We have a BIGIP i4600 F5 device with couple of server behind listening to HTTP/S. In short - we need to send an HTTPS (or HTTP, doesn't matter) request from a backend pool, which has to go out to F5 device and come back to another backend pool server. Don't even ask why not to make the call internally, it is complicated. So the problem is our F5 device seem to be blocking requests which are originated from backend pool and headed to back to some other pool. The same requests goes through F5 from outside of pool perfectly fine. I though maybe this is kind of default behavior for some threat protection policies applied by default? Like the device may think why would you need to make an HTTP call from a server back to the same server through the internet? And it is correct, we just have a unique situation.
So can I disable this feature in our device? Or maybe it is some other issue and not as I think the default behavior?
No comments:
Post a Comment