SSL Orchestrator Advanced Use Cases: Forward Proxy Authentication
Introduction
F5 BIG-IP is synonymous with "flexibility". You likely have few other devices in your architecture that provide the breadth of capabilities that come native with the BIG-IP platform. ...
Published Nov 17, 2020
Version 1.0Kevin_Stewart
Employee
Joined March 16, 2006
Kevin_Stewart
Employee
Joined March 16, 2006
dragonflymr
Dec 04, 2020Cirrostratus
Hi,
Well, this is for decrypting traffic started by many services in one location to many services in another location. As well it should protect traffic in opposite way. For me it looks like Outbound type topology is the best joice but sure I can be wrong so if you think it would be better to use Inbound topology I will investigate this scenario as well.