Forum Discussion
Kevin_Stewart
Sep 05, 2013Employee
Can you elaborate on what the application is attempting to do and how it works?
Are you simply layer 4 (IP) load balancing through the F5? Or applying any application logic?
Are you terminating SSL at the F5?
Is AD authentication in the form of NTLM or Kerberos?