<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 6500 w/csm ,Server Farm with 4 ssl modules  in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/6500-w-csm-server-farm-with-4-ssl-modules/m-p/369210#M6322</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have found a way roud this.&lt;/P&gt;&lt;P&gt;If you enable ssl-sticky under the vserver it will allow you to see the source address and the next hop(which should be the ssl module address) with the command "sh module contentSwitchingModule all sticky".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 11 Jan 2005 12:51:14 GMT</pubDate>
    <dc:creator>spencedavid21</dc:creator>
    <dc:date>2005-01-11T12:51:14Z</dc:date>
    <item>
      <title>6500 w/csm ,Server Farm with 4 ssl modules</title>
      <link>https://community.cisco.com/t5/application-networking/6500-w-csm-server-farm-with-4-ssl-modules/m-p/369208#M6320</link>
      <description>&lt;P&gt;What CSM command can I use to find which SSL module is being used. &lt;/P&gt;&lt;P&gt;When diagnosing problems I would like to find out which SSL module the client is hitting.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2005 11:07:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/6500-w-csm-server-farm-with-4-ssl-modules/m-p/369208#M6320</guid>
      <dc:creator>spencedavid21</dc:creator>
      <dc:date>2005-01-11T11:07:11Z</dc:date>
    </item>
    <item>
      <title>Re: 6500 w/csm ,Server Farm with 4 ssl modules</title>
      <link>https://community.cisco.com/t5/application-networking/6500-w-csm-server-farm-with-4-ssl-modules/m-p/369209#M6321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;actually if you do not nat the destination ip address, there is currently no way to see which real/ssl module is being used.&lt;/P&gt;&lt;P&gt;There is a feature request open for this already.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest you to log into each ssl module and issue a 'sho ssl-proxy conn' to find out which one received the connection from your client ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Jan 2005 11:27:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/6500-w-csm-server-farm-with-4-ssl-modules/m-p/369209#M6321</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2005-01-11T11:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: 6500 w/csm ,Server Farm with 4 ssl modules</title>
      <link>https://community.cisco.com/t5/application-networking/6500-w-csm-server-farm-with-4-ssl-modules/m-p/369210#M6322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have found a way roud this.&lt;/P&gt;&lt;P&gt;If you enable ssl-sticky under the vserver it will allow you to see the source address and the next hop(which should be the ssl module address) with the command "sh module contentSwitchingModule all sticky".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Jan 2005 12:51:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/6500-w-csm-server-farm-with-4-ssl-modules/m-p/369210#M6322</guid>
      <dc:creator>spencedavid21</dc:creator>
      <dc:date>2005-01-11T12:51:14Z</dc:date>
    </item>
    <item>
      <title>Re: 6500 w/csm ,Server Farm with 4 ssl modules</title>
      <link>https://community.cisco.com/t5/application-networking/6500-w-csm-server-farm-with-4-ssl-modules/m-p/369211#M6323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We've found another way to do this.  It leverages the fact that the CSM includes the IN and OUT VLAN information in the session table.  So, assume you put SSL module #1 in VLAN #11, SSL module #2 in VLAN #2, SSL module #3 in VLAN 13 and SSL module #4 in VLAN 14.  When you do a 'sh mod csm X conns client xx.xx.xx.xx' you get something like the following (IP addresses changed to protect the innocent):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;    prot vlan source                destination           state       &lt;/P&gt;&lt;P&gt;----------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;In  TCP  800  11.23.235.162:40546   2.6.46.5:443         ESTAB     &lt;/P&gt;&lt;P&gt;Out TCP  13   2.6.46.5:443          11.23.235.162:40546  ESTAB     &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you know there is only 1 SSL module in VLAN 13 (the OUT VLAN) you know exactly which SSL module the session went to.  In this case, SSL Module #3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also used this in places where we do firewall load balancing and don't use sticky.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jan 2005 12:57:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/6500-w-csm-server-farm-with-4-ssl-modules/m-p/369211#M6323</guid>
      <dc:creator>robert.breen.hbp2</dc:creator>
      <dc:date>2005-01-12T12:57:30Z</dc:date>
    </item>
  </channel>
</rss>

