VCMP and VIPRION Systems Configuration
VCMP and VIPRION Systems Configuration
Version 11.2
Table of Contents
Table of Contents
Legal Notices.....................................................................................................................................7
Acknowledgments............................................................................................................................9
3
Table of Contents
4
Table of Contents
5
Table of Contents
6
Legal Notices
Publication Date
This document was published on September 28, 2012.
Publication Number
MAN-0376-02
Copyright
Copyright © 2012, F5 Networks, Inc. All rights reserved.
F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5 assumes
no responsibility for the use of this information, nor any infringement of patents or other rights of third
parties which may result from its use. No license is granted by implication or otherwise under any patent,
copyright, or other intellectual property right of F5 except as specifically described by applicable user
licenses. F5 reserves the right to change specifications at any time without notice.
Trademarks
3DNS, Access Policy Manager, Acopia, Acopia Networks, Advanced Client Authentication, Advanced
Routing, APM, Application Security Manager, ARX, AskF5, ASM, BIG-IP, Cloud Extender, CloudFucious,
CMP, Data Manager, DevCentral, DevCentral [DESIGN], DNS Express, DSC, DSI, Edge Client, Edge
Gateway, Edge Portal, EM, Enterprise Manager, F5, F5 [DESIGN], F5 Management Pack, F5 Networks,
F5 World, Fast Application Proxy, Fast Cache, FirePass, Global Traffic Manager, GTM, IBR, Intelligent
Browser Referencing, Intelligent Compression, IPv6 Gateway, iApps, iControl, iHealth, iQuery, iRules,
iRules OnDemand, iSession, IT agility. Your way., L7 Rate Shaping, LC, Link Controller, Local Traffic
Manager, LTM, Message Security Module, MSM, Netcelera, OneConnect, Packet Velocity, Protocol
Security Module, PSM, Real Traffic Policy Builder, ScaleN, SSL Acceleration, StrongBox, SuperVIP, SYN
Check, TCP Express, TDR, TMOS, Traffic Management Operating System, TrafficShield, Transparent
Data Reduction, VIPRION, vCMP, WA, WAN Optimization Manager, WANJet, WebAccelerator, WOM,
and ZoneRunner, are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries,
and may not be used without F5's express written consent.
All other product and company names herein may be trademarks of their respective owners.
RF Interference Warning
This is a Class A product. In a domestic environment this product may cause radio interference, in which
case the user may be required to take adequate measures.
FCC Compliance
This equipment has been tested and found to comply with the limits for a Class A digital device pursuant
to Part 15 of FCC rules. These limits are designed to provide reasonable protection against harmful
interference when the equipment is operated in a commercial environment. This unit generates, uses, and
Legal Notices
can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual,
may cause harmful interference to radio communications. Operation of this equipment in a residential area
is likely to cause harmful interference, in which case the user, at his own expense, will be required to take
whatever measures may be required to correct the interference.
Any modifications to this device, unless expressly approved by the manufacturer, can void the user's authority
to operate this equipment under part 15 of the FCC rules.
Standards Compliance
This product conforms to the IEC, European Union, ANSI/UL and Canadian CSA standards applicable to
Information Technology products at the time of manufacture.
8
Acknowledgments
This product includes software developed by Niels Mueller ([email protected]), which is protected under
the GNU Public License.
In the following statement, This software refers to the Mitsumi CD-ROM driver: This software was developed
by Holger Veit and Brian Moore for use with 386BSD and similar operating systems. Similar operating
systems includes mainly non-profit oriented systems for research and education, including but not restricted
to NetBSD, FreeBSD, Mach (by CMU).
This product includes software developed by the Apache Group for use in the Apache HTTP server project
(http://www.apache.org/).
This product includes software licensed from Richard H. Porter under the GNU Library General Public
License (© 1998, Red Hat Software), www.gnu.org/copyleft/lgpl.html.
This product includes the standard version of Perl software licensed under the Perl Artistic License (© 1997,
1998 Tom Christiansen and Nathan Torkington). All rights reserved. You may find the most current standard
version of Perl at http://www.perl.com.
This product includes software developed by Jared Minch.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
(http://www.openssl.org/).
This product includes cryptographic software written by Eric Young ([email protected]).
This product contains software based on oprofile, which is protected under the GNU Public License.
This product includes RRDtool software developed by Tobi Oetiker (http://www.rrdtool.com/index.html)
and licensed under the GNU General Public License.
This product contains software licensed from Dr. Brian Gladman under the GNU General Public License
(GPL).
This product includes software developed by the Apache Software Foundation (http://www.apache.org/).
This product includes Hypersonic SQL.
This product contains software developed by the Regents of the University of California, Sun Microsystems,
Inc., Scriptics Corporation, and others.
This product includes software developed by the Internet Software Consortium.
This product includes software developed by Nominum, Inc. (http://www.nominum.com).
This product contains software developed by Broadcom Corporation, which is protected under the GNU
Public License.
This product contains software developed by MaxMind LLC, and is protected under the GNU Lesser General
Public License, as published by the Free Software Foundation.
10
Chapter
1
VIPRION Overview
Topics:
• VIPRION overview
• VIPRION features
• Related documents
VIPRION Overview
VIPRION overview
The VIPRION® system is a complete traffic management solution that offers high performance, reliability,
scalability, and ease of management. Based on chassis and blade technology, this system is designed to
meet the needs of large, enterprise networking environments that normally require multiple BIG-IP® systems
to process large volumes of application traffic.
The VIPRION system consists of a chassis with a four-blade capacity. The four blades work together as a
powerful system to process application traffic. Traffic comes into a single virtual server, and the system
distributes that traffic over multiple blades, using the full multi-processing capacity of each blade. Moreover,
if a blade unexpectedly becomes unavailable, another blade can complete the processing of the request.
VIPRION features
This table describes the VIPRION® system features.
Feature Description
A chassis with blades The multi-slot chassis significantly reduces the amount of rack space required for
the BIG-IP® systems by housing blades instead of traditional switch systems.
Hardware resources such as cooling and power systems, normally required for
individual BIG-IP systems, are now part of the chassis instead.
Cluster technology The VIPRION system's SuperVIP™ cluster technology is the core feature that
coordinates all of the blades into a single high-performance system. A SuperVIP
cluster is the group of slots in the VIPRION system chassis. Each slot in the cluster
represents a cluster member, and any blades that you insert into the slots of a
cluster work together to process application traffic. Cluster technology provides
12
vCMP® and VIPRION® Systems: Configuration
Feature Description
the processing power of multiple blades, but you manage the entire cluster as a
single system.
Live installation When you upgrade the BIG-IP software on a running system, the system
automatically upgrades the BIG-IP software on all blades in the cluster.
Cluster The primary blade automatically propagates the system configuration to all
synchronization secondary blades, even when a new blade is introduced into the cluster.
Connection mirroring Connection mirroring ensures that if a blade, or a cluster within a device service
clustering (redundant system) configuration, becomes unavailable, the system can
still process any existing connections.
Related documents
You may find it useful to have an understanding of certain background concepts before performing VIPRION®
configuration tasks.
• For more information about configuring required BIG-IP® network objects (trunks, VLANs, and self
IP addresses), refer to the BIG-IP® TMOS®: Concepts Guide.
• For more information about configuring the BIG-IP system (or vCMP® guests) to manage local area
network traffic (concepts pertaining to virtual servers, various types of traffic profiles, load balancing
pools and pool members, and so on) refer to the BIG-IP® Local Traffic Manager: Concepts Guide.
These product guides are available from the AskF5 Knowledge Base web site, http://support.f5.com.
13
VIPRION Overview
14
Chapter
2
vCMP Overview
Topics:
• vCMP overview
• vCMP components
• BIG-IP license considerations for vCMP
• vCMP provisioning overview
• vCMP best practices
vCMP Overview
vCMP overview
Virtual Clustered Multiprocessing (vCMP) is a feature of the BIG-IP® system that allows you to run multiple
instances of the BIG-IP software on a single hardware platform. vCMP® allocates a specific share of the
hardware resources to each BIG-IP instance, or vCMP guest. Each guest that you create behaves as a separate
BIG-IP device, having its own CPU, memory, and disk space. Each guest also has its own configuration
file, log files, and kernel instance.
vCMP® is built on F5 Networks' CMP technology. CMP works with cluster members. Cluster members
can be slots within a chassis or instances of the Traffic Management Microkernel (TMM) on an appliance.
CMP allows cluster members to work together to form a coherent, distributed traffic-processing system to
share traffic load. vCMP takes this one step further by allowing you to create and run virtualized BIG-IP
modules, using a standards-based, purpose-built hypervisor.
Important: Before you license, provision, and configure the vCMP feature, verify that you have
correctly configured the VIPRION® system. For more information, see the relevant VIPRION
platform guide and configuration guide on the F5 Networks AskF5™ Knowledge Base web site,
http://support.f5.com.
vCMP components
A vCMP® system includes these main components.
Term Definition
BIG-IP cluster A BIG-IP® cluster is the set of available slots (cluster members) on the
chassis. You manage a BIG-IP cluster using the Clusters screens in the
BIG-IP Configuration utility.
Cluster IP address A cluster IP address is a management IP address that you assign to a cluster
to access the system. On a vCMP system, there are multiple cluster IP
addresses: one for the BIG-IP cluster (to access the vCMP host), and one
for each virtual cluster (to access each guest).
vCMP daemon This daemon, named vcmpd, performs most of the work to create and
manage guests, as well as to configure the virtual network.
vCMP guest A vCMP guest is an object that you create on the vCMP system for the
purpose of running one or more BIG-IP® modules. A guest consists of a
TMOS® instance, plus one or more BIG-IP modules. Each guest has its own
share of hardware resources that the vCMP host allocates to it, effectively
making each guest function like a separate BIG-IP device.
vCMP host The vCMP host is the system-wide hypervisor that makes it possible for
you to create, view, and manage all guests on the system. A vCMP host
allocates system resources to guests as needed.
VM A Virtual machine is the portion of a guest that resides on a slot. For
example, a guest that spans four slots comprises four VMs.
Virtual cluster A virtual cluster is similar to a normal cluster on a chassis, except that
unlike a normal cluster, a separate virtual cluster exists for each guest on
16
vCMP® and VIPRION® Systems: Configuration
Term Definition
the system. A virtual cluster contains only the portions of the slots that
pertain to an individual guest. For example, if a guest spans two slots, then
the two slot portions for the guest represent a virtual cluster. There is a
one-to-one correlation of a virtual cluster to a guest.
Virtual disk A virtual disk is the portion of disk space on a slot that the system has
allocated to a guest. For example, if a guest spans three slots, the system
creates three virtual disks for that guest. Each virtual disk is implemented
as an image file with an .img extension, such as guest_A.img.
Virtual management network The virtual management network contains the components necessary to
connect a guest to the management network of the vCMP host.
Important: If you decide to increase the amount of disk space reserved for non-vCMP uses, do
this before you provision the vCMP feature.
17
vCMP Overview
Category Recommendation
Guest configuration If you need to move a guest's configuration to another vCMP system (chassis),
copy the guest configuration and then de-allocate all virtual resources (virtual
disk, CPU cores, and so on) from the guest.
Licensing Before upgrading a guest to a newer version of BIG-IP® software later, you might
need to coordinate with the vCMP host administrator to renew the license key.
Local traffic When you are logged in to the vCMP host, do not configure local traffic features
configuration (virtual servers, pools, profiles, and so on). To configure local traffic features,
you must be logged in to a guest using the guest's cluster IP address, and the
BIG-IP LTM® module must be provisioned.
Network setup When initially setting up the BIG-IP system, physically wire each slot's
management interface to an external bridge. Access to the vCMP host could
otherwise be impaired, because vCMP guests can be deployed on any slot in the
chassis, and the primary member for a guest's virtual cluster can migrate. When
you follow this recommendation, you do not need to re-configure the vCMP host
or any external networks when the primary member of a virtual cluster changes.
Self IP address Configure self IP addresses on the vCMP guests. Because a vCMP guest acts as
configuration a fully functional BIG-IP system, configure self IP addresses on each vCMP
guest just as you would on a physical BIG-IP system. You can also configure
self IP addresses on the vCMP host to facilitate basic network connectivity tests.
However, these self IP addresses are not visible to vCMP guests.
vCMP provisioning When you provision the vCMP feature, the BIG-IP® system allocates most, but
not all, of the disk space to the vCMP application volume. The system reserves
approximately 30 GB of disk space for other uses. If you want the system to
reserve more than 30 GB of disk space, such as for installing another version of
the BIG-IP system in the future, do this prior to provisioning the vCMP feature.
Doing so after you have provisioned the vCMP feature can produce unwanted
results. When increasing the reserve space on the disk, the recommended amount
of additional space to reserve is 8 GB per BIG-IP installation.
Virtual disk When a virtual disk becomes unattached from a guest, that virtual disk remains
management on the system. To prevent unattached virtual disks from consuming disk space
over time, consider deleting unwanted virtual disks from the system.
VLAN configuration Configure VLANs on the vCMP host instead of on the guest, because VLANs
specified in the guest are not accessible on the vCMP host. Also, if two guests
each have a VLAN group, verify that the VLAN group for each guest does not
bridge the same two VLANs.
18
Chapter
3
Initial vCMP Setup
Topics:
Task summary
Activating the BIG-IP license for a vCMP VIPRION
Modifying disk space allocation for a vCMP application volume
Provisioning the BIG-IP system for vCMP
Accessing the vCMP host
Creating trunks
Creating VLANs
Creating a vCMP guest
Setting a vCMP guest to the Deployed state
Provisioning a BIG-IP module within a guest
Creating self IP addresses for VLANs
Configuration Considerations
component
Active slots How many blades are installed (and in which slots)?
CPU core How many CPU cores do you want to allocate to each guest?
requirements
External gateway What is the gateway address (next hop) for external traffic?
address
FQDN What is the fully-qualified domain name (FQDN) for your BIG-IP® system?
Guest mode Should your guests be in bridged or isolated mode?
IP address range What is the IP address range that is valid for the vCMP guests you create?
Link aggregation Do your trunks require LACP mode?
control protocol
Network mask What is the network mask for the guest IP?
Primary cluster IP What is the primary cluster IP address? The management IP address assigned to
address the chassis' primary cluster during chassis installation is used to access the vCMP
host.
20
vCMP® and VIPRION® Systems: Configuration
Configuration Considerations
component
User role Do you have a user role of Administrator? You need to have a user role of
Administrator to perform the tasks in this process.
1. From a workstation attached to the network on which you configured the management interface, type
the following URL syntax where <management_IP_address> is the address you configured for device
management:
https://<management_IP_address>
2. At the prompts, type the user name admin and the password admin.
3. Click Log in.
The Setup Utility screen opens.
4. Click Activate.
The License screen opens.
5. In the Base Registration Key field, paste your base registration key.
6. Click Next.
The End User License Agreement (EULA) displays.
7. Review the EULA.
When you click Accept, the Platform screen opens.
1. In the URL field, type the management IP address that you previously assigned to the chassis.
https://<cluster_ip_address>
The browser displays the login screen for the BIG-IP Configuration utility.
2. On the Main tab, click System > Disk Management.
The display shows the logical disks and application volumes from the perspective of the primary slot
of the BIG-IP system cluster.
3. Click the logical disk for which you want to reserve disk space.
An example of a logical disk is HD1.
4. On the menu bar, click Image List if displayed.
The screen displays a list of the installed images on the system.
5. If a list of images appears, locate the relevant image, and in the Disk column, click the logical disk name.
21
Initial vCMP Setup
6. In the Reserved (MB) field, increase the amount of disk space that you want to reserve for the logical
disk.
The more space you reserve, the less disk space is available for the vCMP application volume. The
suggested amount of additional space to allow is 8 GB per installation.
7. Click Update.
The disk for which you reserved space is now set aside from use for this instance of vCMP.
Important: After you access the vCMP host, you do not create self IP addresses on the vCMP host.
While self IP addresses on hypervisors are completely functional for basic traffic like ICMP (ping)
and verifying that the host self IP addresses work correctly is an integral part of testing and
hypervisor traffic switch verification, these self IP addresses are not visible nor useful from a guest
perspective. You create self IP addresses that process guest traffic from the individual guests,
because otherwise the guests could not "see" or make use of them.
Creating trunks
To configure trunks for the VIPRION® system, the four external interfaces must be cabled to your Internet
gateway, external bridge, or vendor switch.
The first objects you configure are trunks that tie the internal and external vendor switch interfaces to the
corresponding VIPRION interfaces.
22
vCMP® and VIPRION® Systems: Configuration
Creating VLANs
VLANs associate with your trunks.
23
Initial vCMP Setup
Note: When creating a guest, if you see an error message such as Insufficient disk space
on /shared/vmdisks. Need 24354M additional space., you must delete existing
unattached virtual disks until you have freed up that amount of disk space.
After clicking Finished, wait while the system installs the selected ISO image onto the guest's virtual disk.
When this process is complete, you can deploy the guest.
Note: You can also skip the Provisioned state and instead go straight to the Deployed state if you
are confident of your guest configuration. Provisioning first and then deploying makes it more
24
vCMP® and VIPRION® Systems: Configuration
straightforward to make changes to the slots to which your guests are allocated if you find you need
to make changes.
1. Ensure that you are still logged in to the vCMP host using the BIG-IP system's cluster IP address.
2. On the Main tab, click vCMP > Guest List.
3. In the Name column, click the name of the vCMP guest that you want to deploy.
4. From the Requested State list, select either Provisioned or Deployed.
5. Click Update.
After moving a vCMP guest to the Deployed state, wait while the guest boots and becomes accessible.
Then, you can log into the vCMP guest to provision specific BIG-IP modules.
Note: This procedure applies to guests in Bridged mode only. Guests in isolated mode can be
accessed only using vconsole and tmsh.
1. Use a browser and the management IP address that you configured for the guest to log in to the guest.
If the system prompts you to run the Setup Utility, do not. Instead, complete this task to produce an
initial configuration better suited for a vCMP guest.
The BIG-IP Configuration utility opens so that you can configure the guest.
2. On the Main tab, click System > Resource Provisioning.
3. In the Resource Provisioning (Licensed Modules) area, from the Local Traffic (LTM) list, select
Minimal, Nominal, or Dedicated, depending on your needs.
4. Click Update.
After provisioning the module from within the guest, create self IP addresses and assign a vCMP host VLAN
to each one. The vCMP host VLANs that you assign to these self IP addresses are the VLANs you created
before creating the guest.
25
Initial vCMP Setup
Self IP addresses enable the BIG-IP® system, and other devices on the network, to route application traffic
through the associated VLAN or VLAN group. Repeat the steps in this task for each VLAN.
The BIG-IP system can send and receive traffic through the specified VLAN or VLAN group.
Task summary
Creating a pool to manage HTTP traffic
Creating a virtual server to manage HTTP traffic
26
vCMP® and VIPRION® Systems: Configuration
7. Using the New Members setting, add each resource that you want to include in the pool:
a) Type an IP address in the Address field, or select a node address from the Node List.
b) Type 80 in the Service Port field, or select HTTP from the list.
c) (Optional) Type a priority number in the Priority field.
d) Click Add.
8. Click Finished.
The HTTP virtual server appears in the list of existing virtual servers on the Virtual Server List screen.
27
Initial vCMP Setup
28
Chapter
4
Create an Active-Standby Configuration
Topics:
Table 1: Sample device groups for two VIPRION systems with vCMP
Device-Group-B
• Guest2 on chassis1
• Guest2 on chassis2
Device-Group-C
• Guest3 on chassis1
• Guest3 on chassis2
By isolating guests into separate device groups, you ensure that each guest synchronizes and fails over to
its equivalent guest.
30
vCMP® and VIPRION® Systems: Configuration
The self IP addresses that you specify per guest for config sync and failover should be the self IP addresses
that you previously configured on the guest (not the host). Similarly, the management IP address that you
specify per guest for device trust and failover should be the cluster IP address of the guest.
Task summary
Use the tasks in this implementation to create a device group that syncs the BIG-IP® configuration to the
peer device and provides failover capability if the peer device goes offline. Note that on a vCMP® system,
the devices in a specific device group are vCMP guests, one per chassis.
Task summary
Configuration Considerations
component
Hardware, licensing, Devices in a device group must match as closely as possible with respect to hardware
and provisioning platform, product licensing, and module provisioning. If you want to configure
mirroring, ensure that the hardware platforms of the mirrored devices match.
BIG-IP software Each device must be running BIG-IP version 11.x. This ensures successful
version configuration synchronization.
Management IP Each device must have a management IP address, a network mask, and a
addresses management route defined.
FQDN Each device must have a fully-qualified domain name (FQDN) as its host name.
User name and Each device must have a user name and password defined on it that you will use
password when logging in to the BIG-IP Configuration utility.
root folder The platform properties for the root folder must be set correctly (Sync-Failover
properties and traffic-group-1).
VLANs For non-vCMP systems, you must create these VLANs on each device if you have
not already done so:
• A VLAN for the internal network, named internal
• A VLAN for the external network, named external
• A VLAN for failover communications, named HA
For vCMP® systems, you must create these VLANs on the vCMP host pertaining
to each guest that is to be included in a device group, if you have not already done
so.
Self IP addresses For non-vCMP systems, you must create these self IP addresses on each device if
you have not already done so:
• Two self IP addresses (floating and non-floating) on the same subnet for VLAN
internal.
31
Create an Active-Standby Configuration
Configuration Considerations
component
• Two self IP addresses (floating and non-floating) on the same subnet for VLAN
external.
• A non-floating self IP address on the internal subnet for VLAN HA.
For vCMP systems, you must create these self IP addresses on each vCMP guest
that is to be included in a device group if you have not already done so.
Note: When you create self IP addresses, they are floating addresses by
default because the BIG-IP system automatically adds the addresses to the
default floating traffic group, traffic-group-1. To create non-floating
self IP addresses, you must explicitly change the value of the Traffic Group
setting on the Self IP Create screen to traffic-group-local-only.
Port lockdown For self IP addresses that you create on each device, you should verify that the Port
Lockdown setting is set to Allow All, All Default, or Allow Custom. Do not
specify None.
Application-related You must create any virtual IP addresses and, optionally, SNAT translation
objects addresses, as part of BIG-IP® Local Traffic Manager™ configuration. You must
also configure any iApps™ application services if they are required for your
application. When you create these addresses or services, the objects automatically
become members of the default traffic group, traffic-group-1.
Time synchronization The times set by the NTP service on all devices must be synchronized. This is a
requirement for configuration synchronization to operate successfully.
Device certificates Verify that each device includes an x509 device certificate. Devices with device
certificates can authenticate and therefore trust one another, which is a prerequisite
for device-to-device communication and data exchange.
Important: You must perform this task on each device in the device group.
1. Confirm that you are logged in to the actual device you want to configure.
2. On the Main tab, click Device Management > Devices.
This displays a list of device objects discovered by the local device.
3. In the Name column, click the name of the device to which you are currently logged in.
4. From the Device Connectivity menu, choose ConfigSync.
5. For the Local Address setting, retain the displayed IP address or select another address from the list.
F5 Networks recommends that you use the default value, which is the self IP address for VLAN
internal. This address must be a non-floating self IP address and not a management IP address.
6. Click Update.
32
vCMP® and VIPRION® Systems: Configuration
Important: You must perform this task on each device in the device group.
1. Confirm that you are logged in to the actual device you want to configure.
2. On the Main tab, click Device Management > Devices.
This displays a list of device objects discovered by the local device.
3. In the Name column, click the name of the device to which you are currently logged in.
4. From the Device Connectivity menu, choose Mirroring.
5. For the Primary Local Mirror Address setting, retain the displayed IP address or select another address
from the list.
The recommended IP address is the self IP address for either VLAN HA or VLAN internal.
6. For the Secondary Local Mirror Address setting, retain the default value of None, or select an address
from the list.
This setting is optional. The system uses the selected IP address in the event that the primary mirroring
address becomes unavailable.
7. Click Update.
1. On the Main tab, click Device Management/Device Trust, and then either Peer List or Subordinate
List.
2. In the Peer Authority Devices or the Subordinate Non-Authority Devices area of the screen, click Add.
3. Type an IP address, administrator user name, and administrator password for the remote BIG-IP® device.
This IP address can be either a management IP address or a self IP address.
4. Click Retrieve Device Information.
5. Verify that the certificate of the remote device is correct.
6. Verify that the name of the remote device is correct.
7. Verify that the management IP address and name of the remote device are correct.
8. Click Finished.
33
Create an Active-Standby Configuration
You now have a Sync-Failover device group containing two BIG-IP devices as members.
Important: Perform the following procedure on only one of the two devices.
Except for non-floating self IP addresses, the entire set of BIG-IP configuration data is replicated on each
device in the device group.
Note: The failover addresses that you specify must belong to route domain 0.
34
vCMP® and VIPRION® Systems: Configuration
1. Confirm that you are logged in to the actual device you want to configure.
2. On the Main tab, click Device Management > Devices.
This displays a list of device objects discovered by the local device.
3. In the Name column, click the name of the device to which you are currently logged in.
4. From the Device Connectivity menu, choose Failover.
5. For the Failover Unicast Configuration settings, retain the displayed IP addresses.
You can also click Add to specify additional IP addresses that the system can use for failover
communications. F5 Networks recommends that you use the self IP address assigned to the HA VLAN.
6. If the BIG-IP® system is running on a VIPRION® platform, then for the Use Failover Multicast Address
setting, select the Enabled check box.
7. If you enable Use Failover Multicast Address, either accept the default Address and Port values, or
specify values appropriate for the device.
If you revise the default Address and Port values, but then decide to revert back to the default values,
click Reset Defaults.
8. Click Update.
After you perform this task, other devices in the device group can send failover messages to the local device
using the specified IP addresses.
Important: Perform the following procedure on only one of the two devices.
Except for non-floating self IP addresses, the entire set of BIG-IP configuration data is replicated on each
device in the device group.
Implementation result
You now have a Sync-Failover device group set up with an active-standby configuration. In this configuration,
each traffic group is initially configured to be active on one device. If one device goes offline, the traffic
group that was active on that device becomes active on the other device in the group. Application processing
for both traffic groups continues without interruption.
35
Create an Active-Standby Configuration
36
Chapter
5
Understanding Clusters
Topics:
• Cluster overview
• Viewing cluster properties
• Viewing cluster member properties
• Enabling and disabling cluster members
• Changing a cluster-related management IP
address
Understanding Clusters
Cluster overview
The slots in a VIPRION® chassis work together as a single, powerful unit. This entity is called a cluster.
The size of the cluster depends on the number of running blades installed in the chassis. Blades in the cluster
share the overall workload, and can be configured to mirror each others’ connections, so that if a blade is
taken out of service or becomes unavailable for some reason, any in-process connections remain intact.
When a blade is installed in a slot and turned on, it automatically becomes a member of the cluster.
One of the first tasks performed as part of the platform installation is to insert blades and assign a unique
cluster IP address to the primary blade in the cluster. The cluster IP address is a floating management IP
address used to access the primary blade to configure the system. If the primary blade becomes unavailable
for any reason, the primary designation moves to a different blade, and the cluster IP address floats to that
blade. This ensures that you can always access the cluster using the cluster IP address, even when the primary
blade changes.
When you log on to the system using the cluster IP address, you can configure features such as trunks,
VLANs, administrative partitions, and virtual servers. If you have a redundant system configuration, you
can configure failover IP addresses, as well as connection mirroring between clusters.
Cluster properties
The Cluster screen displays the properties of the cluster.
Property Description
Name Displays the name of the cluster.
Cluster IP Address Displays the IP address assigned to the cluster. Click
this IP address to change it.
Network Mask Displays the network mask for the cluster IP address.
Primary Member Displays the number of the slot that holds the primary
blade in the cluster.
Software Version Displays the version number of the BIG-IP® software
that is running on the cluster.
Software Build Displays the build number of the BIG-IP software
that is running on the cluster.
38
vCMP® and VIPRION® Systems: Configuration
Property Description
Hotfix Build Displays the build number of any BIG-IP software
hotfix that is running on the cluster.
Chassis 400-level BOM Displays the bill-of-materials (BOM) number for the
chassis.
Status Displays an icon and descriptive text that indicates
whether there are sufficient available members of
the cluster.
Property Description
Status The Status column indicates whether the cluster
member is available or unavailable.
Slot The Slot column indicates the number of the slot.
Click this number to display the properties of that
cluster member.
Blade serial number The Blade Serial Number column displays the serial
number for the blade currently in that slot.
Enabled The Enabled column indicates whether that cluster
member is currently enabled.
Primary The Primary column indicates whether that cluster
member is currently the primary slot.
HA State The HA State column indicates whether the cluster
member is used in a redundant system configuration
for high availability.
39
Understanding Clusters
Important: Perform this task while logged in to the vCMP® host; not from a guest.
1. Use a browser and the cluster management IP address of the vCMP® host to log in to the vCMP host
(hypervisor) and access the BIG-IP® Configuration utility.
2. On the Main tab, click System > Clusters.
The Cluster screen opens, showing the properties of the cluster, and listing the cluster members.
3. Locate the cluster member you want to enable or disable, and select the box to the left of the Status icon.
4. Click Enable or Disable/Yield.
Important: Perform this task while logged in to the vCMP host; not from a guest.
1. Use a browser and the cluster management IP address of the vCMP® host to log in to the vCMP host
(hypervisor) and access the BIG-IP® Configuration utility.
2. On the Main tab, click System > Clusters.
The Cluster screen opens, showing the properties of the cluster, and listing the cluster members.
3. On the menu bar, click Management IP Address.
The Management IP Address screen opens.
4. Locate the specific management IP address or cluster member IP address that you would like to change,
and type the new IP address.
5. Click Update.
The specific management IP address or cluster member IP address that you edited is changed. You can now
use that new address to access the cluster.
Cluster-related IP addresses
The cluster-related addresses that you can modify are defined in the table.
40
vCMP® and VIPRION® Systems: Configuration
41
Understanding Clusters
42
Chapter
6
Understanding vCMP Hosts
Topics:
Note: To manage a vCMP system, you must have the Administrator user role assigned to your user
account.
Important: Do not configure BIG-IP® module features (such as BIG-IP Local Traffic Manager™
virtual servers, pools, and profiles) when logged in to the vCMP host. Use the vCMP host to create
and manage vCMP guests and to perform Layer 2 network configuration only. Attempting to
configure BIG-IP modules while logged in to the vCMP host produces unwanted results. Always
log in to the relevant vCMP guest to configure the features of a BIG-IP module.
The screen displays the host properties for the chosen slots.
44
vCMP® and VIPRION® Systems: Configuration
Important: When you provision the vCMP feature, the BIG-IP system allocates most, but not all,
of the disk space to the vCMP application volume. The system reserves approximately 30 GB of
disk space for other uses. If you want the system to reserve more than 30 GB of disk space (such
as for installing another version of the BIG-IP system in the future), do this before you provision
the vCMP feature. Doing so after you have provisioned the vCMP feature produces unwanted
results. When increasing the reserve space on the disk, the recommended amount of space to reserve
is 8 GB per BIG-IP installation.
Note: If the disk space for the host approaches the maximum threshold, the vCMP system displays
a warning message about depleted disk space.
1. Use a browser and the cluster management IP address of the vCMP host to log in to the vCMP host
(hypervisor) and access the BIG-IP Configuration utility.
2. On the Main tab, click System > Disk Management.
The display shows the logical disks and application volumes from the perspective of the primary slot
of the BIG-IP system cluster.
3. Click the logical disk for which you want to reserve disk space.
An example of a logical disk is HD1.
4. On the menu bar, click Image List if displayed.
The screen displays a list of the installed images on the system.
5. If a list of images appears, locate the relevant image, and in the Disk column, click the logical disk name.
45
Understanding vCMP Hosts
6. In the Contained Application Volumes area of the screen, in the Volume column, locate the vCMP
application volume.
7. In the Size (MB) column, view the size of the application volume, in megabytes.
1. Use a browser and the cluster management IP address of the vCMP host to log in to the vCMP host
(hypervisor) and access the BIG-IP Configuration utility.
2. On the Main tab, click System > Disk Management.
The display shows the logical disks and application volumes from the perspective of the primary slot
of the BIG-IP system cluster.
3. Click the logical disk for which you want to reserve disk space.
An example of a logical disk is HD1.
4. On the menu bar, click Image List if displayed.
The screen displays a list of the installed images on the system.
5. If a list of images appears, locate the relevant image, and in the Disk column, click the logical disk name.
6. In the Contained Application Volumes area of the screen, in the Volume column, locate the vCMP
application volume.
7. To the left of the application volume name, check the box.
8. Click Delete.
46
Chapter
7
Understanding vCMP Guests
Topics:
Important: In addition to other considerations, when considering whether to create a single slot
or multi-slot guest, bear in mind that recovery from a blade hot swap is much more straightforward
for multi-slot guests.
48
vCMP® and VIPRION® Systems: Configuration
Note: Although a guest in Isolated mode cannot communicate directly with the management network,
you can configure the guest to communicate to external networks indirectly. You do this by
configuring network routing or a firewall on the guest's operating system.
49
Understanding vCMP Guests
2. In the Name column, click the name of the vCMP guest that you want to view.
50
vCMP® and VIPRION® Systems: Configuration
Slot CPU Cores 0 and CPU Cores 2 and CPU Cores 4 and CPU Cores 6 and
# 1 3 5 7
Slot Fills first Fills fifth Fills ninth Fills thirteenth
1
Slot Fills second Fills sixth Fills tenth Fills fourteenth
2
Slot Fills third Fills seventh Fills eleventh Fills fifteenth
3
Slot Fills fourth Fills eighth Fills twelfth Fills sixteenth
4
Before starting this task you should be logged in to the vCMP® host using its management IP address, and
in the process of migrating a single slot guest from a blade that is about to be hot swapped.
51
Understanding vCMP Guests
Creating a temporary guest is a useful technique when you need to control the slot to which the vCMP host
will migrate a vCMP guest. The temporary guest consumes resources on the blade you are preparing to
swap, so that when you migrate a guest, the vCMP host must migrate the guest to a different blade.
After you click Finished, the system creates a guest that consumes the next set of CPUs on the targeted
slot.
When you disable a guest, the BIG-IP® system deallocates its resources (such as CPU cores, physical
memory, and virtual disks). Once disabled, you can edit the vCMP® guest, or you can migrate the guest to
another slot and its resources are available for consumption by another guest.
52
vCMP® and VIPRION® Systems: Configuration
Important: Migrating a single slot guest to another slot is essential before performing a blade
hot-swap if you want to preserve the BIG-IP® configuration objects defined for that guest.
1. Ensure that you are still logged in to the vCMP host using the BIG-IP system's cluster IP address.
2. On the Main tab, click vCMP > Guest List.
3. In the Name column, click the name of the vCMP guest that you want to deploy.
4. From the Requested State list, select either Provisioned or Deployed.
5. Click Update.
The guest migrates to the next available set of resources. It takes some time for the guest to boot and become
accessible.
Refer to the appropriate platform guide for instructions on removing and replacing a blade on an active
VIPRION chassis.
Options Description
For VIPRION 2400 chassis Refer to "Removing a blade" and "Installing a blade" in the
Platform Guide: VIPRION 2400.
For VIPRION 4400 chassis Refer to "Removing a blade" and "Installing a blade" in the
Platform Guide: VIPRION 4400.
Once the new blade boots, the vCMP® host adds it to the cluster, and you can migrate guests to it.
Important: Migrating a single slot guest to another slot is essential before performing a blade
hot-swap if you want to preserve the BIG-IP® configuration objects defined for that guest.
1. Ensure that you are still logged in to the vCMP host using the BIG-IP system's cluster IP address.
2. On the Main tab, click vCMP > Guest List.
3. In the Name column, click the name of the vCMP guest that you want to deploy.
4. From the Requested State list, select either Provisioned or Deployed.
5. Click Update.
53
Understanding vCMP Guests
The guest migrates to the next available set of resources. It takes some time for the guest to boot and become
accessible.
Important: If the initial-image specified in the guest configuration on the vCMP host is no longer
physically available, then virtual disk creation on the newly inserted blade will fail because the
vCMP system will not find the ISO image file it needs to create the virtual disk.
Important: You may choose to not change the ISO image in cases where the upgrade is temporary
(for example you might be trying out a specific software update to see if it addresses an issue, and
after evaluating that update, you may well choose to go back to the prior software version). As long
as the ISO image version of the other cluster members matches the version currently specified at
the time you perform the hot swap, the guest will re-create successfully.
54
vCMP® and VIPRION® Systems: Configuration
4. Click Disable.
The BIG-IP system releases the resources dedicated to the guest.
The ISO image needed to re-create the guest's virtual disk is now correctly set so that the impact of hot
swapping a blade will have only a temporary impact.
Refer to the appropriate platform guide for instructions on removing and replacing a blade on an active
VIPRION chassis.
Options Description
For VIPRION 2400 chassis Refer to "Removing a blade" and "Installing a blade" in the
Platform Guide: VIPRION 2400.
For VIPRION 4400 chassis Refer to "Removing a blade" and "Installing a blade" in the
Platform Guide: VIPRION 4400.
Once the new blade boots, the vCMP® host adds it to the cluster, and you can migrate guests to it.
55
Understanding vCMP Guests
Important: The initial software image is used only when the system first creates the virtual disk
images. Subsequent software upgrades are done within the guest using the live installation process.
56
vCMP® and VIPRION® Systems: Configuration
This illustration shows that the BIG-IP system has allocated two CPU cores to guest1, which is deployed
on slot 1. Note that guest0 has no CPU cores allocated to it because the guest has not yet been deployed.
57
Understanding vCMP Guests
• You cannot directly configure CPU core allocation. CPU core allocation is always determined by whether
you configure a guest to be a single-slot or all-slot guest, and by the number of slots available.
• If an unavailable slot becomes available later, the system automatically re-allocates the CPU cores to
each all-slot guest and to any single-slot guests previously allocated to this slot.
• If rebooted for any reason, the BIG-IP system persists any single-slot guest to the same slot, thereby
retaining the same CPU core allocation for that guest. However, if you change a guest's state at any time
from Deployed to Configured, the BIG-IP system de-allocates the CPU cores for that guest.
Important: For guests that you configure to run on a single slot, in the event of a reboot, the vcmp
daemon migrates the guest to the next available allocation location.
58
vCMP® and VIPRION® Systems: Configuration
VLAN List The system immediately propagates the modification to all VMs of the
guest, if the guest is in the Deployed state.
State If you change this value from Deployed or Provisioned to Configured,
the BIG-IP system automatically de-allocates all resources except for the
guest's virtual disk.
Management Network Changing the value of the Network Mode property while the guest is in
the Deployed state, has consequences:
• Changing the mode from Bridged to Isolated causes the vCMP host to
remove all of the guest's management interfaces from its bridged
management network. This has the effect of immediately disconnecting
the guest's VMs from the physical management network.
• Changing the mode from Isolated to Bridged causes the vCMP host to
dynamically add the guest's management interfaces to the bridged
management network. This immediately connects all of the guest's VMs
to the physical management network.
Changing the Network Mode property while the guest is in the Configured
or Provisioned state has no immediate effect.
59
Understanding vCMP Guests
60
Chapter
8
Working with vCMP Virtual Disks
Topics:
Attention: Unattached virtual disks consume disk space on the system. To prevent unattached
virtual disks from depleting available disk space, routinely monitor the number of unattached virtual
disks that exist on the system.
The vCMP guest no longer has any virtual disk attached to it.
62
vCMP® and VIPRION® Systems: Configuration
It is possible for a virtual disk to become detached from a vCMP™ guest. A disk that is no longer attached
to a guest is known as an unattached virtual disk.
You can attach an unattached virtual disk to another guest either when you create the guest or when you
modify the Virtual Disk property of a guest.
Important: This is the only way to delete a virtual disk from the system. If you delete the associated
guest instead, the system retains the virtual disk for re-use by another guest later.
63
Working with vCMP Virtual Disks
64
Chapter
9
Managing vCMP Statistics
Topics:
The following table shows sample statistics for three separate virtual disks.
The system displays a list of vCMP guest names, as well as this information:
• The state configured for the guest
• The slot numbers on which the guest is running or slated to run
• The guest's management IP address and netmask
66
vCMP® and VIPRION® Systems: Configuration
67
Managing vCMP Statistics
68
Index
Index
A connection mirroring
configuring 33
allocating connections
CPU cores 57 creating pools for 26
physical memory 58 preserving on failover 33
virtual disks 58 core allocation 44, 57
allocation CPU core allocation 44, 57
for vCMP application volume 21, 45 CPU cores
application volumes 16 and guest states 56
as resource 57
creating second traffic group 30
B
background concepts 13 D
base registration key, about 21
BIG-IP clusters Deployed state
defined 16 described 56
BIG-IP modules deployment worksheet 20
and guest states 56 device discovery
blade for device trust 33
hot swapping 53, 55 device groups
Bridged mode creating 34
described 48 devices
bridges and mirroring limit 33
and management interfaces 18 device trust
establishing 33
disk space
C and vCMP application volume 45
cluster definition 38 consuming 18
cluster IP address modifying 21
modifying 40 reserving 16, 17, 18
cluster IP addresses viewing 45
defined 16 disk usage 67
cluster management IP addresses DSC prerequisites 31
configuring 22 DSC worksheet 31
cluster member properties
described 39 E
viewing 39
cluster members Ethernet connection
enabling and disabling 40 sharing 48
cluster properties
described 38
viewing 38
F
cluster-related IP addresses failover IP addresses
described 40 specifying 34
clusters, See BIG-IP clusters floating IP addresses
See also virtual clusters configuring 22
CMP system 16 front-panel management port 48
config sync address
specifying 32
configuration synchronization G
syncing to group 34, 35
Configured state guest accessibility 18
described 56 guest configuration
moving and copying 18
69
Index
guest properties 59 M
viewing 49
guests MAC addresses 48
and management network 48 management gateways 48
and VLAN groups 18 management interfaces
configuring for LTM 20, 62, 66 bridging 48
configuring LTM on 26 wiring 18
creating 23 management IP address 38
defined 16, 48 management IP addresses
migrating, multi-slot 55 configuring 22
migrating, single-slot 50, 52, 53, 54 management network
modifying and deleting 49 and guests 48
number of 48 management ports 48
provisioning BIG-IP modules for 25 memory
setting to Deployed state 25 as resource 57
states of and CPU allocation 44 migration
upgrading 18 of virtual cluster members 18
guest states modes
described 56 of guests 48
listed 44 module instances
guest-to-external-network communication 48 running 48
guest-to-guest communication 48 multi-slot guests
guest-to-host TCP connections 48 migrating 54
guest-to-vCMP host communication 48
N
H
network, See management network
host, See vCMP host network failover
host properties 44 configuring 34
hosts network modes
managing 44 changing 48
hypervisor 44 described 48
hypervisors 16
P
I
persistence
initial vCMP configuration 26 and slot assignments 58
ISO images pools
and guest states 56 creating for HTTP traffic 26
selecting and installing 56 pre-deployment questions 20
selecting and updating 54 Provisioned state
Isolated mode and resource allocation 57
described 48 described 56
setting 54, 56
provisioning
L and resource allocation 18
license, activating for vCMP 21 provisioning sequence 17
license keys
renewing 18 R
licenses
activating 22 reserve space
licensing increasing 46
and guests 17 resource allocation
live install process 56 about 57
local trust domains and guest states 56
and device groups 34 resources
defined 33 allocating 17, 18
LTM configuration for guests 48
and vCMP host 18
70
Index
S vcmpd daemon
defined 16
self IP addresses vCMP guests
creating 18, 25 See also guests
self IPs about 16
and VLANs 25 See also guests
single-slot guest vCMP host
and deployment sequence 50 accessing 22
and temporary migration 50 and LTM configuration 18
single-slot guests and slot assignments 58
migrating 50 and VLAN configuration 18
single slot migration defined 16
choosing destination 51 vCMP host properties
size described 44
of vCMP application volume 45 viewing 44
slot assignments vCMP host-to-guest TCP connections 48
and persistence 58 vCMP system
slots provisioning 16
and guest states 56 VIPRION
number of 44 defined 12
viewing properties for 44 VIPRION features
software upgrades 54, 56 described 12
states VIPRION system licenses 22
of guests 44 VIPRION systems
statistics provisioning 22
and disk usage 67 virtual clusters
viewing for guests 66 defined 16
viewing for virtual disks 66 virtual disk images 54, 56
Sync-Failover device groups virtual disks
creating 34 and disk space consumption 18
system provisioning 22 and guest states 56
system resource allocation, See resource allocation attaching 62
system resources defined 16
allocating 17 deleting 63
detaching and re-attaching 62
viewing unattached 62
T virtual disk space
TCP connections as resource 57
to vCMP host or guest 48 virtual disk statistics
TMOS hypervisors 16 viewing 66
traffic group virtual machines 16
creating a second 31 virtual management network
creating non-default 30 defined 16
trunks virtual resources
creating external 22 de-allocating 18
trust domains, See local trust domains virtual servers
creating for HTTP traffic 27
VLAN configuration
U and vCMP host 18
VLAN groups
upgrade process 54 and guests 18
VLANs
V and self IP addresses 25
creating external 23
vCMP VMs
creating temporary guest 51 defined 16
vCMP application volume disconnecting 48
and disk space 45 propagating changes to 56
and disk space allocation 21, 45 volumes, See vCMP application volume
creating and deleting 46
71
Index
72