SlideShare ist ein Scribd-Unternehmen logo
1 von 31
CONFIDENTIAL   1




Link Controller
Team Training
Presented by:
Denny Payne
Consultant
CONFIDENTIAL   2




Link Controller Overview
• Purpose: Link Controller is designed to provide
  load balancing and/or failover for multiple locally
  attached ISP links.
• Hardware & Licensing: Sold on 1500 and 3400
  platforms, either standalone or as module on top
  of LTM/GTM
• Focus of this presentation is v9, but most
  concepts apply to v4 as well
CONFIDENTIAL   3




Link Controller Advantages
 Advantages to customer:
 - Eliminates BGP requirements
 - ISP’s not required to coordinate
 - New links can be added transparently
 - GUI management of zone files
      - ZoneRunner (v9) or NameSurfer (v4)

 Advantages over competition
 - Modular construction on TMOS
 - iRules and health checking capability
CONFIDENTIAL      4




Link Controller Limitations
• A standalone LC is a hybrid of LTM (BIG-IP) and GTM (3-
  DNS) with a subset of each feature set
• No L7 iRules or health checking functionality
• No advanced load balancing algorithms (obsv/pred)
• No ability to resolve IP’s that it does not host (therefore no
  site-to-site failover or DR)
• Must be locally attached to public IP blocks
   – Therefore, must sit outside the firewall
   – May not be desirable to do LC/LTM combo
CONFIDENTIAL


Typical Link Controller Deployment
CONFIDENTIAL   6




Deployment considerations
• LC’s hybrid design can be summed up by noting:
  – Outbound traffic is processed like LTM (BIG-IP)
  – Inbound traffic is processed like GTM (3-DNS)


  Link Controller must be the default gateway for
  the firewall
CONFIDENTIAL     7




LC Quick Start
•   Define VLANs
•   Define Self IP’s
•   Create Gateway Pool
•   Create default route, reference Gateway pool
•   Define links
•   Define NTP server
•   Define Listeners for each link
•   Create outbound wildcard LB Virtual Server, reference the gateway
    pool
•   Create outbound SNATs or SNAT pools for each egress VLAN
•   Create Local Traffic Pools
•   Create Local Traffic Virtual Servers for each link
•   Create a WideIP
CONFIDENTIAL       8




Inbound LC Transaction
  Internet client requests name resolution for
  gnu.es.f5net.com
  Internet DNS servers tell client that lc.es.f5net.com is the
  authoritative name server for the es.f5net.com zone
  Client queries lc.es.f5net.com for name resolution of
  gnu.es.f5net.com
  lc.es.f5net.com returns the IP address 10.1.10.100, the
  LTM virtual server on link1
  The client sends it’s HTTP request to 10.1.10.100:80
  and the LC processes the request as per the
  configuration of that LTM virtual server and default pool
CONFIDENTIAL   9




Outbound Traffic
• Outbound traffic is handled in a manner similar to
  LTM server load balancing.
• Create a pool containing each of the ISP router
  gateway addresses with service port “any”
• Create a wildcard virtual server (0.0.0.0:0) using
  all protocols, enabled on the internal VLAN and
  point it to the previously created pool.
• Enable SNAT automap from the internal VLAN
CONFIDENTIAL


Typical Link Controller Deployment
CONFIDENTIAL     11




Outbound Traffic options
 If desired, more specific virtual servers may be used to
 split up traffic in different ways.
 Example: create 3 pools, one with both gateways,
 another with only gateway 1 and a third with only gateway
 2.
 Then create 0.0.0.0:0 using pool 1, 0:0:0:0:80 using pool
 2, and 0:0:0:0:25 using pool 3.
 This may be expanded upon with pool priority and/or
 iRules to produce the desired traffic flow
 Allow ANY IP over SNAT for icmp/ping.
CONFIDENTIAL    12




Pool load balancing
• Round robin and static ratio are available, but the
  typical setting will be dynamic ratio.

• Dynamic ratio will use the link configuration
  settings (discussed in next section) to make load
  balancing decisions
CONFIDENTIAL      13




Inbound Traffic
• Inbound traffic is handled in the same manner as
  GTM (3-DNS)
  – Recall the limitation that it can only hand out addresses
    that it hosts
• Requires DNS delegation
  – At minimum, LC must be authoritative for the domains
    that are load balanced/failed over
  – Can take over the entire domain if desired
CONFIDENTIAL   14




DNS Listeners
• Need a DNS listener on each ISP network – use
  floating address for redundant pair
  – For more than 2 ISP’s pick the 2 primary links since
    DNS typically will only use a ns1 and ns2 record


  No v4 equivalent, udp 53 should be allowed to
  floating IP’s on each ISP netblock
CONFIDENTIAL     15




Inbound Pools and VIPS
• Inbound pools and VIPS are set up in nearly the
  same manner as LTM, with 2 key differences
  – Pools will usually only have 1 member, which is the
    NAT address for the application on the firewall
  – Need a virtual server on each ISP’s network that points
    to the same pool
  – These virtuals correspond to the DNS entries that LC
    will give out to clients for a given domain
CONFIDENTIAL


Typical Link Controller Deployment
CONFIDENTIAL   17




Link Configuration
• Define the links (one per ISP) and set up the
  relevant cost and/or bandwidth structure for each
  – Link capacity
  – Price per mb (prepaid vs burst cost)


• Dynamic ratio will use these figures to determine
  load balancing
  – Not necessarily required to be real-world figures
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL    20




WideIP Configuration
• Final step is creation of WideIP’s
  – Domain name to virtual server mapping
  – Only allowed to use virtual servers that are hosted by
    the LC itself
  – No pools concept as on GTM


• ZoneRunner entries created automatically
  – NameSurfer in v4
CONFIDENTIAL


Typical Link Controller Deployment
CONFIDENTIAL   22




Special Considerations
• IPSEC (VPN’s)
  – LC cannot terminate IPSEC tunnels
  – IPSEC typically cannot survive a NAT
     • Some IPSEC clients cannot resolve by name
• Solution 1: Forward IPSEC directly to firewall or
  endpoint
  – Requires public IP block between LC and firewall
  – Requires IP forwarding virtual on LC from external to
    internal
CONFIDENTIAL   23




IPSEC cont.
• Solution 2: Implement an IPSEC solution that
  supports NAT traversal or “tunnel and transport
  mode”
  – Uses typical LC configuration (SNAT automap
    outbound and virtual -> pool inbound)
  – Checkpoint and PIX definitely support, others not
    verified
CONFIDENTIAL


Typical Link Controller Deployment
CONFIDENTIAL   25




Special Considerations cont.
• L2 Bridging not recommended
  – Supposedly can be configured on one link, with outbound
    wildcard VIP bound to internal child VLAN and doing SNAT
    automap
  – Proceed at own risk


  BIND vs ZoneRunner/NameSurfer
  – Customer may choose to use BIND to manage zone files
    (particularly if LC is taking over entire domain)
  – Typically, once done, cannot be reverted
CONFIDENTIAL     26



How do I manage BIND zone
files?
 BIND zone management is the same as in LTM,
 manual and not supported.

 ZoneRunner is NOT included in the LC software
 module.

 One can configure BIND manually, and maintain it
 through the CLI.
 – Configuration of BIND via CLI is not supported.
 – We will patch named if a bug is found in the named code and a
   new version is available to address that bug.
CONFIDENTIAL          27




The LC Link Object: Basic View
 Link objects functionality is the same as that of 4.x, and consist of the
 following elements:

  – Name: Link object name

  – Router Address: The address of the gateway router for that ISP link

  – Uplink Address: The router’s IP address that connects to the ISP

  – Service Provider: Descriptive field used for a logical identification of that link’s
    service provider

  – Health Monitor: the bigip_link monitor is the recommended monitor for links
CONFIDENTIAL           28




LC Objects
 LC UI objects inherited from LTM are configured in the same way they are
 configured on a LTM stand alone product.

 LC Links are configured in the Network section of the UI, but the link objects are
 stored in the wideip.conf file.
  –   Links: Network->Links

 GTM inherited features are configured in the under the “Global Traffic” section of
 the UI.
  –   GTM Listners: Global Traffic->Listeners
  –   WideIPs: Global Traffic-> Inbound Link Traffic
  –   Topology: Global Traffic->Topology

 Note: WideIP pools are not explicit objects in the UI. WideIP pools are
 automatically created by mcdp, their object names match that of their WideIP’s
 FQDN!
CONFIDENTIAL         29




WideIP pools on a Link Controller
  The WideIP pool objects are not visible via the UI on Link Controller.

  If a problem exists with a WideIP pool it will be necessary to edit the
  wideip.conf file from the command line.

  WideIP pools get an object name that matches the WideIP’s FQDN, thus
  it is easy to determine which WideIP pool will need to be edited.

Example:

  If an administrator attempts to create a WideIP from the UI, and the
  creation action fails due to a misconfiguration, the WideIP pool may get
  written out to the wideip.conf file, but the admin will not be able to see
  this from the UI.
CONFIDENTIAL   30




Known Issues (as of 9.2.3)
• Many hotfixes are available
• /config/gtm/wideip.conf seems susceptible to
  corruption in various ways
  – IP’s configured in GUI and later removed are not
    always cleaned up properly. This can lead to odd
    behavior in the GUI.
  ZoneRunner issues
F5  link controller

Weitere ähnliche Inhalte

Was ist angesagt?

DevNetCreate - ACI and Kubernetes Integration
DevNetCreate - ACI and Kubernetes IntegrationDevNetCreate - ACI and Kubernetes Integration
DevNetCreate - ACI and Kubernetes IntegrationHank Preston
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter PresentationBeny Haddad
 
Cloud Network Virtualization with Juniper Contrail
Cloud Network Virtualization with Juniper ContrailCloud Network Virtualization with Juniper Contrail
Cloud Network Virtualization with Juniper Contrailbuildacloud
 
Everything you ever needed to know about Kafka on Kubernetes but were afraid ...
Everything you ever needed to know about Kafka on Kubernetes but were afraid ...Everything you ever needed to know about Kafka on Kubernetes but were afraid ...
Everything you ever needed to know about Kafka on Kubernetes but were afraid ...HostedbyConfluent
 
[네이버오픈소스세미나] Pinpoint를 이용해서 서버리스 플랫폼 Apache Openwhisk 트레이싱하기 - 오승현
[네이버오픈소스세미나] Pinpoint를 이용해서 서버리스 플랫폼 Apache Openwhisk 트레이싱하기 - 오승현[네이버오픈소스세미나] Pinpoint를 이용해서 서버리스 플랫폼 Apache Openwhisk 트레이싱하기 - 오승현
[네이버오픈소스세미나] Pinpoint를 이용해서 서버리스 플랫폼 Apache Openwhisk 트레이싱하기 - 오승현NAVER Engineering
 
Introduction to Kafka Cruise Control
Introduction to Kafka Cruise ControlIntroduction to Kafka Cruise Control
Introduction to Kafka Cruise ControlJiangjie Qin
 
Kerberos and its application in cross realm operations
Kerberos and its application in cross realm operationsKerberos and its application in cross realm operations
Kerberos and its application in cross realm operationsArunangshu Bhakta
 
Building High-Throughput, Low-Latency Pipelines in Kafka
Building High-Throughput, Low-Latency Pipelines in KafkaBuilding High-Throughput, Low-Latency Pipelines in Kafka
Building High-Throughput, Low-Latency Pipelines in Kafkaconfluent
 
Hardening Kafka Replication
Hardening Kafka Replication Hardening Kafka Replication
Hardening Kafka Replication confluent
 
Tutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting routerTutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
 
BT IP Clear Factsheet
BT IP Clear FactsheetBT IP Clear Factsheet
BT IP Clear FactsheetWAN_DuPre
 
Why we love pgpool-II and why we hate it!
Why we love pgpool-II and why we hate it!Why we love pgpool-II and why we hate it!
Why we love pgpool-II and why we hate it!PGConf APAC
 
Comcast Business voice edge technical overview
Comcast Business voice edge technical overview Comcast Business voice edge technical overview
Comcast Business voice edge technical overview MichaelBencic2
 
Understand the iptables step by step
Understand the iptables step by stepUnderstand the iptables step by step
Understand the iptables step by stepHungWei Chiu
 
MiVoice Business software versions through time
MiVoice Business software versions through timeMiVoice Business software versions through time
MiVoice Business software versions through timedenwacomms
 
An Introduction to Distributed Search with Cassandra and Solr
An Introduction to Distributed Search with Cassandra and SolrAn Introduction to Distributed Search with Cassandra and Solr
An Introduction to Distributed Search with Cassandra and SolrDataStax Academy
 
VXLAN Design and Deployment.pdf
VXLAN Design and Deployment.pdfVXLAN Design and Deployment.pdf
VXLAN Design and Deployment.pdfNelAlv1
 

Was ist angesagt? (20)

ACI DHCP Config Guide
ACI DHCP Config GuideACI DHCP Config Guide
ACI DHCP Config Guide
 
DevNetCreate - ACI and Kubernetes Integration
DevNetCreate - ACI and Kubernetes IntegrationDevNetCreate - ACI and Kubernetes Integration
DevNetCreate - ACI and Kubernetes Integration
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter Presentation
 
Envoy and Kafka
Envoy and KafkaEnvoy and Kafka
Envoy and Kafka
 
Cloud Network Virtualization with Juniper Contrail
Cloud Network Virtualization with Juniper ContrailCloud Network Virtualization with Juniper Contrail
Cloud Network Virtualization with Juniper Contrail
 
Everything you ever needed to know about Kafka on Kubernetes but were afraid ...
Everything you ever needed to know about Kafka on Kubernetes but were afraid ...Everything you ever needed to know about Kafka on Kubernetes but were afraid ...
Everything you ever needed to know about Kafka on Kubernetes but were afraid ...
 
[네이버오픈소스세미나] Pinpoint를 이용해서 서버리스 플랫폼 Apache Openwhisk 트레이싱하기 - 오승현
[네이버오픈소스세미나] Pinpoint를 이용해서 서버리스 플랫폼 Apache Openwhisk 트레이싱하기 - 오승현[네이버오픈소스세미나] Pinpoint를 이용해서 서버리스 플랫폼 Apache Openwhisk 트레이싱하기 - 오승현
[네이버오픈소스세미나] Pinpoint를 이용해서 서버리스 플랫폼 Apache Openwhisk 트레이싱하기 - 오승현
 
Introduction to Kafka Cruise Control
Introduction to Kafka Cruise ControlIntroduction to Kafka Cruise Control
Introduction to Kafka Cruise Control
 
Kerberos and its application in cross realm operations
Kerberos and its application in cross realm operationsKerberos and its application in cross realm operations
Kerberos and its application in cross realm operations
 
Building High-Throughput, Low-Latency Pipelines in Kafka
Building High-Throughput, Low-Latency Pipelines in KafkaBuilding High-Throughput, Low-Latency Pipelines in Kafka
Building High-Throughput, Low-Latency Pipelines in Kafka
 
Introduction to apache kafka
Introduction to apache kafkaIntroduction to apache kafka
Introduction to apache kafka
 
Hardening Kafka Replication
Hardening Kafka Replication Hardening Kafka Replication
Hardening Kafka Replication
 
Tutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting routerTutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting router
 
BT IP Clear Factsheet
BT IP Clear FactsheetBT IP Clear Factsheet
BT IP Clear Factsheet
 
Why we love pgpool-II and why we hate it!
Why we love pgpool-II and why we hate it!Why we love pgpool-II and why we hate it!
Why we love pgpool-II and why we hate it!
 
Comcast Business voice edge technical overview
Comcast Business voice edge technical overview Comcast Business voice edge technical overview
Comcast Business voice edge technical overview
 
Understand the iptables step by step
Understand the iptables step by stepUnderstand the iptables step by step
Understand the iptables step by step
 
MiVoice Business software versions through time
MiVoice Business software versions through timeMiVoice Business software versions through time
MiVoice Business software versions through time
 
An Introduction to Distributed Search with Cassandra and Solr
An Introduction to Distributed Search with Cassandra and SolrAn Introduction to Distributed Search with Cassandra and Solr
An Introduction to Distributed Search with Cassandra and Solr
 
VXLAN Design and Deployment.pdf
VXLAN Design and Deployment.pdfVXLAN Design and Deployment.pdf
VXLAN Design and Deployment.pdf
 

Andere mochten auch

F5 Link controller Configuration
F5 Link controller Configuration F5 Link controller Configuration
F5 Link controller Configuration PCCW GLOBAL
 
Alternative teaching strategies
Alternative teaching strategiesAlternative teaching strategies
Alternative teaching strategiesMontessori Center
 
Agile Application Lifecycle Management (ALM)
Agile Application Lifecycle Management (ALM)Agile Application Lifecycle Management (ALM)
Agile Application Lifecycle Management (ALM)Jurgen Appelo
 
Aims, goals and objective purpose in curriculum development
Aims, goals and objective purpose in curriculum developmentAims, goals and objective purpose in curriculum development
Aims, goals and objective purpose in curriculum developmentInternational advisers
 
Regions Of Pennsylvania
Regions Of PennsylvaniaRegions Of Pennsylvania
Regions Of Pennsylvaniaiheart4th
 
Infrastructureless Wireless networks
Infrastructureless Wireless networksInfrastructureless Wireless networks
Infrastructureless Wireless networksGwendal Simon
 
Tropical seasonal forests
Tropical seasonal forestsTropical seasonal forests
Tropical seasonal forestsVinaya Shah
 
radioligand binding studies
radioligand binding studiesradioligand binding studies
radioligand binding studiesankit
 
Everything I Ever Learned About JVM Performance Tuning @Twitter
Everything I Ever Learned About JVM Performance Tuning @TwitterEverything I Ever Learned About JVM Performance Tuning @Twitter
Everything I Ever Learned About JVM Performance Tuning @TwitterAttila Szegedi
 
Feature Story - Sample
Feature Story - SampleFeature Story - Sample
Feature Story - SampleCourtney Dunn
 
Guide to Construction Procurement Strategies
Guide to Construction Procurement StrategiesGuide to Construction Procurement Strategies
Guide to Construction Procurement StrategiesSarah Fox
 
Relationship marketing concept, process and importance
Relationship marketing concept, process and importanceRelationship marketing concept, process and importance
Relationship marketing concept, process and importancegaurav jain
 
Citing Yourself (citing your previous work) in MLA or APA format
Citing Yourself (citing your previous work) in MLA or APA formatCiting Yourself (citing your previous work) in MLA or APA format
Citing Yourself (citing your previous work) in MLA or APA formatkhornberger
 
Difference between flyers, brochures, posters & leaflets
Difference between flyers, brochures, posters & leafletsDifference between flyers, brochures, posters & leaflets
Difference between flyers, brochures, posters & leafletsInteractive Bees
 
How Brands Grow : A summary of Byron Sharp's book on what marketers don't know
How Brands Grow : A summary of Byron Sharp's book on what marketers don't knowHow Brands Grow : A summary of Byron Sharp's book on what marketers don't know
How Brands Grow : A summary of Byron Sharp's book on what marketers don't knowAmie Weller
 
Layouting Your School Paper
Layouting Your School PaperLayouting Your School Paper
Layouting Your School PaperJerry Noveno
 

Andere mochten auch (20)

F5 Link controller Configuration
F5 Link controller Configuration F5 Link controller Configuration
F5 Link controller Configuration
 
SharePoint 101
SharePoint 101SharePoint 101
SharePoint 101
 
Alternative teaching strategies
Alternative teaching strategiesAlternative teaching strategies
Alternative teaching strategies
 
Why social advocacy
Why social advocacyWhy social advocacy
Why social advocacy
 
IT Service Catalog Examples
IT Service Catalog ExamplesIT Service Catalog Examples
IT Service Catalog Examples
 
Airway Management
Airway ManagementAirway Management
Airway Management
 
Agile Application Lifecycle Management (ALM)
Agile Application Lifecycle Management (ALM)Agile Application Lifecycle Management (ALM)
Agile Application Lifecycle Management (ALM)
 
Aims, goals and objective purpose in curriculum development
Aims, goals and objective purpose in curriculum developmentAims, goals and objective purpose in curriculum development
Aims, goals and objective purpose in curriculum development
 
Regions Of Pennsylvania
Regions Of PennsylvaniaRegions Of Pennsylvania
Regions Of Pennsylvania
 
Infrastructureless Wireless networks
Infrastructureless Wireless networksInfrastructureless Wireless networks
Infrastructureless Wireless networks
 
Tropical seasonal forests
Tropical seasonal forestsTropical seasonal forests
Tropical seasonal forests
 
radioligand binding studies
radioligand binding studiesradioligand binding studies
radioligand binding studies
 
Everything I Ever Learned About JVM Performance Tuning @Twitter
Everything I Ever Learned About JVM Performance Tuning @TwitterEverything I Ever Learned About JVM Performance Tuning @Twitter
Everything I Ever Learned About JVM Performance Tuning @Twitter
 
Feature Story - Sample
Feature Story - SampleFeature Story - Sample
Feature Story - Sample
 
Guide to Construction Procurement Strategies
Guide to Construction Procurement StrategiesGuide to Construction Procurement Strategies
Guide to Construction Procurement Strategies
 
Relationship marketing concept, process and importance
Relationship marketing concept, process and importanceRelationship marketing concept, process and importance
Relationship marketing concept, process and importance
 
Citing Yourself (citing your previous work) in MLA or APA format
Citing Yourself (citing your previous work) in MLA or APA formatCiting Yourself (citing your previous work) in MLA or APA format
Citing Yourself (citing your previous work) in MLA or APA format
 
Difference between flyers, brochures, posters & leaflets
Difference between flyers, brochures, posters & leafletsDifference between flyers, brochures, posters & leaflets
Difference between flyers, brochures, posters & leaflets
 
How Brands Grow : A summary of Byron Sharp's book on what marketers don't know
How Brands Grow : A summary of Byron Sharp's book on what marketers don't knowHow Brands Grow : A summary of Byron Sharp's book on what marketers don't know
How Brands Grow : A summary of Byron Sharp's book on what marketers don't know
 
Layouting Your School Paper
Layouting Your School PaperLayouting Your School Paper
Layouting Your School Paper
 

Ähnlich wie F5 link controller

Routed networks sydney
Routed networks sydneyRouted networks sydney
Routed networks sydneyMiguel Lavalle
 
CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2Chaing Ravuth
 
SHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd NetworkingSHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd Networkingnick_garrod
 
SHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd NetworkingSHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd Networkingnick_garrod
 
Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answersccna4discovery
 
DevOops - Lessons Learned from an OpenStack Network Architect
DevOops - Lessons Learned from an OpenStack Network ArchitectDevOops - Lessons Learned from an OpenStack Network Architect
DevOops - Lessons Learned from an OpenStack Network ArchitectJames Denton
 
Container network security
Container network securityContainer network security
Container network securityDaisuke Nakajima
 
Secure Multi Tenant Cloud with OpenContrail
Secure Multi Tenant Cloud with OpenContrailSecure Multi Tenant Cloud with OpenContrail
Secure Multi Tenant Cloud with OpenContrailPriti Desai
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2Waqas Ahmed Nawaz
 
Network and Service Virtualization tutorial at ONUG Spring 2015
Network and Service Virtualization tutorial at ONUG Spring 2015Network and Service Virtualization tutorial at ONUG Spring 2015
Network and Service Virtualization tutorial at ONUG Spring 2015SDN Hub
 
Understanding network and service virtualization
Understanding network and service virtualizationUnderstanding network and service virtualization
Understanding network and service virtualizationSDN Hub
 
Ccna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 AnswersCcna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 AnswersCCNA4Answers
 
Open stackaustinmeetupsept21
Open stackaustinmeetupsept21Open stackaustinmeetupsept21
Open stackaustinmeetupsept21Brent Doncaster
 
Ccna 4 Final 4 Version 4.0 Answers
Ccna 4 Final 4 Version 4.0 AnswersCcna 4 Final 4 Version 4.0 Answers
Ccna 4 Final 4 Version 4.0 AnswersCCNA4Answers
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksRIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksDani Royman Simanjuntak
 

Ähnlich wie F5 link controller (20)

Routed networks sydney
Routed networks sydneyRouted networks sydney
Routed networks sydney
 
CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2
 
Chapter14ccna
Chapter14ccnaChapter14ccna
Chapter14ccna
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
 
SHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd NetworkingSHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd Networking
 
SHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd NetworkingSHARE 2014, Pittsburgh CICS Connectivity amd Networking
SHARE 2014, Pittsburgh CICS Connectivity amd Networking
 
MCSA 70-412 Chapter 09
MCSA 70-412 Chapter 09MCSA 70-412 Chapter 09
MCSA 70-412 Chapter 09
 
Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answers
 
DevOops - Lessons Learned from an OpenStack Network Architect
DevOops - Lessons Learned from an OpenStack Network ArchitectDevOops - Lessons Learned from an OpenStack Network Architect
DevOops - Lessons Learned from an OpenStack Network Architect
 
Container network security
Container network securityContainer network security
Container network security
 
Secure Multi Tenant Cloud with OpenContrail
Secure Multi Tenant Cloud with OpenContrailSecure Multi Tenant Cloud with OpenContrail
Secure Multi Tenant Cloud with OpenContrail
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
 
Network and Service Virtualization tutorial at ONUG Spring 2015
Network and Service Virtualization tutorial at ONUG Spring 2015Network and Service Virtualization tutorial at ONUG Spring 2015
Network and Service Virtualization tutorial at ONUG Spring 2015
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
Understanding network and service virtualization
Understanding network and service virtualizationUnderstanding network and service virtualization
Understanding network and service virtualization
 
Ccna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 AnswersCcna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 Answers
 
Open stackaustinmeetupsept21
Open stackaustinmeetupsept21Open stackaustinmeetupsept21
Open stackaustinmeetupsept21
 
Ccna 4 Final 4 Version 4.0 Answers
Ccna 4 Final 4 Version 4.0 AnswersCcna 4 Final 4 Version 4.0 Answers
Ccna 4 Final 4 Version 4.0 Answers
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksRIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
 
infiniband.pdf
infiniband.pdfinfiniband.pdf
infiniband.pdf
 

Mehr von Jimmy Saigon

Invite god comes to your boat
Invite god comes to your boatInvite god comes to your boat
Invite god comes to your boatJimmy Saigon
 
Christie Digital Display solution.
Christie Digital Display solution.Christie Digital Display solution.
Christie Digital Display solution.Jimmy Saigon
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
F5-BigIP Edge gateway introduction
F5-BigIP Edge gateway introduction F5-BigIP Edge gateway introduction
F5-BigIP Edge gateway introduction Jimmy Saigon
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introductionJimmy Saigon
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Polycom introduction vietnamese
Polycom introduction   vietnamesePolycom introduction   vietnamese
Polycom introduction vietnameseJimmy Saigon
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introductionJimmy Saigon
 

Mehr von Jimmy Saigon (9)

God ‘s love
God ‘s loveGod ‘s love
God ‘s love
 
Invite god comes to your boat
Invite god comes to your boatInvite god comes to your boat
Invite god comes to your boat
 
Christie Digital Display solution.
Christie Digital Display solution.Christie Digital Display solution.
Christie Digital Display solution.
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
F5-BigIP Edge gateway introduction
F5-BigIP Edge gateway introduction F5-BigIP Edge gateway introduction
F5-BigIP Edge gateway introduction
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Polycom introduction vietnamese
Polycom introduction   vietnamesePolycom introduction   vietnamese
Polycom introduction vietnamese
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introduction
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

F5 link controller

  • 1. CONFIDENTIAL 1 Link Controller Team Training Presented by: Denny Payne Consultant
  • 2. CONFIDENTIAL 2 Link Controller Overview • Purpose: Link Controller is designed to provide load balancing and/or failover for multiple locally attached ISP links. • Hardware & Licensing: Sold on 1500 and 3400 platforms, either standalone or as module on top of LTM/GTM • Focus of this presentation is v9, but most concepts apply to v4 as well
  • 3. CONFIDENTIAL 3 Link Controller Advantages Advantages to customer: - Eliminates BGP requirements - ISP’s not required to coordinate - New links can be added transparently - GUI management of zone files - ZoneRunner (v9) or NameSurfer (v4) Advantages over competition - Modular construction on TMOS - iRules and health checking capability
  • 4. CONFIDENTIAL 4 Link Controller Limitations • A standalone LC is a hybrid of LTM (BIG-IP) and GTM (3- DNS) with a subset of each feature set • No L7 iRules or health checking functionality • No advanced load balancing algorithms (obsv/pred) • No ability to resolve IP’s that it does not host (therefore no site-to-site failover or DR) • Must be locally attached to public IP blocks – Therefore, must sit outside the firewall – May not be desirable to do LC/LTM combo
  • 6. CONFIDENTIAL 6 Deployment considerations • LC’s hybrid design can be summed up by noting: – Outbound traffic is processed like LTM (BIG-IP) – Inbound traffic is processed like GTM (3-DNS) Link Controller must be the default gateway for the firewall
  • 7. CONFIDENTIAL 7 LC Quick Start • Define VLANs • Define Self IP’s • Create Gateway Pool • Create default route, reference Gateway pool • Define links • Define NTP server • Define Listeners for each link • Create outbound wildcard LB Virtual Server, reference the gateway pool • Create outbound SNATs or SNAT pools for each egress VLAN • Create Local Traffic Pools • Create Local Traffic Virtual Servers for each link • Create a WideIP
  • 8. CONFIDENTIAL 8 Inbound LC Transaction Internet client requests name resolution for gnu.es.f5net.com Internet DNS servers tell client that lc.es.f5net.com is the authoritative name server for the es.f5net.com zone Client queries lc.es.f5net.com for name resolution of gnu.es.f5net.com lc.es.f5net.com returns the IP address 10.1.10.100, the LTM virtual server on link1 The client sends it’s HTTP request to 10.1.10.100:80 and the LC processes the request as per the configuration of that LTM virtual server and default pool
  • 9. CONFIDENTIAL 9 Outbound Traffic • Outbound traffic is handled in a manner similar to LTM server load balancing. • Create a pool containing each of the ISP router gateway addresses with service port “any” • Create a wildcard virtual server (0.0.0.0:0) using all protocols, enabled on the internal VLAN and point it to the previously created pool. • Enable SNAT automap from the internal VLAN
  • 11. CONFIDENTIAL 11 Outbound Traffic options If desired, more specific virtual servers may be used to split up traffic in different ways. Example: create 3 pools, one with both gateways, another with only gateway 1 and a third with only gateway 2. Then create 0.0.0.0:0 using pool 1, 0:0:0:0:80 using pool 2, and 0:0:0:0:25 using pool 3. This may be expanded upon with pool priority and/or iRules to produce the desired traffic flow Allow ANY IP over SNAT for icmp/ping.
  • 12. CONFIDENTIAL 12 Pool load balancing • Round robin and static ratio are available, but the typical setting will be dynamic ratio. • Dynamic ratio will use the link configuration settings (discussed in next section) to make load balancing decisions
  • 13. CONFIDENTIAL 13 Inbound Traffic • Inbound traffic is handled in the same manner as GTM (3-DNS) – Recall the limitation that it can only hand out addresses that it hosts • Requires DNS delegation – At minimum, LC must be authoritative for the domains that are load balanced/failed over – Can take over the entire domain if desired
  • 14. CONFIDENTIAL 14 DNS Listeners • Need a DNS listener on each ISP network – use floating address for redundant pair – For more than 2 ISP’s pick the 2 primary links since DNS typically will only use a ns1 and ns2 record No v4 equivalent, udp 53 should be allowed to floating IP’s on each ISP netblock
  • 15. CONFIDENTIAL 15 Inbound Pools and VIPS • Inbound pools and VIPS are set up in nearly the same manner as LTM, with 2 key differences – Pools will usually only have 1 member, which is the NAT address for the application on the firewall – Need a virtual server on each ISP’s network that points to the same pool – These virtuals correspond to the DNS entries that LC will give out to clients for a given domain
  • 17. CONFIDENTIAL 17 Link Configuration • Define the links (one per ISP) and set up the relevant cost and/or bandwidth structure for each – Link capacity – Price per mb (prepaid vs burst cost) • Dynamic ratio will use these figures to determine load balancing – Not necessarily required to be real-world figures
  • 20. CONFIDENTIAL 20 WideIP Configuration • Final step is creation of WideIP’s – Domain name to virtual server mapping – Only allowed to use virtual servers that are hosted by the LC itself – No pools concept as on GTM • ZoneRunner entries created automatically – NameSurfer in v4
  • 22. CONFIDENTIAL 22 Special Considerations • IPSEC (VPN’s) – LC cannot terminate IPSEC tunnels – IPSEC typically cannot survive a NAT • Some IPSEC clients cannot resolve by name • Solution 1: Forward IPSEC directly to firewall or endpoint – Requires public IP block between LC and firewall – Requires IP forwarding virtual on LC from external to internal
  • 23. CONFIDENTIAL 23 IPSEC cont. • Solution 2: Implement an IPSEC solution that supports NAT traversal or “tunnel and transport mode” – Uses typical LC configuration (SNAT automap outbound and virtual -> pool inbound) – Checkpoint and PIX definitely support, others not verified
  • 25. CONFIDENTIAL 25 Special Considerations cont. • L2 Bridging not recommended – Supposedly can be configured on one link, with outbound wildcard VIP bound to internal child VLAN and doing SNAT automap – Proceed at own risk BIND vs ZoneRunner/NameSurfer – Customer may choose to use BIND to manage zone files (particularly if LC is taking over entire domain) – Typically, once done, cannot be reverted
  • 26. CONFIDENTIAL 26 How do I manage BIND zone files? BIND zone management is the same as in LTM, manual and not supported. ZoneRunner is NOT included in the LC software module. One can configure BIND manually, and maintain it through the CLI. – Configuration of BIND via CLI is not supported. – We will patch named if a bug is found in the named code and a new version is available to address that bug.
  • 27. CONFIDENTIAL 27 The LC Link Object: Basic View Link objects functionality is the same as that of 4.x, and consist of the following elements: – Name: Link object name – Router Address: The address of the gateway router for that ISP link – Uplink Address: The router’s IP address that connects to the ISP – Service Provider: Descriptive field used for a logical identification of that link’s service provider – Health Monitor: the bigip_link monitor is the recommended monitor for links
  • 28. CONFIDENTIAL 28 LC Objects LC UI objects inherited from LTM are configured in the same way they are configured on a LTM stand alone product. LC Links are configured in the Network section of the UI, but the link objects are stored in the wideip.conf file. – Links: Network->Links GTM inherited features are configured in the under the “Global Traffic” section of the UI. – GTM Listners: Global Traffic->Listeners – WideIPs: Global Traffic-> Inbound Link Traffic – Topology: Global Traffic->Topology Note: WideIP pools are not explicit objects in the UI. WideIP pools are automatically created by mcdp, their object names match that of their WideIP’s FQDN!
  • 29. CONFIDENTIAL 29 WideIP pools on a Link Controller The WideIP pool objects are not visible via the UI on Link Controller. If a problem exists with a WideIP pool it will be necessary to edit the wideip.conf file from the command line. WideIP pools get an object name that matches the WideIP’s FQDN, thus it is easy to determine which WideIP pool will need to be edited. Example: If an administrator attempts to create a WideIP from the UI, and the creation action fails due to a misconfiguration, the WideIP pool may get written out to the wideip.conf file, but the admin will not be able to see this from the UI.
  • 30. CONFIDENTIAL 30 Known Issues (as of 9.2.3) • Many hotfixes are available • /config/gtm/wideip.conf seems susceptible to corruption in various ways – IP’s configured in GUI and later removed are not always cleaned up properly. This can lead to odd behavior in the GUI. ZoneRunner issues