BIG-IP Global Traffic Manager : Implementations. Version 11.3

Size: px
Start display at page:

Download "BIG-IP Global Traffic Manager : Implementations. Version 11.3"

Transcription

1 BIG-IP Global Traffic Manager : Implementations Version 11.3

2

3 Table of Contents Table of Contents Legal Notices...11 Acknowledgments...13 Chapter 1: Upgrading BIG-IP GTM to Version 11.x...17 Converting a statistics collection server to a Prober pool automatically...18 Chapter 2: Sending Traffic Through BIG-IP GTM...19 Overview: Configuring GTM to screen traffic to an existing DNS server...20 About listeners...20 About wildcard listeners...20 Task summary...21 Placing GTM on your network to forward traffic...21 Creating a listener to forward traffic to a DNS server...21 Creating a wide IP...21 Implementation result...22 Chapter 3: Replacing a DNS Server with BIG-IP GTM...23 Overview: Replacing a DNS server with BIG-IP GTM...24 About listeners...24 Task summary...24 Configuring a back-end DNS server to allow zone file transfers...25 Acquiring zone files from the legacy DNS server...25 Creating a self IP address using the IP address of the legacy DNS server...25 Designating GTM as the primary server for the zone...26 Creating listeners to alert GTM to DNS traffic destined for the system...26 Creating a wide IP...27 Implementation result...27 Chapter 4: Load Balancing Non-Wide IP DNS Traffic to a Pool of DNS Servers...29 Overview: Screening and forwarding non-wide IP traffic to a pool of DNS servers...30 About listeners...30 Task summary...30 Creating a pool of local DNS servers...31 Creating a listener that alerts GTM to DNS queries for a pool of DNS servers...31 Implementation result...31 Chapter 5: Delegating DNS Traffic to Wide IPs...33 Overview: Delegating DNS traffic to wide IPs

4 Table of Contents About listeners...34 Task summary...34 Creating a delegated zone on a local DNS server...35 Creating a listener to handle traffic for wide IPs...35 Implementation result...35 Chapter 6: Integrating BIG-IP GTM with Other BIG-IP Systems...37 Overview: Integrating GTM with older BIG-IP systems on a network...38 About iquery and communications between BIG-IP systems...38 Task summary...38 Defining a data center...38 Defining BIG-IP GTM systems...39 Defining BIG-IP LTM systems...40 Running the big3d_install script...41 Implementation result...42 Chapter 7: Integrating BIG-IP LTM with BIG-IP GTM Systems...43 Overview: Integrating LTM systems with GTM systems on a network...44 Task summary...44 Defining a data center...44 Defining BIG-IP GTM systems...45 Defining BIG-IP LTM systems...46 Running the bigip_add utility...47 Implementation result...47 Chapter 8: Ensuring Correct Synchronization When Adding GTM to a Network...49 Overview: Ensuring correct synchronization when adding GTM to a network...50 About configuration synchronization...50 About adding an additional BIG-IP GTM to your network...50 Task summary...50 Defining an NTP server on the existing GTM...51 Enabling synchronization on the existing GTM...51 Creating a data center on the existing GTM...51 Defining a server on the existing GTM...52 Running the gtm_add script on the new GTM...53 Implementation result...53 Chapter 9: Configuring BIG-IP GTM VIPRION Systems...55 Overview: Configuring BIG-IP GTM VIPRION systems...56 Configuring virtual server status for clusters...56 Chapter 10: Setting Up a BIG-IP GTM Redundant System Configuration...57 Overview: Configuring a BIG-IP GTM redundant system

5 Table of Contents Task summary...58 Defining an NTP server...58 Creating listeners to identify DNS traffic...59 Defining a data center...59 Defining a server...60 Enabling global traffic configuration synchronization...60 Running the gtm_add script...61 Chapter 11: Configuring GTM on a Network with One Route Domain...63 Overview: How do I deploy BIG-IP GTM on a network with one route domain?...64 Task summary...64 Creating VLANs for a route domain on BIG-IP LTM...65 Creating a route domain on the BIG-IP system...65 Creating a self IP address for a route domain on BIG-IP LTM...66 Defining a server for a route domain on BIG-IP GTM...67 Implementation result...67 Chapter 12: Configuring GTM on a Network with Multiple Route Domains...69 Overview: How do I deploy BIG-IP GTM on a network with multiple route domains?...70 Task summary...71 Creating VLANs for a route domain on BIG-IP LTM...72 Creating a route domain on BIG-IP LTM...72 Creating a self IP address for a route domain on BIG-IP LTM...73 Disabling auto-discovery at the global-level on BIG-IP GTM...73 Defining a server for a route domain on BIG-IP GTM...73 Implementation result...74 Chapter 13: Authenticating with SSL Certificates Signed by a Third Party...75 Overview: Authenticating with SSL certificates signed by a third party...76 About SSL authentication levels...76 Configuring Level 1 SSL authentication...76 Importing the device certificate...76 Importing the root certificate for the gtmd agent...77 Importing the root certificate for the big3d agent...77 Verifying the certificate exchange...77 Implementation Results...78 Configuring certificate chain SSL authentication...78 Creating a certificate chain file...78 Importing the device certificate from the last CA server in the chain...78 Importing a certificate chain file for the gtmd agent...79 Importing a certificate chain for the big3d agent...79 Verifying the certificate chain exchange...79 Implementation result

6 Table of Contents Chapter 14: Configuring the Save Interval for GTM Configuration Changes...81 Overview: Configuring the interval at which GTM saves configuration changes...82 Task summary...82 Configuring the GTM save interval...82 Implementation result...82 Chapter 15: Configuring a TTL in a DNS NoError Response...83 Overview: Configuring a TTL in an IPv6 DNS NoError Response...84 About SOA records and negative caching...84 Task summary...84 Creating a pool...84 Creating a wide IP that provides for negative caching...85 Implementation result...85 Chapter 16: Configuring DNS Overview: Configuring DNS Task summary...88 Creating a custom DNS profile...88 Assigning a DNS profile to a virtual server...89 Implementation result...90 Chapter 17: Configuring DNSSEC...91 Overview: Configuring DNSSEC...92 How do I prepare for a manual rollover of a DNSSEC key?...92 About enhancing DNSSEC key security...92 Task summary...93 Creating listeners to identify DNS traffic...93 Creating DNSSEC key-signing keys...94 Creating DNSSEC zone-signing keys...95 Creating DNSSEC zones...96 Confirming that GTM is signing DNSSEC records...97 Viewing DNSSEC records in ZoneRunner...97 Implementation result...97 Chapter 18: Configuring DNS Express...99 How do I configure DNS Express? What is DNS Express? Task summary Configuring a back-end DNS server to allow zone file transfers Creating a DNS Express TSIG key Creating a DNS Express zone Enabling DNS Express

7 Table of Contents Assigning a DNS profile to a listener Viewing information about DNS Express zones Implementation result Chapter 19: Caching DNS Responses from External Resolvers Overview: Improving DNS performance by caching responses from external resolvers Task summary Creating a transparent DNS cache Creating a custom DNS profile for transparent DNS caching Assigning a custom DNS profile to a GTM listener Creating a custom DNS monitor Creating a pool of local DNS servers Determining DNS cache performance Clearing a DNS cache Implementation result Chapter 20: Resolving DNS Queries and Caching Responses Overview: Improving DNS performance by resolving queries and caching responses Task summary Creating a resolver DNS cache Creating a custom DNS profile for DNS resolving and caching Assigning a custom DNS profile to a GTM listener Determining DNS cache performance Clearing a DNS cache Implementation result Chapter 21: Resolving DNS Queries and Caching Validated Responses Overview: Resolving queries and caching validated responses Task summary Creating a validating resolver DNS cache Creating a custom DNS profile for validating resolver DNS caching Assigning a custom DNS profile to a GTM listener Determining DNS cache performance Clearing a DNS cache Implementation result Chapter 22: Customizing a DNS Cache Overview: Customizing a DNS cache Configuring a DNS cache to answer queries for local zones Configuring a DNS cache to use specific root nameservers Configuring a DNS cache alert for cache poisoning

8 Table of Contents Chapter 23: Configuring IP Anycast (Route Health Injection) Overview: Configuring IP Anycast (Route Health Injection) Task summary Enabling the ZebOS dynamic routing protocol Creating a custom DNS profile Configuring a listener for route advertisement Verifying advertisement of the route Implementation result Chapter 24: Redirecting a DNS Query Using a Wide IP with a CNAME Pool Overview: Redirecting DNS queries using a wide IP with a CNAME pool About CNAME records Task summary Creating a pool using a CNAME Creating a wide IP with a CNAME pool Implementation result Chapter 25: Monitoring Third-Party Servers with SNMP Overview: SNMP monitoring of third-party servers Task summary Creating an SNMP monitor Defining a third-party host server that is running SNMP Implementation result Chapter 26: Configuring Remote High-Speed DNS Logging Overview: Configuring remote high-speed DNS logging Task summary Creating a pool of remote logging servers Creating a remote high-speed log destination Creating a formatted remote high-speed log destination Creating a publisher Creating a custom DNS Logging profile for logging DNS queries Creating a custom DNS Logging profile for logging DNS responses Creating a custom DNS Logging profile for logging DNS queries and responses Creating a custom DNS profile to enable DNS logging Configuring a GTM listener for DNS logging Disabling DNS logging Implementation result Chapter 27: Configuring Device-Specific Probing and Statistics Collection Overview: Configuring device-specific probing and statistics collection

9 Table of Contents About Prober pools About Prober pool status About Prober pool statistics Task summary Creating a Prober pool Assigning a Prober pool to a data center Assigning a Prober pool to a server Viewing Prober pool statistics and status Determining which Prober pool member marked a resource down Implementation result Chapter 28: Setting Up and Viewing DNS Statistics Overview: Setting up and viewing DNS statistics Task summary Creating a DNS profile for DNS AVR statistics collection Configuring a GTM listener for DNS AVR statistics collection Viewing DNS AVR statistics Viewing DNS AVR statistics in tmsh Viewing DNS global statistics Viewing DNS statistics for a specific virtual server Implementation result Chapter 29: Diagnosing Network Connection Issues Diagnosing network connection issues Viewing iquery statistics iquery statistics descriptions

10 Table of Contents 10

11 Legal Notices Publication Date This document was published on January 31, Publication Number MAN Copyright Copyright , F5 Networks, Inc. All rights reserved. F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5 assumes no responsibility for the use of this information, nor any infringement of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent, copyright, or other intellectual property right of F5 except as specifically described by applicable user licenses. F5 reserves the right to change specifications at any time without notice. Trademarks Access Policy Manager, Advanced Client Authentication, Advanced Routing, APM, Application Security Manager, ARX, AskF5, ASM, BIG-IP, BIG-IQ, Cloud Extender, CloudFucious, Cloud Manager, Clustered Multiprocessing, CMP, COHESION, Data Manager, DevCentral, DevCentral [DESIGN], DNS Express, DSC, DSI, Edge Client, Edge Gateway, Edge Portal, ELEVATE, EM, Enterprise Manager, ENGAGE, F5, F5 [DESIGN], F5 Management Pack, F5 Networks, F5 World, Fast Application Proxy, Fast Cache, FirePass, Global Traffic Manager, GTM, GUARDIAN, IBR, Intelligent Browser Referencing, Intelligent Compression, IPv6 Gateway, iapps, icontrol, ihealth, iquery, irules, irules OnDemand, isession, L7 Rate Shaping, LC, Link Controller, Local Traffic Manager, LTM, Message Security Manager, MSM, OneConnect, OpenBloX, OpenBloX [DESIGN], Packet Velocity, Policy Enforcement Manager, PEM, Protocol Security Manager, PSM, Real Traffic Policy Builder, Rosetta Diameter Gateway, Scale N, Signaling Delivery Controller, SDC, SSL Acceleration, StrongBox, SuperVIP, SYN Check, TCP Express, TDR, TMOS, Traffic Management Operating System, Traffix Diameter Load Balancer, Traffix Systems, Traffix Systems (DESIGN), Transparent Data Reduction, UNITY, VAULT, VIPRION, vcmp, virtual Clustered Multiprocessing, WA, WAN Optimization Manager, WebAccelerator, WOM, and ZoneRunner, are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries, and may not be used without F5's express written consent. All other product and company names herein may be trademarks of their respective owners. Patents This product may be protected by U.S. Patents 6,374,300; 6,473,802; 6,970,733; 7,047,301; 7,707,289. This list is believed to be current as of January 31, Export Regulation Notice This product may include cryptographic software. Under the Export Administration Act, the United States government may consider it a criminal offense to export this product from the United States. RF Interference Warning This is a Class A product. In a domestic environment this product may cause radio interference, in which case the user may be required to take adequate measures.

12 Legal Notices FCC Compliance This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This unit generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user, at his own expense, will be required to take whatever measures may be required to correct the interference. Any modifications to this device, unless expressly approved by the manufacturer, can void the user's authority to operate this equipment under part 15 of the FCC rules. Canadian Regulatory Compliance This Class A digital apparatus complies with Canadian ICES-003. Standards Compliance This product conforms to the IEC, European Union, ANSI/UL and Canadian CSA standards applicable to Information Technology products at the time of manufacture. 12

13 Acknowledgments This product includes software developed by Gabriel Forté. This product includes software developed by Bill Paul. This product includes software developed by Jonathan Stone. This product includes software developed by Manuel Bouyer. This product includes software developed by Paul Richards. This product includes software developed by the NetBSD Foundation, Inc. and its contributors. This product includes software developed by the Politecnico di Torino, and its contributors. This product includes software developed by the Swedish Institute of Computer Science and its contributors. This product includes software developed by the University of California, Berkeley and its contributors. This product includes software developed by the Computer Systems Engineering Group at the Lawrence Berkeley Laboratory. This product includes software developed by Christopher G. Demetriou for the NetBSD Project. This product includes software developed by Adam Glass. This product includes software developed by Christian E. Hopps. This product includes software developed by Dean Huxley. This product includes software developed by John Kohl. This product includes software developed by Paul Kranenburg. This product includes software developed by Terrence R. Lambert. This product includes software developed by Philip A. Nelson. This product includes software developed by Herb Peyerl. This product includes software developed by Jochen Pohl for the NetBSD Project. This product includes software developed by Chris Provenzano. This product includes software developed by Theo de Raadt. This product includes software developed by David Muir Sharnoff. This product includes software developed by SigmaSoft, Th. Lockert. This product includes software developed for the NetBSD Project by Jason R. Thorpe. This product includes software developed by Jason R. Thorpe for And Communications, This product includes software developed for the NetBSD Project by Frank Van der Linden. This product includes software developed for the NetBSD Project by John M. Vinopal. This product includes software developed by Christos Zoulas. This product includes software developed by the University of Vermont and State Agricultural College and Garrett A. Wollman. This product includes software developed by Balazs Scheidler which is protected under the GNU Public License.

14 Acknowledgments This product includes software developed by Niels Mueller which is protected under the GNU Public License. In the following statement, This software refers to the Mitsumi CD-ROM driver: This software was developed by Holger Veit and Brian Moore for use with 386BSD and similar operating systems. Similar operating systems includes mainly non-profit oriented systems for research and education, including but not restricted to NetBSD, FreeBSD, Mach (by CMU). This product includes software developed by the Apache Group for use in the Apache HTTP server project ( This product includes software licensed from Richard H. Porter under the GNU Library General Public License ( 1998, Red Hat Software), This product includes the standard version of Perl software licensed under the Perl Artistic License ( 1997, 1998 Tom Christiansen and Nathan Torkington). All rights reserved. You may find the most current standard version of Perl at This product includes software developed by Jared Minch. This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product contains software based on oprofile, which is protected under the GNU Public License. This product includes RRDtool software developed by Tobi Oetiker ( and licensed under the GNU General Public License. This product contains software licensed from Dr. Brian Gladman under the GNU General Public License (GPL). This product includes software developed by the Apache Software Foundation ( This product includes Hypersonic SQL. This product contains software developed by the Regents of the University of California, Sun Microsystems, Inc., Scriptics Corporation, and others. This product includes software developed by the Internet Software Consortium. This product includes software developed by Nominum, Inc. ( This product contains software developed by Broadcom Corporation, which is protected under the GNU Public License. This product contains software developed by MaxMind LLC, and is protected under the GNU Lesser General Public License, as published by the Free Software Foundation. This product includes Intel QuickAssist kernel module, library, and headers software licensed under the GNU General Public License (GPL). This product includes software licensed from Gerald Combs (gerald@wireshark.org) under the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or any later version. Copyright 1998 Gerald Combs. This product includes software developed by Thomas Williams and Colin Kelley. Copyright , 1998, 2004, 2007 Permission to use, copy, and distribute this software and its documentation for any purpose with or without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Permission to modify the software is granted, but not the right to distribute the complete modified source code. Modifications are to be distributed as patches to the released version. Permission to distribute binaries produced by compiling modified sources is granted, provided you 14

15 BIG-IP Global Traffic Manager : Implementations 1. distribute the corresponding source modifications from the released version in the form of a patch file along with the binaries, 2. add special version identification to distinguish your version in addition to the base release version number, 3. provide your name and address as the primary contact for the support of your modified version, and 4. retain our contact information in regard to use of the base software. Permission to distribute the released version of the source code along with corresponding source modifications in the form of a patch file is granted with same provisions 2 through 4 for binary distributions. This software is provided "as is" without express or implied warranty to the extent permitted by applicable law. This product contains software developed by Google, Inc. Copyright 2011 Google, Inc. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. This product includes software developed by Digital Envoy, Inc. 15

16

17 Chapter 1 Upgrading BIG-IP GTM to Version 11.x Converting a statistics collection server to a Prober pool automatically

18 Upgrading BIG-IP GTM to Version 11.x Converting a statistics collection server to a Prober pool automatically In version 10.2 of BIG-IP Global Traffic Manager (GTM ), you could assign a single BIG-IP system to probe a server to gather health and performance data. You did this by specifying the IP address of the BIG-IP system (which you chose to perform probes of the server) in the Statistics Collection Server field of the server. In version 11.0, this feature was replaced by the Prober pool feature. When you upgrade from version 10.2.x to version 11.x, if a single BIG-IP system was assigned to probe a server, BIG-IP GTM converts the single server to a Prober pool with one member, and then assigns the Prober pool to the server to which the Statistics Collection server was originally assigned. The name of the new Prober pool is based on the IP address of the original Statistics Collection server. If the original Statistics Collection server had an IP address of , the name of the automatically created Prober pool is prober_pool_10_10_2_3. 18

19 Chapter 2 Sending Traffic Through BIG-IP GTM Overview: Configuring GTM to screen traffic to an existing DNS server Task summary Implementation result

20 Sending Traffic Through BIG-IP GTM Overview: Configuring GTM to screen traffic to an existing DNS server You can use BIG-IP Global Traffic Manager (GTM ) as a traffic screener in front of an existing DNS server. With this setup, all DNS traffic flows through BIG-IP GTM. Listeners that you configure on BIG-IP GTM verify incoming DNS queries. If the query is for a wide IP, BIG-IP GTM resolves the request. If the query is for a destination that does not match a wide IP or for an IP address that is not configured on BIG-IP GTM, the system forwards the query to the specified DNS server for resolution. When forwarding a query, BIG-IP GTM transforms the source address to a self IP address on BIG-IP GTM. Figure 1: Traffic flow when BIG-IP GTM screens traffic to a DNS server About listeners A listener is a specialized virtual server that uses port 53 and to which you assign a specific IP address. When a DNS name resolution request is sent to the IP address of a listener, BIG-IP GTM either handles the request locally or forwards the request to the appropriate resource. About wildcard listeners A wildcard listener is a special listener that is assigned an IP address of and the DNS query port (port 53). When you want BIG-IP GTM to respond to DNS name resolution requests coming into your network, regardless of the destination IP address of the given request, you create a wildcard listener. BIG-IP GTM responds not only to wide IP requests, but also forwards other DNS name resolution requests to other DNS servers. 20

21 BIG-IP Global Traffic Manager : Implementations Task summary Perform these tasks to send traffic through BIG-IP GTM. Placing GTM on your network to forward traffic Creating a listener to forward traffic to a DNS server Creating a wide IP Placing GTM on your network to forward traffic Determine to which DNS server you want BIG-IP GTM to forward traffic. Place GTM on your network between LDNS servers and clients making DNS name resolution requests. 1. Physically connect GTM to your Internet connection. 2. Connect the LDNS to an Ethernet port on GTM (optional). 3. Connect the LDNS to a switch. Creating a listener to forward traffic to a DNS server Determine to which DNS server you want this listener to forward traffic. Create a listener that alerts the BIG-IP system to traffic destined for a DNS server. 1. On the Main tab, click Global Traffic > Listeners. The Listeners List screen opens. 2. Click Create. The new Listeners screen opens. 3. In the Destination field, type the IP address on which BIG-IP GTM listens for network traffic. The destination is the IP address of a DNS server to which you want the listener to route traffic. Important: The destination must not match a self IP address on BIG-IP GTM. 4. From the VLAN Traffic list, select All VLANs. 5. Click Finished. Creating a wide IP Ensure that at least one load balancing pool exists in the configuration before you start creating a wide IP. Create a wide IP to map a FQDN to one or more pools of virtual servers that host the content of the domain. 1. On the Main tab, click Global Traffic > Wide IPs. The Wide IPs List screen opens. 2. Click Create. The New Wide IP screen opens. 3. In the Name field, type a name for the wide IP. 21

22 Sending Traffic Through BIG-IP GTM Tip: You can use two different wildcard characters in the wide IP name: asterisk (*) to represent several characters and question mark (?) to represent a single character. This reduces the number of aliases you have to add to the configuration. 4. From the Pool list, select the pools that this wide IP uses for load balancing. The system evaluates the pools based on the wide IP load balancing method configured. a) From the Pool list, select a pool. A pool can belong to more than one wide IP. b) Click Add. 5. Click Finished. Implementation result You now have an implementation in which BIG-IP GTM receives all DNS queries. If the query is for a wide IP, BIG-IP GTM load balances the request to the appropriate resource. If the query is for an IP address of a DNS server, BIG-IP GTM either routes or forwards the query to the DNS server for resolution. 22

23 Chapter 3 Replacing a DNS Server with BIG-IP GTM Overview: Replacing a DNS server with BIG-IP GTM Task summary Implementation result

24 Replacing a DNS Server with BIG-IP GTM Overview: Replacing a DNS server with BIG-IP GTM BIG-IP Global Traffic Manager (GTM ) load balances incoming wide IP traffic to your network resources. BIG-IP GTM can also replace a local DNS server as the authoritative nameserver for wide IPs, zones, and all other DNS-related traffic. You can configure BIG-IP GTM to replace the DNS server that currently manages BIG-IP GTM becomes the authoritative nameserver for and load balances traffic across the web-based applications store.siterequest.com and checkout.siterequest.com. Figure 2: Traffic flow when BIG-IP GTM replaces DNS server About listeners A listener is a specialized virtual server that uses port 53 and to which you assign a specific IP address. When a DNS name resolution request is sent to the IP address of a listener, BIG-IP GTM either handles the request locally or forwards the request to the appropriate resource. Task summary Perform these tasks to replace a DNS server with BIG-IP GTM. Configuring a back-end DNS server to allow zone file transfers Acquiring zone files from the legacy DNS server Creating a self IP address using the IP address of the legacy DNS server Designating GTM as the primary server for the zone Creating listeners to alert GTM to DNS traffic destined for the system Creating a wide IP 24

25 BIG-IP Global Traffic Manager : Implementations Configuring a back-end DNS server to allow zone file transfers If you are unfamiliar with how to modify DNS server files, review the fifth edition of DNS and BIND, available from O Reilly Media. To configure a back-end DNS server to allow zone file transfers to the BIG-IP system, add to the DNS server an allow-transfer statement that specifies a self IP address on the BIG-IP system. You can modify the following allow-transfer statement to use a self IP address on the BIG-IP system: allow-transfer { localhost; <self IP address of BIG-IP system>; }; Acquiring zone files from the legacy DNS server Ensure that you have configured the legacy DNS server with an allow-transfer statement that authorizes zone transfers to BIG-IP GTM. For BIG-IP GTM to acquire zone files from the legacy DNS server, create a new zone. 1. On the Main tab, click Global Traffic > ZoneRunner > Zone List. The Zone List screen opens. 2. Click Create. The New Zone screen opens. 3. From the View Name list, select the view that you want this zone to be a member of. The default view is external. 4. In the Zone Name field, type a name for the zone file in this format, including the trailing dot: db.[viewname].[zonename]. For example, db.external.siterequest.com. 5. From the Zone Type list, select Master. 6. From the Records Creation Method list, select Transfer from Server. 7. In the Source Server field, type the IP address of the DNS server (the server from which you want BIG-IP GTM to acquire zone files). 8. Click Finished. Creating a self IP address using the IP address of the legacy DNS server To avoid a conflict on your network, unplug BIG-IP GTM from the network. When you want BIG-IP GTM to handle DNS traffic previously handled by a DNS server, create a self IP address on BIG-IP GTM using the IP address of the legacy DNS server. 1. On the Main tab, click Network > Self IPs. The Self IPs screen opens. 2. Click Create. The New Self IP screen opens. 3. In the Name field, type a unique name for the self IP. 4. In the IP Address field, type the IP address of the legacy DNS server. 25

26 Replacing a DNS Server with BIG-IP GTM The system accepts IPv4 and IPv6 addresses. 5. In the Netmask field, type the network mask for the specified IP address. 6. Click Finished. The screen refreshes, and displays the new self IP address in the list. Designating GTM as the primary server for the zone Ensure that you have created a self IP address on BIG-IP GTM using the IP address of the legacy DNS server. Add this self IP address to the BIG-IP GTM server object. Then modify the DNS server based on your network configuration. 1. Log on to BIG-IP GTM. 2. On the Main tab, click Global Traffic > Servers. The Server List screen opens. 3. Click the name of the BIG-IP GTM system that you want to modify. The server settings and values display. 4. In the Address List area, add the new self IP address. 5. Click Update. 6. Do one of the following based on your network configuration: Modify the IP address of the legacy DNS server so that it becomes a secondary DNS server to BIG-IP GTM. Ensure that the IP address of the DNS server does not conflict with the self IP address that you added to the BIG-IP GTM server object. Note: If you are using BIND servers, and you are unfamiliar with how to change a DNS server from a primary to a secondary, refer to the fifth edition of DNS and BIND, available from O Reilly Media. Remove the legacy DNS server from your network. BIG-IP GTM is now the primary authoritative name server for the zone. The servers for the zone do not need to be updated, because the IP address of the legacy DNS server was assigned to BIG-IP GTM. Creating listeners to alert GTM to DNS traffic destined for the system To alert the BIG-IP GTM system to DNS traffic (previously handled by the DNS server), create two listeners: one that uses the UDP protocol, and one that uses the TCP protocol. Note: DNS zone transfers use TCP port 53. If you do not configure a listener for TCP the client might receive the error: connection refused or TCP RSTs. 1. On the Main tab, click Global Traffic > Listeners. The Listeners List screen opens. 2. Click Create. The new Listeners screen opens. 3. In the Destination field, type the IP address previously used by the legacy DNS server. 4. From the VLAN Traffic list, select All VLANs. 5. From the Protocol list, select UDP. 26

27 BIG-IP Global Traffic Manager : Implementations 6. Click Finished. Create another listener with the same IP address, but select TCP from the Protocol list. Creating a wide IP Ensure that at least one load balancing pool exists in the configuration before you start creating a wide IP. Create a wide IP to map a FQDN to one or more pools of virtual servers that host the content of the domain. 1. On the Main tab, click Global Traffic > Wide IPs. The Wide IPs List screen opens. 2. Click Create. The New Wide IP screen opens. 3. In the Name field, type a name for the wide IP. Tip: You can use two different wildcard characters in the wide IP name: asterisk (*) to represent several characters and question mark (?) to represent a single character. This reduces the number of aliases you have to add to the configuration. 4. From the Pool list, select the pools that this wide IP uses for load balancing. The system evaluates the pools based on the wide IP load balancing method configured. a) From the Pool list, select a pool. A pool can belong to more than one wide IP. b) Click Add. 5. Click Finished. Implementation result BIG-IP GTM replaces the legacy DNS server as the primary authoritative nameserver for the zone. BIG-IP GTM handles all incoming DNS traffic, whether destined for a wide IP or handled by the BIND instance on the system. 27

28

29 Chapter 4 Load Balancing Non-Wide IP DNS Traffic to a Pool of DNS Servers Overview: Screening and forwarding non-wide IP traffic to a pool of DNS servers Task summary Implementation result

30 Load Balancing Non-Wide IP DNS Traffic to a Pool of DNS Servers Overview: Screening and forwarding non-wide IP traffic to a pool of DNS servers BIG-IP Global Traffic Manager (GTM ) can function as a traffic screener in front of a pool of DNS servers. In this situation, BIG-IP GTM checks incoming DNS queries and if the query is for a wide IP, resolves the query. Otherwise, BIG-IP GTM forwards the DNS query to one of the servers in a pool of DNS servers, and that server handles the query. Figure 3: Traffic flow when BIG-IP GTM screens traffic to a pool of DNS servers About listeners A listener is a specialized virtual server that uses port 53 and to which you assign a specific IP address. When a DNS name resolution request is sent to the IP address of a listener, BIG-IP GTM either handles the request locally or forwards the request to the appropriate resource. Task summary Perform these tasks to screen non-wide IP traffic and forward the traffic to a pool of DNS servers. Creating a pool of local DNS servers Creating a listener that alerts GTM to DNS queries for a pool of DNS servers 30

31 BIG-IP Global Traffic Manager : Implementations Creating a pool of local DNS servers Ensure that at least one custom DNS monitor exists on the BIG-IP system. Gather the IP addresses of the DNS servers that you want to include in a pool to which the BIG-IP system load balances DNS traffic. Create a pool of local DNS servers when you want to load balance DNS requests to back end DNS servers. 1. On the Main tab, click Local Traffic > Pools. The Pool List screen opens. 2. Click Create. The New Pool screen opens. 3. In the Name field, type a unique name for the pool. 4. For the Health Monitors setting, from the Available list, select the custom DNS monitor you created, and click << to move the monitor to the Active list. 5. Using the New Members setting, add each resource that you want to include in the pool: a) Either type an IP address in the Address field, or select a node address from the Node List. b) Type a port number in the Service Port field, or select a service name from the list. c) To specify a priority group, type a priority number in the Priority field. d) Click Add. 6. Click Finished. Creating a listener that alerts GTM to DNS queries for a pool of DNS servers Configure a listener that alerts BIG-IP GTM to DNS queries destined for DNS servers that are members of a pool. 1. Log on to the command-line interface of BIG-IP GTM. 2. Type tmsh, to access the Traffic Management Shell. 3. Run this command sequence to create a listener: create /gtm listener <name of listener> address <IP address on which you want the listener to alert GTM to DNS traffic> ip-protocol udp pool <name of pool> translate-address enabled The system creates a listener with the specified name and IP address that alerts BIG-IP GTM to queries destined for the members of the specified pool. 4. Run this command sequence to save the listener: save /sys config 5. Run this command sequence to display the listener: list /gtm listener The system displays the new listener configuration. Implementation result You now have an implementation in which BIG-IP GTM receives DNS queries, handles wide IP requests, and forwards all other DNS queries to members of the pool of DNS servers. 31

32

33 Chapter 5 Delegating DNS Traffic to Wide IPs Overview: Delegating DNS traffic to wide IPs Task summary Implementation result

34 Delegating DNS Traffic to Wide IPs Overview: Delegating DNS traffic to wide IPs BIG-IP Global Traffic Manager (GTM ) resolves DNS queries that match a wide IP name. BIG-IP GTM can work in conjunction with an existing DNS server on your network. In this situation, you configure the DNS server to delegate wide IP-related requests to BIG-IP GTM for name resolution. Figure 4: Traffic flow when DNS server delegates traffic to BIG-IP GTM This implementation focuses on the fictional company SiteRequest that recently purchased BIG-IP GTM to help resolve queries for two web-based applications: store.siterequest.com and checkout.siterequest.com. These applications are delegated zones of Currently, a DNS server manages SiteRequest administrators have already configured BIG-IP GTM with two wide IPs, and These wide IPs correspond to the two web applications. About listeners A listener is a specialized virtual server that uses port 53 and to which you assign a specific IP address. When a DNS name resolution request is sent to the IP address of a listener, BIG-IP GTM either handles the request locally or forwards the request to the appropriate resource. Task summary Perform these tasks to delegate DNS traffic to wide IPs. Creating a delegated zone on a local DNS server Creating a listener to handle traffic for wide IPs 34

35 BIG-IP Global Traffic Manager : Implementations Creating a delegated zone on a local DNS server Determine which DNS servers will delegate wide IP-related requests to BIG-IP GTM. If you are using BIND servers and you are unfamiliar with how to modify the files on these servers, consider reviewing the fifth edition of DNS and BIND, available from O Reilly Media. In order for BIG-IP GTM to manage the web applications of store.siterequest.com and checkout.siterequest.com, you must create a delegated zone on the DNS server that manages Perform the following steps on the selected DNS server. 1. Create an address record (A record) that defines the domain name and IP address of each BIG-IP GTM in your network. 2. Create a nameserver record (NS record) that defines the delegated zone for which BIG-IP GTM is responsible. 3. Create canonical name records (CNAME records) to forward requests for store.siterequest.com and checkout.siterequest.com to the wide IPs store.siterequest.com and checkout.siterequest.com, respectively. A delegated zone for store.siterequest.com and checkout.siterequest.com exists on each DNS server on which you performed this procedure. Creating a listener to handle traffic for wide IPs Determine the self IP address of BIG-IP GTM. Create a listener on BIG-IP GTM that identifies the wide IP traffic for which BIG-IP GTM is responsible. 1. On the Main tab, click Global Traffic > Listeners. The Listeners List screen opens. 2. Click Create. The new Listeners screen opens. 3. In the Destination field, type the IP address on which BIG-IP GTM listens for network traffic. The destination is a self IP address on BIG-IP GTM. 4. From the VLAN Traffic list, select All VLANs. 5. From the Protocol list, select either UDP or TCP. 6. Click Finished. Implementation result You now have an implementation of BIG-IP GTM in which the DNS server manages DNS traffic unless the query is for store.sitrequest.com or checkout.siterequest.com. When the DNS server receives these queries, it delegates them to BIG-IP GTM, which then load balances the queries to the appropriate wide IPs. 35

36

37 Chapter 6 Integrating BIG-IP GTM with Other BIG-IP Systems Overview: Integrating GTM with older BIG-IP systems on a network Task summary Implementation result

38 Integrating BIG-IP GTM with Other BIG-IP Systems Overview: Integrating GTM with older BIG-IP systems on a network You can add BIG-IP Global Traffic Manager (GTM ) systems to a network in which BIG-IP Local Traffic Manager (LTM ) systems are already present. This expands your load balancing and traffic management capabilities beyond the local area network. For this implementation to be successful, you must authorize communications between the systems. Note: The BIG-IP GTM systems in a synchronization group, and the BIG-IP LTM and BIG-IP Link Controller systems that are configured to communicate with the systems in the synchronization group must have TCP port 4353 open through the firewall between the systems. The BIG-IP systems connect and communicate through this port. About iquery and communications between BIG-IP systems The gtmd agent on BIG-IP Global Traffic Manager (GTM ) uses the iquery protocol to communicate with the local big3d agent, and the big3d agents installed on other BIG-IP systems. The gtmd agent monitors both the availability of the BIG-IP systems, and the integrity of the network paths between the systems that host a domain and the local DNS servers that attempt to connect to that domain. Figure 5: Communications between big3d and gtmd agents using iquery Task summary To authorize communications between BIG-IP systems, perform the following tasks on the BIG-IP GTM that you are adding to the network. Defining a data center Defining BIG-IP GTM systems Defining BIG-IP LTM systems Running the big3d_install script Defining a data center Create a data center to contain the servers that reside on a subnet of your network. 1. On the Main tab, click Global Traffic > Data Centers. 38

39 BIG-IP Global Traffic Manager : Implementations The Data Center List screen opens. 2. Click Create. The New Data Center screen opens. 3. Type a name for the data center. Important: The data center name is limited to 63 characters. 4. In the Location field, type the geographic location of the data center. 5. In the Contact field, type the name of either the administrator or the department that manages the data center. 6. From the State list, select Enabled. 7. Click Finished. You can now create server objects and assign them to this data center. Repeat this procedure to create additional data centers. Defining BIG-IP GTM systems Ensure that at least one data center exists in the configuration before you start creating a server. Create a server object for BIG-IP GTM. 1. On the Main tab, click Global Traffic > Servers. The Server List screen opens. 2. Click Create. The New Server screen opens. 3. In the Name field, type a name for the server. Important: Server names are limited to 63 characters. 4. From the Product list, select BIG-IP System (Single). The server type determines the metrics that the system can collect from the server. 5. In the Address List area, add the IP addresses of the server. You can add more than one IP address, depending on how the server interacts with the rest of your network. Important: You must use a self IP address for a BIG-IP system; you cannot use the management IP address. 6. From the Data Center list, select the data center where the server resides. 7. In the Health Monitors area, assign the bigip monitor to the server by moving it from the Available list to the Selected list. 8. From the Virtual Server Discovery list, select how you want virtual servers to be added to the system. Option Disabled Description The system does not use the discovery feature to automatically add virtual servers. This is the default value. Use this option for a standalone BIG-IP GTM or for a BIG-IP GTM/LTM combo system when you plan to manually add virtual servers to the system. 39

40 Integrating BIG-IP GTM with Other BIG-IP Systems Option Enabled Enabled (No Delete) Description The system uses the discovery feature to automatically add virtual servers. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover BIG-IP LTM virtual servers. The system uses the discovery feature to automatically add virtual servers and does not delete any virtual servers that already exist. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover BIG-IP LTM virtual servers. 9. From the Link Discovery list, select how you want links to be added to the system. Option Disabled Enabled Enabled (No Delete) Description The system does not use the discovery feature to automatically add links. This is the default value. Use this option for a standalone BIG-IP GTM or for a BIG-IP GTM/LTM combo system when you plan to manually add links to the system. The system uses the discovery feature to automatically add links. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover links. The system uses the discovery feature to automatically add links and does not delete any links that already exist. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover links. 10. Click Create. The Server List screen opens displaying the new server in the list. Defining BIG-IP LTM systems On BIG-IP GTM, define servers that represent the BIG-IP LTM systems in your network. 1. On the Main tab, click Global Traffic > Servers. The Server List screen opens. 2. Click Create. The New Server screen opens. 3. In the Name field, type a name for the server. Important: Server names are limited to 63 characters. 4. From the Product list, select either BIG-IP System (Single) or BIG-IP System (Redundant). The server type determines the metrics that the system can collect from the server. 5. In the Address List area, add the IP addresses of the server. You can add more than one IP address, depending on how the server interacts with the rest of your network. Important: You must use a self IP address for a BIG-IP system; you cannot use the management IP address. 6. From the Data Center list, select the data center where the server resides. 7. In the Health Monitors area, assign the bigip monitor to the server by moving it from the Available list to the Selected list. 40

41 BIG-IP Global Traffic Manager : Implementations 8. From the Virtual Server Discovery list, select how you want virtual servers to be added to the system. Option Disabled Enabled Enabled (No Delete) Description The system does not use the discovery feature to automatically add virtual servers. This is the default value. Use this option for a standalone BIG-IP GTM or for a BIG-IP GTM/LTM combo system when you plan to manually add virtual servers to the system. The system uses the discovery feature to automatically add virtual servers. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover BIG-IP LTM virtual servers. The system uses the discovery feature to automatically add virtual servers and does not delete any virtual servers that already exist. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover BIG-IP LTM virtual servers. 9. From the Link Discovery list, select how you want links to be added to the system. Option Disabled Enabled Enabled (No Delete) Description The system does not use the discovery feature to automatically add links. This is the default value. Use this option for a standalone BIG-IP GTM or for a BIG-IP GTM/LTM combo system when you plan to manually add links to the system. The system uses the discovery feature to automatically add links. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover links. The system uses the discovery feature to automatically add links and does not delete any links that already exist. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover links. 10. Click Create. The Server List screen opens displaying the new server in the list. Running the big3d_install script Determine the self IP addresses for the existing BIG-IP systems that you want to upgrade with the latest big3d agent. Ensure that port 22 is open. Run the big3d_install script to upgrade the big3d agents on the BIG-IP systems and instructs these systems to authenticate with the other systems through the exchange of SSL certificates. For additional information about running the script, see SOL8195 on AskF5.com ( You must perform this task from the command-line interface. Important: Run the big3d_install script on BIG-IP GTM only for target systems that are running the same or an older version of BIG-IP software. 1. Log on to the command-line interface of the new BIG-IP GTM. 2. At the BASH prompt, type tmsh. 3. At the tmsh prompt, type run gtm big3d_install <IP_addresses_of_target_BIG-IP_systems>, and press Enter. The script instructs BIG-IP GTM to connect to each specified BIG-IP system. 41

42 Integrating BIG-IP GTM with Other BIG-IP Systems 4. If prompted, supply the root password for each system. The SSL certificates are exchanged, authorizing communications between the systems. The big3d agent on each system is upgraded to the same version as is installed on BIG-IP GTM from which you ran the script. Implementation result You now have an implementation in which the BIG-IP systems can communicate with each other. BIG-IP GTM can now use the other BIG-IP systems when load balancing DNS requests, and can acquire statistics and status information for the virtual servers these systems manage. 42

43 Chapter 7 Integrating BIG-IP LTM with BIG-IP GTM Systems Overview: Integrating LTM systems with GTM systems on a network Task summary Implementation result

44 Integrating BIG-IP LTM with BIG-IP GTM Systems Overview: Integrating LTM systems with GTM systems on a network You can add BIG-IP Local Traffic Manager (LTM ) systems to a network in which BIG-IP Global Traffic Manager (GTM ) systems are already present. This expands your load balancing and traffic management capabilities to include the local area network. For this implementation to be successful, you must authorize communications between the LTM and GTM systems. When the LTM and GTM systems use the same version of the big3d agent, you run the bigip_add utility to authorize communications between the systems. Note: The BIG-IP GTM and BIG-IP LTM systems must have TCP port 4353 open through the firewall between the systems. The BIG-IP systems connect and communicate through this port. Task summary To authorize communications between BIG-IP GTM and BIG-IP LTM systems, perform the following tasks on the BIG-IP GTM. Integrating BIG-IP LTM with BIG-IP GTM Systems Defining a data center Defining BIG-IP GTM systems Defining BIG-IP LTM systems Running the bigip_add utility Defining a data center Create a data center to contain the servers that reside on a subnet of your network. 1. On the Main tab, click Global Traffic > Data Centers. The Data Center List screen opens. 2. Click Create. The New Data Center screen opens. 3. Type a name for the data center. Important: The data center name is limited to 63 characters. 4. In the Location field, type the geographic location of the data center. 5. In the Contact field, type the name of either the administrator or the department that manages the data center. 6. From the State list, select Enabled. 7. Click Finished. You can now create server objects and assign them to this data center. Repeat this procedure to create additional data centers. 44

45 BIG-IP Global Traffic Manager : Implementations Defining BIG-IP GTM systems Ensure that at least one data center exists in the configuration before you start creating a server. Create a server object for BIG-IP GTM. 1. On the Main tab, click Global Traffic > Servers. The Server List screen opens. 2. Click Create. The New Server screen opens. 3. In the Name field, type a name for the server. Important: Server names are limited to 63 characters. 4. From the Product list, select BIG-IP System (Single). The server type determines the metrics that the system can collect from the server. 5. In the Address List area, add the IP addresses of the server. You can add more than one IP address, depending on how the server interacts with the rest of your network. Important: You must use a self IP address for a BIG-IP system; you cannot use the management IP address. 6. From the Data Center list, select the data center where the server resides. 7. In the Health Monitors area, assign the bigip monitor to the server by moving it from the Available list to the Selected list. 8. From the Virtual Server Discovery list, select how you want virtual servers to be added to the system. Option Disabled Enabled Enabled (No Delete) Description The system does not use the discovery feature to automatically add virtual servers. This is the default value. Use this option for a standalone BIG-IP GTM or for a BIG-IP GTM/LTM combo system when you plan to manually add virtual servers to the system. The system uses the discovery feature to automatically add virtual servers. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover BIG-IP LTM virtual servers. The system uses the discovery feature to automatically add virtual servers and does not delete any virtual servers that already exist. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover BIG-IP LTM virtual servers. 9. From the Link Discovery list, select how you want links to be added to the system. Option Disabled Enabled Description The system does not use the discovery feature to automatically add links. This is the default value. Use this option for a standalone BIG-IP GTM or for a BIG-IP GTM/LTM combo system when you plan to manually add links to the system. The system uses the discovery feature to automatically add links. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover links. 45

46 Integrating BIG-IP LTM with BIG-IP GTM Systems Option Enabled (No Delete) Description The system uses the discovery feature to automatically add links and does not delete any links that already exist. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover links. 10. Click Create. The Server List screen opens displaying the new server in the list. Defining BIG-IP LTM systems On BIG-IP GTM, define servers that represent the BIG-IP LTM systems in your network. 1. On the Main tab, click Global Traffic > Servers. The Server List screen opens. 2. Click Create. The New Server screen opens. 3. In the Name field, type a name for the server. Important: Server names are limited to 63 characters. 4. From the Product list, select either BIG-IP System (Single) or BIG-IP System (Redundant). The server type determines the metrics that the system can collect from the server. 5. In the Address List area, add the IP addresses of the server. You can add more than one IP address, depending on how the server interacts with the rest of your network. Important: You must use a self IP address for a BIG-IP system; you cannot use the management IP address. 6. From the Data Center list, select the data center where the server resides. 7. In the Health Monitors area, assign the bigip monitor to the server by moving it from the Available list to the Selected list. 8. From the Virtual Server Discovery list, select how you want virtual servers to be added to the system. Option Disabled Enabled Enabled (No Delete) Description The system does not use the discovery feature to automatically add virtual servers. This is the default value. Use this option for a standalone BIG-IP GTM or for a BIG-IP GTM/LTM combo system when you plan to manually add virtual servers to the system. The system uses the discovery feature to automatically add virtual servers. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover BIG-IP LTM virtual servers. The system uses the discovery feature to automatically add virtual servers and does not delete any virtual servers that already exist. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover BIG-IP LTM virtual servers. 9. From the Link Discovery list, select how you want links to be added to the system. 46

47 BIG-IP Global Traffic Manager : Implementations Option Disabled Enabled Enabled (No Delete) Description The system does not use the discovery feature to automatically add links. This is the default value. Use this option for a standalone BIG-IP GTM or for a BIG-IP GTM/LTM combo system when you plan to manually add links to the system. The system uses the discovery feature to automatically add links. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover links. The system uses the discovery feature to automatically add links and does not delete any links that already exist. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover links. 10. Click Create. The Server List screen opens displaying the new server in the list. Running the bigip_add utility Determine the self IP addresses of the BIG-IP LTM systems that you want to communicate with BIG-IP GTM. Run the bigip_add utility on BIG-IP GTM. This utility exchanges SSL certificates so that each system is authorized to communicate with the other. You must perform this task from the command-line interface. 1. On BIG-IP GTM, log on to the command-line interface. 2. At the command prompt, type: bigip_add <IP_addresses_of_BIG-IP_LTM_systems>, and press Enter. The utility exchanges SSL certificates so that each system is authorized to communicate with the other. The specified BIG-IP systems can now communicate with BIG-IP GTM. Implementation result You now have an implementation in which the BIG-IP systems can communicate with each other. BIG-IP GTM can now use the other BIG-IP systems when load balancing DNS requests, and can acquire statistics and status information for the virtual servers these systems manage. 47

48

49 Chapter 8 Ensuring Correct Synchronization When Adding GTM to a Network Overview: Ensuring correct synchronization when adding GTM to a network Task summary Implementation result

50 Ensuring Correct Synchronization When Adding GTM to a Network Overview: Ensuring correct synchronization when adding GTM to a network You can configure BIG-IP Global Traffic Manager (GTM) systems in collections called synchronization groups. All BIG-IP GTM systems in the same synchronization group have the same rank, exchange heartbeat messages, and share probing responsibility. Figure 6: BIG-IP GTM systems in a synchronization group About configuration synchronization Configuration synchronization ensures the rapid distribution of BIG-IP Global Traffic Manager (GTM) settings to other BIG-IP systems that belong to the same synchronization group. A synchronization group might contain both BIG-IP GTM and BIG-IP Link Controller systems. Configuration synchronization occurs in the following manner: When a change is made to a BIG-IP GTM configuration, the system broadcasts the change to the other systems in the configuration synchronization group. When a configuration synchronization is in progress, the process must either complete or timeout, before another configuration synchronization can occur. About adding an additional BIG-IP GTM to your network BIG-IP GTM systems exchange heartbeat messages when different software versions are installed on the systems. However, configuration synchronization cannot occur when different software versions are installed on the systems. Therefore, when you upgrade BIG-IP GTM, the configuration of the upgraded system does not automatically synchronize with the configuration of the systems in the synchronization group that have an older software version. Task summary When adding an additional BIG-IP GTM system to your network, perform the following tasks. Defining an NTP server on the existing GTM Enabling synchronization on the existing GTM 50

51 BIG-IP Global Traffic Manager : Implementations Creating a data center on the existing GTM Defining a server on the existing GTM Running the gtm_add script on the new GTM Defining an NTP server on the existing GTM Define a Network Time Protocol (NTP) server on the existing BIG-IP GTM to ensure that each system in the synchronization group is referencing the same time when verifying configuration file timestamps. 1. On the Main tab, click System > Configuration > Device > NTP. The NTP Device configuration screen opens. 2. In the Time Server Lookup List area, in the Address field, type the IP address of the NTP that you want to add. Then, click Add. Note: If you did not disable DHCP before the first boot of the BIG-IP system, and if the DHCP server provides the information about your NTP server, then this field is automatically populated. 3. Click Update. The NTP server is defined. Enabling synchronization on the existing GTM To ensure that this system can share configuration changes with other systems that you add to the configuration synchronization group, enable synchronization on the existing BIG-IP GTM. 1. On the Main tab, click System > Configuration > Global Traffic > General. The General configuration screen opens. 2. Select the Synchronization check box. 3. In the Synchronization Time Tolerance field, type the maximum number of seconds allowed between the time settings on this system and the other systems in the synchronization group. The lower the value, the more often this system makes a log entry indicating that there is a difference. Tip: If you are using NTP, leave this setting at the default value of 10. In the event that NTP fails, the system uses the time_tolerance variable to maintain synchronization. 4. In the Synchronization Group Name field, type the name of the synchronization group to which you want this system to belong. 5. Click Update. Synchronization is enabled on the existing BIG-IP GTM. Creating a data center on the existing GTM Create a data center on the existing BIG-IP GTM system to represent the location where the new BIG-IP GTM system resides. 1. On the Main tab, click Global Traffic > Data Centers. The Data Center List screen opens. 51

52 Ensuring Correct Synchronization When Adding GTM to a Network 2. Click Create. The New Data Center screen opens. 3. Type a name for the data center. Important: The data center name is limited to 63 characters. 4. In the Location field, type the geographic location of the data center. 5. In the Contact field, type the name of either the administrator or the department that manages the data center. 6. Click Finished. Defining a server on the existing GTM Ensure that a data center where the new BIG-IP GTM system resides exists in the configuration of the existing BIG-IP GTM system. Define a new server, on the existing BIG-IP GTM, to represent the new BIG-IP GTM system. 1. On the Main tab, click Global Traffic > Servers. The Server List screen opens. 2. Click Create. The New Server screen opens. 3. In the Name field, type a name for the server. Important: Server names are limited to 63 characters. 4. From the Product list, select BIG-IP System (Single). The server type determines the metrics that the system can collect from the server. 5. In the Address List area, add the IP address of the server. Important: You must use a self IP address for a BIG-IP system; you cannot use the management IP address. 6. From the Data Center list, select the data center where the server resides. 7. From the Virtual Server Discovery list, select how you want virtual servers to be added to the system. Option Disabled Enabled Enabled (No Delete) 8. Click Create. Description The system does not use the discovery feature to automatically add virtual servers. This is the default value. Use this option for a standalone BIG-IP GTM or for a BIG-IP GTM/LTM combo system when you plan to manually add virtual servers to the system. The system uses the discovery feature to automatically add virtual servers. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover BIG-IP LTM virtual servers. The system uses the discovery feature to automatically add virtual servers and does not delete any virtual servers that already exist. Use this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover BIG-IP LTM virtual servers. 52

53 BIG-IP Global Traffic Manager : Implementations The Server List screen opens displaying the new server in the list. The status of the newly defined BIG-IP GTM system is Unknown, because you have not yet run the gtm_add script. Running the gtm_add script on the new GTM Determine the self IP address of the existing BIG-IP GTM. Run the gtm_add script on the new BIG-IP GTM to acquire the configuration settings on the existing BIG-IP GTM. Note: You must perform this task from the command-line interface. 1. On the new BIG-IP GTM, log in to the command-line interface. 2. At the BASH prompt, type tmsh, and press Enter. 3. At the tmsh prompt, type run gtm gtm_add, and press Enter. 4. Press the y key to start the gtm_add script. 5. Type the IP address of the existing BIG-IP GTM, and press Enter. 6. If prompted, type the root password, and then press Enter. Implementation result The new BIG-IP GTM that you added to the network is a part of a synchronization group. Changes you make to any system in the synchronization group are automatically propagated to all other systems in the group. 53

54

55 Chapter 9 Configuring BIG-IP GTM VIPRION Systems Overview: Configuring BIG-IP GTM VIPRION systems

56 Configuring BIG-IP GTM VIPRION Systems Overview: Configuring BIG-IP GTM VIPRION systems You configure BIG-IP Global Traffic Manager (GTM ) on VIPRION systems in the same manner that you configure BIG-IP GTM on an appliance, with two notable exceptions. You can access BIG-IP Local Traffic Manager (LTM ) irules from within BIG-IP GTM irules. You can also access BIG-IP GTM irules from within BIG-IP LTM irules. It is important to change the general system configuration for virtual server status. Configuring virtual server status for clusters You can configure virtual server status to be dependent only on the timeout value of the monitor associated with the virtual server. This ensures that when the primary blade in a cluster becomes unavailable, the gtmd agent on the new primary blade has time to establish new iquery connections with and receive updated status from other BIG-IP systems. Tip: The big3d agent on the new primary blade must be up and functioning within 90 seconds (the timeout value of the BIG-IP monitor). 1. On the Main tab, click System > Configuration > Global Traffic > General. The General configuration screen opens. 2. Select Depends on Monitors Only from the Virtual Server Status list. 3. Click Update. 56

57 Chapter 10 Setting Up a BIG-IP GTM Redundant System Configuration Overview: Configuring a BIG-IP GTM redundant system Task summary

58 Setting Up a BIG-IP GTM Redundant System Configuration Overview: Configuring a BIG-IP GTM redundant system You can configure BIG-IP Global Traffic Manager (GTM) in a redundant system configuration, which is a set of two BIG-IP GTM systems: one operating as the active unit, the other operating as the standby unit. If the active unit goes offline, the standby unit immediately assumes responsibility for managing DNS traffic. The new active unit remains active until another event occurs that would cause the unit to go offline, or you manually reset the status of each unit. Task summary Perform the following tasks to configure a BIG-IP GTM redundant system configuration. Before you begin, ensure that the Setup utility was run on both devices. During the Setup process, you create VLANs internal and external and the associated floating and non-floating IP addresses, and VLAN HA and the associated non-floating self IP address. You also configure the devices to be in an active-standby redundant system configuration. Defining an NTP server Creating listeners to identify DNS traffic Defining a data center Defining a server Enabling global traffic configuration synchronization Running the gtm_add script Defining an NTP server Define a Network Time Protocol (NTP) server that both BIG-IP GTM systems use during configuration synchronization. Important: Perform the following procedure on both the active and standby systems. 1. On the Main tab, click System > Configuration > Device > NTP. The NTP Device configuration screen opens. 2. In the Time Server Lookup List area, in the Address field, type the IP address of the NTP that you want to add. Then, click Add. Note: If you did not disable DHCP before the first boot of the BIG-IP system, and if the DHCP server provides the information about your NTP server, then this field is automatically populated. 3. Click Update. During configuration synchronization, the systems use this time value to see if any newer configuration files exist. 58

59 BIG-IP Global Traffic Manager : Implementations Creating listeners to identify DNS traffic Create two listeners to identify DNS traffic for which BIG-IP GTM is responsible. Create one listener that uses the UDP protocol and one that uses the TCP protocol. Important: Perform the following procedure on only the active system. Note: DNS zone transfers use TCP port 53. If you do not configure a listener for TCP the client might receive the error: connection refused or TCP RSTs. 1. On the Main tab, click Global Traffic > Listeners. The Listeners List screen opens. 2. Click Create. The new Listeners screen opens. 3. In the Destination field, type the floating IP address of VLAN external. This is the IP address on which BIG-IP GTM listens for network traffic. 4. From the VLAN Traffic list, select All VLANs. 5. From the Protocol list, select UDP. 6. Click Finished. Create another listener with the same IP address, but select TCP from the Protocol list. Defining a data center Create a data center to contain the servers that reside on a subnet of your network. Important: Perform the following procedure on only the active system. 1. On the Main tab, click Global Traffic > Data Centers. The Data Center List screen opens. 2. Click Create. The New Data Center screen opens. 3. Type a name for the data center. Important: The data center name is limited to 63 characters. 4. In the Location field, type the geographic location of the data center. 5. In the Contact field, type the name of either the administrator or the department that manages the data center. 6. From the State list, select Enabled. 7. Click Finished. You can now create server objects and assign them to this data center. Repeat this procedure to create additional data centers. 59

60 Setting Up a BIG-IP GTM Redundant System Configuration Defining a server Ensure that the data centers where the BIG-IP GTM systems exist in the configuration. Using this procedure, create two servers on the active system, one that represents the active system and one that represents the standby system. Important: Perform this procedure on only the active system. 1. On the Main tab, click Global Traffic > Servers. The Server List screen opens. 2. Click Create. The New Server screen opens. 3. In the Name field, type a name for the server. Important: Server names are limited to 63 characters. 4. From the Product list, select BIG-IP System (Redundant). The server type determines the metrics that the system can collect from the server. 5. In the Address List area, add the IP address of the server. Important: You must use a self IP address for a BIG-IP system; you cannot use the management IP address. 6. In the Address List area, add the IP addresses of the back up system using the Peer Address List setting. a) Type an external (public) IP address in the Address field, and then click Add. b) Type an internal (private) IP address in the Translation field, and then click Add. You can add more than one IP address, depending on how the server interacts with the rest of your network. 7. From the Data Center list, select the data center where the server resides. 8. From the Virtual Server Discovery list, select Disabled. 9. From the Link Discovery list, select Disabled. 10. Click Create. The Server List screen opens displaying the new server in the list. Enabling global traffic configuration synchronization Enable global traffic configuration synchronization options and assign a name to the global traffic synchronization group. Important: Perform the following procedure on only the active system. 1. On the Main tab, click System > Configuration > Global Traffic > General. The General configuration screen opens. 2. Select the Synchronization check box. 3. Select the Synchronize DNS Files check box. 4. In the Synchronization Group Name field, type the name of the synchronization group. 60

61 BIG-IP Global Traffic Manager : Implementations 5. Click Update. The settings you selected will be transferred to the standby system during configuration synchronization. Running the gtm_add script You must run the gtm_add script from the standby system. Note: You must perform this task from the command-line interface. 1. On the new BIG-IP GTM, log in to the command-line interface. 2. Type gtm_add, and press Enter. 3. Press the y key to start the gtm_add script. 4. Type the IP address of the existing BIG-IP GTM, and press Enter. The gtm_add script acquires configuration data from the active system; Once this process completes, you have successfully created a redundant system consisting of two BIG-IP GTM systems. 61

62

63 Chapter 11 Configuring GTM on a Network with One Route Domain Overview: How do I deploy BIG-IP GTM on a network with one route domain? Task summary Implementation result

64 Configuring GTM on a Network with One Route Domain Overview: How do I deploy BIG-IP GTM on a network with one route domain? You can deploy BIG-IP Global Traffic Manager (GTM ) on a network where BIG-IP Local Traffic Manager (LTM ) is configured with one route domain and no overlapping IP addresses. Caution: For BIG-IP systems that include both LTM and GTM, you can configure route domains on internal interfaces only. F5 Networks does not support the configuration of route domains on a standalone BIG-IP GTM. Figure 7: BIG-IP GTM deployed on a network in front of a BIG-IP LTM configured with a route domain Task summary BIG-IP GTM can gather status and statistics for the virtual servers hosted on BIG-IP Local Traffic Manager (LTM) systems on your network that are configured on a route domain. The BIG-IP LTM systems must contain: VLANs through which traffic for the route domain passes. A self IP address that represents the address space of the route domain. 64

65 BIG-IP Global Traffic Manager : Implementations Additionally, BIG-IP GTM must contain a server object for each route domain. The server objects must be configured with a self IP address that represents the address space of the route domain. Perform the specified tasks to configure BIG-IP LTM systems with a route domain, and then to configure BIG-IP GTM to be able to monitor these systems. Creating VLANs for a route domain on BIG-IP LTM Creating a route domain on the BIG-IP system Creating a self IP address for a route domain on BIG-IP LTM Defining a server for a route domain on BIG-IP GTM Creating VLANs for a route domain on BIG-IP LTM You need to create two VLANs on BIG-IP Local Traffic Manager (LTM ) through which traffic can pass to a route domain. 1. On the Main tab, click Network > VLANs. The VLAN List screen opens. 2. Click Create. The New VLAN screen opens. 3. In the Name field, type external. 4. In the Tag field, type a numeric tag, from , for the VLAN, or leave the field blank if you want the BIG-IP system to automatically assign a VLAN tag. The VLAN tag identifies the traffic from hosts in the associated VLAN. 5. For the Interfaces setting, from the Available list, click an interface number or trunk name and add the selected interface or trunk to the Untagged list. Repeat this step as necessary. 6. Select the Source Check check box if you want the system to verify that the return route to an initial packet is the same VLAN from which the packet originated. 7. Click Finished. The screen refreshes, and displays the new VLAN in the list. Repeat this procedure, but in Step 3, name the VLAN internal. Creating a route domain on the BIG-IP system Before you create a route domain: Ensure that an external and an internal VLAN exist on the BIG-IP system. If you intend to assign a static bandwidth controller policy to the route domain, you must first create the policy. You can do this using the BIG-IP Configuration utility. Verify that you have set the current partition on the system to the partition in which you want the route domain to reside. You can create a route domain on BIG-IP system to segment (isolate) traffic on your network. Route domains are useful for multi-tenant configurations. 1. On the Main tab, click Network > Route Domains. The Route Domain List screen opens. 2. Click Create. The New Route Domain screen opens. 3. In the Name field, type a name for the route domain. 65

66 Configuring GTM on a Network with One Route Domain This name must be unique within the administrative partition in which the route domain resides. 4. In the ID field, type an ID number for the route domain. This ID must be unique on the BIG-IP system; that is, no other route domain on the system can have this ID. 5. In the Description field, type a description of the route domain. For example: This route domain applies to traffic for application MyApp. 6. For the Strict Isolation setting, select the Enabled check box to restrict traffic in this route domain from crossing into another route domain. 7. For the Parent Name setting, retain the default value. 8. For the VLANs setting, from the Available list, select a VLAN name and move it to the Members list. Select the VLAN that processes the application traffic relevant to this route domain. Configuring this setting ensures that the BIG-IP system immediately associates any self IP addresses pertaining to the selected VLANs with this route domain. 9. For the Dynamic Routing Protocols setting, from the Available list, select one or more protocol names and move them to the Enabled list. You can enable any number of listed protocols for this route domain. This setting is optional. 10. From the Bandwidth Controller list, select a static bandwidth control policy to enforce a throughput limit on traffic for this route domain. 11. From the Partition Default Route Domain list, select either Another route domain (0) is the Partition Default Route Domain or Make this route domain the Partition Default Route Domain. This setting does not appear if the current administrative partition is partition Common. When you configure this setting, either route domain 0 or this route domain becomes the default route domain for the current administrative partition. 12. Click Finished. The system displays a list of route domains on the BIG-IP system. You now have another route domain on the BIG-IP system. Creating a self IP address for a route domain on BIG-IP LTM Ensure that external and internal VLANs exist on BIG-IP LTM, before you begin creating a self IP address for a route domain. Create a self IP address on BIG-IP LTM that resides in the address space of the route domain. 1. On the Main tab, click Network > Self IPs. The Self IPs screen opens. 2. Click Create. The New Self IP screen opens. 3. In the IP Address field, type an IP address. This IP address must represent a self IP address in a route domain. Use the format x.x.x.x%n, where n is the route domain ID, for example, %1. The system accepts IPv4 and IPv6 addresses. 4. In the Netmask field, type the network mask for the specified IP address. 5. From the VLAN/Tunnel list, select external. 6. From the Port Lockdown list, select Allow Default. 7. Click Finished. 66

67 BIG-IP Global Traffic Manager : Implementations The screen refreshes, and displays the new self IP address in the list. Repeat this procedure, but in Step 5, select VLAN internal. Defining a server for a route domain on BIG-IP GTM Ensure that at least one data center exists in the configuration. On a BIG-IP GTM system, define a server that represents the route domain. 1. On the Main tab, click Global Traffic > Servers. The Server List screen opens. 2. Click Create. The New Server screen opens. 3. In the Name field, type a name for the server. Important: Server names are limited to 63 characters. 4. From the Product list, select either BIG-IP System (Single) or BIG-IP System (Redundant). The server type determines the metrics that the system can collect from the server. 5. In the Address List area, add the self IP address that you assigned to the VLAN that you assigned to the route domain. Important: Do not include the route domain ID in this IP address. Use the format x.x.x.x, for example, From the Data Center list, select the data center where the server resides. 7. In the Health Monitors area, assign the bigip monitor to the server by moving it from the Available list to the Selected list. 8. From the Virtual Server Discovery list, select how you want virtual servers to be added to the system. Virtual server discovery is supported when you have only one route domain. Option Disabled Enabled Enabled (No Delete) Description Use this option when you plan to manually add virtual servers to the system. The system automatically adds virtual servers using the discovery feature. The system uses the discovery feature and does not delete any virtual servers that already exist. 9. Click Create. The Server List screen opens displaying the new server in the list. Implementation result You now have an implementation in which BIG-IP GTM can monitor virtual servers on BIG-IP LTM systems configured with one route domain. 67

68

69 Chapter 12 Configuring GTM on a Network with Multiple Route Domains Overview: How do I deploy BIG-IP GTM on a network with multiple route domains? Task summary Implementation result

70 Configuring GTM on a Network with Multiple Route Domains Overview: How do I deploy BIG-IP GTM on a network with multiple route domains? You can deploy BIG-IP Global Traffic Manager (GTM) on a network where BIG-IP Local Traffic Manager (LTM ) systems are configured with multiple route domains and overlapping IP addresses. Important: On a network with route domains, you must ensure that virtual server discovery (autoconf) is disabled, because virtual server discovery does not discover translation IP addresses. Caution: For BIG-IP systems that include both LTM and GTM, you can configure route domains on internal interfaces only. F5 Networks does not support the configuration of route domains on a standalone BIG-IP GTM. The following figure shows BIG-IP GTM deployed in a network with multiple BIG-IP Local Traffic Manager (LTM ) systems configured with the default route domain (zero), and two additional route domains. BIG-IP GTM can monitor the Application1 and Application2 servers that have overlapping IP addresses and reside in different route domains. The firewalls perform the required address translation between the BIG-IP GTM and BIG-IP LTM addresses; you must configure the firewalls to segment traffic and avoid improperly routing packets between route domain 1 and route domain 2. 70

71 BIG-IP Global Traffic Manager : Implementations Figure 8: BIG-IP GTM deployed on a network with multiple route domains Task summary Before BIG-IP GTM can gather status and statistics for the virtual servers hosted on BIG-IP LTM systems on your network that are configured with route domains, you must configure the following on each BIG-IP LTM that handles traffic for route domains: VLANs through which traffic for your route domains passes Route domains that represent each network segment Self IP addresses that represent the address spaces of the route domains Additionally, on BIG-IP GTM you must: Configure, for each route domain, a server object with virtual server discovery disabled Disable virtual server discovery globally 71

72 Configuring GTM on a Network with Multiple Route Domains Perform the following tasks to configure BIG-IP GTM to monitor BIG-IP LTM systems with route domains. Creating VLANs for a route domain on BIG-IP LTM Creating a route domain on BIG-IP LTM Creating a self IP address for a route domain on BIG-IP LTM Disabling auto-discovery at the global-level on BIG-IP GTM Defining a server for a route domain on BIG-IP GTM Creating VLANs for a route domain on BIG-IP LTM Create two VLANs on BIG-IP LTM through which traffic can pass to a route domain. 1. On the Main tab, click Network > VLANs. The VLAN List screen opens. 2. Click Create. The New VLAN screen opens. 3. In the Name field, type external. 4. In the Tag field, type a numeric tag, from , for the VLAN, or leave the field blank if you want the BIG-IP system to automatically assign a VLAN tag. The VLAN tag identifies the traffic from hosts in the associated VLAN. 5. For the Interfaces setting, from the Available list, click an interface number or trunk name and add the selected interface or trunk to the Untagged list. Repeat this step as necessary. 6. Select the Source Check check box if you want the system to verify that the return route to an initial packet is the same VLAN from which the packet originated. 7. Click Finished. The screen refreshes, and displays the new VLAN in the list. Repeat this procedure, but in Step 3, name the second VLAN internal. Creating a route domain on BIG-IP LTM Ensure that VLANs exist on BIG-IP LTM, before you create a route domain. You can create a route domain on a BIG-IP system to segment (isolate) network traffic on your network. 1. On the Main tab, click Network > Route Domains. The Route Domain List screen opens. 2. Click Create. The New Route Domain screen opens. 3. In the ID field, type an ID number for the route domain. This ID must be unique on the BIG-IP system; that is, no other route domain on the system can have this ID. 4. In the Description field, type a description of the route domain. For example: This route domain applies to traffic for application MyApp. 5. For the Strict Isolation setting, select the Enabled check box to restrict traffic in this route domain from crossing into another route domain. 6. For the Parent Name setting, retain the default value. 7. For the VLANs setting, move the external and internal VLANs from the Available list, to the Members list. 72

73 BIG-IP Global Traffic Manager : Implementations Configuring this setting ensures that the BIG-IP system immediately associates any self IP addresses pertaining to the selected VLANs with this route domain. 8. Click Finished. The system displays a list of route domains on the BIG-IP system. Create additional route domains based on your network configuration. Creating a self IP address for a route domain on BIG-IP LTM Ensure that VLANs exist on BIG-IP LTM, before you begin creating a self IP address for a route domain. Create a self IP address on the BIG-IP system that resides in the address space of the route domain. 1. On the Main tab, click Network > Self IPs. The Self IPs screen opens. 2. Click Create. The New Self IP screen opens. 3. In the IP Address field, type an IP address. This IP address must represent a self IP address in a route domain. Use the format x.x.x.x%n, where n is the route domain ID, for example, %1. The system accepts IPv4 and IPv6 addresses. 4. In the Netmask field, type the network mask for the specified IP address. 5. From the VLAN/Tunnel list, select the VLAN that you assigned to the route domain that contains this self IP address. 6. From the Port Lockdown list, select Allow Default. 7. Click Finished. The screen refreshes, and displays the new self IP address in the list. Create additional self IP addresses based on your network configuration. Disabling auto-discovery at the global-level on BIG-IP GTM On BIG-IP GTM, disable auto-discovery at the global-level. 1. On the Main tab, click System > Configuration > Global Traffic > General. The general Configuration screen opens. 2. Clear the Auto-Discovery check box. 3. Click Update. Defining a server for a route domain on BIG-IP GTM Ensure that at least one data center exists in the configuration. On BIG-IP GTM, define a server that represents the route domain. 1. On the Main tab, click Global Traffic > Servers. The Server List screen opens. 2. Click Create. 73

74 Configuring GTM on a Network with Multiple Route Domains The New Server screen opens. 3. In the Name field, type a name for the server. Important: Server names are limited to 63 characters. 4. From the Product list, select either BIG-IP System (Single) or BIG-IP System (Redundant). The server type determines the metrics that the system can collect from the server. 5. In the Address List area, add the self IP address that you assigned to the VLAN that you assigned to the route domain. Important: Do not include the route domain ID in this IP address. Use the format x.x.x.x, for example, From the Data Center list, select the data center where the server resides. 7. From the Prober Pool list, select one of the following. Option Description Inherit from Data Center Prober pool name By default, a server inherits the Prober pool assigned to the data center in which the server resides. Select the Prober pool that contains the BIG-IP systems that you want to perform monitor probes of this server. Note: The selected Prober pool must reside in the same route domain as the servers you want the pool members to probe. 8. In the Health Monitors area, assign the bigip monitor to the server by moving it from the Available list to the Selected list. 9. From the Virtual Server Discovery list, select Disabled. 10. Click Create. The New Server screen opens. Implementation result You now have an implementation in which BIG-IP GTM monitors BIG-IP LTM virtual servers on the various route domains in your network. 74

75 Chapter 13 Authenticating with SSL Certificates Signed by a Third Party Overview: Authenticating with SSL certificates signed by a third party Configuring Level 1 SSL authentication Implementation Results Configuring certificate chain SSL authentication Implementation result

76 Authenticating with SSL Certificates Signed by a Third Party Overview: Authenticating with SSL certificates signed by a third party BIG-IP systems use Secure Sockets Layer (SSL) authentication to verify the authenticity of the credentials of systems with which data exchange is necessary. BIG-IP software includes a self-signed SSL certificate. If your network includes one or more certificate authority (CA) servers, you can also install SSL certificates that are signed by a third party. The BIG-IP systems exchange SSL certificates, and use a CA server to verify the authenticity of the certificates. The big3d agent on all BIG-IP systems and the gtmd agent on BIG-IP Global Traffic Manager (GTM ) systems use the certificates to authenticate communication between the systems. About SSL authentication levels SSL supports ten levels of authentication (also known as certificate depth): Level 0 certificates (self-signed certificates) are verified by the system to which they belong. Level 1 certificates are authenticated by a CA server that is separate from the system. Levels 2-9 certificates are authenticated by additional CA servers that verify the authenticity of other servers. These multiple levels of authentication (referred to as certificate chains) allow for a tiered verification system that ensures that only authorized communications occur between servers. Configuring Level 1 SSL authentication You can configure BIG-IP systems for Level 1 SSL authentication. Before you begin, ensure that the systems you are configuring include the following: A signed certificate/key pair. The root certificate from the CA server. Task Summary Importing the device certificate Importing the root certificate for the gtmd agent Importing the root certificate for the big3d agent Verifying the certificate exchange Importing the device certificate To configure the BIG-IP system for Level 1 SSL authentication, import the device certificate signed by the CA server. Note: Perform this procedure on all BIG-IP systems that you want to handle Level 1 SSL authentication. 1. On the Main tab, click System > Device Certificates. The Device Certificate screen opens. 2. Click Import. 76

77 BIG-IP Global Traffic Manager : Implementations 3. From the Import Type list, select Certificate and Key. 4. For the Certificate Source setting, select Upload File and browse to select the certificate signed by the CA server. 5. For the Key Source setting, select Upload File and browse to select the device key file. 6. Click Import. Importing the root certificate for the gtmd agent Before you start this procedure, ensure that you have the root certificate from your CA server available. To set up the system to use a third-party certificate signed by a CA server, replace the existing certificate file for the gtmd agent with the root certificate of your CA server. Note: Perform this procedure on only one BIG-IP GTM system in the synchronization group. The system automatically synchronizes the setting with the other systems in the group. 1. On the Main tab, click Global Traffic > Servers > Trusted Server Certificates. The Trusted Server Certificates screen opens. 2. Click Import. 3. From the Import Method list, select Replace. 4. For the Certificate Source setting, select Upload File and browse to select the root certificate file. 5. Click Import. Importing the root certificate for the big3d agent Before you start this procedure, ensure that the root certificate from your CA server is available. Note: Perform this procedure on all BIG-IP systems that you want to configure for Level 1 SSL authentication. 1. On the Main tab, click System > Device Certificates > Trusted Device Certificates. The Trusted Device Certificates screen opens. 2. Click Import. 3. From the Import Method list, select Replace. 4. For the Certificate Source setting, select Upload File and browse to select the certificate signed by the CA server. 5. Click Import. Verifying the certificate exchange You can verify that you installed the certificate correctly, by running the following commands on all BIG-IP systems that you configured for Level 1 SSL authentication. iqdump <IP address of BIG-IP you are testing> iqdump <IP address of BIG-IP peer system, if testing a redundant system configuration> 77

78 Authenticating with SSL Certificates Signed by a Third Party If the certificate was installed correctly, these commands display a continuous stream of information. Implementation Results The BIG-IP systems are now configured for Level 1 SSL authentication. Configuring certificate chain SSL authentication You can configure BIG-IP systems for certificate chain SSL authentication. Task Summary Creating a certificate chain file Importing the device certificate from the last CA server in the chain Importing a certificate chain file for the gtmd agent Importing a certificate chain for the big3d agent Verifying the certificate chain exchange Creating a certificate chain file Before you start this procedure, ensure that you have the certificate files from your CA servers available. Create a certificate chain file that you can use to replace the existing certificate file. 1. Using a text editor, create an empty file for the certificate chain. 2. Still using a text editor, copy an individual certificate from its own certificate file and paste the certificate into the file you created in step Repeat step 2 for each certificate that you want to include in the certificate chain. You now have a certificate chain file. Importing the device certificate from the last CA server in the chain Import the device certificate signed by the last CA in the certificate chain. Note: Perform this procedure on all BIG-IP systems that you want to configure for certificate chain SSL authentication. 1. On the Main tab, click System > Device Certificates. The Device Certificate screen opens. 2. Click Import. 3. From the Import Type list, select Certificate and Key. 4. For the Certificate Source setting, select Upload File and browse to select the certificate signed by the CA server. 5. For the Key Source setting, select Upload File and browse to select the device key file. 78

79 BIG-IP Global Traffic Manager : Implementations 6. Click Import. Importing a certificate chain file for the gtmd agent Before you start this procedure, ensure that you have the certificate chain file available. Replace the existing certificate file on the system with a certificate chain file. Note: Perform this procedure on only one BIG-IP GTM in a synchronization group. The system automatically synchronizes the setting with the other systems in the group. 1. On the Main tab, click Global Traffic > Servers > Trusted Server Certificates. The Trusted Server Certificates screen opens. 2. Click Import. 3. From the Import Method list, select Replace. 4. For the Certificate Source setting, select Upload File and browse to select the device certificate for the last CA in the certificate chain. 5. Click Import. Importing a certificate chain for the big3d agent Before you start this procedure, ensure that the certificate chain file is available. Note: Perform this procedure on all BIG-IP systems that you want to configure for certificate chain SSL authentication. 1. On the Main tab, click System > Device Certificates > Trusted Device Certificates. The Trusted Device Certificates screen opens. 2. Click Import. 3. From the Import Method list, select Replace. 4. For the Certificate Source setting, select Upload File and browse to select the certificate chain file. 5. Click Import. Verifying the certificate chain exchange You can verify that you installed the certificate chain correctly, by running the following commands on all the systems you configure for certificate chain SSL authentication. iqdump <IP address of BIG-IP you are testing> iqdump <IP address of BIG-IP peer system, if testing a redundant system configuration> If the certificate chain was installed correctly, these commands display a continuous stream of information. 79

80 Authenticating with SSL Certificates Signed by a Third Party Implementation result The BIG-IP systems are now configured for certificate chain SSL authentication. For information about troubleshooting BIG-IP device certificates, see SOL8187 on AskF5.com ( 80

81 Chapter 14 Configuring the Save Interval for GTM Configuration Changes Overview: Configuring the interval at which GTM saves configuration changes Task summary Implementation result

82 Configuring the Save Interval for GTM Configuration Changes Overview: Configuring the interval at which GTM saves configuration changes By default, configuration changes to the BIG-IP Global Traffic Manager (GTM ) are saved every 15 seconds. The changes are saved in the bigip_gtm.conf file. You can change how often GTM saves configuration changes. Task summary Perform this task to configure the interval at which GTM automatically saves configuration changes. Configuring the Save Interval for GTM Configuration Changes Configuring the GTM save interval Configuring the GTM save interval Ensure that GTM is provisioned, and that your user role provides access to tmsh. Configure the BIG-IP GTM system to automatically save configuration changes made in the Configuration utility and tmsh at a user-specified interval. 1. Log on to the command-line interface of the BIG-IP system. 2. At the BASH prompt, type tmsh. 3. At the tmsh prompt, type modify gtm global-settings general automatic-configuration-save-timeout <desired automatic save interval in seconds>, and then press Enter. The following options are worth noting: 0 (zero) = immediately save changes -1 = never save changes = maximum interval between automatic saves 15 = default interval between automatic saves Warning: Setting automatic-configuration-save-timeout to less than 10 seconds can impact system performance. Implementation result You now have an implementation in which the BIG-IP system automatically saves GTM configuration changes at an interval you specified. 82

83 Chapter 15 Configuring a TTL in a DNS NoError Response Overview: Configuring a TTL in an IPv6 DNS NoError Response About SOA records and negative caching Task summary Implementation result

84 Configuring a TTL in a DNS NoError Response Overview: Configuring a TTL in an IPv6 DNS NoError Response You can configure BIG-IP GTM to return IPv6 DNS NoError responses that include a TTL. This allows local DNS servers to cache the negative response. Negative caching reduces both the response time for negative DNS responses and the number of messages that must be sent between resolvers and local DNS servers. About SOA records and negative caching A start of authority SOA record contains a TTL that allows a local DNS server to cache a DNS NoError response to an IPv6 query. Task summary You can configure GTM to provide a negative caching TTL for a domain name by performing these specific tasks. Configuring a TTL in a DNS NoError Response Creating a pool Creating a wide IP that provides for negative caching Creating a pool Ensure that at least one virtual server exists in the configuration before you start to create a load balancing pool. Create a pool to which the system can load balance global traffic. 1. On the Main tab, click Global Traffic > Pools. The Pools list screen opens. 2. Click Create. 3. Type a name for the pool. Names must begin with a letter, and can contain only letters, numbers, and the underscore (_) character. Important: The pool name is limited to 63 characters. 4. Add virtual servers as members of this load balancing pool. The system evaluates the virtual servers (pool members) in the order in which they are listed. A virtual server can belong to more than one pool. a) Select a virtual server from the Virtual Server list. b) Click Add. 5. Click Finished. 84

85 BIG-IP Global Traffic Manager : Implementations Creating a wide IP that provides for negative caching Ensure that at least one global load balancing pool exists in the configuration before you create a wide IP. Create a wide IP configured in a manner where GTM returns an SOA record, containing a TTL with an IPv6 DNS NoError response. This allows the local DNS servers to cache the negative response, and thus provide faster responses to DNS queries. 1. On the Main tab, click Global Traffic > Wide IPs. The Wide IPs List screen opens. 2. Click Create. The New Wide IP screen opens. 3. From the General Properties list, select Advanced. This selection allows you to modify additional default settings. 4. In the Name field, type a name for the wide IP. Tip: You can use two different wildcard characters in the wide IP name: asterisk (*) to represent several characters and question mark (?) to represent a single character. This reduces the number of aliases you have to add to the configuration. 5. From the IPv6 NoError Response list, select Enabled. With this option enabled, the system responds faster to IPv6 requests for which it does not have AAAA records configured. 6. In the IPv6 NoError TTL field, type the number of seconds that the local DNS servers consider the IPv6 NoError response to be valid. When you set this value, you must enable the IPv6 NoError Response setting as well. 7. From the Pool list, select the pools that this wide IP uses for load balancing. The system evaluates the pools based on the wide IP load balancing method configured. a) From the Pool list, select a pool. A pool can belong to more than one wide IP. b) Click Add. 8. Click Finished. Implementation result You now have an implementation in which GTM returns a TTL in an IPv6 DNS NoError response for a web site represented by a wide IP in the GTM configuration. 85

86

87 Chapter 16 Configuring DNS64 Overview: Configuring DNS64 Task summary Implementation result

88 Configuring DNS64 Overview: Configuring DNS64 You can configure BIG-IP Local Traffic Manager (LTM) and BIG-IP Global Traffic Manager (GTM) systems to handle IPv6-only client connection requests to IPv4-only servers on your network by returning an AAAA record response to the client. Figure 9: Mapping IPv6 addresses to IPv4 addresses Task summary Perform these tasks to configure DNS64 on a BIG-IP system. Creating a custom DNS profile Assigning a DNS profile to a virtual server Creating a custom DNS profile You can create a custom DNS profile to configure how the BIG-IP system handles DNS connection requests. 1. On the Main tab, click Local Traffic > Profiles > Services > DNS. The DNS profile list screen opens. 2. Click Create. The New DNS profile screen opens. 3. In the Name field, type a unique name for the profile. 4. In the Parent Profile list, accept the default dns profile. 5. Select the Custom check box. 6. In the Global Traffic Management list, accept the default value Enabled. 7. From the DNS IPv6 to IPv4 list, select how you want the system to handle IPv6 to IPv4 address mapping in DNS queries and responses. 88

89 BIG-IP Global Traffic Manager : Implementations Option Disabled Description The BIG-IP system does not map IPv4 addresses to IPv6 addresses. Immediate The BIG-IP system receives an AAAA query and forwards the query to a DNS server. The BIG-IP system then forwards the first good response from the DNS server to the client. If the system receives an A response first, it appends a 96-bit prefix to the record and forwards it to the client. If the system receives an AAAA response first, it simply forwards the response to the client. The system disregards the second response from the DNS server. Secondary The BIG-IP system receives an AAAA query and forwards the query to a DNS server. Only if the server fails to return a response does the BIG-IP system send an A query. If the BIG-IP system receives an A response, it appends a 96-bit user-configured prefix to the record and forwards it to the client. v4 Only The BIG-IP system receives an AAAA query, but forwards an A query to a DNS server. After receiving an A response from the server, the BIG-IP system appends a 96-bit user-configured prefix to the record and forwards it to the client. Important: Select this option only if you know that all your DNS servers are IPv4 only servers. If you selected Immediate, Secondary, or V4 Only two new fields display. 8. In the IPv6 to IPv4 Prefix field, specify the prefix the BIG-IP system appends to all A query responses to an IPv6 request. 9. From the IPv6 to IPv4 Additional Section Rewrite list, select an option to allow improved network efficiency for both Unicast and Multicast DNS-SD responses. Option Disabled v4 Only v6 Only Any Description The BIG-IP system does not perform additional rewrite. The BIG-IP system accepts only A records. The system appends the 96-bit user-configured prefix to a record and returns an IPv6 response to the client. The BIG-IP system accepts only AAAA records and returns an IPv6 response to the client. The BIG-IP system accepts and returns both A and AAAA records. If the DNS server returns an A record in the Additional section of a DNS message, the BIG-IP system appends the 96-bit user-configured prefix to the record and returns an IPv6 response to the client. 10. From the Use BIND Server on BIG-IP list, select Enabled. Note: Enable this setting only when you want the system to forward non-wide IP queries to the local BIND server on BIG-IP GTM. 11. Click Finished. Assigning a DNS profile to a virtual server 1. On the Main tab, click Local Traffic > Virtual Servers. The Virtual Server List screen opens. 2. Click the name of the virtual server you want to modify. 89

90 Configuring DNS64 3. From the DNS Profile list, select the profile you created to manage IPv6 to IPv4 address mapping. 4. Click Update. This virtual server can now pass traffic between an IPv6-only client and an IPv4-only DNS server. Implementation result You now have an implementation of DNS64 on the BIG-IP system. 90

91 Chapter 17 Configuring DNSSEC Overview: Configuring DNSSEC Task summary Implementation result

92 Configuring DNSSEC Overview: Configuring DNSSEC You can use BIG-IP Global Traffic Manager (GTM ) to ensure that all responses to DNS-related traffic comply with the DNSSEC security protocol. To configure DNSSEC compliance, you create DNSSEC key-signing and zone-signing keys and a DNSSEC zone. Then you assign at least one enabled key-signing key and one enabled zone-signing key to the zone. Figure 10: Traffic flow when BIG-IP GTM is DNSSEC authoritative nameserver How do I prepare for a manual rollover of a DNSSEC key? When you create DNSSEC key-signing keys and DNSSEC zone-signing keys, it is important to create a disabled standby version of each key that has a similar name. To do so, associate both pairs of keys with the same zone. This prepares you to easily perform a manual rollover of the keys should an enabled key become compromised. About enhancing DNSSEC key security To enhance DNSSEC key security, BIG-IP Global Traffic Manager (GTM ) uses an automatic key rollover process that uses overlapping generations of a key to ensure that BIG-IP GTM can always respond to queries with DNSSEC-compliant responses. BIG-IP GTM dynamically creates new generations of each key based on the values of the Rollover Period and Expiration Period of the key. The first generation of a key has an ID of 0 (zero). Each time BIG-IP GTM dynamically creates a new generation of a key, the ID increments by one. Over time, each generation of a key overlaps the previous generation of the key. When a generation of a key expires, BIG-IP GTM automatically removes that generation of the key from the configuration. The value of the TTL (time-to-live) of a key specifies how long a client resolver can cache the key. 92

93 BIG-IP Global Traffic Manager : Implementations Figure 11: Overlapping generations of a key Task summary Perform these tasks on BIG-IP GTM to secure your DNS infrastructure. Creating listeners to identify DNS traffic Creating DNSSEC key-signing keys Creating DNSSEC zone-signing keys Creating DNSSEC zones Confirming that GTM is signing DNSSEC records Viewing DNSSEC records in ZoneRunner Creating listeners to identify DNS traffic Create two listeners to identify DNS traffic for which BIG-IP GTM is responsible. Create one listener that uses the UDP protocol and one that uses the TCP protocol. Note: DNS zone transfers use TCP port 53. If you do not configure a listener for TCP the client might receive the error: connection refused or TCP RSTs. 1. On the Main tab, click Global Traffic > Listeners. The Listeners List screen opens. 2. Click Create. The new Listeners screen opens. 93

94 Configuring DNSSEC 3. In the Destination field, type the IP address on which BIG-IP GTM listens for network traffic. The destination is a self IP address on BIG-IP GTM. 4. Click Finished. Create another listener with the same IP address, but select TCP from the Protocol list. Creating DNSSEC key-signing keys Ensure that the time setting on GTM is synchronized with the NTP servers on your network. This ensures that each GTM in a synchronization group is referencing the same time when generating keys. Determine the values you want to configure for the rollover period, expiration period, and TTL of the key, using the following criteria: The amount of time required to send the DS records for the zone to which this key is associated to the organization that manages the parent zone. The value of the rollover period must be greater than half the value of the expiration period, as well as less than the value of the expiration period. The difference between the values of the rollover and expiration periods must be more than the value of the TTL. Note: The values recommended in this procedure are based on the values in the NIST Secure Domain Name System (DNS) Deployment Guide. Create key-signing keys for BIG-IP GTM to use in the DNSSEC authentication process. 1. On the Main tab, click Global Traffic > DNSSEC Key List. The DNSSEC Key List screen opens. 2. Click Create. The New DNSSEC Key screen opens. 3. In the Name field, type a name for the key. Zone names are limited to 63 characters. 4. From the Algorithm list, select the algorithm the system uses to create the key. Your options are RSA/SHA1, RSA/SHA256, and RSA/SHA In the Bit Width field, type From the Use FIPS list, if your system has a FIPS hardware security module (HSM), select Enabled. 7. From the Type list, select Key Signing Key. 8. From the State list, select Enabled. 9. In the TTL field, accept the default value of (the number of seconds in one day.) This value specifies how long a client resolver can cache the key. This value must be less than the difference between the values of the rollover and expiration periods of the key; otherwise, a client can make a query and the system can send a valid key that the client cannot recognize. 10. For the Rollover Period setting, in the Days field, type For the Expiration Period setting, in the Days field, type 365. Zero seconds indicates not set, and thus the key does not expire. Tip: The National Institute of Standards and Technology (NIST) recommends that a key-signing key expire once a year. 12. For the Signature Validity Period setting, accept the default value of seven days. 94

95 BIG-IP Global Traffic Manager : Implementations This value must be greater than the value of the signature publication period. Zero seconds indicates not set, and thus the server verifying the signature never succeeds, because the signature is always expired. 13. For the Signature Publication Period setting, accept the default value of four days and 16 hours. This value must be less than the value of the signature validity period. Zero seconds indicates not set, and thus the signature is not cached. 14. Click Finished. 15. To create a standby key for emergency rollover purposes, repeat this procedure using a similar name, and select Disabled from the State list. Creating DNSSEC zone-signing keys Ensure that the time setting on GTM is synchronized with the NTP servers on your network. This ensures that each GTM in a synchronization group is referencing the same time when generating keys. Determine the values you want to configure for the rollover period, expiration period, and TTL of the key, using the following criteria: The amount of time required to send the DS records for the zone to which this key is associated to the organization that manages the parent zone. The value of the rollover period must be greater than half the value of the expiration period, as well as less than the value of the expiration period. The difference between the values of the rollover and expiration periods must be more than the value of the TTL. Note: The values recommended in this procedure are based on the values in the NIST Secure Domain Name System (DNS) Deployment Guide. Create zone-signing keys for BIG-IP GTM to use in the DNSSEC authentication process. 1. On the Main tab, click Global Traffic > DNSSEC Key List. The DNSSEC Key List screen opens. 2. Click Create. The New DNSSEC Key screen opens. 3. In the Name field, type a name for the key. Zone names are limited to 63 characters. 4. In the Bit Width field, type From the Use FIPS list, if your system has a FIPS hardware security module (HSM), select Enabled. 6. From the Type list, select Zone Signing Key. 7. From the State list, select Enabled. 8. In the TTL field, accept the default value of (the number of seconds in one day.) This value specifies how long a client resolver can cache the key. This value must be less than the difference between the values of the rollover and expiration periods of the key; otherwise, a client can make a query and the system can send a valid key that the client cannot recognize. 9. For the Rollover Period setting, in the Days field, type For the Expiration Period setting, in the Days field, type 30. Zero seconds indicates not set, and thus the key does not expire. 11. For the Signature Validity Period setting, accept the default value of seven days. 95

96 Configuring DNSSEC This value must be greater than the value of the signature publication period. Zero seconds indicates not set, and thus the server verifying the signature never succeeds, because the signature is always expired. 12. For the Signature Publication Period setting, accept the default value of four days and 16 hours. This value must be less than the value of the signature validity period. Zero seconds indicates not set, and thus the signature is not cached. 13. Click Finished. 14. To create a standby key for emergency rollover purposes, repeat this procedure using a similar name, and select Disabled from the State list. Creating DNSSEC zones Before BIG-IP GTM can sign zone requests, you must assign at least one enabled zone-signing and one enabled key-signing key to the zone. 1. On the Main tab, click Global Traffic > DNSSEC Zone List. The DNSSEC Zone List screen opens. 2. Click Create. The New DNSSEC Zone screen opens. 3. In the Name field, type a domain name. For example, use a zone name of siterequest.com to handle DNSSEC requests for and *. 4. From the State list, select Enabled. 5. For the Zone Signing Key setting, assign at least one enabled zone-signing key to the zone. You can associate the same zone-signing key with multiple zones. 6. For the Key Signing Key setting, assign at least one enabled key-signing key to the zone. You can associate the same key-signing key with multiple zones. 7. Click Finished. Even if you selected Enabled from the State list, if there are not at least one zone-signing and one key-signing key in the Active column, the status of the zone changes to offline. 8. Upload the DS records for this zone to the organization that manages the parent zone. The administrators of the parent zone sign the DS record with their own key and upload it to their zone. You can find the DS records in the file /config/gtm/dsset-[dnssec.zone.name] (where zone is the name of the zone you are configuring). 9. Upload the DS records for this zone to the organization that manages the parent zone. The administrators of the parent zone sign the DS record with their own key and upload it to their zone. You can find the DS records in the file /config/gtm/dsset-[dnssec.zone.name] (where zone is the name of the zone you are configuring). Upload the DS records for this zone to the organization that manages the parent zone. The administrators of the parent zone sign the DS record with their own key and upload it to their zone. You can find the DS records in the file /config/gtm/dsset-[dnssec.zone.name] (where zone is the name of the zone you are configuring). 96

97 BIG-IP Global Traffic Manager : Implementations Confirming that GTM is signing DNSSEC records After you create DNSSEC zones and zone-signing keys, you can confirm that GTM is signing the DNSSEC records. 1. Log on to the command-line interface of a client. 2. At the prompt, type: address of GTM listener> +dnssec siterequest.com GTM returns the signed RRSIG records for the zone. Viewing DNSSEC records in ZoneRunner Ensure that all DNSSEC records are added to the BIND configuration. View the DNSSEC records using ZoneRunner. 1. On the Main tab, click Global Traffic > ZoneRunner > Resource Record List. The Resource Record List screen opens. 2. From the View Name list, select the name of the view that contains the resource records you want to view. 3. From the Zone Name list, select the zone for which you want to view resource records. 4. From the Type list, select the type of resource records you want to view. 5. Click Search. View the resource records that display. Implementation result BIG-IP GTM is now configured to respond to DNS queries with DNSSEC-compliant responses. 97

98

99 Chapter 18 Configuring DNS Express How do I configure DNS Express? Task summary Implementation result

100 Configuring DNS Express How do I configure DNS Express? You can configure DNS Express on BIG-IP systems to mitigate distributed denial-of-service attacks (DDoS) and increase the volume of DNS request resolutions on both the local BIND server on the BIG-IP system and any back-end DNS servers. What is DNS Express? DNS Express provides the ability for a BIG-IP system to act as a high-speed, authoritative secondary DNS server. This makes if possible for the system to: Perform zone transfers from multiple primary DNS servers that are responsible for different zones. Perform a zone transfer from the local BIND server on the BIG-IP system. Serve DNS records faster than the primary DNS servers. Task summary Perform these tasks to configure DNS Express on your BIG-IP system. Configuring a back-end DNS server to allow zone file transfers Creating a DNS Express TSIG key Creating a DNS Express zone Enabling DNS Express Assigning a DNS profile to a listener Viewing information about DNS Express zones Configuring a back-end DNS server to allow zone file transfers If you are unfamiliar with how to modify DNS server files, review the fifth edition of DNS and BIND, available from O Reilly Media. To configure a back-end DNS server to allow zone file transfers to the BIG-IP system, add to the DNS server an allow-transfer statement that specifies a self IP address on the BIG-IP system. You can modify the following allow-transfer statement to use a self IP address on the BIG-IP system: allow-transfer { localhost; <self IP address of BIG-IP system>; }; Creating a DNS Express TSIG key Ensure that your back-end DNS servers are configured for zone file transfers using TSIG keys. 100

101 BIG-IP Global Traffic Manager : Implementations When you want to verify the identity of the authoritative server that is sending information about the zone, create a DNS Express TSIG key. Note: This step is optional. 1. On the Main tab, click Local Traffic > DNS Express Zones > DNS Express TSIG Key List. The DNS Express TSIG Key List screen opens. 2. Click Create. The New DNS Express TSIG Key screen opens. 3. In the Name field, type a name for the key. 4. From the Algorithm list, select one of the following. The system uses the algorithm that you select to authenticate updates from an approved client and responses from an approved recursive nameserver. The algorithm is a hash function in combination with the secret key. Algorithm Name HMAC MD5 HMAC SHA-1 HMAC SHA-256 Description Produces a 128-bit hash sequence Produces a 160-bit hash sequence Produces a 256-bit hash sequence 5. In the Secret field, type the phrase required for authentication of the key. Note: The secret key is created by a third party tool such as BIND s keygen utility. 6. Click Finished. Creating a DNS Express zone If you are using back-end DNS servers, ensure that those servers are configured for zone transfers. To implement DNS Express on a BIG-IP system, create a DNS Express zone. 1. On the Main tab, click Local Traffic > DNS Express Zones > DNS Express Zone List. The DNS Express Zone List screen opens. 2. Click Create. The New DNS Express Zone screen opens. 3. In the Name field, type a name for the DNS Express zone. 4. In the Target IP Address field, type the IP address of the current master DNS server for the zone from which you want to transfer records. The default value is for the BIND server on the BIG-IP system. 5. To configure the system to verify the identity of the authoritative server that is sending information about the zone, from the TSIG Key list, select a key. 6. To specify an action for the BIG-IP system to take when it receives a NOTIFY message from a DNS server on which a zone has been updated, from the Notify Action list, select one of the following. Action Description Consume The BIG-IP system processes the NOTIFY message and does not pass the NOTIFY message to the back end DNS server. 101

102 Configuring DNS Express Action Bypass Repeat Description The BIG-IP system does not process the NOTIFY message, but instead sends the NOTIFY message to a back end DNS server (subject to DNS profile unhandled-query-action). The BIG-IP system processes the NOTIFY message and sends the NOTIFY message to a back end DNS server. Tip: If a TSIG Key is configured, the signature is only validated for Consume and Repeat actions. NOTIFY responses are assumed to be sent by a backend DNS resource, except when the action is Consume and DNS Express generates a response. 7. Click Finished. Enabling DNS Express Create a custom DNS profile that enables DNS Express, only if you want to use a back-end DNS server for name resolution while the BIG-IP system handles queries for wide IPs and DNS Express zones. Note: If you plan to use the BIND server on BIG-IP GTM, you can use the default dns profile. 1. On the Main tab, click Local Traffic > Profiles > Services > DNS. The DNS profile list screen opens. 2. Click Create. The New DNS profile screen opens. 3. Name the profile dns_express. 4. In the Parent Profile list, accept the default dns profile. 5. Select the Custom check box. 6. In the Global Traffic Management list, accept the default value Enabled. 7. From the DNS Express list, select Enabled. 8. From the Unhandled Query Actions list, select how you want the BIG-IP system to handle a query that is not for a wide IP or DNS Express zone. Option Allow Drop Reject Hint No Error Description The BIG-IP system forwards the connection request to another DNS server or DNS server pool. Note that if a DNS server pool is not associated with a listener and the Use BIND Server on BIG-IP option is set to enabled, connection requests are forwarded to the local BIND server. (Allow is the default value.) The BIG-IP system does not respond to the query. The BIG-IP system returns the query with the REFUSED return code. The BIG-IP system returns the query with a list of root name servers. The BIG-IP system returns the query with the NOERROR return code. 9. From the Use BIND Server on BIG-IP list, select Disabled. 10. Click Finished. Assign the profile to virtual servers or listeners. 102

103 BIG-IP Global Traffic Manager : Implementations Assigning a DNS profile to a listener If you plan to use the BIND server on the BIG-IP system, you can assign the default DNS profile (dns) to the listener. If you plan to use a back-end DNS server and you created a custom DNS Express profile, you can assign it to the listener. 1. On the Main tab, click Global Traffic > Listeners. The Listeners List screen opens. 2. Click the name of the listener you want to modify. 3. From the DNS Profile list, select either dns or a custom DNS profile configured for DNS Express. 4. Click Finished. Viewing information about DNS Express zones You can view information about the zones that are protected by DNS Express. 1. On the Main tab, click Statistics > Module Statistics > Local Traffic. The Local Traffic statistics screen opens. 2. From the Statistics Type list, select DNS Express Zones. Information displays about the DNS Express zones. Record type SOA Records Resource Records Description Displays start of authority record information. Displays the number of resource records for the zone. Implementation result You now have an implementation in which the BIG-IP system helps to mitigate DDoS attacks on your network and to resolve more DNS queries faster. 103

104

105 Chapter 19 Caching DNS Responses from External Resolvers Overview: Improving DNS performance by caching responses from external resolvers Task summary Implementation result

106 Caching DNS Responses from External Resolvers Overview: Improving DNS performance by caching responses from external resolvers You can configure a transparent cache on the BIG-IP system to use external DNS resolvers to resolve queries, and then cache the responses from the resolvers. The next time the system receives a query for a response that exists in the cache, the system immediately returns the response from the cache. The transparent cache contains messages and resource records. A transparent cache in the BIG-IP system consolidates content that would otherwise be cached across multiple external resolvers. When a consolidated cache is in front of external resolvers (each with their own cache), it can produce a much higher cache hit percentage. F5 Networks recommends that you configure the BIG-IP system to forward queries, which cannot be answered from the cache, to a pool of local DNS servers rather than the local BIND instance because BIND performance is slower than using multiple external resolvers. Note: For systems using the DNS Express feature, the BIG-IP system first processes the requests through DNS Express, and then caches the responses. Important: The DNS Cache feature is available only when the BIG-IP system is licensed for DNS Services. Figure 12: BIG-IP system using transparent cache Task summary Perform these tasks to configure a transparent cache on the BIG-IP system. 106

107 BIG-IP Global Traffic Manager : Implementations Caching DNS Responses from External Resolvers Creating a transparent DNS cache Creating a custom DNS profile for transparent DNS caching Assigning a custom DNS profile to a GTM listener Creating a custom DNS monitor Creating a pool of local DNS servers Determining DNS cache performance Clearing a DNS cache Creating a transparent DNS cache Ensure that the BIG-IP system is licensed for DNS Services. Create a transparent cache on the BIG-IP system when you want the system to cache DNS responses from external DNS resolvers. 1. On the Main tab, click Local Traffic > DNS Caches > DNS Cache List. The DNS Cache List screen opens. 2. Click Create. The New DNS Cache screen opens. 3. In the Name field, type a name for the cache. 4. From the Resolver Type list, select Transparent. 5. Click Finished. Associate the DNS cache with a custom DNS profile. Creating a custom DNS profile for transparent DNS caching Ensure that at least one transparent cache exists on the BIG-IP system. You can create a custom DNS profile to configure the BIG-IP system to cache responses to DNS queries. 1. On the Main tab, click Local Traffic > Profiles > Services > DNS. The DNS profile list screen opens. 2. Click Create. The New DNS profile screen opens. 3. In the Name field, type a unique name for the profile. 4. In the Parent Profile list, accept the default dns profile. 5. Select the Custom check box. 6. From the Use BIND Server on BIG-IP list, select Disabled. 7. From the DNS Cache list, select Enabled. When you enable the DNS Cache option, you must also select a DNS cache from the DNS Cache Name list. 8. From the DNS Cache Name list, select the DNS cache that you want to associate with this profile. You can associate a DNS cache with a profile, even when the DNS Cache option, is Disabled. Use this option to enable and disable the cache for debugging purposes. 9. Click Finished. 107

108 Caching DNS Responses from External Resolvers Assign the custom DNS profile to the virtual server that handles the DNS traffic from which you want to cache responses. Assigning a custom DNS profile to a GTM listener Ensure that at least one custom DNS profile that is configured for DNS caching exists on the BIG-IP system. Assign a custom DNS profile to a listener when you want the BIG-IP system to perform DNS caching on traffic that the listener handles. Note: This task applies only to GTM -provisioned systems. 1. On the Main tab, click Global Traffic > Listeners. The Listeners List screen opens. 2. Click the name of the listener you want to modify. 3. From the DNS Profile list, select a custom DNS profile configured for DNS caching. 4. Click Update. Creating a custom DNS monitor Create a custom DNS monitor to send DNS requests, generated using the settings you specify, to a pool of DNS servers and validate the DNS responses. Important: When defining values for custom monitors, make sure you avoid using any values that are on the list of reserved keywords. For more information, see solution number 3653 (for version 9.0 systems and later) on the AskF5 technical support web site. 1. On the Main tab, click Local Traffic > Monitors. The Monitor List screen opens. 2. Click Create. The New Monitor screen opens. 3. Type a name for the monitor in the Name field. 4. From the Type list, select DNS. 5. In the Query Name field, type the domain name that you want the monitor to query. 6. From the Configuration list, select Advanced. This selection makes it possible for you to modify additional default settings. 7. Configure settings based on your network requirements. 8. Click Finished. Creating a pool of local DNS servers Ensure that at least one custom DNS monitor exists on the BIG-IP system. Gather the IP addresses of the DNS servers that you want to include in a pool to which the BIG-IP system load balances DNS traffic. Create a pool of local DNS servers when you want to load balance DNS requests to back end DNS servers. 108

109 BIG-IP Global Traffic Manager : Implementations 1. On the Main tab, click Local Traffic > Pools. The Pool List screen opens. 2. Click Create. The New Pool screen opens. 3. In the Name field, type a unique name for the pool. 4. For the Health Monitors setting, from the Available list, select the custom DNS monitor you created, and click << to move the monitor to the Active list. 5. Using the New Members setting, add each resource that you want to include in the pool: a) Either type an IP address in the Address field, or select a node address from the Node List. b) Type a port number in the Service Port field, or select a service name from the list. c) To specify a priority group, type a priority number in the Priority field. d) Click Add. 6. Click Finished. Determining DNS cache performance You can view statistics to determine how well a DNS cache on the BIG-IP system is performing. 1. On the Main tab, click Statistics > Module Statistics > Local Traffic. The Local Traffic statistics screen opens. 2. From the Statistics Type list, select DNS Cache. 3. In the Details column for a cache, click View, to display detailed information about the cache. 4. To return to the Local Traffic Statistics screen, click Back. Viewing records in a DNS cache You can view records in a DNS cache to determine how well a specific cache on the BIG-IP system is performing. 1. Log in to the command-line interface of the BIG-IP system. 2. At the BASH prompt, type: tmsh. 3. At the tmsh prompt, type: show ltm dns cache records rrset cache <cache name>, and press Enter. For example, the command sequence: show ltm dns cache records rrset cache my_transparent_cache, displays the resource records in the cache named my_transparent_cache. Viewing DNS cache statistics using tmsh You can view DNS cache statistics using tmsh to determine how well a specific cache on the BIG-IP system is performing. 1. Log in to the command-line interface of the BIG-IP system. 2. At the BASH prompt, type tmsh. 3. At the tmsh prompt, type show ltm dns cache, and press Enter. Statistics for all of the DNS caches on the BIG-IP system display. 4. At the tmsh prompt, type show ltm dns cache <cache-type>, and press Enter. 109

110 Caching DNS Responses from External Resolvers For example, the command sequence show ltm dns cache transparent, displays statistics for each of the transparent caches on the system. 5. At the tmsh prompt, type show ltm dns cache <cache type> <cache name>, and press Enter. For example, the command sequence, show ltm dns cache transparent my_t1, displays statistics for the transparent cache on the system named my_t1. Managing transparent cache size Determine the amount of memory the BIG-IP system has and how much of that memory you want to commit to DNS caching. View the statistics for a cache to determine how well the cache is working. You can change the size of a DNS cache to fix cache performance issues. 1. On the Main tab, click Local Traffic > DNS Caches > DNS Cache List. The DNS Cache List screen opens. 2. Click the name of the cache you want to modify. The Properties screen opens. 3. In the Message Cache Size field, type the maximum size in bytes for the DNS message cache. The BIG-IP system caches the messages in a DNS response in the message cache. A higher maximum size makes it possible for more DNS responses to be cached and increases the cache hit percentage. A lower maximum size forces earlier eviction of cached content, but can lower the cache hit percentage. Important: The message cache size includes all tmms on the BIG-IP system; therefore, if there are eight tmms, multiply the size by eight and put that value in this field. 4. In the Resource Record Cache Size field, type the maximum size in bytes for the DNS resource record cache. The BIG-IP system caches the supporting records in a DNS response in the Resource Record cache. A higher maximum size makes it possible for more DNS responses to be cached and increases the cache hit percentage. A lower maximum size forces earlier eviction of cached content, but can lower the cache hit percentage. Important: The resource record cache size includes all tmms on the BIG-IP system; therefore, if there are eight tmms, multiply the size by eight and put that value in this field. 5. Click Finished. Clearing a DNS cache You can clear all records from a specific DNS cache on the BIG-IP system. 1. On the Main tab, click Local Traffic > DNS Caches > DNS Cache List. The DNS Cache List screen opens. 2. On the menu bar, click Statistics. The Local Traffic Statistics screen opens. 3. Select the check box next to the cache you want to clear, and then click Clear Cache. 110

111 BIG-IP Global Traffic Manager : Implementations Clearing specific records from a DNS cache You can clear specific records from a DNS cache using tmsh. For example, you can delete all RRSET records or only the A records in the specified cache. Tip: In tmsh, you can use the command completion feature to discover the types of records that are available for deletion. 1. Log in to the command-line interface of the BIG-IP system. 2. At the BASH prompt, type tmsh. 3. At the tmsh prompt, type ltm dns cache records, and press Enter to navigate to the dns cache records module. 4. Type delete <cache-type> type <record-type> cache <cache-name>, and press Enter. For example, the command sequence delete rrset type a cache my_resolver_cache, deletes the A records from the resource record cache of the resolver cache named my_resolver_cache. Implementation result You now have an implementation in which the BIG-IP system caches DNS responses from external DNS resolvers, and answers queries for a cached response. Additionally, the system forwards DNS queries that cannot be answered from the cache to a pool of local DNS servers. 111

112

113 Chapter 20 Resolving DNS Queries and Caching Responses Overview: Improving DNS performance by resolving queries and caching responses Task summary Implementation result

114 Resolving DNS Queries and Caching Responses Overview: Improving DNS performance by resolving queries and caching responses You can configure a resolver cache on the BIG-IP system to resolve DNS queries and cache the responses. The next time the system receives a query for a response that exists in the cache, the system returns the response from the cache. The resolver cache contains messages, resource records, and the nameservers the system queries to resolve DNS queries. Important: The DNS Cache feature is available only when the BIG-IP system is licensed for DNS Services. Figure 13: BIG-IP system using resolver cache 114

115 BIG-IP Global Traffic Manager : Implementations Task summary Perform these tasks to configure a resolver cache on the BIG-IP system. Creating a resolver DNS cache Creating a custom DNS profile for DNS resolving and caching Assigning a custom DNS profile to a GTM listener Determining DNS cache performance Clearing a DNS cache Creating a resolver DNS cache Ensure that the BIG-IP system is licensed for DNS Services. Create a resolver cache on the BIG-IP system when you want the system to resolve DNS queries and cache responses. 1. On the Main tab, click Local Traffic > DNS Caches > DNS Cache List. The DNS Cache List screen opens. 2. Click Create. The New DNS Cache screen opens. 3. In the Name field, type a name for the cache. 4. From the Resolver Type list, select Resolver. 5. Click Finished. Associate the DNS cache with a custom DNS profile. Creating a custom DNS profile for DNS resolving and caching Ensure that at least one DNS cache exists on the BIG-IP system. You can create a custom DNS profile to configure the BIG-IP system to cache responses to DNS connection requests. 1. On the Main tab, click Local Traffic > Profiles > Services > DNS. The DNS profile list screen opens. 2. Click Create. The New DNS profile screen opens. 3. In the Name field, type a unique name for the profile. 4. Select the Custom check box. 5. From the Use BIND Server on BIG-IP list, select Disabled. 6. From the DNS Cache list, select Enabled. When you enable the DNS Cache option, you must also select a DNS cache from the DNS Cache Name list. 7. From the DNS Cache Name list, select the DNS cache that you want to associate with this profile. You can associate a DNS cache with a profile, even when the DNS Cache option, is Disabled. Use this option to enable and disable the cache for debugging purposes. 115

116 Resolving DNS Queries and Caching Responses 8. Click Finished. Assign the custom DNS profile to the virtual server handling the DNS traffic, which includes the responses to queries that you want to cache. Assigning a custom DNS profile to a GTM listener Ensure that at least one custom DNS profile that is configured for DNS caching exists on the BIG-IP system. Assign a custom DNS profile to a listener when you want the BIG-IP system to perform DNS caching on traffic that the listener handles. Note: This task applies only to GTM -provisioned systems. 1. On the Main tab, click Global Traffic > Listeners. The Listeners List screen opens. 2. Click the name of the listener you want to modify. 3. From the DNS Profile list, select a custom DNS profile configured for DNS caching. 4. Click Update. Determining DNS cache performance You can view statistics to determine how well a DNS cache on the BIG-IP system is performing. 1. On the Main tab, click Statistics > Module Statistics > Local Traffic. The Local Traffic statistics screen opens. 2. From the Statistics Type list, select DNS Cache. 3. In the Details column for a cache, click View, to display detailed information about the cache. 4. To return to the Local Traffic Statistics screen, click Back. Viewing records in a DNS cache You can view records in a DNS cache to determine how well a specific cache on the BIG-IP system is performing. 1. Log in to the command-line interface of the BIG-IP system. 2. At the BASH prompt, type: tmsh. 3. At the tmsh prompt, type: show ltm dns cache records rrset cache <cache name>, and press Enter. For example, the command sequence: show ltm dns cache records rrset cache my_transparent_cache, displays the resource records in the cache named my_transparent_cache. Viewing DNS cache statistics using tmsh You can view DNS cache statistics using tmsh to determine how well a specific cache on the BIG-IP system is performing. 116

117 BIG-IP Global Traffic Manager : Implementations 1. Log in to the command-line interface of the BIG-IP system. 2. At the BASH prompt, type tmsh. 3. At the tmsh prompt, type show ltm dns cache, and press Enter. Statistics for all of the DNS caches on the BIG-IP system display. 4. At the tmsh prompt, type show ltm dns cache <cache-type>, and press Enter. For example, the command sequence show ltm dns cache transparent, displays statistics for each of the transparent caches on the system. 5. At the tmsh prompt, type show ltm dns cache <cache type> <cache name>, and press Enter. For example, the command sequence, show ltm dns cache transparent my_t1, displays statistics for the transparent cache on the system named my_t1. Managing cache size Determine the amount of memory the BIG-IP system has and how much you want to commit to DNS caching. View the statistics for a cache to determine how well the cache is working. You can change the size of a DNS cache to fix cache performance issues. 1. On the Main tab, click Local Traffic > DNS Caches > DNS Cache List. The DNS Cache List screen opens. 2. Click the name of the cache you want to modify. The Properties screen opens. 3. In the Message Cache Size field, type the maximum size in bytes for the DNS message cache. The BIG-IP system caches the messages in a DNS response in the message cache. A higher maximum size makes it possible for more DNS responses to be cached and increases the cache hit percentage. A lower maximum size forces earlier eviction of cached content, but can lower the cache hit percentage. Important: The message cache size includes all tmms on the BIG-IP system; therefore, if there are eight tmms, multiply the size by eight and put that value in this field. 4. In the Resource Record Cache Size field, type the maximum size in bytes for the DNS resource record cache. The BIG-IP system caches the supporting records in a DNS response in the Resource Record cache. A higher maximum size makes it possible for more DNS responses to be cached and increases the cache hit percentage. A lower maximum size forces earlier eviction of cached content, but can lower the cache hit percentage. Important: The resource record cache size includes all tmms on the BIG-IP system; therefore, if there are eight tmms, multiply the size by eight and put that value in this field. 5. In the Nameserver Cache Count field, type the maximum number of DNS nameservers for which the BIG-IP system caches connection and capability data. Important: The nameserver cache count includes all tmms on the BIG-IP system; therefore, if there are eight tmms, multiply the count by eight and put that value in this field. 6. In the Unsolicited Reply Threshold field, change the default value if you are using the BIG-IP system to monitor for unsolicited replies using SNMP. The system always rejects unsolicited replies. The default value of 0 (off) indicates the system does not generate SNMP traps or log messages when rejecting unsolicited replies. Changing the default value alerts you to a potential security attack, such as cache poisoning or DOS. For example, if you specify 117

118 Resolving DNS Queries and Caching Responses 1,000,000 unsolicited replies, each time the system receives 1,000,000 unsolicited replies, it generates an SNMP trap and log message. 7. Click Update. Clearing a DNS cache You can clear all records from a specific DNS cache on the BIG-IP system. 1. On the Main tab, click Local Traffic > DNS Caches > DNS Cache List. The DNS Cache List screen opens. 2. On the menu bar, click Statistics. The Local Traffic Statistics screen opens. 3. Select the check box next to the cache you want to clear, and then click Clear Cache. Clearing specific records from a DNS cache You can clear specific records from a DNS cache using tmsh. For example, you can delete all RRSET records or only the A records in the specified cache. Tip: In tmsh, you can use the command completion feature to discover the types of records that are available for deletion. 1. Log in to the command-line interface of the BIG-IP system. 2. At the BASH prompt, type tmsh. 3. At the tmsh prompt, type ltm dns cache records, and press Enter to navigate to the dns cache records module. 4. Type delete <cache-type> type <record-type> cache <cache-name>, and press Enter. For example, the command sequence delete rrset type a cache my_resolver_cache, deletes the A records from the resource record cache of the resolver cache named my_resolver_cache. Implementation result You now have an implementation in which the BIG-IP system acts as a DNS resolver, caches DNS responses, and answers queries for a cached response from the cache. 118

119 Chapter 21 Resolving DNS Queries and Caching Validated Responses Overview: Resolving queries and caching validated responses Task summary Implementation result

120 Resolving DNS Queries and Caching Validated Responses Overview: Resolving queries and caching validated responses You can configure a validating resolver cache on the BIG-IP system to recursively query public DNS servers, validate the identity of the DNS server sending the responses, and then cache the responses. The next time the system receives a query for a response that exists in the cache, the system returns the DNSSEC-compliant response from the cache. The validating resolver cache contains messages, resource records, the nameservers the system queries to resolve DNS queries, and DNSSEC keys. Using the validating resolver cache, the BIG-IP system mitigates cache poisoning by validating DNS responses using DNSSEC validation. This is important, because attackers can attempt to populate a DNS cache with erroneous data that redirects clients to fake web sites, or downloads malware and viruses to client computers. When an authoritative server signs a DNS response, the validating resolver verifies the data before entering the data into the cache. Additionally, the validating resolver cache includes a built-in filter and detection mechanism that rejects unsolicited DNS responses. Important: The DNS Cache feature is available only when the BIG-IP system is licensed for DNS Services. Figure 14: BIG-IP system using validating resolver cache 120

121 BIG-IP Global Traffic Manager : Implementations Task summary Perform these tasks to configure a validating resolver cache on the BIG-IP system. Creating a validating resolver DNS cache Creating a custom DNS profile for validating resolver DNS caching Assigning a custom DNS profile to a GTM listener Determining DNS cache performance Clearing a DNS cache Creating a validating resolver DNS cache Ensure that the BIG-IP system is licensed for DNS Services. Create a validating resolver cache on the BIG-IP system when you want the system to resolve DNS queries, use DNSSEC to validate the responses, and cache the responses. 1. On the Main tab, click Local Traffic > DNS Caches > DNS Cache List. The DNS Cache List screen opens. 2. Click Create. The New DNS Cache screen opens. 3. In the Name field, type a name for the cache. 4. From the Resolver Type list, select Validating Resolver. 5. Click Finished. Associate the DNS cache with a custom DNS profile. Obtaining a trust or DLV anchor Gather the IP addresses of the resources that are authoritative name servers for the signed zones from which you want to obtain a trust or DLV anchors. Obtain a trust or DLV anchor for the signed zones for which you want the BIG-IP system to cache a validated response. 1. From the BASH prompt of a BIG-IP system, type address of resource that contains the trust or DLV anchor>. DNSKEY The system returns a trust anchor. 2. Copy the anchor. Adding a trust anchor to a validating resolver DNS cache Ensure that you have copied trust anchors in the format required by the BIG-IP system, for any signed zones that you want to add to a validating resolver. A validating resolver uses at least one trust anchor to validate DNS responses. 1. On the Main tab, click Local Traffic > DNS Caches > DNS Cache List. The DNS Cache List screen opens. 121

122 Resolving DNS Queries and Caching Validated Responses 2. Click the name of the cache you want to modify. The Properties screen opens. 3. On the menu bar, click Trust Anchors. The Trust Anchors screen opens. 4. Click Add. 5. In the Trust Anchor field, paste the trust anchor that you copied from the signed zone. Important: The trust anchor must be in the format required by the BIG-IP system. 6. Click Finished. 7. For each additional trust anchor that you want to add to the validating resolver, repeat steps 4-6. The validating resolver can now validate the content of DNS responses from the zones for which you added trust anchors. Adding a DLV anchor to a validating resolver DNS cache A validating resolver needs a DLV anchor to validate DNS responses from outside a zone. Note: Ensure that you have copied trust anchors in the format required by the BIG-IP system, for any signed zones that you add to a validating resolver. 1. On the Main tab, click Local Traffic > DNS Caches > DNS Cache List. The DNS Cache List screen opens. 2. Click the name of the cache you want to modify. The Properties screen opens. 3. On the menu bar, click DLV Anchors. The DLV Anchors screen opens. 4. Click Add. 5. In the DLV Anchor field, paste the DLV anchor that you want to add to the validating resolver. Important: The DLV anchor must be in the format required by the BIG-IP system. 6. Click Finished. 7. For each additional DLV anchor that you want to add to the validating resolver, repeat steps 4-6. The validating resolver can now validate the content of DNS responses from the zones for which you added DLV anchors. Creating a custom DNS profile for validating resolver DNS caching Ensure that at least one DNS cache exists on the BIG-IP system. You can create a custom DNS profile to configure the BIG-IP system to cache responses to DNS connection requests. 1. On the Main tab, click Local Traffic > Profiles > Services > DNS. The DNS profile list screen opens. 2. Click Create. The New DNS profile screen opens. 122

123 BIG-IP Global Traffic Manager : Implementations 3. In the Name field, type a unique name for the profile. 4. In the Parent Profile list, accept the default dns profile. 5. Select the Custom check box. 6. From the Use BIND Server on BIG-IP list, select Disabled. 7. From the DNS Cache list, select Enabled. When you enable the DNS Cache option, you must also select a DNS cache from the DNS Cache Name list. 8. From the DNS Cache Name list, select the DNS cache that you want to associate with this profile. You can associate a DNS cache with a profile, even when the DNS Cache option, is Disabled. Use this option to enable and disable the cache for debugging purposes. 9. Click Finished. Assign the custom DNS profile to the virtual server that handles the DNS traffic that includes the responses to queries that you want to cache. Assigning a custom DNS profile to a GTM listener Ensure that at least one custom DNS profile that is configured for DNS caching exists on the BIG-IP system. Assign a custom DNS profile to a listener when you want the BIG-IP system to perform DNS caching on traffic that the listener handles. Note: This task applies only to GTM -provisioned systems. 1. On the Main tab, click Global Traffic > Listeners. The Listeners List screen opens. 2. Click the name of the listener you want to modify. 3. From the DNS Profile list, select a custom DNS profile configured for DNS caching. 4. Click Update. Determining DNS cache performance You can view statistics to determine how well a DNS cache on the BIG-IP system is performing. 1. On the Main tab, click Statistics > Module Statistics > Local Traffic. The Local Traffic statistics screen opens. 2. From the Statistics Type list, select DNS Cache. 3. In the Details column for a cache, click View, to display detailed information about the cache. 4. To return to the Local Traffic Statistics screen, click Back. Viewing records in a DNS cache You can view records in a DNS cache to determine how well a specific cache on the BIG-IP system is performing. 1. Log in to the command-line interface of the BIG-IP system. 123

124 Resolving DNS Queries and Caching Validated Responses 2. At the BASH prompt, type: tmsh. 3. At the tmsh prompt, type: show ltm dns cache records rrset cache <cache name>, and press Enter. For example, the command sequence: show ltm dns cache records rrset cache my_transparent_cache, displays the resource records in the cache named my_transparent_cache. Viewing DNS cache statistics using tmsh You can view DNS cache statistics using tmsh to determine how well a specific cache on the BIG-IP system is performing. 1. Log in to the command-line interface of the BIG-IP system. 2. At the BASH prompt, type tmsh. 3. At the tmsh prompt, type show ltm dns cache, and press Enter. Statistics for all of the DNS caches on the BIG-IP system display. 4. At the tmsh prompt, type show ltm dns cache <cache-type>, and press Enter. For example, the command sequence show ltm dns cache transparent, displays statistics for each of the transparent caches on the system. 5. At the tmsh prompt, type show ltm dns cache <cache type> <cache name>, and press Enter. For example, the command sequence, show ltm dns cache transparent my_t1, displays statistics for the transparent cache on the system named my_t1. Viewing DNS cache statistics in the Configuration utility Ensure that you have created a DNS cache and a DNS profile and have assigned the profile to either an LTM virtual server or a GTM listener. You can view DNS cache statistics to determine how well a specific cache on the BIG-IP system is performing. 1. On the Main tab, click Statistics > Module Statistics > Local Traffic. The Local Traffic statistics screen opens. 2. From the Statistics Type list, select DNS Cache. 3. In the Details column for a cache, click View, to display detailed information about the cache. 4. To determine if the cache is too small, view the number in the Evictions column. 5. To return to the Local Traffic Statistics screen, click Back. Managing cache size Determine the amount of memory the BIG-IP system has and how much you want to commit to DNS caching. View the statistics for a cache to determine how well the cache is working. You can change the size of a DNS cache to fix cache performance issues. 1. On the Main tab, click Local Traffic > DNS Caches > DNS Cache List. The DNS Cache List screen opens. 2. Click the name of the cache you want to modify. The Properties screen opens. 3. In the Message Cache Size field, type the maximum size in bytes for the DNS message cache. 124

125 BIG-IP Global Traffic Manager : Implementations The BIG-IP system caches the messages in a DNS response in the message cache. A higher maximum size makes it possible for more DNS responses to be cached and increases the cache hit percentage. A lower maximum size forces earlier eviction of cached content, but can lower the cache hit percentage. Important: The message cache size includes all tmms on the BIG-IP system; therefore, if there are eight tmms, multiply the size by eight and put that value in this field. 4. In the Resource Record Cache Size field, type the maximum size in bytes for the DNS resource record cache. The BIG-IP system caches the supporting records in a DNS response in the Resource Record cache. A higher maximum size makes it possible for more DNS responses to be cached and increases the cache hit percentage. A lower maximum size forces earlier eviction of cached content, but can lower the cache hit percentage. Important: The resource record cache size includes all tmms on the BIG-IP system; therefore, if there are eight tmms, multiply the size by eight and put that value in this field. 5. In the Nameserver Cache Count field, type the maximum number of DNS nameservers for which the BIG-IP system caches connection and capability data. Important: The nameserver cache count includes all tmms on the BIG-IP system; therefore, if there are eight tmms, multiply the count by eight and put that value in this field. 6. In the Unsolicited Reply Threshold field, change the default value if you are using the BIG-IP system to monitor for unsolicited replies using SNMP. The system always rejects unsolicited replies. The default value of 0 (off) indicates the system does not generate SNMP traps or log messages when rejecting unsolicited replies. Changing the default value alerts you to a potential security attack, such as cache poisoning or DOS. For example, if you specify 1,000,000 unsolicited replies, each time the system receives 1,000,000 unsolicited replies, it generates an SNMP trap and log message. 7. Click Update. Clearing a DNS cache You can clear all records from a specific DNS cache on the BIG-IP system. 1. On the Main tab, click Local Traffic > DNS Caches > DNS Cache List. The DNS Cache List screen opens. 2. On the menu bar, click Statistics. The Local Traffic Statistics screen opens. 3. Select the check box next to the cache you want to clear, and then click Clear Cache. Clearing specific records from a DNS cache You can clear specific records from a DNS cache using tmsh. For example, you can delete all RRSET records or only the A records in the specified cache. Tip: In tmsh, you can use the command completion feature to discover the types of records that are available for deletion. 125

126 Resolving DNS Queries and Caching Validated Responses 1. Log in to the command-line interface of the BIG-IP system. 2. At the BASH prompt, type tmsh. 3. At the tmsh prompt, type ltm dns cache records, and press Enter to navigate to the dns cache records module. 4. Type delete <cache-type> type <record-type> cache <cache-name>, and press Enter. For example, the command sequence delete rrset type a cache my_resolver_cache, deletes the A records from the resource record cache of the resolver cache named my_resolver_cache. Implementation result You now have an implementation in which the BIG-IP system acts as a DNS resolver, verifies the validity of the responses, caches DNSSEC-compliant responses, and answers queries for a cached response with a DNSSEC-compliant response from the cache. 126

127 Chapter 22 Customizing a DNS Cache Overview: Customizing a DNS cache

128 Customizing a DNS Cache Overview: Customizing a DNS cache You can customize a DNS cache on the BIG-IP system to meet specific network needs by changing the default values on the DNS cache settings. Configuring a DNS cache to answer queries for local zones You can configure a DNS cache on the BIG-IP system to answer client requests for local zones. 1. On the Main tab, click Local Traffic > DNS Caches > DNS Cache List. The DNS Cache List screen opens. 2. Click the name of the cache you want to modify. The Properties screen opens. 3. Select the Enabled check box for the Answer Default Zones setting, when you want the BIG-IP system to answer queries for the default zones: localhost, reverse and ::1, and AS112 zones. 4. Click Update. Configuring a DNS cache to use specific root nameservers You can configure a resolver or validating resolver DNS cache on the BIG-IP system to use a specific server as an authoritative nameserver for the DNS root nameservers. 1. On the Main tab, click Local Traffic > DNS Caches > DNS Cache List. The DNS Cache List screen opens. 2. Click the name of the cache you want to modify. The Properties screen opens. 3. In the Root Hints area, in the IP address field, type the IP address of a DNS server that the system considers authoritative for the DNS root nameservers, and then click Add. Caution: By default, the system uses the DNS root nameservers published by InterNIC. When you add DNS root nameservers, the BIG-IP system no longer uses the default nameservers published by InterNIC, but uses the nameservers you add as authoritative for the DNS root nameservers. Based on your network configuration, add IPv4 or IPv6 addresses or both. 4. Click Update. Configuring a DNS cache alert for cache poisoning You can configure a resolver or validating resolver DNS cache on the BIG-IP system to generate SNMP alerts and log messages when the cache receives unsolicited replies. This is helpful as an alert to a potential security attack, such as cache poisoning or DDoS. 1. On the Main tab, click Local Traffic > DNS Caches > DNS Cache List. The DNS Cache List screen opens. 2. Click the name of the cache you want to modify. 128

129 BIG-IP Global Traffic Manager : Implementations The Properties screen opens. 3. In the Unsolicited Reply Threshold field, change the default value if you are using the BIG-IP system to monitor for unsolicited replies using SNMP. The system always rejects unsolicited replies. The default value of 0 (off) indicates the system does not generate SNMP traps or log messages when rejecting unsolicited replies. Changing the default value alerts you to a potential security attack, such as cache poisoning or DOS. For example, if you specify 1,000,000 unsolicited replies, each time the system receives 1,000,000 unsolicited replies, it generates an SNMP trap and log message. 4. Click Update. 129

130

131 Chapter 23 Configuring IP Anycast (Route Health Injection) Overview: Configuring IP Anycast (Route Health Injection) Task summary Implementation result

132 Configuring IP Anycast (Route Health Injection) Overview: Configuring IP Anycast (Route Health Injection) You can configure IP Anycast for DNS services on the BIG-IP system to help mitigate distributed denial-of-service attacks (DDoS), reduce DNS latency, improve the scalability of your network, and assist with traffic management. This configuration adds routes to and removes routes from the routing table based on availability. Advertising routes to virtual addresses based on the status of attached listeners is known as Route Health Injection (RHI). Task summary Perform these tasks to configure the BIG-IP system for IP Anycast. Enabling the ZebOS dynamic routing protocol Creating a custom DNS profile Configuring a listener for route advertisement Verifying advertisement of the route Enabling the ZebOS dynamic routing protocol Before you enable ZebOS dynamic routing on the BIG-IP system: Ensure that the system license includes the Routing Bundle add-on. Ensure that ZebOS is configured correctly. If you need help, refer to the following resources on AskF5 : TMOS Management Guide for BIG-IP Systems Configuration Guide for the VIPRION System ZebOS Advanced Routing Suite Configuration Guide Enable ZebOS protocols to allow the BIG-IP system to dynamically learn routes. 1. Log on to the command-line interface of the BIG-IP system. 2. At the command prompt, type zebos enable <protocol_type> and press Enter. The system returns an enabled response. 3. To verify that the ZebOS dynamic routing protocol is enabled, at the command prompt, type zebos check and press Enter. The system returns a list of all enabled protocols. Creating a custom DNS profile Create a custom DNS profile based on your network configuration, to specify how you want the BIG-IP system to handle non-wide IP DNS queries. 1. On the Main tab, click Local Traffic > Profiles > Services > DNS. The DNS profile list screen opens. 2. Click Create. The New DNS profile screen opens. 132

133 BIG-IP Global Traffic Manager : Implementations 3. In the Name field, type a unique name for the profile. 4. In the Parent Profile list, accept the default dns profile. 5. Select the Custom check box. 6. In the Global Traffic Management list, accept the default value Enabled. 7. From the Unhandled Query Actions list, select how you want the BIG-IP system to handle a query that is not for a wide IP or DNS Express zone. Option Allow Drop Reject Hint No Error Description The BIG-IP system forwards the connection request to another DNS server or DNS server pool. Note that if a DNS server pool is not associated with a listener and the Use BIND Server on BIG-IP option is set to enabled, connection requests are forwarded to the local BIND server. (Allow is the default value.) The BIG-IP system does not respond to the query. The BIG-IP system returns the query with the REFUSED return code. The BIG-IP system returns the query with a list of root name servers. The BIG-IP system returns the query with the NOERROR return code. 8. From the Use BIND Server on BIG-IP list, select Enabled. Note: Enable this setting only when you want the system to forward non-wide IP queries to the local BIND server on BIG-IP GTM. 9. Click Finished. Configuring a listener for route advertisement Ensure that ZebOS dynamic routing is enabled on BIG-IP Global Traffic Manager (GTM). To allow BIG-IP GTM to advertise the virtual address of a listener to the routers on your network, configure the listener for route advertisement. 1. On the Main tab, click Global Traffic > Listeners. The Listeners List screen opens. 2. Click Create. The new Listeners screen opens. 3. In the Destination field, type the IP address on which BIG-IP GTM listens for network traffic. Caution: The destination cannot be a self IP address on the system, because a listener with the same IP address as a self IP address cannot be advertised. 4. From the VLAN/Tunnel Traffic list, select one of the following options: Option All VLANs Description When you want this listener to handle traffic from VLANs within the network segment. Note: Use this option if BIG-IP GTM is handling traffic for the destination IP address locally. This option also applies when the system resides on a network segment that does not use VLANs. 133

134 Configuring IP Anycast (Route Health Injection) Option Enabled on Disabled on Description When you want this listener to handle traffic from only the VLANs that you move from the Available list to the Selected list. When you want this listener to exclude the traffic from the VLANs that you move from the Available list to the Selected list. 5. From the Protocol list, select either UDP or TCP. 6. From the DNS Profile list, select: Option Description dns <custom profile> This is the default DNS profile. With the default dns profile, BIG-IP GTM forwards non-wide IP queries to the BIND server on the BIG-IP GTM system itself. If you have created a custom DNS profile to handle non-wide IP queries in a way that works for your network configuration, select it. 7. For Route Advertisement, select the Enabled check box. 8. Click Finished. Configure other listeners for route advertisement. Verifying advertisement of the route Ensure that ZebOS dynamic routing is enabled on the BIG-IP system. Run a command to verify that the BIG-IP system is advertising the virtual address. 1. Log on to the command-line interface of the BIG-IP system. 2. At the command prompt, type zebos cmd sh ip route grep <listener IP address> and press Enter. An advertised route displays with a code of K and a 32 bit kernel, for example: K /32 Implementation result You now have an implementation in which the BIG-IP system broadcasts virtual IP addresses that you configured for route advertisement. 134

135 Chapter 24 Redirecting a DNS Query Using a Wide IP with a CNAME Pool Overview: Redirecting DNS queries using a wide IP with a CNAME pool About CNAME records Task summary Implementation result

136 Redirecting a DNS Query Using a Wide IP with a CNAME Pool Overview: Redirecting DNS queries using a wide IP with a CNAME pool When you want to redirect DNS queries for a web site to a different web site, create a wide IP that represents the original web site and add a CNAME pool to the wide IP to redirect the queries to the new destination. The executives at siterequest.com recently purchased a competitor. Site Request's administrator wants to redirect DNS queries for competitor.com to a rebranded web site named competitor.siterequest.com. About CNAME records A CNAME record specifies that a domain name is an alias of another domain. When you create a pool with a canonical name, BIG-IP GTM responds to DNS queries for the CNAME with the real fully qualified domain name (FQDN). Task summary Perform these tasks to redirect a DNS query using a wide IP with a CNAME pool. Redirecting a DNS Query Using a Wide IP with a CNAME Pool Creating a pool using a CNAME Creating a wide IP with a CNAME pool Creating a pool using a CNAME Create a pool to which the system can load balance DNS queries using a CNAME record, rather than pool members. For our example, name the pool competitor_redirect and use a CNAME of competitor.siterequest.com. 1. On the Main tab, click Global Traffic > Pools. The Pools list screen opens. 2. Click Create. 3. Type a name for the pool. Names must begin with a letter, and can contain only letters, numbers, and the underscore (_) character. Important: The pool name is limited to 63 characters. 4. From the Configuration list, select Advanced. 5. In the CNAME field, type the canonical name of the zone to which you want BIG-IP GTM to send DNS queries. 136

137 BIG-IP Global Traffic Manager : Implementations Tip: When you provide a canonical name, you do not add members to the pool, because the CNAME record always takes precedence over pool members. Additionally, a pool with a CNAME is not monitored for availability. 6. Click Finished. Creating a wide IP with a CNAME pool Create a wide IP with a CNAME pool to redirect DNS queries for a web site to a different web site. For our example, create a wide IP named and add the CNAME pool competitor_redirect. 1. On the Main tab, click Global Traffic > Wide IPs. The Wide IPs List screen opens. 2. Click Create. The New Wide IP screen opens. 3. In the Name field, type a name for the wide IP. Tip: You can use two different wildcard characters in the wide IP name: asterisk (*) to represent several characters and question mark (?) to represent a single character. This reduces the number of aliases you have to add to the configuration. 4. From the Pool list, select the CNAME pool, and then click Add. 5. Click Finished. Implementation result You now have an implementation in which when a client sends a DNS query for the CNAME record redirects the LDNS to siterequest2.com. The LDNS performs an IP address lookup for siterequest2.com, and the BIG-IP GTM returns the correct IP address, which is forwarded to the client. 137

138

139 Chapter 25 Monitoring Third-Party Servers with SNMP Overview: SNMP monitoring of third-party servers Task summary Implementation result

140 Monitoring Third-Party Servers with SNMP Overview: SNMP monitoring of third-party servers You can configure the BIG-IP Global Traffic Manager (GTM ) to acquire information about the health of a third-party server using SNMP. The server must be running an SNMP agent. Task summary To configure BIG-IP GTM to acquire information about the health of a third-party server using SNMP, perform the following tasks. Creating an SNMP monitor Defining a third-party host server that is running SNMP Creating an SNMP monitor Create an SNMP monitor that BIG-IP Global Traffic Manager can use to monitor a third-party server running SNMP. 1. On the Main tab, click Global Traffic > Monitors. The Monitor List screen opens. 2. Click Create. The New Monitor screen opens. 3. Type a name for the monitor. Important: Monitor names are limited to 63 characters. 4. From the Type list, select one of the following: Option Description SNMP DCA SNMP DCA Base Use this monitor to specify new values for CPU, memory, and disk metrics. Use this monitor to specify values for metrics other than CPU, memory, and disk usage. 5. Click Finished. Defining a third-party host server that is running SNMP Ensure that the third-party host server is running SNMP. During this procedure, you assign a virtual server to the server; therefore, determine the IP address that you want to assign to the virtual server. Define the third-party host server. 1. On the Main tab, click Global Traffic > Servers. The Server List screen opens. 140

141 BIG-IP Global Traffic Manager : Implementations 2. Click Create. The New Server screen opens. 3. In the Name field, type a name for the server. Important: Server names are limited to 63 characters. 4. From the Product list, select a third-party host server or select Generic Host. The server type determines the metrics that the system can collect from the server. 5. In the Address List area, add the IP addresses of the server. a) Type an external (public) IP address in the Address field, and then click Add. b) If you use NAT, type an internal (private) IP address in the Translation field, and then click Add. You can add more than one IP address, depending on how the server interacts with the rest of your network. 6. From the Data Center list, select the data center where the server resides. 7. From the Prober Pool list, select one of the following. Option Description Inherit from Data Center Prober pool name By default, a server inherits the Prober pool assigned to the data center in which the server resides. Select the Prober pool that contains the BIG-IP systems that you want to perform monitor probes of this server. 8. In the Health Monitors area, assign an SNMP monitor to the server by moving it from the Available list to the Selected list. 9. From the Virtual Server Discovery list, select Disabled. 10. Click Create. 11. In the Server List, click a server name. The server settings and values display. 12. On the menu bar, click Virtual Servers. A list of the virtual servers configured on the server displays. 13. Click Add. The IP addresses display in the list. 14. In the Virtual Server List area, specify the virtual servers that are resources on this server. a) In the Name field, type the name of the virtual server. b) In the Address field, type the IP address of the virtual server. 15. Click Create. The Server List screen opens displaying the new server in the list. Implementation result BIG-IP GTM can now use the SNMP monitor to verify the availability of and to collect statistics about the generic host. 141

142

143 Chapter 26 Configuring Remote High-Speed DNS Logging Overview: Configuring remote high-speed DNS logging Task summary Implementation result

144 Configuring Remote High-Speed DNS Logging Overview: Configuring remote high-speed DNS logging You can configure the BIG-IP system to log information about DNS traffic and send the log messages to remote high-speed log servers. You can choose to log either DNS queries or DNS responses, or both. In addition, you can configure the system to perform logging on DNS traffic differently for specific resources. For example, you can configure logging for a specific resource, and then disable and re-enable logging for the resource based on your network administration needs. When configuring remote high-speed DNS logging, it is helpful to understand the objects you need to create and why, as described here: Object to create in implementation Pool of remote log servers Destination (unformatted) Destination (formatted) Publisher DNS Logging profile DNS profile LTM virtual server GTM listener Reason Create a pool of remote log servers to which the BIG-IP system can send log messages. Create a log destination of Remote High-Speed Log type that specifies a pool of remote log servers. If your remote log servers are the ArcSight, Splunk, or Remote Syslog type, create an additional log destination to format the logs in the required format and forward the logs to a remote high-speed log destination. Create a log publisher to send logs to a set of specified log destinations. Create a custom DNS Logging profile to define the data you want the BIG-IP system to include in the DNS logs and associate a log publisher with the profile. Create a custom DNS profile to enable DNS logging, and associate a DNS Logging profile with the DNS profile. Associate a custom DNS profile with a virtual server to define how the BIG-IP system logs the DNS traffic that the virtual server processes. Associate a custom DNS profile with a listener to define how the BIG-IP system logs the DNS traffic that the listener processes. 144

145 BIG-IP Global Traffic Manager : Implementations Figure 15: Association of remote high-speed logging configuration objects Task summary Perform these tasks to configure DNS logging on the BIG-IP system. Note: Enabling either DNS query logging or DNS response logging, or both, impacts BIG-IP system performance. Configuring Remote High-Speed DNS Logging Creating a pool of remote logging servers Creating a remote high-speed log destination Creating a formatted remote high-speed log destination Creating a publisher Creating a custom DNS Logging profile for logging DNS queries Creating a custom DNS Logging profile for logging DNS responses Creating a custom DNS Logging profile for logging DNS queries and responses Creating a custom DNS profile to enable DNS logging Configuring a GTM listener for DNS logging Disabling DNS logging 145

146 Configuring Remote High-Speed DNS Logging Creating a pool of remote logging servers Before creating a pool of log servers, gather the IP addresses of the servers that you want to include in the pool. Ensure that the remote log servers are configured to listen to and receive log messages from the BIG-IP system. Create a pool of remote log servers to which the BIG-IP system can send log messages. 1. On the Main tab, click Local Traffic > Pools. The Pool List screen opens. 2. Click Create. The New Pool screen opens. 3. In the Name field, type a unique name for the pool. 4. Using the New Members setting, add the IP address for each remote logging server that you want to include in the pool: a) Type an IP address in the Address field, or select a node address from the Node List. b) Type a service number in the Service Port field, or select a service name from the list. Note: Typical remote logging servers require port 514. c) Click Add. 5. Click Finished. Creating a remote high-speed log destination Before creating a remote high-speed log destination, ensure that at least one pool of remote log servers exists on the BIG-IP system. Create a log destination of the Remote High-Speed Log type to specify that log messages are sent to a pool of remote log servers. 1. On the Main tab, click System > Logs > Configuration > Log Destinations. The Log Destinations screen opens. 2. Click Create. 3. In the Name field, type a unique, identifiable name for this destination. 4. From the Type list, select Remote High-Speed Log. Important: If you use log servers such as Remote Syslog, Splunk, or ArcSight, which require data be sent to the servers in a specific format, you must create an additional log destination of the required type, and associate it with a log destination of the Remote High-Speed Log type. This allows the BIG-IP system to send data to the servers in the required format. The BIG-IP system is configured to send an unformatted string of text to the log servers. 5. From the Pool Name list, select the pool of remote log servers to which you want the BIG-IP system to send log messages. 6. From the Protocol list, select the protocol used by the high-speed logging pool members. 7. Click Finished. 146

147 BIG-IP Global Traffic Manager : Implementations Creating a formatted remote high-speed log destination Ensure that at least one remote high-speed log destination exists on the BIG-IP system. Create a formatted logging destination to specify that log messages are sent to a pool of remote log servers, such as Remote Syslog, Splunk, or ArcSight servers. 1. On the Main tab, click System > Logs > Configuration > Log Destinations. The Log Destinations screen opens. 2. Click Create. 3. In the Name field, type a unique, identifiable name for this destination. 4. From the Type list, select a formatted logging destination, such as Remote Syslog, Splunk, or ArcSight. Important: ArcSight formatting is only available for logs coming from the network Application Firewall Module (AFM) and the Application Security Manager (ASM ). The BIG-IP system is configured to send a formatted string of text to the log servers. 5. From the Forward To list: For ArcSight or Splunk, from the Forward To list, select the destination that points to a pool of high-speed log servers to which you want the BIG-IP system to send log messages. For Remote Syslog, from the Syslog Format list, select a format for the logs, and then from the High-Speed Log Destination list, select the destination that points to a pool of remote Syslog servers to which you want the BIG-IP system to send log messages. 6. Click Finished. Creating a publisher Ensure that at least one destination associated with a pool of remote log servers exists on the BIG-IP system. Create a publisher to specify where the BIG-IP system sends log messages for specific resources. 1. On the Main tab, click System > Logs > Configuration > Log Publishers. The Log Publishers screen opens. 2. Click Create. 3. In the Name field, type a unique, identifiable name for this publisher. 4. For the Destinations setting, in the Available list, select a destination, and click << to move the destination to the Selected list. Note: If you are using a formatted destination, select the destination that matches your log servers, such as Remote Syslog, Splunk, or ArcSight. 5. Click Finished. Creating a custom DNS Logging profile for logging DNS queries Create a custom DNS logging profile to log DNS queries, when you want to log only DNS queries. 147

148 Configuring Remote High-Speed DNS Logging 1. On the Main tab, click Local Traffic > Profiles > Other > DNS Logging. The DNS Logging profile list screen opens. 2. Click Create. The New DNS Logging profile screen opens. 3. In the Name field, type a unique name for the profile. 4. From the Log Publisher list, select a destination to which the BIG-IP system sends DNS log entries. 5. For the Log Queries setting, ensure that the Enabled check box is selected, if you want the BIG-IP system to log all DNS queries. 6. For the Include Query ID setting, select the Enabled check box, if you want the BIG-IP system to include the query ID sent by the client in the log messages. 7. Click Finished. Assign this custom DNS Logging profile to a custom DNS profile. Creating a custom DNS Logging profile for logging DNS responses Create a custom DNS logging profile to log DNS responses when you want to determine how the BIG-IP system is responding to a given query. 1. On the Main tab, click Local Traffic > Profiles > Other > DNS Logging. The DNS Logging profile list screen opens. 2. Click Create. The New DNS Logging profile screen opens. 3. In the Name field, type a unique name for the profile. 4. From the Log Publisher list, select a destination to which the BIG-IP system sends DNS log entries. 5. For the Log Responses setting, select the Enabled check box, if you want the BIG-IP system to log all DNS responses. 6. For the Include Query ID setting, select the Enabled check box, if you want the BIG-IP system to include the query ID sent by the client in the log messages. 7. Click Finished. Assign this custom DNS Logging profile to a custom DNS profile. Creating a custom DNS Logging profile for logging DNS queries and responses Create a custom DNS logging profile to log both DNS queries and responses when troubleshooting a DDoS attack. Note: Logging both DNS queries and responses has an impact on the BIG-IP system performance. 1. On the Main tab, click Local Traffic > Profiles > Other > DNS Logging. The DNS Logging profile list screen opens. 2. Click Create. The New DNS Logging profile screen opens. 3. In the Name field, type a unique name for the profile. 4. From the Log Publisher list, select a destination to which the BIG-IP system sends DNS log entries. 5. For the Log Queries setting, ensure that the Enabled check box is selected, if you want the BIG-IP system to log all DNS queries. 148

149 BIG-IP Global Traffic Manager : Implementations 6. For the Log Responses setting, select the Enabled check box, if you want the BIG-IP system to log all DNS responses. 7. For the Include Query ID setting, select the Enabled check box, if you want the BIG-IP system to include the query ID sent by the client in the log messages. 8. Click Finished. Assign this custom DNS Logging profile to a custom DNS profile. Creating a custom DNS profile to enable DNS logging Ensure that at least one custom DNS Logging profile exists on the BIG-IP system. Create a custom DNS profile to log specific information about DNS traffic processed by the resources to which the DNS profile is assigned. Depending upon what information you want the BIG-IP system to log, attach a custom DNS Logging profile configured to log DNS queries, to log DNS responses, or to log both. 1. On the Main tab, click Local Traffic > Profiles > Services > DNS. The DNS profile list screen opens. 2. Click Create. The New DNS profile screen opens. 3. In the Name field, type a unique name for the profile. 4. Select the Custom check box. 5. From the Logging list, select Enabled. 6. From the Logging Profile list, select a custom DNS Logging profile. 7. Click Finished. You must assign this custom DNS profile to a resource before the BIG-IP system can log information about the DNS traffic handled by the resource. Configuring a GTM listener for DNS logging Ensure that at least one custom DNS profile with logging configured exists on the BIG-IP system. Assign a custom DNS profile to a listener when you want the BIG-IP system to log the DNS traffic the listener handles. Note: This task applies only to GTM -provisioned systems. 1. On the Main tab, click Global Traffic > Listeners. The Listeners List screen opens. 2. Click the name of the listener you want to modify. 3. From the DNS Profile list, select a custom DNS profile that is associated with a DNS Logging profile. 4. Click Update. Disabling DNS logging Disable DNS logging on a custom DNS profile when you no longer want the BIG-IP system to log information about the DNS traffic handled by the resources to which the profile is assigned. 149

150 Configuring Remote High-Speed DNS Logging Note: You can disable and re-enable DNS logging for a specific resource based on your network administration needs. 1. On the Main tab, click Local Traffic > Profiles > Services > DNS. The DNS profile list screen opens. 2. Click the name of a profile. 3. Select the Custom check box. 4. From the Logging list, select Disabled. 5. Click Update. The BIG-IP system does not perform DNS logging on the DNS traffic handled by the resources to which this profile is assigned. Implementation result You now have an implementation in which the BIG-IP system performs DNS logging on specific DNS traffic and sends the log messages to a pool of remote log servers. 150

151 Chapter 27 Configuring Device-Specific Probing and Statistics Collection Overview: Configuring device-specific probing and statistics collection Task summary Implementation result

152 Configuring Device-Specific Probing and Statistics Collection Overview: Configuring device-specific probing and statistics collection BIG-IP Global Traffic Manager (GTM) performs intelligent probing of your network resources to determine whether the resources are up or down. In some circumstances, for example, if your network contains firewalls, you might want to set up device-specific probing to specify which BIG-IP systems probe specific servers for health and performance data. About Prober pools A Prober pool is an ordered collection of one or more BIG-IP systems. BIG-IP Global Traffic Manager (GTM ) can be a member of more than one Prober pool, and a Prober pool can be assigned to an individual server or a data center. When you assign a Prober pool to a data center, by default, the servers in that data center inherit that Prober pool. The members of a Prober pool perform monitor probes of servers to gather data about the health and performance of the resources on the servers. BIG-IP GTM makes load balancing decisions based on the gathered data. If all of the members of a Prober pool are marked down, or if a server has no Prober pool assigned, BIG-IP GTM reverts to a default intelligent probing algorithm to gather data about the resources on the server. This figure illustrates how Prober pools work. BIG-IP GTM contains two BIG-IP Local Traffic Manager (LTM ) systems that are assigned Prober pools and one BIG-IP LTM system that is not assigned a Prober pool: Figure 16: BIG-IP systems with prober pools Prober Pool 1 is assigned to a generic host server BIG-IP LTM3 is the only member of Prober Pool 1, and performs all HTTPS monitor probes of the server. Prober Pool 2 is assigned to generic load balancers BIG-IP LTM1 and BIG-IP LTM2 are members of Prober Pool 2. These two systems perform HTTP monitor probes of generic load balancers based on the load balancing method assigned to Prober Pool 2. The generic load balancers on the left side of the graphic are not assigned a Prober pool BIG-IP GTM can solicit any BIG-IP system to perform FTP monitor probes of these load balancers, including systems that are Prober pool members. 152

153 BIG-IP Global Traffic Manager : Implementations About Prober pool status The status of a Prober pool also indicates the status of the members of the pool. If at least one member of a Prober pool has green status (Available), the Prober pool has green status. The status of a Prober pool member indicates whether the BIG-IP GTM system, on which you are viewing status, can establish an iquery connection with the member. Note: If a Prober pool member has red status (Offline), no iquery connection exists between the member and the BIG-IP GTM system on which you are viewing status. Therefore, that BIG-IP GTM system cannot request that member to perform probes, and the Prober pool will not select the member for load balancing. About Prober pool statistics You can view the number of successful and failed probe requests that the BIG-IP GTM system (on which you are viewing statistics) made to the Prober pools. These statistics reflect only the number of Probe requests and their success or failure. These statistics do not reflect the actual probes that the pool members made to servers on your network. Prober pool statistics are not aggregated among the BIG-IP GTM systems in a synchronization group. The statistics on one BIG-IP GTM include only the requests made from that BIG-IP GTM system. In this figure, the Prober pool statistics that display on BIG-IP GTM1 are the probe requests made only by that system. Figure 17: Prober pool statistics displayed per system 153

BIG-IP Global Traffic Manager : Topology Load Balancing. Version 11.0

BIG-IP Global Traffic Manager : Topology Load Balancing. Version 11.0 BIG-IP Global Traffic Manager : Topology Load Balancing Version 11.0 Table of Contents Table of Contents Legal Notices...5 Acknowledgments...7 Chapter 1: Configuring BIG-IP Global Traffic Manager for

More information

BIG-IP Network Firewall: Policies and Implementations. Version 11.5

BIG-IP Network Firewall: Policies and Implementations. Version 11.5 BIG-IP Network Firewall: Policies and Implementations Version 11.5 Table of Contents Table of Contents Legal Notices...7 Acknowledgments...9 Chapter 1: About the Network Firewall...13 What is the BIG-IP

More information

BIG-IP Global Traffic Manager : Implementations. Version 11.0

BIG-IP Global Traffic Manager : Implementations. Version 11.0 BIG-IP Global Traffic Manager : Implementations Version 11.0 Table of Contents Table of Contents Legal Notices...9 Acknowledgments...11 Chapter 1: Upgrading BIG-IP GTM to Version 11...13 Converting a

More information

BIG-IP Access Policy Manager : Hosted Content Implementations. Version 11.4

BIG-IP Access Policy Manager : Hosted Content Implementations. Version 11.4 BIG-IP Access Policy Manager : Hosted Content Implementations Version 11.4 Table of Contents Table of Contents Legal Notices...5 Acknowledgments...7 Chapter 1: Adding Hosted Content to Access Policy Manager...11

More information

BIG-IP Virtual Edition Setup Guide for Amazon EC2. Version 11.3

BIG-IP Virtual Edition Setup Guide for Amazon EC2. Version 11.3 BIG-IP Virtual Edition Setup Guide for Amazon EC2 Version 11.3 Table of Contents Table of Contents Legal Notices...5 Chapter 1: Getting Started with BIG-IP Virtual Edition...7 What is BIG-IP Virtual Edition?...8

More information

BIG-IQ Centralized Management and Citrix XenServer : Setup. Version 4.6

BIG-IQ Centralized Management and Citrix XenServer : Setup. Version 4.6 BIG-IQ Centralized Management and Citrix XenServer : Setup Version 4.6 Table of Contents Table of Contents Legal Notices...5 Legal notices...5 Getting Started with BIG-IQ Virtual Edition...7 What is BIG-IQ

More information

BIG-IP Virtual Edition Setup Guide for Linux KVM. Version 11.4

BIG-IP Virtual Edition Setup Guide for Linux KVM. Version 11.4 BIG-IP Virtual Edition Setup Guide for Linux KVM Version 11.4 Table of Contents Table of Contents Legal Notices...5 Chapter 1: Getting Started with BIG-IP Virtual Edition...7 What is BIG-IP Virtual Edition?...8

More information

Enterprise Manager : Monitoring Network Health and Activity. Version 3.1.1

Enterprise Manager : Monitoring Network Health and Activity. Version 3.1.1 Enterprise Manager : Monitoring Network Health and Activity Version 3.1.1 Table of Contents Table of Contents Legal Notices...7 Acknowledgments...9 Chapter 1: Using ihealth for Configuration Collection

More information

Getting Started with BIG-IP

Getting Started with BIG-IP F5 Networks Training Getting Started with BIG-IP Part One: Administration Lab Guide April, 2015 Getting Started with BIG-IP Lab Guide Getting Started with BIG-IP Lab Guide Part One: Administration Lab

More information

BIG-IP Access Policy Manager : Edge Client and Application Configuration. Version 11.4

BIG-IP Access Policy Manager : Edge Client and Application Configuration. Version 11.4 BIG-IP Access Policy Manager : Edge Client and Application Configuration Version 11.4 Table of Contents Table of Contents Legal Notices...5 Acknowledgments...7 Chapter 1: BIG-IP Edge Client for Windows...11

More information

BIG-IP Global Traffic Manager : Concepts. Version 11.3

BIG-IP Global Traffic Manager : Concepts. Version 11.3 BIG-IP Global Traffic Manager : Concepts Version 11.3 Table of Contents Table of Contents Legal Notices...7 Chapter 1: GTM Load Balancing...9 Introducing the Global Traffic Manager...10 About global server

More information

BIG-IQ Systems: Cloud Management. Version 4.1.0

BIG-IQ Systems: Cloud Management. Version 4.1.0 BIG-IQ Systems: Cloud Management Version 4.1.0 Table of Contents Table of Contents Legal Notices...5 Acknowledgments...7 Chapter 1: BIG-IQ Cloud Overview...13 Overview: BIG-IQ Cloud...14 BIG-IQ Cloud

More information

BIG-IP Local Traffic Manager : Implementations. Version 11.4

BIG-IP Local Traffic Manager : Implementations. Version 11.4 BIG-IP Local Traffic Manager : Implementations Version 11.4 Table of Contents Table of Contents Legal Notices...13 Acknowledgments...15 Chapter 1: Configuring a Simple Intranet...19 Overview: A simple

More information

BIG-IP Access Policy Manager : Citrix Integration. Version 11.4

BIG-IP Access Policy Manager : Citrix Integration. Version 11.4 BIG-IP Access Policy Manager : Citrix Integration Version 11.4 Table of Contents Table of Contents Legal Notices...5 Acknowledgments...7 Chapter 1: Citrix Requirements for Integration with APM...11 About

More information

Enterprise Manager : Monitoring Network Health and Activity. Version 3.1

Enterprise Manager : Monitoring Network Health and Activity. Version 3.1 Enterprise Manager : Monitoring Network Health and Activity Version 3.1 Table of Contents Table of Contents Legal Notices...7 Chapter 1: Using ihealth for Configuration Collection and Diagnostics...9

More information

BIG-IP Access Policy Manager Single Sign-On Configuration Guide. Version 11.0

BIG-IP Access Policy Manager Single Sign-On Configuration Guide. Version 11.0 BIG-IP Access Policy Manager Single Sign-On Configuration Guide Version 11.0 Table of Contents Table of Contents Legal Notices...5 Acknowledgments...7 Chapter 1: Configuring Single Sign-On with BIG-IP

More information

BIG-IP Global Traffic Manager : Monitors Reference. Version 11.2

BIG-IP Global Traffic Manager : Monitors Reference. Version 11.2 BIG-IP Global Traffic Manager : Monitors Reference Version 11.2 Table of Contents Table of Contents Legal tices...5 Acknowledgments...7 Chapter 1: Monitors Concepts...9 Purpose of monitors...10 Benefits

More information

BIG-IQ Cloud and Linux KVM: Setup. Version 1.0

BIG-IQ Cloud and Linux KVM: Setup. Version 1.0 BIG-IQ Cloud and Linux KVM: Setup Version 1.0 Table of Contents Table of Contents Legal Notices...5 Legal notices...5 Getting Started with BIG-IQ Virtual Edition...7 What is BIG-IQ Virtual Edition?...7

More information

BIG-IP Access Policy Manager Authentication Configuration Guide. Version 11.0

BIG-IP Access Policy Manager Authentication Configuration Guide. Version 11.0 BIG-IP Access Policy Manager Authentication Configuration Guide Version 11.0 Table of Contents Table of Contents Legal Notices...5 Acknowledgments...7 Chapter 1: Authentication Concepts...9 Authentication

More information

Enterprise Manager : Health and Performance Monitoring Database Schema. Version 2.3

Enterprise Manager : Health and Performance Monitoring Database Schema. Version 2.3 Enterprise Manager : Health and Performance Monitoring Database Schema Version 2.3 Table of Contents Table of Contents Legal Notices...5 Acknowledgments...7 Chapter 1: Database Schema Overview...9 About

More information

BIG-IP Virtual Edition Setup Guide for Microsoft Hyper-V. Version 10.2.2

BIG-IP Virtual Edition Setup Guide for Microsoft Hyper-V. Version 10.2.2 BIG-IP Virtual Edition Setup Guide for Microsoft Hyper-V Version 10.2.2 Table of Contents Table of Contents Legal Notices...5 Chapter 1: Getting Started with BIG-IP Virtual Edition...7 What is BIG-IP

More information

BIG-IP Global Traffic Manager : Load Balancing. Version 11.6

BIG-IP Global Traffic Manager : Load Balancing. Version 11.6 BIG-IP Global Traffic Manager : Load Balancing Version 11.6 Table of Contents Table of Contents Legal Notices...5 Acknowledgments...7 Chapter 1: About Global Server Load Balancing...11 Introducing the

More information

BIG-IP Virtual Edition Setup Guide for Microsoft Hyper-V. Version 11.5

BIG-IP Virtual Edition Setup Guide for Microsoft Hyper-V. Version 11.5 BIG-IP Virtual Edition Setup Guide for Microsoft Hyper-V Version 11.5 Table of Contents Table of Contents Legal Notices...5 Chapter 1: Getting Started with BIG-IP Virtual Edition...7 What is BIG-IP Virtual

More information

BIG-IP Virtual Edition Setup Guide for Microsoft Hyper-V. Version 11.3

BIG-IP Virtual Edition Setup Guide for Microsoft Hyper-V. Version 11.3 BIG-IP Virtual Edition Setup Guide for Microsoft Hyper-V Version 11.3 Table of Contents Table of Contents Legal Notices...5 Chapter 1: Getting Started with BIG-IP Virtual Edition...7 What is BIG-IP Virtual

More information

BIG-IP DNS Services: Implementations. Version 11.6

BIG-IP DNS Services: Implementations. Version 11.6 BIG-IP DNS Services: Implementations Version 11.6 Table of Contents Table of Contents Legal Notices...9 Acknowledgments...11 Chapter 1: Configuring DNS Express...23 What is DNS Express?...24 About configuring

More information

BIG-IP Access Policy Manager Single Sign-On Configuration Guide. Version 11.2

BIG-IP Access Policy Manager Single Sign-On Configuration Guide. Version 11.2 BIG-IP Access Policy Manager Single Sign-On Configuration Guide Version 11.2 Table of Contents Table of Contents Legal Notices...5 Acknowledgments...7 Chapter 1: Configuring Single Sign-On with Access

More information

BIG-IP Systems: DoS Protection and Protocol Firewall Implementations. Version 11.6

BIG-IP Systems: DoS Protection and Protocol Firewall Implementations. Version 11.6 BIG-IP Systems: DoS Protection and Protocol Firewall Implementations Version 11.6 Table of Contents Table of Contents Legal Notices...7 Acknowledgments...9 Chapter 1: Detecting and Protecting Against

More information

BIG-IP Access Policy Manager : Authentication and Single Sign-On. Version 11.5

BIG-IP Access Policy Manager : Authentication and Single Sign-On. Version 11.5 BIG-IP Access Policy Manager : Authentication and Single Sign-On Version 11.5 Table of Contents Table of Contents Legal Notices...13 Acknowledgments...15 Chapter 1: Authentication Concepts...19 About

More information

BIG-IP Access Policy Manager and F5 Access for Chrome OS v1.0.0 1.0.0

BIG-IP Access Policy Manager and F5 Access for Chrome OS v1.0.0 1.0.0 BIG-IP Access Policy Manager and F5 Access for Chrome OS v1.0.0 1.0.0 Table of Contents Table of Contents Legal notices...5 Acknowledgments...7 Chapter 1: Overview: F5 Access for Chrome OS...13 What does

More information

BIG-IP Local Traffic Manager : Implementations 11.1

BIG-IP Local Traffic Manager : Implementations 11.1 BIG-IP Local Traffic Manager : Implementations 11.1 Table of Contents Table of Contents Legal Notices...13 Acknowledgments...15 Chapter 1: Configuring a Simple Intranet...19 Overview: A simple intranet

More information

icontrol REST User Guide Version 11.6

icontrol REST User Guide Version 11.6 icontrol REST User Guide Version 11.6 Table of Contents Table of Contents Legal Notices...7 Acknowledgments...9 Chapter 1: REST...13 What's new in icontrol REST for version 11.6...14 About Representational

More information

Configuration Guide for Local Traffic Management

Configuration Guide for Local Traffic Management Configuration Guide for Local Traffic Management version 9.0 MAN-0122-01 Product Version This manual applies to version 9.0 of BIG-IP Local Traffic Manager TM, BIG-IP Load Balancer Limited TM, and BIG-IP

More information

BIG-IP Access Policy Manager : Authentication and Single Sign-On. Version 11.6

BIG-IP Access Policy Manager : Authentication and Single Sign-On. Version 11.6 BIG-IP Access Policy Manager : Authentication and Single Sign-On Version 11.6 Table of Contents Table of Contents Legal Notices...13 Acknowledgments...15 Chapter 1: Authentication Concepts...19 About

More information

BIG IP Global Traffic Manager (GTM) v.11

BIG IP Global Traffic Manager (GTM) v.11 BIG IP Global Traffic Manager (GTM) v.11 This two day course gives networking professionals a functional understanding of the BIG IP GTM system as it is commonly used. The course covers installation, configuration,

More information

Deploying the BIG-IP System with Microsoft Lync Server 2010 and 2013 for Site Resiliency

Deploying the BIG-IP System with Microsoft Lync Server 2010 and 2013 for Site Resiliency Deployment Guide Document Version 1.2 What s inside: 2 Configuration example 5 Configuring the BIG-IP LTM using the Lync 2010 iapp 6 Configuring the BIG-IP GTM 11 Creating a Distributed Application for

More information

TMOS : IP Routing Administration. Version 11.2

TMOS : IP Routing Administration. Version 11.2 TMOS : IP Routing Administration Version 11.2 Table of Contents Table of Contents Legal Notices...5 Acknowledgments...7 Chapter 1: Overview of TMOS Routing...11 Overview of IP routing administration in

More information

BIG-IP Virtual Edition Setup Guide for VMware ESX or ESXi. Version 10.2.2

BIG-IP Virtual Edition Setup Guide for VMware ESX or ESXi. Version 10.2.2 BIG-IP Virtual Edition Setup Guide for VMware ESX or ESXi Version 10.2.2 Table of Contents Table of Contents Legal Notices...5 Chapter 1: Getting Started with BIG-IP Virtual Edition...7 What is BIG-IP

More information

Deployment Guide. Deploying F5 BIG-IP Global Traffic Manager on VMware vcloud Hybrid Service

Deployment Guide. Deploying F5 BIG-IP Global Traffic Manager on VMware vcloud Hybrid Service Deployment Guide Deploying F5 BIG-IP Global Traffic Manager on VMware vcloud Hybrid Service A. Introduction VMware vcloud Hybrid Service is an effective, flexible and reliable platform for enterprise customers

More information

BIG-IP Systems: DoS Protection and Protocol Firewall Implementations. Version 12.0

BIG-IP Systems: DoS Protection and Protocol Firewall Implementations. Version 12.0 BIG-IP Systems: DoS Protection and Protocol Firewall Implementations Version 12.0 Table of Contents Table of Contents Legal Notices...7 Legal notices...7 Detecting and Protecting Against DoS, DDoS, and

More information

BIG-IP System: SSL Administration. Version 11.5

BIG-IP System: SSL Administration. Version 11.5 BIG-IP System: SSL Administration Version 11.5 Table of Contents Table of Contents Legal Notices...7 Acknowledgments...9 Chapter 1: About SSL Administration on the BIG-IP System...21 About SSL administration

More information

BIG-IP Virtual Edition Setup Guide for Linux Community Xen. Version 11.6

BIG-IP Virtual Edition Setup Guide for Linux Community Xen. Version 11.6 BIG-IP Virtual Edition Setup Guide for Linux Community Xen Version 11.6 Table of Contents Table of Contents Legal Notices...5 Chapter 1: Getting Started with BIG-IP Virtual Edition...7 What is BIG-IP

More information

DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010

DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010 DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration

More information

Array Networks NetContinuum. Netli. Fine Ground. StrangeLoop. Akamai. Barracuda. Aptimize. Inkra. Nortel. Juniper. Cisco. Brocade/Foundry.

Array Networks NetContinuum. Netli. Fine Ground. StrangeLoop. Akamai. Barracuda. Aptimize. Inkra. Nortel. Juniper. Cisco. Brocade/Foundry. Array Networks NetContinuum Netli Barracuda StrangeLoop Inkra Fine Ground Aptimize Akamai Cisco Citrix Juniper Zeus Radware Nortel ActivNetworks Brocade/Foundry Swan Labs A10 Redline Coyote Point Crescendo

More information

Deploying F5 to Replace Microsoft TMG or ISA Server

Deploying F5 to Replace Microsoft TMG or ISA Server Deploying F5 to Replace Microsoft TMG or ISA Server Welcome to the F5 deployment guide for configuring the BIG-IP system as a forward and reverse proxy, enabling you to remove or relocate gateway security

More information

BIG-IP TMOS : Implementations. Version 11.5

BIG-IP TMOS : Implementations. Version 11.5 BIG-IP TMOS : Implementations Version 11.5 Table of Contents Table of Contents Legal Notices...13 Acknowledgments...15 Chapter 1: Customizing the BIG-IP Dashboard...27 Overview: BIG-IP dashboard customization...28

More information

BIG-IP Virtual Edition Setup Guide for VMware ESXi. Version 11.5

BIG-IP Virtual Edition Setup Guide for VMware ESXi. Version 11.5 BIG-IP Virtual Edition Setup Guide for VMware ESXi Version 11.5 Table of Contents Table of Contents Legal Notices...5 Chapter 1: Getting Started with BIG-IP Virtual Edition...7 What is BIG-IP Virtual

More information

Deploying the BIG-IP System v10 with SAP NetWeaver and Enterprise SOA: ERP Central Component (ECC)

Deploying the BIG-IP System v10 with SAP NetWeaver and Enterprise SOA: ERP Central Component (ECC) DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with SAP NetWeaver and Enterprise SOA: ERP Central Component (ECC) Version 1.1 Table of Contents Table of Contents Deploying the BIG-IP system v10 with

More information

DEPLOYMENT GUIDE. Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0

DEPLOYMENT GUIDE. Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0 DEPLOYMENT GUIDE Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0 Introducing the F5 and Microsoft Dynamics CRM configuration Microsoft Dynamics CRM is a full customer relationship

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5 Deploying F5 with Microsoft IIS 7.0 and 7.5 F5's BIG-IP system can increase the existing benefits of deploying

More information

F5 Configuring BIG-IP Local Traffic Manager (LTM) - V11. Description

F5 Configuring BIG-IP Local Traffic Manager (LTM) - V11. Description F5 Configuring BIG-IP Local Traffic Manager (LTM) - V11 Description This four-day course gives networking professionals a functional understanding of the BIG-IP LTM v11 system as it is commonly used, as

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration

More information

Deploying F5 for Microsoft Office Web Apps Server 2013

Deploying F5 for Microsoft Office Web Apps Server 2013 Deploying F5 for Microsoft Office Web Apps Server 2013 Welcome to the F5 - Microsoft Office Web Apps Server deployment guide. This document contains guidance on configuring the BIG-IP Local Traffic Manager

More information

Description: Topics covered in this course include:

Description: Topics covered in this course include: Course: F5 BIG-IP Global Traffic Manager Duration: 2 Day Hands-On Lab & Lecture Course Price: $ 1,995.00 Description: This two-day course gives networking professionals a functional understanding of the

More information

BIG-IP TMOS : Tunneling and IPsec. Version 12.0

BIG-IP TMOS : Tunneling and IPsec. Version 12.0 BIG-IP TMOS : Tunneling and IPsec Version 12.0 Table of Contents Table of Contents Legal Notices...7 Legal notices...7 Creating IP Tunnels...9 About IP tunnels...9 About point-to-point tunnels...9 Creating

More information

BIG-IQ Security: Administration. Version 4.5

BIG-IQ Security: Administration. Version 4.5 BIG-IQ Security: Administration Version 4.5 Table of Contents Table of Contents Legal Notices...9 Acknowledgments...11 Chapter 1: Overview: BIG-IQ Security...19 Understanding BIG-IQ Network Security and

More information

Deploying F5 with Microsoft Active Directory Federation Services

Deploying F5 with Microsoft Active Directory Federation Services F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services

More information

BIG-IP Administrator Guide

BIG-IP Administrator Guide BIG-IP Administrator Guide version 4.0 MAN-0034-00 Service and Support Information Product Version This manual applies to version 4.0 of the BIG-IP Controller. Obtaining Technical Support Web tech.f5.com

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft Outlook Web

More information

BIG-IP Access Policy Manager : Third-Party Integration Implementations. Version 12.0

BIG-IP Access Policy Manager : Third-Party Integration Implementations. Version 12.0 BIG-IP Access Policy Manager : Third-Party Integration Implementations Version 12.0 Table of Contents Table of Contents Legal Notices...9 Legal notices...9 Citrix Requirements for Integration with APM...11

More information

Configuring a single-tenant BIG-IP Virtual Edition in the Cloud

Configuring a single-tenant BIG-IP Virtual Edition in the Cloud Deployment Guide Document Version: 1.0 What s inside: 2 Configuration example 4 Securing the isession deployment 6 Downloading and importing the new iapp 6 Configuring the BIG- IP systems using the Cloud

More information

Deploying the BIG-IP System with Microsoft IIS

Deploying the BIG-IP System with Microsoft IIS Deploying the BIG-IP System with Welcome to the F5 deployment guide for Microsoft Internet Information Services (IIS). This document contains guidance on configuring the BIG-IP system version 11.4 and

More information

BIG-IP Reference Guide

BIG-IP Reference Guide BIG-IP Reference Guide version 4.0 MAN-0036-00 Service and Support Information Product Version This manual applies to version 4.0 of the BIG-IP Controller. Obtaining Technical Support Web tech.f5.com Phone

More information

Introducing the BIG-IP and SharePoint Portal Server 2003 configuration

Introducing the BIG-IP and SharePoint Portal Server 2003 configuration Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on

More information

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites

More information

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Microsoft Exchange Server 2007

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Microsoft Exchange Server 2007 DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Microsoft Exchange Server 2007 Table of Contents Table of Contents Deploying F5 devices with Microsoft Exchange Server 2007 Client Access Servers Prerequisites

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH SAP NETWEAVER AND ENTERPRISE SOA

DEPLOYMENT GUIDE DEPLOYING F5 WITH SAP NETWEAVER AND ENTERPRISE SOA DEPLOYMENT GUIDE DEPLOYING F5 WITH SAP NETWEAVER AND ENTERPRISE SOA Table of Contents Table of Contents Introducing the F5 Deployment Guide for SAP NetWeaver and Enterprise SOA Prerequisites and configuration

More information

BIG-IP Access Policy Manager : Authentication and Single Sign-On. Version 12.0

BIG-IP Access Policy Manager : Authentication and Single Sign-On. Version 12.0 BIG-IP Access Policy Manager : Authentication and Single Sign-On Version 12.0 Table of Contents Table of Contents Legal Notices...15 Legal notices...15 Authentication Concepts...17 About AAA server support...17

More information

An Oracle White Paper December, 2012. Enterprise Manager 12c Cloud Control: Configuring OMS Disaster Recovery with F5 BIG-IP Global Traffic Manager

An Oracle White Paper December, 2012. Enterprise Manager 12c Cloud Control: Configuring OMS Disaster Recovery with F5 BIG-IP Global Traffic Manager An Oracle White Paper December, 2012 Enterprise Manager 12c Cloud Control: Configuring OMS Disaster Recovery with F5 BIG-IP Global Traffic Manager Contents Contents... 1 Executive Overview... 2 Disaster

More information

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH MICROSOFT INTERNET INFORMATION SERVICES (IIS) 7.0

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH MICROSOFT INTERNET INFORMATION SERVICES (IIS) 7.0 DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH MICROSOFT INTERNET INFORMATION SERVICES (IIS) 7.0 Deploying F5 with Microsoft IIS 7.0 F5's BIG-IP system can increase the existing benefits of deploying

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH MICROSOFT WINDOWS SERVER 2008

DEPLOYMENT GUIDE DEPLOYING F5 WITH MICROSOFT WINDOWS SERVER 2008 DEPLOYMENT GUIDE DEPLOYING F5 WITH MICROSOFT WINDOWS SERVER 2008 Table of Contents Table of Contents Deploying F5 with Microsoft Windows Server 2008 Prerequisites and configuration notes...1-1 Deploying

More information

Document version: 1.3 What's inside: Products and versions tested Important:

Document version: 1.3 What's inside: Products and versions tested Important: Deployment Guide Document version: 1.3 What's inside: 2 Prerequisites and configuration notes 2 Configuration example 3 Configuring the BIG-IP ASM for Oracle Database Firewall 3 Configuring the BIG-IP

More information

Learn About The Top Ten Best Selling Software Under.2.0

Learn About The Top Ten Best Selling Software Under.2.0 BIG-IP Open Source Notices and Software Acknowledgments Version 12.1 Table of Contents Table of Contents Legal Notices... 5 Legal notices...5 Notice regarding certain FOSS licenses... 6 Acknowledgments

More information

AG MacOS Standalone Array Client Administration Guide

AG MacOS Standalone Array Client Administration Guide AG MacOS Standalone Array Client Administration Guide Copyright Statement Copyright Statement Copyright 2015 Array Networks, Inc., 1371 McCarthy Blvd, Milpitas, California 95035, USA. All rights reserved.

More information

How To Deploy F5 With A Hyperv Virtual Machine Manager 2008

How To Deploy F5 With A Hyperv Virtual Machine Manager 2008 DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Microsoft Hyper-V and System Center Virtual Machine Manager 2008 Table of Contents Table of Contents Deploying F5 with Microsoft Hyper-V and System Center

More information

Installation Guide Supplement

Installation Guide Supplement Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,

More information

SuperLumin Nemesis. Administration Guide. February 2011

SuperLumin Nemesis. Administration Guide. February 2011 SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility

More information

Deploying F5 with IBM Tivoli Maximo Asset Management

Deploying F5 with IBM Tivoli Maximo Asset Management Deployment Guide Document Version 1.2 What s inside: 2 Prerequisites and configuration notes 2 Configuration example and traffic flows 6 Configuring the BIG-IP LTM for Maximo 7 Configuring the BIG-IP WebAccelerator

More information

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the

More information

DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD

DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD Configuring the BIG-IP LTM system for use with FirePass controllers Welcome to the Configuring

More information

BIG-IQ API Reference Guide

BIG-IQ API Reference Guide BIG-IQ API Reference Guide version 4.3.0 PUB-0281-03 Legal Notices Product Version This manual applies to version 4.3.0 of BIG-IQ system. Publication Date This document was published on February 25, 2014.

More information

Deploying the BIG-IP System v11 with Microsoft SharePoint 2010 and 2013

Deploying the BIG-IP System v11 with Microsoft SharePoint 2010 and 2013 Deployment Guide Document version 3.9 What's inside: 2 Prerequisites and configuration notes 4 Configuration example 5 Preparation Worksheet 6 Configuring Alternate Access Mappings for SSL offload 9 Configuring

More information

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12 DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration

More information

DEPLOYMENT GUIDE Version 1.0. Deploying F5 with Microsoft Virtualization Technology

DEPLOYMENT GUIDE Version 1.0. Deploying F5 with Microsoft Virtualization Technology DEPLOYMENT GUIDE Version 1.0 Deploying F5 with Microsoft Virtualization Technology Table of Contents Table of Contents Deploying F5 with Microsoft Virtualization technology Revision history...1-1 Deploying

More information

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7 DEPLOYMENT GUIDE Version 1.1 Deploying F5 with IBM WebSphere 7 Table of Contents Table of Contents Deploying the BIG-IP LTM system and IBM WebSphere Servers Prerequisites and configuration notes...1-1

More information

Accelerating SaaS Applications with F5 AAM and SSL Forward Proxy

Accelerating SaaS Applications with F5 AAM and SSL Forward Proxy Deployment Guide Accelerating Applications with F5 AAM and SSL Forward Proxy Welcome to the F5 deployment guide for Software as a Service (). This guide shows administrators how to configure the BIG-IP

More information

Configuring the BIG-IP system for FirePass controllers

Configuring the BIG-IP system for FirePass controllers Deployment Guide Configuring the BIG-IP System with FirePass Controllers for Load Balancing and SSL Offload Configuring the BIG-IP system for FirePass controllers Welcome to the Configuring the BIG-IP

More information

Deploying the BIG-IP System v10 with Oracle Application Server 10g R2

Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 Version 1.1 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s Application Server 10g

More information

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Oracle Application Server 10g Table of Contents Table of Contents Introducing the F5 and Oracle 10g configuration Prerequisites and configuration notes...1-1

More information

CONFIGURING BIG-IP LOCAL TRAFFIC MANAGER 3-Day

CONFIGURING BIG-IP LOCAL TRAFFIC MANAGER 3-Day Course: CONFIGURING BIG-IP LOCAL TRAFFIC MANAGER 3-Day Duration: 3 Day Hands-On Lab & Lecture Course Price: $ 2,995.00 Description: This three-day course gives networking professionals a functional understanding

More information

Deploying the BIG-IP System v11 with Microsoft SharePoint 2010 and 2013

Deploying the BIG-IP System v11 with Microsoft SharePoint 2010 and 2013 Deployment Guide Document version 3.2 What's inside: 2 What is F5 iapp? 2 Prerequisites and configuration notes 4 Configuration example 5 Preparation Worksheet 6 Configuring SharePoint Alternate Access

More information

Deploying the BIG-IP System v11 with DNS Servers

Deploying the BIG-IP System v11 with DNS Servers Deployment Guide Document version 1.1 What s inside: 2 What is F5 iapp? 2 Prerequisites and configuration notes 2 Configuration example 3 Preparation Worksheet 4 Configuring the BIG-IP iapp for DNS Servers

More information

Deploying F5 with Microsoft Forefront Threat Management Gateway 2010

Deploying F5 with Microsoft Forefront Threat Management Gateway 2010 Deployment Guide Document Version 1.4 What s inside: 2 Prerequisites and configuration notes 3 Configuring two-way firewall load balancing to Microsoft OWA 11 Configuring firewall load balancing with a

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP v10.2 to Enable Long Distance VMotion with VMware vsphere

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP v10.2 to Enable Long Distance VMotion with VMware vsphere DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP v10.2 to Enable Long Distance VMotion with VMware vsphere Table of Contents Table of Contents Introducing the BIG-IP and VMware long-distance VMotion deployment

More information

Deploying the BIG-IP System with Oracle WebLogic Server

Deploying the BIG-IP System with Oracle WebLogic Server Deployment Guide Deploying the BIG-IP System with Welcome to the F5 and Oracle WebLogic Server deployment guide. F5 provides a highly eective way to optimize and direct traic for WebLogic Server with the

More information

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP

More information

F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution

F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution As market leaders in the application delivery market and DNS, DHCP, and IP Address Management (DDI) market

More information

Deploying F5 with Microsoft Remote Desktop Session Host Servers

Deploying F5 with Microsoft Remote Desktop Session Host Servers Deploying F5 with Servers Welcome to the F5 deployment guide for Microsoft Remote Desktop Services included in Windows Server 2012 and Windows Server 2008 R2. This document provides guidance on configuring

More information

DEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager

DEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager DEPLOYMENT GUIDE Version 1.1 Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager Table of Contents Table of Contents Configuring BIG-IP WOM with Oracle Database

More information

Deploying the BIG-IP System v11 with LDAP Servers

Deploying the BIG-IP System v11 with LDAP Servers Deployment Guide Deploying the BIG-IP System v11 with What s inside: 2 Prerequisites and configuration notes 2 Configuration example 3 Preparation Worksheet 4 Configuring the BIG-IP iapp for LDAP 7 Next

More information