Forum Discussion
Jerry_Shen_1215
Nimbostratus
Hi, i have checked my configurations.
In the HTTP profile i have enable X-forwarded-for for my Virtual Server.
I also have a Client_SSL profile and a server SSL profile. Therefore the SSL termination should be in place before F5 try to re-encrypt the ssl traffic.
I also tried to sniff the traffic at the backend (from F5 VSIP to my apache server). I can't seems to find the X-forwarded-For fields in the HTTP header when i try to decrypt using my apache server private key.
Or the Tcpdump that i perform was done incorrectly?
the dump syntax i use is: tcpdump -nnvvXSs 1514 -i dst -w /var/tmp/xxx.pcap
I am using wireshark with my apache private key defined in "preference -> SSL --> RSA Key list"
What am i missing?
What_Lies_Bene1
Sep 18, 2013Cirrostratus
I assume however that you can decrypt and view the HTTP packets yes?