<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Source Groups in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/source-groups/m-p/205629#M2705</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pete,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you point me to the doc that shows this as a requirement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will be migrating my CSS's to a L3 configuration (The CSS as default gateway for the web pool) soon and this could throw a big wrench in my plans.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way I interpreted the documentation is that I would only need source groups if I want the servers to appear as one IP address to the rest of the network, or if I need to translate their private address to a public.  We do our private/public NAT on a firewall, so I have no public addressing on the CSS itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My (perhaps incorrect?) assumption is that the CSS will just route any and all IP traffic normally between interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Dominic&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 31 Jul 2003 12:17:01 GMT</pubDate>
    <dc:creator>d.parks</dc:creator>
    <dc:date>2003-07-31T12:17:01Z</dc:date>
    <item>
      <title>Source Groups</title>
      <link>https://community.cisco.com/t5/application-networking/source-groups/m-p/205624#M2700</link>
      <description>&lt;P&gt;I have a question regarding source groups used to allow servers behind the Content Switch to initiate connections to the outside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand the concept of creating a source group and adding the services (servers) that will be included within it, and also giving this a VIP address to be used as the source IP for the services connection to the outside world. A content rule is then created for these connections using the same VIP and services as referenced in the source group configuration. It is at this point I have a question regarding the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I have to specify, in the content rule, what protocol and port the services will be using? For instance if I want the servers to be able to make DNS queries, do ftp file transfers, and contact a database is it required that I configure a seperate content rule for each type of connection, or can I make one content rule without specifying what protocol and port to be used, and this would suffice for all types of connections the services try to initiate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any help provided.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jul 2003 21:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/source-groups/m-p/205624#M2700</guid>
      <dc:creator>JHaynes4</dc:creator>
      <dc:date>2003-07-30T21:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: Source Groups</title>
      <link>https://community.cisco.com/t5/application-networking/source-groups/m-p/205625#M2701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You shouldn't need source groups for your servers to initiate connections to the outside world unless you want or need all the traffic to appear as it is coming from a VIP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do want to use a group, I don't think you need a content rule, but I've never used a group in this way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally, I've used groups to NAT traffic in the other direction (from the client), in one-armed configurations to force the correct return path from the server back to the client.  In this configuration, I add destination services to the group to instruct the CSS as to which traffic it should NAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jul 2003 21:20:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/source-groups/m-p/205625#M2701</guid>
      <dc:creator>d.parks</dc:creator>
      <dc:date>2003-07-30T21:20:12Z</dc:date>
    </item>
    <item>
      <title>Re: Source Groups</title>
      <link>https://community.cisco.com/t5/application-networking/source-groups/m-p/205626#M2702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dominic,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the quick reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What method are you using in order for the servers to initiate connections to the outside? The CSS Basic Guide book uses Source Groups as the method. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As things stand now, the servers are not able to contact outside devices by initiating the connection. They work for connections initiated on  the outside to the VIP we use for them, but not in the reverse. The connections appear to die at the Content Switch when initiated from the inside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jul 2003 23:13:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/source-groups/m-p/205626#M2702</guid>
      <dc:creator>JHaynes4</dc:creator>
      <dc:date>2003-07-30T23:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: Source Groups</title>
      <link>https://community.cisco.com/t5/application-networking/source-groups/m-p/205627#M2703</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will in fact need to use the source groups in the manner you describe and will need the content rule, however, you could potentially just have the content rule as an L3 rule with just the services and vip address and not specify the protocol or port and leave it wide open.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Pete Knoops&lt;/P&gt;&lt;P&gt;Cisco TAC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jul 2003 01:09:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/source-groups/m-p/205627#M2703</guid>
      <dc:creator>pknoops</dc:creator>
      <dc:date>2003-07-31T01:09:08Z</dc:date>
    </item>
    <item>
      <title>Re: Source Groups</title>
      <link>https://community.cisco.com/t5/application-networking/source-groups/m-p/205628#M2704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pete,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's what I was thinking. Thanks for the clarification. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jul 2003 12:00:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/source-groups/m-p/205628#M2704</guid>
      <dc:creator>JHaynes4</dc:creator>
      <dc:date>2003-07-31T12:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: Source Groups</title>
      <link>https://community.cisco.com/t5/application-networking/source-groups/m-p/205629#M2705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pete,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you point me to the doc that shows this as a requirement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will be migrating my CSS's to a L3 configuration (The CSS as default gateway for the web pool) soon and this could throw a big wrench in my plans.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way I interpreted the documentation is that I would only need source groups if I want the servers to appear as one IP address to the rest of the network, or if I need to translate their private address to a public.  We do our private/public NAT on a firewall, so I have no public addressing on the CSS itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My (perhaps incorrect?) assumption is that the CSS will just route any and all IP traffic normally between interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Dominic&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jul 2003 12:17:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/source-groups/m-p/205629#M2705</guid>
      <dc:creator>d.parks</dc:creator>
      <dc:date>2003-07-31T12:17:01Z</dc:date>
    </item>
    <item>
      <title>Re: Source Groups</title>
      <link>https://community.cisco.com/t5/application-networking/source-groups/m-p/205630#M2706</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dominic,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure there is one. The assumption I make here is that the servers and vips are on different networks. If they are on the same network, then you probably don't need to do this. It becomes an issue when the vip (public) and servers (private) are setup in this manner. Specifically, the packet leaving the server through the CSS goes out. On the return, the packet hits the upstream router and does not have a path back to the CSS as the router (in most cases) is only sending VIP destined traffic to the CSS which is why we would NAT the server request to the VIP. If the upstream router has a static route with the servers network with a next hop of the CSS, then maybe this is not necessary&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pete..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jul 2003 12:51:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/source-groups/m-p/205630#M2706</guid>
      <dc:creator>pknoops</dc:creator>
      <dc:date>2003-07-31T12:51:15Z</dc:date>
    </item>
    <item>
      <title>Re: Source Groups</title>
      <link>https://community.cisco.com/t5/application-networking/source-groups/m-p/205631#M2707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pete,&lt;/P&gt;&lt;P&gt;The configuration task in Basic Configuration Guide(7.20) requires configuring "add service" or "add destination service" in source group(Step 3). However, I saw the following source group configuration from a production network, how does it work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!*************************** GROUP ***************************&lt;/P&gt;&lt;P&gt;group out1&lt;/P&gt;&lt;P&gt;  vip address 142.146.232.70&lt;/P&gt;&lt;P&gt;  active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group out2&lt;/P&gt;&lt;P&gt;  vip address 142.146.232.72&lt;/P&gt;&lt;P&gt;  active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group out3&lt;/P&gt;&lt;P&gt;  vip address 142.146.232.74&lt;/P&gt;&lt;P&gt;  active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group out4&lt;/P&gt;&lt;P&gt;  vip address 142.146.232.76&lt;/P&gt;&lt;P&gt;  active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group out5&lt;/P&gt;&lt;P&gt;  vip address 142.146.232.78&lt;/P&gt;&lt;P&gt;  active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group out6&lt;/P&gt;&lt;P&gt;  vip address 142.146.232.80&lt;/P&gt;&lt;P&gt;  active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group out7&lt;/P&gt;&lt;P&gt;  vip address 142.146.232.82&lt;/P&gt;&lt;P&gt;  active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group out8&lt;/P&gt;&lt;P&gt;  vip address 142.146.232.84&lt;/P&gt;&lt;P&gt;  active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group out9&lt;/P&gt;&lt;P&gt;  vip address 142.146.232.88&lt;/P&gt;&lt;P&gt;  active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!**************************** ACL ****************************&lt;/P&gt;&lt;P&gt;acl 1&lt;/P&gt;&lt;P&gt;  ......  &lt;/P&gt;&lt;P&gt;  clause 4 permit icmp 10.0.0.0 255.224.0.0 destination any sourcegroup out1&lt;/P&gt;&lt;P&gt;  clause 5 permit any 10.0.0.0 255.224.0.0 destination any sourcegroup out1&lt;/P&gt;&lt;P&gt;  clause 6 permit icmp 10.32.0.0 255.224.0.0 destination any sourcegroup out2&lt;/P&gt;&lt;P&gt;  clause 7 permit any 10.32.0.0 255.224.0.0 destination any sourcegroup out2&lt;/P&gt;&lt;P&gt;  clause 8 permit icmp 10.64.0.0 255.224.0.0 destination any sourcegroup out3&lt;/P&gt;&lt;P&gt;  clause 9 permit any 10.64.0.0 255.224.0.0 destination any sourcegroup out3&lt;/P&gt;&lt;P&gt;  clause 10 permit icmp 10.96.0.0 255.224.0.0 destination any sourcegroup out4&lt;/P&gt;&lt;P&gt;  clause 11 permit any 10.96.0.0 255.224.0.0 destination any sourcegroup out4&lt;/P&gt;&lt;P&gt;  clause 12 permit icmp 10.128.0.0 255.224.0.0 destination any sourcegroup out5&lt;/P&gt;&lt;P&gt;  clause 13 permit any 10.128.0.0 255.224.0.0 destination any sourcegroup out5&lt;/P&gt;&lt;P&gt;  clause 14 permit icmp 10.160.0.0 255.224.0.0 destination any sourcegroup out6&lt;/P&gt;&lt;P&gt;  clause 15 permit any 10.160.0.0 255.224.0.0 destination any sourcegroup out6&lt;/P&gt;&lt;P&gt;  clause 16 permit icmp 10.192.0.0 255.224.0.0 destination any sourcegroup out7&lt;/P&gt;&lt;P&gt;  clause 17 permit any 10.192.0.0 255.224.0.0 destination any sourcegroup out7&lt;/P&gt;&lt;P&gt;  clause 18 permit icmp 10.224.0.0 255.224.0.0 destination any sourcegroup out8&lt;/P&gt;&lt;P&gt;  clause 19 permit any 10.224.0.0 255.224.0.0 destination any sourcegroup out8&lt;/P&gt;&lt;P&gt;  clause 20 permit icmp 142.146.0.0 255.255.0.0 destination any sourcegroup out9&lt;/P&gt;&lt;P&gt;  clause 21 permit any 142.146.0.0 255.255.0.0 destination any sourcegroup out9&lt;/P&gt;&lt;P&gt;  clause 22 permit icmp 172.16.0.0 255.240.0.0 destination any sourcegroup out9&lt;/P&gt;&lt;P&gt;  clause 23 permit any 172.16.0.0 255.240.0.0 destination any sourcegroup out9&lt;/P&gt;&lt;P&gt;  clause 24 permit icmp 192.168.0.0 255.255.0.0 destination any sourcegroup out9&lt;/P&gt;&lt;P&gt;  clause 25 permit any 192.168.0.0 255.255.0.0 destination any sourcegroup out9&lt;/P&gt;&lt;P&gt;  clause 30 permit icmp 192.219.100.0 255.255.255.0 destination any sourcegroup out9&lt;/P&gt;&lt;P&gt;  clause 31 permit any 192.219.100.0 255.255.255.0 destination any sourcegroup out9&lt;/P&gt;&lt;P&gt;  apply circuit-(VLAN300)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you please clarify me.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Richard&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jul 2003 18:12:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/source-groups/m-p/205631#M2707</guid>
      <dc:creator>rlu</dc:creator>
      <dc:date>2003-07-31T18:12:14Z</dc:date>
    </item>
    <item>
      <title>Re: Source Groups</title>
      <link>https://community.cisco.com/t5/application-networking/source-groups/m-p/205632#M2708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Richard,&lt;/P&gt;&lt;P&gt;this is the other way to do NAT (refer to &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/partner/products/hw/contnetw/ps789/products_configuration_example09186a008009470e.shtml" target="_blank"&gt;http://www.cisco.com/en/US/partner/products/hw/contnetw/ps789/products_configuration_example09186a008009470e.shtml&lt;/A&gt;) The only bad thing on this method is, that you have to apply acls on all circuits even if a permit any any is necessary as enabling acls stops all traffic from getting forward except the circutis you applied a acl. I would prefer the earlier described method if I won't have to do traffic filtering on the CSS. Another aspect is the bypassing. Afaik bypassing NAT is not possible with add destination service. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;  Joerg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2003 08:03:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/source-groups/m-p/205632#M2708</guid>
      <dc:creator>jfoerster</dc:creator>
      <dc:date>2003-08-01T08:03:28Z</dc:date>
    </item>
    <item>
      <title>Re: Source Groups</title>
      <link>https://community.cisco.com/t5/application-networking/source-groups/m-p/205633#M2709</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Excellent,&lt;/P&gt;&lt;P&gt;Thanks Joerg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Richard&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2003 12:34:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/source-groups/m-p/205633#M2709</guid>
      <dc:creator>rlu</dc:creator>
      <dc:date>2003-08-01T12:34:23Z</dc:date>
    </item>
  </channel>
</rss>

