Forum Discussion
HTTPS Virtual Server return "This page is unavailable"
As the others have stated, the client SSL profile is for the configuration of the client side SSL session, between the client and the F5. The server SSL profile is for the configuration of the server side SSL session, between the F5 and the server. To offload client side SSL, you need a client SSL profile. To re-encrypt to the server, you also need a server SSL profile. In most cases, you don't need to use anything other than the default serverssl profile. Consider in this case the F5 is the client in the SSL handshake to the server. The client says CLIENTHELLO and passes a list of acceptable ciphers. The server says SERVERHELLO and SERVERCERTIFICATE to both choose a cipher from that list and send its server certificate to the client, respectively. If this were happening on the client side, the server cert sent to the client by the F5 would need to be validated by the client, against its explicit CA trust bundle. If the request host didn't match the cert's subject value, the certificate was expired, or the client had no CAs to be able to validate a full chain of trust, the user would see that familiar certificate trust warning message. On the server side, that same thing is happening, the serverssl profile is designed by default to ignore this error. You can instruct it to do otherwise in the Server Authentication section of the profile, but that's rarely a requirement. Now, if the server is attempting to do mutual authentication by requesting a client certificate, that (client) certificate must come form the serverssl profile, statically embedded in the certificate and key values of the serverssl profile.
If you have all of the correct settings in place as descried above, I would recommend the following actions:
-
Review the LTM log for additional SSL-related errors.
-
Are you specifying a different cipher list in either profile?
-
Does the server require a client certificate in the SSL handshake?
-
Perform an SSL dump on both the client side SSL session, and on the server side SSL session and look for errors within.
ssldump -k [path to private key] -AdNn -i 0.0 port 443 [and any additional filters]
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com