<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I don't suggest that you in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/vip-to-vip-communication-behind-same-ace/m-p/2734617#M42885</link>
    <description>&lt;P&gt;I don't suggest that you tweak the ACE to accept asymmetric traffic. If reply packets avoid the ACE, it is not capable of any advanced L7 function. In addition, real servers send replies with their real src IP addresses while the initiating servers expect the reply packets with the VIP address. So the connections&amp;nbsp;cannot be established.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Set up source NAT, I would prefer static 1-to-1 NAT to identify which server the traffic comes from.&lt;/P&gt;</description>
    <pubDate>Fri, 02 Oct 2015 06:12:11 GMT</pubDate>
    <dc:creator>Peter Koltl</dc:creator>
    <dc:date>2015-10-02T06:12:11Z</dc:date>
    <item>
      <title>VIP to VIP Communication behind same ACE</title>
      <link>https://community.cisco.com/t5/application-networking/vip-to-vip-communication-behind-same-ace/m-p/2734614#M42882</link>
      <description>&lt;P&gt;Running into an issue I've never worked with before.&amp;nbsp; Consider this scenario:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Serverfarm1 and Serverfarm2 (physical servers) live on the same ACE behind this network:&lt;/P&gt;&lt;P&gt;192.168.1.0/24&lt;/P&gt;&lt;P&gt;Serverfarm1 and Serverfarm2's Load Balanced Addresses live behind this network:&lt;/P&gt;&lt;P&gt;192.168.2.0/24.&amp;nbsp; Let's say they have 192.168.2.10 (serverfarm1) and 192.168.2.11 (serverfarm2)&lt;/P&gt;&lt;P&gt;The physicals on serverfarm1 (192.168.1.0/24) need to send traffic to the VIP of serverfarm2.&lt;/P&gt;&lt;P&gt;Right now this isn't working and I'm not sure why.&amp;nbsp; I am making the assumption that the servers on Serverfarm1 are configured correctly with the alias ip for the ACE VLAN Interface of their subnet.&amp;nbsp; Doing a sh connec &amp;lt;serverfarm&amp;gt; doesn't yield any information to indicate the connections are establishing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Being the ACE's are basically security devices my thought was this isn't going to be allowed but I can't see why.&amp;nbsp; We've run into things related to the security features before.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Going to set up some sniffer captures to see where/if it is hitting the wire.&amp;nbsp; So that's the question - is this something the ACE will not allow?&amp;nbsp; The traffic is syslog (udp/514) so not TCP connection to be established.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2015 20:55:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/vip-to-vip-communication-behind-same-ace/m-p/2734614#M42882</guid>
      <dc:creator>cmills</dc:creator>
      <dc:date>2015-09-28T20:55:28Z</dc:date>
    </item>
    <item>
      <title>Hi, If the two VIPs</title>
      <link>https://community.cisco.com/t5/application-networking/vip-to-vip-communication-behind-same-ace/m-p/2734615#M42883</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the two VIPs serverfarms are in the same context then you will need to source-NAT traffic from the rservers to an address in the serverside VLAN. If you don't do this then the traffic becomes asymmetric and is dropped by the ACE (unless you disable some of the security features).&lt;/P&gt;&lt;P&gt;The extract below allows the rservers to communicate with another VIP in a context:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map match-any REAL-SERVERS&lt;BR /&gt;&amp;nbsp; 2 match source-address 10.10.10.181 255.255.255.255&lt;BR /&gt;&amp;nbsp; 3 match source-address 10.10.10.182 255.255.255.255&lt;BR /&gt;&amp;nbsp; 4 match source-address 10.10.10.183 255.255.255.255&lt;BR /&gt;&amp;nbsp; 5 match source-address 10.10.10.184 255.255.255.255&lt;BR /&gt;&amp;nbsp; 6 match source-address 10.10.10.186 255.255.255.255&lt;BR /&gt;&amp;nbsp; 7 match source-address 10.10.10.187 255.255.255.255&lt;BR /&gt;&amp;nbsp; 8 match source-address 10.10.10.188 255.255.255.255&lt;/P&gt;&lt;P&gt;policy-map multi-match L4POLICY&lt;/P&gt;&lt;P&gt;...&lt;BR /&gt;&amp;nbsp; class REAL-SERVERS&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat dynamic 1 vlan 382&lt;/P&gt;&lt;P&gt;interface vlan 382&lt;BR /&gt;&amp;nbsp; description ACE-Web1-Serverside&lt;BR /&gt;&amp;nbsp; ip address 10.10.10.178 255.255.255.240&lt;BR /&gt;&amp;nbsp; alias 10.10.10.177 255.255.255.240&lt;BR /&gt;&amp;nbsp; peer ip address 10.10.10.179 255.255.255.240&lt;BR /&gt;&amp;nbsp; access-group input PERMIT-ALL&lt;BR /&gt;&amp;nbsp; access-group output PERMIT-ALL&lt;BR /&gt;&amp;nbsp; nat-pool 1 10.10.10.190 10.10.10.190 netmask 255.255.255.240 pat&lt;BR /&gt;&amp;nbsp; no shutdown&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Cathy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2015 14:52:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/vip-to-vip-communication-behind-same-ace/m-p/2734615#M42883</guid>
      <dc:creator>ciscocsoc</dc:creator>
      <dc:date>2015-09-29T14:52:32Z</dc:date>
    </item>
    <item>
      <title>Yep...I did some further</title>
      <link>https://community.cisco.com/t5/application-networking/vip-to-vip-communication-behind-same-ace/m-p/2734616#M42884</link>
      <description>&lt;P&gt;Yep...I did some further research last night and that's what kept being the recurring theme.&lt;/P&gt;&lt;P&gt;We already disabled normalization.&amp;nbsp; What security features can be disabled to facilitate this?&lt;/P&gt;&lt;P&gt;They are in the same context, but a different VIP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2015 19:10:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/vip-to-vip-communication-behind-same-ace/m-p/2734616#M42884</guid>
      <dc:creator>cmills</dc:creator>
      <dc:date>2015-09-29T19:10:05Z</dc:date>
    </item>
    <item>
      <title>I don't suggest that you</title>
      <link>https://community.cisco.com/t5/application-networking/vip-to-vip-communication-behind-same-ace/m-p/2734617#M42885</link>
      <description>&lt;P&gt;I don't suggest that you tweak the ACE to accept asymmetric traffic. If reply packets avoid the ACE, it is not capable of any advanced L7 function. In addition, real servers send replies with their real src IP addresses while the initiating servers expect the reply packets with the VIP address. So the connections&amp;nbsp;cannot be established.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Set up source NAT, I would prefer static 1-to-1 NAT to identify which server the traffic comes from.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2015 06:12:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/vip-to-vip-communication-behind-same-ace/m-p/2734617#M42885</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2015-10-02T06:12:11Z</dc:date>
    </item>
  </channel>
</rss>

