We've got a CSS running software 8.1 and we're performing source NAT on IP addresses in our back-end networks to a IP addresses on a front-end network.
Essentially each IP on the back-end is transleted to a single IP address on the front-end (customer side) network, for example:
ip address 10.0.0.1
vip address 192.168.100.100
add service Service_Example1
The problem we're experiencing is that the CSS upon performing source NAT for connections outbound from the back-end, it also randomizes the source TCP port for the outgoing packet which poses a problem with an application which expects the TCP source port to be within a very tight range.
Restricting the port-map range for the NAT also doesn't help as it will still randomize the TCP source port but just to a smaller range.
I know that the source port randomization can be disabled for UDP flows but can this be done for TCP and if so, how?