F5 - Configuring BIG-IP LTM v11 - Instructor
F5 - Configuring BIG-IP LTM v11 - Instructor
F5 - Configuring BIG-IP LTM v11 - Instructor
Introductions
Instructor:
– Name:
– Experience:
Students:
– Name:
– Company:
– Job Title:
– Network Experience:
– Industry Experience:
– F5 Product Exposure:
© F5 Networks, Inc.
3
Classroom Facilities
• Emergencies
• Class Roster/Sign In
• Cell phones, email and internet use
• Breaks and lunch
• Punctuality
• Side conversations
Product Offerings
© F5 Networks, Inc.
5
Server
side
profile
Syn
© F5 Networks, Inc.
6
LTM
© F5 Networks, Inc.
7
BIG-IP GTM
Wide Area Load Balancing
• Resolve DNS Queries to Best Answer
• Monitor Server Status
• Example: Resolve www.f5.com
www.f5.com = ? www.f5.com = ?
65.197.145.183 143.166.83.200
GTM
E-mail servers
APM
Mobile Application servers
File servers
Local
• Client Machine
Policy Manager
• Which resources © F5 Networks, Inc.
9
• Application Learning
207.17.117.25 192.168.10.1
• Attack Signatures
• Deployment Wizard
• Policy Builder
ASM
© F5 Networks, Inc.
10
• Inbound Links
• Load Balance Servers
ISP #1 ISP #2
Link Controller
© F5 Networks, Inc.
11
Client Client
© F5 Networks, Inc.
13
• Data Migration
• Storage Tiering
• Load Balancing
• Data Replication
© F5 Networks, Inc.
14
ARX
Windows Server
running ARX CE
Private Cloud
Cloud Storage
Local File Storage
Provider
© F5 Networks, Inc.
15
© F5 Networks, Inc.
16
GTM
LTM
Enterprise Manager
Centralized Management
Link Controller
• Device Inventory WOM
• Software Installs
• Configuration Backup
• ASM Policy Synch and Attack Signatures
• SSL Certificate Monitoring
• Performance Monitoring
• Enable/Disable Objects © F5 Networks, Inc.
17
"
BIG-IP Platforms "
VIPRION 4400"
"
VIPRION 2400"
assis
O N
Ch
2x
Quad
core
CPU
/
V IPRI
4200
Blades
(4x)
Price
= on s
l
E d i
a
Virtu
Production!
Lab!
© F5 Networks, Inc.
Func=on
/
Performance
18
ARX Series
Price
ARX4000
Data
Manager ARX2500
ARX2000
ARX1500
ARX VE
Scale / Performance
© F5 Networks, Inc.
19
• ASM VE
• APM VE
• WAM VE
• WOM VE
• ARX VE
• FirePass VE
• EM VE
© F5 Networks, Inc.
20
F5 Services
• Getting Started
• Technical Support
Services
• Professional
Services
• Global Training
Services
© F5 Networks, Inc.
21
F5 University
• Essentials
• What’s New
• Technology
Overview
© F5 Networks, Inc.
22
• Release notes
• Product manuals
• Known solutions
• Hotfix information
• Downloads
• EOL products
• Upgrades
© F5 Networks, Inc.
23
DevCentral
http://devcentral.f5.com/
• F5 blogs, Wiki, podcasts, tutorials, discussion forums
© F5 Networks, Inc.
24
iHealth
• Diagnostics
• Health Viewer
• qkview files
© F5 Networks, Inc.
25
Course Outline
1. Installation
2. Load Balancing
3. Health Monitors
4. Profiles Day 1
5. Persistence
6. Processing SSL Traffic
7. Lab Project 1
8. NATs and SNATs
9. iRules Day 2
10. High Availability
11. High Availability Part 2
© F5 Networks, Inc.
26
Course Outline
12. Command Line – tmsh
13. Administration
14. Administration part 2 Day 3
15. Profiles part 2
16. iApps
17. Virtual Servers part 2
18. SNATs part 2
19. Monitors part 2
Day 4
20. Persistence part 2
21. iRules part 2
22. Lab Project 2
© F5 Networks, Inc.
27
Module 1 - Installation
Clients
Internet
BIG-IP
LTMs
Servers
© F5 Networks, Inc.
28
Module 1 - Outline
• MGMT IP Address
• Setup Utility
• Licensing
• Provisioning
• Standard Network Config
• Install Lab
• BIG-IP Platforms
• AskF5
© F5 Networks, Inc.
29
config Utility
Initial IP Address is 192.168.1.245
© F5 Networks, Inc.
31
• Licensing
• Provisioning
© F5 Networks, Inc.
32
© F5 Networks, Inc.
33
© F5 Networks, Inc.
34
Provisioning
• Manage Resources by Module
• LTM usually provisioned
© F5 Networks, Inc.
35
https://Management IP Address
© F5 Networks, Inc.
36
© F5 Networks, Inc.
37
© F5 Networks, Inc.
38
For LTM
© F5 Networks, Inc.
39
Two Interfaces:
• Web Interface
• HTTPS (remote)
• Command Line
• SSH (remote)
• Management Port
• Self-IPs
• SCCP / AOM
• Serial Terminal
© F5 Networks, Inc.
40
• Stores Configuration
• UCS files: User Configuration Set
• UCS files include license
© F5 Networks, Inc.
41
© F5 Networks, Inc.
44
© F5 Networks, Inc.
45
BIG-IP VIPRION
© F5 Networks, Inc.
46
Add-on Hardware
Orderable
• Redundant Power Supply
• FIPS SSL Accelerator card
• Small Form Pluggable (SFP)
• RAM
Customer Replaceable
• Power Supply
• Fan Chassis
• RAID disk on some platforms
© F5 Networks, Inc.
47
AOM
TMM is BIG-IP
© F5 Networks, Inc.
49
© F5 Networks, Inc.
50
• Information Needed
• System Serial Number
• Problem Description and Impact
• Contact Information
• Product Documentation
© F5 Networks, Inc.
51
Ask F5 – http://tech.f5.com
© F5 Networks, Inc.
52
Ask F5 – SOL135
© F5 Networks, Inc.
53
• Log files
• UCS archive
• Core files
© F5 Networks, Inc.
54
© F5 Networks, Inc.
55
Internet
1
2
3
4
5
6
7
8
© F5 Networks, Inc.
56
Module 2 – Outline
• Network Map
© F5 Networks, Inc.
57
Virtual Server
Pool Members
© F5 Networks, Inc.
59
Internet
Virtual
Server
216.34.94.17:80
Maps
to
Pool
Members
© F5 Networks, Inc.
60
Network
Address
Transla5on
172.
172.
172.
Pool
Members
16.2
16.2
16.2
16.2
0.2:4
0.4:8
0.1:8
0.3:8
002
080
0
0
© F5 Networks, Inc.
61
Internet
DNS
Server
216.34.94.17:80
resolves
www.f5.com
to
BIG-‐IP
LTM
Virtual
Server
Address
216.34.94.17
© F5 Networks, Inc.
62
Packet
#
1
Internet
Src
-‐
207.17.117.20:4003
Dest
–
216.34.94.17:80
Packet
#
1
Src
–
207.17.117.20:4003
Dest
–
172.16.20.1:80
© F5 Networks, Inc.
63
216.34.94.17:80
LTM
translates
Src
Address
back
to
Virtual
Server
Address
© F5 Networks, Inc.
64
Packet
#
2
Internet
Src
-‐
207.17.117.21:4003
Dest
–
216.34.94.17:80
216.34.94.17:80
Packet
#
2
Src
–
207.17.117.21:4003
Dest
–
172.16.20.2:4002
© F5 Networks, Inc.
65
216.34.94.17:80
© F5 Networks, Inc.
66
Packet
#
3
Internet
Src
-‐
207.17.117.25:4003
Dest
–
216.34.94.17:80
216.34.94.17:80
Packet
#
3
Src
–
207.17.117.25:4003
Dest
–
172.16.20.4:8080
© F5 Networks, Inc.
67
216.34.94.17
© F5 Networks, Inc.
68
Server
Response
Configuring Pools
© F5 Networks, Inc.
70
© F5 Networks, Inc.
71
Statistics
• Summary
• Virtual Servers
• Pools
• Nodes
© F5 Networks, Inc.
72
Logs
© F5 Networks, Inc.
73
Pool:
1. hMp_pool
@
172.16.20.1
-‐-‐
3:80
Virtual
Server:
1. vs_hMp
-‐
10.10.X.100:80
Internet
2. Resource
-‐
hMp_pool
10.10.X.100
Test:
1. Connect
to
VS
&
Refresh
2. bigtop
and
Sta5s5cs
Virtual
Server:
1. vs_hMps
-‐
10.10.X.100:443
172.16.20.2
172.16.20.1
172.16.20.3
2. hMps_pool
@
172.16.20.1-‐3
:443
Check
BIG-‐IP
LTM
Sta5s5cs:
© F5 Networks, Inc.
74
Network Map
© F5 Networks, Inc.
75
© F5 Networks, Inc.
76
Round Robin
Clients
Internet
Router
Client
requests
are
distributed
evenly
BIG-‐IP
LTM
1
2
3
4
Members
5
6
7
8
© F5 Networks, Inc.
77
Ratio
Clients
Internet
Router
If
ra5o
set
to
3:2:1:1
BIG-‐IP LTM
1
5
7
2
6
3
4
Members
8
12
14
9
13
10
11
© F5 Networks, Inc.
78
Least Connections
Clients
Internet
Router
Next
requests
goes
to
device
with
fewest
open
BIG-‐IP
LTM
connec5ons
1
3
6
2
5
Members
4
Least Connections
Clients
Internet
1
3
6
2
5
Members
4
459
461
460
462
461
460
462
461
462
470
Current
Connec5ons
© F5 Networks, Inc.
80
Least Connections
Clients
Internet
Router
Some
5me
later,
number
of
connec5ons
change
BIG-‐IP
LTM
61
63
Members
62
Fastest
Clients
Internet
1
2
3
Members
4
5
6
Fastest
Clients
Internet
Router
Some
5me
later,
request
count
changes
BIG-‐IP
LTM
Least Sessions
Clients
Internet
1
2
3
Members
4
5
6
Clients
Internet
1 2 Members
Observed
Clients
Internet
Servers
are
dynamically
assigned
ra5os
based
on
Router
past
load.
Requests
are
distributed
based
on
the
current
ra5o
values.
BIG-‐IP
LTM
1
2
Members
2
3
3
2
© F5 Networks, Inc.
86
Predictive
Clients
Internet
Servers
are
dynamically
assigned
ra5os
based
on
past
load.
Requests
are
Router
distributed
based
on
the
current
ra5o
values.
BIG-‐IP
LTM
1
2
Members
1
4
1
4
© F5 Networks, Inc.
87
Clients
Internet
With
Priority
Group
Ac5va5on
set
to
2,
and
3
of
Router
highest
priority
members
available,
lower
priority
members
aren’t
used.
BIG-‐IP
LTM
1
2
3
Server
Pool
4
5
6
Clients
Internet
If
number
of
members
falls
below
Priority
Group
Router
Ac5va5on
(2),
next
highest
priority
members
are
used
also.
BIG-‐IP
LTM
1
2
3
4
Server
5
6
7
8
Pool
Clients
Internet
Router
If
all
members
fail,
then
client
can
be
sent
an
hMp
BIG-‐IP
LTM
redirect.
Members
© F5 Networks, Inc.
90
© F5 Networks, Inc.
91
If
using
Member
Internet
If
hMp
pool
uses
Least
Connec5ons
(member)
load
balancing
method,
then…
Current Connec5ons
© F5 Networks, Inc.
92
If
using
Node
Internet
If
hMp
pool
uses
Least
Connec5ons
(node)
load
balancing
method,
then…
Current Connec5ons
© F5 Networks, Inc.
93
© F5 Networks, Inc.
94
© F5 Networks, Inc.
95
Ra5o
for
Members
© F5 Networks, Inc.
96
© F5 Networks, Inc.
97
© F5 Networks, Inc.
98
© F5 Networks, Inc.
99
© F5 Networks, Inc.
100
Module 3 – Monitors
Internet
172.16.20.3:80
© F5 Networks, Inc.
102
Module 3 - Outline
• Monitor Concepts
• Configuring Monitors
• Assigning Monitors
• Status: Node, Member, Pool, Virtual Server
• Health Monitor Labs
© F5 Networks, Inc.
103
Monitor Concepts
• Address Check
• Node – IP Address
• Service Check
• IP : port
• Content Check
• IP : port plus check data returned
• Interactive Check
• Path Check
© F5 Networks, Inc.
104
Address Check
Internet
• Packets sent to IP Address
• If no response, Node unavailable
• Members Unavailable
• No Connections to Members ICMP
• Example: ICMP
© F5 Networks, Inc.
105
Service Check
• Example – TCP
© F5 Networks, Inc.
106
Content Check
• Command Sent
• Response Examined
• Connection Closed HTTP
GET
• If connection or response
fails, Member Unavailable
• No Connections to Member
• Example – HTTP
© F5 Networks, Inc.
107
Interactive Check
Internet
• TCP connection(s) opened
• Command(s) Sent
• Response(s) Examined
• Connection(s) Closed Conversa5on
© F5 Networks, Inc.
108
Path Check
www.f5.com
End point
• If no response, Member
Unavailable BIG-‐IP
LTM
• No Connections to Member
• Example – ICMP
© F5 Networks, Inc.
109
Configuring Monitors
• System Supplied Monitors (Templates)
• Address Checks (icmp)
• Service Checks (tcp)
• Content Checks (http)
• Interactive Checks (ftp)
• Availability:
• Templates can be Customized
• Some Must be Customized before Assignment
• Some Should be Customized before Assignment
© F5 Networks, Inc.
110
© F5 Networks, Inc.
111
• Send String
• Receive String
• Receive Disable String
• Reverse
• Transparent
© F5 Networks, Inc.
112
Monitor Timers
• Frequency (Interval)
• Timeout
• Recommended: 3x + 1
© F5 Networks, Inc.
113
Assigning Monitors
• Default for all Nodes
• Single Node Options
• Node Default
• Node Specific
• None
“All” Nodes
Each Node
© F5 Networks, Inc.
115
© F5 Networks, Inc.
116
© F5 Networks, Inc.
117
© F5 Networks, Inc.
118
Performance Dashboard
• Dashboard
Sta=s=cs
• Near
real-‐=me
• Historical
• Performance
• Visually
displayed
• Graphs
• Gauges
• Tables
• Health
• Alerts
© F5 Networks, Inc.
120
Node
associa5on:
1. Create
my_icmp
&
associate
nodes
Pool
&
Member
associa5on
:
Internet
1. Create
my_hMp
&
assign
to
hMp_pool
10.10.X.100
Pool
associa5on
:
1. Create
my_hMps
&
assign
to
hMps_pool
Check
status
in
Network
Map:
172.16.20.2
172.16.20.1
172.16.20.3
© F5 Networks, Inc.
121
Module 4 – Profiles
Internet
Virtual Server
© F5 Networks, Inc.
122
Module 4 – Outline
• Profiles Concepts
• Profile Dependencies
• Profile Types
• Configuring Profiles
© F5 Networks, Inc.
123
Profile Concepts
• Provided Templates
• Applied Directly
• Base of User-Defined Profile
© F5 Networks, Inc.
124
1
1
2
2
3
3
© F5 Networks, Inc.
125
Encrypted
Decrypted
© F5 Networks, Inc.
126
Server
Begins
Data
Transfer
Connec5on
© F5 Networks, Inc.
127
Profile Dependencies
others
Some
can’t
be
combined
in
one
VS
TCP
UDP
Network
Data Link
Physical
© F5 Networks, Inc.
128
Profile Types
© F5 Networks, Inc.
129
• Defaults Profiles
• Stored in /config/profile_base.conf
• Should Not be Modified
• Cannot be Deleted
• Custom Profiles
• Stored in /config/bigip.conf
• Created from Default Profiles
• Dynamic Child and Parent relationship
© F5 Networks, Inc.
130
© F5 Networks, Inc.
131
Configuring Profiles
© F5 Networks, Inc.
132
Configuring Profiles
© F5 Networks, Inc.
133
Configuring Profiles
© F5 Networks, Inc.
134
Module 5 - Persistence
1
1
2
2
3
3
© F5 Networks, Inc.
135
Module 5 – Outline
• Cookie Persistence
• Insert, Rewrite, & Passive
• Cookie Persist Lab
© F5 Networks, Inc.
136
205.229.151.10
205.229.151.107
205.229.152.11
If
Netmask
is
255.255.255.0
1
1
2
2
3
3
© F5 Networks, Inc.
137
© F5 Networks, Inc.
138
© F5 Networks, Inc.
139
© F5 Networks, Inc.
140
Cookie Persistence
• Insert mode
• LTM Inserts Special Cookie in HTTP Response
• Pool Name
• Pool Member (encoded)
• Rewrite mode
• Web Server Creates a “blank” cookie
• LTM Rewrites to make Special Cookie
• Passive mode
• Web Server Creates Special Cookie
• LTM Passively lets it through
© F5 Networks, Inc.
141
TCP
handshake
HTTP
request
(no
special
cookie)
pick
First
Hit
specifies
server
TCP
handshake
HTTP
request
(no
special
cookie)
HTTP
reply
(no
special
cookie)
HTTP
reply
(updated
cookie)
© F5 Networks, Inc.
142
TCP
handshake
HTTP
request
(no
special
cookie)
pick
server
TCP
handshake
First
Hit
specifies
server
TCP
handshake
HTTP
request
(with
same
cookie)
HTTP
reply
(with
blank
cookie)
HTTP
reply
(with
updated
cookie)
© F5 Networks, Inc.
143
TCP
handshake
HTTP
request
(no
special
cookie)
pick
server
TCP
handshake
First
Hit
specifies
server
TCP
handshake
HTTP
request
(with
same
cookie)
HTTP
reply
(with
special
cookie)
HTTP
reply
(with
special
cookie)
© F5 Networks, Inc.
144
© F5 Networks, Inc.
145
Cookie
persistence:
1. Create
Cookie
Persistence
Profile
• Insert
Cookie
Method
• Custom
Expira5on
Internet
2.
Assign
persistence
profile
to
vs_hMp
10.10.X.100
Test
1. Connect
to
VS
&
Refresh
2. Look
at
Cookie
172.16.20.2
172.16.20.1
172.16.20.3
© F5 Networks, Inc.
146
Member State
© F5 Networks, Inc.
147
• Administrator Option
• Advanced Pool Settings
• None
• Reject
• Drop
• Reselect
© F5 Networks, Inc.
148
Establish
Persistence:
1. Connect
to
hMps://10.10.X.100
2. Verify
Persistence
is
occurring
Disable
Member
&
Test:
Internet
10.10.X.100
1. Disable
member
and
refresh.
S5ll
persistent?
2. “Forced
Offline
..”
on
member.
S5ll
persistent?
Disable
Node
&
Test:
1. Disable
Node
and
refresh.
172.16.20.2
S5ll
persistent?
172.16.20.1
172.16.20.3
© F5 Networks, Inc.
149
Internet Encrypted
Decrypted
172.16.20.2
172.16.20.1
172.16.20.3
© F5 Networks, Inc.
150
Module 6 – Outline
• Client SSL
• Server SSL
• Configuring SSL Profiles
• Client SSL Labs
© F5 Networks, Inc.
151
SSL Concepts
• Encrypted End-to-End
• Certificates & Keys Packet
Encrypted
• SSL Accelerator Cards
• Hardware Encryption /
Decryption
• Takes load off Server
© F5 Networks, Inc.
152
SSL Termination
Advantages
• SSL key exchange done by hardware
• SSL bulk encryption done by hardware
• Centralize certificate management
• Offload SSL traffic from Web Servers
• Allows rule processing & cookie persistence
© F5 Networks, Inc.
153
© F5 Networks, Inc.
154
SSL Acceleration
• Hardware Encryption & Decryption
© F5 Networks, Inc.
156
What is FIPS?
• Federal Information Processing Standard (FIPS)
Generate Certificate
© F5 Networks, Inc.
158
© F5 Networks, Inc.
159
© F5 Networks, Inc.
160
Client
SSL
:
1. Generate
Cer5ficate
2. Custom
Client
SSL
profile
3. vs_ssl
10.10.X.102:443
using
Internet
Client
SSL
profile
10.10.X.102
:
443
Test:
1. Connect
:443
to
:80
web?
Server
SSL
(Op5onal):
1. Custom
Server
SSL
profile
2. vs_ssl
using
both
Client
and
Server
SSL
profiles
172.16.20.2
172.16.20.1
172.16.20.3
Test
again:
© F5 Networks, Inc.
161
Internet
10.10.X.100 :
443
https_pool
no SSL profile
Internet
10.10.X.102 :
443
http_pool BIG-IP SSL
Client SSL Certificate
profile
Internet
10.10.X.102 : 443
https_pool
Client SSL profile BIG-IP SSL
Server SSL profile Certificate
Course Outline
1. Installation
2. Load Balancing
3. Health Monitors
4. Profiles Day 1
5. Persistence
6. Processing SSL Traffic
7. Lab Project 1
8. NATs and SNATs
9. iRules Day 2
10. High Availability
11. High Availability Part 2
© F5 Networks, Inc.
165
Course Outline
12. Command Line – tmsh
13. Administration
14. Administration part 2 Day 3
15. Profiles part 2
16. iApps
17. Virtual Servers part 2
18. SNATs part 2
19. Monitors part 2
Day 4
20. Persistence part 2
21. iRules part 2
22. Lab Project 2
© F5 Networks, Inc.
166
© F5 Networks, Inc.
167
Archive Configurations
© F5 Networks, Inc.
168
Module 7 – Verification
5. http://10.10.X.101 Redirect?
© F5 Networks, Inc.
170
Questions?
Answer: A, C & E
© F5 Networks, Inc.
171
Questions?
2.
Given
the
condi5ons
in
the
chart
below,
what
Member
will
be
selected
for
the
next
service
request?
The
last
five
selec5ons
have
been
Members
A,
B,
C,
C,
D.
Answer: A
© F5 Networks, Inc.
172
Questions?
3.
A
connec5on
is
made
to
the
Virtual
Server
at
150.150.10.10:80
associated
with
the
pool
below.
The
last
five
connec5ons
have
been
C,
D,
C,
D,
C.
Given
the
condi5ons
on
the
charts
below,
if
a
client
at
IP
address
205.68.17.12
connects,
what
node
will
be
selected
for
this
service
request?
Load
Balancing
Fastest
Priority
Group
Ac5va5on
2
Node
Member
Member
Member
Response
Address
Connec5ons
Status
Iden5fier
Ra5o
Priority
Time
Ra5o
A
10.1.1.1:80
1
1
1
5
3
ms
Up
B
10.1.1.2:80
1
2
1
6
2
ms
Disabled
C
10.1.1.1:81
1
3
3
7
3
ms
Up
D
10.1.1.2:81
1
4
3
3
2
ms
Unavailable
Persistence
Mode
Src
Address
Timeout
=
600,
Mask
=
255.255.255.0
Client
Address
Virtual
Path
Pool
Name
Member
Node
Alive
Time
200.11.225.0
150.150.10.10
WebPool
10.1.1.1:80
300
200.11.15.0
150.150.10.10
WebPool
10.1.1.2:80
500
205.68.17.0
150.150.10.10
WebPool
10.1.1.1:81
200
Answer: C
© F5 Networks, Inc.
173
Ques5ons?
4.
When
a
virtual
server
has
a
client-‐ssl
profile
but
no
server
ssl
profile,
which
of
that
virtual
server’s
traffic
is
encrypted?
(choose
2)
a. traffic
from
the
client
to
the
BIG-‐IP
LTM.
b. traffic
from
the
BIG-‐IP
LTM
to
the
client.
c. traffic
from
the
BIG-‐IP
LTM
to
the
selected
pool
member.
d. traffic
from
the
selected
pool
member
to
the
BIG-‐IP
LTM.
Answer: a & b
© F5 Networks, Inc.
174
Module 7 – Questions
© F5 Networks, Inc.
175
Internet
207.10.1.101 207.10.1.103
Network
Address
Transla=on
172.16.20.1 172.16.20.3
© F5 Networks, Inc.
176
Module 8 – Outline
• NAT’s
• NAT Lab
• SNAT Concepts
• Configuring SNATs
• SNAT Labs
© F5 Networks, Inc.
177
NAT
Internet
• One-‐to-‐one
mapping
207.10.1.101
207.10.1.103
• Bi-‐direc=onal
traffic
• Dedicated
IP
address
• Port
–
less
(security
concern?)
• Configura=on:
172.16.20.1 172.16.20.3
© F5 Networks, Inc.
178
NAT:
1. 10.10.X.200
-‐>
172.16.20.2
Internet
10.10.X.200
2.
Delete
NAT
!!
172.16.20.2
© F5 Networks, Inc.
179
SNATs
• “Secure” NAT
Internet
• Performs Source NAT
207.10.1.102
• Many-to-one mapping
• Secure? - Traffic initiated to
SNAT Address refused
© F5 Networks, Inc.
180
SNATs: Example 1
Internet
Many
non-‐publicly
routable
to
one
routable
address
207.10.1.33
© F5 Networks, Inc.
181
Internet
Source
address
translated
to
SNAT
address
207.10.1.102:2222
!
205.229.151.203:80
207.10.1.102
172.16.20.3:1111 ! 205.229.151.203:80
© F5 Networks, Inc.
182
Internet
205.229.151.203:80
!
207.10.1.102:2222
207.10.1.102
205.229.151.203:80 ! 172.16.20.3:1111
© F5 Networks, Inc.
183
SNATs: Example 2
© F5 Networks, Inc.
184
Internet
150.150.10.10:1030
!
207.10.1.100:80
Virtual
Server
207.10.1.100:80
GW
Self
IP
Source
changed
by
SNAT
172.16.1.33
172.16.1.33:2000 ! 172.16.20.1:80
© F5 Networks, Inc.
185
172.16.20.1:80 ! 172.16.1.33:2000
© F5 Networks, Inc.
186
SNATs
Origin:
Who
can
have
their
address
changed?
Transla5on:
What
will
be
the
new
address?
Internet
Arrival
VLAN:
Where
packet
arrived
207.10.1.102
© F5 Networks, Inc.
187
© F5 Networks, Inc.
188
Traffic
exi5ng
this
direc5on
10.10.X.33
Floa5ng
Self-‐IP
Addresses
172.16.X.33
Traffic
exi5ng
this
direc5on
© F5 Networks, Inc.
189
10.10.17.100:443
172.16.17.33
Test
before:
Server
sees
Source
IP
as
10.10.X.30
Server
routes
10.10.X/24
-‐>
172.16.X.33
Partner
can’t
use
your
VS’s
Internet
10.10.X.100
SNAT
Labs:
1. SNAT
Automap
for
vs_hMps
172.16.X.33
2. Inbound
uses
172.16.X.33
3. Global
SNAT
172.16.X.201
for
10.10.X
4. vs_hMp
source
changed
172.16.X.201
but
partner
can’t
hit
vs_hMp
172.16.20.2
172.16.20.1
172.16.20.3
Module 9 - iRules
when
CLIENT_ACCEPTED
{
if
{
[[IP::remote_addr]
starts_with
“10.”
]
}
{
pool
ten_pool
}
else
{
Internet
pool
customer_pool
}
}
ten_pool
customer_pool
© F5 Networks, Inc.
192
Module 9 – Outline
© F5 Networks, Inc.
193
© F5 Networks, Inc.
194
iRule Operators
• Relational Examples
• contains
• matches
• equals
• starts_with
• Logical Examples
• Not
• And
• Or
© F5 Networks, Inc.
195
iRule Events
LB_SELECTED
Syn,
Syn-‐Ack,
Ack
SERVER_CONNECTED
Client
Data
Server
Response
SERVER_DATA
HTTP_RESPONSE
© F5 Networks, Inc.
196
rule
BrowserType
{
when
HTTP_REQUEST
{
if
{
[[HTTP::header
User-‐Agent]
contains
“MSIE”]
}
{
pool
/Common/IE_pool
}
elseif
{
[[HTTP::header
User-‐Agent]
contains
“Mozilla”]
}
{
pool
/Common/Mz_pool
}
}else
{ /Common/
Other_browser } }
}
© F5 Networks, Inc.
197
Configuring iRules
© F5 Networks, Inc.
199
Configuring iRules
• Addi=onal
Resources
• Interac=ve
User
Community
• hjp://devcentral.f5.com
© F5 Networks, Inc.
200
© F5 Networks, Inc.
201
Clients
Internet
BIG-‐IP LTMs
Servers
© F5 Networks, Inc.
202
Module 10 – Outline
• Sync-Failover Concepts
• Device Group Lab
• Stateful Fail-over
• Mirroring Labs
© F5 Networks, Inc.
203
Sync-Failover Concepts
High Availability
• Floa5ng
Address
Internet
• Failover
Triggers
• Failover
Detec5on
Floa5ng
IP
10.10.X.31
10.10.X.33
10.10.Y.31
Ac5ve
Ac5ve
Standby
Floa5ng
IP
Standby
172.16.X.31
172.16.X.33
172.16.Y.
31
© F5 Networks, Inc.
204
© F5 Networks, Inc.
205
Device Groups
© F5 Networks, Inc.
206
Synchronizing Configuration
• Synchronize
in
“Correct”
Direc=on
© F5 Networks, Inc.
207
© F5 Networks, Inc.
208
Changing Mode
© F5 Networks, Inc.
210
Failover
:
1. Voltage
via
Serial
Cable
(No
Data)
Failover
2. Only
valid
for
2
BIG-‐IPs
cable
Synchroniza5on
Data:
1. TCP
Connec5on
–
port
443
Standby
Ac5ve
2. Config
Synched
with
partner
Mirroring
Data:
1. TCP
Connec5on
–
Port
1028
2. Connec5on
and
Persistence
Tables
Mirrored
when
Enabled
Network
Failover:
1. UDP
Datagrams
–
Port
1026
2. Network
keep-‐alive
when
enabled
© F5 Networks, Inc.
211
Upgrade Process
works
Failover Active Failover to non-
Controller to upgraded controller
4. Upgrade other box upgraded Standby
Controller
and call Tech Support
No
Is upgraded
unit functional?
Yes
Upgrade current
standby controller
Done
© F5 Networks, Inc.
212
Internet
Steps:
1. Download file from AskF5
2. Read release notes Standby Active
3. Verify with MD5
4. GUI or tmsh install
5. Follow Flow Chart Apply
Fix
© F5 Networks, Inc.
213
Failover Triggers
• Fail-over Triggers
• Processes (Daemons)
• VLAN traffic
• Gateway
• Switch board
© F5 Networks, Inc.
214
© F5 Networks, Inc.
215
VLAN Failsafe
• Detects no network traffic à Tries to generate traffic
• Active Drops to Standby à Standby Assumes Active role
© F5 Networks, Inc.
216
Failover Detection
• Failover Cable (only 2 BIG-IPs)
• Serial Cable between boxes
• Looks for loss of voltage
• Always active – cannot be disabled
• Network Failover
• Communication Across the Network
• Looks for loss of Network Pulse
© F5 Networks, Inc.
217
VLAN
Failsafe:
1. Set
VLAN
Failsafe
-‐
External
Internet
2. Pull
network
cable
on
Ac5ve
3. Did
failover
occur?
4. Plug
all
cables
back
in
Standby
Ac5ve
5. Remove
VLAN
failsafe
© F5 Networks, Inc.
218
Stateful Fail-over
• Default Actions on Fail-over
• New connections through new Active system
• Current connections & persistence lost
• Stateful Failover
• New connections through new Active box
• Current connections & persistence Maintained
• Mirroring - dictates Standby box have knowledge of
existing connections & persistence
© F5 Networks, Inc.
219
Mirroring
• Connection Mirroring
• Applicable to Long Lasting connections
• telnet, ftp, etc…
• Connection should not be lost
• Persistence Mirroring
• For Persistent sessions
• Timer starts anew at Fail-over
© F5 Networks, Inc.
220
Connection Mirroring
Scroll
down
© F5 Networks, Inc.
221
Persistence Mirroring
© F5 Networks, Inc.
222
© F5 Networks, Inc.
223
Connec5on
Mirroring:
1. ssh
–
10.10.X.100
then
failover
2. ssh
session
ends
/
disconnected
Internet
3. Set
mirror
connec5on
for
ssh
virtual
server
–
10.10.X.100:22
4. ssh
–
10.10.X.100
then
failover
VS
-‐10.10.X.100
5. Connec5on
s5ll
ac5ve?
Persistence
Mirroring:
1. vs_hMps
–
source
addr
persist
profile
Standby
Ac5ve
2. hMps://10.10.X.101
3. Failover,
refresh,
did
connec5on
persist
ager
Failover?
4. Mirror
persist
for
profile
5. Try
again,
Persist?
© F5 Networks, Inc.
224
• N+1 Concepts
• N+1 Lab
© F5 Networks, Inc.
225
Ac5ve
Ac5ve
Standby
Standby
© F5 Networks, Inc.
226
© F5 Networks, Inc.
227
TG_A
TG_B
VS_A
VS_B
IP_A
IP_B
BIG-‐IP_A BIG-‐IP_B
Ac5ve Ac5ve
© F5 Networks, Inc.
228
© F5 Networks, Inc.
229
MAC Masquerading
• Floating MAC Address for Traffic Group
• No ARP cache refresh needed
• Related Option: Link Down on Failover
© F5 Networks, Inc.
230
Exis5ng
partners:
1. Add
TG2
Internet
© F5 Networks, Inc.
231
© F5 Networks, Inc.
232
N+1 Concepts
© F5 Networks, Inc.
233
N+1 Concepts
© F5 Networks, Inc.
234
N+1 Concepts
TG_A2
© F5 Networks, Inc.
235
© F5 Networks, Inc.
236
Course Outline
1. Installation
2. Load Balancing
3. Health Monitors
4. Profiles Day 1
5. Persistence
6. Processing SSL Traffic
7. Lab Project 1
8. NATs and SNATs
9. iRules Day 2
10. High Availability
11. High Availability Part 2
© F5 Networks, Inc.
237
Course Outline
12. Command Line – tmsh
13. Administration
14. Administration part 2 Day 3
15. Profiles part 2
16. iApps
17. Virtual Servers part 2
18. SNATs part 2
19. Monitors part 2
Day 4
20. Persistence part 2
21. iRules part 2
22. Lab Project 2
© F5 Networks, Inc.
238
Remainder of Course
• Expectations:
• Knowledge of previous concepts
• Goals:
• Command Line for configuring
• More complex aspects of LTM
• Practical application of concepts
© F5 Networks, Inc.
239
OR
© F5 Networks, Inc.
240
Module 12 Agenda
• tmsh command shell
• tmsh syntax & command completion lab
• create Pools, Profile & Virtual Servers lab
• /config/bigip.conf file
• Edit bigip.conf file lab
• Optional labs: SNAT, Monitor…
© F5 Networks, Inc.
241
• Verb-Object syntax
• create virtual …
• modify pool …
© F5 Networks, Inc.
242
Hierarchical Structure
• tmsh
• “root”
level
• Access:
tmsh
• Prompt:
tmos
© F5 Networks, Inc.
243
Hierarchical Structure
Modules
Sub-‐Modules
Components
auth
wideip
monitor
bigip
cli
selngs
hjp
gtm
monitor
snat
profile
ltm
hjp
tmos
persistence
inband
tunnels
net
vlan
rate-‐shaping
sys performance
© F5 Networks, Inc.
244
© F5 Networks, Inc.
245
© F5 Networks, Inc.
246
Keyboard Map
• Keyboard
short
cuts
• Common
examples:
• Ctrl
+
C
Cancels
the
current
command
• Ctrl
+
E
Moves
cursor
to
end
of
line
• Ctrl
+
G
Clears
all
characters
from
line
• Ctrl
+
K
Deletes
from
cursor
to
end
of
line
• Ctrl
+
L
Clears
screen
but
not
the
line
• Esc
+
U
Changes
word
to
uppercase
• Up
Arrow
Scrolls
up
through
command
history
• Down
Arrow
Scrolls
down
though
command
history
© F5 Networks, Inc.
247
Global commands
• create
• delete
• exit
• list
• load
• modify
• quit
• run
• run big3d_install
• save
• show
© F5 Networks, Inc.
248
virtual
snat
Node
&
others…
tmsh Examples
• Pool
• Virtual Server
© F5 Networks, Inc.
250
© F5 Networks, Inc.
251
© F5 Networks, Inc.
252
Config files
• /config/bigip.conf
• Virtual Servers, Pools, SNATs, Monitors, etc…
• /config/bigip_base.conf
• VLANs, Interfaces, Self IPs, Device Groups, etc…
• /config/BigDB.dat
• System settings
© F5 Networks, Inc.
253
© F5 Networks, Inc.
254
BigDB.dat Database
• Examples:
© F5 Networks, Inc.
255
Configuration archives
• /var/local/ucs/<filename>.ucs
• Zipped archive file
• tmsh save /sys ucs <filename>
• /var/local/scf/<filename>.scf
• Readable single config file
• tmsh save /sys config file <filename>
© F5 Networks, Inc.
256
© F5 Networks, Inc.
257
tmsh list
bigpipe list
Config Verification
1. bigip.conf contains? bigip_base.conf?
2. http://10.10.X.100 Load Balancing? Why?
3. https://10.10.X.100 Load Balancing? Why?
4. ssh to 10.10.X.100 Does it work?
5. Optional Labs – Working?
• SNAT
• Monitor
© F5 Networks, Inc.
260
BIG-IP iHealth
Available
at
hMps://ihealth.f5.com
© F5 Networks, Inc.
262
BIG-IP iHealth
© F5 Networks, Inc.
263
© F5 Networks, Inc.
264
© F5 Networks, Inc.
265
• tcpdump
• bigtop
• bigstart
© F5 Networks, Inc.
266
tcpdump
© F5 Networks, Inc.
267
© F5 Networks, Inc.
268
Three-way Handshake
Internet
Source
Des5na5on
1.
Syn
2.
Syn
Ack
3.
Ack
© F5 Networks, Inc.
269
Monitor Example
Client
• Capture
data
between
Internal
interface
&
Node
• tcpdump
–i
internal
–n
host
172.16.20.1
and
port
80
Internet
172.16.20.1
© F5 Networks, Inc.
270
172.16.20.2
172.16.20.1
172.16.20.3
© F5 Networks, Inc.
272
© F5 Networks, Inc.
273
© F5 Networks, Inc.
274
bigtop Command
© F5 Networks, Inc.
275
• q
or
Ctrl
+
c
• bigtop
–delay
#
• bigtop
–n
• bigtop
–once
• bigtop
–once|more
© F5 Networks, Inc.
276
bigstart Commands
• Ac=ons
• Stop,
Start,
Restart
• Start
on
Boot,
Include
in
Default
• Processes
• bigd
–
Monitors
• alertd
–
No=fica=on
• bigstart
status
© F5 Networks, Inc.
277
Connection Management
© F5 Networks, Inc.
278
Un=l
mmemory
When
emory
uu=liza=on
=liza=on
returns
reachs
uthe
nder
Low
H igh
the
Time
Low
WM
Water
ater
ark,
Mn aark,
ll
o
hnalf-‐open
ew
the
cIonnec=ons
dle
Tcimeout
onnec=ons
aire
s
raeduce,
llowed
are
more
maemory
dropped.
un=l
nd
more.
use
drops
below
the
Low
Water
Mark.
© F5 Networks, Inc.
279
VLANs
• Types of identification:
• Port
• MAC
• VLAN Tag
• VLAN Name
© F5 Networks, Inc.
280
© F5 Networks, Inc.
281
© F5 Networks, Inc.
282
• Port
Lockdown
• ssh
Access
Admin
Traffic
© F5 Networks, Inc.
283
Virtual Server
• IP
+
Port
“Listener”
Virtual
Server
10.10.17.100:80
© F5 Networks, Inc.
284
Port Lockdown
“Default”
list
includes:
• UDP
–
DNS,
SNMP,
RIP
&
iQuery
• TCP
–
SSH,
DNS,
SNMP,
HTTPS
&
iQuery
© F5 Networks, Inc.
285
216.34.91.10 216.34.94.15
Deny
Internet
216.34.94.32
Allow 216.34.94.*
© F5 Networks, Inc.
286
Packet Filters
© F5 Networks, Inc.
287
• Filter
Ac5ons
• Accept,
Discard,
Reject,
Con5nue
• Filters
Logged?
• Filter
on:
• protocol
• src
or
dest
host
or
network
• dest
port
• and,
or,
not
System Log
• Possible
Messages
Defined
as
Facility.Level
Log Files
Remote
Log
EMail
System
Log
EMail
SNMP
Traps
Alertd
LCD
© F5 Networks, Inc.
289
• Configuration Utility
• System / Logs
© F5 Networks, Inc.
290
• Archived:
• /var/log/<file>.1.gz
-‐-‐
/var/log/<file>.8.gz
© F5 Networks, Inc.
291
Changing syslog-ng.conf
• File
-‐
/var/run/config/syslog-‐ng.conf
© F5 Networks, Inc.
292
© F5 Networks, Inc.
293
4. Op5onal
Labs:
Packet
Filters,
then
DISABLE
172.16.20.2
tcpdump,
bigtop,
bigstart
172.16.20.1
172.16.20.3
© F5 Networks, Inc.
294
© F5 Networks, Inc.
295
© F5 Networks, Inc.
296
switchboot
© F5 Networks, Inc.
297
© F5 Networks, Inc.
298
© F5 Networks, Inc.
299
• Roles
• Partition
• Terminal
© F5 Networks, Inc.
300
© F5 Networks, Inc.
302
© F5 Networks, Inc.
303
Common Partition
•Installa5on objects
•Default
Par55on
Common
© F5 Networks, Inc.
304
vs_hjp1
vs_hjp2
• Object
names
unique
vs_hjp
hjp_pool
sjones
tbrown
• Separate
User
Par55on
Common
Par55on
User
© F5 Networks, Inc.
305
Par55on 1 Par55on 2
vs_hjp1 Sjones
Common
User
Par55on
© F5 Networks, Inc.
306
Par55on 1 Par55on 2
vs_hjp1
tbrown
vs_hjp2
pool1
•
Operator
–
(Enable
/
pool2
Disable)
•
All
Par55ons
vs_hjp
hjp_pool
tbrown
Common
User
Par55on
© F5 Networks, Inc.
307
Add
Par55ons:
1. part1
&
part2
Add
users:
1. adm1
–>
part1
Internet
2. adm2
–>
part2
10.10.X.100
Add
Resources:
1. VS2
&
hMp2_pool
in
part2
2. VS1
&
hMp1_pool
in
part1
3. New
bigip.conf
files
in
/
config/par55ons/
172.16.20.2
172.16.20.1
172.16.20.3
© F5 Networks, Inc.
308
© F5 Networks, Inc.
309
© F5 Networks, Inc.
310
Without CMP
100
%
Processor
Core
1
Processor
Core
2
© F5 Networks, Inc.
311
With CMP
TMM0 TMM1
With CMP
• Virtual
Server
Virtual
Server
connec=ons
are
distributed
across
instances
of
TMM
TMM0 TMM1
© F5 Networks, Inc.
313
© F5 Networks, Inc.
314
Partition 1
Partition 2
Partition 3
Partition 2
Partition 3
Partition 4
Partition 4
Instance 1
Instance 2
Instance 3
Instance 4
OS OS OS OS
OS
Hypervisor
Hardware Hardware
© F5 Networks, Inc.
315
© F5 Networks, Inc.
316
"
BIG-IP Platform Line-up "
VIPRION
"
4400"
VIPRION 2400"
assis
O N
Ch
2x
Quad
core
CPU
/
V IPRI
4200
Blades
(4x)
Price
on s
a l
Edi=
Virtu
Production"
© F5 Networks, Inc.
Lab" Func=on
/
Performance
317
Administrative Folders
© F5 Networks, Inc.
318
Sync-Only Groups
© F5 Networks, Inc.
319
BIG-‐IP_C
BIG-‐IP_A
VS_D
VS_E
Profiles_A
BIG-‐IP_D
BIG-‐IP_E
© F5 Networks, Inc.
320
BIG-‐IP_C
BIG-‐IP_A
VS_D
VS_E
Profiles_A
Profiles_A
BIG-‐IP_D
BIG-‐IP_E
© F5 Networks, Inc.
321
© F5 Networks, Inc.
322
Steps:
1. Create
Device
Trust
Internet
© F5 Networks, Inc.
323
Full Proxy
Server
Response
© F5 Networks, Inc.
325
TCP flow
#1
#2
#4
#5
#3
#3
Internet
#1 #2 #4 #5 #3 #3
Resend bytes
© F5 Networks, Inc.
326
TCP flow
#1
#2
#4
#3
#3
#5
Internet
Resend
bytes
#1
#2
#3
#4
#5
© F5 Networks, Inc.
327
Other examples
Internet
Client
side
IP
v4
© F5 Networks, Inc.
328
© F5 Networks, Inc.
329
• OneConnect
• Reuse server side connections
• Chunking
• Allows iRules and Compression to function with Chunked http data
© F5 Networks, Inc.
330
Chunking
• Unchunk
• Unchunk if chunked - send unchunked
• Rechunk
• Unchunk if chunked – send chunked
• Selective
• Unchunk if chunked – send as received
• Preserve
• If chunked, send unprocessed
• If unchunked, process and send
© F5 Networks, Inc.
331
• Keep Alives
• HTTP Version Variation
• Reuse of Idle connections
• Determining Idle Connections
© F5 Networks, Inc.
333
© F5 Networks, Inc.
334
© F5 Networks, Inc.
335
One-Connect Profile
© F5 Networks, Inc.
336
HTTP Compression
• hjp
Profile
Selng
© F5 Networks, Inc.
337
• LTM à Server
• I cannot accept compressed data
• I want file /host/path/info.html
• Server à LTM
• Here is your data
• LTM à Client
• I compressed the data using deflate. Here it is.
© F5 Networks, Inc.
338
Configuring Compression
• Content Options
• URI Matching
• Content Type Matching
• Tuning Options
• Memory Management
• Compression Levels
© F5 Networks, Inc.
339
Steps:
1. Custom
HTTP
Profile
2. Verify
Size
of
Data
Internet
10.10.X.10Y
172.16.20.2
172.16.20.1
172.16.20.3
© F5 Networks, Inc.
340
RAM Cache
• Enhance
client
response
© F5 Networks, Inc.
341
• LTM à Server
• I want this object
• Server à LTM
• Here is your data
• LTM à LTM RAM Cache
• Cache appropriate data
• LTM à Client
• Here is your data
© F5 Networks, Inc.
342
• LTM à Client
• Here is your data
© F5 Networks, Inc.
343
• Tuning Options
• Memory Management
© F5 Networks, Inc.
344
Streaming Profile
© F5 Networks, Inc.
345
Authentication
Authen5ca5on
Server
© F5 Networks, Inc.
346
© F5 Networks, Inc.
347
Optimization Technologies
Full Proxy
© F5 Networks, Inc.
348
OneConnect
TCP
WAN
TCP
LAN
IP
v6
IP
v4
172.16.20.2
172.16.20.1
172.16.20.3
© F5 Networks, Inc.
350
Module 16 – iApps
© F5 Networks, Inc.
351
iApps Outline
© F5 Networks, Inc.
352
© F5 Networks, Inc.
354
Profile
Class
© F5 Networks, Inc.
355
© F5 Networks, Inc.
356
iApps Defined
• Application management framework
• Application focused
• Standard structure
• Custom solutions
© F5 Networks, Inc.
357
iApps Components
1. Application Services
2. iApps Templates
3. Analytics and Statistics
4. DevCentral Ecosystem
© F5 Networks, Inc.
358
Application Services
• Four tabs:
• Properties - Object properties
• Reconfigure - Allows changes to initial configuration
• Components - Hierarchy and Availability view
• Analytics - Statistics grouped by application
© F5 Networks, Inc.
359
iApps Templates
• Application requirements
• 20+ iApps templates
• Multiple deployments
• Customize template
• Copy existing template
• Export / Import template
• From Scratch
• DevCentral EcoSystem
© F5 Networks, Inc.
360
• Sections Includes:
• Presentation to users
• Implementations of inputs
Implementation: TMSH / TCL
• Help inline
• DevCentral EcoSystem
Presentation: APL
• F5 supported Templates
• Additional Templates
Help: HTML
© F5 Networks, Inc.
361
© F5 Networks, Inc.
362
© F5 Networks, Inc.
363
© F5 Networks, Inc.
364
iApps Analytics
Application Visibility and Reporting module
Real-time application performance statistics
Application level reports
Application performance tuning
© F5 Networks, Inc.
365
Captured Transactions
• Troubleshooting
• 1000 transactions
• Requests
• Responses
• Analytics profile
• Filters
• Local logging
• Remote logging
• syslog server
• SIEM device
(ie. Splunk)
© F5 Networks, Inc.
366
iApps Ecosystem
© F5 Networks, Inc.
367
list as ofNetworks,
© F5 10.2011 Inc.
368
Provision AVR
© F5 Networks, Inc.
369
© F5 Networks, Inc.
370
© F5 Networks, Inc.
371
© F5 Networks, Inc.
372
© F5 Networks, Inc.
373
Components
© F5 Networks, Inc.
374
© F5 Networks, Inc.
375
Provisioning:
1. Provision
AVR
Applica5on
Service:
1. my_web
2. f5.hMp
template
3. vs
10.10.X.110
2nd
Applica5on
Service:
1. Customize
template
2. my_other_web
3. my_hMp_template
4. vs
10.10.X.111
5. View
status
Analy5cs:
1. Drive
traffic
2. View
sta5s5cs
3. Capture
traffic
© F5 Networks, Inc.
376
Course Outline
1. Installation
2. Load Balancing
3. Health Monitors
4. Profiles Day 1
5. Persistence
6. Processing SSL Traffic
7. Lab Project 1
8. NATs and SNATs
9. iRules Day 2
10. High Availability
11. High Availability Part 2
© F5 Networks, Inc.
377
Course Outline
12. Command Line – tmsh
13. Administration
14. Administration part 2 Day 3
15. Profiles part 2
16. iApps
17. Virtual Servers part 2
18. SNATs part 2
19. Monitors part 2
Day 4
20. Persistence part 2
21. iRules part 2
22. Lab Project 2
© F5 Networks, Inc.
378
• Forwarding VS Lab
• Path Load Balancing
• Transparent VS
© F5 Networks, Inc.
379
Des5na5on
“Listener”
•
Host
•
Network
© F5 Networks, Inc.
380
Internet
172.16.0.0:0
10.10/16 NW
172.16.20.22
172.16.20.1
172.16.20.98
© F5 Networks, Inc.
381
© F5 Networks, Inc.
382
Des5na5on
Listener
Internet
Most
Specific
•
Specific
IP
:
Specific
Port
•
Specific
IP
:
All
Ports
•
Network
IP
:
Specific
Port
•
Network
IP
:
All
Ports
•
All
IPs
:
All
Ports
Least
Specific
Servers
More
in
Architec5ng
class
© F5 Networks, Inc.
383
© F5 Networks, Inc.
384
• Multiple Components
• Transparent Virtual Server
• Auto Last Hop
• Transparent Monitor
• Troubleshooting
© F5 Networks, Inc.
385
Internet
• Transparent
Virtual
Server
-‐
through
not
to
pool
members
-‐
no
address
ISP
#1
ISP
#2
transla5on
• Network
Transparent
Virtual
Server
Virtual
Server
0.0.0.0:0
• Wildcard
Virtual
Server
0.0.0.0:0
–>
all
networks
No
Des5na5on
IP
Address
Transla5on
Virtual
Server
0.0.0.0:0
Src
–
x.x.x.x
Dest
–
216.34.94.17
© F5 Networks, Inc.
387
Internet
Src:
190.1.1.1
200.1.1.0
/
24
.254
Dest:
202.1.1.1
VS:
202.1.1.0
Virtual
Server
No
IP
Address
• Load
Balancing
type
.254
Transla5on
© F5 Networks, Inc.
388
216.34.94.0
Network
RouterPool
216.34.100.1
216.34.100.2
216.34.100.3
MAC
02....01
02..…02
02..…03
© F5 Networks, Inc.
389
ISP
#2
Request
#2
ISP
#1
D e f a u l t
Gateway
© F5 Networks, Inc.
390
Return
Path
• Thru
same
IDS
#1
–
Last
Hop
201.1.1.0/24
Ac5ve
Request
#2
LTM
#2
© F5 Networks, Inc.
391
LTM#1
200.1.1.0/24
I D S
I D S
I D S
#1
#2
#3
© F5 Networks, Inc.
392
Configuration Overview
© F5 Networks, Inc.
393
• SNAT Review
• More on SNATs
• SNAT Labs
• VIP Bounceback
• VIP Bounceback Lab
© F5 Networks, Inc.
394
SNATs
Who
can
be
changed
–
Listener
traffic
from
Changed
to
what
Internet
Where
packet
arrived
from
207.10.1.102
172.16.20.22
172.16.20.1
172.16.20.98
© F5 Networks, Inc.
395
SNATs: Example 1
Internet
Many
non-‐publicly
routable
to
one
routable
address
207.10.1.33
172.16.20.22
172.16.20.1
172.16.20.98
© F5 Networks, Inc.
396
SNATs: Example 2
© F5 Networks, Inc.
397
Traffic
exi5ng
10.10.X.33
this
direc5on
172.16.X.33
Traffic
exi5ng
this
direc5on
172.16.20.22
172.16.20.1
172.16.20.98
© F5 Networks, Inc.
398
150.150.1.1
Internet
Dest
150.150.1.1
Self
IP
Src
200.1.2.3
200.1.2.3
Dest
150.150.1.1
Src
172.16.20.3
172.16.20.3
© F5 Networks, Inc.
399
Internet
• If
enabled
for
mul5ple
self
IP’s
Self
IP
Self
IP
200.1.1.1
200.1.1.3
• Eliminates
problem
running
out
of
ports
172.16.20.3
© F5 Networks, Inc.
400
Dest
X.X.X.X
Src
211.1.10.10
Self
IP
Self
IP
222.2.10.10
211.1.10.10
First
request
is
Load
Balanced
to
router
on
ISP
#1
using
wildcard
Virtual
Server
Virtual
Server
0.0.0.0:0
Dest
X.X.X.X
Src
172.16.20.3
172.16.20.3
© F5 Networks, Inc.
401
Dest
Y.Y.Y.Y
Self
IP
Self
IP
Src
222.2.10.10
222.2.10.10
211.1.10.10
Second
request
is
Load
Balanced
to
router
on
ISP
#2
using
wildcard
Virtual
Server
Virtual
Server
0.0.0.0:0
Dest
Y.Y.Y.Y
Src
172.16.20.3
172.16.20.3
© F5 Networks, Inc.
402
SNAT ISP #1
Virtual
Server
0.0.0.0:0
Src
–
172.16.20.3
Dest
–
216.34.94.17
SNAT ISP #2
Virtual
Server
0.0.0.0:0
Src
–
172.16.20.3
Dest
–
216.34.94.17
SNATpool Configuration
© F5 Networks, Inc.
405
© F5 Networks, Inc.
406
Traffic
exi5ng
this
direc5on
10.10.10.10
172.16.20.22
172.16.20.1
172.16.20.98
© F5 Networks, Inc.
407
SNATs as listeners
traffic
from
172.16
-‐>
207.10.1.102
192.168
traffic
not
SNATed
Internet
Without
VS,
only
172.16
traffic
SNAT
to
processed
by
LTM
not
192.168
207.10.1.102
VS 0.0.0.0:0
172.16.20.1 192.168.5.3
SNAT recommendations
© F5 Networks, Inc.
409
SNAT configuration
• Source IP
• IP Address
• SNATpool
• Automap
• Configured in:
• SNAT (client source listener)
• Within VS (Automap or SNATpool)
© F5 Networks, Inc.
410
Multiple SNATs
Most
Specific
Internet
SNAT
within
VS
SNAT
Origin
•
Specific
IP
•
Network
IP
•
All
IPs
Least
Specific
Servers
© F5 Networks, Inc.
411
© F5 Networks, Inc.
412
© F5 Networks, Inc.
413
Database
Web
Servers
Servers
© F5 Networks, Inc.
414
Src
172.16.1.2
72.16.20.2
Src
172.16.1.2
72.16.20.2
Dst
172.16.1.254
72.16.1.2
Dst
172.16.20.2
72.16.1.100
172.16.1.1
172.16.20.3
172.16.1.2
172.16.20.2
Database
Servers
172.16.1.3
172.16.20.1
Web
Servers
© F5 Networks, Inc.
416
© F5 Networks, Inc.
417
© F5 Networks, Inc.
419
SNATing in an iRule
Internet
150.10.10.0/24
160.10.10.0/24
External
1
External
2
172.16.16.0/24
Client
Client
Internal
Client
Client
Client
Client
Client
Client
© F5 Networks, Inc.
420
150.10.10.0/24
160.10.10.0/24
172.16.16.0/24
Client
Client
Client
Client
Client
Client
Client
Client
snatpool
SNATPool_80
}
snatpool
SNATPool_443
}
else
{
snatpool
SNATPool_Other
}
}
© F5 Networks, Inc.
422
© F5 Networks, Inc.
423
SNAT Conclusions
• Choice of Translation
• Specific Address
• Self IP - Automap
• Member of SNAT Pool
© F5 Networks, Inc.
424
Forwarding
Transparent
Virtual
NAT
SNAT
Virtual
Srv
Virtual
Srv
Server
Client
side
Address
not
Address
Transla5on
Translated
Node side
© F5 Networks, Inc.
425
Traffic Flow
© F5 Networks, Inc.
426
Internet
172.16.20.3
© F5 Networks, Inc.
427
Monitors – Outline
• Scripted Monitors
• EAV Monitors
• Advanced Monitor Options
• Multiple Assignments
• Manual Resume
• Receive Disabled String
• Alternate Destinations
• Passive Monitors
• Monitor Labs
© F5 Networks, Inc.
428
Scripted Monitors
• FTP
• IMAP
• LDAP
• MSSQL
• Oracle
• Radius
• And External
© F5 Networks, Inc.
430
© F5 Networks, Inc.
431
Monitor Associations
© F5 Networks, Inc.
432
Or Individual Node
© F5 Networks, Inc.
433
Pool level
• Multiple Monitors
• Test Dependent Services
• Test Alternate Paths
© F5 Networks, Inc.
435
Destination Definition
© F5 Networks, Inc.
436
© F5 Networks, Inc.
437
Transparent Monitors
f5.com
© F5 Networks, Inc.
438
Manual Resume
• After Monitor Fails and Successful Again
• Default: Mark Available (Up)
• Manual Resume: Mark Unavailable (Forced Down)
© F5 Networks, Inc.
439
© F5 Networks, Inc.
440
Inband Monitors
• Monitor Success of Client Connections
• Layer 4 only
• Failures Can be Detected Quickly
• Recovery May be Slow
© F5 Networks, Inc.
441
VS -‐ 207.10.1.100
© F5 Networks, Inc.
442
Applica=on Traffic
Monitors:
1. Mul5ple
Monitors
• Monitor
with
Alias
port
• Mul5ple
monitors
to
one
pool
Internet
• Availability
Requirements
10.10.X.100
2. Receive
Disable
String
3. Manual
resume
• Set
Manual
resume
–
monitor
• Resume
pool
member
© F5 Networks, Inc.
444
1
1
2
2
3
3
© F5 Networks, Inc.
445
Persistence – Outline
• Review
• Source Address
• HTTP Cookie Persistence
• Session Persistence Criteria
• Match Across…
• Other Persistence Types
• SSL Persistence
• SIP Persistence
• Destination Address
• Universal Persistence
• Persistence Labs
© F5 Networks, Inc.
446
© F5 Networks, Inc.
447
SSL Persistence
© F5 Networks, Inc.
448
SIP Persistence
© F5 Networks, Inc.
449
Destination Address
• Based on Destination IP
• Also called Sticky Persistence
• Most commonly used with:
• Caching servers
• Multiple ISP’s outbound
© F5 Networks, Inc.
450
Destination Address
Services
Client
Client
© F5 Networks, Inc.
451
Destination Address
Services
• Traffic
LB
Across
Mul5ple
Caches
Internet
• Cache
Separated
by
Des5na5on
Client
Client
© F5 Networks, Inc.
452
Universal Persistence
© F5 Networks, Inc.
453
Universal Persistence
when
HTTP_REQUEST
{
persist
uie
[findstr
[HTTP::uri]
“user=“
5
“&”
]
}
hMp://www.test.com/?env.cgi&user=abc&pw=456
Persistence:
1. Universal
2. Match
Across
Services
Internet
10.10.X.100
172.16.20.2
172.16.20.1
172.16.20.3
© F5 Networks, Inc.
456
when
CLIENTSSL_HANDSHAKE
{
if
{
[[IP::remote_addr]
equals
10.10.10.10
]}
{
pool
my_pool
}
}
Internet
my_pool
Default
© F5 Networks, Inc.
457
iRules – Outline
• Additional examples
• Re-visit Events
• Commands
• Context
• iRules Labs
© F5 Networks, Inc.
458
when
EVENT
{
if
{
condi=onal_statement1
}
{
ac=on_when_condi=on1_true
}
elseif
{
condi=onal_statement2
}
{
ac=on_when_condi=on1_false_condi=on2_true
}
}
© F5 Networks, Inc.
459
CLIENT_DATA
Internet
Client
Data
HTTP_REQUEST
CLIENTSSL_HANDSHAKE
LB_SELECTED
Syn,
Syn-‐Ack,
Ack
SERVER_CONNECTED
Server
SERVER_DATA
Response
HTTP_RESPONSE
SERVERSSL_HANDSHAKE
© F5 Networks, Inc.
461
HTTP_REQUEST
HTTP_RESPONSE
CLIENT_DAT SERVER_DATA
A
CLIENT_ACCEPTED
SERVER_CONNECTED
© F5 Networks, Inc.
463
• Application
• HTTP RTSP SIP XML
• Other
• CACHE DNS GLOBAL STREAM
© F5 Networks, Inc.
464
© F5 Networks, Inc.
465
• HTTP
• HTTP_REQUEST & HTTP_RESPONSE
• RTSP
• RTSP_REQUEST & RTSP_RESPONSE
• SIP
• SIP_REQUEST & SIP_RESPONSE
• XML
• XML_BEGIN_ELEMENT & XML_END_ELEMENT
© F5 Networks, Inc.
466
• ASM
• ASM_REQUEST_BLOCKING &
ASM_REQUEST_VIOLATION
• AUTH
• AUTH_ERROR & AUTH_FAILURE
• CLIENTSSL
• CLIENTSSL_CLIENTCERT & CLIENTSSL_DATA
• SERVERSSL
• SERVERSSL_DATA & SERVERSSL_HANDSHAKE © F5 Networks, Inc.
467
• CACHE
• CACHE_REQUEST & CACHE_RESPONSE
• DNS
• DNS_REQUEST & DNS_RESPONSE
• GLOBAL
• LB_FAILED, LB_SELECTED, & RULE_INIT
• STREAM
• STREAM_MATCHED
© F5 Networks, Inc.
468
iRule Commands
© F5 Networks, Inc.
470
© F5 Networks, Inc.
471
© F5 Networks, Inc.
472
iRule Context
Server
Side
when
SERVER_CONNECTED
{
if
{
[[clientside[IP::remote_addr]
equals
…
© F5 Networks, Inc.
473
Example Functions
• Data Group
• class, findclass, matchclass
• String
• domain, findstr, substr, getfield
• Utility
• b64decode, b64encode, decode_uri
© F5 Networks, Inc.
474
findstr Example
when
HTTP_REQUEST
{
if
{
[
findstr
[HTTP::uri]
"user="
5
"&"
]
starts_with
“A"
}
{
pool
Alogin_pool
}
elseif
{
[
findstr
[HTTP::uri]
"user="
5
"&"
]
starts_with
“B"
}
{
pool
Blogin_pool
}
else
{
pool
other_pool
}
HTTP::uri
}
hMp://host/path/file.ext?parameters
hMp://host/path/file.ext?comp=F5;user=B23456&...
© F5 Networks, Inc.
475
iRule Logging
• Example:
log local0. “[ findstr [HTTP::uri] "user=" 5 "&" ]”
© F5 Networks, Inc.
476
iRule Variables
• Example:
set debug 1
© F5 Networks, Inc.
477
Course Outline
1. Installation
2. Load Balancing
3. Health Monitors
4. Profiles Day 1
5. Persistence
6. Processing SSL Traffic
7. Lab Project 1
8. NATs and SNATs
9. iRules Day 2
10. High Availability
11. High Availability Part 2
© F5 Networks, Inc.
478
Course Outline
12. Command Line – tmsh
13. Administration
14. Administration part 2 Day 3
15. Profiles part 2
16. iApps
17. Virtual Servers part 2
18. SNATs part 2
19. Monitors part 2
Day 4
20. Persistence part 2
21. iRules part 2
22. Lab Project 2
© F5 Networks, Inc.
479
Offered as
WBT Troubleshootin
g BIG-IP
Configuring
Application BIG-IP LTM
BIG-IP with
Developers Essentials
iRules
© F5 Networks, Inc.
480
© F5 Networks, Inc.
481
Thank You!
F5 Networks Training
© F5 Networks, Inc.
482
• iRules Labs # 1 to 6
• Path Load Balancing Lab
© F5 Networks, Inc.
483
Rules:
1. findstr
2. TCP::payload
3. Set
variable
&
logging
Internet
10.10.X.10Y
4. Redirect
404
Op5onal:
1. Redirect
404
&
Capture
File
2. Apology
Message
on
Failed
Pool
172.16.20.2
172.16.20.1
172.16.20.3
© F5 Networks, Inc.
484
© F5 Networks, Inc.
485
Additional Slides
© F5 Networks, Inc.
486
About F5 Discuss how F5 started and where F5’s products fit in the market space.
Module 1 – Installation & Overview, Setup, Configuration Learn basics of BIG-IP LTM and its operation in the network, Purpose and functionality of the Setup Utility & 60 min
Initial Access Utilities. How to access BIG-IP LTM Configuration utilities
Install Lab (Setup) Successfully install BIG-IP LTM System using Setup utility.
BIG-IP hardware and platforms Discuss the different hardware platforms for BIG-IP LTM and the basic architecture like SCCP, AOM and
TMM.
Lab to set an IP Address on SCCP Set an IP Address on the SCCP or AOM and then watch the box reboot while connected using an SSH network 15 min
connection.
Module 2 – Load Balancing Introduce Nodes, Pools, & Virtual Learn the concepts and how to configure Nodes, Pools and Virtual Servers 90 min
Servers
Virtual Servers and Pools Lab Successfully configure a Virtual Server using port 80 and 443.
Introduce Load Balancing Modes Be able to list the different Load Balancing Modes and explain the differences between them.
Load Balancing Labs Successfully configure and test the Round Robin, Ratio and Load Balancing with Priority Group Activation.
Module 3 – Monitors Introduce Monitors Learn the concepts and goals of monitors. Differentiate between monitor templates and user-defined monitors. 60 min
Monitor Labs Successfully assign a default and individual monitors to both nodes and pool members.
Module 4 – Profiles Introduce Profiles Learn the function and importance of profiles in effecting the way a given virtual server will process traffic.
Module 5 – Persistence Introduce Persistence Learn the concept of Persistence, and be able to discuss methods, advantages and disadvantages of source 75 min
address and cookie persistence.
Persistence Labs Successfully configure and implement source address and cookie persistence profiles.
Object Management Learn about managing node and node availability and when the BIG-IP LTM will direct traffic to a given
device.
Module 6 – Introduce Client and Server SSL Learn basic SSL Concepts, BIG-IP LTM SSL Proxy and Server SSL components. 60 min
SSL Termination Profiles
SSL Profile Labs Successfully create client SSL profile using a self-signed certificate and associate it with an appropriate virtual
server.
Review Previous Day Review Lab Project results and the six Questions in Module 7
Module 8 – NATs and SNATs NATs Learn how Virtual Servers, NATs and SNATs provide complimentary address translation options. Learn the 75 min
features of NATs and SNATs and how they are configured.
iRules Labs Successfully configure and use iRules that direct traffic to specific pools.
Module 10 – Installation of a Introduce Redundant Pair Concepts Learn Redundant Pair concepts and how to configure a BIG-IP LTM System as either the Active or Standby box 60 min
Redundant Pair of a Redundant Pair.
Setup Lab for a Redundant Pair Successfully configure both boxes of a Redundant Pair (one as Active and the other as Standby).
Module 11 – High Availability Introduce Failover Concepts Learn the conditions that will automatically trigger a failover and how to configure BIG-IP LTM System to 105 min
automatically detect these conditions.
Failover Labs Successfully configure and test VLAN Arming and compare hard-wired and network failover.
Introduce Stateful failover options Learn the concept mirroring connection and persistence information.
Mirroring Labs Successfully configure and test Connection and Persistence Mirroring on a Redundant Pair of BIG-IP LTMs.
Lab on MAC Masquerading Successfully configure and test MAC Masquerading during a failover between a Redundant Pair of BIG-IP
LTMs.
Module 12 – Maintaining BIG-IP Introduce F5 resources that help Learn about tcpdump, qkview, and Ask F5. 30 min
LTM with support.
Next courses & class review Review topics in this course, by answering test questions.
1 Make hardware it’s own section after install lab and also separate the SCCP / AOM lab
more from install and cleanup
Day 2
© F5 Networks, Inc.
489
© F5 Networks, Inc.
490
© F5 Networks, Inc.
491
Example B
© F5 Networks, Inc.
492
IP Address
10.10.##.30
255.255.0.0
Default Route
10.10.##.33
172.16.##.31 172.16.##.32
255.255.0.0 255.255.0.0
Internal Shared Alias
172.16.##.33
255.255.0.0