<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Informations on SSL end to end on ACE module in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/informations-on-ssl-end-to-end-on-ace-module/m-p/1441859#M29964</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, thank you very much for the insights &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Aug 2010 18:03:44 GMT</pubDate>
    <dc:creator>silk</dc:creator>
    <dc:date>2010-08-10T18:03:44Z</dc:date>
    <item>
      <title>Informations on SSL end to end on ACE module</title>
      <link>https://community.cisco.com/t5/application-networking/informations-on-ssl-end-to-end-on-ace-module/m-p/1441855#M29960</link>
      <description>&lt;P&gt;Hello there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd like to know how the ACE modules handles the traffic re-encrypted and sent to the servers in a SSL end to end scenario.&lt;/P&gt;&lt;P&gt;What I mean is:&lt;/P&gt;&lt;P&gt;the ACE terminates SSL requests for the clients and then encrypts the traffic to load balanced servers.. how is this handled?&lt;/P&gt;&lt;P&gt;Do the ACE initiates a one-to- one client-server encrypted connection or could it establish and&lt;/P&gt;&lt;P&gt;maintain a sort of ssl tunnels to the servers? (keeping the sessions low in number)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did some research but no precise info could be found.&lt;/P&gt;&lt;P&gt;Any information would be apreciated.&lt;/P&gt;&lt;P&gt;Thanks &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Aug 2010 12:48:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/informations-on-ssl-end-to-end-on-ace-module/m-p/1441855#M29960</guid>
      <dc:creator>silk</dc:creator>
      <dc:date>2010-08-09T12:48:18Z</dc:date>
    </item>
    <item>
      <title>Re: Informations on SSL end to end on ACE module</title>
      <link>https://community.cisco.com/t5/application-networking/informations-on-ssl-end-to-end-on-ace-module/m-p/1441856#M29961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Silk,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;End to End SSL is one to one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is an example of how you set it up:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;parameter-map type ssl PARAMMAP_SSL&lt;BR /&gt;&amp;nbsp; version TLS1&lt;BR /&gt;&amp;nbsp; rehandshake enabled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rserver host Server1&lt;BR /&gt;&amp;nbsp; ip address 172.16.35.1&lt;BR /&gt;&amp;nbsp; inservice&lt;BR /&gt;rserver host Server2&lt;BR /&gt;&amp;nbsp; ip address 172.16.35.2&lt;BR /&gt;&amp;nbsp; inservice&lt;BR /&gt;server host Server3&lt;BR /&gt;&amp;nbsp; ip address 172.16.35.3&lt;BR /&gt;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;serverfarm host SSLFARM&lt;BR /&gt;&amp;nbsp; rserver Server1 443&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;&amp;nbsp; rserver Server2 443&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;&amp;nbsp; rserver Server3 443&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssl-proxy service SSLTerm&lt;BR /&gt;&amp;nbsp; key key&lt;BR /&gt;&amp;nbsp; cert certificate&lt;BR /&gt;ssl-proxy service SSLInit&lt;BR /&gt;&amp;nbsp; ssl advanced-options PARAMMAP_SSL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map match-all SSLVIP&lt;BR /&gt;&amp;nbsp; 2 match source-address 172.16.36.50 255.255.255.255 tcp eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type loadbalance first-match SSLPolicy&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm SSLFARM&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ssl-proxy client SSLInit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map multi-match ALL&lt;BR /&gt;&amp;nbsp; class SSLVIP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy SSLPolicy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip icmp-reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ssl-proxy server SSLTerm&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Chris Higgins&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Aug 2010 23:13:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/informations-on-ssl-end-to-end-on-ace-module/m-p/1441856#M29961</guid>
      <dc:creator>chrhiggi</dc:creator>
      <dc:date>2010-08-09T23:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: Informations on SSL end to end on ACE module</title>
      <link>https://community.cisco.com/t5/application-networking/informations-on-ssl-end-to-end-on-ace-module/m-p/1441857#M29962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;gt; End to End SSL is one to one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...so I get no real server offloading with this scenario? Can't the ACE de/multiplex sessions?&lt;/P&gt;&lt;P&gt;(I don't really need configurations, just tech capability news)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT: I think what I need is the TCP Reuse feature, could it&amp;nbsp; reuse SSL connections&lt;/P&gt;&lt;P&gt;initiated from the ACE to the servers (in the ssl end to end environment)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Aug 2010 05:24:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/informations-on-ssl-end-to-end-on-ace-module/m-p/1441857#M29962</guid>
      <dc:creator>silk</dc:creator>
      <dc:date>2010-08-10T05:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: Informations on SSL end to end on ACE module</title>
      <link>https://community.cisco.com/t5/application-networking/informations-on-ssl-end-to-end-on-ace-module/m-p/1441858#M29963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Silk-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; The "TCP Server Reuse" feature is what you are describing. It is documented here:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/vA2_3_0/configuration/slb/guide/classlb.html#wpmkr1076809"&gt;http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/vA2_3_0/configuration/slb/guide/classlb.html#wpmkr1076809&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing to understand - TCP reuse does not allow more than one client to use a&amp;nbsp;&amp;nbsp; connection in the same moment of time.&amp;nbsp; A single client makes a connection on the front end, a connection is made on the&amp;nbsp;&amp;nbsp; as well.&amp;nbsp; After the client sends a FIN or RST, ACE closes the connection on the front end and leaves the connection open on the&amp;nbsp; . It builds a pool of connections that it keeps open with TCP-Keepalives.&lt;/P&gt;&lt;P&gt;&amp;nbsp; When a new client connection comes in, ACE tries to match the connection to one in the pool.&amp;nbsp; If there is a match, ACE completes the handshake on the front end and maps it to the back end connection (the GET or whatever the request is would be send over the back end connection immediately after the 3 way handshake.)&lt;/P&gt;&lt;P&gt;&amp;nbsp; If the connection did not match, ACE would open a new connection on the back end.&amp;nbsp; The match is based on parameters in the SYN packet like TCP options, MSS, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As this pertains to SSL, ACE would keep the back end SSL connection open (just a bit further than the 3 way handshake as referenced above of course.) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Chris Higgins&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Aug 2010 16:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/informations-on-ssl-end-to-end-on-ace-module/m-p/1441858#M29963</guid>
      <dc:creator>chrhiggi</dc:creator>
      <dc:date>2010-08-10T16:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: Informations on SSL end to end on ACE module</title>
      <link>https://community.cisco.com/t5/application-networking/informations-on-ssl-end-to-end-on-ace-module/m-p/1441859#M29964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, thank you very much for the insights &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Aug 2010 18:03:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/informations-on-ssl-end-to-end-on-ace-module/m-p/1441859#M29964</guid>
      <dc:creator>silk</dc:creator>
      <dc:date>2010-08-10T18:03:44Z</dc:date>
    </item>
  </channel>
</rss>

