<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Introduction of SSLM into a MSFC-FWSM-CSM Bridge Mode Config in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471559#M8801</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've attached a logical diagram of the existing setup as well as the SSLM placement (where i think it fits in). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've also came up with a draft configuration below, i don't really understand NAT client and NAT server applications:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;module ContentSwitchingModule 7 &lt;/P&gt;&lt;P&gt; ft group 1 vlan 201 &lt;/P&gt;&lt;P&gt;  priority 110 alt 100&lt;/P&gt;&lt;P&gt;  heartbeat-time 1 &lt;/P&gt;&lt;P&gt;  failover 3 &lt;/P&gt;&lt;P&gt;  preempt &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vlan 6 client&lt;/P&gt;&lt;P&gt;  ip address 192.168.20.4 255.255.255.0 alt 192.168.20.5 255.255.255.0&lt;/P&gt;&lt;P&gt;  gateway 192.168.20.1&lt;/P&gt;&lt;P&gt;  alias 192.168.20.6 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vlan 60 server&lt;/P&gt;&lt;P&gt;  ip address 192.168.20.4 255.255.255.0 alt 192.168.20.5 255.255.255.0&lt;/P&gt;&lt;P&gt;!         &lt;/P&gt;&lt;P&gt; vlan 7 client&lt;/P&gt;&lt;P&gt;  ip address 192.168.10.4 255.255.255.0 alt 192.168.10.5 255.255.255.0&lt;/P&gt;&lt;P&gt;  alias 192.168.10.6 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vlan 70 server&lt;/P&gt;&lt;P&gt;  ip address 192.168.10.4 255.255.255.0 alt 192.168.10.5 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vlan 40 server&lt;/P&gt;&lt;P&gt;  ip address 192.168.60.4 255.255.255.0 alt 192.168.60.5 255.255.255.0&lt;/P&gt;&lt;P&gt;  alias 192.168.60.6 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; probe ICMP icmp&lt;/P&gt;&lt;P&gt;  interval 3 &lt;/P&gt;&lt;P&gt;  failed 5 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; probe HTTPWEB http&lt;/P&gt;&lt;P&gt;  interval 3 &lt;/P&gt;&lt;P&gt;  failed 5 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; probe HTTPSWEB tcp&lt;/P&gt;&lt;P&gt;  interval 3 &lt;/P&gt;&lt;P&gt;  failed 5 &lt;/P&gt;&lt;P&gt;  port 445 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; probe TCP tcp&lt;/P&gt;&lt;P&gt;  interval 2 &lt;/P&gt;&lt;P&gt;  failed 3 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; serverfarm MOCINT-VIP1&lt;/P&gt;&lt;P&gt;  nat server&lt;/P&gt;&lt;P&gt;  no nat client&lt;/P&gt;&lt;P&gt;  predictor leastconns&lt;/P&gt;&lt;P&gt;  real 192.168.20.71&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  real 192.168.20.72&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  probe ICMP&lt;/P&gt;&lt;P&gt;  probe HTTPWEB&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; serverfarm MOCWEB-VIP1&lt;/P&gt;&lt;P&gt;  nat server&lt;/P&gt;&lt;P&gt;  no nat client&lt;/P&gt;&lt;P&gt;  predictor leastconns&lt;/P&gt;&lt;P&gt;  real 192.168.10.65&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  real 192.168.10.66&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  probe ICMP&lt;/P&gt;&lt;P&gt;  probe HTTPWEB&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; serverfarm SSL-MOCINT&lt;/P&gt;&lt;P&gt;  nat server&lt;/P&gt;&lt;P&gt;  no nat client&lt;/P&gt;&lt;P&gt;  real 192.168.60.11 445&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  real 192.168.60.12 445&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  probe TCP&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; serverfarm SSL-MOCWEB&lt;/P&gt;&lt;P&gt;  nat server&lt;/P&gt;&lt;P&gt;  no nat client&lt;/P&gt;&lt;P&gt;  real 192.168.60.21 445&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  real 192.168.60.22 445&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  probe TCP&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; sticky 10 netmask 255.255.255.255 timeout 20&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; sticky 20 cookie cookie-server timeout 30&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vserver DECRYPT-MOCINT&lt;/P&gt;&lt;P&gt;  virtual 192.168.60.10 tcp 445&lt;/P&gt;&lt;P&gt;  vlan 40&lt;/P&gt;&lt;P&gt;  serverfarm MOCINT-VIP1&lt;/P&gt;&lt;P&gt;  replicate csrp sticky&lt;/P&gt;&lt;P&gt;  persistent rebalance&lt;/P&gt;&lt;P&gt;  parse-length 4000&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vserver DECRYPT-MOCWEB&lt;/P&gt;&lt;P&gt;  virtual 192.168.60.20 tcp 445&lt;/P&gt;&lt;P&gt;  vlan 40&lt;/P&gt;&lt;P&gt;  serverfarm MOCWEB-VIP1&lt;/P&gt;&lt;P&gt;  replicate csrp sticky&lt;/P&gt;&lt;P&gt;  persistent rebalance&lt;/P&gt;&lt;P&gt;  parse-length 4000&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vserver HTTP-MOCINT&lt;/P&gt;&lt;P&gt;  virtual 192.168.20.70 tcp www&lt;/P&gt;&lt;P&gt;  vlan 6&lt;/P&gt;&lt;P&gt;  serverfarm MOCINT-VIP1&lt;/P&gt;&lt;P&gt;  advertise active&lt;/P&gt;&lt;P&gt;  sticky 20 group 10&lt;/P&gt;&lt;P&gt;  replicate csrp sticky&lt;/P&gt;&lt;P&gt;  persistent rebalance&lt;/P&gt;&lt;P&gt;  parse-length 4000&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vserver HTTP-MOCWEB&lt;/P&gt;&lt;P&gt;  virtual 192.168.10.60 tcp www&lt;/P&gt;&lt;P&gt;  vlan 7&lt;/P&gt;&lt;P&gt;  serverfarm MOCWEB-VIP1&lt;/P&gt;&lt;P&gt;  advertise active&lt;/P&gt;&lt;P&gt;  sticky 30 group 20&lt;/P&gt;&lt;P&gt;  replicate csrp sticky&lt;/P&gt;&lt;P&gt;  persistent rebalance&lt;/P&gt;&lt;P&gt;  parse-length 4000&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vserver HTTPS-MOCINT&lt;/P&gt;&lt;P&gt;  virtual 192.168.20.70 tcp https&lt;/P&gt;&lt;P&gt;  vlan 6  &lt;/P&gt;&lt;P&gt;  serverfarm SSL-MOCINT&lt;/P&gt;&lt;P&gt;  persistent rebalance&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vserver HTTPS-MOCWEB&lt;/P&gt;&lt;P&gt;  virtual 192.168.10.60 tcp https&lt;/P&gt;&lt;P&gt;  vlan 7&lt;/P&gt;&lt;P&gt;  serverfarm SSL-MOCWEB&lt;/P&gt;&lt;P&gt;  persistent rebalance&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 21 Jan 2006 09:40:05 GMT</pubDate>
    <dc:creator>zeremy</dc:creator>
    <dc:date>2006-01-21T09:40:05Z</dc:date>
    <item>
      <title>Introduction of SSLM into a MSFC-FWSM-CSM Bridge Mode Configuration</title>
      <link>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471558#M8800</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need serious help here..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm facing a challenging situation here.&lt;/P&gt;&lt;P&gt;Customer just purchased a pair of SSLM module for their web server HTTPS termination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the situation.&lt;/P&gt;&lt;P&gt;Currently customer already have a pair of Catalyst 6509 running with MSFC-&amp;gt;FWSM&amp;lt;-&amp;gt;CSM Bridge Configuration (i.e. client and server vlan on the same subnet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been assigned the task to deploy SSLSM module seaminglessly onto this existing setup without any other major configuration changes required on their systems by this week.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is currently they doing bridge configuration between FWSM - CSM. How do I transparently deploy SSLM in this situation ? without changing any i.p. addresses which will break their server-to-server communications.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I read and understand CSM-SSLM bridge configuration but that requires changing their i.p. addressing scheme? hopefully somebody shed some light on this...&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jan 2006 09:31:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471558#M8800</guid>
      <dc:creator>zeremy</dc:creator>
      <dc:date>2006-01-21T09:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: Introduction of SSLM into a MSFC-FWSM-CSM Bridge Mode Config</title>
      <link>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471559#M8801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've attached a logical diagram of the existing setup as well as the SSLM placement (where i think it fits in). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've also came up with a draft configuration below, i don't really understand NAT client and NAT server applications:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;module ContentSwitchingModule 7 &lt;/P&gt;&lt;P&gt; ft group 1 vlan 201 &lt;/P&gt;&lt;P&gt;  priority 110 alt 100&lt;/P&gt;&lt;P&gt;  heartbeat-time 1 &lt;/P&gt;&lt;P&gt;  failover 3 &lt;/P&gt;&lt;P&gt;  preempt &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vlan 6 client&lt;/P&gt;&lt;P&gt;  ip address 192.168.20.4 255.255.255.0 alt 192.168.20.5 255.255.255.0&lt;/P&gt;&lt;P&gt;  gateway 192.168.20.1&lt;/P&gt;&lt;P&gt;  alias 192.168.20.6 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vlan 60 server&lt;/P&gt;&lt;P&gt;  ip address 192.168.20.4 255.255.255.0 alt 192.168.20.5 255.255.255.0&lt;/P&gt;&lt;P&gt;!         &lt;/P&gt;&lt;P&gt; vlan 7 client&lt;/P&gt;&lt;P&gt;  ip address 192.168.10.4 255.255.255.0 alt 192.168.10.5 255.255.255.0&lt;/P&gt;&lt;P&gt;  alias 192.168.10.6 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vlan 70 server&lt;/P&gt;&lt;P&gt;  ip address 192.168.10.4 255.255.255.0 alt 192.168.10.5 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vlan 40 server&lt;/P&gt;&lt;P&gt;  ip address 192.168.60.4 255.255.255.0 alt 192.168.60.5 255.255.255.0&lt;/P&gt;&lt;P&gt;  alias 192.168.60.6 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; probe ICMP icmp&lt;/P&gt;&lt;P&gt;  interval 3 &lt;/P&gt;&lt;P&gt;  failed 5 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; probe HTTPWEB http&lt;/P&gt;&lt;P&gt;  interval 3 &lt;/P&gt;&lt;P&gt;  failed 5 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; probe HTTPSWEB tcp&lt;/P&gt;&lt;P&gt;  interval 3 &lt;/P&gt;&lt;P&gt;  failed 5 &lt;/P&gt;&lt;P&gt;  port 445 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; probe TCP tcp&lt;/P&gt;&lt;P&gt;  interval 2 &lt;/P&gt;&lt;P&gt;  failed 3 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; serverfarm MOCINT-VIP1&lt;/P&gt;&lt;P&gt;  nat server&lt;/P&gt;&lt;P&gt;  no nat client&lt;/P&gt;&lt;P&gt;  predictor leastconns&lt;/P&gt;&lt;P&gt;  real 192.168.20.71&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  real 192.168.20.72&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  probe ICMP&lt;/P&gt;&lt;P&gt;  probe HTTPWEB&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; serverfarm MOCWEB-VIP1&lt;/P&gt;&lt;P&gt;  nat server&lt;/P&gt;&lt;P&gt;  no nat client&lt;/P&gt;&lt;P&gt;  predictor leastconns&lt;/P&gt;&lt;P&gt;  real 192.168.10.65&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  real 192.168.10.66&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  probe ICMP&lt;/P&gt;&lt;P&gt;  probe HTTPWEB&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; serverfarm SSL-MOCINT&lt;/P&gt;&lt;P&gt;  nat server&lt;/P&gt;&lt;P&gt;  no nat client&lt;/P&gt;&lt;P&gt;  real 192.168.60.11 445&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  real 192.168.60.12 445&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  probe TCP&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; serverfarm SSL-MOCWEB&lt;/P&gt;&lt;P&gt;  nat server&lt;/P&gt;&lt;P&gt;  no nat client&lt;/P&gt;&lt;P&gt;  real 192.168.60.21 445&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  real 192.168.60.22 445&lt;/P&gt;&lt;P&gt;   inservice&lt;/P&gt;&lt;P&gt;  probe TCP&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; sticky 10 netmask 255.255.255.255 timeout 20&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; sticky 20 cookie cookie-server timeout 30&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vserver DECRYPT-MOCINT&lt;/P&gt;&lt;P&gt;  virtual 192.168.60.10 tcp 445&lt;/P&gt;&lt;P&gt;  vlan 40&lt;/P&gt;&lt;P&gt;  serverfarm MOCINT-VIP1&lt;/P&gt;&lt;P&gt;  replicate csrp sticky&lt;/P&gt;&lt;P&gt;  persistent rebalance&lt;/P&gt;&lt;P&gt;  parse-length 4000&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vserver DECRYPT-MOCWEB&lt;/P&gt;&lt;P&gt;  virtual 192.168.60.20 tcp 445&lt;/P&gt;&lt;P&gt;  vlan 40&lt;/P&gt;&lt;P&gt;  serverfarm MOCWEB-VIP1&lt;/P&gt;&lt;P&gt;  replicate csrp sticky&lt;/P&gt;&lt;P&gt;  persistent rebalance&lt;/P&gt;&lt;P&gt;  parse-length 4000&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vserver HTTP-MOCINT&lt;/P&gt;&lt;P&gt;  virtual 192.168.20.70 tcp www&lt;/P&gt;&lt;P&gt;  vlan 6&lt;/P&gt;&lt;P&gt;  serverfarm MOCINT-VIP1&lt;/P&gt;&lt;P&gt;  advertise active&lt;/P&gt;&lt;P&gt;  sticky 20 group 10&lt;/P&gt;&lt;P&gt;  replicate csrp sticky&lt;/P&gt;&lt;P&gt;  persistent rebalance&lt;/P&gt;&lt;P&gt;  parse-length 4000&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vserver HTTP-MOCWEB&lt;/P&gt;&lt;P&gt;  virtual 192.168.10.60 tcp www&lt;/P&gt;&lt;P&gt;  vlan 7&lt;/P&gt;&lt;P&gt;  serverfarm MOCWEB-VIP1&lt;/P&gt;&lt;P&gt;  advertise active&lt;/P&gt;&lt;P&gt;  sticky 30 group 20&lt;/P&gt;&lt;P&gt;  replicate csrp sticky&lt;/P&gt;&lt;P&gt;  persistent rebalance&lt;/P&gt;&lt;P&gt;  parse-length 4000&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vserver HTTPS-MOCINT&lt;/P&gt;&lt;P&gt;  virtual 192.168.20.70 tcp https&lt;/P&gt;&lt;P&gt;  vlan 6  &lt;/P&gt;&lt;P&gt;  serverfarm SSL-MOCINT&lt;/P&gt;&lt;P&gt;  persistent rebalance&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; vserver HTTPS-MOCWEB&lt;/P&gt;&lt;P&gt;  virtual 192.168.10.60 tcp https&lt;/P&gt;&lt;P&gt;  vlan 7&lt;/P&gt;&lt;P&gt;  serverfarm SSL-MOCWEB&lt;/P&gt;&lt;P&gt;  persistent rebalance&lt;/P&gt;&lt;P&gt;  inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Jan 2006 09:40:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471559#M8801</guid>
      <dc:creator>zeremy</dc:creator>
      <dc:date>2006-01-21T09:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: Introduction of SSLM into a MSFC-FWSM-CSM Bridge Mode Config</title>
      <link>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471560#M8802</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is a sample config for sslm and csm in bridge mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/modules/ps2706/products_configuration_example09186a00802c1201.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/modules/ps2706/products_configuration_example09186a00802c1201.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewall module should simply be placed in the upper vlan [vlan 50] in the example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wrote the document so I hope you will find it useful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;P&gt;Thanks for rating this answer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jan 2006 13:37:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471560#M8802</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2006-01-23T13:37:52Z</dc:date>
    </item>
    <item>
      <title>Re: Introduction of SSLM into a MSFC-FWSM-CSM Bridge Mode Config</title>
      <link>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471561#M8803</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the url, I find it very useful.&lt;/P&gt;&lt;P&gt;I'll study it and test it out in our labs, thanks again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jan 2006 02:51:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471561#M8803</guid>
      <dc:creator>zeremy</dc:creator>
      <dc:date>2006-01-26T02:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: Introduction of SSLM into a MSFC-FWSM-CSM Bridge Mode Config</title>
      <link>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471562#M8804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Did you get a chance to test the above config.. Could you please post the working configs for both the CSM and the SSL Module.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Btw, I have this very basic question... I am trying to design a similar setup with CSM in bridged mode for multiple segments (I mean multiple Server/Client pairs), just the same way zeremy has in his network. I see that zeremy has used Vlan40 for the SSL segment. My question is whether this VLan40 SSL segment can serve both the Internet as well as the Intranet server farms (See Zeremy's diag)? My assumption was that i will need one proxy-ssl vlan for each of the server/client pair that i am trying to load balance. Isnt this true..? Please advise..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Feb 2006 19:18:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471562#M8804</guid>
      <dc:creator>vramanaiah</dc:creator>
      <dc:date>2006-02-13T19:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: Introduction of SSLM into a MSFC-FWSM-CSM Bridge Mode Config</title>
      <link>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471563#M8805</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you only need 1 proxy-vlan to go from csm to ssl.&lt;/P&gt;&lt;P&gt;The SSLM is not aware of how many vlans you have on the CSM.  One proxy-vlan can server all internal and external traffic.&lt;/P&gt;&lt;P&gt;The CSM is the device that will do the routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Feb 2006 08:12:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471563#M8805</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2006-02-14T08:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: Introduction of SSLM into a MSFC-FWSM-CSM Bridge Mode Config</title>
      <link>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471564#M8806</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, attached is the working config. I've tested so far no problems..I just need to tweak the stickiness configuration,. Comments anyone?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've only used Vlan40 (SSL segment) to serve both my internet and intranet server farms. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Feb 2006 08:54:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471564#M8806</guid>
      <dc:creator>zeremy</dc:creator>
      <dc:date>2006-02-14T08:54:09Z</dc:date>
    </item>
    <item>
      <title>Re: Introduction of SSLM into a MSFC-FWSM-CSM Bridge Mode Config</title>
      <link>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471565#M8807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you both for your prompt replies..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just a follow up question on SSL redundancy.. I have got two CSM-S modules on 2 diff 6K chassis. I assume, we can configure the CSMs only in Active/Standby mode. However, is it possible to make the SSL daughter boards to load share in Active-Active mode. I know if these were SSL modules instead of daughter boards, we can load share the SSL Modules. However, in my case, both the SSL are part of CSM. So, i will have to configure the local keyword while defining the REAL-SSL-offloaders. When the CSMs switchover, the local keyword will result in conflict. Hope i made my question clear..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Feb 2006 10:04:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/introduction-of-sslm-into-a-msfc-fwsm-csm-bridge-mode/m-p/471565#M8807</guid>
      <dc:creator>vramanaiah</dc:creator>
      <dc:date>2006-02-15T10:04:53Z</dc:date>
    </item>
  </channel>
</rss>

