Forum Discussion
genseek_32178
Nimbostratus
Jun 27, 2012VS Issue
Hi,
Have the following 2 Virtual servers config,
virtual VS1
pool pl443
destination 1.1.1.1:443
ip protocol tcp
profiles tcp-default
vlan 2 enable
...
Hamish
Cirrocumulus
Jul 01, 2012tcpdump is your friend here. Specifying interface 0.0 you can dump traffic on all interfaces. Drop down to one pool member (Disable the rat) to make debugging simpler), and do something like (Assuming no SNAT, I don't see it in your description at the top)
tcpdump -i 0.0 -nn -p -e "(host and host and port ) or (host and host and port )"
Where
clientIP == the IP address of the client
vsip == virtual server IP address
vsport == virtual server port
poolmemberip == IP address of the pool member still up
poolmemberpool == port number of the pool member still up
The -e flag will show you the TAG of the inbound clan. So you'll be able to make sure that the packets back from the poolmember are coming back in the same VLAN as the BigIP sent them out.
H
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects
