Forum Discussion
Adding Peer device issue
Hi Guys,
I have a problem with my customer. We are working in Test Plant, where we would replace 2 F5 Viprion 4400 (version 11.4.1) with an F5 i2600 (version 12.1.2). I'm telling you what we would like to do to migrate everything (in Test Plant we are testing the procedure we would like to implement in production, where we will replace two Viprion 4400 with two Viprion 2400):
- Added the new F5 to the existing Device Group by creating a new sync VLAN between the 3 devices
- Sync the configuration on the new device
- Failover of traffic on the new device
- Remove from the device group the two old Viprion
We immediately encountered a problem when we tried adding a peer to insert the new device into the current cluster, in particular we get the following error (via GUI the same error exists on both Viprion and i2600):
iControl connection to 172.16.4.242 failed (where IP 172.16.4.242 is the IP of the new F5 i2600)
Checking the ltm log file, we find the following errors:
Viprion (LTM) Side: SSL_handshake: error: 14094410: SSL routines: SSL3_READ_BYTES: sslv3 alert handshake failure
I2600 (LTM) Side: SSL_handshake: error: 14077102: SSL routines: SSL23_GET_SERVER_HELLO: unsupported protocol
Any idea about this?
BR
- Kevin_K_51432Historic F5 Account
Greetings,
K54511423: The system includes insecure ciphers when a device adds another device to the device trust
https://support.f5.com/csp/article/K54511423
Did you happen to use this article to modify the HTTP cipher strength?
K13405: Restricting Configuration utility access to clients using high-encryption SSL ciphers (11.x)
https://support.f5.com/csp/article/K13405
Kevin
- Andrea_Colombo_
Nimbostratus
Hello Kevin, thank you for your response. We tried the solution on K13405, but the problem is the same: iControl connection to 172.16.4.242 failed
Any idea?
BR
Andrea
- Kevin_K_51432Historic F5 Account
Hi Andrea,
I've not encountered this issue on any of my BIG-IPs. It looks like the default setting is:tmsh list sys httpd ssl-protocol sys httpd { ssl-protocol "all -SSLv2 -SSLv3" }
Do you have the ability to set this on both devices and test?
tmsh modify sys httpd ssl-protocol "all -SSLv2 -SSLv3" save sys config load sys config restart sys service httpd
I know you intend to use stronger ciphers only, but it appears this is only possible in v13.0.0 per the bug mentioned above.
Thanks!
Kevin
- amintej
Cirrus
Hello, We had a similar problem when we turned off TLS 1.0 in the httpd interface but it looks like your problem is with SSLv3 protocol. Check the current configuration with the next command:
list sys httpd ssl-protocol sys httpd { ssl-protocol "all -SSLv2 -SSLv3"}
You can add SSLv3 using modify:
modify sys httpd ssl-protocol "all -SSLv2 +SSLv3"
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com