Solved

F5 BIG-IP SSL and non-SSL

Posted on 2011-09-28
3
344 Views
Last Modified: 2012-05-12


We are looking to implement a solution whereby users must use SSL to access a particular web app if they have the correct client cert. For users who don't have the cert yet we want the solution to automatically revert to use HTTP for this app and continue. We want it to be seamless to the user.

We plan on using the BIG-IP for the SSL termination at the perimeter.

Can the big-ip detect that the users machine doesn't have the cert and redirect to http? Or am I way off course here? Are there other ways to do this?
0
Comment
Question by:58872
3 Comments
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 36720776
You'll probably have to ask BIG-IP.  The general problem you are facing is that when you request an SSL connection, it gets negotiated First before anything else.  If it fails, you don't get anything but an error.  That would be normal.  Maybe BIG-IP can do something else.
0
 
LVL 16

Accepted Solution

by:
SteveJ earned 500 total points
ID: 36738638
Yes, you can redirect based on an SSL negotiation error. The problem is that will defeat the purpose of requiring a specific client cert unless you also filter on the source IP address. That is, 'sneaky pete' wants access to your app but doesnt have the appropriate cert. You end up effectively giving it to him.

What am I missing?

Steve
0
 

Author Closing Comment

by:58872
ID: 36960979
Thanks
0

Featured Post

Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question