Forum Discussion
Hamish
Sep 03, 2010Cirrocumulus
Another F5 device, yes certainly (You can prove that with an HA pair and a hard-coded or shared key. When an HA failover occurs, the backup device can now decrypt the content that the primary device encrypted)...
A non-F5 device, SHOULD be possible, but I've never tried it...
I suspect what you're trying to do though is to tunnel traffic across a network from one F5 to another? If so, why not simply use an SSL/TLS tunnel or connection?
H