<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CSS acl and proxy-list in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510230#M31078</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I did the "apply circuit-(VLAN2)" and the "acl enable " but all traffic is permited, no filter is applied!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I see in the log of the server that is only the ip 172.19.2.50&amp;nbsp; is accesing to the &lt;/SPAN&gt;&lt;SPAN&gt;physical server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;172.19.26.50 -&amp;gt; 172.19.26.32 HTTP GET / HTTP/1.1&lt;/P&gt;&lt;P&gt;172.19.26.50 -&amp;gt; 172.19.26.32 HTTP GET /favicon.ico HTTP/1.1&lt;/P&gt;&lt;P&gt;172.19.26.50 -&amp;gt; 172.19.26.32 HTTP GET / HTTP/1.1&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;No the original source 172.16.0.0 255.255.0.0 or 172.19.0.0 255.255.0.0&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Any Idea?&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 06 Dec 2010 20:30:38 GMT</pubDate>
    <dc:creator>henry.saravia</dc:creator>
    <dc:date>2010-12-06T20:30:38Z</dc:date>
    <item>
      <title>CSS acl and proxy-list</title>
      <link>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510227#M31075</link>
      <description>&lt;P&gt;I need to filter a url, (An url public and private), but the acls is not worknig&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#############################################&lt;/P&gt;&lt;P&gt;interface e1&lt;/P&gt;&lt;P&gt;&amp;nbsp; bridge vlan 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#############################################&lt;/P&gt;&lt;P&gt;circuit VLAN2&lt;/P&gt;&lt;P&gt;&amp;nbsp; redundancy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 172.19.2.102 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#############################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssl-proxy-list ssl-ssl&lt;/P&gt;&lt;P&gt;&amp;nbsp; ssl-server 2&lt;/P&gt;&lt;P&gt;&amp;nbsp; ssl-server 2 vip address 172.19.2.5&lt;/P&gt;&lt;P&gt;&amp;nbsp; ssl-server 2 rsakey asrsakey2&lt;/P&gt;&lt;P&gt;&amp;nbsp; ssl-server 2 rsacert asrsacert2&lt;/P&gt;&lt;P&gt;&amp;nbsp; ssl-server 2 ssl-queue-delay 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; ssl-server 2 tcp server nagle disable&lt;/P&gt;&lt;P&gt;&amp;nbsp; ssl-server 2 tcp server ack-delay 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; ssl-server 2 tcp virtual ack-delay 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; ssl-server 2 cipher rsa-with-rc4-128-sha 172.19.2.50 80&lt;/P&gt;&lt;P&gt;&amp;nbsp; ssl-server 2 tcp server inactivity-timeout 600&lt;/P&gt;&lt;P&gt;&amp;nbsp; ssl-server 2 tcp virtual inactivity-timeout 600&lt;/P&gt;&lt;P&gt;&amp;nbsp; active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#############################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service secure-ssl&lt;/P&gt;&lt;P&gt;&amp;nbsp; type ssl-accel&lt;/P&gt;&lt;P&gt;&amp;nbsp; slot 2&lt;/P&gt;&lt;P&gt;&amp;nbsp; add ssl-proxy-list ssl-ssl&lt;/P&gt;&lt;P&gt;&amp;nbsp; active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service serv1&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 172.19.2.32&lt;/P&gt;&lt;P&gt;&amp;nbsp; protocol tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; port 80&lt;/P&gt;&lt;P&gt;&amp;nbsp; active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service serv2&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 172.19.2.35&lt;/P&gt;&lt;P&gt;&amp;nbsp; protocol tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; port 80&lt;/P&gt;&lt;P&gt;&amp;nbsp; active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#############################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; content PUBLIC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; add service serv1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; add service serv2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; vip address 172.19.2.50&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; port 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; url "/public/*"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; content PRIVATE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; add service serv2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; add service serv1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; vip address 172.19.2.50&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; port 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; url "/private/*"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#############################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group GROUP&lt;/P&gt;&lt;P&gt;&amp;nbsp; add destination service serv2&lt;/P&gt;&lt;P&gt;&amp;nbsp; add destination service serv1&lt;/P&gt;&lt;P&gt;&amp;nbsp; vip address 172.19.2.50&lt;/P&gt;&lt;P&gt;&amp;nbsp; active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#############################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;acl 26&lt;/P&gt;&lt;P&gt;&amp;nbsp; clause 10 permit any 172.16.0.0 255.255.0.0 destination content OWN/PRIVATE&lt;/P&gt;&lt;P&gt;&amp;nbsp; clause 20 permit any 172.19.0.0 255.255.0.0 destination content OWN/PRIVATE&lt;/P&gt;&lt;P&gt;&amp;nbsp; clause 50 deny any any destination content OWN/PRIVATE&lt;/P&gt;&lt;P&gt;&amp;nbsp; clause 99 permit any any destination any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any Idea?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Dec 2010 18:02:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510227#M31075</guid>
      <dc:creator>henry.saravia</dc:creator>
      <dc:date>2010-12-06T18:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: CSS acl and proxy-list</title>
      <link>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510228#M31076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Henry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you apply the ACL to a circuit and enable the ACLs?&amp;nbsp; CSS requires that you enable ACLs after youconfigure them in order to take affect.&amp;nbsp; Take a look at the quick start guide for ACLs below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/css11500series/v8.10/configuration/security/guide/Access.html#wp1134054"&gt;http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/css11500series/v8.10/configuration/security/guide/Access.html#wp1134054&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Dec 2010 18:09:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510228#M31076</guid>
      <dc:creator>Kristopher Martinez</dc:creator>
      <dc:date>2010-12-06T18:09:38Z</dc:date>
    </item>
    <item>
      <title>Re: CSS acl and proxy-list</title>
      <link>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510229#M31077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Howdy Henry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To get ACL's working on the CSS is a 2 steps process, Apply the ACL to a circuit and then enable ACL globally on the box.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to make sure all your circuit VLAN's have an ACL configured even if needs to be permit any any otherwise the traffic&lt;/P&gt;&lt;P&gt;for that VLAN will be blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your case seems like you only have circuit VLAN 2 so the config would be like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;acl 26&lt;/P&gt;&lt;P&gt;&amp;nbsp; clause 10 permit any 172.16.0.0 255.255.0.0 destination content OWN/PRIVATE&lt;/P&gt;&lt;P&gt;&amp;nbsp; clause 20 permit any 172.19.0.0 255.255.0.0 destination content OWN/PRIVATE&lt;/P&gt;&lt;P&gt;&amp;nbsp; clause 50 deny any any destination content OWN/PRIVATE&lt;/P&gt;&lt;P&gt;&amp;nbsp; clause 99 permit any any destination any&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; apply circuit-(VLAN2)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then go to config t mode and enter:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSS(config)# acl enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;__ __&lt;/P&gt;&lt;P&gt;Pablo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Dec 2010 18:12:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510229#M31077</guid>
      <dc:creator>pablo.nxh</dc:creator>
      <dc:date>2010-12-06T18:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: CSS acl and proxy-list</title>
      <link>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510230#M31078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I did the "apply circuit-(VLAN2)" and the "acl enable " but all traffic is permited, no filter is applied!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I see in the log of the server that is only the ip 172.19.2.50&amp;nbsp; is accesing to the &lt;/SPAN&gt;&lt;SPAN&gt;physical server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;172.19.26.50 -&amp;gt; 172.19.26.32 HTTP GET / HTTP/1.1&lt;/P&gt;&lt;P&gt;172.19.26.50 -&amp;gt; 172.19.26.32 HTTP GET /favicon.ico HTTP/1.1&lt;/P&gt;&lt;P&gt;172.19.26.50 -&amp;gt; 172.19.26.32 HTTP GET / HTTP/1.1&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;No the original source 172.16.0.0 255.255.0.0 or 172.19.0.0 255.255.0.0&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Any Idea?&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Dec 2010 20:30:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510230#M31078</guid>
      <dc:creator>henry.saravia</dc:creator>
      <dc:date>2010-12-06T20:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: CSS acl and proxy-list</title>
      <link>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510231#M31079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry this is the log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;172.19.2.50 -&amp;gt; 172.19.2.32 HTTP GET / HTTP/1.1&lt;/P&gt;&lt;P&gt;172.19.2.50 -&amp;gt; 172.19.2.32 HTTP GET /favicon.ico HTTP/1.1&lt;/P&gt;&lt;P&gt;172.19.2.50 -&amp;gt; 172.19.2.32 HTTP GET / HTTP/1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Dec 2010 20:41:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510231#M31079</guid>
      <dc:creator>henry.saravia</dc:creator>
      <dc:date>2010-12-06T20:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: CSS acl and proxy-list</title>
      <link>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510232#M31080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh OK it isn't a ACL problem but a NAT issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The fact that you're seeing only requests from 172.19.2.50 is because you configured a source group to NAT incoming request&lt;/P&gt;&lt;P&gt;to content rules where these services were configured under. S-NAT avoids asymmetric routing issues in a one-armed design like yours.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;group GROUP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; add destination service serv2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; add destination service serv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&amp;nbsp; vip address 172.19.2.50&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; active&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACLs should be working fine and traffic different than 172.16.0.0/16 or 172.19.0.0/16 will not have access to the rule in question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;__ __&lt;/P&gt;&lt;P&gt;Pablo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Dec 2010 20:44:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510232#M31080</guid>
      <dc:creator>pablo.nxh</dc:creator>
      <dc:date>2010-12-06T20:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: CSS acl and proxy-list</title>
      <link>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510233#M31081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the group config like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group GROUP&lt;/P&gt;&lt;P&gt;&amp;nbsp; add destination service serv1&lt;/P&gt;&lt;P&gt;&amp;nbsp; add destination service serv2&lt;/P&gt;&lt;P&gt;&amp;nbsp; vip address 172.19.2.50&lt;/P&gt;&lt;P&gt;&amp;nbsp; active&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Im not clear about what your recommendation is?&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Thanks&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Dec 2010 21:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510233#M31081</guid>
      <dc:creator>henry.saravia</dc:creator>
      <dc:date>2010-12-06T21:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: CSS acl and proxy-list</title>
      <link>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510234#M31082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Henry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It was not a recommendation, I was trying to explain why all the logs on your server are&lt;/P&gt;&lt;P&gt;coming from a single source (172.19.2.50).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the CSS ACL matching happens before NAT so when a packet comes in CSS checks against your ACL, if doesn't belong&lt;/P&gt;&lt;P&gt;to 172.16 or 172.19 networks packet is discarded.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the packet comes from one of these networks it would be permitted and then NAT'd using the source group so regardless if&lt;/P&gt;&lt;P&gt;it comes from .16 or .19 all the requests will seem to be sourced from 172.19.2.50.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can't get rid of the source group in one-armed design unless you make sure the response of your servers has no way&lt;/P&gt;&lt;P&gt;to get to the client other than going through the CSS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;__ __&lt;/P&gt;&lt;P&gt;Pablo.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Dec 2010 21:56:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510234#M31082</guid>
      <dc:creator>pablo.nxh</dc:creator>
      <dc:date>2010-12-06T21:56:17Z</dc:date>
    </item>
    <item>
      <title>Re: CSS acl and proxy-list</title>
      <link>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510235#M31083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi pablo I want restate my question&lt;/P&gt;&lt;P&gt;I have a content rule like this one:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;content SSL-J2EE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; vip address 172.19.6.5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; add service ssl&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; application ssl&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; advanced-balance ssl&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; port 443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service ssl&lt;/P&gt;&lt;P&gt;&amp;nbsp; type ssl-accel&lt;/P&gt;&lt;P&gt;&amp;nbsp; slot 2&lt;/P&gt;&lt;P&gt;&amp;nbsp; add ssl-proxy-list ssl-bfa&lt;/P&gt;&lt;P&gt;&amp;nbsp; keepalive type none&lt;/P&gt;&lt;P&gt;&amp;nbsp; active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;I need to do something like this:&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;content SSL-J2EE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; vip address 172.19.6.5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; add service ssl&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; application ssl&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; advanced-balance ssl&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; port 443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; url "/private/*"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; active&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;content SSL-J2EE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; vip address 172.19.6.5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; add service ssl&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; application ssl&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; advanced-balance ssl&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; port 443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; url "/public/*"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; active&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;and filter based in source IP (some IP can access to /private and another to /public). The problem is that https is encrypted and I can not see the path to distingish if is a public connection or private.&lt;/DIV&gt;&lt;DIV&gt;Any Idea?&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Thanks&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Dec 2010 15:12:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510235#M31083</guid>
      <dc:creator>henry.saravia</dc:creator>
      <dc:date>2010-12-10T15:12:56Z</dc:date>
    </item>
    <item>
      <title>Re: CSS acl and proxy-list</title>
      <link>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510236#M31084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Henry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on your config and specially on the service shown below, it means that you're offloading the SSL traffic on the CSS so &lt;/P&gt;&lt;P&gt;the URL filter will be configured on the clear text rules and the ACL will be pointing to those instead.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;service ssl&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; type ssl-accel&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; slot 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; add ssl-proxy-list ssl-bfa&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; keepalive type none&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; active&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;If you don't mind you can share a sanitized copy of the following outputs and I'll give you a hand with the ACL config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;CSS# show run ssl&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;CSS# show run owner&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;CSS# show run acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;Regards&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;__ __&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;Pablo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Dec 2010 16:38:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510236#M31084</guid>
      <dc:creator>pablo.nxh</dc:creator>
      <dc:date>2010-12-10T16:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: CSS acl and proxy-list</title>
      <link>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510237#M31085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it is the config:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Dec 2010 23:38:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510237#M31085</guid>
      <dc:creator>henry.saravia</dc:creator>
      <dc:date>2010-12-10T23:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: CSS acl and proxy-list</title>
      <link>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510238#M31086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Henry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your config looks in good shape &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; The only thing that seems to be missing is the line that denies further access to "PRIVATE"&lt;/P&gt;&lt;P&gt;content rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;acl 26&lt;BR /&gt;&amp;nbsp; clause 10 permit any 172.16.0.0 255.255.0.0 destination content ONE/PRIVATE&lt;BR /&gt;&amp;nbsp; clause 20 permit any 172.19.0.0 255.255.0.0 destination content ONE/PRIVATE&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; clause 21 deny any any destination content ONE/PRIVATE&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp; clause 30 deny any any destination content BFA/PRIVATE&lt;BR /&gt;&amp;nbsp; clause 40 permit any 172.16.2.0 255.255.255.0 destination any&lt;BR /&gt;&amp;nbsp; clause 50 permit any any destination content BFA/PUBLIC&lt;BR /&gt;&amp;nbsp; clause 99 permit any any destination any&lt;BR /&gt;&amp;nbsp; apply circuit-(VLAN26)&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure if clause 30 was supposed to be the line that blocks that traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;__ __&lt;/P&gt;&lt;P&gt;Pablo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Dec 2010 18:37:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510238#M31086</guid>
      <dc:creator>pablo.nxh</dc:creator>
      <dc:date>2010-12-13T18:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: CSS acl and proxy-list</title>
      <link>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510239#M31087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pablo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL is applied like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;acl 26&lt;/P&gt;&lt;P&gt;&amp;nbsp; clause 10 permit any 172.16.0.0 255.255.0.0 destination content ONE/PRIVATE&lt;/P&gt;&lt;P&gt;&amp;nbsp; clause 20 permit any 172.19.0.0 255.255.0.0 destination content ONE/PRIVATE&lt;/P&gt;&lt;P&gt;&amp;nbsp; clause 30 deny any any destination content ONE/PRIVATE&lt;/P&gt;&lt;P&gt;&amp;nbsp; clause 40 permit any 172.16.2.0 255.255.255.0 destination any&lt;/P&gt;&lt;P&gt;&amp;nbsp; clause 50 permit any any destination content ONE/PUBLIC&lt;/P&gt;&lt;P&gt;&amp;nbsp; clause 99 permit any any destination any&lt;/P&gt;&lt;P&gt;&amp;nbsp; apply circuit-(VLAN26)&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;But the client access by https to the content&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;content SECURE&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; vip address 172.19.2.5&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; add service secure&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; application ssl&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; advanced-balance ssl&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol tcp&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; port 443&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; active&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;The SSL proxy access to the ONE/PRIVATE or ONE/PUBLIC content, not the client directly!&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;How does the CSS do to distinguish if customer want to access to PRIVATE or PUBLIC content?&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;For example a customer access to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://172.19.2.5/PRIVATE"&gt;https://172.19.2.5/PRIVATE&lt;/A&gt;&lt;SPAN&gt; from an IP add 200.200.200.200. What clause match in the ACL?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Thanks&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Dec 2010 20:05:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-acl-and-proxy-list/m-p/1510239#M31087</guid>
      <dc:creator>henry.saravia</dc:creator>
      <dc:date>2010-12-13T20:05:19Z</dc:date>
    </item>
  </channel>
</rss>

