We have a Cisco CSM-S content switch with SSL. Currently our website is behind this switch, which performs load balancing for the HTTP and SSL sites. The http and https sites use different hostnames
***** http://www.site.com=>* *==>Main servers * C * * S * * M * https://secure.site.com=>* *==>Ecom servers *****
The SSL traffic is decrypted by the SSL daughter-card in the CSM, and traffic is then routed by URL to the various servers based on the HTTP hostname. I'd like to add HTTPS support to the main site for non-ecom secure pages but my admin says the CSM isn't capable of routing the traffic in this way. Here is my planned config:
***** http://www.site.com=>* *=(http)=>Main servers https://www.site.com=>* C * * S * * M * https://secure.site.com=>* *=(http)=>Ecom servers (secure network) *****
The way I understand it, the SSL daughtercard should be operating at a layer beneath the HTTP routing, and thus the fact that the main site's secure and non-secure pages all go to the same internal servers should allow this configuration to work.
Does anyone know if the CSM-S supports this configuration? And if it does, how can I describe to my admin how it needs to be set up?
If www.site.com and secure.site.com resolve to different IP addresses, I don't see how this could be a problem. We have a non-SSL CSM and do this today. The main extras that the CSM-S get you are visibility into SSL packets for load balancing purposes and hardware SSL termination.
If the sites resolve to the same IP address, then your admin is right that it will be a problem. It wouldn't be any different from trying to host these two distinct SSL sites on a single Web server without the CSM-S present. With HTTPS, the server has to negotiate SSL before the client has a chance to tell the server which site it wants. If you have a regular single-host certificate, and the server (or CSM-S) has to talk SSL for multiple sites on a single IP, it will have no way of knowing which certificate to present to the client.
There are three ways that I know of to support multiple name-based SSL sites on a single IP:
If you aren't already doing so, running www.site.com and secure.site.com on different IP addresses will probably be the easiest thing for you to do. If the CSM-S can load balance based on Host: header and not just ip:port, then changing to a SAN or wildcard cert shared by both sites is another option.
James posted while I was typing...way to steal my thunder =)
I would add to James comments tho:
Example:
versus
plus