Forum Discussion

John_04_141801's avatar
John_04_141801
Icon for Nimbostratus rankNimbostratus
Jul 14, 2014

Virtual Server Won't Work Through Big IP LTM with Server OAS

The problem is that you can not access a website that has been published travez LTM. virtual server: 196.100.20.6 ---> 196.100.20.11:443 and 196.100.20.12:443

 

The BigIP is configured and installed in the One Armed mode. That is, all traffic to the servers comes with IP F5 (Self IP - 196.100.20.5)

 

It has made the following screenshots for sulucion the problem:

 

It has generated two scenarios for the solution of the problem. This consisted of changing the IP address of the virtual server.

 

Scenario 1:

 

IP address of the firewall: 196.100.20.1

 

Self IP - F5: 196.100.20.5

 

Virtual server: 196.100.20.15

 

Pool Member (Servers OAS - Oracle): 196.100.20.11:443, 196.100.20.12:443

 

File captured in this scenario: sslfail0712.cap

 

tcpdump-ni 0.0: nnn-s0 host 196.100.20.11 172.16.1.27 or 196.100.20.15 host 196.100.20.12 host or host-or w / var/tmp/sslfail0712.cap

 

tcpdump executed in the following error was encountered:

 

Scenario 2:

 

IP address of the firewall: 196.100.20.1

 

Self IP - F5: 196.100.20.5

 

Virtual server: 196.100.20.6

 

Pool Member (Servers OAS - Oracle): 196.100.20.11:443, 196.100.20.12:443

 

In this second scenario this option is configured in your SSL virtual Server profile (clientssl and serverssl).

 

DEFAULT: TLSv1_2: TLSv1_1: SSLv3

 

I do change because apparently in the initial capture (tcpdump) had noticed the changing TLS TLS V1.2 to V1.0

 

File captured in this scenario: sslfail0714.cap

 

tcpdump-ni 0.0: nnn-s0 host 196.100.20.11 172.16.1.27 or 196.100.20.6 host 196.100.20.12 host or host-or w / var/tmp/sslfail0714.cap

 

But after the change I found these two errors:

 

 

After these changes the abovementioned problem persisted.

 

If you could support me to solve the problem that is bringing me headaches.

 

Regards.

 

3 Replies

  • Original Tcpdump executed tcpdump –ni 0.0:nnn –s0 host 172.16.1.27 or host 196.100.20.15 or host 196.100.20.11 or host 196.100.20.12 -w /var/tmp/sslfail0712.cap tcpdump –ni 0.0:nnn –s0 host 172.16.1.27 or host 196.100.20.6 or host 196.100.20.11 or host 196.100.20.12 -w /var/tmp/sslfail0714.cap Regards.