Scenario 2.2: Proxy Error#
Purpose#
Identify the propagation of performance issues throughout a system by correlating error status codes across component services.
Description#
This demonstration shows how decrypted traffic can be utilized in tandem with a network proxy to provide visibility into network operations.
Procedure#
Use a browser to navigate to the URL of the testapp server behind a network proxy.
Observe the decrypted traffic in NetScout’s Packet Analysis tool.
Expected Outcome#
The decrypted traffic is visible in NetScout despite the use of a network proxy.
Passive |
Active |
||||||
---|---|---|---|---|---|---|---|
Bounded Life-Time |
Exported Session Key |
Break & Inspect (Mira) |
Break and Inspect (F5) |
||||
Real-Time |
Post-Facto |
Real-Time |
Post-Facto |
Real-Time |
Post-Facto |
Real-Time |
Post-Facto |
Pass |
Pass |
Pass |
Pass |
Pass |
Pass |
Pass |
Pass |
Screenshots#

Decrypted traffic behind a proxy.#