![]() Session keylogger iRule removed from ext_nerdknobs.tech_443.continuing. Session keylogger iRule applied to ext_nerdknobs.tech_443.continuing. Session keylogger iRule (cache disabled version) ntinuing. Virtual ext_nerdknobs.tech_443 has associated client-ssl profile cssl_. # BIG-IP tcpdump capture collection utility # Vip = bigip.load(f'/mgmt/tm/ltm/virtual/.continuing.') def run_tcpdump(bigip, duration, virtual_name, filters):ĭatestring = datetime.now().strftime('%Y%m%d-%H%M%S') First was to ask for a capture duration so you can specify n number of seconds to run the capture, and second, asking for capture filters that will be applied in addition to the virtual server host IP. I retained the source IP for test traffic, though I might create another version that captures all sessions as well.įor enhancements, I have two minor changes and one major change. ![]() For this tool, I stripped out the qkview and case-related steps to focus on just taking a capture against a virtual server. ![]() It requested a virtual server name, a source IP for capturing test traffic, and a case number, which was used in naming the packet capture, sessions keys, and qkview files. The previous tool was focused on gathering support files for a case. In this article, I expand on that work by adding automatic decryption to the toolbelt. Back in April, I released the first of hopefully many tools ( Automating Packet Captures on BIG-IP) that will assist those responsible for responding to all those directed "It's the BIG-IP!" and "It's the network!" accusations.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |