<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Backend SSL Help in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/backend-ssl-help/m-p/504270#M9520</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Gilles... that's the way it was looking to me but for some reason I was thinking since the processing for the backend ssl was internal to the lbs, it was not processed against the acls... I was just about to change the acls to test but my change window was up and I had to roll back... I'll let you know how it goes!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your input...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dennis&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 05 Dec 2005 15:29:11 GMT</pubDate>
    <dc:creator>dennis-hess</dc:creator>
    <dc:date>2005-12-05T15:29:11Z</dc:date>
    <item>
      <title>Backend SSL Help</title>
      <link>https://community.cisco.com/t5/application-networking/backend-ssl-help/m-p/504268#M9518</link>
      <description>&lt;P&gt;I tried to implement backend SSL over the weekend and was unsuccessful. I've read all the posts here on ssl back to January and I was sure I had a solid config. I saw lots of traffic hitting the ssl module but it would not pass to the backend content rule. I was getting no hits on the backend services. I've attached the config below. This is our production load balancers so I don't have a place to play with it. Does anyone spot anything glaringly wrong with this? I think it may be an acl issue but I didn't think traffic generated internally from the CSS to the backend ssl was subject to acls. Either that or a source NAT issue, or lack thereof as that's how we ensure traffic returns through the lb. There is an acl on the frontside that has applies NAT via a source group. Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssl associate rsakey key key.pem &lt;/P&gt;&lt;P&gt;ssl associate cert cert cert.cer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssl-proxy-list ssl_list3 &lt;/P&gt;&lt;P&gt; ssl-server 10 &lt;/P&gt;&lt;P&gt; ssl-server 10 port 50003&lt;/P&gt;&lt;P&gt; ssl-server 10 rsakey key &lt;/P&gt;&lt;P&gt; ssl-server 10 rsacert cert&lt;/P&gt;&lt;P&gt; ssl-server 10 cipher rsa-with-rc4-128-md5 192.168.254.10 81 &lt;/P&gt;&lt;P&gt; ssl-server 10 vip address 10.100.24.11&lt;/P&gt;&lt;P&gt; backend-server 10&lt;/P&gt;&lt;P&gt; backend-server 10 cipher rsa-export-with-rc4-40-md5 &lt;/P&gt;&lt;P&gt; backend-server 10 type backend-ssl &lt;/P&gt;&lt;P&gt; backend-server 10 ip address 10.100.8.225 &lt;/P&gt;&lt;P&gt; backend-server 10 server-ip 10.100.8.225&lt;/P&gt;&lt;P&gt; backend-server 10 server-port 50003&lt;/P&gt;&lt;P&gt; backend-server 10 port 81 &lt;/P&gt;&lt;P&gt; backend-server 20&lt;/P&gt;&lt;P&gt; backend-server 20 cipher rsa-export-with-rc4-40-md5 &lt;/P&gt;&lt;P&gt; backend-server 20 type backend-ssl &lt;/P&gt;&lt;P&gt; backend-server 20 ip address 10.100.9.137 &lt;/P&gt;&lt;P&gt; backend-server 20 server-ip 10.100.9.137&lt;/P&gt;&lt;P&gt; backend-server 20 server-port 50003&lt;/P&gt;&lt;P&gt; backend-server 20 port 81 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service ssl_module3 &lt;/P&gt;&lt;P&gt; type ssl-accel &lt;/P&gt;&lt;P&gt; keepalive type none &lt;/P&gt;&lt;P&gt; slot 3 &lt;/P&gt;&lt;P&gt; add ssl-proxy-list ssl_list3 &lt;/P&gt;&lt;P&gt; active &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;***Services***&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service us6qpp01-50003&lt;/P&gt;&lt;P&gt; ip address 10.100.8.225&lt;/P&gt;&lt;P&gt; type ssl-accel-backend&lt;/P&gt;&lt;P&gt; port 81&lt;/P&gt;&lt;P&gt; add ssl-proxy-list ssl_list3&lt;/P&gt;&lt;P&gt; keepalive type ssl&lt;/P&gt;&lt;P&gt; keepalive port 50003 &lt;/P&gt;&lt;P&gt; protocol tcp &lt;/P&gt;&lt;P&gt; active &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service us6qpp02-50003&lt;/P&gt;&lt;P&gt; ip address 10.100.9.137&lt;/P&gt;&lt;P&gt; type ssl-accel-backend&lt;/P&gt;&lt;P&gt; port 81&lt;/P&gt;&lt;P&gt; add ssl-proxy-list ssl_list3&lt;/P&gt;&lt;P&gt; keepalive type ssl&lt;/P&gt;&lt;P&gt; keepalive port 50003 &lt;/P&gt;&lt;P&gt; protocol tcp &lt;/P&gt;&lt;P&gt; active &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;***Content***&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; content PortalFront &lt;/P&gt;&lt;P&gt; protocol tcp &lt;/P&gt;&lt;P&gt; vip address 10.100.24.11 &lt;/P&gt;&lt;P&gt; application ssl&lt;/P&gt;&lt;P&gt; advanced-balance ssl  &lt;/P&gt;&lt;P&gt; add service ssl_module3 &lt;/P&gt;&lt;P&gt; port 50003 &lt;/P&gt;&lt;P&gt; active &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; content PortalBack &lt;/P&gt;&lt;P&gt; protocol tcp &lt;/P&gt;&lt;P&gt; port 81&lt;/P&gt;&lt;P&gt; url "/*" &lt;/P&gt;&lt;P&gt; vip address 192.168.254.10 &lt;/P&gt;&lt;P&gt; add service us6qpp01-50003 &lt;/P&gt;&lt;P&gt; add service us6qpp02-50003 &lt;/P&gt;&lt;P&gt; advanced-balance arrowpoint-cookie &lt;/P&gt;&lt;P&gt; active &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group group_backside_nat &lt;/P&gt;&lt;P&gt;  vip address 10.100.24.129 &lt;/P&gt;&lt;P&gt;  active &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clause 10 permit tcp any destination content Owner1/PortalFront sourcegroup group_backside_nat &lt;/P&gt;&lt;P&gt;clause 11 permit tcp any destination 10.100.24.11 eq 50003&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2005 11:26:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/backend-ssl-help/m-p/504268#M9518</guid>
      <dc:creator>dennis-hess</dc:creator>
      <dc:date>2005-12-05T11:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: Backend SSL Help</title>
      <link>https://community.cisco.com/t5/application-networking/backend-ssl-help/m-p/504269#M9519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Everything coming out of the SSL module is consideed traffic coming into the CSS.&lt;/P&gt;&lt;P&gt;Therefore acl are applied to this traffic.&lt;/P&gt;&lt;P&gt;The source vlan is the same as for the traffic that entered the SSL module.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you need a &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clause 12 permit tcp any destination 192.168.254.10 eq 81&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may have to permit traffic to real as well.  Can't remember for sure this part.&lt;/P&gt;&lt;P&gt;I assume you have to based on the rule mentioned above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Dec 2005 15:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/backend-ssl-help/m-p/504269#M9519</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2005-12-05T15:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: Backend SSL Help</title>
      <link>https://community.cisco.com/t5/application-networking/backend-ssl-help/m-p/504270#M9520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Gilles... that's the way it was looking to me but for some reason I was thinking since the processing for the backend ssl was internal to the lbs, it was not processed against the acls... I was just about to change the acls to test but my change window was up and I had to roll back... I'll let you know how it goes!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your input...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dennis&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Dec 2005 15:29:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/backend-ssl-help/m-p/504270#M9520</guid>
      <dc:creator>dennis-hess</dc:creator>
      <dc:date>2005-12-05T15:29:11Z</dc:date>
    </item>
  </channel>
</rss>

