SlideShare a Scribd company logo
1 of 149
Download to read offline
Chapter 1
Initial Setup
Exploring Big-IP Hardware
Exploring Big-IP File System
Licensing Big-IP
Basic Configuration
Big-IP Hardware Platform
The Hardware
OOB
Management
Port
Console
Cable
Failover
Cable
USB Port
LCD Panel
and controls
10/100/1000 Mbps
Copper Ports
1000 Mbps
Fibre Ports
Looking Inside a 3600Big-IP
Big-IP LTM Software support
Lights Out Management
-Two operating systems
-TMM for primary use
-AOM/SCCP for lights
Out management
-Always on Mansgment
-Switch card control processing
What to do first ?
Setup Overview
Setup Tools
 SSH Client
-username:- root
-Password:-default
 Serial Terminal Client
-username:- root
-Password:-default
 Big-IP Config Script
-config
 Big-IP Wab-based configuration
https://192.168.1.245
-username:- admin
-Password:-admin
Licensing Methods
Entering Registration Key
Manual Licensing
Completing the Licensing Process
Configuring administration Access
File System
 Built on top Linux
 Has Linux files structure
 Files are relevant to the operation
 Main file in BIG-IP LTM are mentioned below:
-/coinfig/bigip.conf
-/config/bigip_base.conf
-/config/BigDB.dat
-/etc/hosts.allow
-/config/bigip.license
-/var/log/ltm
 /coinfig/bigip.conf
- Holds all information relevant to the load
balancing
Like: virtual, pool, profile, monitor, irules etc
-Shared between 2 units if in a pair configuration
 /config/bigip_base.conf
-Holds all information relevant to the basic
elements of the BigIP
Like: management IP, vlans, routes few more things
 /etc/hosts.allow
-hosts which are allowed to use the local INET
services.
Such as services are SSH, snmp for the snmp devices
 /config/BigDB.dat
-bigdb database holds a set of bigdb configuration
keys
-Keys define the behaviours of various aspects of the
BIG-IP system
-For example, the bigdb key Failover.Active Mode, when
set to enable, causes a redundant system to operate
in active-active mode, instead of the default
active/standby mode.
-We can edit these values by using
-The Configuration utility
-The bigpipe db command
#bigpipe db all list
 /config/bigip.license
-Holds all information about the license of the
BigIP system
-Without this file or a valid license file, the BigIP
will not operate
 There are few more vital files
/config/ssl/ssl.crt
/config/ssl/ssl.key
Management configuration
 Giving IP to management port
#b mgmt 10.192.230.129 {netmask 255.255.255.0 }
 Putting route for management network
#b mgmt route 10.216.0.0 netmask 255.255.0.0 ‘{ gateway
10.192.230.145 }’
#b mgmt route 10.12.11.32 netmask 255.255.255.224 ‘{
gateway 10.192.230.145 }’
VLAN Configuration
vlan external {
tag 10
interfaces 1.1
}
vlan internal_phy {
tag 4093
interfaces 1.2
}
vlan internal_virt {
tag 4092
interfaces 1.4
}
Self IP/Port configuration
 Assigning IP address the to vlan
#b self 172.31.230.129 ‘{ netmask 255.255.255.0 vlan external
allow tcp ssh tcp https tcp 4353 }’
#b self 192.168.230.129 ‘{ netmask 255.255.255.128 vlan
internal_virt allow tcp https }’
 Opening the Port
#b self allow ‘{ default udp snmp tcp ssh tcp domain tcp snmp udp
efs tcp 4353 udp domain udp 4353 tcp https proto ospf }’
Configuring Floating
 This part of configuration is for redundant pair
#b self 172.22.100.6 {
netmask 255.255.255.0
unit 1
floating enable
vlan external
allow tcp https
}
#b self 192.168.100.3 {
netmask 255.255.255.0
unit 1
floating enable
vlan internal
allow default
}
Chapter 2
Traffic Processing
Pools , Members & Nodes
Virtual Server
-Big-IP is default deny device, so listener (virtual) is must
-Virtual server gules everything together
-Typically virtual are associated with pool
-Before virtual server can load balance it should mapped to pool
-Big-IP translate the destination ip address from virtual server to
actual server
-Client see the pool servers as single server, hence the term Virtual
Server
Asymetric Routing Problem
Full Proxy Architecture
-Big-IP do much more than translating the network Address
-F5 implemented full proxy architecture in Big-IP
-Separate tcp connections for the client & the server
Chapter 3
Load Balancing
Load Balancing Method
Member vs Node
Priority Group Activation
Configuring load balancing
Load Balancing Methods
-Static method do not take server performance in to consideration
-Dynamic method does consider server performance
Round Robin
-Round Robin is default & most commonly used method
-Big-IP evenly distributes client request across all available pool
member
Ratio
-Ratio method is appropriate to use if some of the members are
powerful than other.
-Since Ratio is static method, this means that server with highest
ratio value will receive more request then others even if the
performance of the server is slow.
#b pool lab_Pool { lb method member/node ratio }
Least Connections
-This method consider the current connections count to decide
where to send next request
#b pool lab_Pool { lb method least conn }
Least Connections
-After connections counts shown below, the big-IP round robin next
requests between all three servers.
Fastest
-Fastest uses the outstanding layer 7 request to decide where to
send the next request
-Request or Response ?
#b pool lab_Pool { lb method fastest }
Fastest
-Ping response form server doesn’t take into account how fast
server will response at port 80.
-SYN-ACK response form server at port 80 doesn’t take into
account how fast backend database server will populate the
content of web page
Observed
-It is basically Ratio load balancing but with Ratio assigned by Big-
IP
-Servers with connections lower than average will given ratio of 3
-Servers with connections higher than average will given ratio of 2
#b pool lab_Pool { lb method member observed }
Observed
>Connections status
-server B & C with Ratio 3
-Servers A & D with Ration 2
Predictive
-Predictive method is similar to Observed, but assigns more
aggressive value
#b pool lab_Pool { lb method member predictive }
Predictive
>Connections status
-server A & C with Ratio 1
-Servers B & D with Ration 4
Pool Member vs. Node
 Load Balancing by:
>Node
-Total service for one IP Address
-Take all transactions for the IP address into account
#b node <ip_addr> { ratio <no.>/ session <enable/disable>}
>Pool Member
-IP Address & Service
-Take the decision based transactions happening on
the service port.
Priority Group Activation
-Use to designate preferred & backup sets of pool members with
in a pool
-Once priority group activated
-The available member with highest priority will consider first
Priority Group Activation
-If the number of member falls below the priority group
activation set,
-The next highest priority member also start serving
the requests.
Priority Group Activation
Configuration example
#b pool lab_pool '{
lb_method predictive
min_active_members 2
member 10.100.10.10:80 priority 10
member 10.100.10.20:80 priority 10
member 10.100.10.30:80 priority 10
member 10.100.10.30:80 priority 5
member 10.100.10.40:80 priority 5
member 10.100.10.50:80 priority 5 }’
Fallback Host
-Fallback host feature is designed for HTTP protocol only.
-It comes into play if all the members in a pool are unavailable
Configuring Load Balancing
bigpipe pool <pool_name> { lb method
<method_name> }
(rr | node ratio | member ratio | member least conn |
member observed | member predictive | fastest |
least conn | predictive | observed | dynamic ratio |
fastest app resp)
Chapter 4
Monitor
Monitor Functionality
Monitor Types
Configuring Monitor
Assigning Monitor
Status
Intro to monitor
 Big-IP system can monitor the health of nodes &
member
 Monitor is the test that Big-IP performed
-simple test
-Highly interactive test
 The result of these test will define the status of
respective node or member is available
 Big-IP perform continues monitoring irrespective of
the status of node or member
Step to set-up a monitor
Step 1: Create
Step 2: Name & Type
-name the new monitor select the type from system
templates
Step 3: Customize
Step 4: Assign
- to pool/node/pool member
Step 5: Status
Types of monitoring
 Address Check
-IP address –node
 Service Check
-IP:port
 Content Check
-IP:port & check data returned
 Interactive Check
-Interactive with servers
-Multiple commands and multiple response
Address Check
Example
 System
#b monitor icmp list
monitorroot icmp {
interval 5
timeout 16
dest *
}
 Custom
#b monitor icmp_mon list
monitor icmp_mon {
defaults from icmp
interval 7
timeout 22
}
Service Check
-Service checks only test whether server is listening to respective
port.
-Doesn’t provide any insight into quality of the content that might
return
Example
 System
#b monitor tcp list
monitorroot tcp {
interval 5
timeout 16
dest *:*
recv ""
send ""
}
 Custom
#b monitor tcp_port_mon
list
monitor tcp_port_mon {
defaults from tcp
interval 15
timeout 47
}
Content Check
-Content check go beyond testing whether a node is
responding/listening
-It also test if it is responding with correct content
Example
System:
#b monitor http list
monitorroot http {
interval 5
timeout 16
dest *:*
password ""
recv ""
send "GET /"
username ""
}
Custom:
#b monitor http_mon list
monitor http_mon {
defaults from http
recv "Health Check"
send "GET /health_check.html
HTTP/1.0nn"
}
Interactive Check
Example
#b monitor ftp list
monitorroot ftp {
interval 10
timeout 31
dest *:*
debug ""
get ""
mode "passive"
password ""
username ""
}
Assigning Monitor to Nodes
#b node 192.168.230.172 ‘{ ratio 100
monitor testwmi_mon
}’
#b node 10.10.10.10 { monitor gateway_icmp and icmp }
Assign Monitor to Pool & member
 Assigning Monitor to Pool
#b pool bluecoat_pool { monitor all tcp }
#b pool bsd01_pool { monitor all bsd_mon }
 Assigning Monitor to Pool member
#b pool lab_Pool '{
member 10.101.23.55:80 monitor tcp
member 10.101.23.56:80 monitor http
}‘
Status Icon
 Below are the status Icons
Status: Available
 Example-1  Example-2
Status: Offline
 Example-1  Example-2
Status: Unknown
 Example-1  Example-2
Status: Unavailable
 Example -1  Example -2
Chapter 5
Profile
Profile Concept
Profile Configuration
Profile Concept
 Contain settings that instruct how to pass the traffic
through virtual server
 Why any one want to change default traffic processing
behavior of virtual server ?
 Are profile overrides the load balancing property ?
 How does profile help to improve the performance of
actual servers ?
Profile Example
 Persistence  SSL Termination
Profile Example
 FTP
Profile Dependencies
-Some of the profiles are dependent on others
-Some can’t be combine in one VS
Types of profile
 Services Profiles:
-HTTP, FTP, RSTP, SIP, iSession
 Persistence Profiles
-cookie, dest_addr, source_addr, hash….
 Protocol Profiles
-tcp, udp, fastL4…
 SSl Profiles
-client, server
 Authentications Profiles
-RADIUS servers, CRLDP servers…
 Other Profiles
-OneConnect, NTLM, stream
Profile Configuration Concepts
 Default Profiles – Tamplates
-Stored in /config/profile_base.conf
-Can’t be deleted
 Custom Profiles
-Stored in /config/bigip.conf
-Created from default profile
-Dynamic child & parent relationship
Services Profiles
 Parent HTTP profiles
profile http http {
basic auth realm none
oneconnect transformations enable
compress disable
compress uri include none
compress uri exclude none
compress prefer gzip
compress min size 1024
compress buffer size 4096
compress vary header enable
.
.
.
ramcache max age 3600
ramcache min object size 500
ramcache max object size 50000
ramcache uri exclude none
ramcache uri include none
ramcache uri pinned none
ramcache ignore client cache control all
ramcache aging rate 9
ramcache insert age header enable
}
 Custom HTTP profile
#b profile http pan_http_profile ‘{
defaults from http_master
header insert "X-SSL: True"
fallback "http://foo.com/f.asp?u=[HTTP::host]"
}’
#b profile http help ---for more option
Chapter 6
Persistence
Persistence profile
Source Address Persistence
Cookie Persistence
Concept
 What is the need of Persistence ?
 Persistence profile is required to achieve to change
the load balancing behavior of virtual server
 Upon the initial connection:
-Big-IP store session data in persistence record
 Persistence Record store
-client characteristics
-Pool member information which is serving request
 Big-IP use persistence record to serve the next
traffic
Source Address Persistence
-Support both TCP & UDP protocol
-By Default Big-IP create persistence for host
source_addr Persistence configuration
 Parent Profile:
profile persist source_addr {
mode source addr
mirror disable
timeout 180
mask none
map proxies enable
rule none
}
 Custom Profile
#b profile persist pan_subnet ‘{ mode source addr mask
255.255.255.0 }’
Cookie Persistence
 Why cookie Persistence ?
 Modes:
>Insert Mode
-LTM insert special cookie in HTTP response
-Pool name & Pool Member (encoded)
>Rewrite Mode
-Web server Creates a “blank” cookie
-LTM Rewrites to make Special Cookie
>Passive Mode
-Web server Creates Special Cookie
-LTM Passively lets it through
Cookie Insert Mode
Cookie Rewrite Mode
Cookie Passive Mode
Configuring Cookie persistence
 Custom Profile
#b profile persist pan_cookie { mode cookie cookie mode rewrite cookie
name paa }
 Parent Profile:
profile persist cookie {
mode cookie
mirror disable
timeout immediate
cookie mode insert
cookie name none
cookie expiration 0d 00:00:00
cookie hash offset 0
cookie hash length 0
rule none
}
Chapter 7
Processing SSL Traffic
Exploring SSL on Big-IP
Configuring Big-IP for SSL
Review of SSL Concepts
 Establish an encrypted link between a Web server &
browser by using SSL protocol
 This encryption uses PKI
 Encrypting & decrypting SSL is impact the server
performance
 Packet processing time can increase 20 to 30 times
 Use of SSL Accelerator Cards
Advantage of SSL Termination
 Allow iRules processing and cookie persistence
 Offload SSL traffic from web server
 SSL key exchange and bulk encryption dane by
hardware
 Centralize certificate management
Traffic Flow: Client SSL
Traffic Flow: Server SSL
SSL Acceleration
Enabling Client SSL Profile
Configuring Client SSL Profile
 Configuring clientssl profile :
#b profile clientssl pan.com_ssl {
defaults from clientssl
key “www.pan.com.key"
cert “www.pan.com.crt"
chain “ca-intermediate.crt"
}
 Associating the clientssl profile to virtual server
#b virtual pan.com_https { profile pan.com_ssl }
Configuring Server SSL Profile
 Configuring Serverssl profile :
#b profile serverssl pan.com_ssl ‘{
defaults from serverssl"
 Associating the clientssl profile to virtual server
#b virtual pan.com_https { profile pan.com_ssl }
Chapter 8
Nat & SNAT
NAT Concepts and Configuration
SNAT Concepts and Configuration
Nat Concepts
 One to One mapping
 Bi-directional traffic
 Dedicated IP Address
 Can’t Configure port
Configuring NAT
#b nat 172.16.20.1 to 207.10.1.101
#b nat 172.17.20.3 to 207.10.1.103
#b nat list
#b nat show
SNAT Concept
 “Secure” NAT
 Performs Source Nat
 Many to one mapping
 Traffic initiated to SNAT
Address refused
 SNAT’s used for
Routing problem
SNAT Configuration
#b snat pan { origin any translation 4.2.2.2 }
# b snat pan ‘{ origin any translation 4.2.2.2 vlan
clau_vlan enable }’
#b snatpool pan_spool ‘{ member 3.2.2.2 member
3.2.2.3 }’
#b snat pan ‘{ origin 172.16.16.0 mask
255.255.255.0 snatpool pan_spool }’
Chapter 10
Virtual
Virtual
 Big-IP is default deny device, so listener (virtual) is
must
 Virtual server gules everything together
 Virtual are first point of call for traffic
Types of VIP
 Standard
 Most common type of VIP for general purpose load balancing
 Can make use of all functions including iRules, WebAccelerator, ASM etc
 Forwarding (Layer 2)
 Generally used when LTM is configured in a bridge mode (VLAN Groups)
 Essentially just forwards packets at Layer 2
 Forwarding (IP)
 Used when LTM needs to forward or route packets
 Can either just route them based on it’s IP routing table of load balance
multiple routers/firewalls etc
 Performance (HTTP)
 Used for very simple, very fast HTTP load balancing
 Loose a number of features (see next slide)
 Performance (Layer 4)
 Used for general purpose fast load balancing of packets using the PVA ASIC
 Loose a number of features depending on PVA Acceleration mode (see next
few slides)
Configuration of virtual
>Forwarding (IP)
#b virtual forward_vip { destination any:any ip forward }
>Forwarding (Layer 2)
#b virtual forward_vip { destination any:any l2 forward }
>Standard
b virtual accel_vip ‘{
destination 10.118.10.12:https
ip protocol tcp
profile http_profile oneconnect_master www.foo.com tcp
persist simple_1800_profile
pool https_pool
}’
Chapter 11
iRule
What is an iRule?
 An iRule is a TCL script to give more control over
how traffic is processed via the LTM
 Can do this based on just about anything found
in a packet, including client IP address, headers,
URI, destination port, etc.
 The use of the Universal Inspection Engine (UIE)
is also done via iRules, allowing for rule based
persistence
What can an iRule work with?
 Most commonly seen are HTTP events
 Can also work with other protocols, such as SIP,
RTSP, XML, others
 Can make adjustments to TCP behavior, such as
MSS, checking the RTT, looking into the payload
 Can work with authentication or encryption, via
x509 commands, and AES encryption/decryption
 Cache, compression, profiles are also available
Example iRules
Change server headers
when HTTP_RESPONSE {
HTTP::header replace Server "Microsoft-IIS/5.1"
}
Remove all server headers
when HTTP_RESPONSE {
HTTP::header sanitize ?ETag? ?Header01? ?Header02?
}
On 404 error, re-load balance
when HTTP_REQUEST {
set RequestedPage [HTTP::uri]
}
when HTTP_RESPONSE {
if { [HTTP::status] eq "404" } {
log "Dooh, page '$RequestedPage' not found on server
[IP::server_addr]!"
HTTP::redirect $RequestedPage
}
}
More Samples… (from CodeShare)
iRule Logging (really handy!)
 You can turn on logging for any iRule and record anything
you like from requests or responses!
 Often used when troubleshooting an iRule
 Simply add the line “log xxx” (where “xxx” is anything you
like) to any iRule, for example:
when HTTP_REQUEST {
log "Client [IP::remote_addr] has requested page
[HTTP::uri] from server [HTTP::host]."
}
 You can use the CLI command “tail –f /var/log/ltm” to view
these logs in real time
Troubleshooting Section
 File System Overview and Vi
 UCS file extracting
 Qkview
 Look at the Statistics!
 CLI Tools
 Logs
 Running TCPDUMP and SSLDUMP
 PXE booting tips
File System Overview
 Main VIP, Pool and iRule config is stored in:
/config/bigip.conf
 Main IP and VLAN settings are stored in:
/config/bigip_base.conf
 BIG-IP license file is stored in:
/config/bigip.license
 Log files are stored in:
/var/log/
 Archived configs are stored in:
/var/local/ucs/
Tools/Commands to help
 Change directory: cd
 Print working directory: pwd
 List directory contents: ls
 View file: more <filename>
 Edit file: vi <filename>
 Copy file: cp <source> <dest>
 Delete file: rm <filename>
Useful “vi” commands
 “i” to start inserting text where the cursor is
 “A” to start inserting text at the end of the line
 “Esc” exits the editing mode
 “dd” delete entire line
 “x” delete single character
 “Esc” then “:” then “w” to write the file
 “Esc” then “:” then “q” to quit vi
 “/” starts a search through the file
Note: “:wq” would write the file and quit in one go
Note: “:w!” would write the file even if read-only file
Note: “:q!” would force vi to quit
UCS file extracting
 UCS files are simply “.tar.gz” files with a number of
configuration files inside
 Rename the file with a “.tar.gz” extension and use
WinRAR to extract the file
 Note that a UCS file contains both the “root” password
and license key for that unit – don’t put it on another
box unless you have a backup!
“Qkview”
 Support will often request these
 Can be executed from the GUI or CLI
 Contains box configuration, route information,
statistics etc
Logs
 Logs can often highlight problems
 Can be viewed from the GUI
 Can be downloaded from the directory
“/var/log”
 Useful command to watch the LTM log file in
real time from the CLI:
tail –f /var/log/ltm
CLI Tools
 “bigtop” – utility for a quick look at how the BIG-IP
is functioning. Provides statistics and information
on traffic flow, node operations and
troubleshooting (“bigtop –delay 2” useful)
Running TCPDUMP
 TCPDUMP is an inbuilt network sniffer
 To run TCPDUMP from the CLI and save the output to a file
that can be opened in Ethereal/Wireshark use the following
command:
tcpdump -ni <VLAN> -v -s 1600 -w /var/tmp/filename.dmp
Example:
tcpdump -ni external -v -s 1600 -w /var/tmp/external.dmp
 TIP: Use WinSCP to copy the file from the BIG-IP to your PC
 TCPDUMP can be run from the GUI also
Running SSLDUMP
 SSLDUMP is a utility available on the BIG-IP that can be used
to decode your SSL sessions by pre-loading your SSL keys
and using those to convert the session data into ASCII text.
 SSLDUMP takes a raw TCPDUMP file as input
 To display the handshake only
 ssldump –r <capture file>
 To display the actual application data (with the key file)
 ssldump –r <capture file> -k <key file> -d
 Example:
ssldump -r /var/tmp/internal.dmp -k
/config/ssl/ssl.key/default.key -d > /var/tmp/ssldump.dmp
 Documentation for ssldump can be found on
www.rtfm.com/ssldump/ssldump.html
Useful links… F5 related
 Compression Test
 http://www.f5demo.com/compression
 Devcentral (iRules, iControl, SDK)
 http://devcentral.f5.com
 Software Downloads
 http://downloads.f5.com
 Askf5 (manuals, software, solutions, EOL info)
 http://www.askf5.com
Chapter 12
Redundant Pair
Redundant pair Concept
Redundant Pair Setup
Config. Synchronization
Concept..
 When is high Availability is required ?
Increases Reliability
It consist of two identically configured Big-IP
system
 There are two basic aspect:
Synchronizing configurations between two BIG-IP
units
Configuring fail-safe settings for the VLANs
Big-ip Individual System Settings
Big-IP LTM System -1
Hostname:- bigip1.cw.com
Admin Password:- XXXXX
Unit ID:- 1
Internal VLAN
-Self: 172.16.1.31
-Float : 172.16.1.33
-Peer : 172.16.1.32
Big-IP LTM System -2
Hostname:- bigip2.cw.com
Admin Password:- XXXXX
Unit ID:- 2
Internal VLAN
-Self: 172.16.1.32
-Float : 172.16.1.33
-Peer : 172.16.1.31
 Unit ID used for Identification, do not designate
primary and secondary
 Floating IP is always own by Active box
Failing Over
>Gratuitous ARP sent to all neighboring network devices
Synchronize Configuration
 Initiated from Either System
 Redundant pair should service the same monitors,
pools & virtual Servers
Synchronization condition
 Administrative password must be same on each
system
 Port 443 must not be blocked by the port lockdown
setting or by another system between the
redundant pair.
 Clock of the system must be within a certain
number of minutes of each other.
 Pull or Push Operation –Sync in Correct Direction
Synchronization Process
1-Create UCS file.
-Which contain all configurations + licensing information
2-Send to peer
3-Peer creates backup of itself
4-Peer opens UCS file
a) Matching Hostname > Full Installation
b) Different Hostname >Shared Installation
Synchronize to Peer
# bigpipe config sync pull
# bigpipe config sync all
Determine Active System
Change to Standby Mode
Chapter 13
High Availability
Failover Trigger
Failover Detection
Stateful Failover
MAC Masquerading
Failover Managers
 Failover Mangers detects a failed process,
 takes one of the several action restarting the
process, failing back to the standby, reboot the big-
ip
 Watchdog
Performs hardware health checks
 Overdog
Software to correct hardware failures
 SOD
monitors the switch fabric and takes corrective action for
switch failures
All failover Managers update and monitor the high
Availability Table
High Availability Table
 Update & Monitor by Failover Managers
 Table Fields
-Feature Name
-Action on Failure
-Enabled
-Failed State
 Command Line: b ha table show
HA Table
Failover Trigger
 Processes (Daemons)
 Switchboard
 VLAN Failsafe
 Gateway Failsafe
Failover Triggers - Daemans
VLAN Failsafe
 Detects no network traffic Tries to generate traffic
 Timeout reached Time Action; Standby becomes
active
Gateway Failsafe
Hardware Failover
 Standby notices a loss of voltage, it Takes over the
active role
Network Failover
 Heartbeat sent over network
 No 50 foot (15.24 meter) limitation
 Slower than Hardware Failover
 Setting not synchronized between peers
 If Both Hardware Failover & Network Failover are being
used…..
Network Failover Settings
Network Communication
Stateful Failover
Types of Mirroring
Failover without MAC Masquerading
MAC Masquerading
MAC Masquerading
Thanks

More Related Content

What's hot

CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101Rohan Reddy
 
10 step-to-configure-cisco-call-manager-express
10 step-to-configure-cisco-call-manager-express10 step-to-configure-cisco-call-manager-express
10 step-to-configure-cisco-call-manager-expressNguyen Thanh
 
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall conceptsMostafa El Lathy
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices Lior Rotkovitch
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA FirepowerAnwesh Dixit
 
DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec APNIC
 
WAN SDN meet Segment Routing
WAN SDN meet Segment RoutingWAN SDN meet Segment Routing
WAN SDN meet Segment RoutingAPNIC
 
Nessus Software
Nessus SoftwareNessus Software
Nessus SoftwareMegha Sahu
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web securityxKinAnx
 
Fortinet
FortinetFortinet
FortinetABEP123
 
F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!Niasta Learning
 
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma AccessHaris Chughtai
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id conceptsMostafa El Lathy
 

What's hot (20)

CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
10 step-to-configure-cisco-call-manager-express
10 step-to-configure-cisco-call-manager-express10 step-to-configure-cisco-call-manager-express
10 step-to-configure-cisco-call-manager-express
 
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall concepts
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec
 
Ethernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider NeedsEthernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider Needs
 
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP DeploymentEMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
 
4 palo alto licenses
4 palo alto licenses4 palo alto licenses
4 palo alto licenses
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
WAN SDN meet Segment Routing
WAN SDN meet Segment RoutingWAN SDN meet Segment Routing
WAN SDN meet Segment Routing
 
EVPN Introduction
EVPN IntroductionEVPN Introduction
EVPN Introduction
 
Nessus Software
Nessus SoftwareNessus Software
Nessus Software
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web security
 
Fortinet
FortinetFortinet
Fortinet
 
F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!
 
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma Access
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
 
Aruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep DiveAruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep Dive
 

Viewers also liked

F5 study guide
F5 study guideF5 study guide
F5 study guideshimera123
 
F5 BIG-IP Web-based Customer Training
F5 BIG-IP Web-based Customer TrainingF5 BIG-IP Web-based Customer Training
F5 BIG-IP Web-based Customer TrainingF5 Networks
 
F5 Networks BIG-IP LTM Virtual Edition
F5 Networks BIG-IP LTM Virtual EditionF5 Networks BIG-IP LTM Virtual Edition
F5 Networks BIG-IP LTM Virtual EditionDSorensenCPR
 
All 50 Ways to Use BIG-IP
All 50 Ways to Use BIG-IP All 50 Ways to Use BIG-IP
All 50 Ways to Use BIG-IP F5 Networks
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks
 
F5 Solutions for Service Providers
F5 Solutions for Service ProvidersF5 Solutions for Service Providers
F5 Solutions for Service ProvidersBAKOTECH
 
Ocs F5 Bigip Bestpractices
Ocs F5 Bigip BestpracticesOcs F5 Bigip Bestpractices
Ocs F5 Bigip BestpracticesThiago Gutierri
 
Cisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterCisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterF5NetworksAPJ
 
Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesF5 Networks
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitecturePeter Silva
 
Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5Shashi Kiran
 
BIG-IP Edge Gateway
BIG-IP Edge GatewayBIG-IP Edge Gateway
BIG-IP Edge GatewayDSorensenCPR
 
Chapter 2 Networking
Chapter 2 NetworkingChapter 2 Networking
Chapter 2 Networkingmlrbrown
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 Networks
 
VIPRION 2400 and vCMP
VIPRION 2400 and vCMPVIPRION 2400 and vCMP
VIPRION 2400 and vCMPF5 Networks
 
仮想ロードバランサ最前線: 性能も柔軟さも。ソフトウェア生まれだから実現できること
仮想ロードバランサ最前線: 性能も柔軟さも。ソフトウェア生まれだから実現できること仮想ロードバランサ最前線: 性能も柔軟さも。ソフトウェア生まれだから実現できること
仮想ロードバランサ最前線: 性能も柔軟さも。ソフトウェア生まれだから実現できることBrocade
 
Partie II – ASM Application Security Manager
Partie II – ASM Application Security ManagerPartie II – ASM Application Security Manager
Partie II – ASM Application Security Managere-Xpert Solutions SA
 
HTTP by Hand: Exploring HTTP/1.0, 1.1 and 2.0
HTTP by Hand: Exploring HTTP/1.0, 1.1 and 2.0HTTP by Hand: Exploring HTTP/1.0, 1.1 and 2.0
HTTP by Hand: Exploring HTTP/1.0, 1.1 and 2.0Cory Forsyth
 

Viewers also liked (20)

F5 study guide
F5 study guideF5 study guide
F5 study guide
 
F5 BIG-IP Web-based Customer Training
F5 BIG-IP Web-based Customer TrainingF5 BIG-IP Web-based Customer Training
F5 BIG-IP Web-based Customer Training
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
 
F5 Networks BIG-IP LTM Virtual Edition
F5 Networks BIG-IP LTM Virtual EditionF5 Networks BIG-IP LTM Virtual Edition
F5 Networks BIG-IP LTM Virtual Edition
 
All 50 Ways to Use BIG-IP
All 50 Ways to Use BIG-IP All 50 Ways to Use BIG-IP
All 50 Ways to Use BIG-IP
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
Configuration F5 BIG IP ASM v12
Configuration F5 BIG IP ASM v12Configuration F5 BIG IP ASM v12
Configuration F5 BIG IP ASM v12
 
F5 Solutions for Service Providers
F5 Solutions for Service ProvidersF5 Solutions for Service Providers
F5 Solutions for Service Providers
 
Ocs F5 Bigip Bestpractices
Ocs F5 Bigip BestpracticesOcs F5 Bigip Bestpractices
Ocs F5 Bigip Bestpractices
 
Cisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterCisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data Center
 
Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5
 
BIG-IP Edge Gateway
BIG-IP Edge GatewayBIG-IP Edge Gateway
BIG-IP Edge Gateway
 
Chapter 2 Networking
Chapter 2 NetworkingChapter 2 Networking
Chapter 2 Networking
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
 
VIPRION 2400 and vCMP
VIPRION 2400 and vCMPVIPRION 2400 and vCMP
VIPRION 2400 and vCMP
 
仮想ロードバランサ最前線: 性能も柔軟さも。ソフトウェア生まれだから実現できること
仮想ロードバランサ最前線: 性能も柔軟さも。ソフトウェア生まれだから実現できること仮想ロードバランサ最前線: 性能も柔軟さも。ソフトウェア生まれだから実現できること
仮想ロードバランサ最前線: 性能も柔軟さも。ソフトウェア生まれだから実現できること
 
Partie II – ASM Application Security Manager
Partie II – ASM Application Security ManagerPartie II – ASM Application Security Manager
Partie II – ASM Application Security Manager
 
HTTP by Hand: Exploring HTTP/1.0, 1.1 and 2.0
HTTP by Hand: Exploring HTTP/1.0, 1.1 and 2.0HTTP by Hand: Exploring HTTP/1.0, 1.1 and 2.0
HTTP by Hand: Exploring HTTP/1.0, 1.1 and 2.0
 

Similar to LTM essentials

(NET404) Making Every Packet Count
(NET404) Making Every Packet Count(NET404) Making Every Packet Count
(NET404) Making Every Packet CountAmazon Web Services
 
Sharing-Knowledge-OAM-3G-Ericsson .ppt
Sharing-Knowledge-OAM-3G-Ericsson   .pptSharing-Knowledge-OAM-3G-Ericsson   .ppt
Sharing-Knowledge-OAM-3G-Ericsson .pptwafawafa52
 
KubeCon EU 2016: Creating an Advanced Load Balancing Solution for Kubernetes ...
KubeCon EU 2016: Creating an Advanced Load Balancing Solution for Kubernetes ...KubeCon EU 2016: Creating an Advanced Load Balancing Solution for Kubernetes ...
KubeCon EU 2016: Creating an Advanced Load Balancing Solution for Kubernetes ...KubeAcademy
 
AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)Amazon Web Services
 
Implementation of DNS Anycast - a case study
Implementation of DNS Anycast - a case studyImplementation of DNS Anycast - a case study
Implementation of DNS Anycast - a case studyA. S. M. Shamim Reza
 
Sharing your-internet-connection-on-linux
Sharing your-internet-connection-on-linuxSharing your-internet-connection-on-linux
Sharing your-internet-connection-on-linuxjasembo
 
Docker Networking Deep Dive
Docker Networking Deep DiveDocker Networking Deep Dive
Docker Networking Deep DiveDocker, Inc.
 
Docker 1.12 networking deep dive
Docker 1.12 networking deep diveDocker 1.12 networking deep dive
Docker 1.12 networking deep diveMadhu Venugopal
 
Go with the Flow-v2
Go with the Flow-v2Go with the Flow-v2
Go with the Flow-v2Zobair Khan
 
[Advantech] ADAM-3600 open vpn setting Tutorial step by step
[Advantech] ADAM-3600 open vpn setting Tutorial step by step [Advantech] ADAM-3600 open vpn setting Tutorial step by step
[Advantech] ADAM-3600 open vpn setting Tutorial step by step Ming-Hung Hseih
 
Free NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings rightFree NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings rightManageEngine, Zoho Corporation
 
Microservice bus tutorial
Microservice bus tutorialMicroservice bus tutorial
Microservice bus tutorialHuabing Zhao
 
Hp0 y39 question answers
Hp0 y39 question answersHp0 y39 question answers
Hp0 y39 question answersMarcoMCervantes
 
INFA 620Laboratory 4 Configuring a FirewallIn this exercise.docx
INFA 620Laboratory 4 Configuring a FirewallIn this exercise.docxINFA 620Laboratory 4 Configuring a FirewallIn this exercise.docx
INFA 620Laboratory 4 Configuring a FirewallIn this exercise.docxcarliotwaycave
 
Load Balancing 101
Load Balancing 101Load Balancing 101
Load Balancing 101HungWei Chiu
 

Similar to LTM essentials (20)

(NET404) Making Every Packet Count
(NET404) Making Every Packet Count(NET404) Making Every Packet Count
(NET404) Making Every Packet Count
 
Sharing-Knowledge-OAM-3G-Ericsson .ppt
Sharing-Knowledge-OAM-3G-Ericsson   .pptSharing-Knowledge-OAM-3G-Ericsson   .ppt
Sharing-Knowledge-OAM-3G-Ericsson .ppt
 
KubeCon EU 2016: Creating an Advanced Load Balancing Solution for Kubernetes ...
KubeCon EU 2016: Creating an Advanced Load Balancing Solution for Kubernetes ...KubeCon EU 2016: Creating an Advanced Load Balancing Solution for Kubernetes ...
KubeCon EU 2016: Creating an Advanced Load Balancing Solution for Kubernetes ...
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
 
Network Security Best Practice (BCP38 & 140)
Network Security Best Practice (BCP38 & 140) Network Security Best Practice (BCP38 & 140)
Network Security Best Practice (BCP38 & 140)
 
AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)
 
Implementation of DNS Anycast - a case study
Implementation of DNS Anycast - a case studyImplementation of DNS Anycast - a case study
Implementation of DNS Anycast - a case study
 
Sharing your-internet-connection-on-linux
Sharing your-internet-connection-on-linuxSharing your-internet-connection-on-linux
Sharing your-internet-connection-on-linux
 
Docker Networking Deep Dive
Docker Networking Deep DiveDocker Networking Deep Dive
Docker Networking Deep Dive
 
Docker 1.12 networking deep dive
Docker 1.12 networking deep diveDocker 1.12 networking deep dive
Docker 1.12 networking deep dive
 
Network tips tricks
Network tips tricksNetwork tips tricks
Network tips tricks
 
Go with the Flow-v2
Go with the Flow-v2Go with the Flow-v2
Go with the Flow-v2
 
Go with the Flow
Go with the Flow Go with the Flow
Go with the Flow
 
[Advantech] ADAM-3600 open vpn setting Tutorial step by step
[Advantech] ADAM-3600 open vpn setting Tutorial step by step [Advantech] ADAM-3600 open vpn setting Tutorial step by step
[Advantech] ADAM-3600 open vpn setting Tutorial step by step
 
Basic network training2
Basic network training2Basic network training2
Basic network training2
 
Free NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings rightFree NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings right
 
Microservice bus tutorial
Microservice bus tutorialMicroservice bus tutorial
Microservice bus tutorial
 
Hp0 y39 question answers
Hp0 y39 question answersHp0 y39 question answers
Hp0 y39 question answers
 
INFA 620Laboratory 4 Configuring a FirewallIn this exercise.docx
INFA 620Laboratory 4 Configuring a FirewallIn this exercise.docxINFA 620Laboratory 4 Configuring a FirewallIn this exercise.docx
INFA 620Laboratory 4 Configuring a FirewallIn this exercise.docx
 
Load Balancing 101
Load Balancing 101Load Balancing 101
Load Balancing 101
 

Recently uploaded

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Recently uploaded (20)

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

LTM essentials

  • 1. Chapter 1 Initial Setup Exploring Big-IP Hardware Exploring Big-IP File System Licensing Big-IP Basic Configuration
  • 3. The Hardware OOB Management Port Console Cable Failover Cable USB Port LCD Panel and controls 10/100/1000 Mbps Copper Ports 1000 Mbps Fibre Ports
  • 4. Looking Inside a 3600Big-IP
  • 6. Lights Out Management -Two operating systems -TMM for primary use -AOM/SCCP for lights Out management -Always on Mansgment -Switch card control processing
  • 7. What to do first ?
  • 9. Setup Tools  SSH Client -username:- root -Password:-default  Serial Terminal Client -username:- root -Password:-default  Big-IP Config Script -config  Big-IP Wab-based configuration https://192.168.1.245 -username:- admin -Password:-admin
  • 15. File System  Built on top Linux  Has Linux files structure  Files are relevant to the operation  Main file in BIG-IP LTM are mentioned below: -/coinfig/bigip.conf -/config/bigip_base.conf -/config/BigDB.dat -/etc/hosts.allow -/config/bigip.license -/var/log/ltm
  • 16.  /coinfig/bigip.conf - Holds all information relevant to the load balancing Like: virtual, pool, profile, monitor, irules etc -Shared between 2 units if in a pair configuration  /config/bigip_base.conf -Holds all information relevant to the basic elements of the BigIP Like: management IP, vlans, routes few more things  /etc/hosts.allow -hosts which are allowed to use the local INET services. Such as services are SSH, snmp for the snmp devices
  • 17.  /config/BigDB.dat -bigdb database holds a set of bigdb configuration keys -Keys define the behaviours of various aspects of the BIG-IP system -For example, the bigdb key Failover.Active Mode, when set to enable, causes a redundant system to operate in active-active mode, instead of the default active/standby mode. -We can edit these values by using -The Configuration utility -The bigpipe db command #bigpipe db all list
  • 18.  /config/bigip.license -Holds all information about the license of the BigIP system -Without this file or a valid license file, the BigIP will not operate  There are few more vital files /config/ssl/ssl.crt /config/ssl/ssl.key
  • 19. Management configuration  Giving IP to management port #b mgmt 10.192.230.129 {netmask 255.255.255.0 }  Putting route for management network #b mgmt route 10.216.0.0 netmask 255.255.0.0 ‘{ gateway 10.192.230.145 }’ #b mgmt route 10.12.11.32 netmask 255.255.255.224 ‘{ gateway 10.192.230.145 }’
  • 20. VLAN Configuration vlan external { tag 10 interfaces 1.1 } vlan internal_phy { tag 4093 interfaces 1.2 } vlan internal_virt { tag 4092 interfaces 1.4 }
  • 21. Self IP/Port configuration  Assigning IP address the to vlan #b self 172.31.230.129 ‘{ netmask 255.255.255.0 vlan external allow tcp ssh tcp https tcp 4353 }’ #b self 192.168.230.129 ‘{ netmask 255.255.255.128 vlan internal_virt allow tcp https }’  Opening the Port #b self allow ‘{ default udp snmp tcp ssh tcp domain tcp snmp udp efs tcp 4353 udp domain udp 4353 tcp https proto ospf }’
  • 22. Configuring Floating  This part of configuration is for redundant pair #b self 172.22.100.6 { netmask 255.255.255.0 unit 1 floating enable vlan external allow tcp https } #b self 192.168.100.3 { netmask 255.255.255.0 unit 1 floating enable vlan internal allow default }
  • 24. Pools , Members & Nodes
  • 25. Virtual Server -Big-IP is default deny device, so listener (virtual) is must -Virtual server gules everything together -Typically virtual are associated with pool
  • 26. -Before virtual server can load balance it should mapped to pool -Big-IP translate the destination ip address from virtual server to actual server -Client see the pool servers as single server, hence the term Virtual Server
  • 28. Full Proxy Architecture -Big-IP do much more than translating the network Address -F5 implemented full proxy architecture in Big-IP -Separate tcp connections for the client & the server
  • 29. Chapter 3 Load Balancing Load Balancing Method Member vs Node Priority Group Activation Configuring load balancing
  • 30. Load Balancing Methods -Static method do not take server performance in to consideration -Dynamic method does consider server performance
  • 31. Round Robin -Round Robin is default & most commonly used method -Big-IP evenly distributes client request across all available pool member
  • 32. Ratio -Ratio method is appropriate to use if some of the members are powerful than other. -Since Ratio is static method, this means that server with highest ratio value will receive more request then others even if the performance of the server is slow. #b pool lab_Pool { lb method member/node ratio }
  • 33. Least Connections -This method consider the current connections count to decide where to send next request #b pool lab_Pool { lb method least conn }
  • 34. Least Connections -After connections counts shown below, the big-IP round robin next requests between all three servers.
  • 35. Fastest -Fastest uses the outstanding layer 7 request to decide where to send the next request -Request or Response ? #b pool lab_Pool { lb method fastest }
  • 36. Fastest -Ping response form server doesn’t take into account how fast server will response at port 80. -SYN-ACK response form server at port 80 doesn’t take into account how fast backend database server will populate the content of web page
  • 37. Observed -It is basically Ratio load balancing but with Ratio assigned by Big- IP -Servers with connections lower than average will given ratio of 3 -Servers with connections higher than average will given ratio of 2 #b pool lab_Pool { lb method member observed }
  • 38. Observed >Connections status -server B & C with Ratio 3 -Servers A & D with Ration 2
  • 39. Predictive -Predictive method is similar to Observed, but assigns more aggressive value #b pool lab_Pool { lb method member predictive }
  • 40. Predictive >Connections status -server A & C with Ratio 1 -Servers B & D with Ration 4
  • 41. Pool Member vs. Node  Load Balancing by: >Node -Total service for one IP Address -Take all transactions for the IP address into account #b node <ip_addr> { ratio <no.>/ session <enable/disable>} >Pool Member -IP Address & Service -Take the decision based transactions happening on the service port.
  • 42. Priority Group Activation -Use to designate preferred & backup sets of pool members with in a pool -Once priority group activated -The available member with highest priority will consider first
  • 43. Priority Group Activation -If the number of member falls below the priority group activation set, -The next highest priority member also start serving the requests.
  • 44. Priority Group Activation Configuration example #b pool lab_pool '{ lb_method predictive min_active_members 2 member 10.100.10.10:80 priority 10 member 10.100.10.20:80 priority 10 member 10.100.10.30:80 priority 10 member 10.100.10.30:80 priority 5 member 10.100.10.40:80 priority 5 member 10.100.10.50:80 priority 5 }’
  • 45. Fallback Host -Fallback host feature is designed for HTTP protocol only. -It comes into play if all the members in a pool are unavailable
  • 46. Configuring Load Balancing bigpipe pool <pool_name> { lb method <method_name> } (rr | node ratio | member ratio | member least conn | member observed | member predictive | fastest | least conn | predictive | observed | dynamic ratio | fastest app resp)
  • 47. Chapter 4 Monitor Monitor Functionality Monitor Types Configuring Monitor Assigning Monitor Status
  • 48. Intro to monitor  Big-IP system can monitor the health of nodes & member  Monitor is the test that Big-IP performed -simple test -Highly interactive test  The result of these test will define the status of respective node or member is available  Big-IP perform continues monitoring irrespective of the status of node or member
  • 49. Step to set-up a monitor Step 1: Create Step 2: Name & Type -name the new monitor select the type from system templates Step 3: Customize Step 4: Assign - to pool/node/pool member Step 5: Status
  • 50. Types of monitoring  Address Check -IP address –node  Service Check -IP:port  Content Check -IP:port & check data returned  Interactive Check -Interactive with servers -Multiple commands and multiple response
  • 52. Example  System #b monitor icmp list monitorroot icmp { interval 5 timeout 16 dest * }  Custom #b monitor icmp_mon list monitor icmp_mon { defaults from icmp interval 7 timeout 22 }
  • 53. Service Check -Service checks only test whether server is listening to respective port. -Doesn’t provide any insight into quality of the content that might return
  • 54. Example  System #b monitor tcp list monitorroot tcp { interval 5 timeout 16 dest *:* recv "" send "" }  Custom #b monitor tcp_port_mon list monitor tcp_port_mon { defaults from tcp interval 15 timeout 47 }
  • 55. Content Check -Content check go beyond testing whether a node is responding/listening -It also test if it is responding with correct content
  • 56. Example System: #b monitor http list monitorroot http { interval 5 timeout 16 dest *:* password "" recv "" send "GET /" username "" } Custom: #b monitor http_mon list monitor http_mon { defaults from http recv "Health Check" send "GET /health_check.html HTTP/1.0nn" }
  • 58. Example #b monitor ftp list monitorroot ftp { interval 10 timeout 31 dest *:* debug "" get "" mode "passive" password "" username "" }
  • 59. Assigning Monitor to Nodes #b node 192.168.230.172 ‘{ ratio 100 monitor testwmi_mon }’ #b node 10.10.10.10 { monitor gateway_icmp and icmp }
  • 60. Assign Monitor to Pool & member  Assigning Monitor to Pool #b pool bluecoat_pool { monitor all tcp } #b pool bsd01_pool { monitor all bsd_mon }  Assigning Monitor to Pool member #b pool lab_Pool '{ member 10.101.23.55:80 monitor tcp member 10.101.23.56:80 monitor http }‘
  • 61. Status Icon  Below are the status Icons
  • 65. Status: Unavailable  Example -1  Example -2
  • 67. Profile Concept  Contain settings that instruct how to pass the traffic through virtual server  Why any one want to change default traffic processing behavior of virtual server ?  Are profile overrides the load balancing property ?  How does profile help to improve the performance of actual servers ?
  • 68. Profile Example  Persistence  SSL Termination
  • 70. Profile Dependencies -Some of the profiles are dependent on others -Some can’t be combine in one VS
  • 71. Types of profile  Services Profiles: -HTTP, FTP, RSTP, SIP, iSession  Persistence Profiles -cookie, dest_addr, source_addr, hash….  Protocol Profiles -tcp, udp, fastL4…  SSl Profiles -client, server  Authentications Profiles -RADIUS servers, CRLDP servers…  Other Profiles -OneConnect, NTLM, stream
  • 72. Profile Configuration Concepts  Default Profiles – Tamplates -Stored in /config/profile_base.conf -Can’t be deleted  Custom Profiles -Stored in /config/bigip.conf -Created from default profile -Dynamic child & parent relationship
  • 73. Services Profiles  Parent HTTP profiles profile http http { basic auth realm none oneconnect transformations enable compress disable compress uri include none compress uri exclude none compress prefer gzip compress min size 1024 compress buffer size 4096 compress vary header enable . . . ramcache max age 3600 ramcache min object size 500 ramcache max object size 50000 ramcache uri exclude none ramcache uri include none ramcache uri pinned none ramcache ignore client cache control all ramcache aging rate 9 ramcache insert age header enable }  Custom HTTP profile #b profile http pan_http_profile ‘{ defaults from http_master header insert "X-SSL: True" fallback "http://foo.com/f.asp?u=[HTTP::host]" }’ #b profile http help ---for more option
  • 74. Chapter 6 Persistence Persistence profile Source Address Persistence Cookie Persistence
  • 75. Concept  What is the need of Persistence ?  Persistence profile is required to achieve to change the load balancing behavior of virtual server  Upon the initial connection: -Big-IP store session data in persistence record  Persistence Record store -client characteristics -Pool member information which is serving request  Big-IP use persistence record to serve the next traffic
  • 76. Source Address Persistence -Support both TCP & UDP protocol -By Default Big-IP create persistence for host
  • 77. source_addr Persistence configuration  Parent Profile: profile persist source_addr { mode source addr mirror disable timeout 180 mask none map proxies enable rule none }  Custom Profile #b profile persist pan_subnet ‘{ mode source addr mask 255.255.255.0 }’
  • 78. Cookie Persistence  Why cookie Persistence ?  Modes: >Insert Mode -LTM insert special cookie in HTTP response -Pool name & Pool Member (encoded) >Rewrite Mode -Web server Creates a “blank” cookie -LTM Rewrites to make Special Cookie >Passive Mode -Web server Creates Special Cookie -LTM Passively lets it through
  • 82. Configuring Cookie persistence  Custom Profile #b profile persist pan_cookie { mode cookie cookie mode rewrite cookie name paa }  Parent Profile: profile persist cookie { mode cookie mirror disable timeout immediate cookie mode insert cookie name none cookie expiration 0d 00:00:00 cookie hash offset 0 cookie hash length 0 rule none }
  • 83. Chapter 7 Processing SSL Traffic Exploring SSL on Big-IP Configuring Big-IP for SSL
  • 84. Review of SSL Concepts  Establish an encrypted link between a Web server & browser by using SSL protocol  This encryption uses PKI  Encrypting & decrypting SSL is impact the server performance  Packet processing time can increase 20 to 30 times  Use of SSL Accelerator Cards
  • 85. Advantage of SSL Termination  Allow iRules processing and cookie persistence  Offload SSL traffic from web server  SSL key exchange and bulk encryption dane by hardware  Centralize certificate management
  • 90. Configuring Client SSL Profile  Configuring clientssl profile : #b profile clientssl pan.com_ssl { defaults from clientssl key “www.pan.com.key" cert “www.pan.com.crt" chain “ca-intermediate.crt" }  Associating the clientssl profile to virtual server #b virtual pan.com_https { profile pan.com_ssl }
  • 91. Configuring Server SSL Profile  Configuring Serverssl profile : #b profile serverssl pan.com_ssl ‘{ defaults from serverssl"  Associating the clientssl profile to virtual server #b virtual pan.com_https { profile pan.com_ssl }
  • 92. Chapter 8 Nat & SNAT NAT Concepts and Configuration SNAT Concepts and Configuration
  • 93. Nat Concepts  One to One mapping  Bi-directional traffic  Dedicated IP Address  Can’t Configure port
  • 94. Configuring NAT #b nat 172.16.20.1 to 207.10.1.101 #b nat 172.17.20.3 to 207.10.1.103 #b nat list #b nat show
  • 95. SNAT Concept  “Secure” NAT  Performs Source Nat  Many to one mapping  Traffic initiated to SNAT Address refused  SNAT’s used for Routing problem
  • 96. SNAT Configuration #b snat pan { origin any translation 4.2.2.2 } # b snat pan ‘{ origin any translation 4.2.2.2 vlan clau_vlan enable }’ #b snatpool pan_spool ‘{ member 3.2.2.2 member 3.2.2.3 }’ #b snat pan ‘{ origin 172.16.16.0 mask 255.255.255.0 snatpool pan_spool }’
  • 98. Virtual  Big-IP is default deny device, so listener (virtual) is must  Virtual server gules everything together  Virtual are first point of call for traffic
  • 99. Types of VIP  Standard  Most common type of VIP for general purpose load balancing  Can make use of all functions including iRules, WebAccelerator, ASM etc  Forwarding (Layer 2)  Generally used when LTM is configured in a bridge mode (VLAN Groups)  Essentially just forwards packets at Layer 2  Forwarding (IP)  Used when LTM needs to forward or route packets  Can either just route them based on it’s IP routing table of load balance multiple routers/firewalls etc  Performance (HTTP)  Used for very simple, very fast HTTP load balancing  Loose a number of features (see next slide)  Performance (Layer 4)  Used for general purpose fast load balancing of packets using the PVA ASIC  Loose a number of features depending on PVA Acceleration mode (see next few slides)
  • 100. Configuration of virtual >Forwarding (IP) #b virtual forward_vip { destination any:any ip forward } >Forwarding (Layer 2) #b virtual forward_vip { destination any:any l2 forward } >Standard b virtual accel_vip ‘{ destination 10.118.10.12:https ip protocol tcp profile http_profile oneconnect_master www.foo.com tcp persist simple_1800_profile pool https_pool }’
  • 102. What is an iRule?  An iRule is a TCL script to give more control over how traffic is processed via the LTM  Can do this based on just about anything found in a packet, including client IP address, headers, URI, destination port, etc.  The use of the Universal Inspection Engine (UIE) is also done via iRules, allowing for rule based persistence
  • 103. What can an iRule work with?  Most commonly seen are HTTP events  Can also work with other protocols, such as SIP, RTSP, XML, others  Can make adjustments to TCP behavior, such as MSS, checking the RTT, looking into the payload  Can work with authentication or encryption, via x509 commands, and AES encryption/decryption  Cache, compression, profiles are also available
  • 104. Example iRules Change server headers when HTTP_RESPONSE { HTTP::header replace Server "Microsoft-IIS/5.1" } Remove all server headers when HTTP_RESPONSE { HTTP::header sanitize ?ETag? ?Header01? ?Header02? } On 404 error, re-load balance when HTTP_REQUEST { set RequestedPage [HTTP::uri] } when HTTP_RESPONSE { if { [HTTP::status] eq "404" } { log "Dooh, page '$RequestedPage' not found on server [IP::server_addr]!" HTTP::redirect $RequestedPage } }
  • 105. More Samples… (from CodeShare)
  • 106. iRule Logging (really handy!)  You can turn on logging for any iRule and record anything you like from requests or responses!  Often used when troubleshooting an iRule  Simply add the line “log xxx” (where “xxx” is anything you like) to any iRule, for example: when HTTP_REQUEST { log "Client [IP::remote_addr] has requested page [HTTP::uri] from server [HTTP::host]." }  You can use the CLI command “tail –f /var/log/ltm” to view these logs in real time
  • 107. Troubleshooting Section  File System Overview and Vi  UCS file extracting  Qkview  Look at the Statistics!  CLI Tools  Logs  Running TCPDUMP and SSLDUMP  PXE booting tips
  • 108. File System Overview  Main VIP, Pool and iRule config is stored in: /config/bigip.conf  Main IP and VLAN settings are stored in: /config/bigip_base.conf  BIG-IP license file is stored in: /config/bigip.license  Log files are stored in: /var/log/  Archived configs are stored in: /var/local/ucs/
  • 109. Tools/Commands to help  Change directory: cd  Print working directory: pwd  List directory contents: ls  View file: more <filename>  Edit file: vi <filename>  Copy file: cp <source> <dest>  Delete file: rm <filename>
  • 110. Useful “vi” commands  “i” to start inserting text where the cursor is  “A” to start inserting text at the end of the line  “Esc” exits the editing mode  “dd” delete entire line  “x” delete single character  “Esc” then “:” then “w” to write the file  “Esc” then “:” then “q” to quit vi  “/” starts a search through the file Note: “:wq” would write the file and quit in one go Note: “:w!” would write the file even if read-only file Note: “:q!” would force vi to quit
  • 111. UCS file extracting  UCS files are simply “.tar.gz” files with a number of configuration files inside  Rename the file with a “.tar.gz” extension and use WinRAR to extract the file  Note that a UCS file contains both the “root” password and license key for that unit – don’t put it on another box unless you have a backup!
  • 112. “Qkview”  Support will often request these  Can be executed from the GUI or CLI  Contains box configuration, route information, statistics etc
  • 113. Logs  Logs can often highlight problems  Can be viewed from the GUI  Can be downloaded from the directory “/var/log”  Useful command to watch the LTM log file in real time from the CLI: tail –f /var/log/ltm
  • 114. CLI Tools  “bigtop” – utility for a quick look at how the BIG-IP is functioning. Provides statistics and information on traffic flow, node operations and troubleshooting (“bigtop –delay 2” useful)
  • 115. Running TCPDUMP  TCPDUMP is an inbuilt network sniffer  To run TCPDUMP from the CLI and save the output to a file that can be opened in Ethereal/Wireshark use the following command: tcpdump -ni <VLAN> -v -s 1600 -w /var/tmp/filename.dmp Example: tcpdump -ni external -v -s 1600 -w /var/tmp/external.dmp  TIP: Use WinSCP to copy the file from the BIG-IP to your PC  TCPDUMP can be run from the GUI also
  • 116. Running SSLDUMP  SSLDUMP is a utility available on the BIG-IP that can be used to decode your SSL sessions by pre-loading your SSL keys and using those to convert the session data into ASCII text.  SSLDUMP takes a raw TCPDUMP file as input  To display the handshake only  ssldump –r <capture file>  To display the actual application data (with the key file)  ssldump –r <capture file> -k <key file> -d  Example: ssldump -r /var/tmp/internal.dmp -k /config/ssl/ssl.key/default.key -d > /var/tmp/ssldump.dmp  Documentation for ssldump can be found on www.rtfm.com/ssldump/ssldump.html
  • 117. Useful links… F5 related  Compression Test  http://www.f5demo.com/compression  Devcentral (iRules, iControl, SDK)  http://devcentral.f5.com  Software Downloads  http://downloads.f5.com  Askf5 (manuals, software, solutions, EOL info)  http://www.askf5.com
  • 118. Chapter 12 Redundant Pair Redundant pair Concept Redundant Pair Setup Config. Synchronization
  • 119. Concept..  When is high Availability is required ? Increases Reliability It consist of two identically configured Big-IP system  There are two basic aspect: Synchronizing configurations between two BIG-IP units Configuring fail-safe settings for the VLANs
  • 120.
  • 121. Big-ip Individual System Settings Big-IP LTM System -1 Hostname:- bigip1.cw.com Admin Password:- XXXXX Unit ID:- 1 Internal VLAN -Self: 172.16.1.31 -Float : 172.16.1.33 -Peer : 172.16.1.32 Big-IP LTM System -2 Hostname:- bigip2.cw.com Admin Password:- XXXXX Unit ID:- 2 Internal VLAN -Self: 172.16.1.32 -Float : 172.16.1.33 -Peer : 172.16.1.31
  • 122.  Unit ID used for Identification, do not designate primary and secondary
  • 123.  Floating IP is always own by Active box
  • 124. Failing Over >Gratuitous ARP sent to all neighboring network devices
  • 125.
  • 126. Synchronize Configuration  Initiated from Either System  Redundant pair should service the same monitors, pools & virtual Servers
  • 127. Synchronization condition  Administrative password must be same on each system  Port 443 must not be blocked by the port lockdown setting or by another system between the redundant pair.  Clock of the system must be within a certain number of minutes of each other.  Pull or Push Operation –Sync in Correct Direction
  • 128. Synchronization Process 1-Create UCS file. -Which contain all configurations + licensing information 2-Send to peer 3-Peer creates backup of itself 4-Peer opens UCS file a) Matching Hostname > Full Installation b) Different Hostname >Shared Installation
  • 129. Synchronize to Peer # bigpipe config sync pull # bigpipe config sync all
  • 132. Chapter 13 High Availability Failover Trigger Failover Detection Stateful Failover MAC Masquerading
  • 133. Failover Managers  Failover Mangers detects a failed process,  takes one of the several action restarting the process, failing back to the standby, reboot the big- ip  Watchdog Performs hardware health checks  Overdog Software to correct hardware failures  SOD monitors the switch fabric and takes corrective action for switch failures All failover Managers update and monitor the high Availability Table
  • 134. High Availability Table  Update & Monitor by Failover Managers  Table Fields -Feature Name -Action on Failure -Enabled -Failed State  Command Line: b ha table show
  • 136. Failover Trigger  Processes (Daemons)  Switchboard  VLAN Failsafe  Gateway Failsafe
  • 138. VLAN Failsafe  Detects no network traffic Tries to generate traffic  Timeout reached Time Action; Standby becomes active
  • 140. Hardware Failover  Standby notices a loss of voltage, it Takes over the active role
  • 141. Network Failover  Heartbeat sent over network  No 50 foot (15.24 meter) limitation  Slower than Hardware Failover  Setting not synchronized between peers  If Both Hardware Failover & Network Failover are being used…..
  • 146. Failover without MAC Masquerading
  • 149. Thanks