Forum Discussion
Can you stop RST from being sent by VIP
I should have included the initial SYN. Phone sends the SYN, VIP responds back RST ACK.
Okay, so then the VIP itself is sending a RST after the client's initial SYN (never completing the client side 3WHS).
You said the VIP is UDP:53, but the client is trying to connect over TCP:853. That'd explain the RST.
Proxying DNS over TLS Queries to Traditional DNS: https://clouddocs.f5.com/training/community/dns/html/class5/module2/module2.html
- John_KrumOct 05, 2022Cirrus
O.K. I see where you are going with this. I was looking to stop the RST packets, just dropped. You are looking at it from the perspective of terminating TLS on the F5 and passing upd 53 to the pool.
- Kevin_StewartOct 05, 2022Employee
At the very least, you have a VIP with the correct IP, but wrong port. That's what is causing the RST response.
- Kevin_StewartOct 05, 2022Employee
I'll add, as the RST is not specifically coming from the VIP, since that VIP isn't listening on the correct port, you'd likely need something global to control behavior. There are also a few additional options:
- AFM (Advanced Firewall Manager) could be employed in a Global scope to discard any traffic that does not match the listening port(s).
- For simpler tasks, a packet filter rule could be used.
- Packet Filtering: enabled
- Unhandled Packet Action: Discard
- Rules
- Action: Accept
- VLAN / Tunnel: * All
- Filter Expression: { dst port 53 }
You'll need to tweak the packet filter rules to your environment, but this could effectively be used to discard any traffic coming to the BIG-IP that doesn't match a listening port.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com