<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACE:LB several https services using same client(public) IP addre in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024381#M38470</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can differentiate on the basis of TCP ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map match-any vip_http&lt;/P&gt;&lt;P&gt;&amp;nbsp; 2 match virtual-address 192.168.99.100 tcp eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map match-any vip_http&lt;/P&gt;&lt;P&gt;&amp;nbsp; 2 match virtual-address 192.168.99.100 tcp eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Sep 2012 06:43:35 GMT</pubDate>
    <dc:creator>Kanwaljeet Singh</dc:creator>
    <dc:date>2012-09-12T06:43:35Z</dc:date>
    <item>
      <title>ACE:LB several https services using same client(public) IP address</title>
      <link>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024378#M38467</link>
      <description>&lt;P&gt;Works perfectly with http but doesn't with https:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type http loadbalance match-all domain_mysite2&lt;/P&gt;&lt;P&gt;&amp;nbsp; 2 match http header Host header-value "www.mysite2.com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map match-any vip_http&lt;/P&gt;&lt;P&gt;&amp;nbsp; 2 match virtual-address 192.168.99.100 tcp eq www&lt;/P&gt;&lt;P&gt;class-map match-any vip_https&lt;/P&gt;&lt;P&gt;&amp;nbsp; 2 match virtual-address 192.168.99.100 tcp eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type loadbalance first-match L7_policymap&lt;/P&gt;&lt;P&gt;&amp;nbsp; class domain_mysite2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm sfarm_SFARM2&lt;/P&gt;&lt;P&gt;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm sfarm_SFARM1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map multi-match L4_policymap&lt;/P&gt;&lt;P&gt;&amp;nbsp; class vip_http&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy L7_policymap&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip icmp-reply active&lt;/P&gt;&lt;P&gt;&amp;nbsp; class vip_https&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy L7_policymap&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip icmp-reply active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need urgent help.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Sep 2012 00:06:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024378#M38467</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2012-09-12T00:06:22Z</dc:date>
    </item>
    <item>
      <title>ACE:LB several https services using same client(public) IP addre</title>
      <link>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024379#M38468</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your requirement is&amp;nbsp; not clear but for ACE to load balance on the basis of host header value, ACE should be able to look at the http header which will not happen in your case if you are not using SSL termination on it which means that it will hit default policy. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just on the basis of L4, it should work fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 00:20:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024379#M38468</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2012-09-12T00:20:34Z</dc:date>
    </item>
    <item>
      <title>ACE:LB several https services using same client(public) IP addre</title>
      <link>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024380#M38469</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How can I do it only with L4 if I just have one IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Antonio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 06:40:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024380#M38469</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2012-09-12T06:40:16Z</dc:date>
    </item>
    <item>
      <title>ACE:LB several https services using same client(public) IP addre</title>
      <link>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024381#M38470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can differentiate on the basis of TCP ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map match-any vip_http&lt;/P&gt;&lt;P&gt;&amp;nbsp; 2 match virtual-address 192.168.99.100 tcp eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map match-any vip_http&lt;/P&gt;&lt;P&gt;&amp;nbsp; 2 match virtual-address 192.168.99.100 tcp eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 06:43:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024381#M38470</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2012-09-12T06:43:35Z</dc:date>
    </item>
    <item>
      <title>ACE:LB several https services using same client(public) IP addre</title>
      <link>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024382#M38471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kanwal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Unfortunately it is not possible to use different ports because the clients are not aware - they just type &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://www.mysite.com"&gt;https://www.mysite.com&lt;/A&gt;&lt;SPAN&gt; or &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://www.mysite2.com"&gt;https://www.mysite2.com&lt;/A&gt;&lt;SPAN&gt; and the DNS resolves both URL's to same IP address. Do I have any other option besides SSL termination?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Antonio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 06:50:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024382#M38471</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2012-09-12T06:50:03Z</dc:date>
    </item>
    <item>
      <title>ACE:LB several https services using same client(public) IP addre</title>
      <link>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024383#M38472</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Antonio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For ACE to take decision on the basis of host header value, it needs to decrypt the traffic, so there is no other way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second workaround would be to make a change in DNS zone file and resolve mysite2.com to some other IP address which is a VIP on ace but using SSL termination is a better option since you will offload SSL&amp;nbsp; to ACE which is cpu intensive and ACE can take decision on the basis of L7 information since now it can look into the HTTP header.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 06:59:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024383#M38472</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2012-09-12T06:59:27Z</dc:date>
    </item>
    <item>
      <title>ACE:LB several https services using same client(public) IP addre</title>
      <link>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024384#M38473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kanwal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The clients are on the internet and I just have an ASA Firewall in the midle, so I think it's not possible to use the "DNS trick".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the SSL offload option, how can I do it? I'm aware that I need to upload the certificate and key to the ACE and that I need to create the SSL proxy service and add these two files to it. But I have some doubts regarding the class and policy configuration since I want to preserve the remaining configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Antonio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 07:13:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024384#M38473</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2012-09-12T07:13:57Z</dc:date>
    </item>
    <item>
      <title>ACE:LB several https services using same client(public) IP addre</title>
      <link>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024385#M38474</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You just need to add SSL proxy in policy multi-match under class vip_https.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 08:03:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024385#M38474</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2012-09-12T08:03:29Z</dc:date>
    </item>
    <item>
      <title>ACE:LB several https services using same client(public) IP addre</title>
      <link>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024386#M38475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Antonio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a look at this below as well for details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px;"&gt;&lt;STRONG&gt;Example of an SSL Termination Configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px;"&gt;The following example illustrates a running configuration of the ACE acting as an SSL proxy server; terminating SSL or TLS connections from a client and then establishing a TCP connection to an HTTP server. When the ACE terminates the SSL or TLS connection, it decrypts the cipher text from the client and transmits the data as clear text to the HTTP server. The SSL termination-specific configuration elements appear in bold in the example. &lt;/P&gt;&lt;P&gt;access-list ACL1 line 10 extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;probe https GEN-HTTPS&lt;/P&gt;&lt;P&gt;&amp;nbsp; port 80&lt;/P&gt;&lt;P&gt;&amp;nbsp; interval 50&lt;/P&gt;&lt;P&gt;&amp;nbsp; faildetect 5&lt;/P&gt;&lt;P&gt;&amp;nbsp; expect status 200 200&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rserver SERVER1&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 172.27.16.11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;rserver SERVER2&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 172.27.16.12&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;rserver SERVER3&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 172.27.16.13&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;rserver SERVER4&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 172.27.16.14&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;serverfarm host SFARM1&lt;/P&gt;&lt;P&gt;&amp;nbsp; description SERVER FARM 1 FOR SSL TERMINATION&lt;/P&gt;&lt;P&gt;&amp;nbsp; probe GEN-HTTPS&lt;/P&gt;&lt;P&gt;&amp;nbsp; rserver SERVER1 80 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;&amp;nbsp; rserver SERVER2 80 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;serverfarm host SFARM2&lt;/P&gt;&lt;P&gt;&amp;nbsp; description SERVER FARM 2 FOR SSL TERMINATION&lt;/P&gt;&lt;P&gt;&amp;nbsp; probe GEN-HTTPS&lt;/P&gt;&lt;P&gt;&amp;nbsp; rserver SERVER3 80 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;&amp;nbsp; rserver SERVER4 80 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;parameter-map type ssl PARAMMAP_SSL_TERMINATION&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;cipher RSA_WITH_3DES_EDE_CBC_SHA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;cipher RSA_WITH_AES_128_CBC_SHA priority 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;cipher RSA_WITH_AES_256_CBC_SHA priority 3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;version all&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;parameter-map type connection TCP_PARAM&lt;/P&gt;&lt;P&gt;&amp;nbsp; syn-data drop&lt;/P&gt;&lt;P&gt;&amp;nbsp; exceed-mss allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssl-proxy service SSL_PSERVICE_SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;ssl advanced-options PARAMMAP_SSL_TERMINATION&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;key MYKEY.PEM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;cert MYCERT.PEM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type http loadbalance match-all L7_SERVER_CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp; description Sticky for SSL Testing&lt;/P&gt;&lt;P&gt;&amp;nbsp; 2 match http url .*.jpg&lt;/P&gt;&lt;P&gt;&amp;nbsp; 3 match source-address 192.168.130.0 255.255.255.0&lt;/P&gt;&lt;P&gt;class-map type http loadbalance match-all L7_SLB-HTTP_CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp; 2 match http url .*&lt;/P&gt;&lt;P&gt;&amp;nbsp; 3 match source-address 192.168.130.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;class-map match-all L4_SSL-TERM_CLASS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;description SSL Termination VIP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;2 match virtual-address 192.168.130.11 tcp eq https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type loadbalance first-match L7_SSL-TERM_POLICY&lt;/P&gt;&lt;P&gt;&amp;nbsp; class L7_SERVER_CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm SFARM1 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; insert-http I_AM header-value "SSL_TERM"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; insert-http SRC_Port header-value "%ps"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; insert-http DEST_IP header-value "%id"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; insert-http DEST_Port header-value "%pd"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; insert-http SRC_IP header-value "%is"&lt;/P&gt;&lt;P&gt;&amp;nbsp; class L7_SLB-HTTP_CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm SFARM1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; insert-http I_AM header-value "SSL_TERM"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; insert-http SRC_Port header-value "%ps"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; insert-http DEST_IP header-value "%id"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; insert-http DEST_Port header-value "%pd"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; insert-http SRC_IP header-value "%is"&lt;/P&gt;&lt;P&gt;policy-map multi-match L4_SSL-VIP_POLICY&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;class L4_SSL-TERM_CLASS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy L7_SSL-TERM_POLICY&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip icmp-reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;ssl-proxy server SSL_PSERVICE_SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection advanced-options TCP_PARAM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan 120&lt;/P&gt;&lt;P&gt;&amp;nbsp; description Upstream VLAN_120 - Clients and VIPs&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 192.168.120.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; fragment chain 20&lt;/P&gt;&lt;P&gt;&amp;nbsp; fragment min-mtu 68&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-group input ACL1&lt;/P&gt;&lt;P&gt;&amp;nbsp; nat-pool 1 192.168.120.70 192.168.120.80 netmask 255.255.255.0 pat&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;service-policy input L4_SSL-VIP_POLICY&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; no shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 10.1.0.0 255.255.255.0 192.168.120.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 08:10:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024386#M38475</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2012-09-12T08:10:24Z</dc:date>
    </item>
    <item>
      <title>ACE:LB several https services using same client(public) IP addre</title>
      <link>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024387#M38476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Antonio, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also will need a SNA certificate to make it work &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 20:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024387#M38476</guid>
      <dc:creator>Cesar Roque</dc:creator>
      <dc:date>2012-09-12T20:26:00Z</dc:date>
    </item>
    <item>
      <title>ACE:LB several https services using same client(public) IP addre</title>
      <link>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024388#M38477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kanwal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your configuration all the https traffic is terminated in ACE. Is it possible to terminate only this particulary traffic ( I think not)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Antonio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 08:39:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024388#M38477</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2012-09-14T08:39:48Z</dc:date>
    </item>
    <item>
      <title>ACE:LB several https services using same client(public) IP addre</title>
      <link>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024389#M38478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If all your sites are under the same domain; the most simple solution is to use a cross domain certificate (*.domain.com)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;otherwise you can use a multi domain certificate (using SAN field : Subject Alternative Name)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SNI (server name indication) is the cleanest way to do it but it's not supported by all browsers / load balancers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 21:09:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-lb-several-https-services-using-same-client-public-ip/m-p/2024389#M38478</guid>
      <dc:creator>Surya ARBY</dc:creator>
      <dc:date>2012-09-17T21:09:09Z</dc:date>
    </item>
  </channel>
</rss>

