<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I guess it should work fine in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/how-to-configure-ace-to-send-the-response-as-forbidden-code-or/m-p/2458667#M41704</link>
    <description>&lt;P&gt;I guess it should work fine as to drop requests for everybody but the problem that I'm facing is:&lt;/P&gt;&lt;P&gt;- Everybody can access url "www.example.com" through vip 70.10.10.11 to serverfarm EXAMPLE-80.&lt;/P&gt;&lt;P&gt;- but only the 2 adresses 23.22.21.2 /23 can access "www.example.com/admin"&amp;nbsp; ( same vip and serverfarm) and requests from other source Ip adresses are dropped.&lt;/P&gt;&lt;P&gt;Could you please be more specific in your suggestion.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 30 Apr 2014 19:31:51 GMT</pubDate>
    <dc:creator>algorythm19</dc:creator>
    <dc:date>2014-04-30T19:31:51Z</dc:date>
    <item>
      <title>how to configure ace to send the response as forbidden code or bad request based on the URL string</title>
      <link>https://community.cisco.com/t5/application-networking/how-to-configure-ace-to-send-the-response-as-forbidden-code-or/m-p/2458663#M41700</link>
      <description>&lt;P&gt;I have a requirement where ACE has to forbidden the HTTP access to the URL based on the strings in the URL &amp;nbsp;/admin/ or /console/ . &amp;nbsp;I believe I can match the traffic with the following class-map, but how to action on it to forbidden? example configurations?&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type http loadbalance match-any Forbidden-admin-access&lt;BR /&gt;&amp;nbsp; &amp;nbsp;2 match http url /admin/.*&lt;BR /&gt;&amp;nbsp; &amp;nbsp;3 match http url /console/.*&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 11:36:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/how-to-configure-ace-to-send-the-response-as-forbidden-code-or/m-p/2458663#M41700</guid>
      <dc:creator>svenkateshv</dc:creator>
      <dc:date>2014-04-10T11:36:54Z</dc:date>
    </item>
    <item>
      <title>Hi Sven,ACE cannot give</title>
      <link>https://community.cisco.com/t5/application-networking/how-to-configure-ace-to-send-the-response-as-forbidden-code-or/m-p/2458664#M41701</link>
      <description>&lt;P&gt;Hi Sven,&lt;/P&gt;&lt;P&gt;ACE cannot give response but can allow, drop or reset the connection based on L7 information or you can make ACE to forward the traffic to servers which can send those responses after the above condition is matched. But surely can "Silently" drop or reset the connection as well. Pasting configuration below for your reference.&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;&lt;STRONG&gt;If you want to send a reset, then you would need to use 'inspect' as such:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type http inspect match-all CM-INSPECT&lt;/P&gt;&lt;P&gt;2 match header Host header-value "private.example.com"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map match-all VIP_WWW&lt;/P&gt;&lt;P&gt;2 match virtual-address 10.86.178.167 tcp eq www&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type inspect http all-match PM-INSPECT&lt;BR /&gt;class CM-INSPECT&lt;BR /&gt;reset&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type loadbalance first-match WWW_SERVERS&lt;BR /&gt;class class-default&lt;BR /&gt;serverfarm SERVER_FARM&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;policy-map multi-match VIP&lt;BR /&gt;class VIP_WWW&lt;BR /&gt;loadbalance vip inservice&lt;BR /&gt;loadbalance policy WWW_SERVERS&lt;BR /&gt;inspect http policy PM-INSPECT&lt;BR /&gt;loadbalance vip icmp-reply&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Now, if you would rather not send a RST, but just drop it, then you would use 'loadbalance' as such:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type http loadbalance match-any CM-DROP&lt;BR /&gt;2 match http header Host header-value "private.example.com"&lt;/P&gt;&lt;P&gt;class-map match-all VIP_WWW&lt;/P&gt;&lt;P&gt;2 match virtual-address 10.86.178.167 tcp eq www&lt;/P&gt;&lt;P&gt;policy-map type loadbalance first-match WWW_SERVERS&lt;BR /&gt;class CM-DROP&lt;BR /&gt;drop&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;class class-default&lt;BR /&gt;serverfarm SERVER_FARM&lt;/P&gt;&lt;P&gt;policy-map multi-match VIP&lt;BR /&gt;class VIP_WWW&lt;BR /&gt;loadbalance vip inservice&lt;BR /&gt;loadbalance policy WWW_SERVERS&lt;BR /&gt;loadbalance vip icmp-reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 10 Apr 2014 14:28:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/how-to-configure-ace-to-send-the-response-as-forbidden-code-or/m-p/2458664#M41701</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2014-04-10T14:28:29Z</dc:date>
    </item>
    <item>
      <title>Hi Kanwalsi,I'm facing the</title>
      <link>https://community.cisco.com/t5/application-networking/how-to-configure-ace-to-send-the-response-as-forbidden-code-or/m-p/2458665#M41702</link>
      <description>&lt;P&gt;Hi Kanwalsi,&lt;/P&gt;&lt;P&gt;I'm facing the same issue but with the following difference:&lt;/P&gt;&lt;P&gt;I'd like to permit everyone access to ie. &lt;A href="https://community.cisco.com/www.abc.com" target="_blank"&gt;www.abc.com&lt;/A&gt; but allow access to &lt;A href="https://community.cisco.com/www.abc.com/admin" target="_blank"&gt;www.abc.com/admin&lt;/A&gt; only to specific ip adresses. Please let me know if you have any suggestion.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2014 03:00:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/how-to-configure-ace-to-send-the-response-as-forbidden-code-or/m-p/2458665#M41702</guid>
      <dc:creator>algorythm19</dc:creator>
      <dc:date>2014-04-30T03:00:47Z</dc:date>
    </item>
    <item>
      <title>Hi,You should have L7 class</title>
      <link>https://community.cisco.com/t5/application-networking/how-to-configure-ace-to-send-the-response-as-forbidden-code-or/m-p/2458666#M41703</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You should have L7 class map statement like:&lt;/P&gt;&lt;P&gt;class-map type http inspect match-all CM-inspect&lt;BR /&gt;&amp;nbsp; 2 match url /admin&lt;/P&gt;&lt;P&gt;And then call this class-map under policy map etc as shown above and check if it works fine. The action should be either DROP or RESET depending upon your preference.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2014 03:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/how-to-configure-ace-to-send-the-response-as-forbidden-code-or/m-p/2458666#M41703</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2014-04-30T03:30:37Z</dc:date>
    </item>
    <item>
      <title>I guess it should work fine</title>
      <link>https://community.cisco.com/t5/application-networking/how-to-configure-ace-to-send-the-response-as-forbidden-code-or/m-p/2458667#M41704</link>
      <description>&lt;P&gt;I guess it should work fine as to drop requests for everybody but the problem that I'm facing is:&lt;/P&gt;&lt;P&gt;- Everybody can access url "www.example.com" through vip 70.10.10.11 to serverfarm EXAMPLE-80.&lt;/P&gt;&lt;P&gt;- but only the 2 adresses 23.22.21.2 /23 can access "www.example.com/admin"&amp;nbsp; ( same vip and serverfarm) and requests from other source Ip adresses are dropped.&lt;/P&gt;&lt;P&gt;Could you please be more specific in your suggestion.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2014 19:31:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/how-to-configure-ace-to-send-the-response-as-forbidden-code-or/m-p/2458667#M41704</guid>
      <dc:creator>algorythm19</dc:creator>
      <dc:date>2014-04-30T19:31:51Z</dc:date>
    </item>
    <item>
      <title>Hi,I am sorry but i didn't</title>
      <link>https://community.cisco.com/t5/application-networking/how-to-configure-ace-to-send-the-response-as-forbidden-code-or/m-p/2458668#M41705</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am sorry but i didn't get your question here. Are you saying that everyone who comes to &lt;A href="https://community.cisco.com/www.example.com" target="_blank"&gt;www.example.com&lt;/A&gt; is getting access but only two users are being dropped when they go to &lt;A href="https://community.cisco.com/www.example.com/admin" target="_blank"&gt;www.example.com/admin&lt;/A&gt;? Are all other users getting access to /admin too? Can you share the configuration in place?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;</description>
      <pubDate>Thu, 01 May 2014 17:29:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/how-to-configure-ace-to-send-the-response-as-forbidden-code-or/m-p/2458668#M41705</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2014-05-01T17:29:26Z</dc:date>
    </item>
    <item>
      <title>Hi,In fact, no configurations</title>
      <link>https://community.cisco.com/t5/application-networking/how-to-configure-ace-to-send-the-response-as-forbidden-code-or/m-p/2458669#M41706</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;In fact, no configurations have been made yet and what i described is what I want to accomplish. meaning:&lt;/P&gt;&lt;P&gt;Everybody should be permitted to access www.example.com&lt;/P&gt;&lt;P&gt;But only 2 source ip addresses should be permitted to access &lt;A href="https://community.cisco.com/www.example.com/admin" target="_blank"&gt;www.example.com/admin&lt;/A&gt;. All&amp;nbsp; requests coming from other IP addresses should be dropped for that specific url.&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 May 2014 21:17:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/how-to-configure-ace-to-send-the-response-as-forbidden-code-or/m-p/2458669#M41706</guid>
      <dc:creator>algorythm19</dc:creator>
      <dc:date>2014-05-01T21:17:44Z</dc:date>
    </item>
  </channel>
</rss>

