<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACE end to end encryption with IDSM in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/ace-end-to-end-encryption-with-idsm/m-p/1760714#M35014</link>
    <description>&lt;P&gt;We want to provide an end to encryption service using an ACE02 in a CAT 6509E. This is covered in the ACE config guide so should be OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue is that we want to include traffic inspection using an IDSM2 so we need to seperate the decrypt and encryption stages and send cleartext traffic to the IDMS2.&lt;/P&gt;&lt;P&gt;The Security and Virtualization in the Data Center pdf page 18/19 suggests that it might be possible. The design depicted there though is only doing SSL termination, then sending the clear text onto a WAF, and onto IPS but it does say end-to-end encryption is also possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in essence what we want to do is have traffic from clients destined for the server farm decrypted by the ACE and sent to the IDS. We then want the traffic to return from the IDS to the ACE to be encrypted and sent onto the server farm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sure that others have come across this as it must be a pretty common requirement so I'm really looking for some firm guidance or documentation that might cover this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas or thoughts would be very much appreciated.&lt;/P&gt;</description>
    <pubDate>Wed, 17 Aug 2011 16:10:26 GMT</pubDate>
    <dc:creator>jesrobbie</dc:creator>
    <dc:date>2011-08-17T16:10:26Z</dc:date>
    <item>
      <title>ACE end to end encryption with IDSM</title>
      <link>https://community.cisco.com/t5/application-networking/ace-end-to-end-encryption-with-idsm/m-p/1760714#M35014</link>
      <description>&lt;P&gt;We want to provide an end to encryption service using an ACE02 in a CAT 6509E. This is covered in the ACE config guide so should be OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue is that we want to include traffic inspection using an IDSM2 so we need to seperate the decrypt and encryption stages and send cleartext traffic to the IDMS2.&lt;/P&gt;&lt;P&gt;The Security and Virtualization in the Data Center pdf page 18/19 suggests that it might be possible. The design depicted there though is only doing SSL termination, then sending the clear text onto a WAF, and onto IPS but it does say end-to-end encryption is also possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in essence what we want to do is have traffic from clients destined for the server farm decrypted by the ACE and sent to the IDS. We then want the traffic to return from the IDS to the ACE to be encrypted and sent onto the server farm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sure that others have come across this as it must be a pretty common requirement so I'm really looking for some firm guidance or documentation that might cover this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas or thoughts would be very much appreciated.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2011 16:10:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-end-to-end-encryption-with-idsm/m-p/1760714#M35014</guid>
      <dc:creator>jesrobbie</dc:creator>
      <dc:date>2011-08-17T16:10:26Z</dc:date>
    </item>
    <item>
      <title>ACE end to end encryption with IDSM</title>
      <link>https://community.cisco.com/t5/application-networking/ace-end-to-end-encryption-with-idsm/m-p/1760715#M35015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't think this is a common requiremement. I've not seen it in&amp;nbsp; almost 2 years of TAC. I don't think that you can get it to work using a&amp;nbsp; single context, but I see no reason why it shouldn't work using 2&amp;nbsp; contexts. Terminate ssl on the frontend context, send it out to a&amp;nbsp; rserver (which will be a vip on the backend context) via the IDSM&amp;nbsp; (bridging 2 vlans together). The backend context will encrypt and send&amp;nbsp; to the real rservers. I haven't tested it, but I don't see what would&amp;nbsp; prevent it from working. You can do the load balancing and/or cookie&amp;nbsp; insert etc on either context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matthew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Aug 2011 11:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-end-to-end-encryption-with-idsm/m-p/1760715#M35015</guid>
      <dc:creator>mwinnett</dc:creator>
      <dc:date>2011-08-26T11:11:42Z</dc:date>
    </item>
  </channel>
</rss>

