<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL persistence using a port other than 443? in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/ssl-persistence-using-a-port-other-than-443/m-p/151469#M1827</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks,  That is what I ended up doing.  It would be nice to perform an actual GET of a page.  Sometimes our applications will hang, but the tcp port will still be listening.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 11 Dec 2002 03:37:49 GMT</pubDate>
    <dc:creator>clayton-price</dc:creator>
    <dc:date>2002-12-11T03:37:49Z</dc:date>
    <item>
      <title>SSL persistence using a port other than 443?</title>
      <link>https://community.cisco.com/t5/application-networking/ssl-persistence-using-a-port-other-than-443/m-p/151465#M1823</link>
      <description>&lt;P&gt;I figure this would work, but am looking for some confirmation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Clayton&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2002 18:45:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ssl-persistence-using-a-port-other-than-443/m-p/151465#M1823</guid>
      <dc:creator>clayton-price</dc:creator>
      <dc:date>2002-12-04T18:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: SSL persistence using a port other than 443?</title>
      <link>https://community.cisco.com/t5/application-networking/ssl-persistence-using-a-port-other-than-443/m-p/151466#M1824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is from a Cisco documentation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Clients send encrypted traffic on port 443, the standard SSL port. The CSM listens on port 443 and load balances the encrypted traffic to an internal "server farm" of SSL modules. The selected SSL Service Module decrypts the traffic, stamps it with a SSL Session ID, opens a clear-text connection to a Versatile Interface Processor (VIP) on the CSM, and sends the traffic to a port that has been configured to receive "decrypted SSL traffic", for examples port 81.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Dec 2002 20:14:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ssl-persistence-using-a-port-other-than-443/m-p/151466#M1824</guid>
      <dc:creator>r-simpson</dc:creator>
      <dc:date>2002-12-10T20:14:26Z</dc:date>
    </item>
    <item>
      <title>Re: SSL persistence using a port other than 443?</title>
      <link>https://community.cisco.com/t5/application-networking/ssl-persistence-using-a-port-other-than-443/m-p/151467#M1825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, however in our case we are not using the SSL module.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have since ruled out using ssl persistence due to Internet Explorer renegoting the SSL session ID every two minutes.  This would break the persistence.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do have a new question.  I have not had any luck doing a keepalive check against an https port.  I see that there is keepalive http, but no keepalive https.  The standard http one fails against ssl enabled ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Dec 2002 20:59:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ssl-persistence-using-a-port-other-than-443/m-p/151467#M1825</guid>
      <dc:creator>clayton-price</dc:creator>
      <dc:date>2002-12-10T20:59:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSL persistence using a port other than 443?</title>
      <link>https://community.cisco.com/t5/application-networking/ssl-persistence-using-a-port-other-than-443/m-p/151468#M1826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An option to do SSL keepalive may be to use a TCP based keepalive on port 443.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2002 01:55:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ssl-persistence-using-a-port-other-than-443/m-p/151468#M1826</guid>
      <dc:creator>bhose</dc:creator>
      <dc:date>2002-12-11T01:55:33Z</dc:date>
    </item>
    <item>
      <title>Re: SSL persistence using a port other than 443?</title>
      <link>https://community.cisco.com/t5/application-networking/ssl-persistence-using-a-port-other-than-443/m-p/151469#M1827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks,  That is what I ended up doing.  It would be nice to perform an actual GET of a page.  Sometimes our applications will hang, but the tcp port will still be listening.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2002 03:37:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ssl-persistence-using-a-port-other-than-443/m-p/151469#M1827</guid>
      <dc:creator>clayton-price</dc:creator>
      <dc:date>2002-12-11T03:37:49Z</dc:date>
    </item>
  </channel>
</rss>

