<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Problem in SSL SSO sessions in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664195#M33599</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Marko,&lt;/P&gt;&lt;P&gt;Thanks for suggesting stickyness.&amp;nbsp; I have tried stickyness configuration before and its works perfectly for clear traffic (unencrypted) but problem start when I tried to stick encrypted traffic without using SSL termination and initiation. Please refer another example below. The session starts to timeout and sometime client stick to same server and sometime it starts a new session and they have to login again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL line 10 extended permit ip any any &lt;BR /&gt;access-list ACL line 20 extended permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;probe https HTTPS_Probe&lt;BR /&gt;&amp;nbsp; interval 15&lt;BR /&gt;&amp;nbsp; faildetect 2&lt;BR /&gt;&amp;nbsp; passdetect interval 60&lt;BR /&gt;&amp;nbsp; ssl version all&lt;BR /&gt;&amp;nbsp; open 1&lt;BR /&gt;probe icmp ICMP_Probe&lt;BR /&gt;&amp;nbsp; interval 15&lt;BR /&gt;&amp;nbsp; faildetect 2&lt;BR /&gt;&amp;nbsp; passdetect interval 15&lt;BR /&gt;probe tcp TCP:443&lt;BR /&gt;&amp;nbsp; port 443&lt;BR /&gt;&amp;nbsp; interval 5&lt;BR /&gt;&amp;nbsp; passdetect interval 10&lt;BR /&gt;&amp;nbsp; connection term forced&lt;BR /&gt;&amp;nbsp; open 3&lt;/P&gt;&lt;P&gt;rserver host ClearingServer1&lt;BR /&gt;&amp;nbsp; ip address 172.16.2.61&lt;BR /&gt;&amp;nbsp; inservice&lt;BR /&gt;rserver host ClearingServer2&lt;BR /&gt;&amp;nbsp; ip address 172.16.2.62&lt;BR /&gt;&amp;nbsp; inservice&lt;BR /&gt;rserver host ClearingServer3&lt;BR /&gt;&amp;nbsp; ip address 172.16.2.63&lt;BR /&gt;&amp;nbsp; inservice&lt;BR /&gt;rserver host ClearingServer4&lt;BR /&gt;&amp;nbsp; ip address 172.16.2.64&lt;BR /&gt;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;serverfarm host SSLFARM&lt;BR /&gt;&amp;nbsp; probe ICMP_Probe&lt;BR /&gt;&amp;nbsp; rserver ClearingServer1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;&amp;nbsp; rserver ClearingServer2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;&amp;nbsp; rserver ClearingServer3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;&amp;nbsp; rserver ClearingServer4&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;parameter-map type ssl Clearing-PM-1&lt;BR /&gt;&amp;nbsp; session-cache timeout 1200&lt;BR /&gt;&amp;nbsp; queue-delay timeout 1&lt;BR /&gt;parameter-map type generic SSLID_PARAMETER_MAP&lt;BR /&gt;&amp;nbsp; set max-parse-length 70&lt;/P&gt;&lt;P&gt;sticky layer4-payload SSL-GROUP&lt;BR /&gt;&amp;nbsp; serverfarm SSLFARM&lt;BR /&gt;&amp;nbsp; response sticky&lt;BR /&gt;&amp;nbsp; layer4-payload offset 43 length 32 begin-pattern "(\x20|\x00\xST)"&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;class-map match-any SSL-C1&lt;BR /&gt;&amp;nbsp; 2 match virtual-address 172.16.98.100 tcp eq https&lt;BR /&gt;&amp;nbsp; 3 match virtual-address 172.16.98.100 tcp any&lt;BR /&gt;class-map type management match-any remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp; 201 match protocol snmp any&lt;BR /&gt;&amp;nbsp; 202 match protocol https any&lt;BR /&gt;&amp;nbsp; 203 match protocol icmp any&lt;BR /&gt;&amp;nbsp; 204 match protocol ssh any&lt;/P&gt;&lt;P&gt;policy-map type management first-match remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp; class remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit&lt;/P&gt;&lt;P&gt;policy-map type loadbalance generic first-match GPPMATCH&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sticky-serverfarm SSL-GROUP&lt;/P&gt;&lt;P&gt;policy-map multi-match CLIENT-SSL&lt;BR /&gt;&amp;nbsp; class SSL-C1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy GPPMATCH&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appl-parameter generic advanced-options SSLID_PARAMETER_MAP&lt;/P&gt;&lt;P&gt;interface vlan 98&lt;BR /&gt;&amp;nbsp; description Upstream VLAN_98 - Clients and VIPs&lt;BR /&gt;&amp;nbsp; ip address 172.16.98.10 255.255.255.0&lt;BR /&gt;&amp;nbsp; access-group input ACL&lt;BR /&gt;&amp;nbsp; access-group output ACL&lt;BR /&gt;&amp;nbsp; service-policy input remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp; service-policy input CLIENT-SSL&lt;BR /&gt;&amp;nbsp; no shutdown&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 172.16.98.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestion how to use stickyness in encrypted traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA,&lt;/P&gt;&lt;P&gt;Taufeeq&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 15 Jul 2011 08:14:44 GMT</pubDate>
    <dc:creator>taufeeqrauf</dc:creator>
    <dc:date>2011-07-15T08:14:44Z</dc:date>
    <item>
      <title>Problem in SSL SSO sessions</title>
      <link>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664192#M33596</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I am new to ACE and for last few weeks trying to configure it for server load balancing with session persistance. Her is the scenario&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client are using their cerificate to login into SSL server. Based on client certificate serial number, email address and values in Subject fields the server decides which options they can access and what particular set of data and images they can view and manipulate. It is going on for last two years. Recently we plan to increase the capacity and have introduce ACE 4710 in between. I have used below configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list TRAFFIC-IN line 8 extended permit ip any any &lt;BR /&gt;access-list TRAFFIC-IN line 16 extended permit icmp any any &lt;BR /&gt;access-list TRAFFIC-OUT line 8 extended permit icmp any any &lt;BR /&gt;access-list TRAFFIC-OUT line 16 extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;BR /&gt;probe https HTTPS_Probe&lt;BR /&gt;&amp;nbsp; interval 15&lt;BR /&gt;&amp;nbsp; faildetect 2&lt;BR /&gt;&amp;nbsp; passdetect interval 60&lt;BR /&gt;&amp;nbsp; ssl version all&lt;BR /&gt;&amp;nbsp; open 1&lt;BR /&gt;probe icmp ICMP_Probe&lt;BR /&gt;&amp;nbsp; interval 15&lt;BR /&gt;&amp;nbsp; faildetect 2&lt;BR /&gt;&amp;nbsp; passdetect interval 15&lt;/P&gt;&lt;P&gt;rserver host ClearWebAWT01&lt;BR /&gt;&amp;nbsp; ip address 172.16.4.63&lt;BR /&gt;&amp;nbsp; inservice&lt;BR /&gt;rserver host ClearWebAWT02&lt;BR /&gt;&amp;nbsp; ip address 172.16.4.64&lt;BR /&gt;&amp;nbsp; inservice&lt;BR /&gt;rserver host ClearWebAWT03&lt;BR /&gt;&amp;nbsp; ip address 172.16.4.61&lt;BR /&gt;&amp;nbsp; inservice&lt;BR /&gt;rserver host ClearWebAWT04&lt;BR /&gt;&amp;nbsp; ip address 172.16.4.62&lt;BR /&gt;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;serverfarm host Clearing-Server-Farm&lt;BR /&gt;&amp;nbsp; probe ICMP_Probe&lt;BR /&gt;&amp;nbsp; rserver ClearWebAWT01&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;&amp;nbsp; rserver ClearWebAWT02&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;&amp;nbsp; rserver ClearWebAWT03&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;&amp;nbsp; rserver ClearWebAWT04&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;parameter-map type connection HTTPS_Clearing_Connection_Parameter&lt;BR /&gt;&amp;nbsp; set timeout inactivity 28800&lt;BR /&gt;parameter-map type ssl PARAMETER-MAP-CLEARING&lt;BR /&gt;&amp;nbsp; session-cache timeout 1200&lt;BR /&gt;&amp;nbsp; queue-delay timeout 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssl-proxy service SSL-CLIENT&lt;BR /&gt;&amp;nbsp; ssl advanced-options PARAMETER-MAP-CLEARING&lt;BR /&gt;ssl-proxy service SSL_SERVER&lt;BR /&gt;&amp;nbsp; key Clearing.cer&lt;BR /&gt;&amp;nbsp; cert Clearing.cer&lt;BR /&gt;&amp;nbsp; ssl advanced-options PARAMETER-MAP-CLEARING&lt;/P&gt;&lt;P&gt;class-map match-all NachWeb&lt;BR /&gt;&amp;nbsp; 2 match virtual-address 172.16.4.10 any&lt;BR /&gt;class-map type management match-any remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp; 201 match protocol snmp any&lt;BR /&gt;&amp;nbsp; 202 match protocol https any&lt;BR /&gt;&amp;nbsp; 203 match protocol icmp any&lt;BR /&gt;&amp;nbsp; 204 match protocol ssh any&lt;/P&gt;&lt;P&gt;policy-map type management first-match remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp; class remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit&lt;/P&gt;&lt;P&gt;policy-map type loadbalance first-match NachWeb-l7slb&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm Clearing-Server-Farm&lt;/P&gt;&lt;P&gt;policy-map multi-match int4&lt;BR /&gt;&amp;nbsp; class NachWeb&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy NachWeb-l7slb&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip icmp-reply active&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection advanced-options HTTPS_Clearing_Connection_Parameter&lt;/P&gt;&lt;P&gt;service-policy input int4&lt;/P&gt;&lt;P&gt;interface vlan 4&lt;BR /&gt;&amp;nbsp; ip address 172.16.4.5 255.255.255.0&lt;BR /&gt;&amp;nbsp; access-group input TRAFFIC-IN&lt;BR /&gt;&amp;nbsp; access-group output TRAFFIC-OUT&lt;BR /&gt;&amp;nbsp; service-policy input remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp; no shutdown&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 172.16.4.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem starts if more than one server are servicing the client request. The session starts to time out and client requires to login again and again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestion with working example would help me in guiding to right direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Taufeeq&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2011 05:19:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664192#M33596</guid>
      <dc:creator>taufeeqrauf</dc:creator>
      <dc:date>2011-06-17T05:19:02Z</dc:date>
    </item>
    <item>
      <title>Problem in SSL SSO sessions</title>
      <link>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664193#M33597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Taufeeq, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you still need assistance you can open a case with Cisco PDI Help desk. @&amp;nbsp; www.cisco.com/go/pdihelpdesk&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Abijith Sharma&amp;nbsp; V S&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2011 20:48:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664193#M33597</guid>
      <dc:creator>asharmav</dc:creator>
      <dc:date>2011-07-14T20:48:12Z</dc:date>
    </item>
    <item>
      <title>Problem in SSL SSO sessions</title>
      <link>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664194#M33598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Taufeeq!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't see any stickyness in your configuration. Unless your webservers aren't syncing each other, you need to stick on the same server i guess.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Marko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 06:47:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664194#M33598</guid>
      <dc:creator>Marko Leopold</dc:creator>
      <dc:date>2011-07-15T06:47:30Z</dc:date>
    </item>
    <item>
      <title>Problem in SSL SSO sessions</title>
      <link>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664195#M33599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Marko,&lt;/P&gt;&lt;P&gt;Thanks for suggesting stickyness.&amp;nbsp; I have tried stickyness configuration before and its works perfectly for clear traffic (unencrypted) but problem start when I tried to stick encrypted traffic without using SSL termination and initiation. Please refer another example below. The session starts to timeout and sometime client stick to same server and sometime it starts a new session and they have to login again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL line 10 extended permit ip any any &lt;BR /&gt;access-list ACL line 20 extended permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;probe https HTTPS_Probe&lt;BR /&gt;&amp;nbsp; interval 15&lt;BR /&gt;&amp;nbsp; faildetect 2&lt;BR /&gt;&amp;nbsp; passdetect interval 60&lt;BR /&gt;&amp;nbsp; ssl version all&lt;BR /&gt;&amp;nbsp; open 1&lt;BR /&gt;probe icmp ICMP_Probe&lt;BR /&gt;&amp;nbsp; interval 15&lt;BR /&gt;&amp;nbsp; faildetect 2&lt;BR /&gt;&amp;nbsp; passdetect interval 15&lt;BR /&gt;probe tcp TCP:443&lt;BR /&gt;&amp;nbsp; port 443&lt;BR /&gt;&amp;nbsp; interval 5&lt;BR /&gt;&amp;nbsp; passdetect interval 10&lt;BR /&gt;&amp;nbsp; connection term forced&lt;BR /&gt;&amp;nbsp; open 3&lt;/P&gt;&lt;P&gt;rserver host ClearingServer1&lt;BR /&gt;&amp;nbsp; ip address 172.16.2.61&lt;BR /&gt;&amp;nbsp; inservice&lt;BR /&gt;rserver host ClearingServer2&lt;BR /&gt;&amp;nbsp; ip address 172.16.2.62&lt;BR /&gt;&amp;nbsp; inservice&lt;BR /&gt;rserver host ClearingServer3&lt;BR /&gt;&amp;nbsp; ip address 172.16.2.63&lt;BR /&gt;&amp;nbsp; inservice&lt;BR /&gt;rserver host ClearingServer4&lt;BR /&gt;&amp;nbsp; ip address 172.16.2.64&lt;BR /&gt;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;serverfarm host SSLFARM&lt;BR /&gt;&amp;nbsp; probe ICMP_Probe&lt;BR /&gt;&amp;nbsp; rserver ClearingServer1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;&amp;nbsp; rserver ClearingServer2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;&amp;nbsp; rserver ClearingServer3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;&amp;nbsp; rserver ClearingServer4&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;parameter-map type ssl Clearing-PM-1&lt;BR /&gt;&amp;nbsp; session-cache timeout 1200&lt;BR /&gt;&amp;nbsp; queue-delay timeout 1&lt;BR /&gt;parameter-map type generic SSLID_PARAMETER_MAP&lt;BR /&gt;&amp;nbsp; set max-parse-length 70&lt;/P&gt;&lt;P&gt;sticky layer4-payload SSL-GROUP&lt;BR /&gt;&amp;nbsp; serverfarm SSLFARM&lt;BR /&gt;&amp;nbsp; response sticky&lt;BR /&gt;&amp;nbsp; layer4-payload offset 43 length 32 begin-pattern "(\x20|\x00\xST)"&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;class-map match-any SSL-C1&lt;BR /&gt;&amp;nbsp; 2 match virtual-address 172.16.98.100 tcp eq https&lt;BR /&gt;&amp;nbsp; 3 match virtual-address 172.16.98.100 tcp any&lt;BR /&gt;class-map type management match-any remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp; 201 match protocol snmp any&lt;BR /&gt;&amp;nbsp; 202 match protocol https any&lt;BR /&gt;&amp;nbsp; 203 match protocol icmp any&lt;BR /&gt;&amp;nbsp; 204 match protocol ssh any&lt;/P&gt;&lt;P&gt;policy-map type management first-match remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp; class remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit&lt;/P&gt;&lt;P&gt;policy-map type loadbalance generic first-match GPPMATCH&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sticky-serverfarm SSL-GROUP&lt;/P&gt;&lt;P&gt;policy-map multi-match CLIENT-SSL&lt;BR /&gt;&amp;nbsp; class SSL-C1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy GPPMATCH&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appl-parameter generic advanced-options SSLID_PARAMETER_MAP&lt;/P&gt;&lt;P&gt;interface vlan 98&lt;BR /&gt;&amp;nbsp; description Upstream VLAN_98 - Clients and VIPs&lt;BR /&gt;&amp;nbsp; ip address 172.16.98.10 255.255.255.0&lt;BR /&gt;&amp;nbsp; access-group input ACL&lt;BR /&gt;&amp;nbsp; access-group output ACL&lt;BR /&gt;&amp;nbsp; service-policy input remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp; service-policy input CLIENT-SSL&lt;BR /&gt;&amp;nbsp; no shutdown&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 172.16.98.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestion how to use stickyness in encrypted traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA,&lt;/P&gt;&lt;P&gt;Taufeeq&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 08:14:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664195#M33599</guid>
      <dc:creator>taufeeqrauf</dc:creator>
      <dc:date>2011-07-15T08:14:44Z</dc:date>
    </item>
    <item>
      <title>Re: Problem in SSL SSO sessions</title>
      <link>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664196#M33600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Two &lt;A&gt;&lt;/A&gt;more questions. Do you use NAT in your network or do you see the ip-address of the client? And do you use the serverfarm for unencrypted traffic as well?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 08:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664196#M33600</guid>
      <dc:creator>Marko Leopold</dc:creator>
      <dc:date>2011-07-15T08:41:11Z</dc:date>
    </item>
    <item>
      <title>Problem in SSL SSO sessions</title>
      <link>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664197#M33601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Taufeeq,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It all depend on your servers' behavior. You need to understand how the clients are actually communicating with the servers with full detail of this communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please explain more this communication, including the URLs the clients will be requesting and the server behavior as a response for these request.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Ahmad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 11:19:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664197#M33601</guid>
      <dc:creator>Ahmad Basel Jaber</dc:creator>
      <dc:date>2011-07-15T11:19:21Z</dc:date>
    </item>
    <item>
      <title>Problem in SSL SSO sessions</title>
      <link>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664198#M33602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I am seeing live IP of clients. Server farm is not using any unencrypted traffic. &lt;/P&gt;&lt;P&gt;End to end encrypted traffic is a requirement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client is using certificate to login into server using simple &lt;A href="https://my.server.live.ip/"&gt;https://my.server.live.ip&lt;/A&gt;.&amp;nbsp; This Live IP is mapped on Netscreen Firewall redirecting 443 port to ACE VIP as given in above configuration. The ACE sees 443 request on VIP from certain IP redirect it the next avaiable IP in serverfarm. The ACE also stores SessionID of encrypted traffic in its sticky database. The server request client certificate details and using details in its certificate and checking credentials from authentication database allowed them to login into site. All subsequent communication needs to be with same Web instance. I think that I am not getting same sessionID for subsequent request and ACE is enable to stick the client to same web instance instead it redirect the request to any server IP that is next in line to serve request.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 12:13:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664198#M33602</guid>
      <dc:creator>taufeeqrauf</dc:creator>
      <dc:date>2011-07-15T12:13:38Z</dc:date>
    </item>
    <item>
      <title>Problem in SSL SSO sessions</title>
      <link>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664199#M33603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Taufeeq,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on your description, the only way to stick the client is using source IP address stickiness. I would recommend to give it a try and see if it fixes your issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: sniffing the traffic at the client PC using wireshark will show you exactly if the client is using different SessionID.&lt;/P&gt;&lt;P&gt;Note: The SessionID could be changed in SSLv3, so this could be your main issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Ahmad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 13:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664199#M33603</guid>
      <dc:creator>Ahmad Basel Jaber</dc:creator>
      <dc:date>2011-07-15T13:43:13Z</dc:date>
    </item>
    <item>
      <title>Problem in SSL SSO sessions</title>
      <link>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664200#M33604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Source IP address resolves the problem however, clients coming from proxy stick to same server is their any way through which they can be load balance?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 08:45:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664200#M33604</guid>
      <dc:creator>taufeeqrauf</dc:creator>
      <dc:date>2011-07-19T08:45:35Z</dc:date>
    </item>
    <item>
      <title>Problem in SSL SSO sessions</title>
      <link>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664201#M33605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Taufeeq,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to start thinking about SSL termination to avoid having huge number of clients (which thet are coming through proxy server) sticking to same server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont think of any other way, unless you need to creat multiple VIPs pointing to multiple servers, and configure your nomal clients to use one VIP and the proxy server to use another one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Ahmad &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 09:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/problem-in-ssl-sso-sessions/m-p/1664201#M33605</guid>
      <dc:creator>Ahmad Basel Jaber</dc:creator>
      <dc:date>2011-07-19T09:23:29Z</dc:date>
    </item>
  </channel>
</rss>

