Forum Discussion
SSL handshake unsupported ciphers
Hi Thanks for the reply,
I will compare with the server side ciphers, but i'm curious to understand how it is working for now. Because the handshake is rejected if I CURL from the F5, but the monitor is UP and clients are able to access the same page.
- boneyardMar 01, 2021MVP
well curl can use different ciphers then the big-ip health monitor. in your case you say the health monitor is tcp on 8080 so the health monitor isn't even using a cipher.
your client traffic will be handled by the server SSL profile, which can also use different ciphers or tls version then curl.
- Daniel_WolfMar 01, 2021MVP
As for an explanation why it might work now.
For monitoring with TCP and making a test with curl, please don't take any offense, but you are comparing apples and pears. A TCP monitor will check if whatever service responds on port 8080, HTTP protocol is not involved at all. Curl will send an actual HTTP request and you will see the HTTP server response.
Can you check, maybe there is an iRule that would disable SSL on the server side under certain circumstances? Something matching this string?
SSL::disable serverside
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com