For more information regarding the security incident at F5, the actions we are taking to address it, and our ongoing efforts to protect our customers, click here.

Forum Discussion

AndOs's avatar
AndOs
Icon for Cirrostratus rankCirrostratus
Oct 09, 2017

AAA HTTP layered vip with ipv6 address

Hi!

I'm trying to create a layered vip with ipv6 to do https for an endpoint in a HTTP AAA server.

However I'm not having much luck getting it to work.

In /var/log/apm I'm getting error "Curl perform failed: Couldn't connect to server (7)"

My experience with ipv6 is limited so there might very well be something simple I have missed.

This is the config I'm using.

ltm node otpgateway.domain.com {
    address 62.132.21.215
}
ltm pool layered_aaa_proxy_pool {
    members {
        otpgateway.domain.com:https {
            address 62.132.21.215
        }
    }
}
ltm virtual layered_aaa_proxy_vip {
    destination fd6d:ec93:1c0a:beef::1000.http
    ip-protocol tcp
    pool layered_aaa_proxy_pool
    profiles {
        http { }
        serverssl {
            context serverside
        }
        tcp { }
    }
    source-address-translation {
        type automap
    }
}

apm aaa http otpgateway_layered_HTTP {
    auth-type custom-post
    content-type xml-utf8
    custom-body "<\?xml version=\"1.0\" encoding=\"UTF-8\" \?>........"
    form-action /OTPsend
    start-uri http://[fd6d:ec93:1c0a:beef::1000]
    success-match-type string
    success-match-value "200 OK"
}

Changing the address to a v4 works, but for various reasons it would be good if I could use a v6 address.

Should a v6 address work? Or are there any internal limitations for having an ipv6 address on this kind of layered approach?

Thanks!

/Andreas

2 Replies

  • Hi, try with a hostname instead of IPv6 and configure this in hosts file (system / device / hosts).

     

  • Hello,

    I want to do a custom post with IPv4 but can't get it to work. I used a VIP on the APM itself with a serverssl. The pool members is the AAA authentication server.

    ltm virtual vs_smsapi_test {
        destination 172.29.100.12:http
        ip-protocol tcp
        mask 255.255.255.255
        pool pool_smsapi_test
        profiles {
            http { }
            serverssl {
                context serverside
            }
            tcp { }
        }
        source 0.0.0.0/0
        source-address-translation {
            type automap
        }
        vs-index 80
    }
    
    ltm pool pool_smsapi_test {
        members {
            212.113.89.36:https {
                address 212.113.89.36
                session monitor-enabled
                state up
            }
        }
        monitor https
    
    apm aaa http /andrei/otp_smsapi {
        auth-type custom-post
        content-type url-encoded-utf8
        custom-body "{\"recipient_phone_number\":\"%{session.logon.last.username}\",\"message\":\"%{session.logon.last.password}\",\"priority\":\"high\"}"
        form-action /api/sms/
        headers {
            header0 {
                name Content-Type
                value application/json
            }
            header1 {
                name Authorization
                value "Basic xxxxxxx"
            }
        }
        partition andrei
        start-uri http://172.29.100.12
        success-match-type string
        success-match-value id
    }
        net self Vlan400 {
        address 172.29.100.3/16
        traffic-group traffic-group-local-only
        vlan vlan400
    }
    

    When testing the connection from another PC to the APM enabled VIP I don't see any traffic via a tcpdump leaving from the vlan400 interface and get this in the apm logs:

    Jan 23 17:21:24 BIGIP-C debug apd[16514]: 01490000:7: modules/Authentication/Http/HttpModule.cpp func: "doHttpHeaderBasedAuth()" line: 115 Msg: a933e480: HTTP module: doHttpHeaderBasedAuth(): URL: http://172.29.100.12/api/sms
    Jan 23 17:21:24 BIGIP-C err apd[16514]: 01490138:3: a933e480: HTTP module: authentication with 'test' failed: Curl perform failed: Failure when receiving data from the peer  (56)
    Jan 23 17:21:24 BIGIP-C debug apd[16514]: 01490111:7: a933e480: HTTP module: authenticateUser(): Curl perform failed: Failure when receiving data from the peer (56)
    

    But the strange part is that I don't see any traffic leaving towards 172.29.100.12? Any ideas?