Forum Discussion
Jan 27, 2015
Hi Stefan,
as WLB already recommended, a TCPDUMP may help to find out the issue:tcpdump -nnni 0.0:nnnp -s 0 -w /shared/issue.cap host
It will trace all client- and serverside traffic initiated by your client.
The tcpdump syntax above is adding the so called "F5 Ethernet Trailer" data (the "nnn"-flag in the interface definition) to your raw dump file /shared/issue.cap and contains as well the related traffic on "peer" side (server side; triggered by the "p"-flag in the interface definition). Description of and required WireShark plugin to decode the trailer data can be found here on DevCentral. Thanks, Stephan