Forum Discussion
iRule to block IPSEC outbound responses
Hello friends,
Due to I am having asymmetric traffic which does not allow a VPN IPSEC tunnel to be established, I need to to block IPSEC tunnel initiation by a peer VPN behind the BIG-IP. I think that the easiest way would be an irule triggered in CLIENT_ACCEPTED to drop the connections.
Anyone could recommend me any way to design such irule?
Thanks in advance.
Regards
JM
1 Reply
- The_Bhattman
Nimbostratus
Hi JM, Yes you could. There is a command called (IP::protocol) which returns the protocol value. This value can identify components in the VPN like ESP, AH along with UDP protocol port IKE
Thus you could have the following:
when CLIENT_ACCEPTED { if {[IP::protocol] == 50 || [IP::protocol] == 51 || [UDP::local_port] == 500} { drop } }I hope this helps
-=Bhattman=-
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com