Forum Discussion
Redirect TLS 1.1/1.2 clients & Append the incoming URL to the redirect target
- Aug 04, 2022
I did try it and it worked well...Thank you!
- I modified "ne" statement with "starts with"
- Testing User-Agent if statements now
For example
if { ([HTTP::header "User-Agent"] contains "randomagentstring") and (not ([HTTP::header "User-Agent"] contains "random/7.0")) and (not ([HTTP::header "User-Agent"] contains "xyz")) and
(not ([HTTP::header "User-Agent"] contains "abc")) and (not ([HTTP::header "User-Agent"] contains "random2")) and (not ([HTTP::header "User-Agent"] contains "random3")) and
([HTTP::header "User-Agent"] contains "Build Version random") }{ - Aug 11, 2022
I added some if bypass statements and working very well!
Thanks again
equals "TLSv1" ) and (not ([HTTP::uri] contains "tlsWarnRedirected")) and (not([HTTP::header "User-Agent"] contains "customagent"))} {
Hi Will,
Can you try this iRule?
when HTTP_REQUEST {
if { [SSL::cipher version] equals "TLSv1.1" || [SSL::cipher version] equals "TLSv1.2" } {
if { [HTTP::host] ne "xyz.com"} {
HTTP::redirect https://xyz.com/random/random/warn.html?source=https://[HTTP::host][HTTP::uri]
return
}
}
}
Thank you. I will test this in Dev shortly and respond with results.
Believe your right on point 🙂
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com