<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACE 4710 Resttrict traffic to HTTPS and SSH only in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347762#M40902</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Charles, I would do this with the interface access-list. You will need to explicitly permit the traffic to be load balanced, mgmt traffic and all https/ssh and deny everything else. Matthew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 12 Aug 2013 10:27:43 GMT</pubDate>
    <dc:creator>mwinnett</dc:creator>
    <dc:date>2013-08-12T10:27:43Z</dc:date>
    <item>
      <title>ACE 4710 Resttrict traffic to HTTPS and SSH only</title>
      <link>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347758#M40898</link>
      <description>&lt;P&gt;Working in new enviornment and need to confirm traffic restricted to only ssh and https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface gigabitEthernet 1/1&lt;BR /&gt;&amp;nbsp; description REAL SERVERS SDE&lt;BR /&gt;&amp;nbsp; speed 1000M&lt;BR /&gt;&amp;nbsp; duplex FULL&lt;BR /&gt;&amp;nbsp; switchport access vlan 200&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;interface gigabitEthernet 1/2&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;interface gigabitEthernet 1/3&lt;BR /&gt;&amp;nbsp; shutdown&lt;BR /&gt;interface gigabitEthernet 1/4&lt;BR /&gt;&amp;nbsp; speed 1000M&lt;BR /&gt;&amp;nbsp; duplex FULL&lt;BR /&gt;&amp;nbsp; switchport access vlan 500&lt;BR /&gt;&amp;nbsp; no shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ALL line 8 extended permit ip any any &lt;BR /&gt;access-list ALL line 9 extended permit tcp any any &lt;BR /&gt;access-list ALL line 10 extended permit udp any any &lt;BR /&gt;access-list ALL line 11 extended permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;probe icmp PING&lt;BR /&gt;&amp;nbsp; ip address 162.16.103.200 routed&lt;BR /&gt;probe icmp PING1&lt;BR /&gt;&amp;nbsp; ip address 162.16.103.201 routed&lt;/P&gt;&lt;P&gt;parameter-map type http cisco_avs_parametermap&lt;BR /&gt;&amp;nbsp; persistence-rebalance&lt;BR /&gt;&amp;nbsp; length-exceed continue&lt;/P&gt;&lt;P&gt;rserver host Arges&lt;BR /&gt;&amp;nbsp; ip address 162.16.103.200&lt;BR /&gt;&amp;nbsp; conn-limit max 4000000 min 4000000&lt;BR /&gt;&amp;nbsp; probe PING&lt;BR /&gt;&amp;nbsp; inservice&lt;BR /&gt;rserver host Brontes&lt;BR /&gt;&amp;nbsp; ip address 162.16.103.201&lt;BR /&gt;&amp;nbsp; conn-limit max 4000000 min 4000000&lt;BR /&gt;&amp;nbsp; probe PING1&lt;BR /&gt;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;action-list type optimization http WEB-ACTION-LIST&lt;BR /&gt;&amp;nbsp; flashforward&lt;BR /&gt;action-list type optimization http cisco_avs_container_latency&lt;BR /&gt;&amp;nbsp; flashforward&lt;BR /&gt;action-list type optimization http cisco_avs_img_latency&lt;BR /&gt;&amp;nbsp; flashforward&lt;BR /&gt;action-list type optimization http cisco_avs_obj_latency&lt;BR /&gt;&amp;nbsp; flashforward&lt;/P&gt;&lt;P&gt;serverfarm host VIRTUAL-SERVER-FARM&lt;BR /&gt;&amp;nbsp; rserver Arges 80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; backup-rserver Brontes 80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn-limit max 4000000 min 4000000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; probe PING1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; probe PING&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;&amp;nbsp; rserver Brontes 80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn-limit max 4000000 min 4000000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; probe PING&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; probe PING1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;class-map match-any VIRTUAL-SERVER-11&lt;BR /&gt;&amp;nbsp; 2 match virtual-address 10.10.10.11 tcp any&lt;BR /&gt;class-map match-any VIRTUAL-SERVER-20&lt;BR /&gt;&amp;nbsp; 2 match virtual-address 10.10.10.20 tcp eq www&lt;BR /&gt;class-map match-any VIRTUAL-SERVER-21&lt;BR /&gt;&amp;nbsp; 2 match any&lt;BR /&gt;class-map type http loadbalance match-all cisco_avs_container_latency&lt;BR /&gt;&amp;nbsp; 2 match http url &lt;A href="http://10.10.10.*/browser/"&gt;http://10.10.10.*/browser/&lt;/A&gt;*&lt;BR /&gt;class-map type http loadbalance match-any cisco_avs_img_latency&lt;BR /&gt;&amp;nbsp; 2 match http url .*jpg&lt;BR /&gt;&amp;nbsp; 3 match http url .*jpeg&lt;BR /&gt;&amp;nbsp; 4 match http url .*jpe&lt;BR /&gt;&amp;nbsp; 5 match http url .*png&lt;BR /&gt;&amp;nbsp; 6 match http url .*aspx&lt;BR /&gt;&amp;nbsp; 7 match http url .*aspd&lt;BR /&gt;&amp;nbsp; 8 match http url .*axd&lt;BR /&gt;&amp;nbsp; 9 match http url .*axs&lt;BR /&gt;&amp;nbsp; 10 match http url .i*&lt;BR /&gt;class-map type http loadbalance match-any cisco_avs_obj_latency&lt;BR /&gt;&amp;nbsp; 2 match http url .*gif&lt;BR /&gt;&amp;nbsp; 3 match http url .*css&lt;BR /&gt;&amp;nbsp; 4 match http url .*js&lt;BR /&gt;&amp;nbsp; 5 match http url .*class&lt;BR /&gt;&amp;nbsp; 6 match http url .*jar&lt;BR /&gt;&amp;nbsp; 7 match http url .*cab&lt;BR /&gt;&amp;nbsp; 8 match http url .*txt&lt;BR /&gt;&amp;nbsp; 9 match http url .*ps&lt;BR /&gt;&amp;nbsp; 10 match http url .*vbs&lt;BR /&gt;&amp;nbsp; 11 match http url .*xsl&lt;BR /&gt;&amp;nbsp; 12 match http url .*xml&lt;BR /&gt;&amp;nbsp; 13 match http url .*pdf&lt;BR /&gt;&amp;nbsp; 14 match http url .*swf&lt;BR /&gt;&amp;nbsp; 15 match http url .*aspx&lt;BR /&gt;&amp;nbsp; 16 match http url .*aspd&lt;BR /&gt;&amp;nbsp; 17 match http url .*axd&lt;BR /&gt;&amp;nbsp; 18 match http url .*axs&lt;BR /&gt;&amp;nbsp; 19 match http url .*&lt;BR /&gt;class-map type management match-any remote_access&lt;BR /&gt;&amp;nbsp; 2 match protocol xml-https any&lt;BR /&gt;&amp;nbsp; 3 match protocol&amp;nbsp; any&lt;BR /&gt;&amp;nbsp; 4 match protocol icmp any&lt;BR /&gt;&amp;nbsp; 5 match protocol telnet any&lt;BR /&gt;&amp;nbsp; 6 match protocol ssh any&lt;BR /&gt;&amp;nbsp; 7 match protocol http any&lt;BR /&gt;&amp;nbsp; 8 match protocol https any&lt;BR /&gt;&amp;nbsp; 9 match protocol snmp any&lt;/P&gt;&lt;P&gt;policy-map type management first-match remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp; class remote_access&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit&lt;/P&gt;&lt;P&gt;policy-map type loadbalance first-match VIRTUAL-SERVER-11-l7slb&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm VIRTUAL-SERVER-FARM&lt;BR /&gt;policy-map type loadbalance first-match VIRTUAL-SERVER-20-l7slb&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm VIRTUAL-SERVER-FARM&lt;/P&gt;&lt;P&gt;policy-map type optimization http first-match VIRTUAL-SERVER-20-l7opt&lt;BR /&gt;&amp;nbsp; class cisco_avs_obj_latency&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; action cisco_avs_obj_latency&lt;BR /&gt;&amp;nbsp; class cisco_avs_img_latency&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; action cisco_avs_img_latency&lt;BR /&gt;&amp;nbsp; class cisco_avs_container_latency&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; action cisco_avs_container_latency&lt;/P&gt;&lt;P&gt;policy-map multi-match int500&lt;BR /&gt;&amp;nbsp; class VIRTUAL-SERVER-20&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy VIRTUAL-SERVER-20-l7slb&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; optimize http policy VIRTUAL-SERVER-20-l7opt&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip icmp-reply active&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appl-parameter http advanced-options cisco_avs_parametermap&lt;BR /&gt;&amp;nbsp; class VIRTUAL-SERVER-11&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy VIRTUAL-SERVER-11-l7slb&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip icmp-reply active&lt;/P&gt;&lt;P&gt;interface vlan 200&lt;BR /&gt;&amp;nbsp; description "REAL SERVERS"&lt;BR /&gt;&amp;nbsp; ip address 162.16.103.1 255.255.255.0&lt;BR /&gt;&amp;nbsp; service-policy input remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;interface vlan 500&lt;BR /&gt;&amp;nbsp; description ACE CLIENT VLANE_Client VLAN&lt;BR /&gt;&amp;nbsp; ip address 10.10.10.5 255.255.255.0&lt;BR /&gt;&amp;nbsp; access-group input ALL&lt;BR /&gt;&amp;nbsp; service-policy input remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp; service-policy input int500&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;interface vlan 820&lt;BR /&gt;&amp;nbsp; access-group input ALL&lt;BR /&gt;&amp;nbsp; service-policy input remote_mgmt_allow_policy&lt;BR /&gt;&amp;nbsp; no shutdown&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.10.10.1&lt;/P&gt;&lt;P&gt;snmp-server contact "CHARLES"&lt;BR /&gt;snmp-server location "DEP 2"&lt;BR /&gt;snmp-server community LM-DEP2 group Network-Monitor&lt;/P&gt;&lt;P&gt;snmp-server trap-source vlan 820&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2013 13:26:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347758#M40898</guid>
      <dc:creator>CharlesM1</dc:creator>
      <dc:date>2013-08-01T13:26:46Z</dc:date>
    </item>
    <item>
      <title>ACE 4710 Resttrict traffic to HTTPS and SSH only</title>
      <link>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347759#M40899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you clarify what you mean by "traffic restricted to ssh &amp;amp; https" ? Ie: do you mean only ssh &amp;amp; https mgmt traffic to the ace, only https and ssh towards the vip or only ssh &amp;amp; https through the box (not load balanced) ? Matthew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 12:37:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347759#M40899</guid>
      <dc:creator>mwinnett</dc:creator>
      <dc:date>2013-08-09T12:37:22Z</dc:date>
    </item>
    <item>
      <title>ACE 4710 Resttrict traffic to HTTPS and SSH only</title>
      <link>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347760#M40900</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Greatly appreciate your help. &lt;/P&gt;&lt;P&gt;The configuration is to allow only ssh and https through the 4710, and the config has been modified:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging trap 5&lt;BR /&gt;logging buffered 6&lt;BR /&gt;logging persistent 5&lt;BR /&gt;logging monitor 5&lt;BR /&gt;logging queue 5000&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;hostname x86ACE03&lt;BR /&gt;interface gigabitEthernet 1/1&lt;BR /&gt;&amp;nbsp; switchport access vlan 700&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;interface gigabitEthernet 1/2&lt;BR /&gt;&amp;nbsp; switchport trunk allowed vlan 701,704&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;interface gigabitEthernet 1/3&lt;BR /&gt;&amp;nbsp; shutdown&lt;BR /&gt;interface gigabitEthernet 1/4&lt;BR /&gt;&amp;nbsp; shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_10 line 8 extended permit ip any host 10.22.6.117&lt;BR /&gt;access-list ACL_10 line 16 extended permit icmp any host 10.22.6.117&lt;BR /&gt;access-list ACL_10 line 24 extended permit ip any host 10.22.6.116&lt;BR /&gt;access-list ACL_10 line 32 extended permit icmp any host 10.22.6.116&lt;BR /&gt;access-list ACL_10 line 40 extended permit ip any host 10.22.6.119&lt;BR /&gt;access-list ACL_10 line 48 extended permit icmp any host 10.22.6.119&lt;BR /&gt;access-list ACL_20 line 8 extended permit ip any any&lt;BR /&gt;access-list ACL_20 line 16 extended permit icmp any any&lt;BR /&gt;access-list ACL_40 line 16 extended permit ip 10.22.7.2 255.255.255.224 any&lt;BR /&gt;access-list ACL_50 line 16 extended permit ip 10.22.7.34 255.255.255.224 any&lt;BR /&gt;access-list FILTER line 10 extended permit tcp any any eq https&lt;BR /&gt;access-list FILTER line 20 extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;probe icmp SERVICE_ICMP_PROBE&lt;BR /&gt;&amp;nbsp; interval 10&lt;BR /&gt;&amp;nbsp; passdetect interval 5&lt;/P&gt;&lt;P&gt;parameter-map type http CASE_PARAM&lt;BR /&gt;&amp;nbsp; case-insensitive&lt;BR /&gt;&amp;nbsp; persistence-rebalance&lt;BR /&gt;parameter-map type connection rule-vsuiteFrontEnd-A_CONN_PARAM&lt;BR /&gt;&amp;nbsp; set timeout inactivity 6400&lt;BR /&gt;parameter-map type connection rule-vsuiteFrontEnd-CoreA_CONN_PARAM&lt;BR /&gt;&amp;nbsp; set timeout inactivity 6400&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;/P&gt;&lt;P&gt;&lt;BR /&gt;rserver host vsuiteFrontEnd-A&lt;BR /&gt;&amp;nbsp; ip address 10.22.7.2&lt;BR /&gt;&amp;nbsp; probe SERVICE_ICMP_PROBE&lt;BR /&gt;&amp;nbsp; inservice&lt;BR /&gt;rserver host vsuiteFrontEnd-CoreA&lt;BR /&gt;&amp;nbsp; ip address 10.22.7.34&lt;BR /&gt;&amp;nbsp; probe SERVICE_ICMP_PROBE&lt;BR /&gt;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;serverfarm host rule-vsuiteFrontEnd-A&lt;BR /&gt;&amp;nbsp; rserver vsuiteFrontEnd-A&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn-limit max 4000000 min 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;serverfarm host rule-vsuiteFrontEnd-CoreA&lt;BR /&gt;&amp;nbsp; rserver vsuiteFrontEnd-CoreA&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn-limit max 4000000 min 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;class-map type management match-any REMOTE_ACCESS_CLASS&lt;BR /&gt;&amp;nbsp; description Enable remote management&lt;BR /&gt;&amp;nbsp; 2 match protocol xml-https any&lt;BR /&gt;&amp;nbsp; 4 match protocol icmp any&lt;BR /&gt;&amp;nbsp; 5 match protocol telnet any&lt;BR /&gt;&amp;nbsp; 6 match protocol ssh any&lt;BR /&gt;&amp;nbsp; 7 match protocol http any&lt;BR /&gt;&amp;nbsp; 8 match protocol https any&lt;BR /&gt;class-map match-any SERVERSOURCED&lt;BR /&gt;&amp;nbsp; 2 match access-list ACL_40&lt;BR /&gt;class-map match-any SERVERSOURCED-CoreA&lt;BR /&gt;&amp;nbsp; 2 match access-list ACL_50&lt;BR /&gt;class-map match-all rule-vsuiteFrontEnd-A_CLASS&lt;BR /&gt;&amp;nbsp; 2 match virtual-address 10.22.6.117 tcp eq https&lt;BR /&gt;class-map match-all rule-vsuiteFrontEnd-CoreA_CLASS&lt;BR /&gt;&amp;nbsp; 2 match virtual-address 10.22.6.119 tcp eq https&lt;/P&gt;&lt;P&gt;policy-map type management first-match REMOTE_ACCESS_POLICY&lt;BR /&gt;&amp;nbsp; class REMOTE_ACCESS_CLASS&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit&lt;/P&gt;&lt;P&gt;policy-map type loadbalance first-match rule-vsuiteFrontEnd-A_POLICY&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm rule-vsuiteFrontEnd-A&lt;BR /&gt;policy-map type loadbalance first-match rule-vsuiteFrontEnd-CoreA_POLICY&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm rule-vsuiteFrontEnd-CoreA&lt;/P&gt;&lt;P&gt;policy-map multi-match POLICY&lt;BR /&gt;&amp;nbsp; class rule-vsuiteFrontEnd-A_CLASS&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy rule-vsuiteFrontEnd-A_POLICY&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip icmp-reply active&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection advanced-options rule-vsuiteFrontEnd-A_CONN_PARAM&lt;BR /&gt;policy-map multi-match POLICY-CoreA&lt;BR /&gt;&amp;nbsp; class rule-vsuiteFrontEnd-CoreA_CLASS&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy rule-vsuiteFrontEnd-CoreA_POLICY&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip icmp-reply active&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection advanced-options rule-vsuiteFrontEnd-CoreA_CONN_PARAM&lt;BR /&gt;policy-map multi-match SERVERSOURCED&lt;BR /&gt;&amp;nbsp; class SERVERSOURCED&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat dynamic 1 vlan 700&lt;BR /&gt;policy-map multi-match SERVERSOURCED-CoreA&lt;BR /&gt;&amp;nbsp; class SERVERSOURCED-CoreA&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat dynamic 2 vlan 700&lt;/P&gt;&lt;P&gt;service-policy input POLICY&lt;BR /&gt;service-policy input POLICY-CoreA&lt;/P&gt;&lt;P&gt;interface vlan 700&lt;BR /&gt;&amp;nbsp; ip address 10.22.6.116 255.255.255.224&lt;BR /&gt;&amp;nbsp; no icmp-guard&lt;BR /&gt;&amp;nbsp; access-group input ACL_10&lt;BR /&gt;&amp;nbsp; nat-pool 1 10.22.6.117 10.22.6.117 netmask 255.255.255.255 pat&lt;BR /&gt;&amp;nbsp; nat-pool 2 10.22.6.119 10.22.6.119 netmask 255.255.255.255 pat&lt;BR /&gt;&amp;nbsp; service-policy input REMOTE_ACCESS_POLICY&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;interface vlan 701&lt;BR /&gt;&amp;nbsp; ip address 10.22.7.2 255.255.255.224&lt;BR /&gt;&amp;nbsp; no icmp-guard&lt;BR /&gt;&amp;nbsp; access-group input ACL_20&lt;BR /&gt;&amp;nbsp; service-policy input SERVERSOURCED&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;interface vlan 704&lt;BR /&gt;&amp;nbsp; ip address 10.22.7.34 255.255.255.224&lt;BR /&gt;&amp;nbsp; no icmp-guard&lt;BR /&gt;&amp;nbsp; access-group input ACL_20&lt;BR /&gt;&amp;nbsp; service-policy input SERVERSOURCED-CoreA&lt;BR /&gt;&amp;nbsp; no shutdown&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.22.6.1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 12:43:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347760#M40900</guid>
      <dc:creator>CharlesM1</dc:creator>
      <dc:date>2013-08-09T12:43:09Z</dc:date>
    </item>
    <item>
      <title>ACE 4710 Resttrict traffic to HTTPS and SSH only</title>
      <link>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347761#M40901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Charles, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is not clear what you want to accomplish here. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you need to restrict access to the ACE to only SSH and HTTPS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you need to restrict routed traffic thru the ACE to permit only SSH and HTTPS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you going to loadbalance SSH and HTTPS servers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------------- &lt;BR /&gt;Cesar R &lt;BR /&gt;ANS Team&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 22:13:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347761#M40901</guid>
      <dc:creator>Cesar Roque</dc:creator>
      <dc:date>2013-08-09T22:13:04Z</dc:date>
    </item>
    <item>
      <title>ACE 4710 Resttrict traffic to HTTPS and SSH only</title>
      <link>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347762#M40902</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Charles, I would do this with the interface access-list. You will need to explicitly permit the traffic to be load balanced, mgmt traffic and all https/ssh and deny everything else. Matthew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Aug 2013 10:27:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347762#M40902</guid>
      <dc:creator>mwinnett</dc:creator>
      <dc:date>2013-08-12T10:27:43Z</dc:date>
    </item>
    <item>
      <title>ACE 4710 Resttrict traffic to HTTPS and SSH only</title>
      <link>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347763#M40903</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Matthew&lt;BR /&gt;I'm not very familar with the commands and syntax used with this device, I'd like someone to guide me with the particular commands needed to make this occur.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greatly appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Aug 2013 12:03:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347763#M40903</guid>
      <dc:creator>CharlesM1</dc:creator>
      <dc:date>2013-08-12T12:03:59Z</dc:date>
    </item>
    <item>
      <title>ACE 4710 Resttrict traffic to HTTPS and SSH only</title>
      <link>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347764#M40904</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Charles&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to sit down and determine what traffic you&amp;nbsp; want to permit into the device. There is an implicit "deny ip any any"&amp;nbsp; at the end of each acl. The access-lists below permit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- anyone external to reach the vips for https&lt;/P&gt;&lt;P&gt;- anyone local (ie: vlans 701 &amp;amp; 702) to reach the vips for https&lt;/P&gt;&lt;P&gt;- anyone local to initiate ssh/https to anyone remote&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_701 line&amp;nbsp; 8 extended permit tcp&amp;nbsp; 10.22.7.0 255.255.255.224 any eq ssh&lt;BR /&gt;access-list ACL_701 line 16 extended permit tcp&amp;nbsp; 10.22.7.0 255.255.255.224 any eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_702 line&amp;nbsp; 8 extended permit tcp&amp;nbsp; 10.22.7.32 255.255.255.224 any eq ssh&lt;BR /&gt;access-list ACL_702 line 16 extended permit tcp&amp;nbsp; 10.22.7.32 255.255.255.224 any eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_700 line&amp;nbsp; 8 extended permit tcp&amp;nbsp; any host 10.22.7.2 eq https&lt;BR /&gt;access-list ACL_700 line 16 extended permit tcp&amp;nbsp; any host 10.22.7.34 eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not&amp;nbsp; sure if the following lines are required to permit the return traffic&amp;nbsp; for local to remote ssh/https. Don't have lab access to test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-lisy ACL_700 line 24 extended permit tcp any eq ssh 10.22.7.0 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-lisy ACL_700 line 32 extended permit tcp any eq ssh 10.22.7.0 255.255.255.224 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-lisy ACL_700 line 40 extended permit tcp any eq https 10.22.7.32 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-lisy ACL_700 line 48 extended permit tcp any eq https 10.22.7.32 255.255.255.224 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apply ACL_700 to vlan 700 in etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; When you implement the changes, make sure that you have independent access to the console in case you block yourself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/vA2_3_0/configuration/security/guide/acl.html"&gt;http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/vA2_3_0/configuration/security/guide/acl.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matthew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Aug 2013 09:45:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347764#M40904</guid>
      <dc:creator>mwinnett</dc:creator>
      <dc:date>2013-08-15T09:45:11Z</dc:date>
    </item>
    <item>
      <title>ACE 4710 Resttrict traffic to HTTPS and SSH only</title>
      <link>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347765#M40905</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you Matthew,I'll give this a go, and let you know, really appreciate the help..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Aug 2013 12:43:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-4710-resttrict-traffic-to-https-and-ssh-only/m-p/2347765#M40905</guid>
      <dc:creator>CharlesM1</dc:creator>
      <dc:date>2013-08-15T12:43:55Z</dc:date>
    </item>
  </channel>
</rss>

