Forum Discussion
Loadbalancing based on UDP SSL certificate issuer
In our environment we have multipl WLCs which are trying to connect RADIUS ( UDP 1812) for authentication along with certificate.
Some are WLCs (during authentications) are sending old certificates and some are new one.
We intention is based on certificate issuer ( on UDP traffic) , the F5 LTM need to redirect to different pool.
Kindly let me know, whether we can achive this with UDP profile and below irule? or any other way to fulfil our requirement.
Appreciate your help on this.
when CLIENTSSL_HANDSHAKE {
set server_cert [SSL::cert 1] ;# Retrieve the server certificate (index 1)
set cn [SSL::cert subject commonName]
if { [string match "*CS PRD*" $cn] } {
# Route to Pool A for servers with Type A certificates
pool RADIUSOLD_POOL
} else {
# Default route for other cases
pool RADIUSNEW_POOL
}
}
- PeteWhiteEmployee
your requirements seems strange, and complex. I'd suggest contacting Professional Services for help with this, or take some time to describe your problem more clearly and somebody here may be able to help.
Yes, we contacted F5 PS and got response as "I have further reviewed the requirement and Wireshark traces with a senior colleague and we both concur that this is a non-starter due to the way the protocol behaves."
the Radius Access Request packet is routed to the Authentication Server prior to the Client certificate being presented. This breaks any certificate-based routing that we require.
In the below diagram, step 5 (Access Request) happens before 5b (Client Cert request).
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com