<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Config SSL on Cisco ACE 4710 in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/config-ssl-on-cisco-ace-4710/m-p/2357479#M40958</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Singh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;there is one more requirment which is i want to access the server on port base&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://www.xyz.com:9000"&gt;https://www.xyz.com:9000&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what is the way to allow port 9000 and another port 9001 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 28 Dec 2013 08:51:22 GMT</pubDate>
    <dc:creator>alkabeer80</dc:creator>
    <dc:date>2013-12-28T08:51:22Z</dc:date>
    <item>
      <title>Config SSL on Cisco ACE 4710</title>
      <link>https://community.cisco.com/t5/application-networking/config-ssl-on-cisco-ace-4710/m-p/2357477#M40956</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the first time i am configuring cisco ACE for SSL offloading, i need help in accomplish this task.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have router outside which nat public ip to vip on ace. i want to configure ssl offloading on ace and after ACE traffic to pass as clear text port 80.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have purchased public certifcate and install it on ACE, internal server is not yet ready .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How i can verify my config. , Is this correct , first i dont want to apply any filter or any L7 inspection ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to test it before the server is ready ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rserver host Host1&lt;BR /&gt;&amp;nbsp; ip address 1.1.1.1&lt;BR /&gt;&amp;nbsp; conn-limit max 4000000 min 4000000&lt;BR /&gt;&amp;nbsp; probe HTTP&lt;BR /&gt;&amp;nbsp; inservic&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;serverfarm host SF1&lt;BR /&gt;&amp;nbsp; probe HTTP&lt;BR /&gt;&amp;nbsp; rserver Host1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn-limit max 4000000 min 4000000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;sticky ip-netmask 255.255.255.255 address source STICKY&lt;BR /&gt;&amp;nbsp; timeout 60&lt;BR /&gt;&amp;nbsp; timeout activeconns&lt;BR /&gt;&amp;nbsp; serverfarm SF1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssl-proxy service ID1&lt;BR /&gt;&amp;nbsp; key KEY1.PEM&lt;BR /&gt;&amp;nbsp; cert ID1.pem&lt;BR /&gt;&amp;nbsp; chaingroup ID&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map match-all VIP_ID&lt;BR /&gt;&amp;nbsp; 2 match virtual-address 1.1.1.2 tcp eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type loadbalance first-match VIP_ID-l7slb&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sticky-serverfarm STICKY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map multi-match Client-side-VIP&lt;BR /&gt;&amp;nbsp; class VIP_ID&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy VIP_ID-l7slb&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat dynamic 2 vlan 11&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ssl-proxy server ID1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show crypto certificate all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ID1.pem:&lt;BR /&gt;Subject: /serialNumber=***********&lt;BR /&gt;Issuer: *******&lt;BR /&gt;Not Before: Nov 20 08:33:55 2013 GMT&lt;BR /&gt;Not After: Nov 21 10:53:19 2016 GMT&lt;BR /&gt;CA Cert: FALSE&lt;/P&gt;</description>
      <pubDate>Fri, 27 Dec 2013 16:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/config-ssl-on-cisco-ace-4710/m-p/2357477#M40956</guid>
      <dc:creator>alkabeer80</dc:creator>
      <dc:date>2013-12-27T16:32:35Z</dc:date>
    </item>
    <item>
      <title>Config SSL on Cisco ACE 4710</title>
      <link>https://community.cisco.com/t5/application-networking/config-ssl-on-cisco-ace-4710/m-p/2357478#M40957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Alkabeer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration looks fine. For the testing purpose you can use any machine or device which is accessible through HTTP and add it as rserver and try to access it through VIP. You can use test certificate and key for that purpose. Ensure that you mention 80 in front of rserver in serverfarm so that ACE forwards the traffic to backend rserver on port 80.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Dec 2013 17:36:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/config-ssl-on-cisco-ace-4710/m-p/2357478#M40957</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2013-12-27T17:36:14Z</dc:date>
    </item>
    <item>
      <title>Config SSL on Cisco ACE 4710</title>
      <link>https://community.cisco.com/t5/application-networking/config-ssl-on-cisco-ace-4710/m-p/2357479#M40958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Singh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;there is one more requirment which is i want to access the server on port base&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://www.xyz.com:9000"&gt;https://www.xyz.com:9000&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what is the way to allow port 9000 and another port 9001 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Dec 2013 08:51:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/config-ssl-on-cisco-ace-4710/m-p/2357479#M40958</guid>
      <dc:creator>alkabeer80</dc:creator>
      <dc:date>2013-12-28T08:51:22Z</dc:date>
    </item>
    <item>
      <title>Config SSL on Cisco ACE 4710</title>
      <link>https://community.cisco.com/t5/application-networking/config-ssl-on-cisco-ace-4710/m-p/2357480#M40959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Alkabeer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default ACE will use the same destination port&amp;nbsp; which will come in client request to VIP for forwarding the connection to rserver.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if a request is https, ACE will send the traffic to the backend rserver at port 443. If it is 80, then it will send at port 80 to rserver.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want that request from client comes on port 443 but goes on port 9000 at the backend to rserver then you should add port for rserver under serverfarm. For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;serverfarm host SF1&lt;/P&gt;&lt;P&gt;probe HTTP&lt;/P&gt;&lt;P&gt;rserver Host1&amp;nbsp;&amp;nbsp; 9000&amp;lt;------------------------------------------ This should be defined.&lt;/P&gt;&lt;P&gt;conn-limit max 4000000 min 4000000&lt;/P&gt;&lt;P&gt;inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this answers your question. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Dec 2013 12:41:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/config-ssl-on-cisco-ace-4710/m-p/2357480#M40959</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2013-12-28T12:41:03Z</dc:date>
    </item>
  </channel>
</rss>

