<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: loadbalancing SSL on CSS in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138652#M23536</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dario,&lt;/P&gt;&lt;P&gt;the customer removed ACL on the L3 device, but LB is not functional again:-( The config is same. I'm sending you the trace between client (192.168.110.133) - CSS (192.168.110.129) = Visit_in and CSS(192.168.110.129) - servers (192.168.110.162 and .163) = Visit_out. The file 3750_090505_4a.log is log from the DG for servers (192.168.110.158). There is only one ACL in out direction which permits all traffic between 192.168.110.128/27 (VIP) a 192.168.110.160/27 (servers) Thank you for your help. Roman&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 06 May 2009 10:47:15 GMT</pubDate>
    <dc:creator>ROMAN TOMASEK</dc:creator>
    <dc:date>2009-05-06T10:47:15Z</dc:date>
    <item>
      <title>loadbalancing SSL on CSS</title>
      <link>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138640#M23524</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;the customer has to loadbalance SSL traffic which is terminated on servers port 8001. But the clients need to communicate on port 443. So the customer provide the following configuration, but it isn't work. Does anybody know where is a problem? Thank you.&lt;/P&gt;&lt;P&gt;Roman&lt;/P&gt;&lt;P&gt;*************************** GLOBAL ***************************  ip route 0.0.0.0 0.0.0.0 192.168.110.158 1&lt;/P&gt;&lt;P&gt;************************* INTERFACE ************************* interface e1&lt;/P&gt;&lt;P&gt;  description "public-test VIP"&lt;/P&gt;&lt;P&gt;  bridge vlan 56&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface e2&lt;/P&gt;&lt;P&gt;  description "intra-test"&lt;/P&gt;&lt;P&gt;  bridge vlan 57&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!************************** CIRCUIT ************************** circuit VLAN56&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  ip address 192.168.110.131 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;circuit VLAN57&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  ip address 192.168.110.161 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!************************** SERVICE ************************** service webt1&lt;/P&gt;&lt;P&gt;  ip address 192.168.110.162&lt;/P&gt;&lt;P&gt;  protocol tcp&lt;/P&gt;&lt;P&gt;  port 8001&lt;/P&gt;&lt;P&gt;  keepalive type tcp&lt;/P&gt;&lt;P&gt;  keepalive port 8001&lt;/P&gt;&lt;P&gt;  active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service webt2&lt;/P&gt;&lt;P&gt;  ip address 192.168.110.163&lt;/P&gt;&lt;P&gt;  protocol tcp&lt;/P&gt;&lt;P&gt;  port 8001&lt;/P&gt;&lt;P&gt;  keepalive type tcp&lt;/P&gt;&lt;P&gt;  keepalive port 8001&lt;/P&gt;&lt;P&gt;  active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!*************************** OWNER *************************** owner VIST&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  content webt&lt;/P&gt;&lt;P&gt;    add service webt1&lt;/P&gt;&lt;P&gt;    add service webt2&lt;/P&gt;&lt;P&gt;    protocol tcp&lt;/P&gt;&lt;P&gt;    port 443&lt;/P&gt;&lt;P&gt;    url "/*"&lt;/P&gt;&lt;P&gt;    vip address 192.168.110.129&lt;/P&gt;&lt;P&gt;    application ssl&lt;/P&gt;&lt;P&gt;    advanced-balance ssl&lt;/P&gt;&lt;P&gt;    active&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2009 06:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138640#M23524</guid>
      <dc:creator>ROMAN TOMASEK</dc:creator>
      <dc:date>2009-04-20T06:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: loadbalancing SSL on CSS</title>
      <link>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138641#M23525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here you find an example of an SSL configuration on a CSS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/css11500series/v7.50/configuration/ssl/guide/examples.html#wp998891" target="_blank"&gt;http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/css11500series/v7.50/configuration/ssl/guide/examples.html#wp998891&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The example was found in the SSL configuration guide, which can be found here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/css11500series/v7.50/configuration/ssl/guide/sslgd.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/css11500series/v7.50/configuration/ssl/guide/sslgd.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If any more specific questions on how to solve this, post them!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Dario&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Apr 2009 07:08:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138641#M23525</guid>
      <dc:creator>dario.didio</dc:creator>
      <dc:date>2009-04-20T07:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: loadbalancing SSL on CSS</title>
      <link>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138642#M23526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Dario,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the customer has no SSL module. The CSS doesn't encrypt/decrypt traffic. The CSS will be transparent for SSL. Only PAT will be provided.&lt;/P&gt;&lt;P&gt;Client - VIP + 443 - CSS - server's IP address + 8001&lt;/P&gt;&lt;P&gt;The examples, which you sent me, are with the SSL module (back-end SSL, end-to-end SSL - with encryption and decryption on CSS, termination of SSL on CSS):-(. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Apr 2009 07:18:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138642#M23526</guid>
      <dc:creator>ROMAN TOMASEK</dc:creator>
      <dc:date>2009-04-20T07:18:08Z</dc:date>
    </item>
    <item>
      <title>Re: loadbalancing SSL on CSS</title>
      <link>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138643#M23527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;misread your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you should configure your content rule like a normal L4 content rule, without the ssl config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;content webt&lt;/P&gt;&lt;P&gt;add service webt1&lt;/P&gt;&lt;P&gt;add service webt2&lt;/P&gt;&lt;P&gt;protocol tcp&lt;/P&gt;&lt;P&gt;port 443&lt;/P&gt;&lt;P&gt;vip address 192.168.110.129&lt;/P&gt;&lt;P&gt;active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Dario&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Apr 2009 07:23:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138643#M23527</guid>
      <dc:creator>dario.didio</dc:creator>
      <dc:date>2009-04-20T07:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: loadbalancing SSL on CSS</title>
      <link>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138644#M23528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the customer tried your config, but without success. He had to add url into content rule (so he had to create L7 rule again) for seeing some session from client. The status of the LB is following:&lt;/P&gt;&lt;P&gt;the client sent SYN packet on port 443, this SYN packet arived into server on port 8001, the server responsed with SYN, ACK, the client responsed with ACK and then ACK RST:-(I don't know why RST is sent;-(&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Apr 2009 11:04:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138644#M23528</guid>
      <dc:creator>ROMAN TOMASEK</dc:creator>
      <dc:date>2009-04-21T11:04:56Z</dc:date>
    </item>
    <item>
      <title>Re: loadbalancing SSL on CSS</title>
      <link>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138645#M23529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can't use a L7 rule because the packet is encrypted. that's why you need to use a L4 rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post your adapted config of the content rule? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try sniffing infront and behind you LB.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the packets in front should point to port 443 (destination port towards the LB, source port towards the client), and the packets behind should point to port 8001(destination port towards the server, source port towards the LB). &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Apr 2009 11:19:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138645#M23529</guid>
      <dc:creator>dario.didio</dc:creator>
      <dc:date>2009-04-21T11:19:35Z</dc:date>
    </item>
    <item>
      <title>Re: loadbalancing SSL on CSS</title>
      <link>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138646#M23530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;te customer again tried the L3 rule:&lt;/P&gt;&lt;P&gt;!*************************** GLOBAL&lt;/P&gt;&lt;P&gt;  ip route 0.0.0.0 0.0.0.0 192.168.110.158 1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!************************* INTERFACE interface e1&lt;/P&gt;&lt;P&gt;  description "public-test VIP" &lt;/P&gt;&lt;P&gt;  bridge vlan 56 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface e2&lt;/P&gt;&lt;P&gt;  description "intra-test" &lt;/P&gt;&lt;P&gt;  bridge vlan 57 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!************************** CIRCUIT circuit VLAN56&lt;/P&gt;&lt;P&gt;ip address 192.168.110.131 255.255.255.224 &lt;/P&gt;&lt;P&gt;circuit VLAN57    &lt;/P&gt;&lt;P&gt;ip address 192.168.110.161 255.255.255.224 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!************************** SERVICE  service webt1&lt;/P&gt;&lt;P&gt;  ip address 192.168.110.162&lt;/P&gt;&lt;P&gt;  protocol tcp&lt;/P&gt;&lt;P&gt;  port 8001&lt;/P&gt;&lt;P&gt;  keepalive port 8001&lt;/P&gt;&lt;P&gt;  keepalive type tcp&lt;/P&gt;&lt;P&gt;  active &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service webt2&lt;/P&gt;&lt;P&gt;  ip address 192.168.110.163&lt;/P&gt;&lt;P&gt;  protocol tcp&lt;/P&gt;&lt;P&gt;  port 8001&lt;/P&gt;&lt;P&gt;  keepalive port 8001&lt;/P&gt;&lt;P&gt;  keepalive type tcp&lt;/P&gt;&lt;P&gt;  active &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!*************************** OWNER  owner VIST &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  content webt &lt;/P&gt;&lt;P&gt;    add service webt1 &lt;/P&gt;&lt;P&gt;    add service webt2 &lt;/P&gt;&lt;P&gt;    vip address 192.168.110.129 &lt;/P&gt;&lt;P&gt;    protocol tcp &lt;/P&gt;&lt;P&gt;    port 443 &lt;/P&gt;&lt;P&gt;    active &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!*************************** GROUP  group serverst&lt;/P&gt;&lt;P&gt;  vip address 192.168.110.129&lt;/P&gt;&lt;P&gt;  add destination service webt1&lt;/P&gt;&lt;P&gt;  add destination service webt2&lt;/P&gt;&lt;P&gt;  active &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but the communication between the client (192.168.110.133) and the server throught CSS didn't work:-( I'm sending you the output from sniffer between client and CSS (vist11_in) - here are seen only SYN packets:-( And I'm sending you the output from tcpdump between CSS and server (vist11_out) - here are not seen some client traffic:-(&lt;/P&gt;&lt;P&gt;I don't know why it doesn't work:-( Thank you. Roman.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Apr 2009 12:00:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138646#M23530</guid>
      <dc:creator>ROMAN TOMASEK</dc:creator>
      <dc:date>2009-04-22T12:00:55Z</dc:date>
    </item>
    <item>
      <title>Re: loadbalancing SSL on CSS</title>
      <link>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138647#M23531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;why are you doing destination NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By using the group and adding the services as destination service, your packet goes through the CSS and is being source nat. This means that the client IP is replaced by the VIP address as source address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in your TCPdump you see this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;08:52:07.701022 IP 192.168.110.129.blackboard &amp;gt; 192.168.110.163.vcom-tunnel: S 3900452246:3900452246(0) win 65535 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the CSS connecting to server @.163.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here you see the reply from your server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;08:52:07.703198 IP 192.168.110.163.vcom-tunnel &amp;gt; 192.168.110.129.blackboard: S 3688339573:3688339573(0) ack 3900452247 win 5840 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And immediatly you see this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;08:52:07.706426 IP 192.168.110.190 &amp;gt; 192.168.110.163: ICMP host 192.168.110.129 unreachable - admin prohibited filter, length 36&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;which indicates that address 192.168.110.129 is unreachable - admin prohibited filter, I assume an ACL or something like that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is whats happening and causing your problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Dario&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Apr 2009 12:35:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138647#M23531</guid>
      <dc:creator>dario.didio</dc:creator>
      <dc:date>2009-04-22T12:35:49Z</dc:date>
    </item>
    <item>
      <title>Re: loadbalancing SSL on CSS</title>
      <link>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138648#M23532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;thank you for your explanation. The customer uses source NAT, because the servers have default GW on L3 switch. So there is one arm mode design. &lt;/P&gt;&lt;P&gt;The connection between CSS and servers is throught L2 switch, so the communication from the server to the VIP address is in the same network segment. So the communication is only throught L2 switch and there is not any ACL:-( So I don't know why the response to client is prohibited. There is no filter on the path between CSS and servers. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Apr 2009 10:16:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138648#M23532</guid>
      <dc:creator>ROMAN TOMASEK</dc:creator>
      <dc:date>2009-04-23T10:16:47Z</dc:date>
    </item>
    <item>
      <title>Re: loadbalancing SSL on CSS</title>
      <link>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138649#M23533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then your IP subnetting is not correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your VIP is 192.168.110.129, which belongs to VLAN56, which is in the subnet 192.168.110.128/27 (host addresses between 192.168.110.129 - 158).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your servers have IP addresses 192.168.110.162 - 3, in VLAN57 with subnet 192.168.110.160/27 (host addresses 192.168.110.161 - 190).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;your config reflects a routed mode design (has an IP address in client VLAN and IP Address in server VLAN) and your servers should have the CSS as default gateway. In a one armed mode design, your CSS only has 1 IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Dario&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Apr 2009 10:38:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138649#M23533</guid>
      <dc:creator>dario.didio</dc:creator>
      <dc:date>2009-04-23T10:38:41Z</dc:date>
    </item>
    <item>
      <title>Re: loadbalancing SSL on CSS</title>
      <link>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138650#M23534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dario,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you are right.:-) I'm blind. So there are two subnets - so the comunnication is routed on the DG (L3 switch). So I will ask the customer about ACL or some filters configuration on this l3 device. Thank you!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Apr 2009 10:53:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138650#M23534</guid>
      <dc:creator>ROMAN TOMASEK</dc:creator>
      <dc:date>2009-04-23T10:53:07Z</dc:date>
    </item>
    <item>
      <title>Re: loadbalancing SSL on CSS</title>
      <link>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138651#M23535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;keep us posted if this was causing your problem and if it is resolved.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Apr 2009 11:02:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138651#M23535</guid>
      <dc:creator>dario.didio</dc:creator>
      <dc:date>2009-04-23T11:02:47Z</dc:date>
    </item>
    <item>
      <title>Re: loadbalancing SSL on CSS</title>
      <link>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138652#M23536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dario,&lt;/P&gt;&lt;P&gt;the customer removed ACL on the L3 device, but LB is not functional again:-( The config is same. I'm sending you the trace between client (192.168.110.133) - CSS (192.168.110.129) = Visit_in and CSS(192.168.110.129) - servers (192.168.110.162 and .163) = Visit_out. The file 3750_090505_4a.log is log from the DG for servers (192.168.110.158). There is only one ACL in out direction which permits all traffic between 192.168.110.128/27 (VIP) a 192.168.110.160/27 (servers) Thank you for your help. Roman&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 May 2009 10:47:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138652#M23536</guid>
      <dc:creator>ROMAN TOMASEK</dc:creator>
      <dc:date>2009-05-06T10:47:15Z</dc:date>
    </item>
    <item>
      <title>Re: loadbalancing SSL on CSS</title>
      <link>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138653#M23537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Note, you should still have the ff in your rule:&lt;/P&gt;&lt;P&gt;application ssl&lt;/P&gt;&lt;P&gt;advanced-balance ssl &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need SSL sticky for the session.  Just no URL command since the CSS can't do a L5 rule with SSL.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 May 2009 08:28:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/loadbalancing-ssl-on-css/m-p/1138653#M23537</guid>
      <dc:creator>hostmaster</dc:creator>
      <dc:date>2009-05-15T08:28:33Z</dc:date>
    </item>
  </channel>
</rss>

