<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem with SSL module in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/problem-with-ssl-module/m-p/440158#M8073</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like the status of your ssl serverfarm is "FAILED".&lt;/P&gt;&lt;P&gt;So that is the first thing to look for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would remove the keyword 'local' from the real definition.&lt;/P&gt;&lt;P&gt;FAILED actually means the CSM does not even have an arp entry for the SSL address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I would verify connectivity by issuing ping from the CSM to the SSLM.&lt;/P&gt;&lt;P&gt;You could try to configure the MSFC in vlan 130 as well just to see if you can ping from MSFC to CSM or MSFC to SSLM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 Nov 2005 15:45:57 GMT</pubDate>
    <dc:creator>Gilles Dufour</dc:creator>
    <dc:date>2005-11-17T15:45:57Z</dc:date>
    <item>
      <title>Problem with SSL module</title>
      <link>https://community.cisco.com/t5/application-networking/problem-with-ssl-module/m-p/440157#M8072</link>
      <description>&lt;P&gt;I've got 6509 with SSL, CSM inside. I'm having problem with creating connectin to VIP on 443 port pointing to SSL module. My configuration is based on "Catalyst 6500 Series Switch Content Switching Module with SSL Installation and Configuration" document , Appendix B; B-7; CSM-S Configuration Example (Router Mode, Server NAT). It's seems to be simple but it's not working. Could anybody take a look at these excerpt from config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VLAN to outside is 200; to SSL 150 (admin), 130 traffic; to clients 120.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssl-proxy module 4 allowed-vlan 120,130,150&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; vlan 200 client&lt;/P&gt;&lt;P&gt;  description Traffic from clients.&lt;/P&gt;&lt;P&gt;  ip address X.23.48.5 255.255.255.0 alt X.23.48.6 255.255.255.0&lt;/P&gt;&lt;P&gt;  gateway X.23.48.10&lt;/P&gt;&lt;P&gt;  alias X.23.48.4 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; vlan 120 server&lt;/P&gt;&lt;P&gt;  description Server traffic&lt;/P&gt;&lt;P&gt;  ip address 192.168.200.2 255.255.255.0 alt 192.168.200.3 255.255.255.0&lt;/P&gt;&lt;P&gt;  alias 192.168.200.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vlan 130 server&lt;/P&gt;&lt;P&gt;  description SSL-DC traffic&lt;/P&gt;&lt;P&gt;  ip address 172.16.0.21 255.255.255.0 alt 172.16.0.31 255.255.255.0&lt;/P&gt;&lt;P&gt;  alias 172.16.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; serverfarm SSL-TEST&lt;/P&gt;&lt;P&gt;  nat server&lt;/P&gt;&lt;P&gt;  no nat client&lt;/P&gt;&lt;P&gt;  real 172.16.0.182 local&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; serverfarm WWW-TEST&lt;/P&gt;&lt;P&gt;  nat server&lt;/P&gt;&lt;P&gt;  no nat client&lt;/P&gt;&lt;P&gt;  real 192.168.200.110&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; vserver SSL-VIP-TEST&lt;/P&gt;&lt;P&gt;  virtual X.23.48.110 tcp https&lt;/P&gt;&lt;P&gt;  serverfarm SSL-TEST&lt;/P&gt;&lt;P&gt;  persistent rebalance&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; vserver WWW-VIP-TEST&lt;/P&gt;&lt;P&gt;  virtual X.23.48.110 tcp www&lt;/P&gt;&lt;P&gt;  serverfarm WWW-TEST&lt;/P&gt;&lt;P&gt;  persistent rebalance&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan150&lt;/P&gt;&lt;P&gt; description Polaczenie do SSL akceleratora&lt;/P&gt;&lt;P&gt; ip address 10.10.10.11 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan200&lt;/P&gt;&lt;P&gt; description VLAN do FWSM&lt;/P&gt;&lt;P&gt; ip address X.23.48.9 255.255.255.0&lt;/P&gt;&lt;P&gt; standby 1 ip X.23.48.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and on SSL module:&lt;/P&gt;&lt;P&gt;ssl-proxy service SSL-TEST&lt;/P&gt;&lt;P&gt; virtual ipaddr 172.16.0.182 protocol tcp port 443 secondary&lt;/P&gt;&lt;P&gt; server ipaddr X.23.48.110 protocol tcp port 80&lt;/P&gt;&lt;P&gt; certificate rsa general-purpose trustpoint ssl.allegro.pl&lt;/P&gt;&lt;P&gt; inservice&lt;/P&gt;&lt;P&gt;ssl-proxy vlan 150&lt;/P&gt;&lt;P&gt; ipaddr 10.10.10.2 255.255.255.0&lt;/P&gt;&lt;P&gt; gateway 10.10.10.11&lt;/P&gt;&lt;P&gt; admin&lt;/P&gt;&lt;P&gt;ssl-proxy vlan 130&lt;/P&gt;&lt;P&gt; ipaddr 172.16.0.2 255.255.255.0&lt;/P&gt;&lt;P&gt; gateway 172.16.0.1&lt;/P&gt;&lt;P&gt; route X.23.48.0 255.255.255.0 gateway 172.16.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can connect to real for WWW traffic but can't for SSL traffic.&lt;/P&gt;&lt;P&gt;192.168.200.110       WWW-TEST         8       OPERATIONAL    0&lt;/P&gt;&lt;P&gt;172.16.0.182          SSL-TEST         8       FAILED         0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any hint? Can't figure it out:(&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tia&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2005 08:29:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/problem-with-ssl-module/m-p/440157#M8072</guid>
      <dc:creator>marcin.mazurek</dc:creator>
      <dc:date>2005-11-17T08:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with SSL module</title>
      <link>https://community.cisco.com/t5/application-networking/problem-with-ssl-module/m-p/440158#M8073</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like the status of your ssl serverfarm is "FAILED".&lt;/P&gt;&lt;P&gt;So that is the first thing to look for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would remove the keyword 'local' from the real definition.&lt;/P&gt;&lt;P&gt;FAILED actually means the CSM does not even have an arp entry for the SSL address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I would verify connectivity by issuing ping from the CSM to the SSLM.&lt;/P&gt;&lt;P&gt;You could try to configure the MSFC in vlan 130 as well just to see if you can ping from MSFC to CSM or MSFC to SSLM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Nov 2005 15:45:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/problem-with-ssl-module/m-p/440158#M8073</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2005-11-17T15:45:57Z</dc:date>
    </item>
  </channel>
</rss>

