More information:
Here's the log output:
Jun 8 10:43:42 slot1/pa-lb4 info tmm[4687]: Rule /Common/liraz-test-irule : mark1: received RTSP request
Jun 8 10:43:42 slot1/pa-lb4 info tmm[4687]: Rule /Common/liraz-test-irule : mark1: 0.1 rtp/avp/udp;unicast;client_port=50560-50561;mode=record;source=64.215.193.200;server_port=6988-6989
Jun 8 10:43:42 slot1/pa-lb4 info tmm[4687]: Rule /Common/liraz-test-irule : mark1:client_list: 50560 50561
Jun 8 10:43:42 slot1/pa-lb4 info tmm[4687]: Rule /Common/liraz-test-irule : mark1: client field list returned 50560
Jun 8 10:43:42 slot1/pa-lb4 info tmm[4687]: Rule /Common/liraz-test-irule : mark1: client field list returned 50561
Jun 8 10:43:42 slot1/pa-lb4 info tmm[4687]: Rule /Common/liraz-test-irule : mark1: client_port1: 50560 client_port2: 50561
Jun 8 10:43:42 slot1/pa-lb4 info tmm[4687]: Rule /Common/liraz-test-irule : mark1:server_list: 6988 6989
Jun 8 10:43:42 slot1/pa-lb4 info tmm[4687]: Rule /Common/liraz-test-irule : mark1: server field list returned 6988
Jun 8 10:43:42 slot1/pa-lb4 info tmm[4687]: Rule /Common/liraz-test-irule : mark1: server field list returned 6989
Jun 8 10:43:42 slot1/pa-lb4 info tmm[4687]: Rule /Common/liraz-test-irule : mark1: server_port1: 6988 server_port2: 6989
Jun 8 10:43:42 slot1/pa-lb4 info tmm[4687]: Rule /Common/liraz-test-irule : mark1: 64.215.193.200 192.168.11.141 62.0.105.133 50560-50561 6988-6989
Jun 8 10:43:42 slot1/pa-lb4 info tmm[4687]: Rule /Common/liraz-test-irule : mark1: received RTSP request
Jun 8 10:43:53 slot1/pa-lb4 info tmm[4687]: Rule /Common/liraz-test-irule : mark1: received RTSP request
Can't seem to crack this one.
Once this failed, I tried creating a VS to catch all UDP traffic against that ip and forward it to the server as is (no source translation), while another VS handles all tcp 554 traffic to this server (RTSP control channel)