Forum Discussion
Jerry_Shen_1215
Nimbostratus
Hi, i have checked my configurations.
In the HTTP profile i have enable X-forwarded-for for my Virtual Server.
I also have a Client_SSL profile and a server SSL profile. Therefore the SSL termination should be in place before F5 try to re-encrypt the ssl traffic.
I also tried to sniff the traffic at the backend (from F5 VSIP to my apache server). I can't seems to find the X-forwarded-For fields in the HTTP header when i try to decrypt using my apache server private key.
Or the Tcpdump that i perform was done incorrectly?
the dump syntax i use is: tcpdump -nnvvXSs 1514 -i dst -w /var/tmp/xxx.pcap
I am using wireshark with my apache private key defined in "preference -> SSL --> RSA Key list"
What am i missing?
Jerry_Shen_1215
Sep 25, 2013Nimbostratus
Yes i can decrypt the packet terminating at the virtual server and saw the XFF header.
However, the packet sent out to my pool members i don't see the XFF header in the http packets.
I am using SNAT automap. So its from my virtual server IP to the pool member