Applies To:

Show Versions Show Versions

Manual: Policy Management Guide for the BIG-IP WebAccelerator Module, version 9.4

Original Publication Date: 01/08/2007

Policy Management Guide for the BIG-IP WebAccelerator Module

Table of Contents

Legal Notices

1. Introduction

About this guide

Additional product documentation

Stylistic conventions in this guide

Finding help and technical support resources

2. Overview of the WebAccelerator System

Introducing the WebAccelerator system

Servicing HTTP traffic

Understanding acceleration policies

Using pre-defined or user-defined acceleration policies

Understanding matching rules

Defining HTTP request data type parameters for matching rules

Defining HTTP response data type parameters for matching rules

Understanding caching rules

Understanding the Request Type Hierarchy tree

Request Type Hierarchy tree example

3. Managing Acceleration Policies

Viewing and modifying acceleration policies

Using the Policy Editor

Customizing the WebAccelerator system's behavior

Creating user-defined acceleration policies

Publishing acceleration policies

Exporting and importing acceleration policies

4. Introducing the Request Type Hierarchy Tree

Overview of the Request Type Hierarchy tree

Understanding hierarchy inheritance

Inheriting from a leaf node on the Request Hierarchy tree

Overriding inherited rules

Modifying nodes in the Request Type Hierarchy tree

Configuring a Request Type Hierarchy tree example

5. Configuring HTTP Data Types

Specifying HTTP request data type parameters

Configuring HTTP data parameters

Classifying HTTP response data types

6. Configuring Matching Rules

Matching requests to nodes

Specifying matching parameters

Matching precedence rules

Additional application matching considerations

Processing unmatched requests

Configuring an application matching example

7. Configuring Variation Rules

Using variation and caching rules

Organizing variation rules in the Request Type Hierarchy tree

HTTP request flow

Understanding default caching behavior

Parameters included in the UCI by default

Parameters excluded from the UCI by default

When variation rules are required

When variation rules are optional

Defining variation parameters

Multiple matching parameters

Ambiguous query parameters

Value groups

Configuring a variation rule example

8. Configuring Assembly Rules

Using assembly rules

Organizing assembly rules in the Request Type Hierarchy tree

Specifying content assembly options

Configuring the Express Loader feature

Configuring the Express Connect feature

Configuring content compression options

Enabling content assembly on proxies

Specifying advanced assembly options

Using parameter value substitution

Configuring value substitution parameters

Target URLs

Random value substitution

Configuring an assembly rule example

9. Configuring Proxying Rules

Using proxying rules

Organizing proxying rules in the Request Type Hierarchy tree

Enabling the always proxy option

Defining proxy rules options

Supported HTTP request data parameter types for proxy rules

Proxy rules example

Using the proxy override rules option

Supported HTTP request data parameter types for proxy rules

Proxy overrides rules example

Configuring a proxying rule example

10. Configuring Lifetime Rules

Using lifetime rules

Organizing lifetime rules in the Request Type Hierarchy tree

Configuring content lifetime settings

Specifying content lifetime options

Using ESI Surrogate-Control headers

Using HTTP/1.1 Cache-Control Headers

Defining age settings

Selecting browser cache options

Defining TTL boundaries

Specifying system-wide settings

Specifying the stand-in period

Calculating the HTTP Lifetime Heuristic

Understanding lifetime mechanism precedence

Configuring a lifetime rule example

11. Performing Cache Invalidation

Overview of cache invalidation

Defining invalidation methods

Configuring invalidation rules

Organizing invalidation rules in the Request Type Hierarchy tree

Specifying matching rules

Triggering invalidation

Setting the lifetime for invalidation rules

Configuring an invalidation rule example

Invalidating content manually

Manual invalidation example

12. Configuring Connections Rules

Managing connections

Organizing connections rules in the Request Type Hierarchy tree

Specifying a connection type for connections rules

Using the default connection type

Using one-to-one connection mapping

Using request-based connection pool mapping

Matching to multiple connections rules

Configuring request-based connection pool mapping rules

Specifying a value group

Configuring a connections rule example

13. Configuring Responses Cached Rules

Managing responses cached rules

Organizing the responses cached rules in the Request Type Hierarchy tree

Defining responses cached rules

Determining the completeness of response content

Securely managing NTLM content

Performing caching based on response codes

Configuring a responses cached rule example

14. Specifying Log Formats

Defining logging options

Specifying a log format

Creating custom log formats

Configuring a customized log format example

15. Requirements for Cache Behavior

Servicing HTTP client requests

Processing requests

Caching responses

16. Processing HTTP Response Headers

Understanding HTTP response headers

Classifying responses

Rewriting and assembling responses

Using rules to affect response header processing

Using ESI Surrogate-Control headers

Supported Surrogate-Control directives

Overriding HTTP Cache-Control headers

Using surrogate targeting

Viewing X-PvInfo response headers

Defining the Snnnnn code

Defining the Annn code

17. Supporting Regular Expressions

Using strings for regular expressions

Using meta characters for pattern matching

18. Assembling Content with Edge Side Includes

Using Edge Side Include (ESI)

Understanding ESI templates

Understanding fragments

Processing an ESI response

Caching the response and fragments

Serving ESI content from cache

Managing cookies

Defining ESI language

Understanding ESI expressions

Defining ESI language elements

esi:comment tags

ESI operands

ESI operators

Using parameter value substitution with ESI

Parameter value substitution and ESI variables

ESI implementation example

Creating caching policies for the ESI example

Template example