<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACE 4710 and CA client authentication in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/ace-4710-and-ca-client-authentication/m-p/1525549#M31380</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I haven't seen this before. You might want to open a TAC case to investigate this. We will most likely need front and back end captures with private keys to decrypt the flows.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 16 Oct 2010 23:41:08 GMT</pubDate>
    <dc:creator>Ivan Kovacevic</dc:creator>
    <dc:date>2010-10-16T23:41:08Z</dc:date>
    <item>
      <title>ACE 4710 and CA client authentication</title>
      <link>https://community.cisco.com/t5/application-networking/ace-4710-and-ca-client-authentication/m-p/1525548#M31379</link>
      <description>&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin-top:0cm;
	mso-para-margin-right:0cm;
	mso-para-margin-bottom:10.0pt;
	mso-para-margin-left:0cm;
	line-height:115%;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;
	mso-fareast-language:EN-US;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="BGNormal"&gt;&lt;SPAN lang="EN-US"&gt;We have installed ACE 4710 with A3(2.6) software. ACE 4710 is configured as “end-to-end SSL” and the real server is Microsoft OWA 2007. We are using CA and client authentication for our users. When we are connecting to &lt;A href="https://vipaddress/owa"&gt;https://VIPaddress/owa&lt;/A&gt;, we are receiving message for authentication with certificate and when we are choosing our certificate – nothing happens. When we do that we see blank page. When we make second attempt to access VIP address in this browser we can see OWA logging page. Is anyone having this problem?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Oct 2010 19:09:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-4710-and-ca-client-authentication/m-p/1525548#M31379</guid>
      <dc:creator>vaba</dc:creator>
      <dc:date>2010-10-15T19:09:46Z</dc:date>
    </item>
    <item>
      <title>Re: ACE 4710 and CA client authentication</title>
      <link>https://community.cisco.com/t5/application-networking/ace-4710-and-ca-client-authentication/m-p/1525549#M31380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I haven't seen this before. You might want to open a TAC case to investigate this. We will most likely need front and back end captures with private keys to decrypt the flows.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Oct 2010 23:41:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-4710-and-ca-client-authentication/m-p/1525549#M31380</guid>
      <dc:creator>Ivan Kovacevic</dc:creator>
      <dc:date>2010-10-16T23:41:08Z</dc:date>
    </item>
  </channel>
</rss>

