<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssl timeouts in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331761#M5451</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By the way, in my opinion, you are not compromising security simply because the packets are still ssl all the way to the server. The encryption is fine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pete.. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 18 Mar 2005 13:54:07 GMT</pubDate>
    <dc:creator>pknoops</dc:creator>
    <dc:date>2005-03-18T13:54:07Z</dc:date>
    <item>
      <title>ssl timeouts</title>
      <link>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331757#M5447</link>
      <description>&lt;P&gt;Hello. I am having a problem with timeouts when using ssl load balancing. The ssl termination point is on the webserver. I am hitting the VIP on port 443 and then balancing between 2 servers at the backend. The problem is that the users' sessions are timing out at random intervals. When one of the servers is powered down this issue does not happen. Could this be something to do with the content switch and flow timeouts?? I have added the line "sticky-inact-timeout 45" thinking that it might be that but it has not made a difference. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config is as follows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;********************************&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;service ugwprd01-ssl-2443 &lt;/P&gt;&lt;P&gt;  ip address 10.48.7.3 &lt;/P&gt;&lt;P&gt;  protocol tcp &lt;/P&gt;&lt;P&gt;  port 2443 &lt;/P&gt;&lt;P&gt;  keepalive type ssl &lt;/P&gt;&lt;P&gt;  redundant-index 210 &lt;/P&gt;&lt;P&gt;  active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service ugwprd02-ssl-2443 &lt;/P&gt;&lt;P&gt;  ip address 10.48.7.6 &lt;/P&gt;&lt;P&gt;  protocol tcp &lt;/P&gt;&lt;P&gt;  port 2443 &lt;/P&gt;&lt;P&gt;  keepalive type ssl &lt;/P&gt;&lt;P&gt;  redundant-index 220 &lt;/P&gt;&lt;P&gt;  active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;***************************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;owner x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; content x&lt;/P&gt;&lt;P&gt;    vip address 10.48.1.6 &lt;/P&gt;&lt;P&gt;    port 443 &lt;/P&gt;&lt;P&gt;    protocol tcp &lt;/P&gt;&lt;P&gt;    application ssl &lt;/P&gt;&lt;P&gt;    add service ugwprd01-ssl-2443 &lt;/P&gt;&lt;P&gt;    add service ugwprd02-ssl-2443 &lt;/P&gt;&lt;P&gt;    redundant-index 1210 &lt;/P&gt;&lt;P&gt;    advanced-balance ssl &lt;/P&gt;&lt;P&gt;    sticky-inact-timeout 45 &lt;/P&gt;&lt;P&gt;    active &lt;/P&gt;&lt;P&gt;*************************************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THANKS!&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2005 18:49:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331757#M5447</guid>
      <dc:creator>donaghq_2</dc:creator>
      <dc:date>2005-03-16T18:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: ssl timeouts</title>
      <link>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331758#M5448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You may be running into an IE issue whereby the SSL session id is changed every 2 minutes. This becomes a problem when using advanced-balance ssl and application ssl as this is l5 stickyness based on session id. After 2 minutes, this changes. With only one server you will not see this occur as you are on the same server to begin with. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only solution here is to use some type of SSL temrination device that we offer such as an SCA. You may also want to back off the VIP to layer 4 and not use application ssl and advanced-balance ssl and have the content rule look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;content x &lt;/P&gt;&lt;P&gt;vip address 10.48.1.6 &lt;/P&gt;&lt;P&gt;port 443 &lt;/P&gt;&lt;P&gt;protocol tcp  &lt;/P&gt;&lt;P&gt;add service ugwprd01-ssl-2443 &lt;/P&gt;&lt;P&gt;add service ugwprd02-ssl-2443 &lt;/P&gt;&lt;P&gt;redundant-index 1210 &lt;/P&gt;&lt;P&gt;active &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See if changing to L4 makes things work better.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Pete Knoops&lt;/P&gt;&lt;P&gt;Cisco Systems&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Mar 2005 19:46:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331758#M5448</guid>
      <dc:creator>pknoops</dc:creator>
      <dc:date>2005-03-16T19:46:32Z</dc:date>
    </item>
    <item>
      <title>Re: ssl timeouts</title>
      <link>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331759#M5449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have tried that and the users appear to be happy so thank you. I have had to put in stickiness based on source IP in order to get it to work. Will stickiness work on source IP even if I am natting a public IP to a private one? Am I compromising security by not balancing on SSL? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Mar 2005 10:08:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331759#M5449</guid>
      <dc:creator>donaghq_2</dc:creator>
      <dc:date>2005-03-18T10:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: ssl timeouts</title>
      <link>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331760#M5450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to hear things are better. Source IP sticky will work fine in a NATing senario as long as it is not a many to one nat. If each user has his/her own ip address after being NAT'd, it should be fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pete..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Mar 2005 13:46:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331760#M5450</guid>
      <dc:creator>pknoops</dc:creator>
      <dc:date>2005-03-18T13:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: ssl timeouts</title>
      <link>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331761#M5451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By the way, in my opinion, you are not compromising security simply because the packets are still ssl all the way to the server. The encryption is fine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pete.. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Mar 2005 13:54:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331761#M5451</guid>
      <dc:creator>pknoops</dc:creator>
      <dc:date>2005-03-18T13:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: ssl timeouts</title>
      <link>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331762#M5452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it is a many to one NAT! any ideas on what I should do now?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Mar 2005 14:39:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331762#M5452</guid>
      <dc:creator>donaghq_2</dc:creator>
      <dc:date>2005-03-18T14:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: ssl timeouts</title>
      <link>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331763#M5453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it is a many to one NAT! any ideas on what I should do now?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Mar 2005 14:39:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331763#M5453</guid>
      <dc:creator>donaghq_2</dc:creator>
      <dc:date>2005-03-18T14:39:55Z</dc:date>
    </item>
    <item>
      <title>Re: ssl timeouts</title>
      <link>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331764#M5454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm, that's a tough one. Cookies is not an option because it is SSL traffic and will be encrypted. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may be at a point where you need to have some type of SSL termination device prior to getting load balanced like using an SCA or an SSL module on the CSS itself. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general, because of the IE timeout issue, your ONLY option is Sticky Source IP. With the NATing involved now, I believe you need to turn to another hardware solution from an SSL termination perspective working in conjunction with the CSS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pete..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Mar 2005 15:02:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331764#M5454</guid>
      <dc:creator>pknoops</dc:creator>
      <dc:date>2005-03-18T15:02:02Z</dc:date>
    </item>
    <item>
      <title>Re: ssl timeouts</title>
      <link>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331765#M5455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;as it turns out the application people were not happy with the L4 service. They maintain that when they switched one of the webservers off they got "page cannot be displayed" which is fine. They say that upon the fourth refresh they got back the page that they were previously in back i.e they were not forced to logon again. This seems to strange to me and defeats the purpose of ssl. Would there be any logical explanation for this. The same SSL cert resides on the two webservers. Maybe this is the reason for the seamless changeover?! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The business have subseqently decided to go with "advance-balance ssl" with one webserver as this has been extensively tested. There will have to be manual changeover in case of failure which is not ideal. In any case I will have to find a satisfactory resolution to this, albeit L4 or L5 balancing!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Mar 2005 15:59:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331765#M5455</guid>
      <dc:creator>donaghq_2</dc:creator>
      <dc:date>2005-03-18T15:59:44Z</dc:date>
    </item>
    <item>
      <title>Re: ssl timeouts</title>
      <link>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331766#M5456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;According to this document: &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/contnetw/ps789/products_configuration_example09186a0080094068.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/contnetw/ps789/products_configuration_example09186a0080094068.shtml&lt;/A&gt;    , "SSL ID renegotiation problem" is with IE 5.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you talking about the same problem?  Are other IE versions affected too?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CT Yau&lt;/P&gt;&lt;P&gt;Hong Kong&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Mar 2005 08:16:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ssl-timeouts/m-p/331766#M5456</guid>
      <dc:creator>ct_yau</dc:creator>
      <dc:date>2005-03-22T08:16:00Z</dc:date>
    </item>
  </channel>
</rss>

