Pretty best to capture more packets in the buffer and use wireshark to view the logs. You can use below:
tcpdump -A -s 65535 -x -vv -nni 0.0 host h.h.h.h -w /var/tmp/filename.pcap
To capture and analyze clientssl connections inbound to an F5, cd to directory /config/ssl.key and then run the following command from that directory
tcpdump -A -s 65535 -x -vv -nni VLAN_or_INTERFACE host x.x.x.x and host x.x.x.x -w /var/tmp/capture_file
[if you don't know the interface or vlan name, simply replace the field with 0.0]
once stopped (using ctrl + C) use ssldump to read the conversation
ssldump -r /var/tmp/capture_file -d -k keyname_of_cert_used_in_ssl_profile.key
Here the packet will be decoded and any errors will be seen . THis is pretty good for Mutual Authentication and SSL handshake troubleshooting.