Tmos Implementations 11-2-0
Tmos Implementations 11-2-0
Version 11.2
Table of Contents
Table of Contents
Legal Notices...................................................................................................................................11
Acknowledgments..........................................................................................................................13
Chapter 2:
Creating an Active-Standby Configuration Using the Setup Utility............19
Overview: Creating a basic active-standby configuration.......................................................20
Task summary........................................................................................................................20
Licensing and provisioning the BIG-IP system............................................................20
Configuring the management port and administrative user accounts.........................21
Enabling ConfigSync and high availability...................................................................21
Configuring the internal network..................................................................................22
Configuring the external network.................................................................................22
Configuring the network for high availability................................................................23
Configuring a ConfigSync address..............................................................................23
Configuring failover and mirroring addresses..............................................................23
Discovering a peer device...........................................................................................24
Implementation result.............................................................................................................24
Chapter 3:
Creating an Active-Active Configuration Using the Setup Utility...............27
Overview: Creating a basic active-active configuration..........................................................28
Task summary........................................................................................................................29
Licensing and provisioning the BIG-IP system............................................................30
Configuring the management port and administrative user accounts.........................30
Enabling ConfigSync and high availability...................................................................31
Configuring the internal network..................................................................................31
Configuring the external network.................................................................................31
Configuring the network for high availability................................................................32
Configuring a ConfigSync address..............................................................................32
Configuring failover and mirroring addresses..............................................................32
Establishing device trust..............................................................................................33
Creating a Sync-Failover device group........................................................................33
Creating an iApp application for the local device.........................................................34
3
Table of Contents
4
Table of Contents
Chapter 7:
Load Balancing DNS Traffic Between IPv-6 Only and IPv-4 Only Clouds...69
Overview: Handling IPv6-only connection requests to IPv4-only servers..............................70
Task summary........................................................................................................................70
Creating a custom DNS profile ...................................................................................70
Assigning a DNS profile to a virtual server..................................................................72
Implementation result.............................................................................................................72
Chapter 9:
Configuring IPsec in Tunnel Mode between Two BIG-IP Systems..............77
Overview: Configuring IPsec between two BIG-IP systems...................................................78
About negotiation of security associations..................................................................78
About IPsec Tunnel mode............................................................................................78
About BIG-IP components of the IPsec protocol suite................................................79
Task summary........................................................................................................................79
Creating a forwarding virtual server for IPsec.............................................................80
Creating an IKE peer...................................................................................................80
Creating a custom IPsec policy...................................................................................81
Creating a bidirectional IPsec traffic selector..............................................................82
Verifying IPsec connectivity for Tunnel mode...............................................................83
Implementation result.............................................................................................................87
Chapter 10:
Configuring IPsec in Transport Mode between Two BIG-IP Systems.........89
Overview: Configuring IPsec in Transport mode between two BIG-IP systems.....................90
About negotiation of security associations..................................................................90
About IPsec Transport mode.......................................................................................90
About BIG-IP components of the IPsec protocol suite................................................91
Task summary........................................................................................................................91
5
Table of Contents
Chapter 11:
Configuring IPsec between a BIG-IP System and a Third-Party Device....101
Overview: Configuring IPsec between a BIG-IP system and a third-party device................102
About negotiation of security associations................................................................102
About IPsec Tunnel mode..........................................................................................103
About BIG-IP components of the IPsec protocol suite..............................................103
Task summary......................................................................................................................103
Creating a forwarding virtual server for IPsec...........................................................104
Creating an IKE peer.................................................................................................104
Creating a custom IPsec policy.................................................................................106
Creating a bidirectional IPsec traffic selector............................................................107
Verifying IPsec connectivity for Tunnel mode.............................................................108
Implementation result...........................................................................................................112
Chapter 12:
Configuring IPsec Using Manually Keyed Security Associations............113
Overview: Configuring IPsec using manual security associations........................................114
About IPsec Tunnel mode..........................................................................................115
Task summary......................................................................................................................115
Creating a forwarding virtual server for IPsec...........................................................115
Creating a manual IPsec security association...........................................................116
Creating a custom IPsec policy.................................................................................116
Creating a bidirectional IPsec traffic selector............................................................117
Verifying IPsec connectivity for Tunnel mode.............................................................118
Chapter 13:
Setting Up IPsec To Use NAT Traversal on Both Sides of the WAN..........123
Overview: Setting up IPsec to use NAT traversal on both sides of the WAN........................124
Before you begin IPsec configuration...................................................................................124
Task summary......................................................................................................................124
Creating a forwarding virtual server for IPsec...........................................................125
Creating an IPsec tunnel with NAT-T on both sides...................................................125
Verifying IPsec connectivity for Tunnel mode.............................................................129
6
Table of Contents
Chapter 14:
Setting Up IPsec To Use NAT Traversal on One Side of the WAN.............135
Overview: Setting up IPsec to use NAT traversal on one side of the WAN...........................136
Before you begin IPsec configuration...................................................................................136
Task summary......................................................................................................................136
Creating a forwarding virtual server for IPsec...........................................................137
Creating an IPsec tunnel with NAT-T on both sides...................................................137
Verifying IPsec connectivity for Tunnel mode.............................................................141
Chapter 15:
Using Link Aggregation with Tagged VLANs for One-Network Topology.147
Overview: Configuring link aggregation using tagged VLANs on one network.....................148
Illustration of link aggregation for a one-network topology...................................................148
Task summary......................................................................................................................149
Creating a trunk.........................................................................................................149
Adding a tagged interface to a VLAN........................................................................149
Creating a load balancing pool..................................................................................150
Creating a virtual server with source address affinity persistence............................150
Removing the self IP addresses from the default VLANs..........................................151
Creating a VLAN group..............................................................................................151
Creating a self IP for a VLAN group..........................................................................151
Chapter 16:
Using Link Aggregation with Tagged VLANs for Two-Network Topology..153
Overview: Configuring link aggregation of two interfaces using tagged VLANs on two networks.154
Illustration of link aggregation for a two-network topology.........................................154
Task summary......................................................................................................................154
Creating a trunk.........................................................................................................155
Adding a tagged interface to a VLAN........................................................................155
Creating a load balancing pool..................................................................................155
Creating a virtual server with source address affinity persistence............................156
7
Table of Contents
Chapter 20:
Configuring Administrative Partitions to Control User Access................175
Overview: Administrative partitions for user access control.................................................176
Task summary......................................................................................................................176
Creating an administrative partition...........................................................................176
Configuring user access to a partition.......................................................................177
Chapter 21:
Implementing BIG-IP Local Traffic Manager on a vCMP System..............179
Overview: Initial vCMP setup................................................................................................180
Task summary......................................................................................................................180
Creating a vCMP guest.............................................................................................180
Setting a vCMP guest to the Deployed state.............................................................182
Provisioning a BIG-IP module within a guest............................................................182
Creating a custom HTTP profile................................................................................182
Creating a pool to manage HTTP traffic....................................................................183
Creating a virtual server to manage HTTP traffic......................................................184
Viewing host properties for slots..........................................................................................184
8
Table of Contents
9
Table of Contents
10
Legal Notices
Publication Date
This document was published on April 4, 2013.
Publication Number
MAN-0379-02
Copyright
Copyright © 2012-2013, F5 Networks, Inc. All rights reserved.
F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5 assumes
no responsibility for the use of this information, nor any infringement of patents or other rights of third
parties which may result from its use. No license is granted by implication or otherwise under any patent,
copyright, or other intellectual property right of F5 except as specifically described by applicable user
licenses. F5 reserves the right to change specifications at any time without notice.
Trademarks
3DNS, Access Policy Manager, Acopia, Acopia Networks, Advanced Client Authentication, Advanced
Routing, APM, Application Security Manager, ARX, AskF5, ASM, BIG-IP, Cloud Extender, CloudFucious,
CMP, Data Manager, DevCentral, DevCentral [DESIGN], DNS Express, DSC, DSI, Edge Client, Edge
Gateway, Edge Portal, EM, Enterprise Manager, F5, F5 [DESIGN], F5 Management Pack, F5 Networks,
F5 World, Fast Application Proxy, Fast Cache, FirePass, Global Traffic Manager, GTM, IBR, Intelligent
Browser Referencing, Intelligent Compression, IPv6 Gateway, iApps, iControl, iHealth, iQuery, iRules,
iRules OnDemand, iSession, IT agility. Your way., L7 Rate Shaping, LC, Link Controller, Local Traffic
Manager, LTM, Message Security Module, MSM, Netcelera, OneConnect, Packet Velocity, Protocol
Security Module, PSM, Real Traffic Policy Builder, ScaleN, SSL Acceleration, StrongBox, SuperVIP, SYN
Check, TCP Express, TDR, TMOS, Traffic Management Operating System, TrafficShield, Transparent
Data Reduction, VIPRION, vCMP, WA, WAN Optimization Manager, WANJet, WebAccelerator, WOM,
and ZoneRunner, are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries,
and may not be used without F5's express written consent.
All other product and company names herein may be trademarks of their respective owners.
RF Interference Warning
This is a Class A product. In a domestic environment this product may cause radio interference, in which
case the user may be required to take adequate measures.
FCC Compliance
This equipment has been tested and found to comply with the limits for a Class A digital device pursuant
to Part 15 of FCC rules. These limits are designed to provide reasonable protection against harmful
interference when the equipment is operated in a commercial environment. This unit generates, uses, and
Legal Notices
can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual,
may cause harmful interference to radio communications. Operation of this equipment in a residential area
is likely to cause harmful interference, in which case the user, at his own expense, will be required to take
whatever measures may be required to correct the interference.
Any modifications to this device, unless expressly approved by the manufacturer, can void the user's authority
to operate this equipment under part 15 of the FCC rules.
Standards Compliance
This product conforms to the IEC, European Union, ANSI/UL and Canadian CSA standards applicable to
Information Technology products at the time of manufacture.
12
Acknowledgments
This product includes software developed by Niels Mueller (nisse@[Link]), which is protected under
the GNU Public License.
In the following statement, This software refers to the Mitsumi CD-ROM driver: This software was developed
by Holger Veit and Brian Moore for use with 386BSD and similar operating systems. Similar operating
systems includes mainly non-profit oriented systems for research and education, including but not restricted
to NetBSD, FreeBSD, Mach (by CMU).
This product includes software developed by the Apache Group for use in the Apache HTTP server project
([Link]
This product includes software licensed from Richard H. Porter under the GNU Library General Public
License (© 1998, Red Hat Software), [Link]/copyleft/[Link].
This product includes the standard version of Perl software licensed under the PerlArtistic License (© 1997,
1998 Tom Christiansen and Nathan Torkington). All rights reserved. You may find the most current standard
version of Perl at [Link]
This product includes software developed by Jared Minch.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
([Link]
This product includes cryptographic software written by Eric Young (eay@[Link]).
This product contains software based on oprofile, which is protected under the GNU Public License.
This product includes RRDtool software developed by Tobi Oetiker ([Link]
and licensed under the GNU General Public License.
This product contains software licensed from Dr. Brian Gladman under the GNU General Public License
(GPL).
This product includes software developed by the Apache Software Foundation ([Link]
This product includes Hypersonic SQL.
This product contains software developed by the Regents of the University of California, Sun Microsystems,
Inc., Scriptics Corporation, and others.
This product includes software developed by the Internet Software Consortium.
This product includes software developed by Nominum, Inc. ([Link]
This product contains software developed by Broadcom Corporation, which is protected under the GNU
Public License.
This product contains software developed by MaxMind LLC, and is protected under the GNU Lesser General
Public License, as published by the Free Software Foundation.
This product includes software developed by the Computer Systems Engineering Group at Lawrence
Berkeley Laboratory. Copyright ©1990-1994 Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgment: This product includes software developed by the Computer Systems Engineering
Group at Lawrence Berkeley Laboratory.
14
BIG-IP® TMOS®: Implementations
4. Neither the name of the University nor of the Laboratory may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes software developed by Sony Computer Science Laboratories Inc. Copyright ©
1997-2003 Sony Computer Science Laboratories Inc. All rights reserved. Redistribution and use in source
and binary forms, with or without modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY SONY CSLAND CONTRIBUTORS "AS IS" AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL SONY CSL OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
15
Acknowledgments
16
Chapter
1
Customizing the BIG-IP Dashboard
Topics:
Note: The view set name for all pre-defined views is standard.
Note: The windows are not active when in design mode, so the data does not update in real
time.
4. When you have placed the windows you want onto the canvas, click the Save icon on the Custom Views
control bar.
The Save View popup window opens.
5. Type a name for the view.
6. Type a new name for the view set, or select from the list.
7. Click OK.
The new view is saved, and appears in the Views list.
8. Click the double-gear icon on the Custom Views control bar to return to active mode.
The dashboard displays the custom view you just created, and updates the display with real-time data.
18
Chapter
2
Creating an Active-Standby Configuration Using the Setup
Utility
Topics:
Important: The same version of BIG-IP system software must be running on all devices in the
device group.
First, you can run the Setup utility on each device to configure base network components (that is, a
management port, administrative passwords, and the default VLANs and their associated self IP addresses).
Continue running it on each device to establish a trust relationship between the two devices, and create a
Sync-Failover type of device group that contains two member devices.
After the Setup utility is run on both devices, each device contains the default traffic group that the BIG-IP
system automatically created during setup. A traffic group represents a set of configuration objects (such
as floating self IP addresses and virtual IP addresses) that process application traffic. This traffic group
actively processes traffic on one of the two devices, making that device the active device. When failover
occurs, the traffic group will become active on (that is, float to) the peer BIG-IP device.
By default, the traffic group contains the floating self IP addresses of the default VLANs. Whenever you
create additional configuration objects such as self IP addresses, virtual IP addresses, and SNATs, the system
automatically adds these objects to the default traffic group.
Task summary
The configuration process for a BIG-IP® system entails running the Setup utility on each of the two BIG-IP
devices. When you run the Setup utility, you perform several tasks. Completing these tasks results in both
BIG-IP devices being configured properly for an active/standby implementation.
Licensing and provisioning the BIG-IP system
Configuring the management port and administrative user accounts
Enabling ConfigSync and high availability
Configuring the internal network
Configuring the external network
Configuring the network for high availability
Configuring a ConfigSync address
Configuring failover and mirroring addresses
Discovering a peer device
20
BIG-IP® TMOS®: Implementations
1. In a browser window, type the URL that specifies the management IP address of the BIG-IP® device:
[Link]
The login screen for the Configuration utility opens.
2. At the login prompt, type user name admin, and password admin, and click Log in.
The BIG-IP system license is now activated, and the relevant BIG-IP modules are provisioned.
1. On the screen for configuring general properties, for the Management Port Configuration setting,
select Manual and specify the IP address, network mask, and default gateway.
2. In the Host Name field, type a fully-qualified domain name (FQDN) for the system.
You must type letters, numbers, and/or the characters underscore ( _ ), dash ( - ) and period ( . ).
3. For the Host IP Address setting, retain the default value Use Management Port IP Address.
4. From the Time Zone list, select a time zone.
The time zone you select typically reflects the location of the BIG-IP® system.
5. For the Root Account setting, type and confirm a password for the root account.
The root account provides console access only.
6. For the Admin Account setting, type and confirm a password.
Typing a password for the admin account causes the system to terminate the login session. When this
happens, log in to the BIG-IP Configuration utility again, using the new password. The system returns
to the appropriate screen in the Setup utility.
7. For the SSH Access setting, select or clear the check box.
8. Click Next.
9. In the Standard Network Configuration area of the screen, click Next.
This displays the screen for enabling configuration synchronization and high availability.
1. For the Config Sync setting, select the Display configuration synchronization options check box.
This causes an additional ConfigSync screen to be displayed later.
21
Creating an Active-Standby Configuration Using the Setup Utility
2. For the High Availability setting, select the Display failover and mirroring options check box.
This displays the Failover Method list and causes additional failover screens to be displayed later.
3. From the Failover Method list, select Network and serial cable.
If you have a VIPRION® system, select Network.
4. Click Next.
This displays the screen for configuring the default VLAN internal.
22
BIG-IP® TMOS®: Implementations
1. For the High Availability VLAN setting, retain the default value, Create VLAN HA.
2. Specify the Self IP setting for VLAN HA:
a) In the Address field, type a self IP address.
b) In the Netmask field, type a network mask for the self IP address.
3. For the VLAN Tag ID setting, retain the default value, auto.
This is the recommended value.
4. For the VLAN Interfaces setting, click an interface number, and using the Move button, move the
interface number from the Available list to the Untagged list.
5. Click Next.
This configures the self IP address and VLAN that the system will use for high availability and displays
the default IP address that the system will use for configuration synchronization.
23
Creating an Active-Standby Configuration Using the Setup Utility
b) In the Port field, type a port number or retain the default port number, 1026.
c) Either click Repeat to add additional addresses, or click Finished.
3. Click Next.
4. From the Primary Local Mirror Address list, retain the default value, which is the self IP address for
VLAN HA.
5. From the Secondary Local Mirror Address list, select the address for VLAN internal.
6. Click Finished.
After the second device has discovered the first device, the two devices have a trust relationship and constitute
a two-member device group. Also, each device in the pair contains a default traffic group named
Traffic-Group-1. By default, this traffic group contains the floating IP addresses that you defined for
VLANs internaland external.
Implementation result
To summarize, you now have the following BIG-IP® configuration on each device of the pair:
• A management port, management route, and administrative passwords defined.
• A VLAN named internal, with one static and one floating IP address.
• A VLAN named external, with one static and one floating IP address.
• A VLAN named HA with a static IP address.
• Configuration synchronization, failover, and mirroring enabled.
• Failover methods of serial cable and network (or network-only, for a VIPRION® platform.
• A designation as an authority device, where trust was established with the peer device.
• A Sync-Failover type of device group with two members defined.
• A default traffic group that floats to the peer device to process application traffic when this device
becomes unavailable. This traffic group contains two floating self IP addresses for VLANs internal
and external.
24
BIG-IP® TMOS®: Implementations
On either device in the device group, you can create additional configuration objects, such as virtual IP
addresses and SNATs. The system automatically adds these objects to Traffic-Group-1.
25
Creating an Active-Standby Configuration Using the Setup Utility
26
Chapter
3
Creating an Active-Active Configuration Using the Setup
Utility
Topics:
Important: The same version of BIG-IP system software must be running on all devices in the
device group.
Using this implementation, you begin by running the Setup utility on each device to configure its base
network components. Base network components include a management port, administrative passwords,
and default VLANs and their associated self IP addresses. You also use Setup to configure configuration
synchronization and high availability.
You then use the BIG-IP® Configuration utility to:
• Establish trust between the two devices
• Create a Sync-Failover type of device group that contains two member devices
• Create a second traffic group
• Create two applications with iApps™
In this configuration, both devices actively process application traffic, each for a different application. One
device processes its application traffic using the configuration objects associated with the default floating
traffic group, traffic-group-1. By default, this traffic group contains the floating self IP addresses of
the default VLANs. The other device processes its application traffic using a second traffic group that you
create.
If one of the devices becomes unavailable for any reason, the other device automatically begins processing
traffic for the unavailable peer, while continuing to process the traffic for its own application.
This illustration shows an example of the device group that this implementation creates, named Device
Group A. This device group contains two BIG-IP devices, Device 1 and Device 2.
The configuration shows two traffic groups, traffic-group-1 and traffic-group-2, each containing
failover objects. For traffic-group-1, Device 1 is the default device. For traffic-group-2, Device
2 is the default device. If Device 1 becomes unavailable, traffic-group-1 floats to Device 2. If
Device 2 becomes unavailable, traffic-group-2 floats to Device 1.
28
BIG-IP® TMOS®: Implementations
Task summary
The BIG-IP® configuration process begins with running the Setup utility on each of the two BIG-IP devices.
Once you have completed that task, you can log into either of the BIG-IP devices and perform all of the
remaining tasks, on that device only. This results in both BIG-IP devices being configured properly for an
active-active implementation.
Licensing and provisioning the BIG-IP system
Configuring the management port and administrative user accounts
Enabling ConfigSync and high availability
Configuring the internal network
Configuring the external network
Configuring the network for high availability
Configuring a ConfigSync address
Configuring failover and mirroring addresses
Establishing device trust
Creating a Sync-Failover device group
Creating an iApp application for the local device
Creating a traffic group for a remote device
Creating an iApp application for a remote device
Forcing a traffic group to a standby state
Syncing the BIG-IP configuration to the device group
29
Creating an Active-Active Configuration Using the Setup Utility
1. In a browser window, type the URL that specifies the management IP address of the BIG-IP® device:
[Link]
The login screen for the Configuration utility opens.
2. At the login prompt, type user name admin, and password admin, and click Log in.
The BIG-IP system license is now activated, and the relevant BIG-IP modules are provisioned.
1. On the screen for configuring general properties, for the Management Port Configuration setting,
select Manual and specify the IP address, network mask, and default gateway.
2. In the Host Name field, type a fully-qualified domain name (FQDN) for the system.
You must type letters, numbers, and/or the characters underscore ( _ ), dash ( - ) and period ( . ).
3. For the Host IP Address setting, retain the default value Use Management Port IP Address.
4. From the Time Zone list, select a time zone.
The time zone you select typically reflects the location of the BIG-IP® system.
5. For the Root Account setting, type and confirm a password for the root account.
The root account provides console access only.
6. For the Admin Account setting, type and confirm a password.
Typing a password for the admin account causes the system to terminate the login session. When this
happens, log in to the BIG-IP Configuration utility again, using the new password. The system returns
to the appropriate screen in the Setup utility.
7. For the SSH Access setting, select or clear the check box.
8. Click Next.
9. In the Standard Network Configuration area of the screen, click Next.
This displays the screen for enabling configuration synchronization and high availability.
30
BIG-IP® TMOS®: Implementations
1. For the Config Sync setting, select the Display configuration synchronization options check box.
This causes an additional ConfigSync screen to be displayed later.
2. For the High Availability setting, select the Display failover and mirroring options check box.
This displays the Failover Method list and causes additional failover screens to be displayed later.
3. From the Failover Method list, select Network and serial cable.
If you have a VIPRION® system, select Network.
4. Click Next.
This displays the screen for configuring the default VLAN internal.
31
Creating an Active-Active Configuration Using the Setup Utility
2. In the Default Gateway field, type the IP address that you want to use as the default gateway to VLAN
external.
3. Specify the Floating IP setting:
a) In the Address field, type a floating IP address.
This address should be distinct from the address you type for the Self IP setting.
b) For the Port Lockdown setting, retain the default value.
4. For the VLAN Tag ID setting, retain the default value, auto.
This is the recommended value.
5. For the VLAN Interfaces setting, click the interface 1.2 and, using the Move button, move the interface
number from the Available list to the Untagged list.
6. Click Next.
This completes the configuration of the external self IP addresses and VLAN, and displays the screen
for configuring the default VLAN HA.
1. For the High Availability VLAN setting, retain the default value, Create VLAN HA.
2. Specify the Self IP setting for VLAN HA:
a) In the Address field, type a self IP address.
b) In the Netmask field, type a network mask for the self IP address.
3. For the VLAN Tag ID setting, retain the default value, auto.
This is the recommended value.
4. For the VLAN Interfaces setting, click an interface number, and using the Move button, move the
interface number from the Available list to the Untagged list.
5. Click Next.
This configures the self IP address and VLAN that the system will use for high availability and displays
the default IP address that the system will use for configuration synchronization.
32
BIG-IP® TMOS®: Implementations
for the management port of the local device. If you are configuring a VIPRION® system, configure a
multicast failover address as well.
Important: When configuring failover and mirroring IP addresses, you select addresses of the
local device only. Later, during the process of device discovery, the two devices in the device group
discover each other's addresses.
1. On the Main tab, click Device Management/Device Trust, and then either Peer List or Subordinate
List.
2. In the Peer Authority Devices or the Subordinate Non-Authority Devices area of the screen, click Add.
3. Type an IP address, administrator user name, and administrator password for the remote BIG-IP® device.
This IP address can be either a management IP address or a self IP address.
4. Click Retrieve Device Information.
5. Verify that the certificate of the remote device is correct.
6. Verify that the name of the remote device is correct.
7. Verify that the management IP address and name of the remote device are correct.
8. Click Finished.
33
Creating an Active-Active Configuration Using the Setup Utility
group and traffic processing is unaffected. You can perform this task on any authority device within the
local trust domain.
You now have a Sync-Failover device group containing two BIG-IP devices as members.
You now have an iApp application, which is associated with the traffic group assigned to the root folder,
traffic-group-1.
34
BIG-IP® TMOS®: Implementations
You now have a floating traffic group for which the default device is the peer device.
35
Creating an Active-Active Configuration Using the Setup Utility
If the check box is unavailable, the traffic group is not active on the device to which you are currently
logged in. Perform this task on the device on which the traffic group is active.
5. Click Force to Standby.
This displays target device options.
6. Choose one of these actions:
• If the device group has two members only, click Force to Standby. This displays the list of traffic
groups for the device group and causes the local device to appear in the Next Active Device column.
• If the device group has more than two members, then from the Target Device list, select a value
and click Force to Standby.
The selected traffic group is now active on another device in the device group.
Important: Perform the following procedure on only one of the two devices.
Except for non-floating self IP addresses, the entire set of BIG-IP configuration data is replicated on each
device in the device group.
Implementation Results
To summarize, you now have the following BIG-IP® configuration on each device of the pair:
• A management port, management route, and administrative passwords defined
• A VLAN named internal, with one static and one floating IP address
• A VLAN named external, with one static and one floating IP address
• A VLAN named HA with a static IP address
• Configuration synchronization, failover, and mirroring enabled
• Failover methods of serial cable and network
• Local IP addresses defined for failover and connection mirroring
• A designation as an authority device, where trust is established with the peer device
• A Sync-Failover type of device group with two members
• The default traffic group named traffic-group-1 with Device 1 as the default device
36
BIG-IP® TMOS®: Implementations
37
Creating an Active-Active Configuration Using the Setup Utility
38
Chapter
4
Upgrading Active-Standby Systems
Topics:
After preparing the devices for an upgrade to version 11.x, you install version 11.x onto Device B (the
standby device). When you finish the installation of version 11.x onto Device B, it creates a traffic group
called traffic-group-1. The version 11.x traffic group is in standby state on Device B, and Device A
(the version 10.x device) is in active mode. Note that the Unit ID that was used in version 10.x becomes
obsolete in version 11.x.
40
BIG-IP® TMOS®: Implementations
Figure 3: A version 10.x device in active mode and a version 11.x traffic group in standby
state
With version 11.x installed on Device B and traffic-group-1 in standby state, you can install version 11.x
onto Device A, force Device A to standby mode, which changes Device B to active state so that it can pass
traffic, and reboot Device A to the location of the 11.x software image. When you complete upgrading both
devices to version 11.x, the BIG-IP configuration includes a traffic group in active state on Device B, a
traffic group in standby state on Device A, and a device group that includes both devices.
41
Upgrading Active-Standby Systems
An upgrade of BIG-IP active-standby systems to version 11.x involves the following tasks.
Task Description
Preparing Device A (the active mode BIG-IP 1 In preparing to upgrade the active-standby BIG-IP
system) and Device B (the standby mode BIG-IP 2 systems to version 11.x, you need to understand any
system) specific configuration or functional changes from
the previous version, and prepare the systems. You
also download the new version of software from the
AskF5 web site ([Link]) and import the
files onto each device.
Upgrading Device B (the standby mode BIG-IP 2 When you complete preparation of Device B, you
system) can upgrade the software on that device.
Upgrading Device A (the standby mode BIG-IP 1 When you complete upgrading Device B, you can
system) prepare Device A and upgrade the software on
Device A.
Verifying the upgrade Finally, you should verify that your active and
standby BIG-IP systems are functioning properly.
Configuring module-specific settings According to your understanding of the configuration
and functional changes from the previous version,
you can reconfigure any customized module settings.
42
BIG-IP® TMOS®: Implementations
Devices
A device is a physical or virtual BIG-IP system, as well as a member of a local trust domain and a device
group. Each device member has a set of unique identification properties that the BIG-IP® system generates.
Device groups
A device group is a collection of BIG-IP® devices that trust each other and can synchronize, and sometimes
fail over, their BIG-IP configuration data.
Important: To configure redundancy on a device, you do not need to explicitly specify that you
want the BIG-IP device to be part of a redundant configuration. Instead, this occurs automatically
when you add the device to an existing device group.
Traffic groups
A traffic group is a collection of related configuration objects (such as a virtual IP address and a self IP
address) that run on a BIG-IP device and process a particular type of application traffic. When a BIG-IP
device becomes unavailable, a traffic group can float to another device in a device group to ensure that
application traffic continues to be processed with little to no interruption in service.
43
Upgrading Active-Standby Systems
Note: In most cases, you can manage redundancy for all device group members remotely from one
specific member. However, there are cases when you must log in locally to a device group member
to perform a task. An example is when resetting device trust on a device.
Important: Although a specific traffic group can be active on only one device in a device group,
the traffic group actually resides and is in a standby state on all other device group members, due
to configuration synchronization.
Only certain types of configuration objects can belong to a traffic group. Examples of traffic group objects
are self IP addresses and virtual IP addresses.
An example of a set of objects in a traffic group is an iApps™ application service. If a device with this traffic
group is a member of a device group, and the device becomes unavailable, the traffic group floats to another
member of the device group, and that member becomes the device that processes the application traffic.
When a traffic group fails over to another device in the device group, the device that the system selects is
normally the device with the least number of active traffic groups. When you initially create the traffic
group on a device, however, you specify the device in the group that you prefer that traffic group to run on
in the event that the available devices have an equal number of active traffic groups (that is, no device has
fewer active traffic groups than another). Note that, in general, the system considers the most available
device in a device group to be the device that contains the fewest active traffic groups at any given time.
Task summary
The upgrade process involves preparation of the two BIG-IP® devices (Device A and Device B) configured
in an active-standby implementation, followed by the installation and verification of version 11.x on each
device. When you upgrade each device, you perform several tasks. Completing these tasks results in a
successful upgrade to version 11.x on both BIG-IP devices, with a traffic group configured properly for an
active-standby implementation.
Preparing BIG-IP modules for an upgrade from version 10.x to version 11.x
Preparing BIG-IP active-standby systems for an upgrade
44
BIG-IP® TMOS®: Implementations
Preparing BIG-IP modules for an upgrade from version 10.x to version 11.x
Before you upgrade the BIG-IP® system from version 10.x to version 11.x, you might need to manually
prepare settings or configurations for specific modules.
Post-upgrade activities
When you complete upgrading to version 11.x, you should consider the following feature or functionality
changes that occur for the Access Policy Manager systems. Depending upon your configuration, you might
need to perform these changes after you upgrade your systems.
ACCESS::restrict_irule_events
disable
}
45
Upgrading Active-Standby Systems
46
BIG-IP® TMOS®: Implementations
Note: If you configured MAC Masquerade addresses for VLANs on the version 10.x devices, one
of the addresses will be included automatically in the MAC Masquerade Address field for
traffic-group-1 during the upgrade.
Preparation activities
Before you upgrade the WebAccelerator™ systems from version 10.x to version 11.x, you need to prepare
the systems, based on your configuration. The following table summarizes the applicable tasks that you
need to complete.
Unpublished policies You must publish any policies that you want to
migrate to version 11.x. Only published policies are
migrated into version 11.x.
Signed policies Signed policies are not supported in version 11.x. If
you use signed policies, you must replace them with
predefined or user-defined policies before upgrading.
Configuration files Upgrading from version 10.x to version 11.x does
not include custom changes to configuration files.
After upgrading to version 11.x, you need to
manually restore any customizations made to your
47
Upgrading Active-Standby Systems
Post-upgrade activities
When you complete upgrading to version 11.x, you should consider the following feature or functionality
changes that occur for the WebAccelerator systems. Depending upon your configuration, you might need
to perform these changes after you upgrade the systems.
48
BIG-IP® TMOS®: Implementations
Note: If you prefer to closely observe the upgrade of each device, you can optionally connect to
the serial console port of the device that you are upgrading.
1. For each device, complete the following steps to prepare the configuration and settings.
a) Examine the Release Notes for specific configuration requirements, and reconfigure the systems, as
necessary.
For example, you must reconfigure version 10.x symmetric WebAccelerator modules as asymmetric
systems before upgrading to version 11.x.
b) Examine the Release Notes for specific changes to settings that occur when upgrading from version
10.x to 11.x, and complete any in-process settings.
For example, you must publish any unpublished BIG-IP® WebAccelerator™ module policies in order
for them to migrate to version 11.x.
2. From the device that is running the latest configuration, synchronize the configuration to the peer unit.
a) On the Main menu, click System > High Availability > ConfigSync.
A message appears for the Status Message.
b) Click Synchronize TO Peer.
3. For each device, reactivate the license.
a) On the Main menu, click System > License.
b) Click Re-activate.
c) In the Activation Method area, select the Automatic (requires outbound connectivity) option.
d) Click Next.
The BIG-IP software license renews automatically.
4. For each device, click System > High Availability > Redundancy, and, from the Redundancy State
Preference list, select None.
5. For each device, create a backup file.
a) Access the tmsh command line utility.
b) At the prompt, type save /sys ucs /shared/[Link].
c) Copy the backup file to a safe location on your network.
49
Upgrading Active-Standby Systems
6. Download the BIG-IP version 11.x .iso file from the AskF5 downloads web site
([Link] to a preferred location.
7. Using a tool or utility that computes an md5 checksum, verify the integrity of the BIG-IP version 11.x
.iso file.
8. Import the version 11.x software image file to each device.
a) On the Main menu, click System > Software Management > Image List > Import.
b) Click Choose File, locate and click the image file, click Open, and click Import.
c) When the software image file completes uploading to the BIG-IP device, click OK.
A link to the image file, but not to the .md5 file, appears in the Software Image list.
The BIG-IP devices are prepared to install the version 11.x software onto Device B (the standby BIG-IP 2
device).
1. On the Main menu, click System > Software Management > Image List.
2. In the Available Images area, select the check box for the version 11.x software image.
3. Select a location to install the image, and click Install.
Important: In the Install Status list for the specified location, a progress bar indicates the
status of the installation. Ensure that installation successfully completes, as indicated by the
progress bar, before proceeding.
4. Reboot the device to the location of the installed version 11.x software image.
a) On the Main menu, click System > Software Management > Boot Locations.
b) In the Boot Location list, click the boot location of the installed version 11.x software image.
c) Click Activate.
The BIG-IP device reboots to the version 11.x boot location with traffic-group-1 in standby state.
Note: If the device appears to be taking a long time to reboot, do not cycle the power off
and on. Instead, verify the status of the device by connecting to its serial console port. The
device might be performing firmware upgrades.
50
BIG-IP® TMOS®: Implementations
• Device B (the version 11.x BIG-IP device with traffic-group-1) is in standby state.
After you prepare Device A (the standby BIG-IP 1 system) for upgrading the software, you can perform
these steps to upgrade the software to version 11.x.
1. On the Main menu, click System > Software Management > Image List.
2. In the Available Images area, select the check box for the version 11.x software image.
3. Select a location to install the image, and click Install.
Important: In the Install Status list for the specified location, a progress bar indicates the
status of the installation. Ensure that installation successfully completes, as indicated by the
progress bar, before proceding.
Important: Once the peer BIG-IP device (Device B) changes to active state, ensure that it
passes traffic normally.
5. Reboot the BIG-IP device (Device A) to the location of the installed version 11.x software image.
a) On the Main menu, click System > Software Management > Boot Locations.
b) In the Boot Location list, click the boot location of the installed version 11.x software image.
c) Click Activate.
The BIG-IP device (Device A) reboots to the version 11.x boot location with traffic-group-1 in
standby state.
Note: If the device appears to be taking a long time to reboot, do not cycle the power off
and on. Instead, verify the status of the device by connecting to its serial console port. The
device might be performing firmware upgrades.
Version 11.x software is installed on Device A (the BIG-IP system with traffic-group-1 in standby state).
51
Upgrading Active-Standby Systems
Note: Ensure that all information for the peer device appears correctly and complete.
Implementation result
Your upgrade of the BIG-IP® active-standby pair from version 10.x to version 11.x is now complete. The
version 11.x configuration includes a device group with two devices (Device A and Device B) and a traffic
group (traffic-group-1), with the traffic group on one device (Device B) in active state and the traffic
group on the other device (Device A) in standby state.
52
BIG-IP® TMOS®: Implementations
53
Upgrading Active-Standby Systems
54
Chapter
5
Configuring a Sync-Failover Device Group
Topics:
Task summary
Each BIG-IP device in a device group has a default traffic group (traffic group 1). Floating IP addresses
are assigned to traffic group 1 and that traffic group processes application traffic.
56
BIG-IP® TMOS®: Implementations
To process traffic for additional applications with Sync-Failover capability, create a second device group
and a second traffic group.
Use the tasks in this implementation to create a new device group to which you can assign a second traffic
group. In this active-active configuration, each device in the group has one active traffic group.
Task list
Before you begin
Specifying an IP address for config sync
Specifying IP addresses for connection mirroring
Establishing device trust
Creating a Sync-Failover device group
Syncing the BIG-IP configuration to the device group
Specifying IP addresses for failover
Creating a second traffic group for the device group
Assigning traffic-group-2 to a floating virtual IP address
Assigning traffic-group-2 to a floating self IP address
Syncing the BIG-IP configuration to the device group
Forcing a traffic group to a standby state
Important: Self IPs that you create for this device group must support Port Lockdown. You
can specify All, Custom, or Default, but not None.
Important: You must perform this task on each device in the device group.
57
Configuring a Sync-Failover Device Group
1. Confirm that you are logged in to the actual device you want to configure.
2. On the Main tab, click Device Management > Devices.
This displays a list of device objects discovered by the local device.
3. In the Name column, click the name of the device to which you are currently logged in.
4. From the Device Connectivity menu, choose ConfigSync.
5. For the Local Address setting, retain the displayed IP address or select another address from the list.
F5 Networks recommends that you use the default value, which is the self IP address for VLAN
internal. This address must be a non-floating self IP address and not a management IP address.
6. Click Update.
Important: You must perform this task on each device in the device group.
1. Confirm that you are logged in to the actual device you want to configure.
2. On the Main tab, click Device Management > Devices.
This displays a list of device objects discovered by the local device.
3. In the Name column, click the name of the device to which you are currently logged in.
4. From the Device Connectivity menu, choose Mirroring.
5. For the Primary Local Mirror Address setting, retain the displayed IP address or select another address
from the list.
The recommended IP address is the self IP address for either VLAN HA or VLAN internal.
6. For the Secondary Local Mirror Address setting, retain the default value of None, or select an address
from the list.
This setting is optional. The system uses the selected IP address in the event that the primary mirroring
address becomes unavailable.
7. Click Update.
1. On the Main tab, click Device Management/Device Trust, and then either Peer List or Subordinate
List.
2. In the Peer Authority Devices or the Subordinate Non-Authority Devices area of the screen, click Add.
58
BIG-IP® TMOS®: Implementations
3. Type an IP address, administrator user name, and administrator password for the remote BIG-IP® device.
This IP address can be either a management IP address or a self IP address.
4. Click Retrieve Device Information.
5. Verify that the certificate of the remote device is correct.
6. Verify that the name of the remote device is correct.
7. Verify that the management IP address and name of the remote device are correct.
8. Click Finished.
You now have a Sync-Failover device group containing two BIG-IP devices as members.
Important: Perform the following procedure on only one of the two devices.
59
Configuring a Sync-Failover Device Group
Except for non-floating self IP addresses, the entire set of BIG-IP configuration data is replicated on each
device in the device group.
Note: The failover addresses that you specify must belong to route domain 0.
1. Confirm that you are logged in to the actual device you want to configure.
2. On the Main tab, click Device Management > Devices.
This displays a list of device objects discovered by the local device.
3. In the Name column, click the name of the device to which you are currently logged in.
4. From the Device Connectivity menu, choose Failover.
5. For the Failover Unicast Configuration settings, retain the displayed IP addresses.
You can also click Add to specify additional IP addresses that the system can use for failover
communications. F5 Networks recommends that you use the self IP address assigned to the HA VLAN.
6. If the BIG-IP® system is running on aVIPRION® platform, then for the Use Failover Multicast Address
setting, select the Enabled check box.
7. If you enable Use Failover Multicast Address, either accept the default Address and Port values, or
specify values appropriate for the device.
If you revise the default Address and Port values, but then decide to revert back to the default values,
click Reset Defaults.
8. Click Update.
After you perform this task, other devices in the device group can send failover messages to the local device
using the specified IP addresses.
60
BIG-IP® TMOS®: Implementations
7. Click Finished.
You now have a second floating traffic group on the local device (in addition to the default floating traffic
group) so that once the traffic group is activated on the remote devices, devices in the device group can
process traffic for different applications.
1. On the Main tab, click Local Traffic > Virtual Servers > Virtual Address List.
The Virtual Address List screen opens.
2. In the Name column, click the virtual address that you want to assign to the traffic group.
This displays the properties of that virtual address.
3. From the Traffic Group list, select traffic-group-2 (floating).
4. Click Update.
The device's floating virtual IP address is now a member of your second traffic group. The virtual IP address
can now fail over to other devices in the traffic group.
The device's floating self IP address is now a member of your second traffic group. The self IP address can
now fail over to other devices in the traffic group.
Important: Perform the following procedure on only one of the two devices.
61
Configuring a Sync-Failover Device Group
Except for non-floating self IP addresses, the entire set of BIG-IP configuration data is replicated on each
device in the device group.
The selected traffic group is now active on another device in the device group.
Implementation result
You now have a Sync-Failover device group set up with an active-active configuration. In this configuration,
each traffic group is initially configured to be active on one device. If one device goes offline, the traffic
group that was active on that device becomes active on the other device in the group. Application processing
for both traffic groups continues without interruption.
62
Chapter
6
Configuring DNS Express
Topics:
Task summary
Perform these tasks to configure DNS Express™ on your BIG-IP® system.
Configuring a back-end DNS server to allow zone file transfers
Creating a DNS Express TSIG key
Creating a DNS Express zone
Enabling DNS Express
Viewing information about DNS Express zones
You can modify the following allow-transfer statement to use a self IP address on the
BIG-IP system:
allow-transfer { localhost; <self IP address of BIG-IP
system>; };
64
BIG-IP® TMOS®: Implementations
1. On the Main tab, click Local Traffic > DNS Express Zones > DNS Express TSIG Key List.
The DNS Express TSIG Key List screen opens.
2. Click Create.
The New DNS Express TSIG Key screen opens.
3. In the Name field, type a name for the key.
4. From the Algorithm list, select one of the following.
The system uses the algorithm that you select to authenticate updates from an approved client and
responses from an approved recursive nameserver. The algorithm is a hash function in combination with
the secret key.
Algorithm Name Description
HMAC MD5 Produces a 128-bit hash sequence
HMAC SHA-1 Produces a 160-bit hash sequence
HMAC SHA-256 Produces a 256-bit hash sequence
5. In the Secret field, type the phrase required for authentication of the key.
Note: The secret key is created by a third party tool such as BIND’s keygen utility.
6. Click Finished.
1. On the Main tab, click Local Traffic > DNS Express Zones > DNS Express Zone List.
The DNS Express Zone List screen opens.
2. Click Create.
The New DNS Express Zone screen opens.
3. In the Name field, type a name for the DNS Express zone.
4. In the Target IP Address field, type the IP address of the current master DNS server for the zone from
which you want to transfer records.
The default value [Link] is for the BIND server on the BIG-IP system.
5. To configure the system to verify the identity of the authoritative server that is sending information
about the zone, from the TSIG Key list, select a key.
6. To specify an action for the BIG-IP system to take when a NOTIFY query is received for a configured
DNS Express zone, from the Notify Action list, select one of the following.
Action Description
Consume The NOTIFY query is seen only by DNS Express. This is the default value.
Bypass Queries do not go to DNS Express, but instead go to any backend DNS
resource (subject to DNS profile unhandled-query-action).
65
Configuring DNS Express
Action Description
Repeat The NOTIFY query goes to both DNS Express and any backend DNS
resource.
Tip: If a TSIG Key is configured, the signature is only validated for Consume and Repeat
actions. NOTIFY responses are assumed to be sent by a backend DNS resource, except when
the action is Consume and DNS Express generates a response.
7. Click Finished.
Note: If you plan to use the BIND server on BIG-IP GTM™, you can use the default dns profile.
1. On the Main tab, click Local Traffic > Profiles > Services > DNS.
The DNS profile list screen opens.
2. Click Create.
The New DNS Profile screen opens.
3. Name the profile dns_express.
4. In the Parent Profile list, accept the default dns profile.
5. Select the Custom check box.
The fields in the Settings area become available for revision.
6. In the Global Traffic Management list, accept the default value Enabled.
7. From the DNS Express list, select Enabled.
8. From the Unhandled Query Actions list, select how you want the BIG-IP system to handle a query
that is not for a wide IP or DNS Express zone.
Option Description
Allow The BIG-IP system forwards the connection request to another DNS server or
DNS server pool. Note that if a DNS server pool is not associated with a listener
and the Use BIND Server on BIG-IP option is set to enabled, connection
requests are forwarded to the local BIND server. (Allow is the default value.)
Drop The BIG-IP system does not respond to the query.
Reject The BIG-IP system returns the query with the REFUSED return code.
Hint The BIG-IP system returns the query with a list of root name servers.
No Error The BIG-IP system returns the query with the NOERROR return code.
66
BIG-IP® TMOS®: Implementations
1. On the Main tab, click Statistics > Module Statistics > Local Traffic.
The Local Traffic Statistics screen opens.
2. From the Statistics Type list, select DNS Express Zones.
Information displays about the DNS Express zones.
Task summary
Enabling DNS Express
Task summary
Implementation result
You now have an implementation in which the BIG-IP® system helps to mitigate DDoS attacks on your
network and to resolve more DNS queries faster.
67
Configuring DNS Express
68
Chapter
7
Load Balancing DNS Traffic Between IPv-6 Only and IPv-4
Only Clouds
Topics:
Task summary
Perform these tasks to configure BIG-IP systems to handle DNS queries from IPv6-only clients to IPv4-only
servers on your network.
Creating a custom DNS profile
Assigning a DNS profile to a virtual server
1. On the Main tab, click Local Traffic > Profiles > Services > DNS.
The DNS profile list screen opens.
2. Click Create.
The New DNS Profile screen opens.
70
BIG-IP® TMOS®: Implementations
Important: Select this option only if you know that all your DNS servers are IPv4
only servers.
10. From the Use BIND Server on BIG-IP list, select Enabled.
Note: Enable this setting only when you want the system to forward non-wide IP queries to the
local BIND server on BIG-IP GTM.
71
Load Balancing DNS Traffic Between IPv-6 Only and IPv-4 Only Clouds
This virtual server can now pass traffic between an IPv6-only client and an IPv4-only DNS server.
Implementation result
You now have an implementation in which the BIG-IP® system handles connection requests from an
IPv6-only client to an IPv4-only server.
72
Chapter
8
Implementing the Link Layer Discovery Protocol
Topics:
74
BIG-IP® TMOS®: Implementations
Task summary
Perform these tasks to implement Link Layer Discovery Protocol (LLDP) on selected BIG-IP system
interfaces.
Task list
Configuring global LLDP properties
Configuring LLDP settings for an individual interface
Note: Although you use this procedure to globally enable the LLDP feature on the BIG-IP system,
you can also disable LLDP for any individual interface. You do this by configuring the specific
properties of that interface.
1. On the Main tab, click Network > Interfaces > LLDP > General.
This displays the general LLDP properties that you can configure on the system.
2. From the LLDP list, select Enabled.
3. For the remainder of the settings, retain or change the default values.
4. Click Update.
This enables support for the LLDP protocol on the BIG-IP system, and configures the system to transmit
LLDPDUs according to the specified frequencies.
1. On the Main tab, click Network > Interfaces > Interface List.
This displays the list of interfaces on the system.
2. In the Name column, click an interface number.
This displays the properties of the interface.
3. For the State setting, verify that the interface is set to Enabled.
4. For the LLDP setting, verify that the property is set to Transmit Only.
5. For the LLDP Attributes setting, verify that the list of attributes in the Send box includes all Time
Length Values (TLVs) that you want the BIG-IP system interface to send to neighbor devices.
6. Click Update.
This enables the selected interface and configures the interface to send the specified LLDP information to
neighbor devices.
75
Implementing the Link Layer Discovery Protocol
Implementation result
This implementation results in this LLDP configuration:
• Support for the LLDP protocol is enabled on the BIG-IP system.
• For all BIG-IP system interfaces, the BIG-IP system attempts to transmit LLDPDUs to neighbor de
vices
every 30 seconds, with a minimum delay between transmissions of 2 seconds.
• The maximum number of neighbors to which each BIG-IP system interface can send LLDPDUs is 10.
• Every BIG-IP system interface can send LLDPDUs to its neighbors.
• No BIG-IP system interface can receive LLDPDUs from its neighbors.
In addition, the content of the LLDPDUs that each BIG-IP system interface sends to its neighbors contains
this information:
• Chassis ID
• Port ID
• Time-to-Live value
• Port description
• System name
• System description
• System capabilities
• Port VLAN ID
• Port and protocol VLAN ID
• VLAN name
• Protocol identity
• MAC/PHY config status
• Link aggregation
• Max frame size
• Product model
76
Chapter
9
Configuring IPsec in Tunnel Mode between Two BIG-IP
Systems
Topics:
78
BIG-IP® TMOS®: Implementations
Task summary
You can configure the IPsec and IKE protocols to secure traffic that traverses a wide area network (WAN),
such as from one data center to another.
Before you begin configuring IPsec and IKE, verify that these modules, system objects, and connectivity
exist on the BIG-IP® systems in both the local and remote locations:
BIG-IP Local Traffic Manager™
This module directs traffic securely and efficiently to the appropriate destination on a network.
Self IP address
Each BIG-IP system must have at least one self IP address, to be used in specifying the ends of the IPsec
tunnel.
The default VLANs
These VLANs are named external and internal.
BIG-IP connectivity
Verify the connectivity between the client or server and its BIG-IP device, and between each BIG-IP
device and its gateway. For example, you can use ping to test this connectivity.
Task list
Creating a forwarding virtual server for IPsec
Creating an IKE peer
Creating a custom IPsec policy
Creating a bidirectional IPsec traffic selector
Verifying IPsec connectivity for Tunnel mode
79
Configuring IPsec in Tunnel Mode between Two BIG-IP Systems
1. On the Main tab, click Network > IPsec > IKE Peers.
2. Click the Create button.
The New IKE Peer screen opens.
3. In the Name field, type a unique name for the IKE peer.
4. In the Description field, type a brief description of the IKE peer.
5. In the Remote Address field, type the IP address of the BIG-IP system that is remote to the system you
are configuring.
This address must match the value of the Tunnel Remote Address setting in the relevant IPsec policy.
6. For the State setting, retain the default value, Enabled.
7. For the IKE Phase 1 Algorithms area, retain the default values, or select the options that are appropriate
for your deployment.
8. In the IKE Phase 1 Credentials area, for theAuthentication Method setting, select either RSA Signature
or Preshared Key.
• If you select RSA Signature (default), the Certificate, Key, and Verify Certificate settings are
available. If you have your own certificate file, key file, and certificate authority (CA), F5
recommends, for security purposes, that you specify these files in the appropriate fields. To reveal
all these fields, select the Verify Certificate check box. If you retain the default settings, leave the
check box cleared.
80
BIG-IP® TMOS®: Implementations
Important: If you select the check box, you must provide a certificate file, key, and certificate
authority.
• If you select Preshared Key, type the key in the Preshared Key field that becomes available.
Note: The key you type must be the same at both ends of the tunnel.
You now have an IKE peer defined for establishing a secure channel.
1. On the Main tab, click Network > IPsec > IPsec Policies.
2. Click the Create button.
The New Policy screen opens.
3. In the Name field, type a unique name for the policy.
4. In the Description field, type a brief description of the policy.
5. For the IPsec Protocol setting, retain the default selection, ESP.
6. From the Mode list, select Tunnel.
The screen refreshes to show additional related settings.
7. In the Tunnel Local Address field, type the local IP address of the system you are configuring.
Sample tunnel local addresses for BIG-IP A and BIG-IP B are as follows.
BIG-IP B [Link]
8. In the Tunnel Remote Address field, type the IP address that is remote to the system you are configuring.
This address must match the Remote Address setting for the relevant IKE peer.
Sample tunnel remote addresses for BIG-IP A and BIG-IP B are as follows.
BIG-IP B [Link]
81
Configuring IPsec in Tunnel Mode between Two BIG-IP Systems
9. For the Authentication Algorithm setting, retain the default value, or select the algorithm appropriate
for your deployment.
10. For the Encryption Algorithm setting, retain the default value, or select the algorithm appropriate for
your deployment.
11. For the Perfect Forward Secrecy setting, retain the default value, or select the option appropriate for
your deployment.
12. For the Lifetime setting, retain the default value, 1440.
This is the length of time (in minutes) before the current security association expires.
13. Click Finished.
The screen refreshes and displays the new IPsec policy in the list.
14. Repeat this task on the BIG-IP system in the remote location.
1. On the Main tab, click Network > IPsec > Traffic Selectors.
2. Click Create.
The New Traffic Selector screen opens.
3. In the Name field, type a unique name for the traffic selector.
4. In the Description field, type a brief description of the traffic selector.
5. For the Order setting, retain the default value (First).
This setting specifies the order in which the traffic selector appears on the Traffic Selector List screen.
6. From the Configuration list, select Advanced.
7. For the Source IP Address setting, click Host or Network, and in the Address field, type an IP address.
This IP address should be the host or network address from which the application traffic originates.
Sample source IP addresses for BIG-IP A and BIG-IP B are as follows:
BIG-IP B [Link]/24
8. From the Source Port list, select the source port for which you want to filter traffic, or retain the default
value *All Ports.
9. For the Destination IP Address setting, click Host, and in the Address field, type an IP address.
This IP address should be the final host or network address to which the application traffic is destined.
Sample destination IP addresses for BIG-IP A and BIG-IP B are as follows:
BIG-IP B [Link]/24
82
BIG-IP® TMOS®: Implementations
10. From the Destination Port list, select the destination port for which you want to filter traffic, or retain
the default value * All Ports.
11. From the Protocol list, select the protocol for which you want to filter traffic.
You can select * All Protocols, TCP, UDP, ICMP, or Other. If you select Other, you must type a
protocol name.
12. From the Direction list, select Both.
13. From the Action list, select Protect.
The IPsec Policy Name setting appears.
14. From the IPsec Policy Name list, select the name of the custom IPsec policy that you created.
15. Click Finished.
The screen refreshes and displays the new IPsec traffic selector in the list.
16. Repeat this task on the BIG-IP system in the remote location.
Note: Only data traffic matching the traffic selector triggers the establishment of the tunnel.
83
Configuring IPsec in Tunnel Mode between Two BIG-IP Systems
5. Check the IKE Phase 2 negotiation status by typing this command at the prompt.
racoonctl -l1 show-sa internal
This example shows a result of this command. Source is the tunnel local IP address. Destination is
the tunnel remote IP address.
84
BIG-IP® TMOS®: Implementations
Column Displayed
Side I (Initiator)
R (Responder)
Status init
start
acquire
getspi sent
getspi done
1st msg sent
1st msg recvd
commit bit
sa added
sa established
sa expired
6. To verify the establishment of dynamic negotiated Security Associations (SAs), type this command at
the prompt.
racoonctl -l show-sa ipsec
For each tunnel, the output displays IP addresses and information for two IPsec SAs, one for each
direction, as shown in the example.
[Link] [Link]
esp mode=tunnel spi=2068022822(0x7b438626)
reqid=26781(0x0000689d)
E: null
A: hmac-sha1 9669c37c 4c83c096 beeddbde ef74d61a 2acf37ef
seq=0x00000000 replay=4 flags=0x00000000 state=mature
created: Dec 31 [Link] 1969 current: Jun 29 [Link] 2012
85
Configuring IPsec in Tunnel Mode between Two BIG-IP Systems
-------------------------------------------------------------------
Net::Ipsec
Cmd Id Mode Packets In Bytes In Packets Out Bytes Out
-------------------------------------------------------------------
0 TRANSPORT 0 0 0 0
0 TRANSPORT 0 0 0 0
0 TUNNEL 0 0 0 0
0 TUNNEL 0 0 0 0
1 TUNNEL 353.9K 252.4M 24.9K 1.8M
2 TUNNEL 117.9K 41.0M 163.3K 12.4M
8. If the SAs are established, but traffic is not passing, type these commands at the prompt.
10. For protocol-level troubleshooting, you can increase the debug level by typing this command at the
prompt.
tmsh modify net ipsec ike-daemon ikedaemon log-level debug2
Important: Use this command only for debugging. It creates a large log file, and can slow the
tunnel negotiation.
11. After you view the results, return the debug level to normal to avoid excessive logging by typing this
command at the prompt.
tmsh modify ipsec ike-daemon ikedaemon log-level info
86
BIG-IP® TMOS®: Implementations
Implementation result
You now have an IPsec tunnel for securing traffic that traverses the WAN, from one BIG-IP® system to
another.
87
Configuring IPsec in Tunnel Mode between Two BIG-IP Systems
88
Chapter
10
Configuring IPsec in Transport Mode between Two BIG-IP
Systems
Topics:
90
BIG-IP® TMOS®: Implementations
Task summary
With this task, you can configure the IPsec and IKE protocols to secure traffic that traverses a wide area
network (WAN), such as from one data center to another.
Before you begin configuring IPsec and IKE, verify that these modules, system objects, and connectivity
exist on the BIG-IP® systems in both the local and remote locations:
BIG-IP Local Traffic Manager™
This module directs traffic securely and efficiently to the appropriate destination on a network.
Self IP address
Each BIG-IP system must have at least one self IP address, to be used in specifying the ends of the IPsec
tunnel.
The default VLANs
These VLANs are named external and internal.
BIG-IP connectivity
Verify the connectivity between the client or server and its BIG-IP device, and between each BIG-IP
device and its gateway. For example, you can use ping to test this connectivity.
Task list
Creating a forwarding virtual server for IPsec
Creating an IKE peer
Creating a bidirectional IPsec policy
Creating a bidirectional IPsec traffic selector
Verifying IPsec connectivity for Transport mode
91
Configuring IPsec in Transport Mode between Two BIG-IP Systems
1. On the Main tab, click Network > IPsec > IKE Peers.
2. Click the Create button.
The New IKE Peer screen opens.
3. In the Name field, type a unique name for the IKE peer.
4. In the Description field, type a brief description of the IKE peer.
5. In the Remote Address field, type the IP address of the BIG-IP system that is remote to the system you
are configuring.
This address must match the value of the Tunnel Remote Address setting in the relevant IPsec policy.
6. For the State setting, retain the default value, Enabled.
7. For the IKE Phase 1 Algorithms area, retain the default values, or select the options that are appropriate
for your deployment.
8. In the IKE Phase 1 Credentials area, for theAuthentication Method setting, select either RSA Signature
or Preshared Key.
• If you select RSA Signature (default), the Certificate, Key, and Verify Certificate settings are
available. If you have your own certificate file, key file, and certificate authority (CA), F5
recommends, for security purposes, that you specify these files in the appropriate fields. To reveal
all these fields, select the Verify Certificate check box. If you retain the default settings, leave the
check box cleared.
92
BIG-IP® TMOS®: Implementations
Important: If you select the check box, you must provide a certificate file, key, and certificate
authority.
• If you select Preshared Key, type the key in the Preshared Key field that becomes available.
Note: The key you type must be the same at both ends of the tunnel.
You now have an IKE peer defined for establishing a secure channel.
1. On the Main tab, click Network > IPsec > IPsec Policies.
2. Click the Create button.
The New Policy screen opens.
3. In the Name field, type a unique name for the policy.
4. In the Description field, type a brief description of the policy.
5. For the IPsec Protocol setting, retain the default selection, ESP.
6. From the Mode list, select Transport.
7. For the Authentication Algorithm setting, retain the default value, or select the algorithm appropriate
for your deployment.
8. For the Encryption Algorithm setting, retain the default value, or select the algorithm appropriate for
your deployment.
9. For the Perfect Forward Secrecy setting, retain the default value, or select the option appropriate for
your deployment.
10. For the Lifetime setting, retain the default value, 1440.
This is the length of time (in minutes) before the current security association expires.
11. Click Finished.
The screen refreshes and displays the new IPsec policy in the list.
12. Repeat this task on the BIG-IP system in the remote location.
93
Configuring IPsec in Transport Mode between Two BIG-IP Systems
1. On the Main tab, click Network > IPsec > Traffic Selectors.
2. Click Create.
The New Traffic Selector screen opens.
3. In the Name field, type a unique name for the traffic selector.
4. In the Description field, type a brief description of the traffic selector.
5. For the Order setting, retain the default value (First).
This setting specifies the order in which the traffic selector appears on the Traffic Selector List screen.
6. From the Configuration list, select Advanced.
7. For the Source IP Address setting, click Host or Network, and in the Address field, type an IP address.
This IP address should be the host or network address from which the application traffic originates.
Sample source IP addresses for BIG-IP A and BIG-IP B are as follows:
BIG-IP B [Link]/24
8. From the Source Port list, select the source port for which you want to filter traffic, or retain the default
value *All Ports.
9. For the Destination IP Address setting, click Host, and in the Address field, type an IP address.
This IP address should be the final host or network address to which the application traffic is destined.
Sample destination IP addresses for BIG-IP A and BIG-IP B are as follows:
BIG-IP B [Link]/24
10. From the Destination Port list, select the destination port for which you want to filter traffic, or retain
the default value * All Ports.
11. From the Protocol list, select the protocol for which you want to filter traffic.
You can select * All Protocols, TCP, UDP, ICMP, or Other. If you select Other, you must type a
protocol name.
12. From the Direction list, select Both.
13. From the Action list, select Protect.
The IPsec Policy Name setting appears.
14. From the IPsec Policy Name list, select the name of the custom IPsec policy that you created.
15. Click Finished.
The screen refreshes and displays the new IPsec traffic selector in the list.
16. Repeat this task on the BIG-IP system in the remote location.
94
BIG-IP® TMOS®: Implementations
95
Configuring IPsec in Transport Mode between Two BIG-IP Systems
5. Check the IKE Phase 2 negotiation status by typing this command at the prompt.
racoonctl -l1 show-sa internal
This example shows a result of this command. Source is the tunnel local IP address. Destination is
the tunnel remote IP address.
96
BIG-IP® TMOS®: Implementations
Column Displayed
Side I (Initiator)
R (Responder)
Status init
start
acquire
getspi sent
getspi done
1st msg sent
1st msg recvd
commit bit
sa added
sa established
sa expired
6. To verify the establishment of dynamic negotiated Security Associations (SAs), type this command at
the prompt.
racoonctl -l show-sa ipsec
For each tunnel, the output displays IP addresses and information for two IPsec SAs, one for each
direction, as shown in the example.
[Link] [Link]
esp mode=transport spi=2068022822(0x7b438626)
reqid=26781(0x0000689d)
E: null
A: hmac-sha1 9669c37c 4c83c096 beeddbde ef74d61a 2acf37ef
seq=0x00000000 replay=4 flags=0x00000000 state=mature
created: Dec 31 [Link] 1969 current: Jun 29 [Link] 2012
97
Configuring IPsec in Transport Mode between Two BIG-IP Systems
-------------------------------------------------------------------
Net::Ipsec
Cmd Id Mode Packets In Bytes In Packets Out Bytes Out
-------------------------------------------------------------------
0 TRANSPORT 353.9K 252.4M 24.9K 1.8M
0 TRANSPORT 117.9K 41.0M 163.3K 12.4M
0 TUNNEL 0 0 0 0
0 TUNNEL 0 0 0 0
1 TUNNEL 0 0 0 0
2 TUNNEL 0 0 0 0
8. If the SAs are established, but traffic is not passing, type these commands at the prompt.
10. For troubleshooting, increase the debug level by typing this command at the prompt.
tmsh modify net ipsec ike-daemon ikedaemon log-level debug2
Important: Use this command only for debugging. It creates a large log file, and can slow the
tunnel negotiation.
11. After you view the results, return the debug level to normal to avoid excessive logging by typing this
command at the prompt.
tmsh modify ipsec ike-daemon ikedaemon log-level info
98
BIG-IP® TMOS®: Implementations
Implementation result
You now have a secure IPsec channel for securing traffic that traverses the WAN, from one BIG-IP® system
to another.
99
Configuring IPsec in Transport Mode between Two BIG-IP Systems
100
Chapter
11
Configuring IPsec between a BIG-IP System and a
Third-Party Device
Topics:
Figure 11: Example of an IPsec tunnel between a BIG-IP system and a third-party device
102
BIG-IP® TMOS®: Implementations
Task summary
You can configure the IPsec and IKE protocols to secure traffic that traverses a wide area network (WAN),
such as from one data center to another.
Before you begin configuring IPsec and IKE, verify that this module, system objects, and connectivity exist
on the BIG-IP® system:
BIG-IP Local Traffic Manager™
This module directs traffic securely and efficiently to the appropriate destination on a network.
Self IP address
The BIG-IP system must have at least one self IP address, to be used in specifying the end of the IPsec
tunnel.
The default VLANs
These VLANs are named external and internal.
BIG-IP connectivity
Verify the connectivity between the client or server and its BIG-IP device, and between the BIG-IP
device and its gateway. For example, you can use ping to test this connectivity.
103
Configuring IPsec between a BIG-IP System and a Third-Party Device
Task list
Creating a forwarding virtual server for IPsec
Creating an IKE peer
Creating a custom IPsec policy
Creating a bidirectional IPsec traffic selector
Verifying IPsec connectivity for Tunnel mode
Important: You must also configure the device at the other end of the IPsec tunnel.
1. On the Main tab, click Network > IPsec > IKE Peers.
2. Click the Create button.
The New IKE Peer screen opens.
3. In the Name field, type a unique name for the IKE peer.
4. In the Description field, type a brief description of the IKE peer.
5. In the Remote Address field, type the IP address of the device that is remote to the system you are
configuring.
This address must match the value of the Tunnel Remote Address setting in the relevant IPsec policy.
6. For the State setting, retain the default value, Enabled.
7. For the IKE Phase 1 Algorithms area, retain the default values, or select the options that are appropriate
for your deployment.
104
BIG-IP® TMOS®: Implementations
Important: The values you select must match the IKE Phase 1 settings on the remote device.
Setting Options
Authentication Algorithm
MD5
SHA-1 (default)
SHA-256
SHA-384
SHA-512
Encryption Algorithm
DES
3 DES (default)
BLOWFISH
CAST128
AES
CAMELLIA
MODP1024 (default)
MODP1536
MODP2048
MODP3072
MODP4096
MODP6144
MODP8192
8. In the IKE Phase 1 Credentials area, for theAuthentication Method setting, select either RSA Signature
or Preshared Key.
• If you select RSA Signature (default), the Certificate, Key, and Verify Certificate settings are
available. If you have your own certificate file, key file, and certificate authority (CA), F5
recommends, for security purposes, that you specify these files in the appropriate fields. To reveal
all these fields, select the Verify Certificate check box. If you retain the default settings, leave the
check box cleared.
Important: If you select the check box, you must provide a certificate file, key, and certificate
authority.
105
Configuring IPsec between a BIG-IP System and a Third-Party Device
• If you select Preshared Key, type the key in the Preshared Key field that becomes available.
Note: The key you type must be the same at both ends of the tunnel.
You now have an IKE peer defined for establishing a secure channel.
Important: You must also configure the device at the other end of the IPsec tunnel.
1. On the Main tab, click Network > IPsec > IPsec Policies.
2. Click the Create button.
The New Policy screen opens.
3. In the Name field, type a unique name for the policy.
4. In the Description field, type a brief description of the policy.
5. For the IPsec Protocol setting, retain the default selection, ESP.
6. From the Mode list, select Tunnel.
The screen refreshes to show additional related settings.
7. In the Tunnel Local Address field, type the local IP address of the system you are configuring.
For example, the tunnel local IP address for BIG-IP A is [Link].
8. In the Tunnel Remote Address field, type the IP address that is remote to the system you are configuring.
This address must match the Remote Address setting for the relevant IKE peer.
For example, the tunnel remote IP address configured on BIG-IP A is the IP address of Router B, which
is [Link].
9. For the IKE Phase 2 area, retain the default values, or select the options that are appropriate for your
deployment.
Important: The values you select must match the IKE Phase 2 settings on the remote device.
Setting Options
Authentication Algorithm
SHA-1
AES-GCM128 (default)
AES-GCM192
AES-GCM256
AES-GMAC128
AES-GMAC192
106
BIG-IP® TMOS®: Implementations
Setting Options
AES-GMAC256
Encryption Algorithm
AES-GCM128 (default)
MODP1024 (default)
MODP1536
MODP2048
MODP3072
MODP4096
MODP6144
MODP8192
Important: You must also configure the device at the other end of the IPsec tunnel.
1. On the Main tab, click Network > IPsec > Traffic Selectors.
2. Click Create.
The New Traffic Selector screen opens.
3. In the Name field, type a unique name for the traffic selector.
4. In the Description field, type a brief description of the traffic selector.
5. For the Order setting, retain the default value (First).
This setting specifies the order in which the traffic selector appears on the Traffic Selector List screen.
6. From the Configuration list, select Advanced.
7. For the Source IP Address setting, click Host or Network, and in the Address field, type an IP address.
This IP address should be the host or network address from which the application traffic originates.
107
Configuring IPsec between a BIG-IP System and a Third-Party Device
Router B [Link]/24
8. From the Source Port list, select the source port for which you want to filter traffic, or retain the default
value *All Ports.
9. For the Destination IP Address setting, click Host, and in the Address field, type an IP address.
This IP address should be the final host or network address to which the application traffic is destined.
Sample destination IP addresses for BIG-IP A and BIG-IP B are as follows.
Router B [Link]/24
10. From the Destination Port list, select the destination port for which you want to filter traffic, or retain
the default value * All Ports.
11. From the Protocol list, select the protocol for which you want to filter traffic.
You can select * All Protocols, TCP, UDP, ICMP, or Other. If you select Other, you must type a
protocol name.
12. From the Direction list, select Both.
13. From the Action list, select Protect.
The IPsec Policy Name setting appears.
14. From the IPsec Policy Name list, select the name of the custom IPsec policy that you created.
15. Click Finished.
The screen refreshes and displays the new IPsec traffic selector in the list.
Note: Only data traffic matching the traffic selector triggers the establishment of the tunnel.
108
BIG-IP® TMOS®: Implementations
This example shows a result of the command. Destination is the tunnel remote IP address.
5. Check the IKE Phase 2 negotiation status by typing this command at the prompt.
racoonctl -l1 show-sa internal
This example shows a result of this command. Source is the tunnel local IP address. Destination is
the tunnel remote IP address.
109
Configuring IPsec between a BIG-IP System and a Third-Party Device
Column Displayed
Side I (Initiator)
R (Responder)
Status init
start
acquire
getspi sent
getspi done
1st msg sent
1st msg recvd
commit bit
sa added
sa established
sa expired
6. To verify the establishment of dynamic negotiated Security Associations (SAs), type this command at
the prompt.
racoonctl -l show-sa ipsec
For each tunnel, the output displays IP addresses and information for two IPsec SAs, one for each
direction, as shown in the example.
[Link] [Link]
esp mode=tunnel spi=2068022822(0x7b438626)
reqid=26781(0x0000689d)
E: null
A: hmac-sha1 9669c37c 4c83c096 beeddbde ef74d61a 2acf37ef
seq=0x00000000 replay=4 flags=0x00000000 state=mature
created: Dec 31 [Link] 1969 current: Jun 29 [Link] 2012
110
BIG-IP® TMOS®: Implementations
-------------------------------------------------------------------
Net::Ipsec
Cmd Id Mode Packets In Bytes In Packets Out Bytes Out
-------------------------------------------------------------------
0 TRANSPORT 0 0 0 0
0 TRANSPORT 0 0 0 0
0 TUNNEL 0 0 0 0
0 TUNNEL 0 0 0 0
1 TUNNEL 353.9K 252.4M 24.9K 1.8M
2 TUNNEL 117.9K 41.0M 163.3K 12.4M
8. If the SAs are established, but traffic is not passing, type these commands at the prompt.
10. For protocol-level troubleshooting, you can increase the debug level by typing this command at the
prompt.
tmsh modify net ipsec ike-daemon ikedaemon log-level debug2
Important: Use this command only for debugging. It creates a large log file, and can slow the
tunnel negotiation.
11. After you view the results, return the debug level to normal to avoid excessive logging by typing this
command at the prompt.
tmsh modify ipsec ike-daemon ikedaemon log-level info
111
Configuring IPsec between a BIG-IP System and a Third-Party Device
Implementation result
You now have an IPsec tunnel for securing traffic that traverses the WAN, from one BIG-IP® system to a
third-party device.
112
Chapter
12
Configuring IPsec Using Manually Keyed Security
Associations
Topics:
The implementation of the IPsec protocol suite with a manual security association consists of these
components:
IPsec policy
An IPsec policy is a set of information that defines the specific IPsec protocol to use (ESP or AH), and
the mode (Transport, Tunnel, or iSession). For Tunnel mode, the policy also specifies the endpoints for
the tunnel. The way that you configure the IPsec policy determines the way that the BIG-IP system
manipulates the IP headers in the packets. The BIG-IP system includes two default IPsec policies, named
default-ipsec-policy and default-ipsec-policy-isession. A common configuration
includes a bidirectional policy on each BIG-IP system.
Manual security association
A manual security association is set of information that the IPsec protocol uses to authenticate and
encrypt application traffic.
Note: When you create a manual security association instead of using IKE, the peer systems
do not negotiate these attributes. Peers can communicate only when they share the same
configured attributes.
Traffic selector
A traffic selector is a packet filter that defines what traffic should be handled by a IPsec policy. You
define the traffic by source and destination IP addresses and port numbers. A common configuration
includes a bidirectional traffic selector on each BIG-IP system.
114
BIG-IP® TMOS®: Implementations
Task summary
You can configure an IPsec tunnel to secure traffic that traverses a wide area network (WAN), such as from
one data center to another.
Before you begin configuring IPsec, verify that these modules, system objects, and connectivity exist on
the BIG-IP® systems in both the local and remote locations:
BIG-IP Local Traffic Manager™
This module directs traffic securely and efficiently to the appropriate destination on a network.
Self IP address
Each BIG-IP system must have at least one self IP address, to be used in specifying the ends of the IPsec
tunnel.
The default VLANs
These VLANs are named external and internal.
BIG-IP connectivity
Verify the connectivity between the client or server and its BIG-IP device, and between each BIG-IP
device and its gateway. For example, you can use ping to test this connectivity.
Task list
Creating a forwarding virtual server for IPsec
Creating a manual IPsec security association
Creating a custom IPsec policy
Creating a bidirectional IPsec traffic selector
Verifying IPsec connectivity for Tunnel mode
115
Configuring IPsec Using Manually Keyed Security Associations
1. On the Main tab, click Network > IPsec > Manual Security Associations.
2. Click the Create button.
The New Security Association screen opens.
3. In the Name field, type a unique name for the security association.
4. In the Description field, type a brief description of the security setting.
5. In the SPI field, type a unique number for the security parameter index.
This number must be an integer between 256 and 4294967296.
6. In the Source Address field, type the source IP address.
7. In the Destination Address field, type the destination IP address.
8. In the Authentication Key field, type a key value.
This value can by any double-quoted character string up to a maximum of 128 characters
9. From the Encryption Algorithm list, select the algorithm appropriate to your deployment.
10. In the Encryption Key field, type a key value.
This value can by any double-quoted character string up to a maximum of 128 characters
11. Click Finished.
The screen refreshes and displays the new IPsec security association in the list.
12. Repeat this task on the BIG-IP system in the remote location.
1. On the Main tab, click Network > IPsec > IPsec Policies.
116
BIG-IP® TMOS®: Implementations
BIG-IP B [Link]
8. In the Tunnel Remote Address field, type the IP address that is remote to the system you are configuring.
This address must match the Remote Address setting for the relevant IKE peer.
Sample tunnel remote addresses for BIG-IP A and BIG-IP B are as follows.
BIG-IP B [Link]
9. For the Authentication Algorithm setting, retain the default value, or select the algorithm appropriate
for your deployment.
10. For the Encryption Algorithm setting, retain the default value, or select the algorithm appropriate for
your deployment.
11. For the Perfect Forward Secrecy setting, retain the default value, or select the option appropriate for
your deployment.
12. For the Lifetime setting, retain the default value, 1440.
This is the length of time (in minutes) before the current security association expires.
13. Click Finished.
The screen refreshes and displays the new IPsec policy in the list.
14. Repeat this task on the BIG-IP system in the remote location.
1. On the Main tab, click Network > IPsec > Traffic Selectors.
2. Click Create.
The New Traffic Selector screen opens.
3. In the Name field, type a unique name for the traffic selector.
117
Configuring IPsec Using Manually Keyed Security Associations
BIG-IP B [Link]/24
8. From the Source Port list, select the source port for which you want to filter traffic, or retain the default
value *All Ports.
9. For the Destination IP Address setting, click Host, and in the Address field, type an IP address.
This IP address should be the final host or network address to which the application traffic is destined.
Sample destination IP addresses for BIG-IP A and BIG-IP B are as follows:
BIG-IP B [Link]/24
10. From the Destination Port list, select the destination port for which you want to filter traffic, or retain
the default value * All Ports.
11. From the Protocol list, select the protocol for which you want to filter traffic.
You can select * All Protocols, TCP, UDP, ICMP, or Other. If you select Other, you must type a
protocol name.
12. From the Direction list, select Both.
13. From the Action list, select Protect.
The IPsec Policy Name setting appears.
14. From the IPsec Policy Name list, select the name of the custom IPsec policy that you created.
15. Click Finished.
The screen refreshes and displays the new IPsec traffic selector in the list.
16. Repeat this task on the BIG-IP system in the remote location.
Note: Only data traffic matching the traffic selector triggers the establishment of the tunnel.
118
BIG-IP® TMOS®: Implementations
5. Check the IKE Phase 2 negotiation status by typing this command at the prompt.
racoonctl -l1 show-sa internal
This example shows a result of this command. Source is the tunnel local IP address. Destination is
the tunnel remote IP address.
119
Configuring IPsec Using Manually Keyed Security Associations
Column Displayed
Side I (Initiator)
R (Responder)
Status init
start
acquire
getspi sent
getspi done
1st msg sent
1st msg recvd
commit bit
sa added
sa established
sa expired
6. To verify the establishment of dynamic negotiated Security Associations (SAs), type this command at
the prompt.
racoonctl -l show-sa ipsec
For each tunnel, the output displays IP addresses and information for two IPsec SAs, one for each
direction, as shown in the example.
[Link] [Link]
esp mode=tunnel spi=2068022822(0x7b438626)
reqid=26781(0x0000689d)
E: null
A: hmac-sha1 9669c37c 4c83c096 beeddbde ef74d61a 2acf37ef
seq=0x00000000 replay=4 flags=0x00000000 state=mature
created: Dec 31 [Link] 1969 current: Jun 29 [Link] 2012
120
BIG-IP® TMOS®: Implementations
-------------------------------------------------------------------
Net::Ipsec
Cmd Id Mode Packets In Bytes In Packets Out Bytes Out
-------------------------------------------------------------------
0 TRANSPORT 0 0 0 0
0 TRANSPORT 0 0 0 0
0 TUNNEL 0 0 0 0
0 TUNNEL 0 0 0 0
1 TUNNEL 353.9K 252.4M 24.9K 1.8M
2 TUNNEL 117.9K 41.0M 163.3K 12.4M
8. If the SAs are established, but traffic is not passing, type these commands at the prompt.
10. For protocol-level troubleshooting, you can increase the debug level by typing this command at the
prompt.
tmsh modify net ipsec ike-daemon ikedaemon log-level debug2
Important: Use this command only for debugging. It creates a large log file, and can slow the
tunnel negotiation.
11. After you view the results, return the debug level to normal to avoid excessive logging by typing this
command at the prompt.
121
Configuring IPsec Using Manually Keyed Security Associations
122
Chapter
13
Setting Up IPsec To Use NAT Traversal on Both Sides of
the WAN
Topics:
Overview: Setting up IPsec to use NAT traversal on both sides of the WAN
When you are using IPsec to secureWAN traffic, you can set up an IPsec tunnel with NAT traversal (NAT-T)
to get around a firewall or other NAT device. This implementation describes how to set up the IPsec tunnel
when you have a NAT device on both sides of the tunnel.
The following illustration shows a network configuration with a firewall on both sides of the WAN.
Figure 13: Example of an IPsec deployment with NAT-T on both sides of the WAN
Task summary
When you are configuring an IPsec tunnel, you must repeat the configuration tasks on the BIG-IP systems
on both sides of the WAN.
124
BIG-IP® TMOS®: Implementations
Important: For the IKE peer negotiations to be successful, the IKE Phase 1 and IKE Phase 2
settings must be the same on the BIG-IP systems at both ends of the IPsec tunnel.
1. Create an IKE peer that specifies the other end of the IPsec tunnel.
a) On the Main tab, click Network > IPsec > IKE Peers.
b) Click the Create button.
c) In the Name field, type a unique name for the IKE peer.
d) In the Remote Address field, type the public IP address of the firewall or other NAT device that is
between the WAN and the remote BIG-IP system.
This address is the IP address of the remote peer, and must match the value of the Tunnel Remote
Address setting in the relevant IPsec policy.
125
Setting Up IPsec To Use NAT Traversal on Both Sides of the WAN
For example, the peer remote addresses for the BIG-IP systems in Site A and Site B are as follows.
Site B [Link]
This screen snippet shows the peer Remote Address setting at Site A.
e) For the IKE Phase 1Algorithms area, retain the default values, or select the options that are appropriate
for your deployment.
f) In the IKE Phase 1 Credentials area, for theAuthentication Method setting, select either Preshared
Key or RSA Signature, and specify additional information in the fields that appear.
For example, if you select Preshared Key, type the key in the Preshared Key field that becomes
available.
Note: The key you type must be the same at both ends of the tunnel.
h) Click Finished.
126
BIG-IP® TMOS®: Implementations
2. Create a custom IPsec policy that uses Tunnel mode and has the same remote IP address as the IKE
peer.
a) On the Main tab, click Network > IPsec > IPsec Policies.
b) Click the Create button.
c) In the Name field, type a unique name for the policy.
d) For the IPsec Protocol setting, retain the default selection, ESP.
e) From the Mode list, select Tunnel.
The screen refreshes to show additional related settings.
f) In the Tunnel Local Address field, type the local IP address of the system you are configuring.
For example, the tunnel local addresses for the BIG-IP systems in Site A and Site B are as follows.
Site B [Link]
g) In the Tunnel Remote Address field, type the public IP address of the firewall or other NAT device
that is between the WAN and the remote BIG-IP system.
This address must match the value of the Remote Address setting for the relevant IKE peer.
For example, the tunnel remote addresses for the BIG-IP systems in SiteA and Site B are as follows.
Site B [Link]
h) For the Authentication Algorithm setting, retain the default value, or select the algorithm appropriate
for your deployment.
127
Setting Up IPsec To Use NAT Traversal on Both Sides of the WAN
i) For the Encryption Algorithm setting, retain the default value, or select the algorithm appropriate
for your deployment.
j) For the Perfect Forward Secrecy setting, retain the default value, or select the option appropriate
for your deployment.
k) Click Finished.
3. Create a bidirectional traffic selector that uses the custom IPsec policy you created.
The traffic selector filters the application traffic based on the source and destination IP addresses you
specify.
a) On the Main tab, click Network > IPsec > Traffic Selectors.
b) Click Create.
c) In the Name field, type a unique name for the traffic selector.
d) For the Order setting, retain the default value (First).
e) For the Source IP Address setting, in the Address field, type the IP address from which the
application traffic originates.
For example, the source IP addresses for the BIG-IP systems in Site A and Site B are as follows.
Site B [Link]
f) In the Destination IP Address setting Address field, type the final IP address for which the
application traffic is destined.
For example, the source IP addresses for the BIG-IP systems in Site A and Site B are as follows.
Site B [Link]
128
BIG-IP® TMOS®: Implementations
This portion of a screen is an example of the completed Traffic Selector screen at Site A.
i) Click Finished.
You have now created an IPsec tunnel through which traffic travels in both directions across the WAN
through firewalls on both sides.
Note: Only data traffic matching the traffic selector triggers the establishment of the tunnel.
129
Setting Up IPsec To Use NAT Traversal on Both Sides of the WAN
This example shows a result of the command. Destination is the tunnel remote IP address.
5. Check the IKE Phase 2 negotiation status by typing this command at the prompt.
racoonctl -l1 show-sa internal
This example shows a result of this command. Source is the tunnel local IP address. Destination is
the tunnel remote IP address.
130
BIG-IP® TMOS®: Implementations
Column Displayed
Side I (Initiator)
R (Responder)
Status init
start
acquire
getspi sent
getspi done
1st msg sent
1st msg recvd
commit bit
sa added
sa established
sa expired
6. To verify the establishment of dynamic negotiated Security Associations (SAs), type this command at
the prompt.
racoonctl -l show-sa ipsec
For each tunnel, the output displays IP addresses and information for two IPsec SAs, one for each
direction, as shown in the example.
[Link] [Link]
esp mode=tunnel spi=2068022822(0x7b438626)
reqid=26781(0x0000689d)
E: null
A: hmac-sha1 9669c37c 4c83c096 beeddbde ef74d61a 2acf37ef
seq=0x00000000 replay=4 flags=0x00000000 state=mature
created: Dec 31 [Link] 1969 current: Jun 29 [Link] 2012
131
Setting Up IPsec To Use NAT Traversal on Both Sides of the WAN
-------------------------------------------------------------------
Net::Ipsec
Cmd Id Mode Packets In Bytes In Packets Out Bytes Out
-------------------------------------------------------------------
0 TRANSPORT 0 0 0 0
0 TRANSPORT 0 0 0 0
0 TUNNEL 0 0 0 0
0 TUNNEL 0 0 0 0
1 TUNNEL 353.9K 252.4M 24.9K 1.8M
2 TUNNEL 117.9K 41.0M 163.3K 12.4M
8. If the SAs are established, but traffic is not passing, type these commands at the prompt.
10. For protocol-level troubleshooting, you can increase the debug level by typing this command at the
prompt.
tmsh modify net ipsec ike-daemon ikedaemon log-level debug2
Important: Use this command only for debugging. It creates a large log file, and can slow the
tunnel negotiation.
11. After you view the results, return the debug level to normal to avoid excessive logging by typing this
command at the prompt.
tmsh modify ipsec ike-daemon ikedaemon log-level info
132
BIG-IP® TMOS®: Implementations
133
Setting Up IPsec To Use NAT Traversal on Both Sides of the WAN
134
Chapter
14
Setting Up IPsec To Use NAT Traversal on One Side of the
WAN
Topics:
Overview: Setting up IPsec to use NAT traversal on one side of the WAN
When you are using IPsec to secureWAN traffic, you can set up an IPsec tunnel with NAT traversal (NAT-T)
to get around a firewall or other NAT device. This implementation describes how to set up the IPsec tunnel
when you have a NAT device on one side of the tunnel.
The following illustration shows a network configuration with a firewall on one side of the WAN.
Figure 14: Example of an IPsec deployment with NAT-T on one side of the WAN
Task summary
When you are configuring an IPsec tunnel, you must repeat the configuration tasks on the BIG-IP systems
on both sides of the WAN.
Creating a forwarding virtual server for IPsec
136
BIG-IP® TMOS®: Implementations
Important: For the IKE peer negotiations to be successful, the IKE Phase 1 and IKE Phase 2
settings must be the same on the BIG-IP systems at both ends of the IPsec tunnel.
1. Create an IKE peer that specifies the other end of the IPsec tunnel.
a) On the Main tab, click Network > IPsec > IKE Peers.
b) Click the Create button.
c) In the Name field, type a unique name for the IKE peer.
d) In the Remote Address field, type the public IP address of the firewall or other NAT device that is
between the WAN and the remote BIG-IP system.
This address is the IP address of the remote peer, and must match the value of the Tunnel Remote
Address setting in the relevant IPsec policy.
137
Setting Up IPsec To Use NAT Traversal on One Side of the WAN
For example, the peer remote addresses for the BIG-IP systems in Site A and Site B are as follows.
Site B [Link]
This screen snippet shows the peer Remote Address setting at Site A.
e) For the IKE Phase 1Algorithms area, retain the default values, or select the options that are appropriate
for your deployment.
f) In the IKE Phase 1 Credentials area, for theAuthentication Method setting, select either Preshared
Key or RSA Signature, and specify additional information in the fields that appear.
For example, if you select Preshared Key, type the key in the Preshared Key field that becomes
available.
Note: The key you type must be the same at both ends of the tunnel.
h) Click Finished.
138
BIG-IP® TMOS®: Implementations
2. Create a custom IPsec policy that uses Tunnel mode and has the same remote IP address as the IKE
peer.
a) On the Main tab, click Network > IPsec > IPsec Policies.
b) Click the Create button.
c) In the Name field, type a unique name for the policy.
d) For the IPsec Protocol setting, retain the default selection, ESP.
e) From the Mode list, select Tunnel.
The screen refreshes to show additional related settings.
f) In the Tunnel Local Address field, type the local IP address of the system you are configuring.
For example, the tunnel local addresses for the BIG-IP systems in Site A and Site B are as follows.
Site B [Link]
g) In the Tunnel Remote Address field, type the public IP address of the firewall or other NAT device
that is between the WAN and the remote BIG-IP system.
This address must match the value of the Remote Address setting for the relevant IKE peer.
For example, the tunnel remote addresses for the BIG-IP systems in SiteA and Site B are as follows.
Site B [Link]
h) For the Authentication Algorithm setting, retain the default value, or select the algorithm appropriate
for your deployment.
139
Setting Up IPsec To Use NAT Traversal on One Side of the WAN
i) For the Encryption Algorithm setting, retain the default value, or select the algorithm appropriate
for your deployment.
j) For the Perfect Forward Secrecy setting, retain the default value, or select the option appropriate
for your deployment.
k) Click Finished.
3. Create a bidirectional traffic selector that uses the custom IPsec policy you created.
The traffic selector filters the application traffic based on the source and destination IP addresses you
specify.
a) On the Main tab, click Network > IPsec > Traffic Selectors.
b) Click Create.
c) In the Name field, type a unique name for the traffic selector.
d) For the Order setting, retain the default value (First).
e) For the Source IP Address setting, in the Address field, type the IP address from which the
application traffic originates.
For example, the source IP addresses for the BIG-IP systems in Site A and Site B are as follows.
Site B [Link]
f) In the Destination IP Address setting Address field, type the final IP address for which the
application traffic is destined.
For example, the source IP addresses for the BIG-IP systems in Site A and Site B are as follows.
Site B [Link]
140
BIG-IP® TMOS®: Implementations
This portion of a screen is an example of the completed Traffic Selector screen at Site A.
i) Click Finished.
You have now created an IPsec tunnel through which traffic travels in both directions across the WAN
through firewalls on both sides.
Note: Only data traffic matching the traffic selector triggers the establishment of the tunnel.
141
Setting Up IPsec To Use NAT Traversal on One Side of the WAN
This example shows a result of the command. Destination is the tunnel remote IP address.
5. Check the IKE Phase 2 negotiation status by typing this command at the prompt.
racoonctl -l1 show-sa internal
This example shows a result of this command. Source is the tunnel local IP address. Destination is
the tunnel remote IP address.
142
BIG-IP® TMOS®: Implementations
Column Displayed
Side I (Initiator)
R (Responder)
Status init
start
acquire
getspi sent
getspi done
1st msg sent
1st msg recvd
commit bit
sa added
sa established
sa expired
6. To verify the establishment of dynamic negotiated Security Associations (SAs), type this command at
the prompt.
racoonctl -l show-sa ipsec
For each tunnel, the output displays IP addresses and information for two IPsec SAs, one for each
direction, as shown in the example.
[Link] [Link]
esp mode=tunnel spi=2068022822(0x7b438626)
reqid=26781(0x0000689d)
E: null
A: hmac-sha1 9669c37c 4c83c096 beeddbde ef74d61a 2acf37ef
seq=0x00000000 replay=4 flags=0x00000000 state=mature
created: Dec 31 [Link] 1969 current: Jun 29 [Link] 2012
143
Setting Up IPsec To Use NAT Traversal on One Side of the WAN
-------------------------------------------------------------------
Net::Ipsec
Cmd Id Mode Packets In Bytes In Packets Out Bytes Out
-------------------------------------------------------------------
0 TRANSPORT 0 0 0 0
0 TRANSPORT 0 0 0 0
0 TUNNEL 0 0 0 0
0 TUNNEL 0 0 0 0
1 TUNNEL 353.9K 252.4M 24.9K 1.8M
2 TUNNEL 117.9K 41.0M 163.3K 12.4M
8. If the SAs are established, but traffic is not passing, type these commands at the prompt.
10. For protocol-level troubleshooting, you can increase the debug level by typing this command at the
prompt.
tmsh modify net ipsec ike-daemon ikedaemon log-level debug2
Important: Use this command only for debugging. It creates a large log file, and can slow the
tunnel negotiation.
11. After you view the results, return the debug level to normal to avoid excessive logging by typing this
command at the prompt.
tmsh modify ipsec ike-daemon ikedaemon log-level info
144
BIG-IP® TMOS®: Implementations
145
Setting Up IPsec To Use NAT Traversal on One Side of the WAN
146
Chapter
15
Using Link Aggregation with Tagged VLANs for One-Network
Topology
Topics:
148
BIG-IP® TMOS®: Implementations
Task summary
Perform the following tasks to configure two interfaces (tagged VLANs) to function as a single link with
higher bandwidth. In this implementation, you combine the two tagged VLANs into one VLAN group,
where the two VLANs are on the same IP network.
Task list
Creating a trunk
Adding a tagged interface to a VLAN
Creating a load balancing pool
Creating a virtual server with source address affinity persistence
Removing the self IP addresses from the default VLANs
Creating a VLAN group
Creating a self IP for a VLAN group
Creating a trunk
To configure the BIG-IP® system for the two-network implementation, you must first create a trunk to
aggregate the links.
The trunk is assigned to the external and internal VLAN as a tagged interface.
149
Using Link Aggregation with Tagged VLANs for One-Network Topology
Note: You must create the pool before you create the corresponding virtual server.
Tip: Hold the Shift or Ctrl key to select more than one monitor at a time.
5. From the Load Balancing Method list, select how the system distributes traffic to members of this
pool.
The default is Round Robin.
6. For the Priority Group Activation setting, specify how to handle priority groups:
• Select Disabled to disable priority groups. This is the default option.
• Select Less than, and in the Available Members field, type the minimum number of members that
must remain available in each priority group in order for traffic to remain confined to that group.
7. Using the New Members setting, add each resource that you want to include in the pool:
a) Either type an IP address in the Address field, or select a node address from the Node List.
b) Type a port number in the Service Port field, or select a service name from the list.
c) To specify a priority group, type a priority number in the Priority field.
d) Click Add.
8. Click Finished.
150
BIG-IP® TMOS®: Implementations
6. Locate the relevant profile type for the traffic being managed, and either retain the default value or select
a custom profile name.
7. In the Resources area of the screen, from the Default Pool list, select a pool name.
8. For the Default Persistence Profile setting, select source_addr.
This implements simple persistence, using the default source address affinity profile.
1. On the Main tab, click Network > VLANs > VLAN Groups.
The VLAN Groups list screen opens.
2. Click Create.
The New VLAN Group screen opens.
3. In the Name field, type the name myvlangroup.
4. For the VLANs setting, use the Move button to move the internal and external VLAN names from
the Available field to the Members field.
5. Click Finished.
151
Using Link Aggregation with Tagged VLANs for One-Network Topology
2. Click Create.
The New Self IP screen opens.
3. In the IP Address field, type an IP address.
This IP address should represent the address space of the VLAN group that you specify with the
VLAN/Tunnel setting.
The system accepts IP addresses in both the IPv4 and IPv6 formats.
4. In the Netmask field, type the network mask for the specified IP address.
5. From the VLAN/Tunnel list, select the VLAN group with which to associate this self IP address.
6. From the Port Lockdown list, select Allow Default.
7. Click Finished.
The screen refreshes, and displays the new self IP address in the list.
The BIG-IP system can send and receive traffic through the specified VLAN or VLAN group.
152
Chapter
16
Using Link Aggregation with Tagged VLANs for
Two-Network Topology
Topics:
Task summary
Perform the following tasks to configure two interfaces (tagged VLANs) to function as a single link with
higher bandwidth. In this implementation, each tagged VLAN is on a separate network.
Task list
Creating a trunk
Adding a tagged interface to a VLAN
Creating a load balancing pool
154
BIG-IP® TMOS®: Implementations
Creating a trunk
To configure the BIG-IP® system for the two-network implementation, you must first create a trunk to
aggregate the links.
The trunk is assigned to the external and internal VLAN as a tagged interface.
Note: You must create the pool before you create the corresponding virtual server.
155
Using Link Aggregation with Tagged VLANs for Two-Network Topology
Tip: Hold the Shift or Ctrl key to select more than one monitor at a time.
5. From the Load Balancing Method list, select how the system distributes traffic to members of this
pool.
The default is Round Robin.
6. For the Priority Group Activation setting, specify how to handle priority groups:
• Select Disabled to disable priority groups. This is the default option.
• Select Less than, and in the Available Members field, type the minimum number of members that
must remain available in each priority group in order for traffic to remain confined to that group.
7. Using the New Members setting, add each resource that you want to include in the pool:
a) Either type an IP address in the Address field, or select a node address from the Node List.
b) Type a port number in the Service Port field, or select a service name from the list.
c) To specify a priority group, type a priority number in the Priority field.
d) Click Add.
8. Click Finished.
156
Chapter
17
Configuring Packet Filtering
Topics:
You can also configure global packet filtering that applies to all packet filter rules that you create.
Task summary
By setting up some basic IP routing and configuring packet filtering, specific hosts on the internal VLAN
can connect to the internalVLAN's self IP address. These hosts can also use common Internet services such
as HTTP, HTTPS, DNS, FTP, and SSH. Traffic from all other hosts in the internal VLAN is rejected.
Task list
Enabling SNAT automap for internal and external VLANs
Creating a default gateway pool
Creating a forwarding virtual server
Enabling packet filtering on the BIG-IP system
Creating a packet filter rule
158
BIG-IP® TMOS®: Implementations
5. For the VLAN List setting, in the Available field, select external and external, and using the Move
button, move the VLANs to the Selected field.
6. Click Finished.
SNAT automapping on the BIG-IP system is configured for internal and external VLANs.
You now have a destination IP address on the BIG-IP system for application traffic.
159
Configuring Packet Filtering
Note: Replace <internal self IP address> with the actual self IP address of VLAN internal.
160
Chapter
18
Referencing an External File from within an iRule
Topics:
}
}
}
162
BIG-IP® TMOS®: Implementations
Task summary
You can import an existing file to the BIG-IP® system, create an iFile that is based on the imported file,
and then write an iRule that returns the content of that file to a client system, based on an iRule event.
Task list
Importing a file to the BIG-IP system
Creating an iFile
Writing an iRule that references an iFile
1. On the Main tab, click System > File Management > iFile List > Import.
2. For the File Name setting, click Choose File.
The system opens a browse window so you can locate the file that you want to import to the BIG-IP
system.
3. Browse for the file and click Open.
The name of the file you select appears in the File Name setting.
4. In the Name field, type a new name for the file, such as [Link].
The new file name appears in the list of imported files.
The result of this task is that the file you selected now resides on the BIG-IP system.
Creating an iFile
As a prerequisite, ensure that the current administrative partition is set to the partition in which you want
the iFile to reside.
You perform this task to create an iFile that you can then reference in an iRule.
1. On the Main tab, click Local Traffic > iRules > iFile List.
2. Click Create.
3. In the Name field, type a new name for the iFile, such as ifileURL.
4. From the File Name list, select the name of the imported file object, such as [Link].
5. Click Finished.
The new iFile appears in the list of iFiles.
The result of this task is that you now have a file that an iRule can reference.
163
Referencing an External File from within an iRule
Note: If the iFile resides in partition /Common, then specifying the partition when referencing the
iFile is optional. If the iFile resides in a partition other than /Common, such as /Partition_A,
you must include the partition name in the iFile path name within the iRule.
Implementation result
You now have an iRule that accesses a file on the BIG-IP® system, based on a particular iRule event.
164
Chapter
19
Configuring Remote User Authentication and Authorization
Topics:
Task summary
You can configure the BIG-IP® system to authorize user accounts that are stored on a remote authentication
server.
Important: If you configure access control settings for group-based accounts (using the remote
role groups feature), the BIG-IP system always applies those settings, rather than the default access
control settings, to group-based accounts.
The BIG-IP® system supports several types of authentication servers for storing BIG-IP system administrative
user accounts. The actual procedure you use to specify the type of remote server differs, depending on the
server type.
Task list
Specifying LDAP or Active Directory server information
Specifying client certificate LDAP server information
Specifying RADIUS server information
Specifying TACACS+ server information
Assigning access control properties to user groups
Saving access control settings to a file
Importing BIG-IP configuration data onto other BIG-IP systems
166
BIG-IP® TMOS®: Implementations
Important: The values you specify in this procedure for the Role, Partition Access, and Terminal
Access settings do not apply to group-based authorization. These values represent the default values
that the BIG-IP system applies to any user account that is not part of a remote role group.
11. From the Role list, select the user role that you want the BIG-IP system to assign by default to all BIG-IP
user accounts authenticated on the remote server:
167
Configuring Remote User Authentication and Authorization
12. From the Partition Access list, select the default administrative partition that all remotely-authenticated
BIG-IP user accounts can access.
13. From the Terminal Access list, select one of the following as the default terminal access for
remotely-authenticated user accounts:
Options Description
Disabled Choose this option when you do not want the remotely-stored user accounts
to have terminal access to the BIG-IP system.
tmsh Choose this option when you want the remotely-stored user accounts to have
only tmsh access to the BIG-IP system.
Advanced Shell Choose this option when you want the remotely-stored user accounts to have
access to the BIG-IP system using the advanced shell (at the command
prompt).
You can only select Advanced Shell when the Role setting is set to Administrator or Resource
Administrator.
14. Click Finished.
You can now authenticate administrative traffic for user accounts that are stored on a remote LDAP or
Active Directory server. If you have no need to configure group-based user authorization, your configuration
tasks are complete.
Important: The values you specify in this procedure for the Role, Partition Access, and Terminal
Access settings do not apply to group-based authorization. These values represent the default values
or locally configured user accounts (which override the default role) that the BIG-IP system applies
to any user account that is not part of a remote role group.
1. On the Main tab, click System > File Management > Apache Certificate List > Import, browse for
the certificate file to import, type a name, and click Import.
The certificate will be added to the Apache Certificate list.
2. On the Main tab, click System > Users.
3. On the menu bar, click Authentication.
4. Click Change.
5. From the User Directory list, select Remote - ClientCert LDAP.
6. In the Host field, type the IP address of the remote server.
The route domain to which this address pertains must be route domain 0.
7. For the Port setting, retain the default port number (389) or type a new port number.
This number represents the port number that the BIG-IP system uses to access the remote server.
8. In the Remote Directory Tree field, type the file location (tree) of the user authentication database on
the client certificate server.
At minimum, you must specify a domain component (that is, dc=[value]).
168
BIG-IP® TMOS®: Implementations
9. For the Scope setting, retain the default value (Sub) or select a new value.
This setting specifies the level of the remote server database that the BIG-IP system should search for
user authentication.
10. For the Bind setting, specify a user ID login for the remote server:
a) In the DN field, type the distinguished name for the remote user ID.
b) In the Password field, type the password for the remote user ID.
c) In the Confirm field, re-type the password that you typed in the Password field.
11. To enable SSL-based authentication, from theSSL list select Enabled and, if necessary, configure these
settings:
a) From the SSL CA Certificate list, select the name of a chain certificate; that is, the third-party CA
or self-signed certificate that normally resides on the remote authentication server.
b) From the SSL Client Key list, select the name of the client SSL key.
Use this setting only when the remote server requires that the client present a certificate.
c) From the SSL Client Certificate list, select the name of the client SSL certificate.
Use this setting only if the remote server requires that the client present a certificate.
12. In the CA Certificate field, type the absolute folder path of apache-ssl-cert fileobject for the
CA signing authority.
The absolute folder path is /Common/<folder path>/<certificate name>. To determine the
absolute folder path of the apache-ssl-cert fileobject, click System > File Management >
Apache Certificate List and note the target certificate's partition and path.
/>
13. In the Login Name field, type an LDAP search prefix that will contain the distinguished name (DN)
from the user certificate, such as CN.
This specifies the LDAP attribute to be used as a login name. The default is disabled.
14. In the Login LDAP Attribute field, type the account name for the LDAP server.
The value for this option is normally the user ID. However, if the server is a Microsoft® Windows®
Active Directory®server, the value must be the account name sAMAccountName (case-sensitive). The
default value is none.
15. In the Login Filter field, type the LDAP attribute that contains the short name of the user.
This specifies the filter to be applied on the common name (CN) of the client certificate and usually this
is the user ID or sAMAccountName. The filter is a regular expression used to extract required information
from the CN of the client certificate that is matched against the LDAP search results. The default is
disabled.
16. For the Depth setting, retain the default value (10) or type a new value for verification depth.
17. From the Role list, select the user role that you want the BIG-IP system to assign by default to all BIG-IP
system user accounts authenticated on the remote server.
18. From the Partition Access list, select the default administrative partition that all remotely-authenticated
BIG-IP system user accounts can access.
19. From the Terminal Access list, select either of these as the default terminal access option for
remotely-authenticated user accounts:
169
Configuring Remote User Authentication and Authorization
Options Description
Disabled Choose this option when you do not want the remotely-stored user accounts
to have terminal access to the BIG-IP system.
tmsh Choose this option when you want the remotely-stored user accounts to have
only tmsh access to the BIG-IP system.
You can now authenticate administrative traffic for user accounts that are stored on a remote client certificate
server. If you have no need to configure group-based user authorization, your configuration tasks are
complete.
Important: The values you specify in this procedure for the Role, Partition Access, and Terminal
Access settings do not apply to group-based authorization. These values represent the default values
that the BIG-IP system applies to any user account that is not part of a remote role group.
170
BIG-IP® TMOS®: Implementations
Advanced Shell Specifies that when you want the remotely-stored user accounts to have
access to the BIG-IP system using the advanced shell (at the system prompt).
You can select Advanced Shell only when the Role setting is set to Administrator or Resource
Administrator.
11. Click Finished.
You can now authenticate administrative traffic for BIG-IP system user accounts that are stored on a remote
RADIUS server. If you have no need to configure group-based user authorization, your configuration tasks
are complete.
Important: The values you specify in this procedure for the Role, Partition Access, and Terminal
Access settings do not apply to group-based authorization. These values represent the default values
that the BIG-IP system applies to any user account that is not part of a remote role group.
171
Configuring Remote User Authentication and Authorization
Options Description
Enabled Specifies that the system encrypts the TACACS+ packets.
Disabled Specifies that the system sends unencrypted TACACS+ packets.
10. In the Service Name field, type the name of the service that the user is requesting to be authenticated
to use (usually ppp).
Specifying the service causes the TACACS+ server to behave differently for different types of
authentication requests. Examples of service names that you can specify are:ppp, slip, arap, shell,
tty-daemon, connection, system, and firewall.
11. In the Protocol Name field, type the name of the protocol associated with the value specified in the
Service Name field.
This value is usually ip. Examples of protocol names that you can specify are: ip, lcp, ipx, atalk,
vines, lat, xremote, tn3270, telnet, rlogin, pad, vpdn, ftp, http, deccp, osicp, and unknown.
12. From the Role list, select the user role that you want the BIG-IP system to assign by default to all BIG-IP
user accounts stored on the remote server:
13. From the Partition Access list, select the default administrative partition that all remotely-authenticated
BIG-IP user accounts can access.
14. From the Terminal Access list, select one of the following options as the default terminal access for
remotely-authenticated user accounts:
Options Description
Disabled Specifies that the remotely-stored user accounts have no terminal access
to the BIG-IP system.
tmsh Specifies that the remotely-stored user accounts have only tmsh access to
the BIG-IP system.
Advanced Shell Specifies that the remotely-stored user accounts have access to the BIG-IP
system using the advanced shell (at the command prompt).
You can select Advanced Shell only when the Role setting is set to Administrator or Resource
Administrator.
15. Click Finished.
You can now authenticate administrative traffic for BIG-IP system user accounts that are stored on a remote
TACACS+ server. If you have no need to configure group-based user authorization, your configuration
tasks are complete.
172
BIG-IP® TMOS®: Implementations
8. From the Assigned Role list, select a user role for the remote user group.
9. From the Partition Access list, select an administrative partition value.
Options Description
All Choose this value to give users in the defined group access to their authorized
objects in all partitions on the BIG-IP system.
partition_name Choose a specific partition name to give users in the defined group access to
that partition only.
Common Choose this value to give users in the defined group access to partition
Common only.
10. From the Terminal Access list, select the type of command-line access you want to grant users in the
group, if any.
11. Click Finished.
The user group that you specified now has a set of access control properties assigned to it.
173
Configuring Remote User Authentication and Authorization
You can now import this file onto other BIG-IP devices on the network.
1. On the BIG-IP system on which you created the SCF, access a command-line prompt.
2. Copy the SCF that you previously created to a location on your network that you can access from the
system that you want to configure.
3. Edit the SCF to reflect the management routing and special passwords of the BIG-IP system that you
want to configure:
a) Open the SCF in an editor.
b) Where necessary, change the values of the management IP address, network mask, management
default route, self IP addresses, virtual server IP addresses, routes, default routes, and host name
fields to the values for the new system.
c) If necessary, change the passwords for the root and admin accounts using the command user
name password none newpassword password.
Important: When configuring a unit that is part of a redundant system configuration and
that is using the SCF from the peer unit, do not modify the root and admin accounts. These
accounts must be identical on both units of the redundant system.
174
Chapter
20
Configuring Administrative Partitions to Control User
Access
Topics:
Task summary
There are two main tasks for controlling user access to BIG-IP® system objects.
Task list
Creating an administrative partition
Configuring user access to a partition
176
BIG-IP® TMOS®: Implementations
Action Result
name of a traffic
group.
8. Click Finished.
177
Configuring Administrative Partitions to Control User Access
178
Chapter
21
Implementing BIG-IP Local Traffic Manager on a vCMP
System
Topics:
Task summary
Before implementing the BIG-IP® LTM® module within a vCMP™ guest, verify that you have completed
the tasks from the appropriate Viprion Platform Guide. As part of the platform installation, you will have
assigned an IP address that provides access to the primary cluster and then licensed the platform.
The tasks involved in implementing the BIG-IP® LTM® module within a vCMP™ guest consist of configuring
the vCMP host, creating, provisioning, and deploying a guest, and finally using the BIG-IP® LTM®
Configuration Utility to create the required TMOS® and LTM objects within the guest.
Task list
Creating a vCMP guest
Setting a vCMP guest to the Deployed state
Provisioning a BIG-IP module within a guest
Creating a custom HTTP profile
Creating a pool to manage HTTP traffic
Creating a virtual server to manage HTTP traffic
Note: When creating a guest, if you see an error message such as Insufficient disk space
on /shared/vmdisks. Need 24354M additional space., you must delete existing
unattached virtual disks until you have freed up that amount of disk space.
180
BIG-IP® TMOS®: Implementations
7. From the Number of Slots list, select either Single Slot or All Slots.
This causes the guest to reside on one slot or to span all slots. Note that once you configure a guest to
span all slots, you cannot change this value later to Single Slot, unless you first change the state of the
guest to Configured. Also note that if you decide to reconfigure an all slot guest to a single slot guest,
you cannot specify on which available single slot the guest will reside.
8. From the Management Network list, select Bridged.
9. For the Cluster IP Address setting, fill in the required information:
a) In the IP Address field, type a unique management IP address that you want to assign to the guest.
You use this IP address to access the guest when you want to manage a module running within the
guest.
b) In the Network Mask field, type the network mask for the cluster IP address.
c) In the Management Route field, type a gateway address for the cluster IP address.
10. From the Initial Image list, select an ISO image file for installing TMOS® software and the BIG-IP
license onto the guest's virtual disk. The license associated with the selected image provides access to
the correct BIG-IP modules.
11. In the Virtual Disk list, retain the default value of None.
The BIG-IP system creates a virtual disk with a default name (the guest name plus the [Link], such
as [Link]). Note that if an unattached virtual disk file with that default name already exists, the
system displays a message, and you must manually attach the virtual disk. You can do this using the
tmsh command line interface, or use the Configuration utility to view and select from a list of available
unattached virtual disks.
12. For the VLAN List setting, select both an internal and an external VLAN name from the Available list,
and use the Move button to move the VLAN names to the Selected list.
13. From the Requested State list, select Provisioned.
This allocates all necessary resources to the guest, such as CPU cores, virtual disk, and so on.
14. Click Finish.
After clicking Finished, wait while the system installs the selected ISO image onto the guest's virtual disk.
When this process is complete, you can deploy the guest.
Note: You can also skip the Provisioned state and instead go straight to the Deployed state if you
are confident of your guest configuration. Provisioning first and then deploying makes it more
straightforward to make changes to the slots to which your guests are allocated if you find you need
to make changes.
181
Implementing BIG-IP Local Traffic Manager on a vCMP System
1. Ensure that you are still logged in to the vCMP host using the BIG-IP system's cluster IP address.
2. On the Main tab, click vCMP > Guest List.
3. In the Name column, click the name of the vCMP guest that you want to deploy.
4. From the Requested State list, select either Provisioned or Deployed.
5. Click Update.
After moving a vCMP guest to the Deployed state, wait while the guest boots and becomes accessible.
Then, you can log into the vCMP guest to provision specific BIG-IP modules.
Note: This procedure applies to guests in Bridged mode only. Guests in isolated mode can be
accessed only using vconsole and tmsh.
1. Use a browser and the management IP address that you configured for the guest to log in to the guest.
If the system prompts you to run the Setup Utility, do not. Instead, complete this task to produce an
initial configuration better suited for a vCMP guest.
The BIG-IP Configuration utility opens so that you can configure the guest.
2. On the Main tab, click System > Resource Provisioning.
3. In the Resource Provisioning (Licensed Modules) area, from the Local Traffic (LTM) list, select
Minimal, Nominal, or Dedicated, depending on your needs.
4. Click Update.
After provisioning the module from within the guest, create self IP addresses and assign a vCMP host
VLAN
to each one. The vCMP host VLANs that you assign to these self IP addresses are the VLANs you created
before creating the guest.
182
BIG-IP® TMOS®: Implementations
Note: With other HTTP profile types (HTTP Compression and Web Acceleration), you can configure
compression and cache settings, as required. Use of these profile types is optional.
1. Use a browser and the management IP address that you configured for the guest to log in to the guest.
The BIG-IP Configuration utility opens so that you can configure the guest.
2. On the Main tab, click Local Traffic > Profiles > Services > HTTP.
The HTTP profile list screen opens.
3. Click Create.
The New HTTP Profile screen opens.
4. In the Name field, type a name for the profile.
5. From the Parent Profile list, retain the default value, http.
6. Select the Custom check box.
The fields in the Settings area become available for revision.
7. Modify or retain the settings to suit your needs.
8. Click Finished.
7. Using the New Members setting, add each resource that you want to include in the pool:
a) Type an IP address in the Address field, or select a node address from the Node List.
b) Type 80 in the Service Port field, or select HTTP from the list.
c) (Optional) Type a priority number in the Priority field.
d) Click Add.
8. Click Finished.
183
Implementing BIG-IP Local Traffic Manager on a vCMP System
The HTTP virtual server appears in the list of existing virtual servers on the Virtual Server List screen.
The screen displays the host properties for the chosen slots.
184
Chapter
22
Working with Single Configuration Files
Topics:
vlan external {
tag 4093
interfaces 1.3
}
vlan internal {
tag 4094
interfaces 1.10
}
pool dev_https3 {
members {
[Link]:https{}
[Link]:https{}
}
}
The single configuration file feature allows you to save the configuration of a BIG-IP system in a text file.
You can then use the text file to easily replicate the configuration across multiple BIG-IP systems. This not
only saves you time, but also allows you to create a consistent, secure, comprehensive local traffic
management environment on your network.
186
BIG-IP® TMOS®: Implementations
Task summary
You can perform three main tasks with respect to single configuration files.
Task list
Creating and saving an SCF
Loading an SCF onto a target BIG-IP system
Using an SCF to restore a BIG-IP system configuration
This procedure causes the tmsh utility to gather all of the commands (and their attributes and values) that
compose the running configuration. Once gathered, the system saves the configuration to a flat file with
the name you specify and the extension of .scf. By default, the system stores this file in the
/var/local/scf directory, but you can specify a different path if you prefer.
Note: To successfully load a configuration you have replicated, ensure that no line of the
configuration is longer than 4096 characters. If there are more than 4096 characters in a single
line, the system reverts to the previous running configuration.
1. On the target BIG-IP system, load the saved SCF file by typing the following command: tmsh load
sys config file [filename]
The tmsh utility first saves the system’s stored configuration in a backup file (named
/var/local/scf/[Link]), and then uses the configuration stored in the SCF that you are loading.
2. Use a text editor to open the SCF and edit any data that is unique to the target BIG-IP system, such as
the management IP address.
3. Save the SCF to the target BIG-IP system by typing the following command: sys save config file
[filename]
187
Working with Single Configuration Files
If a backup SCF already exists, the tmsh utility appends a number to the name of the existing backup
file, and then creates a new backup file. Thus:
• The first time the system backs up the running configuration during a load operation, the system
names the backup file /var/local/scf/[Link].
• The next time the system backs up the running configuration, the system renames the file from
/var/local/scf/[Link] to /var/local/scf/[Link] and creates a new file
named /var/local/scf/[Link].
• If you run the load command a third time, the system renames the file from
/var/local/scf/[Link] to /var/local/scf/[Link], renames the file
/var/local/scf/[Link] to /var/local/scf/[Link], and once again creates a
new file named /var/local/scf/[Link].
188
Chapter
23
Configuring Performance Monitoring
Topics:
Task summary
Perform this task to configure performance monitoring of the BIG-IP® system using an sFlow® device.
Note: You can add an sFlow receiver to the BIG-IP system, only if you are assigned either the
Resource Administrator or Administrator user role.
Add an sFlow receiver to the BIG-IP system when you want to use the receiver to monitor system
performance.
Important: When multiple sFlow receivers are configured on the BIG-IP system, only the lowest,
non-zero Poll Interval setting is used when polling for all configured sFlow receivers. Therefore,
if you delete the sFlow receiver with the lowest, non-zero poll interval, the system computes a new
poll interval based on the configured sFlow receivers, and uses that polling interval for all configured
sFlow receivers.
190
BIG-IP® TMOS®: Implementations
191
Configuring Performance Monitoring
Implementation result
You now have an implementation in which theBIG-IP® system periodically sends data samples to ansFlow®
receiver.
192
Chapter
24
SNMP Agent Configuration
Topics:
Task summary
To configure SNMP on the BIG-IP® system, you must perform a series of small tasks.
Task list
Specifying BIG-IP system information
Configuring client access
Controlling access to SNMP data
194
BIG-IP® TMOS®: Implementations
addresses (with netmask as required) from which the SNMP agent can accept requests. (By default, SNMP
is enabled only for the BIG-IP system loopback interface, [Link].)
After you perform this task, the BIG-IP system has a list of IP addresses from which the system can accept
SNMP requests.
Use this procedure to configure the BIG-IP® system to create a self IP address. This makes it possible for
a client to monitor the SNMP agent.
After you perform this task, a client system can monitor an SNMP agent.
To better control access to SNMP data, you can assign an access level to an SNMP v1 or v2c community.
Note: SNMPv1 does not support Counter64 OIDs, which are used for accessing most statistics.
Therefore, for SNMPv1 clients, an snmp walk command skips any OIDs of type Counter64. F5
Networks recommends that you use only clients that support SNMPv2 or higher.
195
SNMP Agent Configuration
When you use the Configuration utility to assign an access level to a community, the utility updates the
[Link] file, assigning only a single access setting to the community.
To better control access to SNMP data, you can assign an access level to an SNMP v3 user.
When you use the Configuration utility to assign an access level to a user, the utility updates the [Link]
file, assigning only a single access setting to the user.
Implementation result
When you use the Configuration utility to assign an access level to a community, the utility updates the
[Link] file, assigning only a single access setting to the community. This figure shows a sample
[Link] file when you use the Configuration utility to grant read/write access to a community:
196
BIG-IP® TMOS®: Implementations
allowed SNMP manager in community public from modifying a data object, even if the object has an
access type of read/write.
The string rwcommunity identifies a community named public1 as having a read/write access level
(indicated by the string rw). This read/write access level allows any allowed SNMP manager in community
public1 to modify a data object under the tree node.[Link].4.1.3375.[Link] ( ltmVirtualServ)
on the local host [Link], if that data object has an access type of read/write.
197
SNMP Agent Configuration
198
Chapter
25
SNMP Trap Configuration
Topics:
/config/user_alert.conf
Contains user-defined SNMP traps.
You use the Configuration utility to enable traps and set trap destinations. When you configure traps, the
BIG-IP system automatically updates the [Link] and user_alert.conf files.
Task summary
You can enable traps for certain events and set trap destinations.
Task list
Enabling traps for specific events
Setting v1 and v2c trap destination
Setting v3 trap destination
200
BIG-IP® TMOS®: Implementations
6. Click Update.
1. On the Main tab, click System > SNMP > Traps > Destination.
2. In the upper-right corner of the screen, click Create.
3. For the Version setting, select v3.
4. In the Destination field, type the IP address of the SNMP management system.
5. In the Port field, type the SNMP management system port number that is assigned to receive the traps.
6. From the Security Level list, select the level of security at which you want SNMP messages processed.
Options Description
Option Description
Auth, No Privacy Process SNMP messages using authentication but without encryption. When
you use this value, you must also provide values for the Security Name,
Authentication Protocol, and Authentication Password settings.
Auth and Privacy Process SNMP messages using authentication and [Link] you use
this value, you must also provide values for the Security Name,
Authentication Protocol, Authentication Password, Privacy Protocol,
and Privacy Password settings.
7. In the Security Name field, type the user name the system uses to handle SNMP v3 traps.
201
SNMP Trap Configuration
8. From the Authentication Protocol list, select the algorithm the system uses to authenticate SNMP v3
traps. Your options are MD5 or SHA.
When you set this value, you must also enter a value in the Authentication Password field.
9. In the Authentication Password field, type the password the system uses to handle an SNMP v3 trap.
When you set this value, you must also select a value from the Authentication Protocol list.
10. If you selected Auth and Privacy from the Security Level list, from the Privacy Protocol list, select
the algorithm the system uses to encrypt SNMP v3 traps. Your options are AES or DES. When you set
this value, you must also enter a value in the Privacy Password field.
11. If you selected Auth and Privacy from the Security Level list, in the Privacy Password field, type
the password the system uses to handle an encrypted SNMP v3 [Link] you set this value, you must
also select a value from the Privacy Protocol list.
Task summary
Setting v1 and v2c trap destination
Task summary
202
Chapter
26
Using the Request Logging Profile
Topics:
Task summary
Perform these tasks to log request and response data.
Creating a pool with request logging to manage HTTP traffic
Creating a request logging profile
Configuring a virtual server for request logging
Deleting a request logging profile
7. Add the IP address for each logging server that you want to include in the pool, using theNew Members
setting:
a) Type an IP address in the Address, field or select a node address from the Node List.
b) Type 80 in the Service Port field, or select HTTP from the list.
c) (Optional) Type a priority number in the Priority field.
d) Click Add.
8. Click Finished.
204
BIG-IP® TMOS®: Implementations
1. On the Main tab, click Local Traffic > Profiles > Other > Request Logging.
The Request Logging profile list screen opens.
2. Click Create.
The New Request Logging Profile screen opens.
3. From the Parent Profile list, select a profile from which the new profile inherits properties.
4. Above the Request Settings area, select the Custom check box.
This enables all settings in the Request Settings area, making them available for change.
5. Configure the request settings, as necessary.
6. Select the Custom check box for the Response Settings area.
The settings in the Response Settings area become available for configuring.
7. Configure the response settings, as necessary.
8. Click Finished.
This makes a request logging profile available to log specified data for HTTP requests and responses.
You must configure a virtual server for request logging.
Ensure that the configuration includes a pool that includes logging servers as pool members.
You can use a request logging profile to log specified data for HTTP requests, and then use that information
for analysis and troubleshooting.
1. On the Main tab, click Local Traffic > Profiles > Other > Request Logging.
The Request Logging profile list screen opens.
2. Click Create.
The New Request Logging Profile screen opens.
3. From the Parent Profile list, select a profile from which the new profile inherits properties.
4. Above the Request Settings area, select the Custom check box.
This enables all settings in the Request Settings area, making them available for change.
5. From the Request Logging list, select Enabled.
6. In the Template field, type the request logging parameters for the entries that you want to include in
the log file.
7. From the HSL Protocol list, select a high-speed logging protocol.
8. From the Pool Name list, select the pool that includes the logging server as a pool member.
9. (Optional) You can also configure the error response settings.
a) From the Respond On Error list, select Enabled.
b) In the Error Response field, type the error response strings that you want to include in the log file.
These strings must be well-formed for the protocol serving the strings.
c) Select the Close On Error check box to drop the request and close the connection if logging fails.
205
Using the Request Logging Profile
10. (Optional) You can also configure the logging request errors settings.
a) From the Log Logging Errors list, select Enabled.
b) In the Error Template field, type the request logging parameters for the entries that you want to
include in the log file.
c) From the HSL Error Protocol list, select a high-speed logging error protocol.
d) From the Error Pool Name list, select a pool that includes the node for the error logging server as
a pool member.
11. Click Update.
This configures a request logging profile to log specified data for HTTP requests.
You must have already created a pool that includes logging servers as pool members before you can configure
a request logging profile for responses.
With a request logging profile, you can log specified data for HTTP requests and responses, and then use
that information for analysis and troubleshooting.
1. On the Main tab, click Local Traffic > Profiles > Other > Request Logging.
The Request Logging profile list screen opens.
2. From the Parent Profile list, select a profile from which the new profile inherits properties.
3. Select the Custom check box for the Response Settings area.
The settings in the Response Settings area become available for configuring.
4. In the Response Settings area, from the Response Logging list, select Enabled.
5. (Optional) Select the Log By Default check box.
The Log By Default check box is selected by default.
6. In the Template field, type the response logging parameters for the entries that you want to include in
the log file.
7. From the HSL Protocol list, select a high-speed logging protocol.
8. From the Pool Name list, select the pool that includes the node logging server as a pool member.
9. (Optional) Configure the logging request error settings.
a) From the Log Logging Errors list, select Enabled.
b) In the Error Template field, type the response logging parameters for the entries that you want to
include in the log file.
c) From the HSL Error Protocol list, select a high-speed logging error protocol.
d) From the Error Pool Name list, select a pool that includes the node for the error logging server as
a pool member.
10. Click Update to save your changes.
This configures a request logging profile to log specified data for HTTP responses.
206
BIG-IP® TMOS®: Implementations
This virtual server can now pass traffic to the configured logging servers.
1. On the Main tab, click Local Traffic > Profiles > Other > Request Logging.
The Request Logging profile list screen opens.
2. Select the check box for the applicable profile.
3. Click Delete.
4. Click Delete.
General Properties
Request Settings
207
Using the Request Logging Profile
<html>
<head>
<title>ERROR</title>
</head>
<body>
<p>503 ERROR-Service Unavailable</p>
</body>
</html>
Close On Error Disabled When enabled, and logging fails, drops the request and
closes the connection.
Log Logging Errors Disabled Enables the ability to log any errors when logging requests.
Error Template None Defines the format for requests in an error log.
HSL Error Protocol UDP Defines the protocol to be used for high-speed logging of
request errors.
Error Pool Name None Specifies the name of the error logging pool for requests.
Response Settings
208
BIG-IP® TMOS®: Implementations
209
Using the Request Logging Profile
RESPONSE_MSECS The elapsed time in milliseconds (ms) between receiving the request and
sending the response.
RESPONSE_SIZE An entry for the size of response in bytes.
RESPONSE_USECS The elapsed time in microseconds (µs) between receiving the request and
sending the response.
SERVER_IP An entry for the IP address of a server, for example, [Link].
SERVER_PORT An entry for the port of a server, for example, 80.
SNAT_IP An entry for the self IP address of the BIG-IP-originated connection to the
server when SNAT is enabled, or an entry for the client IP address when
SNAT is not enabled.
SNAT_PORT An entry for the port of the BIG-IP-originated connection to the serv
er when
SNAT is enabled, or an entry for the client port when SNAT is not enabled.
TIME_AMPM A twelve-hour request-time qualifier, for example, AM or PM.
TIME_H12 A compact twelve-hour time entry for request-time hours, ranging from 1
through 12.
TIME_HRS A twelve-hour time entry for hours, for example, 12 AM.
TIME_HH12 A twelve hour entry for request-time hours, ranging from 01 through 12.
TIME_HMS An entry for a compact request time of H:M:S, for example, [Link].
TIME_HH24 A twenty-four hour entry for request-time hours, ranging from 00 through
23.
210
BIG-IP® TMOS®: Implementations
211
Using the Request Logging Profile
212
Index
Index
A BIG-IP system information 194
BIG-IP system licenses 20, 30
access control BIG-IP systems
and SNMP data 195 provisioning 20, 30
configuring 177 BIG-IP system version 11.x upgrade
access control properties verifying 52
assigning to user groups 172
access control settings
saving 173
C
access levels CCLDAP, See remote server authentication
assigning 194, 195, 196 certificates, See x509 certificates.
assigning for SNMP 196 Cert-LDAP, See remote server authentication
active/standby configuration client access
creating 20 allowing 195
result of 24 configuring 194
active-active configuration clients
described 28 and SNMP agents 195
result of 36 community access levels
Active Directory server information 167 assigning 196
active-standby configuration config sync, See configuration synchronization.
described 20 config sync address
active-standby software upgrade specifying 57
overview 40 configuration data
results 52 copying 187
task summary 44 importing 174
address exchange 23 restoring 188
address mapping, about IPv6 to IPv4 70 configuration objects
administrative partitions and traffic groups 28
access to 177 configuration synchronization 23, 32
creating 176 and Setup utility 20
defined 176 syncing to group 36, 59, 61
administrative traffic configuration synchronization addresses 23, 32
authenticating 167, 168 See also configuration synchronization
administrative user accounts connection mirroring
configuring 21, 30 configuring 58
allow-transfer statement, modifying for zone file transfers 64 enabling 21, 31
applications connection mirroring addresses, See mirroring addresses
creating 34, 35 connections
application traffic creating pools for 183
isolating on network 176 preserving on failover 58
authentication algorithms content
negotiating 78, 90, 102 of LLDPDUs 75
availability core allocation 184
during failover 44 counters, sFlow 190
counter sampling, configuring on BIG-IP system 190
B CPU core allocation 184
creating second traffic group 56
base network components 20 custom DNS profiles
BIG-IP main dashboard enabling DNS Express 66
customizing 18
BIG-IP system
preparing for upgrade 49
D
restoring 188 dashboard, BIG-IP main
upgrading to version 11.x 50 customizing 18
213
Index
E
I
encryption algorithms
negotiating 78, 90, 102 iApp applications
encryption contents 78, 103, 115 creating 34, 35
events ifile commands 162
setting SNMP traps for 200 iFiles
external files creating 163
and iRules 162 IKE (Internet Key Exchange)
external network defined 78, 90, 102
configuring 22, 31 IKE peers
defined 79, 91, 103
for data exchange 78, 90, 102
F IKE Phase 1
configuring 80, 92, 104
failover
and traffic groups 44
214
Index
imported files L
listing 163
interfaces LDAP server information
and external VLAN configuration 22, 31 client certificate 168
and HA VLAN configuration 23, 32 specifying 167
and internal VLAN configuration 22, 31 licenses
internal network activating 20, 30
configuring 22, 31 link aggregation
Internet Key Exchange, See IKE (Internet Key Exchange) creating 149, 155
IP header encryption 78, 90, 103, 115 described 148, 154
IPsec tasks for 149, 154
and NAT traversal 124, 136 Link Layer Discovery Protocol, See LLDP
IPsec configuration result 87, 99, 112 LLDP
IPsec configurations overview 74
prerequisites for 124, 136 LLDPDU contents 76
IPsec IKE peers LLDP messages
creating 80, 92, 104 sending and receiving 75
creating for NAT-T 125, 137 LLDP properties
IPsec policies global 75
creating 81, 93, 106, 116 per interface 75
creating for NAT-T 125, 137 LLDP tasks 75
defined 79, 91, 103 local trust domains
IPsec protocol and device groups 33, 59
prerequisites for configuring 79, 91, 103, 115 defined 33, 58
purpose of 79, 91, 103, 115 loopback interface
IPsec protocol suite and SNMP 194
components of 79, 91, 103
described 78, 90, 102, 114
IPsec security associations
M
creating 116 main BIG-IP dashboard
IPsec traffic selectors customizing 18
creating 82, 93, 107, 117 management IP addresses
creating for NAT-T 125, 137 and ConfigSync 23, 32
defined 79, 91, 103 management port
IPsec Transport mode, See Transport mode configuring 21, 30
IPsec tunnel specifying for failover 32
creating for NAT-T 125, 137 manual security associations
verifying connectivity 83, 108, 118, 129, 141 creating 116
IPsec Tunnel mode, See Tunnel mode message content
IPv4-only servers for LLDPDUs 75
and mapping to IPv6-only clients 70 messages
passing traffic from IPv6-only clients 72 transmitting and receiving 75
IPv6-only clients migration
about mapping to IPv4-only servers 70 preparation 46, 47
passing traffic to IPv4-only DNS servers 72 preparation for APM 45
IPv6 to IPv4 mapping WA preparation 47
and DNS profiles 70, 72 WOM preparation 49
configuring virtual servers 72 mirroring, See connection mirroring
iRule commands mirroring addresses
for iFiles 162 configuring 23
iRule events 163, 164 exchanging 24
iRules specifying 32
and external files 162 mitigation of DDoS attacks 64
and iFiles 164 monitors
ISAKMP-SA security association 78, 90, 102 assigning to pools 150, 155
iSession tunneling
default policy for 93
N
NAT traversal
and IPsec 124, 136
215
Index
P S
packet encryption 78, 103, 115 SAs (security associations)
packet filtering creating 116
enabling 160 SCF configuration commands
packet filter rules listed 186
creating 160 SCF file configuration
parameters tasks for 187
for request logging 209 SCF files
partitions, See administrative partitions and access control 173
payload encryption 78, 90, 103, 115 creating 187
peer devices loading 187
and traffic groups 34 using 188
discovering 24 secure channels
performance monitoring, configuring on BIG-IP system 190 establishing 78, 90, 102, 114, 124, 136
performance monitors security associations
assigning to pools 150, 155 creating 116
persistence negotiating 78, 90, 102
and source address affinity 150, 156 self IP address
Phase 1 negotiation assigning to traffic group 61
and IKE protocol 78, 90, 102, 114 self IP addresses
defined 78, 90, 102 and VLAN groups 151
Phase 2 negotiation creating 151
defined 78, 90, 102 for external network 22, 31
policies for HA network 23, 32
defined for IPsec 79, 91, 103 for internal network 22, 31
polling, configuring on BIG-IP system 190 removing from VLANs 151
pools serial cable failover
creating 150, 155 specifying 21, 31
creating for HTTP traffic 183 session persistence 150, 156
creating with request logging 204 Setup utility
prerequisites and base network 28
for configuring IPsec 124, 136 and base network configuration 22, 23, 31, 32
profiles and device discovery 24
creating custom HTTP 182 for active/standby configurations 20
creating DNS 70 for active-standby configurations 20
creating for DNS Express 66 sFlow counters
defined 190
sFlow receiver, adding to BIG-IP configuration 190
R sFlow receiver, configuring on BIG-IP system 190
single configuration files, See SCF files
RADIUS protocol slots
for remote server authentication 170 viewing properties for 184
read/write access SNAT translation addresses
granting 196 and traffic groups 28
receiver, adding to BIG-IP configuration 190
216
Index
217
Index
218