http-analyze

Profile Config Commands

Enables forwarding of HTTP request related data to the HTTP analytics engine

Wireless clients (MUs) connect to APs and route their HTTP requests through the APs. These APs extract and forward HTTP request packets, through MiNT, to the NX series controller. The NX series controller uses a new analytic daemon to cache, format, and forward information to the analytics engine. Currently the analytics daemon is supported only on the NX series service platform. Therefore, it is essential that all APs should use an NX series service platform as controller.

In a hierarchically organized network, HTTP analytics data forwarding is a simple and transparent process. The site controllers receive the HTTP data from adopted APs adopted. This data is compressed and forwarded to the NOC (Network Operations Center) controller. There is no need for a separate configuration to enable this feature.

Use this command to configure the mode and interval at which data is sent to the controller and the external analytics engine. This command also configures the external engine‘s details, such as URL, credentials, etc.

Note

Note

The Analytics module helps gather data about customer behavior such as web sites visited, search terms used, mobile device types, number of new users vs. repeat users. This data provides a better understanding of pricing strategies and promotions being run by competitors.

Supported in the following platforms:

  • Access Points — AP505i, AP510i/e, AP560i/h
  • Service Platforms — NX5500, NX7500, NX9500, NX9600, VX9000

Syntax

http-analyze [compress|external-server|update-interval <1-3600>]
http-analyze [compress|update-interval <1-3600>
http-analyze external-server [password <WORD>|proxy <URL>|update-interval <1-3600>|url <URL>|username <WORD>|validate-server-certificate]

Parameters

http-analyze [compress|update-interval <1-3600>]
http-analyze Configures HTTP analysis related parameters
compress Compresses update files before forwarding to the controller. This option is disabled by default.
update-interval <1-3600> Configures the interval, in seconds, at which buffered packets are pushed to the controller
  • <1-3600> – Specify the interval from 1 - 3600 seconds. The default is 60 seconds.
http-analyze external-server [password <WORD>|proxy <URL>|update-interval| url|username|validate-server-certificate]
http-analyze external-server Configures the external HTTP analytics engine‘s parameters
password <WORD> Configures the external analytics engine‘s password
  • <WORD> – Provide the login password. This is the password associated with the user name needed to access the external analytics engine.
proxy <URL> Configures the proxy server‘s URL
  • <URL> – Specify the proxy server‘s URL in the following format: http://username:password@proxy-server:port. For example, http://mot:sym@wwwgate0.mot.com:1080
update-interval <1-36000> Configures the interval, in seconds, at which buffered packets are pushed to the external analytics engine
  • <1-3600> – Specify the interval from 1 - 3600 seconds. The default is 60 seconds.
url <URl> Configures the external analytics engine‘s IP address or URL
  • <URL> – Provide the IP address or URL.
username <WORD> Configures the user name needed to access the external analytics engine
  • <WORD> – Provide the user name.
validate-server-certificate Validates the external analytics engine‘s certificate, if it is using HTTPS as the mode of access

Example

nx9500-6C8809(config-profile-default-rfs4000)#http-analyze compress

nx9500-6C8809(config-profile-default-rfs4000)#http-analyze update-interval 200

nx9500-6C8809(config-profile-default-rfs4000)#show context
profile rfs4000 default-rfs4000
 bridge vlan 1

.....................................................................
  qos trust 802.1p
 interface pppoe1
 use firewall-policy default
 http-analyze update-interval 200
 http-analyze compress
 service pm sys-restart
 router ospf
nx9500-6C8809(config-profile-default-rfs4000)#

nx9500-6C8809(config-profile-test-nx5500)#http-analyze external-server username anonymous
nx9500-6C8809(config-profile-test-nx5500)#http-analyze external-server password anonymous
nx9500-6C8809(config-profile-test-nx5500)#http-analyze external-server validate-server-certificate
nx9500-6C8809(config-profile-test-nx5500)#http-analyze external-server update-interval 100
nx9500-6C8809(config-profile-test-nx5500)#http-analyze external-server url
https://192.168.13.10

nx9500-6C8809(config-profile-test-nx5500)#show context
profile nx5500 test-nx5500
 no autoinstall configuration
 no autoinstall firmware
 ......................................................
 interface ge5
 interface ge6
 interface pppoe1
 use firewall-policy default
 export startup-log max-retries 10 retry-interval 30 url ftp://anonymous:anonymous@192.168.13.10/log/startup.log
 http-analyze external-server url https://192.168.13.10
 http-analyze external-server username anonymous
 http-analyze external-server password anonymous
 http-analyze external-server update-interval 100
 enforce-version adoption major
 enforce-version cluster full
--More--
nx9500-6C8809(config-profile-test-nx5500)#

nx9500-6C8809(config-profile-test-nx5500)#http-analyze external-server proxy http://mot:sym@wwwgate0.mot.com:1080

nx9500-6C8809(config-profile-test-nx5500)#show context
profile nx5500 test-nx5500
 no autoinstall configuration
 no autoinstall firmware
 crypto ikev1 policy ikev1-default
  isakmp-proposal default encryption aes-256 group 2 hash sha
 crypto ikev2 policy ikev2-default
...............................................................
 http-analyze external-server url https://192.168.13.10
 http-analyze external-server username anonymous
 http-analyze external-server password anonymous
 http-analyze external-server update-interval 100
 http-analyze external-server proxy http://mot:sym@wwwgate0.mot.com:1080
 enforce-version adoption major
 enforce-version cluster full
 service pm sys-restart
 router ospf
 router bgp
 dot1x system-auth-control
 dot1x use aaa-policy OnBoarding nx9500-6C8809(config-profile-test-nx5500)#

Related Commands

no Disables HTTP analyze settings