartfilter SDK is installed in JAGUAR 5000, Smartfilter SDK information will be
displayed in the lower part of System Information like below.
Figure 11
It shows a list of IP addresses blocked by virus block rules installed in the JAGUAR 5000, the last
time an IP address has been blocked, and the number of blocking.
A. Time
It directs a system to search the record of the past one, two, three, six, twelve, twenty-
four hours, three and seven days from the present time.
B. Count
Designate the maximum number of records of blocked addresses to be shown by arranging
the records based on the last blocking time.
C. Filtered IP Address
Designate the maximum number of records of blocked addresses to be shown by arranging
the records based on the last blocking time.
E. Count
The total number of virus requests that have been blocked per individual clients.
ARA Networks.Co,Ltd..21
JAGUAR 5000 Web Admin
Figure 12
This menu can be seen by set up to Transparent mode from Protocol>>Cache. It shows currently
serviced bypass list by setup to dynamic IP bypass from Bypass>>Dynamic IP Bypass. The less
the number of #, it is the newest registered bypass list and all of dynamic IP bypass list
registered dynamically is removed when the cache is restarted.
A. Search By
Search by specific error code.
Designate a reason (error code) why it was appointed as dynamic IP bypass necessary to
search a specific error code. In case of 'ALL', search all of error codes.
Followings are description for error codes.
N/A
When the JAGUAR 5000 decides that one is not an HTTP request. It is a case when a
user has sent a request via HTTP service port of 80 other than an HTTP request
ERR
When there is a connection problem with an origin server.
400
When a web server has sent a 400 Bad Request message to a request. It occurs when
the web server cannot interpret the message of a client.
401
When a web server has sent a 401 Unauthorized message to a request. It occurs
when the request failed to pass authentication for a membership web site.
403
When a web server has sent a 403 Forbidden message to a request. It occurs when
the web server understands the request but refuses access for specific reasons.
405
When a web server has sent a 405 Method Not Allowed message to a request. It
occurs when the web server does not allow the request or an impossible HTTP method
has been requested.
406
When a web server has sent a 406 Not Acceptable message to a request. It occurs
when the contents to be transmitted cannot be sent in the way the client has asked.
500
When a web server has sent a 500 Internal Server Error message to a request. It
occurs either due to a problem with a web server or to an impossible decision error.
Normally it occurs when CGI, script or DB error or overload.
ETC
When an error code occurs that does not belong to any of the above.
Destination IP
Show Requested server IP address in the form of a.b.c.d/e.
Error Code
Shows error code that is a reason why it was appointed as Dynamic IP bypass.
C. To Delete
PURGE ALL
Delete all of Dynamic IP bypass rule.
Individual Delete
Delete Dynamic IP bypass rule individually.
ARA Networks.Co,Ltd..23
JAGUAR 5000 Web Admin
Figure 13
This function shows the objects information stored in the JAGUAR 5000. Input URLs and press
Search button to see response header information and caching data of relevant objects in the
cache. Press Delete button to remove searched object in the JAGUAR 5000. The PURGE command
is used to remove a single object.
Figure 14
This function shows URL category information. Insert URL and then click Search button to show
URL category information.
Categroy information which has been registered at 3.3.1 Custom Category in Access Control is
used for URL information searching.
If Smartfilter SDK has been installed in the JAGUAR 5000, Smartfilter SDK information will be
used together.
ARA Networks.Co,Ltd..25
JAGUAR 5000 Web Admin
Figure 15
This function shows URL category information. Insert URL and then click Search button to show
URL category information.
Categroy information that is registered at 3.3.1 Custom Category in Access Control is used.
If Smartfilter SDK is installed in JAGUAR 5000, Smartfilter SDK information will be used.
A. Search
Enter the hostname in HOST and click Search button.
TTL, the current time, the expiration time and IP addresses of the host saved in the DNS
cache are provided.
B.Delete
Enter the hostname in HOST and click Purge button.
The corresponding entry is deleted.
C.Delete All
Enter * in the host field and click Purge button.
All entries in the DNS cache are deleted.
2.8. MRTG
Using MRTG tool that transforms network status data into graphs, it allows monitoring of the
number of Request/Response, Hit Ratio, CPU usage, Bandwidth Gain, Bandwidth Saving,
Client Connection Server Connection, Throughput and Service Time in Daily, Weekly, Monthly
and Yearly graphs in one page respectively. Daily graph shows in the trend of the last 43 hours of
every 5 minutes, weekly to show the last 11 days of every 30 minutes, monthly graph to show
the last six weeks of every 2 hours, and yearly graph to show the last 17 months of every day in
one graph.
A. Request/Response
The number of requested web objects by the JAGUAR 5000. Green indicates the number of
requests while the blue line indicates the number of responses by the JAGUAR 5000.
B. Hit Ratio
The proportion of the number of served web objects in the cache to the number of
requested web objects. Green indicates the accumulated hit rates while the blue line shows
hit rate for each time.
C. CPU Usage
The current system CPU usage in the JAGUAR 5000. Green indicates System & User CPU
usage while blue shows Cache CPU usage.
D. Bandwidth Gain
The proportion of the size of the web objects served in cache to the total number of
requested web objects. Thus, it is also a proportion of network bandwidth gained by a
cache. Green indicates the accumulated value since the service began while the blue line
shows values for each time.
E. Bandwidth Saving
The proportion of the size of the web objects served in cache to the total number of
requested web objects. Thus, it is also a proportion of network bandwidth saved by a cache.
Green indicates the accumulated value since the service began while the blue line shows
values for each time.
F. Client Connection
The (active/total) number of current accesses between the JAGUAR 5000 and clients.
Green is the number of activated connections while the blue line is the total number of
connections.
ARA Networks.Co,Ltd..27
JAGUAR 5000 Web Admin
G. Server Connection
The (active/total) number of current accesses between the JAGUAR 5000 and web servers.
Green indicates the number of activated connections while the blue line is the total number
of connections.
H. Throughput
It is divided into Client Throughput and Server Throughput and indicates transfer rates with
a cache (network bandwidth usage). Green is the amount of service processed by the
JAGUAR 5000 while the blue line is the amount of service that the JAGUAR 5000 has
received from the Web Server.
I. Service Time
A time from which a cache received a request to which it has been served. It does not
include denied access or failed response of the server. Green indicates the average service
time while the blue line is the service time of Hits.
3. Configuration
This menu carries out various setups regarding the JAGUAR 5000 system and cache operations.
After making corrections in each administrator page, press APPLY button to save the setting in the
JAGUAR 5000. Some settings are employed only when software has been restarted. Press
REFRESH button on the upper right of the menu to return to the information currently in use by
the JAGUAR 5000. Also, press HELP button in any menu to check HELP.
For items that use lists, you can use A button to add, E button to modify, and X button to delete
among settings. For items subject to priority adjustment, you can use / buttons to change its
order to change priority.
3.1. System
Set up overall system necessary for the JAGUAR 5000 such as Network, DNS, and Time.
3.1.1. Network
Figure 16
It carries out a network setup necessary for the JAGUAR 5000 system. This setup is equal to the
network setup in the operation system.
A. NIC Configuration
Set up Interface, IP address, and Netmask for each NIC (Network Interface Card) in a
ARA Networks.Co,Ltd..29
JAGUAR 5000 Web Admin
cache system.
For NIC setup, it is necessary to set up more than one IP address. After changing a web
admin access IP address, you have to reconnect the web admin with changed IP address in
the web browser.
In addition, if the changed IP is a cache IP (Protocol>>Cache IP), the cache IP
(Protocol>>Cache IP) and a cache cluster IP (Maintenance>>Option>>Cache IP) are
changed accordingly.
Basically, the JAGUAR 5000 can receive an HTTP request from multiple IP addresses and
ports via configured IP and the same NIC. In reverse proxy cache, it is possible to separate
the couple made by such IP address and port.
To add IP address to use in the JAGUAR 5000, configure alias to interface in use.
Note:
Ex1) if there is eth0 interface that uses 192.168.1.20 and you want to add an IP with
192.168.1.21;
1. Press A button of NIC configuration.
2. Input eth0:0 to Interface column.
3. Input 192.168.1.21 to IP Address column.
4. Input Netmask to Netmask column.
5. Press Confirm button.
B. Gateway
Default Gateway
Set up a default gateway for the JAGUAR 5000 to use in the system.
Standby Gateway
The JAGUAR 5000 adjusts a standby gateway setup to use in this system.
C. Routing Table
Add a routing rule in the JAGUAR 5000 system. Add, modify, and delete is the same as in
the A.NIC Configuration Item of Networks. Destination IP/Mask shall be added in the
form of a.b.c.d/e.
30 Premium Web Cache Server
JAGUAR 5000 Web Admin
a.b.c.d
IP Address
e
The number of bits to check from the top one in an IP address
a.b.c.d/e
A range of bits that has the same e bit with a.b.c.d
D. Link aggregation
Set up NIC channel bonding that uses and gathers multiple numbers of NICs with one IP.
When you set up bonding, arrange the interface of A.NIC Configuration Item of Networks
as bond0 before moving on to the next setup. Right after channel bonding configuration
change and its application, the network may experience some disruption for a certain
period of time. Depending on the network environment such as NIC and the type of
switches connected to NIC, it may take a while to reestablish connection.
NIC
Input Network Divce Name to bond.
Mode
Set up a mode of bonding. The operation in each mode is shown in the following.
Round-robin
Active-backup
Arp interval
Set up ARP confirmation interval for interface in terms of milliseconds. To deactivate,
adjust as 0. In a Round-Robin mode, it is recommended to adjust it as 0 to deactivate.
ARP_ip_target
If ARP_interval value is 0 or more, input target IP address to helth check.
Primary
Set up the name of NIC interface saving the main network interface.
Slave
Set up the name of additional NIC interface saving the main network interface. Two or
more NICs should be configured. For instance, to make a channel bonding between
eth0 and eth1, add eth0 and eth1.
ARA Networks.Co,Ltd..31
JAGUAR 5000 Web Admin
E. Bridge
This function operates only in Trasparent mode. Connect two Ethernet segments together
in a protocol independent way. Interface Name type must be br#, and available # is from 0
to 9.
Note:
The above items on the menu are applicable only after you have completed the restart
of the JAGUAR 5000.
3.1.2. DNS
Figure 17
It makes a setup relevant to Domain Name Server. It shares OS and DNS (Domain Name Server)
setup.
A. DNS Server
Set up DNS server. Max.3 servers can be registered and set up in accordance with the
priority of DNS server. It is used to get an IP address when the JAGUAR 5000 accesses a
web server following a user request. Basically, it uses a default value that is configured
during the installation.
- Enter DNS server name (or IP Address) to add then, click A button.
- Select the DNS server name (or IP Address) and add or delete.
B. DNS Suffix
If it is not a full domain name, set up DNS suffix to add.
ARA Networks.Co,Ltd..33
JAGUAR 5000 Web Admin
3.1.3. Time
Figure 18
Set up an NTP (Network Time Protocol) server to synchronize the date of the JAGUAR 5000
according to priority. After setting up the NTP server, it will adjust a system time to follow
standard time at every specific period.
A. NTP Server
It is possible to add, modify, delete and adjust a priority for NTP servers.
3.2. Protocol
3.2.1. Cache
Figure 19
It makes a general setup such as name, address, operation mode of the JAGUAR 5000 and more.
A. Hostname
Set up Hostname for the JAGUAR 5000 server.
B. IP Address
For a system with multiple IPs, designates an IP for the JAGUAR 5000 to receive requests.
The default is a value that is configured in setup process of the JAGUAR 5000.
C. Cache Mode
Configure the operation mode of the JAGUAR 5000. Operation mode includes Forward Proxy,
Reverse Proxy, Transparent, and Hidden modes. Each mode differs in users request and
the JAGUAR 5000s handling of a request.
Forward Proxy Mode
In forward proxy mode, the JAGUAR 5000 will operate identical to general web proxy
mode. User can make a web request by the IP address of the JAGUAR 5000.
The way in which a single web request and response is carried out is as follows:
1. User makes an HTTP request to the IP address of the JAGUAR 5000.
2. The JAGUAR 5000 finds the IP address of the web server using Host of the relevant
web server then makes a request to a web server on behalf of the user.
3. Web server makes a response to the IP address of the JAGUAR 5000.
4. The JAGUAR 5000 will process the response and answers the user.
ARA Networks.Co,Ltd..35
JAGUAR 5000 Web Admin
The process in which a single web request and response is carried out is as follows:
1. User makes an HTTP request to the IP address of the JAGUAR 5000.
2. The JAGUAR 5000 finds the IP address of the web server using information from the
relevant web server then makes a request to a web server on behalf of the user.
3. Web server makes a response to the IP address of the JAGUAR 5000.
4. The JAGUAR 5000 will process the response and answer to the user.
Transparent Mode
As the user makes an access through the IP address of the existing web server in the
transparent mode, there is no need to change DNS with the introduction of the
JAGUAR 5000. However, you need to install and configure some devices such as Layer
4 switch (distinguished with IP/ Port) or Layer 7 Switch (distinguished with protocol)
that forwards the relevant web requests to the JAGUAR 5000 in the middle of network
section.
The process in which a single web request and response is carried out is as follows:
1. User makes an HTTP request to the IP address of the JAGUAR 5000.
2. The L4 switch or L7 Switch of the Service provider forwards the relevant web
request to the JAGUAR 5000.
3. The JAGUAR 5000 will make a request to a web server on behalf of the user for the
relevant web request.
4. Web server makes a response to the IP address of user.
5. The JAGUAR 5000 will process the response and answer to the user.
Hidden Mode
Like a transparent mode, in a hidden mode, there is no need to change DNS for the
introduction of the JAGUAR 5000 as user makes an access through the IP address of
the existing web server. Also, when the JAGUAR 5000 makes a request to a web server,
it will operate in such a way that the request has been sent by a client IP while
operating that it has been set by a web server IP for a response to a user, so that it
will ensure that the user and the web server will not recognize its existence. However,
you need to install and configure some devices such as Layer 4 switch (distinguished
with IP/ Port) or Layer 7 Switch (distinguished with protocol) that forwards the
relevant web requests to the JAGUAR 5000 in the middle of network section.
The process in which a single web request and response is carried out is as follows:
1. User makes a request to the IP address of a web server.
2. The L4 switch or L7 Switch of the Service provider forwards the relevant web
request to the JAGUAR 5000.
3. The JAGUAR 5000 will make a request to a web server on behalf of the user for the
relevant web request. At that time, it will organize a packet that will appear as if being
sent from the IP address of the user.
4. Web server makes a response to the IP address of user.
5. The L4 switch or L7 Switch of the Service provider forwards the relevant web
request to the JAGUAR 5000.
6. The JAGUAR 5000 will process the response and answer to the user. At that time, it
will organize a packet that will appear as if being sent from the IP address of the web
server.
D. Running Option
Generate Proxy Request
This setup is used when it is necessary to use other proxy for the JAGUAR 5000 to
access an external network. Set up whether use the configuration of Protocol>>Proxy
or not.
Ignore Reload Request
Able to determine an operation method for a request with a header, Cache- Control:
no-cache or Pragma: no-cache that demands to bring new objects from a web server.
Default value is Off and it will bring new objects from a web server regardless of the
cache availability and renewal of the request with the above header. If it is configured
as On, it will serve a cached object if the object has not passed the renewal time
while serving it if it has passed the renewal time. In case of On, it is the same
operation with ignore configuration for reload_action of cache basic refresh_policy.
It has a higher priority over reload_action configuration of cache basic refresh_policy
and bypass_req_nocache On configuration of cache basic caching_policycomes first.
ARA Networks.Co,Ltd..37
JAGUAR 5000 Web Admin
Note
The above items on the menu are applicable only after you have completed the restart
of the JAGUAR 5000.
Figure 20
In Forward Proxy or Reverse Proxy mode in the JAGUAR 5000, if a client send web request to IP
address of the JAGUAR 5000, the JAGUAR 5000 searches origin web server and brings the objects.
In Forward proxy mode, the JAGUAR 5000 uses a server that is requested by user to search origin
web server, while in Reverse Proxy mode, it uses various information related to HTTP request and
its administrators configuration.
Reverse hosting function of the JAGUAR 5000 is for load balancing by configures the majority
origin web servers that are included in specific services and offers the way of a large number of
services operating. The reverse hosting offers various load balancing ways in one of web server
cluster and controls their connections.
ARA Networks.Co,Ltd..39
JAGUAR 5000 Web Admin
The reverse hosting configuration creates reverse host profile by service and then configures
origin web server by each profile.
Cache IP
Designates an IP of the requested the JAGUAR 5000. You have to add the relevant IP
in System>>Network and NIC Configuration.
Cache Port
Designates a port of the JAGUAR 5000 that received a request. You have to add the
relevant port in Protocol>>HTTP, Forwarding Ports.
If you designate a port which is used by the JAGUAR 5000 with a specific purpose, it
does not operate normally. Ports that are not available for setup include 22, 25, 631,
80, 8021, 8500, and 8880.
C. Profile Details
Server Name
Set up the list of origin web servers that belong to the profile. If default profile is not
to be used, you dont need to give values in this item of default profile. If you
designate not an IP address but a domain name, the JAGUAR 5000 will find the IP
address through DNS server and make an access. If you assign it with
255.255.255.255, a user will use Host header server of the request as an origin
server.
Port
Set up the port of the origin web server. If it is set as 443, it accesses through HTTPS.
Access through each origin server of HTTP and HTTPS by a protocol that is requested
by users.
Protocol
Designate whether served or not to HTTP and HTTPS (443 port) of client. If both are
not selected, it supports HTTP and HTTPS both automatically. Both are not selected, it
sets to support both HTTP and HTTPS automatically.
Policy
Set up policies for deciding web servers when the JAGUAR 5000 sends a request to
origin web server group. You can choose the policies following.
Round-Robin
Url-Hash
Hash a request so as to send a specific URL to a same origin server. If there is any
problem with one of those web servers, the URL directed to the server will be requested
Directory
Origin web server is determined by the name of first directory. The origin web server
should be in server name and registered in the origin web server list beforehand. If
there is a request for a directory name that is not registered in the list it will be declined.
Note
Ex) when origin server has 10.0.0.1 and the DNS name of cache is foo.com:
Ext-dir
It has the same operation as Directory policy but can operate without being registered in
Server Name.
Src-IP-Hash
It designates the origin web server according to users IP address. That is, users who use
same IP address requested by same web server. For example, use this in case need to
Hostname
Determine a host header to be used when the JAGUAR 5000 makes an HTTP request
to an origin web server. The default value is not to configure. If it is configured, it uses
the configuration value. The JAGUAR 5000 will change the host part of an HTTP
request header into host name:port before making a request.
ARA Networks.Co,Ltd..41
JAGUAR 5000 Web Admin
DocuemntRoot
If DocumentRoot is set, the JAGAUR 5000 converts a HTTP Request into Request URI
that DocumentRoot was reflected then sends them when it sends HTTP Request to a
web server. For example, if hostname is 'www.foo.com' and Documentroot setting is
'/bar', and in case of client request is 'http://www.foo.com/hello/world.txt", it will be
changed as 'http://{ORIGIN_SERVER}/bar/hello/world.txt" and requested to origin
server.
Outgoing Connection
Manage Outgoing Connection
Can restrict the number of connections to each server for a request corresponded to the
Determine the max. values for the number of connections to each server under the
If errors about origin server are occurred, JAGAUR returns an error page.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
Figure 21
Substitute a user-requested URL with an Extended Regular Expression by some specific rules. It is
the first to be handled when the JAGUAR 5000 receives a request and the substituted URL is used
for caching operations, the conditions of various profiles and logging, etc. The previous URL will
not be used and is left in a log.
Replace
Input character line that matches a query in URL to modify.
Ignore Case
Able to set whether or not to ignore case when URL rewriting. Click A button to select
On, or Off. Default value is Off.
B. How to use
Setting of Query and Replace
Query takes the from of Extended Regular Expression that is used in Unix. With
parentheses, '(' ')', it is possible to match a pattern and the matched pattern can be
used in the form of #{match_no}(in order words, #1, #2 ..) during replacing. As #0 is
used to match whole URLs, user can match up to 9 patterns (#1 .. #9) to process
whole URLS.
Note:
Ex) Query: http ://([^/]+)/.+/([^/]+)
Replace: http://foo.com/redirector.php?host=#1&file=#2
User request: if it is http://bar.com/baz/test.html
Before carrying out any other operations, cache will change the URL into
http://foo.com/redirector.php?host=bar.com&file=test.html before proceeding further.
ARA Networks.Co,Ltd..43
JAGUAR 5000 Web Admin
Note:
Ex1) For a URL such as http://host/dir1/../dirN/real_server/dirN+1/..dirM/file, to make
http://real_server/dirN+1/..dirM/file URL to send a request to Origin server,
If it is a reverse mode
Process the whole with http://host/real_server/dirN+1/../file,
Register real_serves in a reverse server setting then adjust it with a Directory Policy.
If it is a Proxy/TP mode:
Process the whole with http://real_server/dirN+1/../file.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
Figure 22
This function selects fields only appointed by administrator among URL to identify object. It is
available to process that meet specific conditions for the session by setting profile.
It calculates caching key after that cache parses HTTP request and processes URL rewriting.
(When Global Query Term Strip was designated, please note that it will be striped before caching
key calculating.)
ARA Networks.Co,Ltd..45
JAGUAR 5000 Web Admin
Ignore Host
Ignore host name in a URL.
Ignore File
Ignore file name in a URL.
Ignore Path
Ignore path in a URL. If it is set as Partial, Ignore Path Start and End should be set.
Ignore Query
Set query value in a URL. If it is set as Except, Ignore Query Exception should be set.
url = http://foo.com/dir1/dir2/dir3/file?arg1=abc&arg2=def
ignore host http:///dir1/dir2/dir3/file?arg1=abc&arg2=def
ignore file http://foo.com/dir1/dir2/dir3/?arg1=abc&arg2=def
ignore all path http://foo.com/file?arg1=abc&arg2=def
Accept-Encording
Use gzip
Decide whether or not to use gzip option. When Use gzip is checked in Accept-Encoding
menu, if gzip is included in the header of Accept-encoding in the HTTP request, the
information is included while a caching key is created. Therefore, in this case, the object is
cached, different from the case that no gzip is included in the header of accept-encoding in
User-Agent
Multiple user-agents are selectable according to userver-agent pattern to store among
nine User-Agents; iPhone, Blackberry, SymbianOS, MSIE6, MSIE7, Firefox2, Firefox3,
Chrome, and Safari.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
ARA Networks.Co,Ltd..47
JAGUAR 5000 Web Admin
3.2.2. HTTP
Figure 23
A. HTTP Port
TCP port used by a HTTP cache of the JAGUAR 5000 and its default value is 8080. To add a
port that receive request by HTTP cache service user, add a port in Forwarding Ports.
C. Forwarding Ports
The JAGUAR 5000 will designate an additional port to receive an HTTP request in addition
to the basic port designated in cache http http_port. If you designate a port that is used
by the JAGUAR 5000 for a specific purpose, it would cause a problem in the operation of
the JAGUAR 5000. The ports that should not be configured include: 22, 25, 443, 631, 80,
8021, 8500, and 8880. A setting for this part does not support a cluster integration setup.
Note
The above items on the menu are applicable only after you have completed the restart
of the JAGUAR 5000.
ARA Networks.Co,Ltd..49
JAGUAR 5000 Web Admin
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
Figure 24
Web objects cached can be changed in a server during their stay in a cache. Therefore a cache
should check if web objects have been renewed or not in regular terms. Object renewal time, or
Time-To-Live, refers to time during which cache makes one validity test to another. In other words,
it is a period which a server of cached web objects reconfirms their renewal status again.
Normally, many web objects do not have explicit renewal times and a web cache can provide
them with random renewal time. Using this command, you can configure Time-To-Live (TTL) of
HTTP protocol or modify the existing renewal time in the JAGUAR 5000.
TTL of web objects can be labeled as meta data of HTTP and is determined in a server. The default
value set in this page is a value that is used when a server does not allocate its value. If a web
object includes TTL determined by a server, this value takes priority over others.
If you check whether or not there is a renewal in a server by TTL and find no renewal, it means
renewal check is too frequent. In that case, it is necessary to increase TTL to make it less
frequent. The ratio of increase in TTL refers to automatic renewal period increase rate. All TTLs of
web objects cannot exceed a maximum renewal time.
As too-frequent renewal checks would hamper a web transfer between a server and the JAGUAR
5000, please assign proper values by finding the characteristics of frequently used web objects. If
ARA Networks.Co,Ltd..51
JAGUAR 5000 Web Admin
you have many consistent web objects such as pictures and banners, it would be better to have a
large TTL.
A. HTTP TTL Profile
Manage TTL setup for those web objects on which a server did not set up TTL by naming
them with profiles. Each profile has a priority in a top-down order.
After selecting an item of the list, set up relevant conditions and operation in Profile
Details.
B. Profile Details
Min TTL
Set up TTL to be designated by a cache as a default for web objects on which a server
did not set up their TTL. The time unit is seconds and the value will be assigned when
a new object is brought or re-fetched after modification.
Max TTL
Configure the max. renewal time that can be assigned by the JAGUAR 5000 for web
objects without specific renewal times by server. The time unit is seconds and the
object will repeatedly have this renewal time even when the time is up and there is
still no modification made.
Aging Ratio
Configure the increase ratio of renewal time for an object that does not undergo any
modification after its renewal time. The unit is percentage and the renewal time will
not exceed Max-TTL.
HTTP Standard
When there is a No Caching Reload request, receive the requested web objects from a
server and provide services unconditionally. In other words, the JAGUAR 5000 will bring new
objects through GET request that does not have a If-Modified-Since header.
IMS
When there is a Reload request, check whether or not renewal has been made If-Modified-
Since. If a renewal has been made, receive the requested web objects from a server.
Otherwise, serve web objects that are cached.
Ignore
If the cached object does not pass the renewal time, it will serve the cached object. If it
passed the renewal time, it will serve as it is. If a renewal has been made, it will serve it. It
is the same operation with Off configuration of cache sys operation option offline.
Ignore ETAG
Determine whether ignore or not ETAG value, one of the criteria to see if the stored
date matches the data in the web server. The default value is unchecked and it uses
ETAG value if an object has been renewed. As in reverse proxy mode, it is only used
for objects that have multiple web servers for an identical service so that each server
can have different ETAG values.
Max-age Insert
Adjust the value of Cache-Control: max-age which indicates renewal time.
Skip
Make no operation. In other words, transmit Max-age as with the original server values.
Insert
Transmit added TTL value if there is no Max-age. If there is, transmit the existing values
Overwrite
When Cache generated max-age is selected, created or modified max-age header is stored in
web cache's disk and the max-age value is used. If it is not selected, it is created or modified
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
ARA Networks.Co,Ltd..53
JAGUAR 5000 Web Admin
Figure 25
Configure policies regarding the caching of objects in the JAGUAR 5000. For an object that has
certain conditions, it is possible to make information that indicates the accessibility of caching
during HTTP request and response to deviate from standard practices. With standard HTTP
protocol operation, it is possible to make all contents in the existing web server be cached all
together or cached contents unavailable for caching.
No caching
Determine whether or not to bypass HTTP requests of the relevant conditions without
caching. Default value is Off. When it is On the JAGUAR 5000 will bypass all relevant
requests and bring them from a web server to serve. It is the same operation with
Bypass>>Cache Bypass.
ARA Networks.Co,Ltd..55
JAGUAR 5000 Web Admin
For a request with the header that asks to bring new object of web server, Cache-
Control: no-cache or Pragma: no-cache, it will bring contents from a web server and
determine if it will cache for the request. Default value is Off and if contents are
cacheable, it will carry out caching.
Ignore Resp.Status
Determine whether or not it is possible to cache for a response with various status
codes. Default value is Off and it will carry out caching only with the status code of
200 OK, 300 Multiple Choices, 301 Moved Permanently and 410 Gone. If it is On, it
will make cache all of response available except '206 Partial Content' response code.
Ignore Expires
Set up to ignore Expires header in HTTP response. Default value is Off. If it is On,
ignores Expires header in HTTP response.
Ratio
Set the ratio (from 1 to 100).
Size
Set the size.
Cookie Bypass
Determine whether or not to bypass the presence of Cookie in a HTTP request header.
The default value is Off, if it has a cookie, the presence of a Cookie header enables
caching. If it is On, and there is a Cookie item, it will bypass it to make caching
impossible. In case of Only If Ctype Matches, if a request has a Cookie item, it will
bypass only when a starting string list of Content-type header in response is identical
to the designated value, it carries out bypass to make caching impossible. It
designates a starting string list of Content-type header in response by distinguishing
with ; and and each item that is detached as ';' can be inputted by Max. 15
characters. It can be designated as "text/;image/jpg;image/gif;application/pdf".
Recently, almost all web requests have cookie so if set to not cache all of requests that
ARA Networks.Co,Ltd..57
JAGUAR 5000 Web Admin
have cookie, cache efficiency can be so low. Therefore we recommend that set to not
cache only 'Text' object that the contents can be different according to cookie.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
Figure 26
It offers HTTP Progressive Downloading function to URL for FLV request that start and End Position
are specified as argument. Establish profile and processing session for specific conditions is
available.
ARA Networks.Co,Ltd..59
JAGUAR 5000 Web Admin
B. Profile Detail
For more information about Server Name, Extenstion, Header Keyword and Regular Expr.,
please refer to Profile Condition Type in Appendix.
Start Keyword
Set keyword of header field.
End Keyword
Set the end keyword.
File Format
Select the multimedia file format. The start and the end range should be an integer.
And they mean the byte offset in case of FLV, and the elapsed time (sec.) in case of
MP4. Do not use this with Prefetch if Partial Miss together because cache may confuse
partial response with whole response.
Offset Type
Select parameter type among Byte, Sec, and Mesc.
Bypass
Determine whether or not to use bypass. If it is On, it will not carry out anything. If it
is Nonzero-misc, if a request has Misc Keyword and the value of Misc tuple is non-zero,
then the request is bypassed.
Ratio
Set the ratio.
Size
Set the size.
Send Miscinfo
Send values equivalent to keyword specifying in Misc keyword and details related to
Misc keyword name to origin server.
Misc keyword
Set the misc keyword.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
ARA Networks.Co,Ltd..61
JAGUAR 5000 Web Admin
Figure 27
When servicing information, in structure that relevant broker redirects using 302 Redirection if it
send query to information broker, this is a function that make cache redirects the value only one
time. It is passable to process sessions that meet specific conditions by profile setting.
A. Location Redirection
Register Location Redirection as profile to manage.
B. Profile Details
For more information about detailed profile, please refer to refer to Profile Condition Type
in Appendix.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
Figure 28
If there is obstacle in connection to origin server or returned an error code only from origin server,
the JAGUAR 5000 can create and show customized error pages that consist of HTML with
response cords to client.
Upload
ARA Networks.Co,Ltd..63
JAGUAR 5000 Web Admin
B.Profile Details
Set up an operation for the relevant profiles. For more detailed profiles, please refer to
Profile Condition Type.
Press Upload button of item that correspond to error code to modify in list and upload HTML
error page that make out beforehand. After that is uploaded, file name is changed
automatically in the JAGUAR 5000 like table below.
After file upload is completed, Type item is changed into Custom. Click this Custom to check the
uploaded custom error page.
Click Delete to return to basic error page of the JAGUAR 5000.
If wish to service by replacing a page that is delivered from web server with a custom error page,
add a custom error page and force-custom-errorpage line to /usr/local/jaguar/.aux.cfg file
together.
In this case, a represent custom page that the user desires to show will be shown to same code
value like 400, 502 and 504. The represent page was marked in bold letter like in Figure 24. (Ex:
'400.BAD URL', '502.Bad gateway', and '504.Connection timeout').
ARA Networks.Co,Ltd..65
JAGUAR 5000 Web Admin
3.2.3. FTP
Figure 29
B. PASVPORT
Set up to try Passive mode first then Port mode during FTP connection.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
Figure 30
Inter-Cache Cooperation menu includes settings of ICP (Inter Cache Protocol) service and MDC
(Mirrored Data Cache) service which are used for cooperation among web caches.
ICP is a simple protocol for communication among web caches. For support of this ICP protocol, it
is necessary to register and manage the information the neighboring caches.
MDC is an internet content caching system using a distributed caching device and the
concentrated content collection and storage device in the ISP network. We have added a setting
function for mounting the MDC storage on our JAGUAR system.
A. Type
Decide the Inter-cache Cooperation type among None, ICP or MDC.
B. Port
Enter UDP port number to use in ICP request or MDC service. Default value is 3130.
ARA Networks.Co,Ltd..67
JAGUAR 5000 Web Admin
indicating erroneous ICP request) returns as much as the OP_DENIED Ratio, the peer cache
will not be used.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
Figure 31
In this menu, you can register and manages peer for confirming web object existence.
A. Timeout
Set up a time limit to decide failure after sending request.
B. Peer List
Manage neighboring caches in the list. Among items of the list, IP address is an IP address
of neighboring cache, ICP and HTTP port are the port numbers used by ICP, HTTP protocol
respectively. Peer type designates the relationship between neighboring cache and the
original cache. The sorts and definition of peer type are as follows:
Sibling
A relationship that allows both caches to exchange inquiries on web object is cached in
each other.
Parent
A relationship that only allows the original cache to make inquiries to a neighboring
cache. The neighboring cache can only receive an inquiry.
For more detailed information on the relationship among sibling, parent, child, please
select the following link: http://icp.ircache.net/rfc2187.txt
ARA Networks.Co,Ltd..69
JAGUAR 5000 Web Admin
Figure 32
In this menu, you can register and manages peer for confirming web object existence.
B. Peer List
Manages neighboring caches in the list. Among items of the list, IP address is an IP address
of neighboring cache, ICP and HTTP port are the port numbers used by ICP, HTTP protocol
respectively. Peer type designates the relationship between neighboring cache and the
original cache. The sorts and definitions of the peer type are as follows:
Sibling
A relationship that allows both caches to exchange inquiries on web objects is cached
in each other.
Child
A relationship that only allows the neighboring caches to make inquiries to the original
cache. The original cache can only receive an inquiry.
For more detailed information on the relationship among sibling, parent, child, please
select the following link: http://icp.ircache.net/rfc2187.txt
3.2.5. ICAP
Figure 33
It is configuration of ICAP (Internet Content Adaptation Protocol). ICAP is a protocol that enables
a server with a specialized function of interworking with a web server or web proxy to receive
requests or responses to process. If you use this protocol, you can easily interwork different
solutions that support the JAGUAR 5000 and ICAP such as contents filtering, virus check, and
customization.
ARA Networks.Co,Ltd..71
JAGUAR 5000 Web Admin
M. Policy
If there are 2 or more servers are registered on Server Name, it is a policy about method
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
ARA Networks.Co,Ltd..73
JAGUAR 5000 Web Admin
Figure 34
A. ICAP Profile
Register and manage profiles to actually carry out request modifications or response
modifications. Each profile has a priority in a top-down order.
B. Profile Details
Set up the conditions of the relevant profiles. Each condition is an AND condition. For more
information about detailed items, please refer to Profile Condition Type in Appendix.
C. Vectoring Point
Designate a Vectoring point that can be requested via an ICAP server for the relevant
profiles. There are four types of vectoring points as shown below. At present, the JAGUAR
5000 supports Vectoring Point 1 and 3 only.
Vectoring Point 1
Configure vectoring point 1. It is used to customize a request that a user has sent to
the JAGUAR 5000 before its processing. For instance, in case of python opensource
icap server, it is entered as icap://hostname:1344/reqmod.
Vectoring Point 2
Configure vectoring point 2. It is used to customize a request that a user has sent to
the JAGUAR 5000 before its processing. As the JAGUAR 5000 currently does not
support the function, it is not applicable.
Vectoring Point 3
Configure vectoring point 3. It is used to customize an answer from a web server
before processing it. Configure as icap://hostname:port/id. You can use it for virus
check of contents.
Vectoring Point 4
Configure vectoring point 4. It is used to customize an answer from the JAGUAR 5000
to a user before processing it. As the JAGUAR 5000 currently does not support the
function, it is not applicable.
Note
At present, the JAGUAR 5000 supports Vectoring Point 1 and 3 only.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
ARA Networks.Co,Ltd..75
JAGUAR 5000 Web Admin
3.2.6. WCCP
Figure 35
Set up WCCP, Web Cache Communication (or Coordination or Control) Protocol. WCCP is a
protocol between router/switches and web caches proposed by CISCO that automatically connects
routers and web cashes in transparent mode if both of them support WCCP. For more information
on transparent mode, please refer to cache operation mode in the section of Deployment Model.
The JAGUAR 5000 supports both WCCP v1 and v2 and router can confirm that whether support
them or not by execute ip wccp web-cache in a router consol. If it is a router by CISCO, it
supports WWCP v1 from IOS Release 11.X as well as WCCP v2 from IOS Release 12.X. For several
models, it might require firmware upgrade and others.
A. Use WCCP
Determine whether or not to use WCCP.
B. WCCP Version
Determine the version of WCCP to use. The JAGUAR 5000 supports both WCCP V1 and V2.
C. WCCP V1
Set up a router to connect to WCCP V1 or the IP and port of a switch. WCCP V1 supports
either one router or switch only. The default value of the port is 2048.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
ARA Networks.Co,Ltd..77
JAGUAR 5000 Web Admin
3.2.6.1. WCCP V2
Figure 36
Set up WCCP V2. WCCP V2 supports multiple routers or switches and allows a password-made
certification between caches and routers.
B. Profile Details
Service ID
Designate a service ID for a service group. HTTP protocol service ID is 0.
FLAG
Set up to key for redirect hash table.
Source IP HASH
Destination IP HASH
Use source port to decide whether packet must become redirect using WCCP or not.
Port
Designate port number to redirect, and 8 of port should be designated. These values
can be set when the service ID is not 0 (HTTP protocol) and, it sets that flag is 0 if the
service ID is and port 80 is set as default value.
Password
Designate a password for a service group.
Assignment Method
Set up to communication method with router or switch.
Hash
Mask
High-End switch of ISO Version 12.1 or more use Mask method normally
Forwarding Method
Designates forwarding method between routers supports the JAGUAR 5000 and WCCP.
GRE
L2
Return Method
Designates returning method between routers supports the JAGUAR 5000 and WCCP.
Select one of the forwarding methods between GRE and L2.
WCCP Router
Set up routers IP and WWCP port to interlocking WCCP.
ARA Networks.Co,Ltd..79
JAGUAR 5000 Web Admin
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
3.2.7. SNMP
Figure 37
Carry out a configuration on SNMP (Simple Network Management Protocol) that is protocol to
management network equipments and monitoring. Thorough SNMP trap, possible to get
information of JAGURA 5000 from outer server and to send status information to the server
appointed the JAGUAR 5000
A. Community
Define the name of community to carry out SNMP monitoring as well as read/write rights.
Normally, public is used as a community name, however, there are no specific restrictions
over the community name.
While readonly, a value of right is a community with read right and allows reading SNMP
MIB value when approaching the JAGUAR 5000. read/write is a community with write right
that can change MIB values. To ensure security, it is necessary to assign the read/write
rights discretely.
B. SNMP Trap
Send SNMP trap to appointed server when event related to cache operation of the JAGUAR
5000 occurs.
Use SNMP Trap
Set up whether or not to use SNMP traps.
Trap Community
Set up the name of a community to send SNMP Traps.
ARA Networks.Co,Ltd..81
JAGUAR 5000 Web Admin
Trap Manager
Set up a server to send SNMP Traps.
Trap Level
Set up a level of even to send to SNMP Traps. Select one of the EMERGENCY, ALERT,
CRITICAL, ERROR, WARING, NOTICE, and INFO.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
3.2.8. Proxy
Figure 38
ARA Networks.Co,Ltd..83
JAGUAR 5000 Web Admin
Always
UpOnly
Proxy IP Address
Set up an IP address of the upper proxy.
Proxy Port
Set up a TCP port of the upper proxy.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
3.2.9. SSL
Figure 39
Set to make cache ontents by HTTPS protocol using SSL. Copy the authentication of the service to
cache to the JAGUAR 5000 in order to carry out decoding of a user request and the response from
a web server in the software method to use the information then to conduct encoding for user
service. As you can register only designated authentication in one the JAGUAR 5000, it is
recommended that it is used in a reverse proxy mode that only process HTTPS contents from
some restricted services.
A. Configuration
Enable SSL
Set up to whether allow HTTPS link or not. If this function is selected, the JAGUAR
5000 services HTTPS link from 443 port. If setting is changed, rerestarting is required.
Authentication File
Designates SSL authentication file path that use when receive HTTPS connection in the
JAGUAR 5000. The format of authentication file should be PEM, and default value is
/usr/local/jaguar/ssl.pem .
File Upload
Transmit an authentication file in PC as a name that is specified from certificate file.
Because the transmitted file is set to overwrite the existed authentication file, please
be sure that the existed authentication file deleted if you alternates file name.
ARA Networks.Co,Ltd..85
JAGUAR 5000 Web Admin
C. Extended Certificate
Using SNI (Server Namd Indication) per JAGUAR 5000 IP address, it is possible to add
certificate by hostname. Following steps show how to certificate Extended Certificate.
Note
Enable SSL, and upload Root Certificate/key are applicable only after you have
completed the restart of the JAGUAR 5000.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
3.2.10. Option
Figure 40
Set up various options for internet protocol. To setup byte-units, it is possible to use G (Giga), M
(Mega), and K (Kilo) following numerical values (Ex: 128M, 2G).
A. DNS
Max Cache Entry
Determine the size of list that caches the results when domain name is resolved by
DNS.
ARA Networks.Co,Ltd..87
JAGUAR 5000 Web Admin
B. Connection Policy
Set up the connection on the clients and servers.
Server Try Count
Set up the number of retrials when the JAGUAR 5000 fails to access a web server. If it
is a reverse cache, if the JAGUAR 5000 fails to access an origin web server more than
twice, it is treated as a failure to the request. During another attempt to make an
access, if there are multiple numbers of origin web servers, it will search and access
the next server with round robin even with URL-Hash method distribution.
Read/Write Timeout
A timeout value for Read/write applied when the JAGUAR 5000 exchanges data with
clients or servers. This value is also used for SSL timeout.
Linger Timeout
If this policy is set up, it will send the remaining packets during the linger timeout
before disconnecting even when one of the sides cuts off the connection. If it is not set
up, the connection will be immediately cut off even there are some remaining packets
in a queue.
ARA Networks.Co,Ltd..89
JAGUAR 5000 Web Admin
disruption and limit its connection to other origin web servers. If connection attempts
to all origin servers fail, the JAGUAR 5000 will provide its service with the cached
objects. If there is no cached object available, it will respond with an error status code.
In case all of origin servers service to cached object because there is obstacle, it
answers by adding Warning: 111 JaguarCache "Revalidation failed"' header.
G. Quick Abort
When a client cancels a web object received from a server upon the clients request, this
setup will decide whether or not to finish receiving the entire web object. Two values,
proportion and size, are set up. If the size of data is larger than the setup value when the
data has been transmitted less than the proportion, it will stop receiving and erase what
was already received.
H. Negative TTL
If a web server sends 404 NOT FOUND status code in response to the JAGUAR 5000s
request, the JAGUAR 5000 will cache an error result. As it is possible that the error
condition might have been changed in the web server during caching service, it is
necessary to check on renewal for cached error messages regularly. Set up a renewal time
(Time-To-Live) for such caching data. If '0' is input, the 404 NOT FOUND response does
not caching.
As it is rare to have a changed condition for an error message, it is effective to set up this
value to be larger than renewal time (TTL, Time-To-Live) for general web objects.
ARA Networks.Co,Ltd..91
JAGUAR 5000 Web Admin
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
Figure 41
ARA Networks.Co,Ltd..93
JAGUAR 5000 Web Admin
Set up whether or not to enable the JAGUAR 5000 access. This setup will also determine
whether or not a connection should be made with a local network or server to which the JAGUAR
5000 belongs. The priority in profiles is the order of registration. The restriction on access control
takes precedence over a bypass restriction and it cannot violate the restriction on virus blocking.
A. Access Control Profile List
Manage all conditions on access based on profile. Each profile categorized by Allow, Deny,
Server check and Redirect. Each profile has a priority in a top-down order.
Access Control
Set up a profile to either belong to Allow or Deny, Server Check, Redirect and Static
Page. Server Check confirms service availability about relevant request possibility by
sending the request including If-Modified-Since to web server. Redirect redirects to the
URL. After selecting an item of the list, set up relevant conditions and operations in
Profile Details.
* If you select the Static Page option in Access Contorl, file name you registed on Static
Page will be displayed. To register information on the static page, please refer to # Statc
Page.
B. Profile Details
Set up the conditions on access control. Each condition is an AND condition so only when it
satisfies all to set up an access control for the relevant profile. For more detailed
information of profile, please refer to Profile Condition Type in Appendix.
Note 1
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
Note 2
If Smartfilter SDK is installed in JAGUAR 5000, Filtering Category box will be displayed
in the lower part of Profile Detail field as below.
Figure 42
A. Custom Category
Add
Add category index and category name.
Edit
Edit category name only, Category index cannot be edited.
Delete
Delete index and contents that currently selected from Custom Category.
ARA Networks.Co,Ltd..95
JAGUAR 5000 Web Admin
Save List
If URL is typed into text box for currently selected category, it commands to save the
changed contents.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
3.4. Authentication
Figure 43
The JAGUAR 5000 is able to authenticate a user by interworking with an external authentication
tool. It does so by using an authentication file or interworking with NCSA authentication server
(LDAP, RADIUS). Also, a user can use a predetermined API to create a library to process
authentication. (UCC)
ARA Networks.Co,Ltd..97
JAGUAR 5000 Web Admin
NCSA
Password Path
LDAP
Address
Port
Base
RADIUS
Address
Port
Key
Set up a key necessary to carry out re-encryption when sending authentication data to
RADIUS server.
UCC
UCC Auth module
During UCC authentication, the JAGUAR 5000 actively loads a library (made by user) with
specific interface then determines whether or not to allow access to a requested page based
Determine whether or not to provide service for a requested page when a module loading for
NOOP
This is a profile that defines which request receives no authentication. As NOOP
authentication is processed earlier than other authentication profiles, it can be used
when picking up some requests to be excluded from getting authentication.
B. Profile Details
Set up data to apply to each profile.
Client IP
Set up an IP range for applied clients. It is possible to define the range using / and Bit
mask (Ex: 10.101.1-20.39-50, 10.101.2.4/22). For more information on how to define
as Bit mask, please refer to the section, Designating an Address Range using Bitmask
in Appendix.
Server Name
Register servers (in case of NCSA, files) that will determine whether or not there is an
authentication.
Cache Port
Enter Cache Port that will determin whether or not there is an authenticiation.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
ARA Networks.Co,Ltd..99
JAGUAR 5000 Web Admin
3.5. Bypass
Figure 44
Designate and manage the conditions of connection that will always directly request to a server
without caching. The priority among profiles follows the registered order. The bypass restriction
will apply as long as it does not violate virus blocking and the restriction of access control.
A. Bypass Profile
It is possible to manage the conditions on connection by creating them as a profile. Each
profile has a priority in a top-down order.
Bypass
Setup whether the relevant profile will carry out bypass (Yes) or not (No). After
selecting an item of the list, set up relevant conditions and operation in Profile Details.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
ARA Networks.Co,Ltd..101
JAGUAR 5000 Web Admin
Figure 45
This is a menu that appears when a cache mode is either a transparent or hidden cache. A source
designated in a static IP bypass or a packet with destination IP range will not be processed by the
JAGUAR 5000 but will be bypassed at the network level of OS. It can contribute to reducing
system load for a service that has many requests with very low cache efficiency. As static IP
bypass determines whether or not to bypass in accordance with the IP of source/destination, it
will not be activated for a proxy request with the JAGUAR 5000 as destination. Therefore, static IP
bypass is only to be configured in transparent and hidden mode.
A. Static IP Bypass
Source IP/Mask, Destination IP/Mask
Designate the range of sources and destination IPs with a Bit mask method. For IP it is
possible to use a range destination with _ and bit mask (Ex: 10.101.1-20.39-50,
10.101.2.4/22).
For more information on how to designate using a Bit mask, please refer to
Designating an Address Range using Bitmask' in Appendix.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
Figure 46
This is the menu that appears when a cache mode is either a transparent or hidden cache. This function
adds IP bypass rules for an occasion when errors frequently occur in a cache or web server during operation
using IP (range) of source or destination.
The use of active IP bypass allows the bypass at the level of OS network without getting through the cache
engine of the JAGUAR 5000 to reduce the burden on the JAGUAR 5000 engine to operate service efficiently.
However, if too large a number is assigned for the number of maximum creation, the maximum value of the
actively created bypass list; it will also put a heavy load on OS. So it is better to limit the number. Active IP
bypass determines whether or not to bypass with IP address of source or both source and destination. It will
not be activated for a proxy request with the JAGUAR 5000 as destination. Therefore, active IP bypass is only
to be configured in a transparent and hidden mode.
A. Max Entries
Determine the maximum number of actively created IP bypass rules.
B. TTL
Set up TTL of IP bypass rule.
Configure TTL of IP bypass rule. The registered TTL applies currnet TTL, not TTL of the
register time, to all registered rule. If TTL value is 0, TTL not applied.
C. Error Code
ARA Networks.Co,Ltd..103
JAGUAR 5000 Web Admin
Select an Error Code to be bypassed dynamically and its bypassing method. Select Source,
'Destination' or Source/Desination for each Error Code to set bypass.
The error codes are as follows:
N/A
When the JAGUAR 5000 decides that one is not an HTTP request. It is a case when a
user has sent a request via HTTP service port of the JAGUAR 5000 other than an HTTP
request.
ERR
When there is a connection problem with an origin server.
400
When a web server has sent a 400 Bad Request message to a request. It occurs when
the web server cannot interpret the message of a client.
401
When a web server has sent a 401 Unauthorized message to a request. It occurs
when the request failed to pass authentication for a membership web site.
403
When a web server has sent a 403 Forbidden message to a request. It occurs when
the web server understands the request but refuses access for specific reasons.
404
When a web server has sent a 404 Not Found message to a request. It occurs when
there is no object requested by a web server.
405
When a web server has sent a 405 Method Not Allowed message to a request. It
occurs when the web server does not allow the request or an impossible HTTP method
has been requested.
406
When a web server has sent a 406 Not Acceptable message to a request. It occurs
when the contents to be transmitted cannot be sent in the way the client has asked.
500
When a web server has sent a 500 Internal Server Error message to a request. It
occurs either due to a problem with a web server or to an impossible decision error.
Normally it occurs when CGI, script or DB error or overload.
ETC
When an error code occurs that does not belong to any of the above.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
ARA Networks.Co,Ltd..105
JAGUAR 5000 Web Admin
Figure 47
In transparent or hidden cache mode, if bypass exception setting is registered, only HTTP
requests with destination IP range registered in Bypass Exclusion Group List are cached while
others will be bypassed. If there is no configured item, all of HTTP objects will cached except
dynamic and static bypass setting items like established setting.
A. Bypass Exception
Add, modify and delete bypass exception group and add or delete IP/MASK list in the
bypass group. For more information to set Bypass Exception, please refer to Help in the
Bypass Exception menu.
Group Name
Set up group name of destination address list to except bypass.
Description
Register description for bypass exception groups.
Note
Rule established in dynamic IP bypass and IP bypass have priority.
This is a function that client controls the speed that receive download from the JAGUAR 5000. It
can control bandwidth usage of client by limit all or individual speed of client by group or limit
speed for each request according to parameter to related URL speed. At first, generate a speed
control class that defines how to control speed then designate classes defined in accordance with
the conditions of HTTP requests to employ speed control in a variety of ways. However, there is no
need to generate a speed control class for the method that transmits speed control parameters
with a query string in URL.
Figure 48
It defines classes has the way of speed limit and descriptions. These classes are applied to
Ratelimit Map by each request group and controls client's download speed actually.
A. Ratelimit Class
Add/Delete/Modifies class names. After selecting the items in the profile list, set up
relevant conditions and operation in Profile Details. You can make classes by max. 31.
ARA Networks.Co,Ltd..107
JAGUAR 5000 Web Admin
This method allows limiting the use of bandwidth for each user who falls into the
relevant class. In other words, configuration such as rate, burst, and maxconn is all
applicable to individual users. Here, individual users will have their respective range by
netmask and portmask configuration below.
Port mask
If port Mask is set to on, JAGUAR 5000 classfies the Ratelimit Class also using the port
number.
Masking result of client IP address with network mask is masked ip and the Port Mask is On,
(masked ip, port) tuple desgisnates the Ratelimit Class. If it is Off, only masked ip values can
This method allows limiting the use of entire bandwidth for all requests that fall into a
relevant class. In other words, configurations such as rate, burst, and maxconn are
all applicable to all requests in the same class.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
Figure 49
This menu manages actual download rate limitation using Ratelimit Class There are many ways
to control the speed of a request: apply a speed control class directly, apply a speed control class
by receiving a speed control class ID from a URL query string, and control speed control for
individual access by receiving speed control class from a URL query string.
A. Ratelimit Map-Profile
Manages the conditions about request that rate limitation class is applied by each profile.
Each profile has a priority in a top-down order.
After selecting the items in the profile list, set up relevant conditions and operation in
Profile Details.
ARA Networks.Co,Ltd..109
JAGUAR 5000 Web Admin
Class ID Keyword
Designates keyword for class ID factor when URL request.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
Figure 50
It is possible to filter virus/worm use HTTP such as Nimbda that wastes network resources in a
cache. These network virus/worms waste tremendous network and disk resources for their self-
reproduction and transmission, and they can also damage a system. The network packet created
by these virus and worms has a consistent pattern. You can stop further transmission and
resource waste by virus by registering infected or risky hosts and URL patterns. The virus-
blocking restriction takes priority over all other restrictions.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
ARA Networks.Co,Ltd..111
JAGUAR 5000 Web Admin
Figure 51
It is a function of the JAGUAR 5000 that caches the contents of a designated web site within a
specified time in advance without any request from clients.
A. Contents Preloading
Select whether or not to use contents preloading.
B. Edit
Press Edit button to edit the pre-loading setting.
URL
Designate a URL of a web site to carry out contents free loading. It does not use
'http://'.
LinkDepth
When contents pre-loading is made, it is possible to carry out pre-loading of pages
linked to the web site as well. Follow the link and designate the depth of max. link of
the pages to pre-load. If it is 0, it will only carry out pre-loading for those specified. If
it is 9, it will pre-load all pages on the visit to 9.
LocalLinkOnly
Determine whether or not carry out pre-loading only for pages on the website server
when pre-loading on the linked pages is made.
Month
Designate one month from January to December. If you want to apply for every month,
input 0.
Day
Designate one date from 1to 31. If you want to apply for every day, input 0.
Hour
Designate one hour from 0 to 24. If you want to apply every hour, input 24.
Minute
Designate one minute from 0 to 59.
C. Save
After clicking Edit button, use the changed Save button to save the changed contents pre-
loading setting. Then use APPLY button to apply it to actual services.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
ARA Networks.Co,Ltd..113
JAGUAR 5000 Web Admin
This is plug in for interworking with Smart GLB (hearafter SGLB), ARA Networks smart load
balance, and JAGUAR 5000.
For more information about SGLB, please refer to SGLB manual.
Figure 52
A. Jaguar IP
Register JAGUAR 5000s IP address. This is used for server indentifying in SGLB.
B. SGLB IP List
SGLBs IP address to receice Doamin and host information from JAGUAR 5000.
Registering multiful SGLB IP address
Multiful SGLB IP address registering is available.
Figure 53
A. Host
Enter entire domain information
B. Comment
Description for the hosts.
ARA Networks.Co,Ltd..115
JAGUAR 5000 Web Admin
Figure 54
Uploading static page is available. This is used for Static Page option in Access Control. When the
Static page is selected in Access Control menu, the file name registered and Without Content' are
provided as well as the code.
A. File Name
Show the File name and location of the static page file.
The allowed upload file extender is html, htm, or txt.
B. Description
Dsescription for the static page.
Note
The html file uploading capacity is available up to 30Kbyte.
Figure 55
City Blocks DB
Upload DB file had "start IP Number", "end IP Number", and "location ID" field among
two of DB files offering in GeoIP City or GeoLite City.
City Location DB
Upload DB file that has location information about"location ID" among two of DB files
offering in Geo IP City or GeoLite City.
ARA Networks.Co,Ltd..117
JAGUAR 5000 Web Admin
3.12. Log
It is possible to leave an access record for any requests handled by the JAGUAR 5000 such as a
service request, a request denied of service, a request that was detected as virus contaminated,
etc. in a variety of formats. Also, it provides various functions such as log rolling, automatic
transmission to an external server, log file separation by user request information to name just a
few. The log system of the JAGUAR 5000 is largely composed of log management unit and log
profile. You can set up matters to be recorded, format, rolling policy, the name and location of the
log file and FTP backup policy in a log management unit. Multiple log file data are managed by
being transformed into a log profile.
Figure 56
A. Enable Logging
Carry out default setting for the environment of access log. It is applicable to all log files.
B. Log Directory
Designate a directory in which to store access log files in the JAGUAR 5000 system.
Rolling Time
Add a time of the rolling at the milli-second unit to an original log file name with a
rolled log file name in the form of YYYYMMDD.HHMMSS.mmm.
F. Log Compression
Set up whether or not to compress rolling log files. As log is large, it is recommended to
compress the file.
Transmission Time
Determines the time to send a designated FTP server everyday.
On-time
Send log one time at a specific time during a day. If this option is selected, logs will be
transmitted at 10 minutes of specified time. If log is not been compressed even Log
Compression option has been selected, it may take time to transmit to compress the file.
Interval
Transmit in regular hour intervals. If this option is selected, logs will be transmitted at 10
minutes of specified time. If log is not been compressed even Log Compression option has
ARA Networks.Co,Ltd..119
JAGUAR 5000 Web Admin
After Rolling
Transmit after log rolling. For more information on log rolling, please refer to the section,
Log Unit.
Notice
If sets two FTP servers and file must be transferred equally both two servers, we
recommend that off the delete option after file transmit.
FTP Server
Designate account and directory of FTP server to transmit. In case set all two servers,
it is transmitted to all.
User ID
Designate a user ID to be used for log in on an FTP server
Password
Designate a password to use for log in on an FTP server
Verify Password
Type again to make sure that password is correctly typed.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
Figure 57
Add, delete, edit and set up log file data. As they are information to be used in a log profile, to
create a log created in this item, it is necessary to add in a log profile.
A. Log Unit
Add, delete or modify log file data in all log file data lists.
After selecting an item of the list, set up relevant conditions and operation in Profile
Details.
B. Profile Details
Log Format
Determine a record format for a log file that belongs to a log file data. The JAGUAR
5000 supports Squid, CLF, NS2, NS2E, APACHE, Web Sentinel, Squid-EXT, Custom and
Custon-EXT supports W3C style header and footer.
ARA Networks.Co,Ltd..121
JAGUAR 5000 Web Admin
Log Filename
Select the name of a log file. The log file will then be stored in a log directory
configured by cache log directory. It should not overlap with other log files. While log
files can be created and rolled in a designated directory and by a name determined by
individual log files, it is also possible to send a log to an external server on a real-time
basis without having to store them in the JAGUAR 5000. To transmit logs to an
external server, you can use TCP or UDP.
When configured in the above fashion, the JAGUAR 5000 will send logs to a relevant
server upon request via TCP and it only transmits texts such as remote syslog protocol.
If it is not possible to access the relevant server, it is stored in a filename in a
designated directory in the JAGUAR 5000 and re-transmits the log when access is
made.
When configured in the above fashion the JAGUAR 5000 will transmit logs to a relevant
server for every request via UDP and it only transmits texts such as remote syslog
protocol. As it is UDP, it does not check if transmission is successful and does not
require file name.
"%cqts %ttms %chip %pres/%pssc %pslx %cqme %cquc %caun %phie/%pqsn %psct"
Rolling Size
Configure the size of the newly created log file after rolling. Rolling refers to a function
that backs up a log file in a new name and records a log. Rolling is constituted by
either a size condition by max_log_size or time condition by rolling_option.
Sometimes, it is not necessary to configure time condition but setting a size condition
is compulsory so you must enter a value more than 0.
Rolling Time
Set up the time condition for newly created log file after backup. Able to set rolling for
a certain time basis (On-time) for everyday or for a specific time gap (interval) policy.
Select N/Ain On-time to deactivate the time-conditioned rolling function.
Sampling
If access log is used for analysis, it may take much time and resources cause of much
logs, so, configure the logs to store by sampling. Default value is 1, and able to set
from 1 up to 100000.
Logging Selection
Set up which should be used as a logging.
All
Logging all
Normal Only
Logging those connections with servers that are normally made by caching service only.
Filtered Only
Logging those failed connections to servers or the JAGUAR 5000 due to filtering.
Protocol
Select response protocol of client to log.
FTP Transfer
Select whether or not to send log file to FTP within a specified time.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
Note
If you set up Logging Filtered Virus all settings here will be ignored.
Note
[Normal service & abnormal service]
Normal service refers to a connection through which the JAGUAR 5000 transmits the
contents of a web server to clients. Error messages from a web server belong to normal
services as they are contents in a web server. Abnormal service refers to a connection
through which the JAGUAR 5000 fails to transmit the contents of a web server to clients.
ARA Networks.Co,Ltd..123
JAGUAR 5000 Web Admin
It includes some occasions when filtering blocks access to a web server by the JAGUAR
5000 or when an access block obstructs any access to the JAGUAR 5000.
Figure 58
It is possible to add, setup and delete log profiles. You can create separate log files by client IP or
server name.
A. Log Profile
Add, delete, and modify log profile in a log profile list.
After selecting an item from the list then select a log unit that defines log files to be used,
set up relevant conditions and operation in Profile Details.
Unselected Log Unit/Selected Log Unit
Select or cancel log file data to be managed in a log profile.If you set up profiles you
added, please refer to Profile Condition Type in Appendix.
B. Profile Details
Log Unit Detail
Displays detailed information on the current log profile.
ARA Networks.Co,Ltd..125
JAGUAR 5000 Web Admin
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
Figure 59
ARA Networks.Co,Ltd..127
JAGUAR 5000 Web Admin
3.13. Maintenance
It is possible to set up the use of Web Administration Tool such as ID/Password, access allow and
deny, MRTG availability, management of employed the JAGUAR 5000s as well as
Restart/Shutdown.
3.13.1. Account
Figure 60
Set up an account that can make an access to the JAGUAR 5000 Web Administration.
Administrators ID is always admin.
A. Account
Register Admin ID for Web Admin login
B. Level
Administrator As a supervisor, has authority for entire system.
Limited As a limited user, has limited authority for system such as monitoring.
C. Password
Register Admin password for web admin login.
Password designates more than 4 letters of number, alphabetical letter and special
characters.
Figure 61
Set up a mail address to send mail reporting any problem in the JAGUAR 5000 system. It is sent
when the JAGUAR 5000 is closed abnormally.
If J3-engine is closed abnormally due to outside signals such as TERM or TNT, the "Engine is
terminated by some signal. Please check /var/log/cachectl.log file." Message will be sent to the
registered E-mail address.
If cachectl determines that j3-engine performs the role of the cache will be difficult due to
resource problem such as system loading or memory, cachectl will send the "Engine is terminated
abnormally. Please check your syslog file." message to the regisetered E-mail address.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
ARA Networks.Co,Ltd..129
JAGUAR 5000 Web Admin
Figure 62
B. Information to send
Files to transmit are divided into groups and transmitted debugging information can be
transmitted separately by group selecting.
D. Customize file
If Customize item is checked in Information to Send, you can send debugging information
including customize file. Enter a file name that has a valid absolute path line by line.
(ex:/var/log/dmesg)
ARA Networks.Co,Ltd..131
JAGUAR 5000 Web Admin
Figure 63
Set up an access allow IP or access deny IP for a Web Administration Tool Site. It is also possible
to designate the range of IP using and Bit mask. When ranges overlap, it will have a top-down
priority order. (Ex: 10.101.1-20.39-50, 10.101.2.4/22). For more information on how to define as
Bit mask, please refer to the section, Designating an Address Range using Bitmask in Appendix
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
3.13.5. Firewall
Figure 64
Set up a firewall applicable for all network packets transmitted by the JAGUAR 5000.
B. Protocol
Designate profiles such as ALL, TCP, UDP, and ICMP, etc.
C. Src Addr/Mask
Define the scope of source IP addresses using Bit Mask method
D. Dest Addr/Mask
Define the scope of destination IP addresses using Bit Mask method. Input chain processes
network packets coming to this cache server.
E. Dest Port
Port number is from 1 to 65535. The scope will be defined using '-'.
E.x) 1-65535
F. Action
Determine Allow or deny.
G. NIC
Select Network Device.
Note
If you mark v Apply All on the upper part, you can apply setup to all of the JAGUAR 5000
that are registered as a cluster.
ARA Networks.Co,Ltd..133
JAGUAR 5000 Web Admin
3.13.6. Option
Figure 65
A. Enable MRTG
Determine whether or not to use an MRTG tool, which creates graphs for monitoring.
B. Cache Integration
You can register and manage the IP of the JAGUAR 5000 to be managed in the Web
Administration Tool. If you choose an integrated setup option in a setting that has an
integrated setup option, it will change all settings of the JAGUAR 5000s registered here.
Web Administration Tool can set up multiple numbers of the JAGUAR 5000s
simultaneously. Select a group of the JAGUAR 5000s to set up together. The group of
the JAGUAR 5000s set up as such is called a cluster.
As one the JAGUAR 5000 can belong to only one cluster, any added the JAGUAR 5000
should not belong to any cluster. This is called an exclusive cache. This cache has no
other caches but itself in the cluster list. Also, any excluded the JAGUAR 5000 will be
an exclusive cache.
Also, it cannot be added or deleted in Admin of the JAGUAR 5000 that are added or
deleted. These add and delete functions are applicable only for those other the
JAGUAR 5000s within a cluster.
C. Cache IP
Please refer to Profile Condition Type in Appendix.
Note
If you mark v Apply All on the upper part, you can apply setup to all of JAGUAR 5000
that are registered as a cluster.
3.13.7. Restart/Shutdown
Figure 66
Restart hardware or software, or stop operation. Some setups are only applicable when the
JAGUAR 5000 has been manually restarted.
A. Restart
Restart the JAGUAR 5000 S/W or carry out rebooting the JAGUAR 5000s H/W.
B. Shutdown
Stop any operation of the JAGUAR 5000 S/W or H/W.
ARA Networks.Co,Ltd..135
JAGUAR 5000 Web Admin
4. Appendix
The JAGUAR 5000 has a wide range of menus that set up specific conditions for HTTP requests
from clients so as to perform certain actions. For example, it includes a policy to give a large TTL
(Time-To-Live) for an object that has specific extension in a specific directory, a policy to limit
access from a specific client IP range, and a polity to assign a specific origin server group for a
request on specific Hostname, etc. Such conditions are configured at the condition instance below
cache content-control cc_item and each has type to represent a type of condition and value
member by which administration tool user enters specific conditions. The following are
descriptions of different types, the same menu items in Web Admin, and value examples.
http://www.aranetworks.com/
The first string of URL of a server. Configured
URL Prefix http://img.aranetworks.com/lo
includinghttp://.
go/
ARA Networks.Co,Ltd..137
JAGUAR 5000 Web Admin
The pair of IP address and Bitmask means the range of IP addresses from the largest place of
binary numbers that has the same bit with the number of Bitmask values. As IP version 4 address
is binary number of 32 bits, its Bitmasks are integers from 0 to 32. For instance, 100.0.0.0/8
means a range of IPs that have 100.0.0.0 as the first 8 bits. As IP address is expressed in decimal
numbers for each 8 bits, it falls within an IP address of a class 100.*.*.*. As 100.0.0.0/16 is
100.0.*.*, it falls within B class range. And as 100.0.0.0/24 is 100.0.0.*, it is C class range. As
100.0.0.0/32 should have same 32 bits with 100.0.0.0, it is 100.0.0.0 IP address. If it is
100.0.0.0/0, it cannot be compared with any bits, it means all IPs. Thus, 100.0.0.0/24 falls within
the same range as 100.0.0.100/24. As the range is adjusted in a bit unit, the size of the range is
a multiple of the number 2. If it is Bitmask 22, as it checks 2 bits less then that of 23, it has the
range of C class 2^2 = 4, IP address2^10 = 1024. While 100.0.0.0/22 indicates the range of
100.0.0-3.*, 100.0.4.0/22 indicates the range of 100.0.4-7.*. 100.0.0.0/22, 100.0.1.0/22,
100.0.2.0/22. 100.0.3.0/22 falls within the same range.
In the JAGUAR 5000s configuration, there are some parts that determine the patterns of URL in
regular expression. Simple grammars of regular expression are as such:
Expression Desctiption
A single character except new line
. Ex1) 13. is 131, 132, 13a etc.
Ex2) 1.* is 1, 1123, 13a etc.
Repeat the preceding character or formula for more than 0 time
*
Ex) a*bis b or ab or aab etc.
Repeat the preceding character or formula for more than 1 time
+
Ex) a+b is ab or aab etc.
No preceding character or just a single one
?
Ex) a?b is b or ab
One of the listed characters in brackets (-is range)
Ex1) [abc] is a, b, or c
[]
Ex2) [0-9]is 0, 1, , 9
Ex3) [a-zA-Z]is all alphabet
A single character except the listed characters in brackets(-is
range)
[^]
Ex1) [^abc] is a chacracter except a, b, and c
Ex2) [^a-c0-8] is a character except a ~ c and 0 ~ 8
The beginning of string
^
Ex) ^abc is a string starting with abc
The end of string
$ Ex1) abc$ is a string ending with abc
Ex2) ^$is a blank string
() Combine in one formula
Select one of both characters or many formulas tied with
| brackets(, )
Ex) (abc|def) is abc or def
Use a character that is used for a specific purpose
\
Ex) \[, \* etc.
ARA Networks.Co,Ltd..139
JAGUAR 5000 Web Admin
This is an item that a user can use when access log format is set as either user-defined item or
extended user-defined item. If you place % in front of the item names listed below, it will display
the relevant information whenever a request is made. There is no upper and lower letter
distinction for entering log item. It is an example of strip_query_term to be Off. If it is On, any
query string after ? in the URL related item will not be displayed.
ARA Networks.Co,Ltd..141
JAGUAR 5000 Web Admin
ARA Networks.Co,Ltd..143
JAGUAR 5000 Web Admin
Ex) 1
ARA Networks.Co,Ltd..145
JAGUAR 5000 Web Admin
Following are descriptions of the result of JAGUAR 5000s request process or a situation of
response status codes to a user that are recorded in an access log.
Response
Response
Status Code of
Processing Result Description
JAGUAR 5000
(%PRES)
(%PSSC)
When JAGUAR 5000 is caching objects that do not pass
renewal, and:
TCP_HIT 200
1. A user makes a request without IMS;
2. A user sends it to IMS then expired
When JAGUAR 5000 is caching objects that do not pass
TCP_IMS_HIT 304 renewal, and:
1. A user sends it to IMS then not expired
As JAGUAR 5000 is caching objects that do not pass
renewal, and checks with a web server with IMS, it was
TCP_REFRESH_HIT 200 304 Not Modified , and:
1. A user makes a request without IMS;
2. A user sends it to IMS then expired
As JAGUAR 5000 is caching objects that have pass
renewal, and checks with a web server with IMS, it was
TCP_REFRESH_HIT 304
304 Not Modified so not renewed yet, and:
1. A user sends it to IMS then not expired
As JAGUAR 5000 is caching objects that have pass
renewal, and checks with a web server with IMS, it was
TCP_REFRESH_MISS 200 200 OK, so renewed
1. A user makes a request without IMS;
2. A user sends it to IMS then expired
When JAGUAR 5000 is not caching objects, and;
1. A user makes a request without IMS;
TCP_MISS 200
2. A user sends it to IMS then checked with IMS to find
it has expired
When JAGUAR 5000 is not caching object, and;
TCP_MISS 302
1. A user redirects
When JAGUAR 5000 is not caching object, and;
TCP_MISS 404
1. There is no object
TCP_MISS 304 When JAGUAR 5000 is not caching objects, and;
ARA Networks.Co,Ltd..147
JAGUAR 5000 Web Admin
JAGUAR 5000 records a log that records a situation related to cache operation so an administrator
may be aware of the status of JAGUAR 5000. Log file is saved in /var/log/cache.log in a system
and recorded as syslog as well. Also, if SNMP trap is activated, it will transmit the log of a relevant
situation to a designated server through SNMP trap for occurrence of above-normal situation.
The followings are level, log, and description of each situation. The details of log can be modified,
added and deleted without any notice in accordance with update.
[ALERT]
Message Description
Failed to generate temporary 512/1024 bit
Fail to generate a SSL related key
(RSA private key|DH parameter)
This is time-limited version of software,
which expires at..and now expired. Thank JAGUAR 5000 licence has expired
you very much for evaluating this software.
Internal consistency error regarding
ps_get(): conn mgmt constraint alert ..
persistent connection
unstable persistent connection to %s: Internal consistency error regarding
pri(%d), conn(%d) vs max(%d) resetting persistent connection
port .. - binding http listen port failed Fail to listen HTTP port
port .. - binding sub http listen port Fail to listen HTTP sub-port
failed
port .. - starting http listener failed Fail to run HTTP listener
.. session memory allocation failure. Fail to assign sesson memory
port .. - binding management port failed File to conduct management code binding
port .. - starting http management listener Fail to run management listener
failed
stale ssl [server/client] pointer SSL data inconsistency
alert condition: ev != dev->ev Internal malfunction
alert condition: disk event failed Event Failure
alert: .. no block in LRU, restarting All LRU blocks were wasted and cahce
was ended abnormally
[CRITICAL]
Message Description
engine shutdown. Engine has shut down
SearchMMT: Check-Fail[%d] Internal strage error
[ERROR]
Message Description
failed in connecting to j3-helper Fail to connecnt helper process
failed in reading from j3-helper Fail to commnuicate with helper process
.. is not an access log unit Log unit configuration error
fail to initialize log unit .. Log unit initializtion error
cannot roll log files Unable to enforce log rolling
URL regex pattern error in rule URL rewritting rule rewritting error
cannot allocate memory for proper operation Memory shatage
receiving packet information failed Communication error with cachectl
reading content-control configuration Communication error with cachectl
failed
configuring content-control failed Communication error with cachectl
finalizing .. failed Fail to end cache related server
re-*ing .. failed Fail to restart cache related service
export storage snapshot failed Fail to export cache data
starting management communication failed management socket related error
accepting management communication failed management socket related error
receiving management command failed management socket related error
initial configuration failed Default configuration failure
reload configuration failed Fail to renew configuration
sending cache statistics failed Fail to transmit cache statistic data
sending virus-list snapshot failed Fail to transmit cache virus related data
sending bypass-list snapshot failed Fail to transmit cache bypass related data
sending reverse statistics failed Fail to transmit cache reverse cache
statistic data
sending storage statistics failed Fail to transmit cache storage statistic
data
bad log type: .. Wrong type of log
cannot open log destination .. Fail to connect to network logging
cannot connect to log destination .. Fail to connect to network logging
cannot open log file .. Unable to open a log file
update_session_stat* fail Fatil to renew session information
cannot allocate socketbuf region No memory during initialization
socket_getdest failed: .. socket_getdest failure cause a problem
with Hidden mode
..: create_thread() failed. Memory shortage
ARA Networks.Co,Ltd..149
JAGUAR 5000 Web Admin
[WARNING]
Message Description
rai* Message related to configuration on
referer accept list
max system descriptors: .. max fd configured
suspicious URL Problem with URL.
insufficient memory Memory shortage
fail to open filebuff Unable to open access log
unexpected packet received Communication error with cachectl
invalid ... parameter packet size Communication error with cachectl
unknown packet received Communication error with cachectl
unknown command [...]accepted: possible Unknown valure enters from management
attack socket
network/file logging failed, discarding Dispose the current log buffer due to
current log buffer logging difficulty
cannot determine the timestamp of log .., Force log rolling for an inability of
log roll forced interpreting log time stamp
log-rolling warning: index file for .. not
Force log rolling for no log index file
removed
log-rolling faled ... Log rolling failure
create storage init thread failed Fail to create storage initialization thread
...cannot find ... in dns cache
..: cannot delete '..' in dns cache Problem in a DNS cache
[..]->item (..) != (..)\n
re-initing dns_cache (prev_dns_cache=..) Re operate DNS cache
given number of max system descritor is too
Re sizing of given parameter for too large
big..
ones
limiting max system descripor to ..
given number of max system descritor is too Re sizing of given parameter for too small
small..setting max system descripor to .. ones
cannot allocate persistent connection .. Fail to create persistenet connection
warning: .. buf(..) will be freed Non-used buffer remains.
http_parse_request_line enters [..]with Warning on argument parse
arglen .. but real arglen is ..
bad syntax in ... Cache configuration file grammar error
too short keyword, skipping .. Fail to read FLV related Keyword
too many flv extensions, skipping .. Fail to read FLV related Extension reading
storage version mismatch A disks storage version and the current
S/Ws storage version do not mathc
object header version mismatch A disks object header version and the
current S/Ws object header version do
not match
cannot allocate .. page Memory assignement error
storage export is cancelled .. Stroage export failure
storage import is cancelled .. Stroage import failure
Disk IO Failure, marking vmpn .. as bad Mark the current black with error
[NOTICE]
Message Description
forced log rolling start Start enforced log rolling
.. is rolled log rolling
ARA Networks.Co,Ltd..151
JAGUAR 5000 Web Admin
[INFORMATION]
Message Description
outgoing connection management enabled
manage-host-timeout is .. Sec
Activate the number of server-side access
limiting outgoing connection per a
server to ..
outgoing connection management disabled" Deactivate the number of server-side
access
URL rewritting rulea .. URL rewriting rule dump
forwarding_port_num: .. Cache forwarding port dump
forwarding_port: ..
.. tried but disallowed in current run Unable to succeed in the given task in the
level current situation
initial configuration done, increasing Succeed in default configuration, increase
runlevel in run level
reload configuration done Succeed in cache configuration renewal
log filename style: inktomi Use inktomi style log name
Unable to use network log-in so use local
switch to local fallback log.
log-in
In this case, try network log-in again in a
log server will be re-checked after .. Sec
few seconds.
remote logging to .. started Start network logging
log .. prepared Open log and start recording
log-roll done/failed for .. Log rolling success/failure
reading /proc/stat returned .. CPU load measurement failure
Carry out storage initialization at the
storage initializing in background process
background
ARA Networks.Co,Ltd..153
JAGUAR 5000 Web Admin
[OID Assignments]
Message Description
software OBJECT IDENTIFIER ::= {jaguar 1}
config OBJECT IDENTIFIER ::= {jaguar 2}
status OBJECT IDENTIFIER ::= {jaguar 3}
[enterprises.aratech.jaguar.software]
Message Description
adminAddress 0: Cache Administrator E-mail address
softwareName 0: Cache Sotrware Name
version 0: Cache Software Version
[enterprises.aratech.jaguar.config]
Message Description
Current cache running mode:
runningMode.0:
Proxy/TP/Reverse/Hidden
wccpVersion.0: Current WCCP version: 1/2/none
[enterprises.aratech.jaguar.status]
Message Description
procInfo OBJECT IDENTIFIER ::= {status 1}
perfInfo OBJECT IDENTIFIER ::= {status 2}
aggrInfo OBJECT IDENTIFIER ::= {status 3}
dnsInfo OBJECT IDENTIFIER ::= {status 4}
avgInfoTable OBJECT IDENTIFIER ::= {status 5}
objectInfoTable OBJECT IDENTIFIER ::= {status 6}
diskInfo OBJECT IDENTIFIER ::= {status 7}
diskTable OBJECT IDENTIFIER ::= {status 8}
ARA Networks.Co,Ltd..155
JAGUAR 5000 Web Admin
# procInfo { aratech.jaguar.status 1 }
cacheStartTime.0: Start time of cache process
sysPageFaults.0: Page faults with physical i/o (No Use)
memUsage.0: Total memory accounted for KB (No Use)
cpuTimeUsed.0: Amount of cpu seconds consumed (No Use)
cpuUsage.0: The percentage use of the CPU (%)
cacheMaxResSize.0: Maximum Resident Size in KB (KB)
# perfInfo { aratech.jaguar.status 2 }
totalMemCacheSize.0: Total memory cache size in KB
curMemCacheSize.0: Current using memory cache size in KB
totalDiskCacheSize.0: Total disk cache size in KB
curDiskCacheSize.0: Current using disk cache size in KB
numObjCount.0: Number of objects stored by the cache
avgObjectSize.0: Average size of stored objects in KB
curAvailFD.0: Available number of file descriptors
curUsingFD.0: Reserved number of file descriptors
maxUsedFD.0: Maximum used number of file descriptor
totalFD.0: Total number of file descriptors
curNumClientSessions.0: Current number of client sessions
curNumServerSessions.0: Current number of server sessions
curNumActiveClientSessions.0: Current number of active client sessions
curNumActiveServerSessions.0: Current number of active server sessions
# aggrInfo { aratech.jaguar.status 3 }
numHttpRequests.0: Number of HTTP requests received
numHttpResponses.0: Number of HTTP responses transmitted
numHttpErrRequests.0: Number of HTTP requests which is error
numHttpDeniedRequests.0: Number of HTTP requests denied
Cache Hit
Cache Hit Ratio = (numCacheHits.0 / numHttpRequests.0)*100
numCacheHits.0: Number of HTTP cache hits
sizeHttpRequestsReceived.0: Size of HTTP requests received (Bytes)
sizeHttpRequestsSended.0: Size of HTTP requests sended (Bytes)
sizeHttpResponsesReceived.0: Size of HTTP responses received (Bytes)
sizeHttpResponsesSended.0: Size of HTTP responses sended(Bytes)
Bandwidth Saving
=((sizeHttpResponsesSended.0-sizeHttpResponsesReceived.0)/ sizeHttpResponsesSended.0)*100
numIcpReceived.0 Number of ICP messages received (No Use)
numIcpSended.0 Number of ICP messages sended (No Use)
sizeIcpReceived.0 Size of ICP messages Received (No Use)
sizeIcpSended.0 Size of ICP messages sended (No Use)
# dnsInfo { aratech.jaguar.status 4 }
numDnsCacheEntries.0 Number of DNS cache entries
numDnsRequests.0 Number of DNS requests
numDnsHits.0 Number of DNS cache hits
numDnsMisses.0 Number of DNS cache misses
numDnsFailed.0 Number of DNS lookup failed
# avgInfoTable { aratech.jaguar.status 5 }
# index 1: 1 min average
# index 2: 5 min average
ARA Networks.Co,Ltd..157
JAGUAR 5000 Web Admin
#diskInfo { aratech.jaguar.status 7 }
storageStatus Storage online status
diskCount Number of disks
#diskTable { aratech.jaguar.status 8 }
diskEntry An entry in disk status table
diskPath Disk device path
diskStatus Disk online status
diskUsage Occupied blocks in disk
diskTotal Total blocks in disk
diskLoad Disk load in percentage
activeJobs Number of active disk I/O jobs
[enterprises.aratech.jaguar.bogus]
Message Description
snapshotBogus Bogus for snapshot group
[enterprises.aratech.jaguar.snapshot]
Message Description
vrInfectedTable {snapshot 1}
dynamicBypassTable {snapshot 2}
#vrInfectedTable { aratech.jaguar.snapshot 1 }
vrInfectedEntry An entry in virus infected table
vrIndex Index
vrIPAddr Infected host ip address
vrLastTime Last time when this host had sended
virus packet.
vrCount Count of filterd virus packet of this
host.
# dynamicBypassTable { aratech.jaguar.snapshot 2 }
dbyEntry An entry in dynamic ip bypass table
dbyIndex Index
dbySource source ip address of dynamic bypass
entry
dbyDestination destination ip address of dynamic bypass
entry
dbyHttpCode HTTP status code of dynamic bypass entry
dbyTimestamp enrolled timestamp to dynamic bypass
entry
[enterprises.aratech.jaguar.traps]
Message Description
trapMessage Trap message
engine-trap JAGUAR engine notification
ARA Networks.Co,Ltd..159
JAGUAR 5000 Web Admin
4.8. enterprises.aratech.jaguar.revers.
# r-InfoTable.r-Entry
r-profileName.N: Profile Name
r-numHttpRequests.N: Number of HTTP requests received
r-numHttpResponses.N: Number of HTTP responses transmitted
r-numHttpErrRequests.N: Number of HTTP requests which is error
r-numHttpDeniedRequests.N: Number of HTTP requests denied
r-numCacheHits.N: Number of HTTP cache hits
r-sizeHttpRequestsReceived.N: Size of HTTP requests received (Bytes)
r-sizeHttpRequestsSended.N: Size of HTTP requests sended (Bytes)
r-sizeHttpResponsesReceived.N: Size of HTTP responses received (Bytes)
r-sizeHttpResponsesSended.N: Size of HTTP responses sended (Bytes)
r-curNumActiveClientSessions.N: No. of Current active client sessions
r-curNumActiveServerSessions.N: No. of Current active server sessions
r-httpObjectServiceTimeMS1.N: Average HTTP service time(ms) per object
r-httpMissServiceTimeMS1.N: Average HTTP service time(ms) per missed
object
r-httpHitServiceTimeMS1.N: Average HTTP service time(ms) per hitted
object
r-httpNearHitServiceTimeMS1.N: Average HTTP service time(ms) per near-
hitted object
r-httpRequestsReceivedPerMin1.N: Average number of HTTP requests received
per 1 min
r-httpRequestsServedPerMin1.N: Average number of HTTP requests serviced
per 1 min
ARA Networks.Co,Ltd..161
JAGUAR 5000 Web Admin