<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACE SSL Pass  in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852159#M16635</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the trace does not match the config you sent.&lt;/P&gt;&lt;P&gt;Can't find the same ip addresses.&lt;/P&gt;&lt;P&gt;In the trace, it is also clear the module is spoofing the HTTPS connection.&lt;/P&gt;&lt;P&gt;Not sure why.&lt;/P&gt;&lt;P&gt;So I would need a 'show tech' to confirm what is  happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also get 'show service-policy &lt;NAME&gt; detail' before and after a connection attempt to see if you hit the right service-policy.&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 17 Feb 2008 12:55:00 GMT</pubDate>
    <dc:creator>Gilles Dufour</dc:creator>
    <dc:date>2008-02-17T12:55:00Z</dc:date>
    <item>
      <title>ACE SSL Pass</title>
      <link>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852155#M16631</link>
      <description>&lt;P&gt;Does the ACE allow HTTPS passthrough?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's what I've tried to do without success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rserver host nuxi&lt;/P&gt;&lt;P&gt;  description TEST SERVER&lt;/P&gt;&lt;P&gt;  ip address 10.10.2.100&lt;/P&gt;&lt;P&gt;  probe ping-probe&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;serverfarm host https-test&lt;/P&gt;&lt;P&gt;  description TEST SERVER FARM&lt;/P&gt;&lt;P&gt;  failaction purge&lt;/P&gt;&lt;P&gt;  predictor leastconns&lt;/P&gt;&lt;P&gt;  probe imap-probe&lt;/P&gt;&lt;P&gt;  rserver nuxi 443&lt;/P&gt;&lt;P&gt;    inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map match-all VIP-HTTPS&lt;/P&gt;&lt;P&gt;  2 match virtual-address 10.10.1.1 tcp eq 443 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type loadbalance first-match HTTPS-POLICY&lt;/P&gt;&lt;P&gt;  class class-default&lt;/P&gt;&lt;P&gt;    serverfarm https-test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map multi-match CLIENT-VIPS&lt;/P&gt;&lt;P&gt;  class VIP-HTTPS&lt;/P&gt;&lt;P&gt;    loadbalance vip inservice&lt;/P&gt;&lt;P&gt;    loadbalance policy HTTPS-POLICY&lt;/P&gt;&lt;P&gt;    loadbalance vip icmp-reply active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Feb 2008 18:12:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852155#M16631</guid>
      <dc:creator>meckel</dc:creator>
      <dc:date>2008-02-14T18:12:24Z</dc:date>
    </item>
    <item>
      <title>Re: ACE SSL Pass</title>
      <link>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852156#M16632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes, ACE allows https to go be loadbalanced without being terminated.&lt;/P&gt;&lt;P&gt;Get a sniffer trace to see what is going on.&lt;/P&gt;&lt;P&gt;Does http work ?&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2008 20:34:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852156#M16632</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2008-02-14T20:34:43Z</dc:date>
    </item>
    <item>
      <title>Re: ACE SSL Pass</title>
      <link>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852157#M16633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gilles,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, HTTP works.  I had a trace but didn't save it.  I thought perhaps it was a bug with the version we are running - 3.0(0)A1(5a).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We reverted everything back to an old LDA and are planning to try with the ACE again soon; this time with SSL termination though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you say it should work, I'll schedule some time to try and make SSL pass through work on our next attempt.  And save the trace.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Milo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2008 22:05:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852157#M16633</guid>
      <dc:creator>meckel</dc:creator>
      <dc:date>2008-02-14T22:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: ACE SSL Pass</title>
      <link>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852158#M16634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gilles,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've attached a trace file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Milo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Feb 2008 23:20:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852158#M16634</guid>
      <dc:creator>meckel</dc:creator>
      <dc:date>2008-02-15T23:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: ACE SSL Pass</title>
      <link>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852159#M16635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the trace does not match the config you sent.&lt;/P&gt;&lt;P&gt;Can't find the same ip addresses.&lt;/P&gt;&lt;P&gt;In the trace, it is also clear the module is spoofing the HTTPS connection.&lt;/P&gt;&lt;P&gt;Not sure why.&lt;/P&gt;&lt;P&gt;So I would need a 'show tech' to confirm what is  happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also get 'show service-policy &lt;NAME&gt; detail' before and after a connection attempt to see if you hit the right service-policy.&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Feb 2008 12:55:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852159#M16635</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2008-02-17T12:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: ACE SSL Pass</title>
      <link>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852160#M16636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gilles,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry about that. It's a production context and complex. Here is the revelent portion of the current config.  The show tech is attached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;probe http sys-stat&lt;/P&gt;&lt;P&gt;  description WEB SERVER PROBE&lt;/P&gt;&lt;P&gt;  faildetect 2&lt;/P&gt;&lt;P&gt;  passdetect count 1&lt;/P&gt;&lt;P&gt;  receive 60&lt;/P&gt;&lt;P&gt;  request method get url /manager/html&lt;/P&gt;&lt;P&gt;  expect status 401 401&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rserver host systemsStatus1-test&lt;/P&gt;&lt;P&gt;  description TEST SYSTEMS STATUS WEB SERVER&lt;/P&gt;&lt;P&gt;  ip address 134.114.6.149&lt;/P&gt;&lt;P&gt;  probe ping-probe&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rserver host systemsStatus2-test&lt;/P&gt;&lt;P&gt;  description TEST SYSTEMS STATUS WEB SERVER&lt;/P&gt;&lt;P&gt;  ip address 134.114.6.150&lt;/P&gt;&lt;P&gt;  probe ping-probe&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;serverfarm host systemsStatus-test&lt;/P&gt;&lt;P&gt;  description TEST SYSTEMS STATUS WEB SERVER FARM&lt;/P&gt;&lt;P&gt;  failaction purge&lt;/P&gt;&lt;P&gt;  predictor leastconns&lt;/P&gt;&lt;P&gt;  probe sys-stat&lt;/P&gt;&lt;P&gt;  retcode 100 500 check count&lt;/P&gt;&lt;P&gt;  rserver systemsStatus1-test&lt;/P&gt;&lt;P&gt;    inservice&lt;/P&gt;&lt;P&gt;  rserver systemsStatus2-test&lt;/P&gt;&lt;P&gt;    inservice&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;sticky ip-netmask 255.255.255.255 address source GROUP_2_TEST&lt;/P&gt;&lt;P&gt;  timeout 480&lt;/P&gt;&lt;P&gt;  replicate sticky&lt;/P&gt;&lt;P&gt;  serverfarm systemsStatus-test&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;policy-map multi-match CLIENT-VIPS&lt;/P&gt;&lt;P&gt; class-map match-all VIP-SYSTAT-HTTP-TEST&lt;/P&gt;&lt;P&gt;   description system status test web server&lt;/P&gt;&lt;P&gt;   2 match virtual-address 134.114.6.148 any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!==========================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ace-its-a/PSOFT# sh service-policy CLIENT-VIPS detail | be VIP-SYSTAT-HTTP-TEST&lt;/P&gt;&lt;P&gt;    class: VIP-SYSTAT-HTTP-TEST&lt;/P&gt;&lt;P&gt;     VIP Address:    Port:&lt;/P&gt;&lt;P&gt;     134.114.6.148   any&lt;/P&gt;&lt;P&gt;      loadbalance:&lt;/P&gt;&lt;P&gt;        L7 loadbalance policy: SYSTAT-HTTP-POLICY-TEST&lt;/P&gt;&lt;P&gt;        VIP Route Metric     : 77&lt;/P&gt;&lt;P&gt;        VIP Route Advertise  : DISABLED&lt;/P&gt;&lt;P&gt;        VIP ICMP Reply       : ENABLED-WHEN-ACTIVE&lt;/P&gt;&lt;P&gt;        VIP State: INSERVICE&lt;/P&gt;&lt;P&gt;        curr conns       : 0         , hit count        : 395       &lt;/P&gt;&lt;P&gt;        dropped conns    : 379       &lt;/P&gt;&lt;P&gt;        client pkt count : 1325      , client byte count: 109445              &lt;/P&gt;&lt;P&gt;        server pkt count : 1357      , server byte count: 781489              &lt;/P&gt;&lt;P&gt;        L7 Loadbalance policy : SYSTAT-HTTP-POLICY-TEST&lt;/P&gt;&lt;P&gt;          class/match : class-default&lt;/P&gt;&lt;P&gt;            LB action : &lt;/P&gt;&lt;P&gt;               -&lt;/P&gt;&lt;P&gt;            hit count        : 392       &lt;/P&gt;&lt;P&gt;            dropped conns    : 376       &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Feb 2008 15:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852160#M16636</guid>
      <dc:creator>meckel</dc:creator>
      <dc:date>2008-02-18T15:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: ACE SSL Pass</title>
      <link>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852161#M16637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the problem is this line :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;retcode 100 500 check count &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because of that, you need to use the serverfarm only for http as the ace module will interpret all traffic as http in order to detect the retcode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create another serverfarm and rule for https or remove the retcode line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Feb 2008 16:38:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852161#M16637</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2008-02-18T16:38:51Z</dc:date>
    </item>
    <item>
      <title>Re: ACE SSL Pass</title>
      <link>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852162#M16638</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gilles,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No Sh--!!  Yup, removing that line from the serverfarm fixed it.  That's a nice way to start a Monday!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Milo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Feb 2008 16:59:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-ssl-pass/m-p/852162#M16638</guid>
      <dc:creator>meckel</dc:creator>
      <dc:date>2008-02-18T16:59:01Z</dc:date>
    </item>
  </channel>
</rss>

