Applies To:Show Versions
BIG-IQ Centralized Management
About creating a layer 3 outbound explicit proxy SSL Orchestrator topology
- The internal routed traffic is targeted to an explicit proxy by means of the BIG-IP device after an explicit proxy request.
- The BIG-IP device decrypts the traffic and sends it to the security devices.
- The BIG-IP device then re-encrypts the traffic and the traffic is then routed out to the applications and the internet.