<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Procurve 7102 in Switches, Hubs, and Modems</title>
    <link>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626371#M22351</link>
    <description>Olaf, &lt;BR /&gt;&lt;BR /&gt;I setup a port forward on the Access Policy bound to my internal interface, now SSL traffic bound for my external IP just seems to die if I have it before my NAT policy, and doesn't do anything if it is after my NAT policy.&lt;BR /&gt;&lt;BR /&gt;Doesn't show up at all in the show ip policy-sessions that I can find, whether I have port forwarding turned on or not.&lt;BR /&gt;&lt;BR /&gt;Early on I tried to setup a second external IP address to segregate traffic between outgoing and incoming, but it wouldn't let me have two interfaces on the same VLAN (I require external VLAN tagging).&lt;BR /&gt;&lt;BR /&gt;If I change the SSL management port, it still doesn't redirect. I have gone into my NAT settings, and told it to NOT NAT traffic that is destined for my external IP address, but still no dice.&lt;BR /&gt;&lt;BR /&gt;I know it has to be possible, but I'll be damned if I can find the right combination.</description>
    <pubDate>Mon, 03 May 2010 14:50:08 GMT</pubDate>
    <dc:creator>William E Howard</dc:creator>
    <dc:date>2010-05-03T14:50:08Z</dc:date>
    <item>
      <title>Procurve 7102</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626366#M22346</link>
      <description>I have a 7102 router as my external router, and I am running into an issue. I have it set to only allow management via SSL from the internal networks. I also have port forwarding turned on the external interface for 443 to one of my internal web servers. This works fine, except if I want to test this internally, and go to the External IP address via SSL, it is trying to log into the management instead of forwarding the ports. &lt;BR /&gt;&lt;BR /&gt;This also causes problems with people using Phones on WiFi, trying to hit my Webmail server. DNS reports external IP address, but they cannot hit it because they are internal. If I change the DNS to use the internal IP of the server, it is causing a cert error.&lt;BR /&gt;&lt;BR /&gt;This is probably a simple fix, but its been several months since I worked with these routers, and I don't see where I can set this security setting.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 29 Apr 2010 22:03:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626366#M22346</guid>
      <dc:creator>William E Howard</dc:creator>
      <dc:date>2010-04-29T22:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: Procurve 7102</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626367#M22347</link>
      <description>Hi William&lt;BR /&gt;&lt;BR /&gt;Just an idea ... why not just change the secure management web server port number ?&lt;BR /&gt;&lt;BR /&gt;ADSL-7102(config)#ip http secure-server&lt;BR /&gt;&lt;CR&gt;&lt;BR /&gt;&lt;TCP port=""&gt;               - Specify an alternate port for the HTTPS&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;Gerhard&lt;/TCP&gt;&lt;/CR&gt;</description>
      <pubDate>Fri, 30 Apr 2010 07:55:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626367#M22347</guid>
      <dc:creator>Gerhard Roets</dc:creator>
      <dc:date>2010-04-30T07:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: Procurve 7102</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626368#M22348</link>
      <description>Great idea, tried it out, didn't work. :(&lt;BR /&gt;It is still not redirecting all web traffic I direct to my router. &lt;BR /&gt;&lt;BR /&gt;I'll call Procurve support, see if they can solve this.</description>
      <pubDate>Fri, 30 Apr 2010 13:13:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626368#M22348</guid>
      <dc:creator>William E Howard</dc:creator>
      <dc:date>2010-04-30T13:13:23Z</dc:date>
    </item>
    <item>
      <title>Re: Procurve 7102</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626369#M22349</link>
      <description>Well, HP didn't know the answer. Said there was no way to just turn off management for the external interface. &lt;BR /&gt;&lt;BR /&gt;They recommended setting up an ACL, blocking SSL traffic from hitting my external IP address, but I am afraid that will stop people from being able to browse SSL websites.&lt;BR /&gt;&lt;BR /&gt;I think what I need to do is setup a static route, for all internal traffic directed to my external IP, send it to the gateway for my external IP, then let it come back. &lt;BR /&gt;&lt;BR /&gt;Anyone have any thoughts or better ideas?</description>
      <pubDate>Fri, 30 Apr 2010 14:50:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626369#M22349</guid>
      <dc:creator>William E Howard</dc:creator>
      <dc:date>2010-04-30T14:50:52Z</dc:date>
    </item>
    <item>
      <title>Re: Procurve 7102</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626370#M22350</link>
      <description>William,&lt;BR /&gt;&lt;BR /&gt;It is all a matter of the access policy. For your port-forwarding, it is applied to the external interface meaning, when a packet is coming in from an external network, this policy gets applied. You are coming in from the inside, where a different policy is applied (probably NAT or self). You would have to modify the access policy (self or NAT) to port-forward (or route) to your 443 port instead of the router (self hits the router). Look at the output of the command "show ip policy-session" to see which policy hit when you use SSL to access your server. I suspect "self".&lt;BR /&gt;&lt;BR /&gt;Olaf&lt;BR /&gt;</description>
      <pubDate>Fri, 30 Apr 2010 23:38:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626370#M22350</guid>
      <dc:creator>Olaf Borowski</dc:creator>
      <dc:date>2010-04-30T23:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: Procurve 7102</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626371#M22351</link>
      <description>Olaf, &lt;BR /&gt;&lt;BR /&gt;I setup a port forward on the Access Policy bound to my internal interface, now SSL traffic bound for my external IP just seems to die if I have it before my NAT policy, and doesn't do anything if it is after my NAT policy.&lt;BR /&gt;&lt;BR /&gt;Doesn't show up at all in the show ip policy-sessions that I can find, whether I have port forwarding turned on or not.&lt;BR /&gt;&lt;BR /&gt;Early on I tried to setup a second external IP address to segregate traffic between outgoing and incoming, but it wouldn't let me have two interfaces on the same VLAN (I require external VLAN tagging).&lt;BR /&gt;&lt;BR /&gt;If I change the SSL management port, it still doesn't redirect. I have gone into my NAT settings, and told it to NOT NAT traffic that is destined for my external IP address, but still no dice.&lt;BR /&gt;&lt;BR /&gt;I know it has to be possible, but I'll be damned if I can find the right combination.</description>
      <pubDate>Mon, 03 May 2010 14:50:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626371#M22351</guid>
      <dc:creator>William E Howard</dc:creator>
      <dc:date>2010-05-03T14:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: Procurve 7102</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626372#M22352</link>
      <description>Hi Will&lt;BR /&gt;&lt;BR /&gt;Here is a snippet of my config&lt;BR /&gt;&lt;BR /&gt;interface eth 0/1&lt;BR /&gt;  ip address  x.y.z.130  255.255.255.240 &lt;BR /&gt;  ip address  x.y.z.131  255.255.255.240 secondary&lt;BR /&gt;  ip address  x.y.z.132  255.255.255.240 secondary&lt;BR /&gt;access-policy Public&lt;BR /&gt;.... (NOTE FOR BELOW i USE TAGGING INTERNALLY)&lt;BR /&gt;interface eth 0/2.1&lt;BR /&gt;  description Production Network&lt;BR /&gt;  vlan-id 1&lt;BR /&gt;  no shutdown&lt;BR /&gt;  ip address  192.168.1.254  255.255.255.0 &lt;BR /&gt;  access-policy Private&lt;BR /&gt;&lt;BR /&gt;ip access-list extended Linux1&lt;BR /&gt;  remark Port Forward MRV-1&lt;BR /&gt;  permit tcp any  host 82.94.126.131 eq ssh  log&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended Linux2&lt;BR /&gt;  remark Port Forward MRV-2&lt;BR /&gt;  permit tcp any  host x.y.z.132 eq ssh  log&lt;BR /&gt;!&lt;BR /&gt;....&lt;BR /&gt;ip policy-class Public&lt;BR /&gt;  nat destination list Linux1 address 192.168.1.1&lt;BR /&gt;  nat destination list Linux2 address 192.168.1.2&lt;BR /&gt;&lt;BR /&gt;Seems the key here is ... That they all point to secondary addresses.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Tue, 04 May 2010 06:18:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626372#M22352</guid>
      <dc:creator>Gerhard Roets</dc:creator>
      <dc:date>2010-05-04T06:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: Procurve 7102</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626373#M22353</link>
      <description>I actually tried something like that early on, but the issue I ran into is that I cannot have multiple sub interfaces on the same VLAN, and I require VLAN tagging on all external interfaces. &lt;BR /&gt;&lt;BR /&gt;My internet connection is setup so that, any traffic on a specific VLAN routes to the internet. If it is not on a VLAN, or on a different one, then it is routed between my sites without leaving the telco's backbone. Makes things very fast between sites, but I worked with Procurve and couldn't come up with a way to have multiple external IP addresses on the same VLAN and subnet.</description>
      <pubDate>Tue, 04 May 2010 16:11:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/procurve-7102/m-p/4626373#M22353</guid>
      <dc:creator>William E Howard</dc:creator>
      <dc:date>2010-05-04T16:11:00Z</dc:date>
    </item>
  </channel>
</rss>

