54
Steelhead Appliance Installation and Configuration Guide
Troubleshooting
Auto-Discovery Failure
3.
Click
Apply
to save your settings to the running configuration.
4.
Click
Save
to save your settings permanently.
Auto-Discovery Failure
When auto-discovery fails, all traffic passes through with the Steelhead appliance in-path (physically or
logically).
Possible Causes
Cisco PIX 7.x or Raptor firewalls
Satellite
Intrusion Detection System (IDS) or Intrusion Prevention System (IPS)
Solutions
Create a fixed-target rule on the client-side Steelhead appliance.
Specify the
Target Appliance IP Address
and its port as 7800 on the opposite Steelhead appliance (in-
path without auto-discovery).
Configure end nodes (firewalls) to allow your probe to pass through.
Configure the Steelhead appliance IP address as the friendly IP address for IDS or IPS.
Cisco PIX Firewall IOS v7.0 might block the auto-discovery probe. Some firewall configurations strip
TCP options or drop packets with these options. You can keep this configuration and switch to fixed-
target rules or change the configuration on the firewall.
Control
Description
Collect Mappings From
Select one of the following options from the drop-down list:
•
None
- Do not collect mappings.
•
Destination Only
- Collects destination MAC data. Use this option in
connection-forwarding deployments. This is the default setting.
•
Destination and Source
- Collect mappings from destination and source
MAC data. Use this option in connection-forwarding deployments.
•
All
- Collect mappings for destination, source, and inner MAC data. Also
collect data for connections that are
un-natted
(connections that are not
translated using NAT). You cannot enable this option in connection-
forwarding deployments. Riverbed recommends that you use this option to
maximize the effects of simplified routing.