<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACE Topic: How to allow ACE to login to an App server with c in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/ace-topic-how-to-allow-ace-to-login-to-an-app-server-with/m-p/1485616#M30683</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. Thanks for the quick reply. In my case the app is Tomcat/Apache and somehow IIS is involved initially. IIS does a redirect back to tomcat. All that to say a 443 porbe would pass due to IIS being up, and they are trying to detect apache/tomcat failure. I am trying to get them to script some internal checks and put their Up or DOWN status on a static IIS page.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 Jun 2010 19:17:27 GMT</pubDate>
    <dc:creator>duane.smith</dc:creator>
    <dc:date>2010-06-11T19:17:27Z</dc:date>
    <item>
      <title>ACE Topic: How to allow ACE to login to an App server with certificate and perform Health check probe</title>
      <link>https://community.cisco.com/t5/application-networking/ace-topic-how-to-allow-ace-to-login-to-an-app-server-with/m-p/1485612#M30679</link>
      <description>&lt;P&gt;Fellow specialist,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a new requirement from my customer and I like to find out if anyone has had a similiar request or possible solution.&lt;/P&gt;&lt;P&gt;As always thanks for your valuable inputs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Requirement:&lt;/P&gt;&lt;P&gt;Customer would like to for the ACE to login to an App server with the required certificate and perform healthcheck. The Application does require the client to logon with certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our current Production network design Model:&lt;/P&gt;&lt;P&gt;Cisco 6500, 10/100/1000, VSS model, ACE module (25 context and 10k license SSL)&lt;/P&gt;&lt;P&gt;ACE SSL (no SSL termination on the ACE).&lt;/P&gt;&lt;P&gt;ACE SLB Mode: Bridged Mode&lt;/P&gt;&lt;P&gt;Sticky: IP SRC/DST sticky&lt;/P&gt;&lt;P&gt;prediction: leastconn&lt;/P&gt;&lt;P&gt;Basic Class map, policy map, service policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Questions:&lt;/P&gt;&lt;P&gt;1) Can a certificat be loaded on the ACE without the use of SSL termination on the ACE card&lt;/P&gt;&lt;P&gt;2) Can you recommend probs with this type of request (client logon with cert requirement)&lt;/P&gt;&lt;P&gt;3) How many certificates can be loaded on the ACE if there are several requirements like this&lt;/P&gt;&lt;P&gt;4) If FT (Fault Tollerant)&amp;nbsp; is in the current topology, will the same certificate be applied to each ACE module?&lt;/P&gt;&lt;P&gt;5)Sticky should not be an issue in this design, Right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if you need me to provide any more information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Raman Azizian&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2010 12:21:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-topic-how-to-allow-ace-to-login-to-an-app-server-with/m-p/1485612#M30679</guid>
      <dc:creator>RAMAN AZIZIAN</dc:creator>
      <dc:date>2010-06-11T12:21:20Z</dc:date>
    </item>
    <item>
      <title>Re: ACE Topic: How to allow ACE to login to an App server with c</title>
      <link>https://community.cisco.com/t5/application-networking/ace-topic-how-to-allow-ace-to-login-to-an-app-server-with/m-p/1485613#M30680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Raman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me see if I can help here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Questions:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;1) Can a certificat be loaded on the ACE without the&amp;nbsp; use of SSL termination on the ACE card&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, but the certificate can not be used for client certificate authentication for a HTTPS probe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;2) Can you recommend probs&amp;nbsp; with this type of request (client logon with cert requirement)&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACE does not currently support client certificate authentication for HTTPS probes, and it doesn't appear to be on the roadmap.&amp;nbsp; You may want to reach out to your Cisco partner or representative and see about getting a product enhancement request for this feature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;3)&amp;nbsp; How many certificates can be loaded on the ACE if there are several&amp;nbsp; requirements like this&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can have up to 3800 certs and 3800 keys installed on the ACE module or 4710 appliance.&amp;nbsp; You can see this limit and others &lt;A href="http://docwiki.cisco.com/wiki/Cisco_Application_Control_Engine_%28ACE%29_Module_Troubleshooting_Guide%2C_Release_A2%28x%29_--_ACE_Module_Resource_Limits"&gt;here&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;4) If FT (Fault Tollerant)&amp;nbsp; is in the&amp;nbsp; current topology, will the same certificate be applied to each ACE&amp;nbsp; module?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSL certificates and keys loaded on one ACE are not automatically applied to the FT peer ACE.&amp;nbsp; They must be manually imported to both ACE in the FT environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;5) Sticky should not be an issue in this design, Right?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sticky is not an issue with SSL, unless you need to do some layer-7 sticky other than SSL Session ID sticky.&amp;nbsp; This is because when using HTTPS, the HTTP headers are encrypted.&amp;nbsp; When load balancing SSL, the only real sticky options are source-IP or SSL Session ID.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Sean&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jun 2010 14:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-topic-how-to-allow-ace-to-login-to-an-app-server-with/m-p/1485613#M30680</guid>
      <dc:creator>Sean Merrow</dc:creator>
      <dc:date>2010-06-11T14:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: ACE Topic: How to allow ACE to login to an App server with c</title>
      <link>https://community.cisco.com/t5/application-networking/ace-topic-how-to-allow-ace-to-login-to-an-app-server-with/m-p/1485614#M30681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That brings up the question of how one would do health check probes on any application that uses SSL client auth.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jun 2010 19:04:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-topic-how-to-allow-ace-to-login-to-an-app-server-with/m-p/1485614#M30681</guid>
      <dc:creator>duane.smith</dc:creator>
      <dc:date>2010-06-11T19:04:43Z</dc:date>
    </item>
    <item>
      <title>Re: ACE Topic: How to allow ACE to login to an App server with c</title>
      <link>https://community.cisco.com/t5/application-networking/ace-topic-how-to-allow-ace-to-login-to-an-app-server-with/m-p/1485615#M30682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Duane,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well, if the server won't allow you to do the HTTPS probe without doing client certificate authentication, then you might have to drop down to just doing a TCP probe on port 443.&amp;nbsp; Certainly not as thorough as a full blown HTTPS probe, but would get your load balancing working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sean&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jun 2010 19:11:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-topic-how-to-allow-ace-to-login-to-an-app-server-with/m-p/1485615#M30682</guid>
      <dc:creator>Sean Merrow</dc:creator>
      <dc:date>2010-06-11T19:11:22Z</dc:date>
    </item>
    <item>
      <title>Re: ACE Topic: How to allow ACE to login to an App server with c</title>
      <link>https://community.cisco.com/t5/application-networking/ace-topic-how-to-allow-ace-to-login-to-an-app-server-with/m-p/1485616#M30683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. Thanks for the quick reply. In my case the app is Tomcat/Apache and somehow IIS is involved initially. IIS does a redirect back to tomcat. All that to say a 443 porbe would pass due to IIS being up, and they are trying to detect apache/tomcat failure. I am trying to get them to script some internal checks and put their Up or DOWN status on a static IIS page.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jun 2010 19:17:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-topic-how-to-allow-ace-to-login-to-an-app-server-with/m-p/1485616#M30683</guid>
      <dc:creator>duane.smith</dc:creator>
      <dc:date>2010-06-11T19:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: ACE Topic: How to allow ACE to login to an App server with c</title>
      <link>https://community.cisco.com/t5/application-networking/ace-topic-how-to-allow-ace-to-login-to-an-app-server-with/m-p/1485617#M30684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice.&amp;nbsp; That might be a plan then.&amp;nbsp; You could then use &lt;STRONG&gt;&lt;A href="http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/vA2_3_0/configuration/slb/guide/probe.html#wp1075645"&gt;expect regex&lt;/A&gt;&lt;/STRONG&gt; to look for your UP or DOWN string in the body of the html using a HTTP probe.&amp;nbsp; Just make sure the server includes a &lt;STRONG&gt;content-length&lt;/STRONG&gt; header in the response, or it won't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sean&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jun 2010 19:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-topic-how-to-allow-ace-to-login-to-an-app-server-with/m-p/1485617#M30684</guid>
      <dc:creator>Sean Merrow</dc:creator>
      <dc:date>2010-06-11T19:28:53Z</dc:date>
    </item>
  </channel>
</rss>

