<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CSS 11500 source based access lists in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/css-11500-source-based-access-lists/m-p/801390#M15560</link>
    <description>&lt;P&gt;Hi, hope somebody can advise me on this request I have had from our server group.&lt;/P&gt;&lt;P&gt;We have the following setup:&lt;/P&gt;&lt;P&gt;Firewall &amp;lt;--VLAN2--&amp;gt; CSS &amp;lt;--VLAN1--&amp;gt; APPSERVER&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The CSS is doing SSL termination for the domain &lt;A class="jive-link-custom" href="http://www.abc.com." target="_blank"&gt;www.abc.com.&lt;/A&gt;  It then passes on the actual request via http to the application server (APPSERVER).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is also a cleartext content rule and service, so if someone browses to &lt;A class="jive-link-custom" href="http://www.abc.com" target="_blank"&gt;http://www.abc.com&lt;/A&gt; they will be automatically redirected to &lt;A class="jive-link-custom" href="https://www.abc.com/" target="_blank"&gt;https://www.abc.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I would like to achieve, is some sort of ACL restriction based on the virtual directory the user is trying to browse to:&lt;/P&gt;&lt;P&gt;i.e only specific IP addresses can access the URL &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="https://www.abc.com/xyz" target="_blank"&gt;https://www.abc.com/xyz&lt;/A&gt;&lt;/P&gt;&lt;P&gt;but any IP address can access the URLs&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="https://www.abc.com/" target="_blank"&gt;https://www.abc.com/&lt;/A&gt;* (with the exception of the above address)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this possible using a CSS?  They are currently restricting access at the application server but wish to move it to a hardware solution if possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;</description>
    <pubDate>Mon, 28 May 2007 04:49:10 GMT</pubDate>
    <dc:creator>andrew-kearton</dc:creator>
    <dc:date>2007-05-28T04:49:10Z</dc:date>
    <item>
      <title>CSS 11500 source based access lists</title>
      <link>https://community.cisco.com/t5/application-networking/css-11500-source-based-access-lists/m-p/801390#M15560</link>
      <description>&lt;P&gt;Hi, hope somebody can advise me on this request I have had from our server group.&lt;/P&gt;&lt;P&gt;We have the following setup:&lt;/P&gt;&lt;P&gt;Firewall &amp;lt;--VLAN2--&amp;gt; CSS &amp;lt;--VLAN1--&amp;gt; APPSERVER&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The CSS is doing SSL termination for the domain &lt;A class="jive-link-custom" href="http://www.abc.com." target="_blank"&gt;www.abc.com.&lt;/A&gt;  It then passes on the actual request via http to the application server (APPSERVER).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is also a cleartext content rule and service, so if someone browses to &lt;A class="jive-link-custom" href="http://www.abc.com" target="_blank"&gt;http://www.abc.com&lt;/A&gt; they will be automatically redirected to &lt;A class="jive-link-custom" href="https://www.abc.com/" target="_blank"&gt;https://www.abc.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I would like to achieve, is some sort of ACL restriction based on the virtual directory the user is trying to browse to:&lt;/P&gt;&lt;P&gt;i.e only specific IP addresses can access the URL &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="https://www.abc.com/xyz" target="_blank"&gt;https://www.abc.com/xyz&lt;/A&gt;&lt;/P&gt;&lt;P&gt;but any IP address can access the URLs&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="https://www.abc.com/" target="_blank"&gt;https://www.abc.com/&lt;/A&gt;* (with the exception of the above address)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this possible using a CSS?  They are currently restricting access at the application server but wish to move it to a hardware solution if possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;</description>
      <pubDate>Mon, 28 May 2007 04:49:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-11500-source-based-access-lists/m-p/801390#M15560</guid>
      <dc:creator>andrew-kearton</dc:creator>
      <dc:date>2007-05-28T04:49:10Z</dc:date>
    </item>
    <item>
      <title>Re: CSS 11500 source based access lists</title>
      <link>https://community.cisco.com/t5/application-networking/css-11500-source-based-access-lists/m-p/801391#M15561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;first, you need to create 2 separate rules to catch the corresponding directories.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ie:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;content xyz&lt;/P&gt;&lt;P&gt;  vip x.x.x.x&lt;/P&gt;&lt;P&gt;  proto tcp&lt;/P&gt;&lt;P&gt;  port 80&lt;/P&gt;&lt;P&gt;  url "/xyz/*"&lt;/P&gt;&lt;P&gt;  add service ...&lt;/P&gt;&lt;P&gt;  active&lt;/P&gt;&lt;P&gt;content all&lt;/P&gt;&lt;P&gt;  vip x.x.x.x&lt;/P&gt;&lt;P&gt;  proto tcp&lt;/P&gt;&lt;P&gt;  port 80&lt;/P&gt;&lt;P&gt;  url "/*"&lt;/P&gt;&lt;P&gt;  add service ...&lt;/P&gt;&lt;P&gt;  active  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you need create some acl to permit the traffic you want&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;acl 1&lt;/P&gt;&lt;P&gt;  clause 10 permit any &lt;SRC&gt; destination content owner/xyz prefer &lt;DENY_WEB_PAGE&gt;&lt;/DENY_WEB_PAGE&gt;&lt;/SRC&gt;&lt;/P&gt;&lt;P&gt;  clause 30 permit any any destination content owner/xyz &lt;/P&gt;&lt;P&gt;  clause 99 permit any any destination any&lt;/P&gt;&lt;P&gt;  apply all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The clause 10 tells the CSS to forward traffic from &lt;SRC&gt; sent to page xyz to use server &lt;DENY_WEB_PAGE&gt; which can be a redirect service to a page that explains that the site is not allowed.&lt;/DENY_WEB_PAGE&gt;&lt;/SRC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2007 15:59:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-11500-source-based-access-lists/m-p/801391#M15561</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2007-05-28T15:59:48Z</dc:date>
    </item>
    <item>
      <title>Re: CSS 11500 source based access lists</title>
      <link>https://community.cisco.com/t5/application-networking/css-11500-source-based-access-lists/m-p/801392#M15562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have finally been allowed to attempt to implement the above changes, but am having trouble with matching the content rules for the directories.  I am using a single CSS to terminate SSL, redirect http, and backend to an apps server, all on a single VIP using different TCP ports.  I have had a number of problems trying to implement this, revolving around the ACL's.  I have gone for a "back-to-basics" approach with the config, and my testing is showing that even though I am explicitly matching the content rule "mysystem/mysystem_mycompany_com" in the ACL, it is not being logged.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The relevant config is attached, as is the result of a "show acl"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help appreciated!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2007 05:49:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-11500-source-based-access-lists/m-p/801392#M15562</guid>
      <dc:creator>andrew-kearton</dc:creator>
      <dc:date>2007-07-13T05:49:22Z</dc:date>
    </item>
    <item>
      <title>Re: CSS 11500 source based access lists</title>
      <link>https://community.cisco.com/t5/application-networking/css-11500-source-based-access-lists/m-p/801393#M15563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Config and "show acl" attached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2007 05:53:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-11500-source-based-access-lists/m-p/801393#M15563</guid>
      <dc:creator>andrew-kearton</dc:creator>
      <dc:date>2007-07-13T05:53:25Z</dc:date>
    </item>
    <item>
      <title>Re: CSS 11500 source based access lists</title>
      <link>https://community.cisco.com/t5/application-networking/css-11500-source-based-access-lists/m-p/801394#M15564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I realise I didn't include the layout of this system.  It is:&lt;/P&gt;&lt;P&gt;INTERNET&lt;/P&gt;&lt;P&gt;   |&lt;/P&gt;&lt;P&gt;Firewall &amp;lt;--INTERNETDMZ--&amp;gt; CSS&lt;/P&gt;&lt;P&gt;   |&lt;/P&gt;&lt;P&gt;   |&lt;/P&gt;&lt;P&gt;Firewall &amp;lt;--MIDDLEWAREDMZ--&amp;gt; APPSERVER&lt;/P&gt;&lt;P&gt;   |&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2007 05:56:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-11500-source-based-access-lists/m-p/801394#M15564</guid>
      <dc:creator>andrew-kearton</dc:creator>
      <dc:date>2007-07-13T05:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: CSS 11500 source based access lists</title>
      <link>https://community.cisco.com/t5/application-networking/css-11500-source-based-access-lists/m-p/801395#M15565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't need every rule to be L5 w/ url "/*".  A L4 rule (vip &amp;amp; proto/port) will suffice to cover all traffic that doesn't match a more specific rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd suggest using a urql list for your private directories so that you can use a single rule to cover many url's. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;urql privateurls&lt;/P&gt;&lt;P&gt;  description "Private URLs -- not to be used from the Internet"&lt;/P&gt;&lt;P&gt;  active&lt;/P&gt;&lt;P&gt;  url 10&lt;/P&gt;&lt;P&gt;  url 10 url "/directory1"&lt;/P&gt;&lt;P&gt;  url 20&lt;/P&gt;&lt;P&gt;  url 20 url "/directory2"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You'll add a statement in the rule that's like "url urql privateurls".  If you're after matching on file extensions, then you'd use an eql list with 'url "/*" eql eqllistname'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure why your have that last ACL that permits everything.  Sort of defeats the purpose of having the ACLs in the first place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should have one ACL that does 'permit any nql privatenets dest content owner/privateurqlrule' then another one that does a deny to everyone else on the same rule fto block access to the private urls.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Follow this up with an ACL that permits what traffic you're going to allow through from the Internet.  I use a generic 'permit tcp any destination VIP-range/length eq http' and another one eq https.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 15 Jul 2007 04:23:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-11500-source-based-access-lists/m-p/801395#M15565</guid>
      <dc:creator>hostmaster</dc:creator>
      <dc:date>2007-07-15T04:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: CSS 11500 source based access lists</title>
      <link>https://community.cisco.com/t5/application-networking/css-11500-source-based-access-lists/m-p/801396#M15566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for responding.&lt;/P&gt;&lt;P&gt;When I started my config, I originally had a list where the first clause allowed an NQL access to a secure directory, the second clause denied access to a secure directory for anyone, and the third clause allowed any source address to access anything, i.e:&lt;/P&gt;&lt;P&gt;acl 10&lt;/P&gt;&lt;P&gt;clause 10 permit any nql "securesite_allowed" destination content mysystem/mysystem_securesite&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clause 30 deny any any destination content mysystem/mysystem_securesite prefer unauthorized_securesite&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clause 99 permit any any destination any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My understanding is that as an ACL is matched top-down, the secure directory would only be accessible to those in the NQL as they would match clause 10, then any other attempts to that site would be denied by clause 30 and they would be redirected to the service unauthorized_securesite.&lt;/P&gt;&lt;P&gt;Then all other traffic to all other sites would be allowed by the final clause 99.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This ACL didn't work, and I didn't see any matches for either clause 10 or 30, only matches on clause 99.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To troubleshoot this, I configured the ACL as shown in the config I provided.  The purpose of the ACL was to not achieve anything except log a hit to a particular content rule (website).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The main issue is that my explicit allow for all users to the content rule "mysystem/mysystem_mycompany_com" in the ACL is not getting logged as a hit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this is clearer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 00:00:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-11500-source-based-access-lists/m-p/801396#M15566</guid>
      <dc:creator>andrew-kearton</dc:creator>
      <dc:date>2007-07-16T00:00:50Z</dc:date>
    </item>
  </channel>
</rss>

