Forum Discussion
Kevin_Stewart
Jul 03, 2014Employee
Okay, well then let's do this. Add the following:
when CLIENT_ACCEPTED {
TCP::collect
}
when CLIENT_DATA {
log local0. [TCP::payload]
TCP::release
TCP::collect
}
Going on the assumption that something is attempting to talk through the VIP with a non-HTTP protocol, you should be able to see this in its raw form directly before the error. You'll also need to disable client side SSL, if possible, for the payload to be readable.