BIG-IP Policy Enforcement Manager Implementations
BIG-IP Policy Enforcement Manager Implementations
Version 13.1
Table of Contents
Table of Contents
Overview...................................................................................................................................... 9
What is Policy Enforcement?............................................................................................. 9
About enforcement policies..............................................................................................10
About enforcement policy rules........................................................................................10
About subscriber provisioning through PCRF.................................................................. 11
Best practices for creating enforcement policies..............................................................11
About sizing considerations............................................................................................. 12
3
Table of Contents
4
Table of Contents
5
Table of Contents
6
Table of Contents
Troubleshooting...................................................................................................................... 151
PEM troubleshooting .....................................................................................................151
Subscriber and policies active sessions..............................................................153
Active sessions statistics.....................................................................................153
Configuring subscriber activity log...................................................................... 154
7
Table of Contents
8
Overview
Alternatively, you can provision subscribers manually. These subscribers are called static subscribers.
You use PEM to add static subscribers one at a time, or to import a list of subscribers. Provisioning static
subscribers might require the ability to snoop RADIUS traffic but does not require a PCRF connection, as
the policy assigned for static subscriber is pre-configured.
Overview
When adding static subscribers on the BIG-IP system, you provide the subscriber ID, subscriber ID type,
and one or more policies to apply. You can also specify the IP address, but if it is dynamically assigned,
you cannot include it. In this case, you need interception of RADIUS traffic in order to map the
subscriber to the IP address. When the subscriber enters the network, the IP address from RADIUS is
combined with the information already on PEM. If the static subscriber includes the IP address, no
RADIUS interception is required.
10
BIG-IP Policy Enforcement Manager: Implementations
• Flow information, such as traffic associated with specific source and destination IP addresses or ports,
or incoming DSCP marking. For example, a rule can apply to all traffic directed to a specific
destination port.
• URL information, such as URL categories that the system detects. For example, the rule may
categorize adult traffic and prevent access to it.
• Custom criteria, which are other conditions that you develop using iRules®
If the traffic meets the criteria in the rule, the rule specifies actions to take, such as:
• Dropping traffic
• Forwarding traffic to a specific endpoint or series of endpoints for value-added services
• Redirecting HTTP traffic to a URL
• Generating reporting data for further processing by external analytic systems
• Usage monitoring about the traffic to the PCRF so it can track mobile usage.
• Setting DSCP bits in the IP header of the traffic by marking all or marking upon the traffic exceeding
a threshold
• Setting Layer 2 Quality of Service (QoS) levels for the traffic
• Enforcing rate control using a bandwidth control policy
Because rules provide so much flexibility, you need to plan what you want to do, and consider your
options before you add the rules. One option is to simply classify traffic and review reports of the types
of traffic your system is receiving to get more information on which to base the rules. This could be the
first step when developing enforcement policies using PEM.
11
Overview
• Assign the subscriber IP address when creating static subscribers that include a global or unknown
subscriber policy, to ensure that the subscriber gets the entitled service faster and does not have to
wait for processing of RADIUS traffic.
• If you want to use different types of steering, create separate policies and rules. For example, consider
creating a policy that steers traffic from a source VLAN to an endpoint, and another policy to steer
VLAN traffic to a service chain.
• Create an empty pool and use it in a forwarding endpoint if you want to route traffic or resolve policy
priority conflicts between routing and steering.
These are best practices when writing policy rules:
• Be careful when you mix both L4 and L7 classification criteria in one rule; in some cases, L4 criteria
takes precedence. Keep it simple: one rule, one type of criteria.
• Specify different precedence values for the rules that might conflict, to make clear in what order the
rules will be evaluated.
• Do not mix different types of policy actions in the same rule; create separate rules for forwarding,
reporting, Quality of Service (QoS) actions and finally, for which policy action is implemented.
• A policy (or a rule) should not direct traffic to both a forwarding endpoint and to a service chain. If
both are specified, the service chain always takes precedence and is performed first, then traffic is
forwarded to the endpoint.
• Dedicate certain bandwidth controllers for use only in PEM™ QoS actions, and do not use them
outside PEM.
• One dynamic bandwidth controller can be applied per direction per subscriber and up to eight static
bandwidth controllers can be applied, in PEM™.
There are best practices to consider when setting up reporting in enforcement policies:
• Choosing more frequent intervals for generating periodic reporting records (particularly session-
based) can greatly increase the amount of reporting data, and could potentially overload the analytics
system.
• Flow-based records are generated several times during the flow life and can significantly impact the
amount of reporting data sent.
Here are best practices to consider when setting up iRule action:
• If multiple PEM iRules® match a flow, all the iRules are processed. The priority order is as follows:
• PEM policy priority, and it takes in to consideration if the policy is a global high precedence
policy, subscriber policy or low precedence policy.
• PEM iRule event priority and the default event priority is 500. The event priority can be changed
by specifying the priority within the iRule event.
• Rule precedence.
Note: If you require granular reporting for large amount of traffic, your performance might be impacted.
12
BIG-IP Policy Enforcement Manager: Implementations
13
Overview
14
Setting Up Application Visibility
Task summary
Determining and adjusting traffic classifications
Creating a category
Creating classification presets
Creating a data plane virtual group
Examining application visibility statistics
Creating a category
On the BIG-IP® system, you can create customized categories for classifying traffic if the predefined
categories are not sufficient for your needs. For example, if you plan to create new application types
unique to your organization, you can create a category to group them together.
1. On the Main tab, click Traffic Intelligence > Applications > Application List.
The Applications screen displays a list of the supported classification categories.
2. Click Create.
The New Application screen opens.
3. From the Type list, select Category.
4. In the Name field, type a name for the classification category.
5. In the Description field, type optional descriptive text for the classification presets.
6. In the Category ID field, type an identifier for this category, a unique number.
7. For the Application List setting, move applications that you want to associate with this category from
the Unknown list to the Selected list.
If the applications are not listed yet, you can associate the applications with the category when you
create them.
8. Click Finished.
You have created custom applications to handle traffic.
16
BIG-IP Policy Enforcement Manager: Implementations
You can create listeners that specify how to handle traffic for policy enforcement. Creating a listener
performs preliminary setup on the BIG-IP® system for application visibility, intelligent steering,
bandwidth management, and reporting.
1. On the Main tab, click Policy Enforcement > Data Plane Listeners.
The Date Plane Listeners screen opens.
2. Click Add Group.
The New Virtual Group screen opens.
3. In the Name field, type a unique name for the listener.
4. In the Destination Address field, type the IP address of the virtual server. For example, 10.0.0.1 or
10.0.0.0/24.
Note: When you use an IPv4 address without specifying a prefix, the BIG-IP® system automatically
uses a /32 prefix.
Tip: You can use a catch-all virtual server (0.0.0.0) to specify all traffic that is delivered to the
BIG-IP® system. Configure the source and destination setting, during forwarding mode only. In the
relay mode, the client does not have an IP address and the DHCP provides the client with an IP
address.
The system will create a virtual server using the address or network you specify.
5. For the Service Port setting, type or select the service port for the virtual server.
6. From the VLAN and Tunnel Traffic list, select Enabled on. Then, for the VLANs and Tunnels
setting, move the VLAN or VLANs on which you want to allow the virtual servers to share traffic
from the Available list to the Selected list.
7. For the VLANs and Tunnels setting, move the VLANs and tunnels that you want to monitor from
the Available list to the Selected list.
8. In the Policy Provisioning area, select enforcement policies to apply to the traffic.
a) For Global Policy, move policies to apply to all subscribers to High Precedence or Low
Precedence.
Note: For URL categorization to take effect, you need to associate the enforcement policy with a
classification profile.
b) For Unknown Subscriber Policy, move policies to use if the subscriber is unknown to Selected.
The system applies the global policy to all subscribers in parallel with the subscriber policies, and
must be configured with unknown subscriber policy. High-precedence global policies override
conflicting subscriber policies, and low-precedence policies are overridden by conflicting subscriber
policies.
9. Click Finished.
The Policy Enforcement Manager creates a listener.
When you create a listener, Policy Enforcement Manager™ also creates virtual servers for each type of
traffic (TCP, UDP, or both and IP), and a virtual server for HTTP traffic. The system sets up classification
and assigns the appropriate policy enforcement profile to the virtual servers. If you are connecting to a
RADIUS authentication server, a virtual server for RADIUS is also added.
Now you can send traffic through the network. As network traffic moves through the BIG-IP® system,
the system classifies the traffic, and if you have developed policies, the system performs the actions
specified by the enforcement policy rules.
17
Setting Up Application Visibility
Note: You must have an SMTP email server configured to use the email option. On the Main tab, click
System > Configuration > Device > SMTP.
You can use the classification statistics to determine, for example, the types of applications and the
specific applications that clients are using. By drilling down into that information, you can find out
specifically which applications are being used by a particular IP address.
18
Configuring Intelligent Traffic Steering
Note: Common Address Redundancy Protocol (CARP) persistence is supported with PEM forwarding
endpoints, for use with service chaining action, when forwarding traffic to a pool.
Task Summary
Creating a pool
Creating forwarding endpoints
Creating an enforcement policy
Creating custom action policies
Adding rules to an enforcement policy
Creating a rule using classification criteria
Creating a rule using URL categorization
Modifying iRule event for URL categories
Creating a rule using flow conditions
Creating a rule for forwarding traffic
Creating a rule for QoS
Creating a data plane virtual group
Configuring TCP optimization as a PEM policy action
Enabling TCP Analytics
Creating a pool
You can create a pool of servers that you can group together to receive and process traffic.
1. On the Main tab, click Local Traffic > Pools.
The Pool List screen opens.
2. Click Create.
The New Pool screen opens.
3. In the Name field, type a unique name for the pool.
4. Using the New Members setting, add each resource that you want to include in the pool:
a) (Optional) In the Node Name field, type a name for the node portion of the pool member.
b) In the Address field, type an IP address.
c) In the Service Port field, type a port number, or select a service name from the list.
d) (Optional) In the Priority field, type a priority number.
e) Click Add.
5. Click Finished.
6. Repeat these steps for each pool you want to create.
The new pool appears in the Pools list.
20
BIG-IP Policy Enforcement Manager: Implementations
8. To specify a SNAT pool for address translation, from the SNAT Pool list, select the name of an
existing SNAT pool.
The steering endpoint uses the SNAT pool to implement selective and intelligent SNATs.
9. If you have multiple pool members and want specific traffic to go to the same pool member every
time, from the Persistence list, select the appropriate IP address type:
Option Description
Hash Settings Map the hash value to a specific pool member so that other traffic, with the
same hash value, is directed to the same pool member.
Source Address Map the source IP address to a specific pool member so that subsequent traffic
from this address is directed to the same pool member.
Destination Map the destination IP address to a specific pool member so that subsequent
Address traffic from this address is directed to the same pool member.
If you do not need to maintain persistence, leave Persistence set to Disabled, the default value.
10. If you select Hash Settings, configure the following fields:
• To specify a algorithm for the hash persistence method, from the Hash Persistence Algorithm
list, select the name of an algorithm. The CARP algorithm is the only options available currently.
• In the Hash Persistence Offset field, type the offset from start of the source string to calculate the
hash value. The default value is 0.
• In the Hash Persistence Length field, type the length of the source string used to calculate the
hash value. The default value is 1024.
11. From the Hash source list, select the appropriate method to get the hash value.
Option Description
URI Specify the string value to calculate hash value.
Execute Script Specify the script for TCL script snippet. You can select the Wrap Area Text
check box to wrap the definition text, and select the Extend Area check box to
increase the field space of format scripts.
The results from this script are used to calculate the hash value.
12. If you want to apply fallback persistence method that is applied when default persistence fails, from
the Fallback Persistence list, select the appropriate IP address type:
Option Description
Disabled Disables fallback persistence. The default value is Disabled.
Source Address Map the source IP address to a specific pool member so that subsequent
traffic from this address is directed to the same pool member.
Destination Map the destination IP address to a specific pool member so that subsequent
Address traffic from this address is directed to the same pool member.
13. Click Finished.
You can direct traffic to the endpoint you created in the policy rules of an enforcement policy.
21
Configuring Intelligent Traffic Steering
Tip: When creating policies you plan to apply globally or to unknown subscribers, it is a good idea to
include the word global or unknown in the policy name to distinguish these from other subscriber
policies.
4. From the Transactional list, select Enabled if you want the BIG-IP system to allow policy
enforcement on each HTTP transaction.
5. Click Finished.
The two new PEM iRule commands are PEM::policy initial and PEM::policy name. You can
select the Wrap Text check box to wrap the definition text, and select the Extend Text Area check
box to increase the field space of format scripts.
6. Click Finished.
The Policy Enforcement Manager creates a new iRule, and displays the iRule list.
7. To attach a custom action to a specific iRule, follow these steps:
a) Click Policy Enforcement > Policies.
b) Select a policy name.
c) Click a policy rule.
d) From the Custom Action list, select an iRule created.
22
BIG-IP Policy Enforcement Manager: Implementations
8. Click Update.
You have now created a custom action in a policy, using iRules®.
Note: The iRule actions are performed at the end of all the other policy actions.
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. Use the Classification, URL, Flow, and Custom Criteria tabs to identify the traffic that you want to be
affected by this rule.
7. From the Modify Header list, select Enabled, to modify the HTTP request header.
More modify header configuration options display.
8. Use the Reporting, Quota, Forwarding, Modify Header or QoS areas to specify what you want to do
with the traffic that you are classifying or specify what actions you want to apply to the traffic.
Other tasks describe how to do this in detail.
If you leave Gate Status enabled (default) and specify no other actions, the system stores traffic
classification statistics on the BIG-IP system, and forwards the traffic to its destination without any
further action.
9. From the Congestion Detection list, select Enable, to congestion detection in the Radio Access
Network.
a) In the Threshold field, type the lower threshold bandwidth for a session. The default value is
1000kbs.
b) ForDestination list, select the publisher name from the HSL publisher drop-down list.
The state of congestion detection is now controlled by policy application, and different subsets of
subscribers can have different settings. This enables congestion-detection for specific types of
applications as it pairs with specific policy rule conditions.
10. Click Finished.
11. Repeat steps 3-8 to create as many rules as needed to handle the traffic you are interested in.
23
Configuring Intelligent Traffic Steering
The enforcement policy includes the rules with the conditions and actions you added.
Now you need to associate the enforcement policy with the virtual server (or servers) to which traffic is
directed.
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. On the Classification tab, in the Classification setting, specify Layer 7 matching criteria for the rule:
a) From the Match Criteria list, select whether you want perform actions on traffic that matches
(select Match), or does not match (select No Match) the criteria specified.
b) From the Category list, select the type of traffic this rule applies to, or select Any for all traffic.
c) Some categories have specific applications associated with them. If this one does, from the
Application list select the application this rule applies to, or select Any for all traffic in this
category.
d) Click Add to add this match criteria to the classification.
Add as many matching criteria as are relevant to this rule.
7. Use the Reporting, Quota, Forwarding, Modify Header or QoS areas to specify what you want to do
with the traffic that you are classifying or specify what actions you want to apply to the traffic.
Other tasks describe how to do this in detail.
If you leave Gate Status enabled (default) and specify no other actions, the system stores traffic
classification statistics on the BIG-IP system, and forwards the traffic to its destination without any
further action.
8. Click Finished.
You have created a rule that applies to traffic based on classification criteria.
24
BIG-IP Policy Enforcement Manager: Implementations
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. On the URL tab, in the URL setting, specify Layer 7 matching criteria for the rule :
a) From the Match Criteria list, select whether you want perform actions on traffic that matches
(select Match), or does not match (select No Match) the criteria specified.
b) From the URL Category list, select the type of traffic this rule applies to.
c) Click Add to add this match criteria to the classification.
Add as many matching criteria as are relevant to this rule.
7. Use the Reporting, Quota, Forwarding, Modify Header or QoS areas to specify what you want to do
with the traffic that you are classifying or specify what actions you want to apply to the traffic.
Other tasks describe how to do this in detail.
If you leave Gate Status enabled (default) and specify no other actions, the system stores traffic
classification statistics on the BIG-IP system, and forwards the traffic to its destination without any
further action.
8. Click Finished.
You have created a rule that applies to traffic based on URL Category.
25
Configuring Intelligent Traffic Steering
You have modified an iRule event setting for an existing URL category.
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. On the Flow tab, in the Flow setting, specify Layer 4 conditions that the traffic must meet (or not
meet) for this rule to apply.
Option Description
Match Select whether you want to perform actions on traffic that matches (select
Match) or does not match (select No Match) the criteria specified.
DSCP Marking To match incoming traffic based on a DSCP value, type an integer from 0 to
63.
Protocol To specify the applicable traffic by protocol, select UDP, TCP, or leave the
default value of Any.
IP Type To specify the IP address type that this rule applies to, select IPv4, IPv6, or
leave the default value of Any.
Source Address/ To match incoming traffic based on the address or network it is coming from,
Mask type the source IP address/netmask of the network you want the rule to affect.
The default value is 0.0.0.0/32.
26
BIG-IP Policy Enforcement Manager: Implementations
Option Description
Source Port To match incoming traffic based on the port it is coming from, type the port
number you want the rule to affect. The default value (empty) matches traffic
from all ports.
Source VLAN To match incoming traffic based on the VLAN, select a previously configured
VLAN.
Destination To match traffic based on the address or network it is directed to, type the
Address/Mask source IP address/netmask of the network you want the rule to affect. The
default value is 0.0.0.0/32.
Destination Port To match incoming traffic based on the port it is directed to, type the port
number you want the rule to affect. The default value (empty) matches traffic
headed to all ports.
Tip: F5® recommends that you keep the matching criteria in a rule simple, adding more rules to
specify additional conditions rather than including too many in one rule.
7. Use the Reporting, Quota, Forwarding, Modify Header or QoS areas to specify what you want to do
with the traffic that you are classifying or specify what actions you want to apply to the traffic.
Other tasks describe how to do this in detail.
If you leave Gate Status enabled (default) and specify no other actions, the system stores traffic
classification statistics on the BIG-IP system, and forwards the traffic to its destination without any
further action.
8. Click Finished.
You have created a rule that classifies traffic.
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
27
Configuring Intelligent Traffic Steering
6. Use the Classification, URL, Flow, and Custom Criteria tabs to identify the traffic that you want to be
affected by this rule.
7. In the Gate area, for Gate Status, select Enabled.
Options provide several ways to forward the traffic.
8. In the Forwarding area, for HTTP Redirect, select Enabled, and type the URL.
9. From the Forwarding list, select an option where you would like to forward the traffic.
Options Description
Route to Network The traffic flow is forwarded to the default destination.
Forwarding to Endpoint The flow is steered to a different destination and you can select
one of the endpoints.
Forward to ICAP virtual The flow is forwarded to the ICAP virtual server.
Server
10. From the Forwarding Fallback Action list, select Drop or Continue to specify if the connection can
remain unchanged or should be dropped if the forwarding action fails.
11. From the ICAP Virtual Server list, select an internal virtual server that you have created, or click
Create to create a new internal virtual server.
12. From the ICAP Type list, select an ICAP adaptation type.
• Select Request to send a portion of the request to the ICAP server.
• Select Response to receive a portion of the response from the ICAP server.
• Select Request and Response to have both types of adaptation.
13. From the Service Chain list, select Create to direct traffic to more than one location (such as value-
added services).
14. Click Finished.
You have created a rule that forwards traffic.
Note:
In the mobile market, uplink and downlink is sometimes known as forward and reverse respectively.
1. On the Main tab, click Policy Enforcement > Policies.
The Policies screen opens.
2. Click the name of the enforcement policy you want to add rules to.
The properties screen for the policy opens.
3. In the Policy Rules area, click Add.
The New Rule screen opens.
4. In the Name field, type a name for the rule.
5. In the Precedence field, type an integer that indicates the precedence for the rule in relation to the
other rules. Number 1 has the highest precedence. Rules with higher precedence are evaluated before
other rules with lower precedence.
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
28
BIG-IP Policy Enforcement Manager: Implementations
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. Use the Classification, URL, Flow, and Custom Criteria tabs to identify the traffic that you want to be
affected by this rule.
7. For Gate Status, select Enabled.
If you select Disabled, then the corresponding traffic will be dropped.
Forwarding and QoS options are displayed.
8. To set DSCP bits on the downlink traffic, for IP Marking (DSCP), select Specify, and type a value
between 0 and 63, inclusive.
The traffic that matches this rule is marked with this value.
9. To set DSCP bits on the uplink traffic, for IP Marking (DSCP), select Specify, and type a value
between 0 and 63, inclusive.
The traffic that matches this rule is marked with this value.
10. To set a Layer 2 Quality of Service (QoS) level in downlink packets, for L2 Marking (802.1p), select
Specify, and type a value between 0 and 7, inclusive.
Setting a QoS level affects the packet delivery priority.
11. To set a Layer 2 Quality of Service (QoS) level in uplink packets, for L2 Marking (802.1p), select
Specify, and type a value between 0 and 7, inclusive.
Setting a QoS level affects the packet delivery priority.
12. To apply rate control to downlink traffic, in the Bandwidth Controller setting, select the name of a
bandwidth control policy.
Note: You can assign any previously created static or dynamic bandwidth control policies. However,
F5® does not recommend using the default-bwc-policy, which the system provides, nor the
dynamic_spm_bwc_policy, which you can create to enforce dynamic QoS settings provisioned by the
PCRF.
Depending on the bandwidth control policy, PEM™ restricts bandwidth usage per subscriber, group of
subscribers, per application, per network egress link, or any combination of these.
13. To apply rate control to uplink traffic and per category of application, in the Bandwidth Controller
setting, select the name of a bandwidth control policy.
Note: You can assign any previously created static or dynamic bandwidth control policies. However,
we do not recommend using the default-bwc-policy, which the system provides, nor the
dynamic_spm_bwc_policy, which you can create for communicating with the PCRF.
Depending on the bandwidth control policy, PEM restricts bandwidth usage per subscriber, group of
subscribers, per application, per network egress link, per category of applications or any combination
of these.
14. Click Finished.
You have created a rule that manages QoS traffic.
29
Configuring Intelligent Traffic Steering
You can create listeners that specify how to handle traffic for policy enforcement. Creating a listener
performs preliminary setup on the BIG-IP® system for application visibility, intelligent steering,
bandwidth management, and reporting.
1. On the Main tab, click Policy Enforcement > Data Plane Listeners.
The Date Plane Listeners screen opens.
2. Click Add Group.
The New Virtual Group screen opens.
3. In the Name field, type a unique name for the listener.
4. In the Destination Address field, type the IP address of the virtual server. For example, 10.0.0.1 or
10.0.0.0/24.
Note: When you use an IPv4 address without specifying a prefix, the BIG-IP® system automatically
uses a /32 prefix.
Tip: You can use a catch-all virtual server (0.0.0.0) to specify all traffic that is delivered to the
BIG-IP® system. Configure the source and destination setting, during forwarding mode only. In the
relay mode, the client does not have an IP address and the DHCP provides the client with an IP
address.
The system will create a virtual server using the address or network you specify.
5. For the Service Port setting, type or select the service port for the virtual server.
6. From the VLAN and Tunnel Traffic list, select Enabled on. Then, for the VLANs and Tunnels
setting, move the VLAN or VLANs on which you want to allow the virtual servers to share traffic
from the Available list to the Selected list.
7. For the VLANs and Tunnels setting, move the VLANs and tunnels that you want to monitor from
the Available list to the Selected list.
8. In the Policy Provisioning area, select enforcement policies to apply to the traffic.
a) For Global Policy, move policies to apply to all subscribers to High Precedence or Low
Precedence.
Note: For URL categorization to take effect, you need to associate the enforcement policy with a
classification profile.
b) For Unknown Subscriber Policy, move policies to use if the subscriber is unknown to Selected.
The system applies the global policy to all subscribers in parallel with the subscriber policies, and
must be configured with unknown subscriber policy. High-precedence global policies override
conflicting subscriber policies, and low-precedence policies are overridden by conflicting subscriber
policies.
9. Click Finished.
The Policy Enforcement Manager creates a listener.
When you create a listener, Policy Enforcement Manager™ also creates virtual servers for each type of
traffic (TCP, UDP, or both and IP), and a virtual server for HTTP traffic. The system sets up classification
and assigns the appropriate policy enforcement profile to the virtual servers. If you are connecting to a
RADIUS authentication server, a virtual server for RADIUS is also added.
Now you can send traffic through the network. As network traffic moves through the BIG-IP® system,
the system classifies the traffic, and if you have developed policies, the system performs the actions
specified by the enforcement policy rules.
30
BIG-IP Policy Enforcement Manager: Implementations
On the BIG-IP® system, you can apply TCP Optimization as a PEM policy action, which then can be
applied to subscriber traffic. TCP optimization supports many optimization parameters which can be
catered to a specific network type.
1. On the Main tab, click Local Traffic > Profiles > Protocol > TCP.
The TCP profile list screen opens.
2. Click Create.
The New TCP Profile screen opens, inheriting values from the system-supplied TCP profile.
3. For Name, type a name for the profile.
4. To make the fields editable, select the Custom check box at the right of each area.
There are five parameters that need to configured for creating a TCP profile for a PEM policy. The
first four are in the Memory Management area, the last one is in the Congestion Control area of the
screen.
Option Description
Proxy Buffer High Specifies the highest level at which the receive window is closed. The default
value is 49152.
Proxy Buffer Low Specifies the proxy buffer level, in bytes, at which the receive window is
opened. The default is 32768.
Receive Window Specifies the maximum advertised RECEIVE window size. The default is
65535bytes.
Send Buffer Specifies the SEND window size. The default is 65535bytes.
Congestion Control Specifies the algorithm to use to share network resources among competing
users to reduce congestion.
5. Click Finished.
6. On the Main tab, click Policy Enforcement > Policies.
The Policies screen opens.
7. Click the name of the enforcement policy you want to add rules to.
The properties screen for the policy opens.
8. In the Policy Rules area, click Add.
The New Rule screen opens.
9. In the Name field, type a name for the rule.
10. In the Precedence field, type an integer that indicates the high precedence for the rule in relation to
the other rules. Number 1 has the highest precedence. Rules with higher precedence are evaluated
before other rules with lower precedence.
11. From the TCP Optimization setting, in Profile area, select a previously configured TCP profile.
Select Downlink to apply to traffic that matches this rule on downlink traffic and Uplink to apply to
traffic that matches this rule on uplink traffic.
You have now configured TCP optimization for a PEM policy.
31
Configuring Intelligent Traffic Steering
3. In the Profile Name field, type a name for the TCP profile.
4. In the Statistics Collection setting, ensure that the Client side and Server side check boxes are
cleared. .
Both check boxes should remain cleared when you are creating a new TCP Analytics profile, or if
they are enabled on an existing profile.
5. From the Statistics Gathering Configuration area, select all the check boxes for Collected Entities.
6. Click Finished.
The system configures a new TCP Analytics profile.
7. On the Main tab, click Local Traffic > Virtual Servers
The Virtual Server List screen opens.
8. Click Create.
The New Virtual Server screen opens.
9. In the Name field, type a name for the virtual server.
10. In the Destination Address/Mask field, type the destination IP address to which the virtual server
sends traffic.
11. In the Service Port field, type a service port or select a type from the list.
12. From the Configuration setting, select Advanced, and then scroll down to the TCP Analytics
Profile setting and select the TCP analytics profile that you created.
13. In the Policy Enforcement Profile setting, select spm.
14. Click Finished.
The PEM profile is now attached to the virtual server.
15. On the Main tab, click Policy Enforcement > Policies
16. Click Create.
The New Policy screen opens.
17. In the Name field, type a name for policy.
18. Click Finished.
19. On the policies list screen, click the name of the policy you created.
20. In the Policy Rules area, click Add.
The New Rule screen opens.
21. In the Name field, type a name for the rule.
22. In the Precedence field, type an integer that indicates the high precedence for the rule in relation to
the other rules. Number 1 has the highest precedence. Rules with higher precedence are evaluated
before other rules with lower precedence.
23. In the Reporting area, from the TCP Analytics list, select Enabled.
24. Click Finished.
You have enabled TCP Analytics for a selected PEM policy.
32
Inserting Content in to HTML Pages
Note: The size of the content being inserted cannot be more than 65k letters.
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. Use the Classification, URL, Flow, and Custom Criteria tabs to identify the traffic that you want to be
affected by this rule.
Inserting Content in to HTML Pages
7. From the Insert Content list, select Enabled, to modify the content insertion.
Note: The BIG-IP system does not allow matching tags that are inserted, by insert action, on a given
flow.
The two new PEM iRule commands are PEM::policy initial and PEM::policy name. You can
select the Wrap Text check box to wrap the definition text, and select the Extend Text Area check
box to increase the field space of format scripts.
10. From the Frequency list, select a frequency type.
• Select Always to insert content in each transaction.
• Select Once to insert content once per action.
• Select Once Every to insert content once per designated time period, in seconds.
11. Click Finished.
12. On the Main tab, click Policy Enforcement > Global > Options.
The Global Options screen opens.
13. For the Content Insertion Options setting, in the Throttling fields, type the time used to set the
maximum wait time before Policy Enforcement Manager™ applies the insert action again on the same
subscriber.
34
Configuring Quota Management using Rating Groups
Task summary
Configuring quota management for global settings
Creating rating groups
Adding rating group in enforcement policy
Creating a listener for quota management
Note: You need to assign a default rating group on your policy rule or assign a new one. The default
rating group is for all traffic that does not belong to another rating group.
Multiple Services Credit Control (MSCC) is a procedure that allows quota management for multiple
services within one Gy Session. It is possible to allocate quota on a per service basis or the services can
be grouped into rating group to gather aggregation of quota management. When the MSCC is present in
the CCR message, it represents PCRF. The MSCC requests quota for a particular service, or multiple
services, or usage being reported. When the MSCC is present in the CCA message, it represent OCS that
grants quota for the service or services.
Note: Rating group can be either the Granted Units (GSU) that is used before releasing the service or a
new CCR needs to be sent, or Used Service Units (USU) which reports the total traffic for subscriber or
service.
36
BIG-IP Policy Enforcement Manager: Implementations
Note: If a rating group is configured as default, that group cannot be used by any rules.
1. On the Main tab, click Policy Enforcement > Global > Options.
The Global Options screen opens.
2. In the Quota Management Options area, for the Default Rating Group setting, select Create to
create a new rating group for quota management.
This takes you to the Policy Enforcement > Rating Groups > New Rating Group screen. Click
Policy Enforcement > Options to go back to options screen.
You created a default rating group that enables the possibility to implement quota per subscriber. Instead
of defining all the policies with the corresponding rating group, you can define a single rating group and
add it as a default.
37
Configuring Quota Management using Rating Groups
Note: The default values for consumption time, validity time and holding time are used, when the
OCS does not specify them.
14. From the Breach Action list, select the appropriate action to be taken when default quota expires or
OCS does not provide new quota or breach action.
Breach Action Description
Terminate The system stops traffic when quota is breached.
Allow The system allows traffic to go through even when the quota is breached.
Redirect The system redirects traffic to the forwarding endpoint, when quota is breached.
15. From the Request on Install list, select Yes if the quota has to be requested from the Gy, when the
policy is installed for a subscriber. Otherwise, select No for quota to be requested when one of the
applications associated with the rating group is detected.
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. From the Rating group list, in the Quota setting, select the prior configured rating group or create a
new rating group. This specifies what you want to do with the traffic that you are classifying or
specify what actions you want to apply to the traffic.
7. Click Finished.
8. Repeat steps 3-8 to create as many rules as needed to handle the traffic you are interested in.
The enforcement policy includes the rules with the conditions and actions you added.
Now you need to associate the enforcement policy with the virtual server (or servers) to which traffic is
directed.
38
BIG-IP Policy Enforcement Manager: Implementations
39
Configuring Quota Management using Rating Groups
40
About Logging Policy Enforcement Events to IPFIX
Collectors
Object Reason
Pool of IPFIX collectors Create a pool of IPFIX collectors to which the
BIG-IP system can send IPFIX log messages.
Destination Create a log destination to format the logs in
IPFIX templates, and forward the logs to the
IPFIX collectors.
Publisher Create a log publisher to send logs to a set of
specified log destinations.
Task summary
Perform these tasks to configure IPFIX logging of PEM processes on the BIG-IP® system.
a) Type the collector's IP address in the Address field, or select a node address from the Node List.
b) Type a port number in the Service Port field.
By default, IPFIX collectors listen on UDP or TCP port 4739 and Netflow V9 devices listen on
port 2055, though the port is configurable at each collector.
c) Click Add.
5. Click Finished.
Creating a publisher
A publisher specifies where the BIG-IP® system sends log messages for IPFIX logs.
1. On the Main tab, click System > Logs > Configuration > Log Publishers.
The Log Publishers screen opens.
2. Click Create.
3. In the Name field, type a unique, identifiable name for this publisher.
42
BIG-IP Policy Enforcement Manager: Implementations
4. Use the Log Destinations setting to select an existing IPFIX destination (perhaps along with other
destinations for your logs): click any destination name in the Available list, and click << to move it to
the Selected list.
Important: If you configure a log publisher to use multiple logging destinations, then, by default, all
logging destinations must be available in order to log to each destination. Unless all logging
destinations are available, no logging will occur. If you want to log to the available logging
destinations when one or more destinations become unavailable, you must set the
logpublisher.atomic db variable to false.
5. Click Finished.
Implementation result
Now you have an implementation in which the BIG-IP® system logs messages about PEM™ session, flow
and transation reporting and sends the log messages to a pool of IPFIX collectors.
43
About Logging Policy Enforcement Events to IPFIX Collectors
44
Reporting Usage Data to an External Analytics Server
Task summary
Creating a publisher
Creating a rule for high-speed logging for session reporting
Creating a rule for high-speed logging for flow reporting
Creating a high-speed logging rule for transactional reporting
Creating a high-speed logging rule for device detection and tethering
Creating a publisher
Before you create a publisher, you have to create a HSL pool that needs to be associated to a destination.
Ensure that at least one destination associated with a pool of remote log servers exists on the BIG-IP®
system.
Create a publisher to specify where the BIG-IP system sends log messages for specific resources.
1. On the Main tab, click System > Logs > Configuration > Log Publishers.
The Log Publishers screen opens.
2. Click Create.
3. In the Name field, type a unique, identifiable name for this publisher.
4. For the Destinations setting, select a destination from the Available list, and click << to move the
destination to the Selected list.
Note: If you are using a formatted destination, select the destination that matches your log servers,
such as Remote Syslog, Splunk, or ArcSight.
5. Click Finished.
Reporting Usage Data to an External Analytics Server
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. Use the Classification, URL, Flow, and Custom Criteria tabs to identify the traffic that you want to be
affected by this rule.
7. From the Usage Reporting list, select Enabled.
8. From the Usage Report Granularity list, select Session to log details about subscribers and
application sessions.
9. In the Usage Volume Threshold setting, specify in octets, the threshold to send HSL reporting
records. You can send reporting data from uplink traffic, to downlink traffic and the total traffic
volume before logging the information.
10. In the Usage Destination setting, specify where to send the usage monitoring data:
• In the Gx field select Enabled for the BIG-IP system to send usage monitoring data over a Gx
interface. You can then type a string for the Gx Monitoring Key that is used for usage
monitoring.
Note: When you select Session in the Report Granularity field, the Gx field appears.
• From the HSL list, select the name of the publisher that specifies the server or pool of remote
HSL servers to send the logs and select the format script of the report from the Format Script list.
• Select the RADIUS Accounting option from the destination. From the RADIUS AAA Virtual
list, select the RADIUS AAA virtual that you have created before.
Note: If you are using a formatted destination, select the publisher that matches your log servers,
such as Remote Syslog, Splunk, or ArcSight.
11. In the Usage Interval field, type an integer that specifies how frequently HSL reporting data is sent.
46
BIG-IP Policy Enforcement Manager: Implementations
12. For the Session Reporting Field setting, move the fields that you want to see in the logs from the
Available list to the Selected list.
13. Click Finished.
You have created a rule that sends data about the traffic to external high-speed logging servers. The CSV
reporting format differs depending on whether the report granularity is flow-based or session-based.
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. Use the Classification, URL, Flow, and Custom Criteria tabs to identify the traffic that you want to be
affected by this rule.
7. From the Usage Reporting list, select Enabled.
8. From the Report Granularity list, select Flow, for more granular reporting of every TCP connection.
9. In the Volume Threshold setting, specify in octets, the threshold to send HSL reporting records. You
can send reporting data from uplink traffic, to downlink traffic and the total traffic volume before
logging the information.
10. In the Interval field, type an integer that specifies how frequently HSL reporting data is sent.
11. In the Destination setting, specify where to send the usage monitoring data:
• From the HSL list, select the name of the publisher that specifies the server or pool of remote
HSL servers to send the logs.
• Select the Format Script listand select the format script of the report from the Format Script list.
• Select the RADIUS Accounting option from the destination. From the RADIUS AAA Virtual
list, select the RADIUS AAA virtual that you have created before.
Note: If you are using a formatted destination, select the publisher that matches your log servers,
such as Remote Syslog, Splunk, or ArcSight.
12. For the Flow Reporting Field setting, move the fields that you want to see in the logs from the
Available list to the Selected list.
47
Reporting Usage Data to an External Analytics Server
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
7. Use the Classification, URL, Flow, and Custom Criteria tabs to identify the traffic that you want to be
affected by this rule.
8. From the Usage Reporting list, select Enabled.
9. From the Report Granularity list, select Transaction, for more granular reporting of every HTTP
transaction.
10. In the Additional HTTP Information setting, specify in bytes, the HTTP Hostname, the HTTP
User Agent, and the HTTP URI.
11. In the Destination setting, specify where to send the usage monitoring data:
• From the HSL list, select the name of the publisher that specifies the server or pool of remote
HSL servers to send the logs.
• Select the RADIUS Accounting option from the destination. From the RADIUS AAA Virtual
list, select the RADIUS AAA virtual that you created earlier.
Note: If you are using a formatted destination, select the publisher that matches your log servers,
such as Remote Syslog, Splunk, or ArcSight.
12. For the Transaction Reporting Field setting, move the fields that you want to see in the logs from
the Available list to the Selected list.
48
BIG-IP Policy Enforcement Manager: Implementations
Note: The format script is previously configured in Policy Enforcement > Reporting > Format
Script page.
7. Click Finished.
You have created a rule that sends device detection and tethering data about the traffic to external high-
speed logging servers.
Field Description
PEM id Identifies the reporting module (PEM) and the field value is
23003143.
Version Indicates the version of the format for backward compatibility.
Timestamp seconds The time the information was logged (along with the timestamp in
milliseconds), specifies seconds using UNIX time format.
Timestamp msec The time the information was logged (along with the timestamp in
seconds), specifies milliseconds using UNIX time format.
Report type The type of report. Always set to 3 for session-based reporting.
49
Reporting Usage Data to an External Analytics Server
Field Description
Subscriber ID A unique identifier (up to 64 characters) for the subscriber initiating
the session, such as a phone number. The subscriber ID type
determines the format.
Subscriber ID type The format of the subscriber ID. It can be E.164, IMSI, NAI, or
Private.
3GPP parameters The list of 3GPP parameters, which can be imsi, imeisv, tower_id, or
username.
Policy ID The Identification of the policy.
Rule ID The Identification of the policy rule.
Application ID A unique number that represents a particular application, and is used
for classifying traffic.
Last Sent The time, in seconds, since the last log entry was sent.
Bytes in The number of bytes received during this session.
Bytes out The number of bytes sent during this session.
Concurrent flows Always 0 (unsupported).
Opened flows Always 0 (unsupported).
Terminated flows Always 0 (unsupported).
Total transactions Always 0 (unsupported).
Successful transactions Always 0 (unsupported).
Aggregated category duration Summary of the duration of all flows for the session.
Reason The reason for sending the record. It can be 0 - reserved, 1 - volume
threshold reached, 2- interval time, 3 - subscriber logout, or 4 -
inactivity.
50
BIG-IP Policy Enforcement Manager: Implementations
Field Description
PEM id Identifies the reporting module (PEM) and the field value is 2300314.
Version Indicates the version of the format for backward compatibility.
Timestamp seconds The time the information was logged in UNIX time format.
Timestamp msec The msecs time value of the timestamp in UNIX time format.
Report type The type of report; 0 – flow start, 1 – flow interim, 2 – flow end.
Subscriber ID A unique identifier (up to 64 characters) for the subscriber initiating the
session, such as a phone number. The subscriber ID type determines the
format.
Subscriber ID type The format of the subscriber ID. It can be E.164, IMSI, NAI, or Private.
Source IP The IPv4 source address in the IP packet header.
Source port The source port the subscriber.
Destination IP The IPv4 destination address in the IP packet header.
Destination IP address The destination IP of the traffic.
Destination port The destination port for the traffic.
Protocol The protocol of the traffic for this flow, TCP or UDP.
Route Domain The route domain this flow belongs to.
VLAN The VLAN this flow belongs to.
Application ID A unique number that represents a particular application in this flow; it is
used for classifying traffic.
Urlcat ID The URL category id that the flow belongs to.
Flow start time seconds The time, in seconds, the flow started in UNIX time format.
Flow start time msecs The time in milliseconds of the flow start time.
Flow end time seconds The time the flow ended in UNIX time format.
Flow end time msecs The time in milliseconds of the flow end time.
Transactions count The count of full transactions seen in the flow.
Bytes in The number of bytes received during this flow.
Bytes out The number of bytes sent during this flow.
51
Reporting Usage Data to an External Analytics Server
Field Description
PEM id Identifies the reporting module (PEM) and the field value is 23003143.
Version Indicates the version of the format for backward compatibility.
Record type The type of report; 10 – transactional.
Transaction Number The sequential number of transaction in this flow (starting from 1).
Subscriber ID A unique identifier (up to 64 characters) for the subscriber initiating the
session, such as a phone number. The subscriber ID type determines the
format.
Subscriber ID type The format of the subscriber ID. It can be E.164, IMSI, NAI, or Private.
Source IP The IPv4 source address in the IP packet header.
Source port The source port the subscriber.
Destination IP The IPv4 destination address in the IP packet header.
Destination port The destination port for the traffic.
Protocol, TCP/UDP The protocol of the traffic for this flow, TCP or UDP.
Route Domain ID The route domain ID of the traffic.
VLAN ID The VLAN ID of the traffic.
Application/Category A unique number that represents the most relevant application or category
ID that is classified for the transaction.
URL Category ID A unique number that represents the first (most relevant) URL category that
is classified for the transaction.
Transaction Reports all classification tokens from the classification engine.
Classification result
Note: The traffic classification result is stored using multiple tokens (8
application/category token identifiers and 4 URL token identifiers) and
reported using a CSV format.
Transaction Start, The transaction timestamp (seconds) in UNIX time format, when an HTTP
seconds request is received.
Transaction Start, msecs The transaction timestamp (msecs) in UNIX time format when an HTTP
request is received.
Transaction Stop, The transaction timestamp (seconds) in UNIX time format when the
seconds corresponding HTTP response is received.
Transaction Stop, msecs The transaction timestamp (msecs) in UNIX time format when the
corresponding HTTP response is received.
Transaction Upstream The number of HTTP request bytes for this transaction.
Volume, bytes
Transaction The number of HTTP response bytes for this transaction.
Downstream Volume,
bytes
Skipped Transactions of The number of transactional reports skipped within the flow since the last
this kind successfully transmission in the flow.
HTTP information: The HTTP request/response information presented in a CSV format
containing the following fields:
52
BIG-IP Policy Enforcement Manager: Implementations
Field Description
Field Description
Report id Identifies the reporting module (PEM) and the field value is
23003143.
Report type The type of report. Always set to 5 for tethering-based reporting.
Report version Indicates the version of the format for backward compatibility.
Report timestamp seconds The time the information was logged (along with the timestamp in
milliseconds), specifies seconds using UNIX time format.
Report timestamp millisecs The time the information was logged (along with the timestamp in
seconds), specifies milliseconds using UNIX time format.
Subscriber ID A unique identifier (up to 64 characters) for the subscriber initiating
the session, such as a phone number. The subscriber ID type
determines the format.
53
Reporting Usage Data to an External Analytics Server
Field Description
Subscriber type The format of the subscriber ID. It can be E.164, IMSI, NAI, or
Private.
Subscriber IMEISV The IMEISV value for the subscriber.
Device name The name of the device obtained from the TacDB.
Device OS The device OS obtained form the TacDB.
UA-based OS The OS determined from the user-agent for the sampled flow.
TCP fingerprint-based OS The OS determined from the TCP fingerprints of the sampled flow.
TCP window size The Window size from the sampled TCP flow.
Source port The source port of the sampled flow.
TTL The time to live (TTL) value of the sampled flow.
TCP header length The header length of the sampled TCP flow.
TCP window scaling factor The window scaling factor of the sampled TCP flow.
Record Reason The reason for sending the record. Set to 14 when tethering is
detected, or set to 15 when tethering is not detected.
Operating Systems detected Not Applicable
Field Description
Report id Identifies the reporting module (PEM) and the field value is
23003143.
Report type The type of report. Always set to 5 for tethering-based reporting.
Report version Indicates the version of the format for backward compatibility.
Report timestamp seconds The time the information was logged (along with the timestamp in
milliseconds), specifies seconds using UNIX time format.
Report timestamp millisecs The time the information was logged (along with the timestamp in
seconds), specifies milliseconds using UNIX time format.
Subscriber ID A unique identifier (up to 64 characters) for the subscriber initiating
the session, such as a phone number. The subscriber ID type
determines the format.
54
BIG-IP Policy Enforcement Manager: Implementations
Field Description
Subscriber type The format of the subscriber ID. It can be E.164, IMSI, NAI, or
Private.
Subscriber IMEISV The IMEISV value for the subscriber.
Device name The name of the device obtained from the TacDB.
Device OS The device OS obtained form the TacDB.
UA-based OS Not Applicable
TCP fingerprint-based OS Not Applicable
TCP window size Not Applicable
Source port Not Applicable
TTL Not Applicable
TCP header length Not Applicable
TCP window scaling factor Not Applicable
Record Reason The reason for sending the record. Set to 14 when tethering is
detected, or set to 15 when tethering is not detected.
Operating Systems detected Contains the list of operating systems that were detected during the
tethering detection sampling interval.
55
Reporting Usage Data to an External Analytics Server
56
Using Fast L4 for Performance Optimization
Task summary
Creating a Fast L4 profile in PEM
Disabling a Fast L4 profile in PEM
Note: For URL categorization to take effect, you need to associate the enforcement policy with a
classification profile.
b) For Unknown Subscriber Policy, move policies to use if the subscriber is unknown to Selected.
The system applies the global policy to all subscribers in parallel with the subscriber policies, and
must be configured with unknown subscriber policy. High-precedence global policies override
conflicting subscriber policies, and low-precedence policies are overridden by conflicting subscriber
policies.
7. Click Finished.
The Policy Enforcement Manager creates a policy enforcement profile with Fast L4.
You have created a Fast L4 profile.
Note: For URL categorization to take effect, you need to associate the enforcement policy with a
classification profile.
b) For Unknown Subscriber Policy, move policies to use if the subscriber is unknown to Selected.
The system applies the global policy to all subscribers in parallel with the subscriber policies, and
must be configured with unknown subscriber policy. High-precedence global policies override
conflicting subscriber policies, and low-precedence policies are overridden by conflicting subscriber
policies.
7. Click Finished.
The Policy Enforcement Manager creates a policy enforcement profile with Fast L4.
You have disabled Fast L4 on a PEM profile.
58
Reporting Quality of Experience and Video Usage
Task summary
Creating a publisher
Adding Quality of Experience profile to the virtual server
Configuring QoE Reporting
Creating a publisher
Before you create a publisher, you have to create a HSL pool that needs to be associated to a destination.
Ensure that at least one destination associated with a pool of remote log servers exists on the BIG-IP®
system.
Create a publisher to specify where the BIG-IP system sends log messages for specific resources.
1. On the Main tab, click System > Logs > Configuration > Log Publishers.
The Log Publishers screen opens.
2. Click Create.
3. In the Name field, type a unique, identifiable name for this publisher.
4. For the Destinations setting, select a destination from the Available list, and click << to move the
destination to the Selected list.
Note: If you are using a formatted destination, select the destination that matches your log servers,
such as Remote Syslog, Splunk, or ArcSight.
5. Click Finished.
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. Use the Classification, URL, Flow, and Custom Criteria tabs to identify the traffic that you want to be
affected by this rule.
7. From the QoE Reporting list, select Enabled.
8. In the QoE Destination setting, from the HSL list, select the name of the publisher that specifies the
server or pool of remote HSL servers to send the logs and select the format script of the report from
the Format Script list.
60
BIG-IP Policy Enforcement Manager: Implementations
Note: If you are using a formatted destination, select the publisher that matches your log servers,
such as Remote Syslog, Splunk, or ArcSight.
9. Click Finished.
You have created an enforcement policy with QoE report action.
Field Description
Report id Identifies the reporting module (PEM) and the field value is
23003143.
Subscriber ID A unique identifier (up to 64 characters) for the subscriber initiating
the session, such as a phone number. The subscriber ID type
determines the format.
Source IP The IPv4 source address in the IP packet header.
Source Transport Port The source (L4) port.
Destination IP The IPv4 destination address in the IP packet header.
Destination Transport Port The IPv4 destination address in the IP packet header.
Protocol Identifier The IP Protocol field.
Media Type Different types of media, for example, MP4.
URL X SessionId The ID used to associate different segments of a whole video or
audio.
Width Height The resolution of the video.
Bit Rate The number of bits that are conveyed or processed per unit of time.
Frame Rate The frequency (rate) at which an imaging device produces unique
consecutive images called frames.
Duration The length of time of the media.
Watched It is the length of time that the video has been watched.
Mos It is the value ranging 1 to 5, that evaluates the user-experience.
61
Reporting Quality of Experience and Video Usage
62
Performing Radius Authentication and Accounting
Task summary
Creating a RADIUS AAA profile for policy enforcement
Creating a listener for RADIUS AAA Virtual
Creating policy rule for RADIUS accounting reports
64
BIG-IP Policy Enforcement Manager: Implementations
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. Use the Classification, URL, Flow, and Custom Criteria tabs to identify the traffic that you want to be
affected by this rule.
7. From the Usage Reporting list, select Enabled.
8. From the Report Granularity list, select from one the the granular reporting options:
Option Description
Session Select Session to log details about subscribers and application sessions.
Flow Select Flow, for more granular reporting of every TCP connection.
Transaction select Transaction, for more granular reporting of every HTTP transaction.
9. If you select Session or Flow, in the Volume Threshold setting, specify in octets, the threshold to
send RADIUS reporting records. You can send reporting data from uplink traffic, to downlink traffic
and the total traffic volume before logging the information.
10. If you select Transaction, in the Additional HTTP Information setting, specify in bytes, the HTTP
Hostname, the HTTP User Agent and the HTTP URI.
11. In the Destination setting, Select the RADIUS Accounting option from the destination.
12. From the RADIUS AAA Virtual list, select the RADIUS AAA virtual that you created earlier.
13. Click Finished.
You have created a RADIUS internal virtual server as a reporting destination.
65
Performing Radius Authentication and Accounting
66
Configuring Subscriber Discovery based on DHCP
The DHCP module monitors the clients DHCP traffic after the initial IP allocation and snoops for DHCP
lease renewal packets, releasing of the IP address, and reconfiguring requests. This determines when the
BIG-IP system can safely delete the session.
Task summary
Creating a listener for DHCPv4 discovery virtual
Creating a DHCPv4 profile for policy enforcement
Creating a listener for DHCPv6 discovery virtual
Creating a DHCPv6 profile for policy enforcement
Creating a listener for RADIUS subscriber discovery
Configuring Subscriber Discovery based on DHCP
Note: When you use an IPv4 address without specifying a prefix, the BIG-IP® system automatically
uses a /32 prefix.
Tip: You can use a catch-all virtual server (0.0.0.0) to specify all traffic that is delivered to the
BIG-IP® system. Configure the source and destination setting, during forwarding mode only. In the
relay mode, the client does not have an IP address and the DHCP provides the client with an IP
address.
The system will create a virtual server using the address or network you specify.
7. From the VLAN and Tunnel Traffic list, select Enabled on. Then, for the VLANs and Tunnels
setting, move the VLAN or VLANs on which you want to allow the virtual servers to share traffic
from the Available list to the Selected list.
8. For the VLANs and Tunnels setting, move the VLANs and tunnels that you want to monitor from
the Available list to the Selected list.
9. For the DHCP Mode setting, select Relay or Forward to specify the mode in which the DHCP client
requests are sent.
10. For the Pool Member Configuration setting, add the DHCP virtual servers that are to be members of
the pool. Type the Member IP Address and Port number, then click Add.
11. From the Subscriber Discovery list, select Enabled. Then, for the Subscriber ID Format setting,
select the format you want to implement.
Format Description
MAC Address Uses the subscriber ID as the MAC address through
which the subscriber ID goes through.
Relay Agent Option: Suboption ID 1 Uses the relay agent first option suboption ID.
Relay Agent Option: Suboption ID 1 + Uses the relay agent first and second suboption IDs.
<Separator> + Suboption ID 2
MAC Address + <Separator> + Relay Uses the MAC Address and the relay agent first
Agent Option: Suboption ID 1 suboption ID.
MAC Address + <Separator> + Relay Uses the relay agent first option suboption ID.
Agent Option: Suboption ID 1 <Separator>
+ Suboption ID 2
68
BIG-IP Policy Enforcement Manager: Implementations
Format Description
TCL Expression Uses the TCL expression to format the subscriber
ID.
12. From the Authentication Settings list, select Enabled. Then, select the virtual server name from the
Authentication Virtual list. Select the User Name Format you want to implement.
The User Name Format has the same options as the Subscriber ID Format, in the Subscriber
Discovery setting.
13. Click Finished.
The Policy Enforcement Manager creates a listener.
When you create a new DHCPv4 discover virtual, the Policy Enforcement Manager™ also creates a
corresponding DHCPv4 profile.
69
Configuring Subscriber Discovery based on DHCP
15. From the Subscriber Discovery list, select Enabled. Then, for the Subscriber ID Format setting,
select the format you want to implement.
Format Description
MAC Address Uses the subscriber ID as the MAC address through
which the subscriber ID goes through.
Relay Agent Option: Suboption ID 1 Uses the relay agent first option suboption ID.
Relay Agent Option: Suboption ID 1 + Uses the relay agent first and second suboption IDs.
<Separator> + Suboption ID 2
MAC Address + <Separator> + Relay Uses the MAC Address and the relay agent first
Agent Option: Suboption ID 1 suboption ID.
MAC Address + <Separator> + Relay Uses the relay agent first option suboption ID.
Agent Option: Suboption ID 1 <Separator>
+ Suboption ID 2
TCL Expression Uses the TCL expression to format the subscriber
ID.
16. From the Authentication Settings list, select Enabled. Then, select the virtual server name from the
Authentication Virtual list. Select the User Name Format you want to implement.
The User Name Format has the same options as the Subscriber ID Format, in the Subscriber
Discovery setting.
17. Click Finished.
The DHCPv4 profile that you created can be chosen from the DHCPv4 profiles in Local Traffic >
Virtual Servers > Virtual Server List > New Virtual Server > , only if you choose DHCP as a virtual
type.
Tip: For DHCPv6 discovery virtual, the source and destination should be any (::/0).
The system will create a virtual server using the address or network you specify.
7. From the VLAN and Tunnel Traffic list, select Enabled on. Then, for the VLANs and Tunnels
setting, move the VLAN or VLANs on which you want to allow the virtual servers to share traffic
from the Available list to the Selected list.
8. For the VLANs and Tunnels setting, move the VLANs and tunnels that you want to monitor from
the Available list to the Selected list.
70
BIG-IP Policy Enforcement Manager: Implementations
9. For the DHCP Mode setting, select Relay or Forward to specify the mode in which the DHCP client
requests are sent.
10. For the Pool Member Configuration setting, add the DHCP virtual servers that are to be members of
the pool. Type the Member IP Address and Port number, then click Add.
11. From the Subscriber Discovery list, select Enabled. Then, for the Subscriber ID Format setting,
select the format you want to implement.
Format Description
MAC Address Uses the subscriber ID as the MAC address through which
the subscriber ID goes through.
MAC Address + <Separator> + Uses the MAC address and the remote ID relay agent option.
Option 37
MAC Address + <Separator>+ Uses the MAC address, the remote ID relay agent option and
Option 37 <Separator> + Option 38 the subscriber ID option.
MAC Address + <Separator> + Uses the MAC address and the subscriber ID option.
Option 38
Option 37 Uses the remote ID relay agent option.
Option 37 <Separator> + Option Uses the remote ID relay agent option and the subscriber ID
38: option.
Option 38 Uses the subscriber ID option.
TCL Expression Uses the TCL expression to format the subscriber ID.
12. From the Authentication Settings list, select Enabled. Then, select the virtual server name from the
Authentication Virtual list. Select the User Name Format you want to implement.
The User Name Format has the same options as the Subscriber ID Format, in the Subscriber
Discovery setting.
When you create a new DHCPv6 discover virtual, the Policy Enforcement Manager™ also creates a
corresponding DHCP profile.
71
Configuring Subscriber Discovery based on DHCP
7. For the Max Hops setting, select the Custom check box to enable this option. Type the maximum
expected number of relay agents that the messages should pass through, before reaching the DHCPv4
server.
8. For the Default Lease Time setting, select the Custom check box to enable this option. Type the
time, in seconds, of the default value of the DHCPv4 lease time.
9. For the Transaction Timeout setting, select the Custom check box to enable this option. Type the
number of seconds, taken to internally process the messages.
10. If you want the DHCP module to insert option 37, for the Insert Remote ID (Option 37) setting,
select the Custom check box .
11. If you want the DHCP module to insert option 38, for the Insert Remote ID (Option 38) setting,
select the Custom check box to enable this option .
12. If you want the DHCP relay agent to remove option 37 from the server to client traffic, for the
Remove Subscriber Agent ID From Client Messages setting, select the Custom check box.
13. If you want the DHCP module to remove option 38 from the server to client traffic, for the Remove
Relay Agent ID From Client Messages setting, select the Custom check box.
14. From the Subscriber Discovery list, select Enabled. Then, for the Subscriber ID Format setting,
select the format you want to implement.
Format Description
MAC Address Uses the subscriber ID as the MAC address through which
the subscriber ID goes through.
MAC Address + <Separator> + Uses the MAC address and the remote ID relay agent option.
Option 37
MAC Address + <Separator>+ Uses the MAC address, the remote ID relay agent option and
Option 37 <Separator> + Option 38 the subscriber ID option.
MAC Address + <Separator> + Uses the MAC address and the subscriber ID option.
Option 38
Option 37 Uses the remote ID relay agent option.
Option 37 <Separator> + Option Uses the remote ID relay agent option and the subscriber ID
38: option.
Option 38 Uses the subscriber ID option.
TCL Expression Uses the TCL expression to format the subscriber ID.
15. From the Authentication Settings list, select Enabled. Then, select the virtual server name from the
Authentication Virtual list. Select the User Name Format you want to implement.
The User Name Format has the same options as the Subscriber ID Format, in the Subscriber
Discovery setting.
16. Click Finished.
The DHCPv6 profile that you created can be chosen from the DHCPv6 profiles in Local Traffic >
Virtual Servers > Virtual Server List > New Virtual Server > , only if you choose DHCP as a virtual
type.
72
BIG-IP Policy Enforcement Manager: Implementations
2. From the Subscriber Discovery Virtuals area, select RADIUS, and click Add.
The New RADIUS Discovery Virtual screen opens.
3. In the Name field, type a unique name for the RADIUS discovery virtual.
4. In the Description field, type a description of the listener.
5. For the Source setting, type the IP address or network from which the virtual server will accept
traffic.
6. In the Destination Address field, type the IP address of the virtual server. For example, 10.0.0.1 or
10.0.0.0/24.
Note: When you use an IPv4 address without specifying a prefix, the BIG-IP® system automatically
uses a /32 prefix.
Tip: You can use a catch-all virtual server (0.0.0.0) to specify all traffic that is delivered to the
BIG-IP® system. Configure the source and destination setting, during forwarding mode only. In the
relay mode, the client does not have an IP address and the DHCP provides the client with an IP
address.
The system will create a virtual server using the address or network you specify.
7. To use network address translation, from the Source Address Translation list, select Auto Map.
The system treats all of the self IP addresses as translation addresses.
8. From the VLAN and Tunnel Traffic list, select Enabled on. Then, for the VLANs and Tunnels
setting, move the VLAN or VLANs on which you want to allow the virtual servers to share traffic
from the Available list to the Selected list.
9. For the Pool Member Configuration setting, add the RADIUS discovery virtual servers that are to
be members of the pool. Type the Member IP Address and Port number, then click Add.
10. Click Finished.
The Policy Enforcement Manager creates a RADIUS virtual server, and displays in the subscriber
discovery list.
When you create a RADIUS discovery virtual for a subscriber, the Policy Enforcement Manager™ creates
a corresponding profile (Policy Enforcement > Listeners > Control Virtual Servers).
73
Configuring Subscriber Discovery based on DHCP
74
Configuring DHCP Lease Query in Subscriber
Management
Note: If BIG-IP system goes through a reboot, all PEM sessions, and related lease and subscriber
information are lost.
Note: When you use an IPv4 address without specifying a prefix, the BIG-IP® system automatically
uses a /32 prefix.
Tip: You can use a catch-all virtual server (0.0.0.0) to specify all traffic that is delivered to the
BIG-IP® system. Configure the source and destination setting, during forwarding mode only. In the
relay mode, the client does not have an IP address and the DHCP provides the client with an IP
address.
The system will create a virtual server using the address or network you specify.
Configuring DHCP Lease Query in Subscriber Management
11. For the Service Port setting, type or select the service port for the virtual server.
12. From the VLAN and Tunnel Traffic list, select Enabled on. Then, for the VLANs and Tunnels
setting, move the VLAN or VLANs on which you want to allow the virtual servers to share traffic
from the Available list to the Selected list.
13. For the VLANs and Tunnels setting, move the VLANs and tunnels that you want to monitor for
RADIUS traffic from the Available list to the Selected list.
14. From the Subscriber Management Profile list, select the subscriber management profile that you
created.
15. Click Finished.
The Policy Enforcement Manager creates a listener.
You have now configured DHCP Lease Query in the Policy Enforcement Manager™.
76
Usage Monitoring Over a Gx Interface
For example, a rule might collect session-based information about all traffic destined to a particular IP
address. The BIG-IP® system communicates with the PCRF and sends information about the subscribers
for whom reporting is enabled. You establish the connection to the PCRF by creating a listener with Gx
interface enabled.
Task summary
Creating a listener for subscriber discovery and policy provisioning
Creating a rule for usage monitoring
8. In the Origin Host field, type the fully qualified domain name of the PCRF or external policy server,
for example, ocs.xnet.com.
9. In the Origin Realm field, type the realm name or network in which the PCRF resides, for example,
xnet.com.
10. In the Destination Host field, type the destination host name of the PCRF or external policy server,
for example, pcrfdest.net.com.
11. In the Destination Realm field, type the realm name or network of the PCRF, for example, net.com.
12. For the Pool Member Configuration setting, add the PCRF servers that are to be members of the Gx
endpoint pool. Type the Member IP Address and Port number, then click Add.
13. In the Message Retransmit Delay field, type the number of milliseconds to wait before
retransmitting unanswered messages in case of failure from the BIG-IP system to the PCRF over the
Gx interface. The default value is 1500.
14. In the Message Max Retransmit field, type the maximum number of times that messages can be
retransmitted from the BIG-IP system to the PCRF. The default value is 2.
15. In the Fatal Grace Time field, type the time period in seconds that a diameter connection can remain
disconnected before the system terminates all sessions associated with that diameter endpoint. The
default value is 500.
16. Click Finished.
The Policy Enforcement Manager creates a listener.
When you create a listener, the Policy Enforcement Manager™ also creates virtual servers for each type of
traffic (TCP, UDP, or both), and a virtual server for HTTP traffic. The system sets up classification and
assigns the appropriate policy enforcement profile to the virtual servers. The system also creates a virtual
server for the Gx interface with a diameter endpoint profile. If you are connecting to a RADIUS
authentication server, a virtual server for RADIUS is also added.
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. Use the Classification, URL, Flow, and Custom Criteria tabs to identify the traffic that you want to be
affected by this rule.
7. From the Usage Reporting list, select Enabled.
78
BIG-IP Policy Enforcement Manager: Implementations
79
Usage Monitoring Over a Gx Interface
80
Configuring Global Application Policies with Bandwidth
Control
In the figure, three subscribers have individual policies that allow P2P bandwidths of up to 4 Mbps each.
The maximum bandwidth for all P2P traffic is limited to 10 Mbps (specified as the maximum rate in a
static bandwidth controller). If all were sending P2P traffic, they would all get less bandwidth if you
apply a global enforcement policy that enforces bandwidth control.
For this implementation, you create the bandwidth controller and the enforcement policy on the BIG-IP®
system. In the enforcement policy, a rule applies bandwidth control to P2P traffic. From the listener, you
apply the policy globally to all traffic.
Task Summary
Creating VLANs
Creating a static bandwidth control policy
Creating an enforcement policy
Creating a rule for bandwidth control
Creating a listener: example
Creating VLANs
VLANs represent a collection of hosts that can share network resources, regardless of their physical
location on the network. For Policy Enforcement Manager™, you typically create VLANs for the
subscriber traffic coming in to the BIG-IP® system, for traffic going out to the network, and if using w-
steering with service chains, you need two VLANs for each value added service to be fully transparent.
Configuring Global Application Policies with Bandwidth Control
82
BIG-IP Policy Enforcement Manager: Implementations
Tip: When creating policies you plan to apply globally or to unknown subscribers, it is a good idea to
include the word global or unknown in the policy name to distinguish these from other subscriber
policies.
4. From the Transactional list, select Enabled if you want the BIG-IP system to allow policy
enforcement on each HTTP transaction.
5. Click Finished.
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. In the Classification setting, filter the application traffic to which you want to apply bandwidth
control.
83
Configuring Global Application Policies with Bandwidth Control
Note: When you use an IPv4 address without specifying a prefix, the BIG-IP® system automatically
uses a /32 prefix.
Tip: You can use a catch-all virtual server (0.0.0.0) to specify all traffic that is delivered to the
BIG-IP® system. Configure the source and destination setting, during forwarding mode only. In the
relay mode, the client does not have an IP address and the DHCP provides the client with an IP
address.
The system will create a virtual server using the address or network you specify.
6. For the Service Port setting, type or select the service port for the virtual server.
7. Subscriber provisioning using RADIUS is enabled by default. If your system is using RADIUS for
snooping subscriber identity, you need to specify VLANs and tunnels. If you are not using RADIUS,
you need to disable it.
• For the VLANs and Tunnels setting, move the VLANs and tunnels that you want to monitor for
RADIUS traffic from the Available list to the Selected list.
• If you do not want to use RADIUS, from the Subscriber Identity Collection list, select Disabled.
8. In the Policy Provisioning area, for Global Policy, move the enforcement policy you created for
bandwidth control to High Precedence.
The system applies the policy with bandwidth control to all traffic.
9. Click Finished.
The Policy Enforcement Manager creates a listener.
When you create a listener, the Policy Enforcement Manager™ also creates virtual servers for each type of
traffic (TCP, UDP, or both), and a virtual server for HTTP traffic. The system sets up classification and
84
BIG-IP Policy Enforcement Manager: Implementations
assigns the appropriate policy enforcement profile to the virtual servers. If you are connecting to a
RADIUS authentication server, a virtual server for RADIUS is also added.
Now you can send traffic through the network. All traffic classified as P2P traffic is limited to the
Maximum Rate specified in the static bandwidth control policy. Once the maximum rate is reached, no
additional P2P traffic is allowed on the network.
85
Configuring Global Application Policies with Bandwidth Control
86
Managaing Traffic with Bandwidth Controllers
Important: Applying a bandwidth controller policy to a route domain affects all traffic transmitted by the
BIG-IP system to VLANs in the route domain, including health monitors and DNS queries.
Task list
Creating a static bandwidth control policy
Adding a static bandwidth control policy to a virtual server
Managaing Traffic with Bandwidth Controllers
88
BIG-IP Policy Enforcement Manager: Implementations
You can also configure a dynamic bandwidth control policy to mark packets that exceed the maximum
per-user rate for a specified session. The WAN router typically handles the marked packets. When
marking is enabled, enforcement is implicitly disabled. You configure marking by using the IP Marking
(TOS/DSCP) or L2 Marking (802.1p) setting. For example, a common use of QoS marking is for Voice
over IP (VoIP) traffic. VoIP is usually assigned to the Expedited Forwarding (EF) class by using the
DSCP value of 46, thus prioritized according to importance and sensitivity to loss/latency. You can mark
packets per policy or per category (within a policy). Category marking supersedes policy marking.
The bandwidth controller is only an enforcer. For a dynamic bandwidth control policy, you also can use a
virtual server (through iRules®), Policy Enforcement Manager™, or Access Policy Manager® to identify
users and apply dynamic bandwidth control policies to traffic.
89
Managaing Traffic with Bandwidth Controllers
This procedure describes the steps for attaching a dynamic bandwidth control policy to a traffic flow, and
then applying the policy to traffic, using a virtual server. For information about using Policy Enforcement
Manager™ to implement the policy, refer to the F5 documentation for Policy Enforcement Manager.
Task list
Creating a dynamic bandwidth control policy
Adding categories to a dynamic bandwidth control policy
Creating an iRule for a dynamic bandwidth control policy
Adding a dynamic bandwidth control policy to a virtual server
90
BIG-IP Policy Enforcement Manager: Implementations
Note: For complete and detailed information iRules syntax, see the F5 Networks DevCentral web site
(http://devcentral.f5.com).
when CLIENT_ACCEPTED {
set mycookie [IP::remote_addr]:[TCP::remote_port]
BWC::policy attach dynamic_bwc_policy200 $mycookie
}
5. Click Finished.
The new iRule appears in the list of iRules on the system.
91
Managaing Traffic with Bandwidth Controllers
You have now identified the user for a dynamic bandwidth control policy.
You must then apply the iRule to the virtual server that intercepts the traffic you want to manage.
92
Enforcing Bandwidth Control Provisioned by PCRF
Task Summary
Creating a dynamic bandwidth control policy for PCRF
Creating a listener for subscriber discovery and policy provisioning
Note: After you finish configuring the bandwidth controller, the Bandwidth Controllers screen opens.
10. Click the Bandwidth Control policy name, that you configured.
Enforcing Bandwidth Control Provisioned by PCRF
Note: Use the Categories setting only if you have not set values for the IP Marking (TOS/DSCP) or
the L2 Marking (802.1p) setting.
12. In the Category Name field, type a descriptive name for the category.
13. In the Max Category Rate field, type a value to indicate the most bandwidth that this category of
traffic can use, and select the unit of measure from the list, or select % and type a percentage from 1
to 100.
If you specify a rate, the number must be in the range from 500 Kbps to the rate specified for the
Maximum Rate Per User setting. A percentage indicates that this category can use up to the
specified percentage of the maximum per-user rate. These values are upper limits (not minimum or
guaranteed), so the sum can exceed the value you specified for the Maximum Rate Per User setting.
14. From the IP Marking (TOS/DSCP) list, select Specify and type a number between 0 and 63 to
assign a Type of Service (ToS) level to packets that exceed the Max Category Rate.
If you do not want to set a ToS level, maintain the default setting, Pass Through.
15. From the L2 Marking (802.1p) list, select Specify and type a number between 0 and 7 to assign a
Quality of Service (QoS) level to packets that exceed the Max Category Rate.
If you do not want to set a QoS level, maintain the default setting, Pass Through.
16. Click Finished.
If this is the first bandwidth control policy created on a BIG-IP® device, the system also creates a default
static bandwidth control policy named default-bwc-policy to handle any traffic that is not included
in the policy you created. If you delete all bandwidth controllers, this policy is also deleted.
For PEM to enforce bandwidth control, you need to create a listener (Policy Provisioning and Online
Charging Virtuals) with a Gx interface configured.
94
BIG-IP Policy Enforcement Manager: Implementations
9. In the Origin Realm field, type the realm name or network in which the PCRF resides, for example,
xnet.com.
10. In the Destination Host field, type the destination host name of the PCRF or external policy server,
for example, pcrfdest.net.com.
11. In the Destination Realm field, type the realm name or network of the PCRF, for example, net.com.
12. For the Pool Member Configuration setting, add the PCRF servers that are to be members of the Gx
endpoint pool. Type the Member IP Address and Port number, then click Add.
13. In the Message Retransmit Delay field, type the number of milliseconds to wait before
retransmitting unanswered messages in case of failure from the BIG-IP system to the PCRF over the
Gx interface. The default value is 1500.
14. In the Message Max Retransmit field, type the maximum number of times that messages can be
retransmitted from the BIG-IP system to the PCRF. The default value is 2.
15. In the Fatal Grace Time field, type the time period in seconds that a diameter connection can remain
disconnected before the system terminates all sessions associated with that diameter endpoint. The
default value is 500.
16. Click Finished.
The Policy Enforcement Manager creates a listener.
When you create a listener, the Policy Enforcement Manager™ also creates virtual servers for each type of
traffic (TCP, UDP, or both), and a virtual server for HTTP traffic. The system sets up classification and
assigns the appropriate policy enforcement profile to the virtual servers. The system also creates a virtual
server for the Gx interface with a diameter endpoint profile. If you are connecting to a RADIUS
authentication server, a virtual server for RADIUS is also added.
Implementation result
When traffic flows through the BIG-IP® system, the system limits the aggregated bandwidth for all
subscribers to the Maximum Rate specified in the dynamic_spm_bwc_policy bandwidth control
policy. The PCRF provides the Maximum Rate Per User for each subscriber, overriding the value in the
bandwidth control policy. Policy Enforcement Manager™ restricts subscribers to the maximum user rate,
and bandwidth is spread among subscribers fairly, on a best effort basis.
95
Enforcing Bandwidth Control Provisioned by PCRF
96
Configuring Tiered Services with Bandwidth Control
Task Summary
Creating dynamic bandwidth control policies for tiered services
Creating enforcement policies for three tiers
Creating the rules for tiered bandwidth control
Creating a listener for subscriber discovery with RADIUS and policy provisioning with PCRF
6. In the Maximum Rate Per User field, type a number and select the unit of measure relative to the
tier of service. For example, use the following values:
• For gold-bwc, specify 8 Mbps.
• For silver-bwc, specify 4 Mbps.
• For bronze-bwc, specify 2 Mbps.
7. Leave the IP Type of Service and Link Quality of Service values set to Pass Through, the default
value.
8. In the Categories field for each bandwidth controller, add three categories of traffic: P2P, Web, and
Audio-video.
• For gold-bwc, set P2P to 20%, set Web to 70%, and set Audio-video to 40%.
• For silver-bwc, set P2P to 20%, set Web to 60%, and set Audio-video to 30%.
• For bronze-bwc, set P2P to 20%, set Web to 50%, and set Audio-video to 20%.
In the rule for the policy, different types of traffic, P2P, web, or audio-video traffic is limited to a
smaller percentage of the total bandwidth for all subscribers who use that policy.
9. Click Finished.
If this is the first bandwidth control policy created on a BIG-IP® device, the system also creates a default
static bandwidth control policy named default-bwc-policy in the Common partition to handle any
traffic that is not included in the policy you created. If you delete all bandwidth controllers, this policy is
also deleted.
For PEM to enforce bandwidth control, you need to create enforcement policies with rules that refer to
the bandwidth controller.
98
BIG-IP Policy Enforcement Manager: Implementations
The gold, silver, and bronze enforcement policies each have three rules called P2P, Web, and Audio-
video. Each of the rules in the gold policy connects to the gold-bwc bandwidth controller; rules in the
silver policy connect to the silver-bwc bandwidth controller and; rules in the bronze policy connect to the
bronze-bwc policy.
99
Configuring Tiered Services with Bandwidth Control
Creating a listener for subscriber discovery with RADIUS and policy provisioning with
PCRF
You create a listener to specify how to handle traffic for policy enforcement. Creating a listener does
preliminary setup tasks on the BIG-IP® system for application visibility, intelligent steering, bandwidth
management, and reporting. You can also connect with a Policy and Charging Rules Function (PCRF)
over a Gx interface.
1. On the Main tab, click Policy Enforcement > Data Plane Listeners.
The Date Plane Listeners screen opens.
2. In the Policy Provisioning and Online Charging Virtuals area, click Add.
The New Configure Diameter Endpoint Provisioning and Online Charging screen opens.
3. In the Name field, type a unique name for the listener.
4. In the Destination Address field, type the IP address of the virtual server. For example, 10.0.0.1 or
10.0.0.0/24.
Note: When you use an IPv4 address without specifying a prefix, the BIG-IP® system automatically
uses a /32 prefix.
Tip: You can use a catch-all virtual server (0.0.0.0) to specify all traffic that is delivered to the
BIG-IP® system. Configure the source and destination setting, during forwarding mode only. In the
relay mode, the client does not have an IP address and the DHCP provides the client with an IP
address.
The system will create a virtual server using the address or network you specify.
5. For the Service Port setting, type or select the service port for the virtual server.
6. From the Protocol list, select the protocol of the traffic for which to deploy enforcement policies
(TCP, UDP, or TCP and UDP).
The system will create a virtual server for each protocol specified.
7. To use network address translation, from the Source Address Translation list, select Auto Map.
The system treats all of the self IP addresses as translation addresses.
8. For the VLANs and Tunnels setting, move the VLANs and tunnels that you want to monitor from
the Available list to the Selected list.
9. For subscriber provisioning using RADIUS, ensure that Subscriber Identity Collection is set to
RADIUS.
10. For the VLANs and Tunnels setting, move the VLANs and tunnels that you want to monitor for
RADIUS traffic from the Available list to the Selected list.
11. For the tiered services example, do not assign global policies.
12. To connect to a PCRF, from the Diameter Endpoint list, select Enabled and select Gx or Sdfrom the
Supported Apps options.
13. In the Origin Host field, type the fully qualified domain name of the PCRF or external policy server,
for example, ocs.xnet.com.
14. In the Origin Realm field, type the realm name or network in which the PCRF resides, for example,
xnet.com.
15. In the Destination Host field, type the destination host name of the PCRF or external policy server,
for example, pcrfdest.net.com.
16. In the Destination Realm field, type the realm name or network of the PCRF, for example, net.com.
17. For the Pool Member Configuration setting, add the PCRF servers that are to be members of the Gx
endpoint pool. Type the Member IP Address and Port number, then click Add.
100
BIG-IP Policy Enforcement Manager: Implementations
18. In the Message Retransmit Delay field, type the number of milliseconds to wait before
retransmitting unanswered messages in case of failure from the BIG-IP system to the PCRF over the
Gx interface. The default value is 1500.
19. In the Message Max Retransmit field, type the maximum number of times that messages can be
retransmitted from the BIG-IP system to the PCRF. The default value is 2.
20. In the Fatal Grace Time field, type the time period in seconds that a diameter connection can remain
disconnected before the system terminates all sessions associated with that diameter endpoint. The
default value is 500.
21. Click Finished.
The Policy Enforcement Manager creates a listener.
When you create a listener, the Policy Enforcement Manager™ also creates virtual servers for each type of
traffic (TCP, UDP, or both), and a virtual server for HTTP traffic. The system sets up classification and
assigns the appropriate policy enforcement profile to the virtual servers. The system also creates a virtual
server for the Gx interface with a diameter endpoint profile. If you are connecting to a RADIUS
authentication server, a virtual server for RADIUS is also added.
Now you can send traffic through the network. As network traffic moves through the BIG-IP system, the
system handles policy enforcement.
Implementation result
When traffic flows through a BIG-IP® system, the system limits the aggregated bandwidth for all
subscribers having a gold, silver, or bronze policy. Subscribers with a gold policy can use more of the
total bandwidth than silver or bronze subscribers. Further, subscriber traffic in any of the tiers that is
classified as audio-video, web, or P2P is limited to a percentage of the total bandwidth allowed for that
tier.
For example, if a subscriber has a silver subscription level and PEM classifies their traffic as Web, the
traffic is limited to 60% of the Maximum Rate specified in the silver-bwc bandwidth controller (4
Mbps). This leaves 2.4 Mbps as the maximum bandwidth for all web traffic of silver tier subscribers.
101
Configuring Tiered Services with Bandwidth Control
102
Configuring Service Chains
Task Summary
Creating a ICAP profile for policy enforcement
Creating a Request Adapt profile
Creating a Response Adapt profile
Creating an internal virtual server for ICAP server
Creating a pool
Creating endpoints for service chains
Creating dynamic service chains
Creating an enforcement policy
Configuring steering action policy
Adding rules to an enforcement policy
Creating a rule for forwarding traffic
Creating a data plane virtual group
Configuring Service Chains
104
BIG-IP Policy Enforcement Manager: Implementations
of profile instructs the HTTP virtual server to send an HTTP request to a named internal virtual server for
possible request modification.
1. On the Main tab, click Local Traffic > Profiles > Services > Request Adapt.
2. Click Create.
3. In the Name field, type a unique name for the profile.
4. For the Parent Profile setting, retain the default value, requestadapt.
5. On the right-side of the screen, select the Custom check box.
6. Disable the setting by clearing the Enabled check box.
When you clear the Enabled check box, Policy Enforcement Manager™ controls this based on the
policy.
7. In the Preview Size field, type a numeric value.
This specifies the maximum size of the preview buffer. This buffer holds a copy of the HTTP request
header and the data sent to the internal virtual server, in case the adaptation server reports that no
adaptation is needed. Setting the preview size to 0 disables buffering of the request and should only
be done if the adaptation server always returns a modified HTTP request or the original HTTP
request.
8. For the Allow HTTP 1.0 setting, select the Enabled check box.
9. Click Finished.
After you perform this task, the BIG-IP® system contains a Request Adapt profile that a standard HTTP
virtual server can use to forward an HTTP request to an internal virtual server for ICAP traffic. You need
to attach a Request Adapt profile to a standard HTTP virtual server to forward the HTTP requests.
105
Configuring Service Chains
Note: Setting OneConnect Profile to ICAP virtual server, is highly recomended when configuring ICAP virtual.
10. From the Default Pool list, select the pool of ICAP servers that you previously created.
11. Click Finished.
After you create the virtual server, the BIG-IP® system can forward an HTTP request or response to a
pool of ICAP servers before sending the request or response to the client or web server, respectively.
Creating a pool
You can create a pool of servers that you can group together to receive and process traffic.
1. On the Main tab, click Local Traffic > Pools.
The Pool List screen opens.
2. Click Create.
The New Pool screen opens.
3. In the Name field, type a unique name for the pool.
4. Using the New Members setting, add each resource that you want to include in the pool:
a) (Optional) In the Node Name field, type a name for the node portion of the pool member.
b) In the Address field, type an IP address.
c) In the Service Port field, type a port number, or select a service name from the list.
d) (Optional) In the Priority field, type a priority number.
e) Click Add.
5. Click Finished.
6. Repeat these steps for each pool you want to create.
The new pool appears in the Pools list.
106
BIG-IP Policy Enforcement Manager: Implementations
If you plan to set up a service chain, you need to create one or more endpoints that specify the locations
of the value-added services to which to send the traffic.
1. On the Main tab, click Policy Enforcement > Forwarding > Endpoints.
The Endpoints screen opens.
2. Click Create.
The New Endpoint screen opens.
3. In the Name field, type a name for the endpoint.
4. From the Pool list, select the pool to which you want to steer a particular type of traffic.
5. Use the default values for the other fields.
6. Click Finished.
The endpoint you created is on the endpoint list.
You link the endpoints together by creating a service chain.
Note: If you want to use steering policy, you must define endpoint in service chain.
1. On the Main tab, click Policy Enforcement > Forwarding > Service Chains.
The Service Chains screen opens.
2. Click Create
The New Service Chains screen opens.
3. In the Name field, type a name for the service chain.
4. In the Service Chain List setting, add the endpoints to the service chain. For each place you want to
send the traffic, specify the following information:
a) From the Service Endpoint Name list, type the name of the service endpoint where the traffic is
going to.
b) From the VLAN list, select the name of the VLAN where the traffic is coming from.
Note: Your first service chain should have subscriber VLAN in the VLAN field.
c) From the Policy list, select the name of the steering policy.
Note: If all the service endpoints do not have a steering policy, the service chain is static.
Important: If the policy defining the steering does not match the policy set in the service chain,
then the service chain is not processed.
d) From the Forwarding Endpoint list, select the name of the endpoint to which you send traffic.
When you configure a new forwarding endpoint (Policy Enforcement > Forwarding >
Endpoints), set Address Translation and Port Translation as Disabled.
107
Configuring Service Chains
Note: You need to always configure a default forwarding endpoint or else the flow will exit the
service chain and get skipped. If you are in the final leg, then configure without default.
Important: When you use ICAP service, you cannot have a ICAP and a forwarding endpoint on
the same service endpoint.
e) From the Service Option list, select the service option in case the service endpoint is not
reachable. Select Optional if you want to skip the service endpoint. Select Mandatory if you
want all traffic flows dropped.
Note: To use dynamic service chain, select Optional. If service endpoint is not available and set to
mandatory, you cannot steer policies.
Note: The Service Option parameter works only if the right endpoint has a monitor set in the
pool. For example, set gateway ICMP to the pool. Otherwise, traffic is dropped even if Optional is
set.
f) From the Internal Virtual list, select the internal ICAP virtual server.
Note: Select the Internal Virtual to configure the ICAP Type setting.
6. Click Finished.
Note: If steering action is applied after the ICAP request, service endpoint with forwarding endpoint
should have the same VLAN configured as the service endpoint with ICAP enabled.
You can direct traffic to the service chain you created in the policy rules in an enforcement policy.
Tip: When creating policies you plan to apply globally or to unknown subscribers, it is a good idea to
include the word global or unknown in the policy name to distinguish these from other subscriber
policies.
4. From the Transactional list, select Enabled if you want the BIG-IP system to allow policy
enforcement on each HTTP transaction.
108
BIG-IP Policy Enforcement Manager: Implementations
5. Click Finished.
Note: If the steering action is enabled, steering policy is evaluated based on the VLAN flow. If no
steering policy is configured, then the default endpoint is the next service endpoint.
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. From the Modify Header list, select Enabled, to modify the HTTP request header.
More modify header configuration options display.
7. To modify the HTTP request header, select the action you want to implement.
• Select Insert String Value to insert a stringvalue that you have specified before.
• Select Insert Value from Script to specify that the BIG-IP system can insert value received from
the TCL expression.
• Select Remove to remove the string value that you previously created.
8. In the Header Name field, type a header name.
9. In the String Value field, type a string value for the header.
10. Click Finished.
You can add more rules to an enforcement policy in addition to configuring HTTP header action.
109
Configuring Service Chains
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. Use the Classification, URL, Flow, and Custom Criteria tabs to identify the traffic that you want to be
affected by this rule.
7. From the Modify Header list, select Enabled, to modify the HTTP request header.
More modify header configuration options display.
8. Use the Reporting, Quota, Forwarding, Modify Header or QoS areas to specify what you want to do
with the traffic that you are classifying or specify what actions you want to apply to the traffic.
Other tasks describe how to do this in detail.
If you leave Gate Status enabled (default) and specify no other actions, the system stores traffic
classification statistics on the BIG-IP system, and forwards the traffic to its destination without any
further action.
9. From the Congestion Detection list, select Enable, to congestion detection in the Radio Access
Network.
a) In the Threshold field, type the lower threshold bandwidth for a session. The default value is
1000kbs.
b) ForDestination list, select the publisher name from the HSL publisher drop-down list.
The state of congestion detection is now controlled by policy application, and different subsets of
subscribers can have different settings. This enables congestion-detection for specific types of
applications as it pairs with specific policy rule conditions.
10. Click Finished.
11. Repeat steps 3-8 to create as many rules as needed to handle the traffic you are interested in.
The enforcement policy includes the rules with the conditions and actions you added.
Now you need to associate the enforcement policy with the virtual server (or servers) to which traffic is
directed.
110
BIG-IP Policy Enforcement Manager: Implementations
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
6. Use the Classification, URL, Flow, and Custom Criteria tabs to identify the traffic that you want to be
affected by this rule.
7. In the Gate area, for Gate Status, select Enabled.
Options provide several ways to forward the traffic.
8. In the Forwarding area, for HTTP Redirect, select Enabled, and type the URL.
9. From the Forwarding list, select an option where you would like to forward the traffic.
Options Description
Route to Network The traffic flow is forwarded to the default destination.
Forwarding to Endpoint The flow is steered to a different destination and you can select
one of the endpoints.
Forward to ICAP virtual The flow is forwarded to the ICAP virtual server.
Server
10. From the Forwarding Fallback Action list, select Drop or Continue to specify if the connection can
remain unchanged or should be dropped if the forwarding action fails.
11. From the ICAP Virtual Server list, select an internal virtual server that you have created, or click
Create to create a new internal virtual server.
12. From the ICAP Type list, select an ICAP adaptation type.
• Select Request to send a portion of the request to the ICAP server.
• Select Response to receive a portion of the response from the ICAP server.
• Select Request and Response to have both types of adaptation.
13. From the Service Chain list, select Create to direct traffic to more than one location (such as value-
added services).
14. Click Finished.
You have created a rule that forwards traffic.
111
Configuring Service Chains
1. On the Main tab, click Policy Enforcement > Data Plane Listeners.
The Date Plane Listeners screen opens.
2. Click Add Group.
The New Virtual Group screen opens.
3. In the Name field, type a unique name for the listener.
4. In the Destination Address field, type the IP address of the virtual server. For example, 10.0.0.1 or
10.0.0.0/24.
Note: When you use an IPv4 address without specifying a prefix, the BIG-IP® system automatically
uses a /32 prefix.
Tip: You can use a catch-all virtual server (0.0.0.0) to specify all traffic that is delivered to the
BIG-IP® system. Configure the source and destination setting, during forwarding mode only. In the
relay mode, the client does not have an IP address and the DHCP provides the client with an IP
address.
The system will create a virtual server using the address or network you specify.
5. For the Service Port setting, type or select the service port for the virtual server.
6. From the VLAN and Tunnel Traffic list, select Enabled on. Then, for the VLANs and Tunnels
setting, move the VLAN or VLANs on which you want to allow the virtual servers to share traffic
from the Available list to the Selected list.
7. For the VLANs and Tunnels setting, move the VLANs and tunnels that you want to monitor from
the Available list to the Selected list.
8. In the Policy Provisioning area, select enforcement policies to apply to the traffic.
a) For Global Policy, move policies to apply to all subscribers to High Precedence or Low
Precedence.
Note: For URL categorization to take effect, you need to associate the enforcement policy with a
classification profile.
b) For Unknown Subscriber Policy, move policies to use if the subscriber is unknown to Selected.
The system applies the global policy to all subscribers in parallel with the subscriber policies, and
must be configured with unknown subscriber policy. High-precedence global policies override
conflicting subscriber policies, and low-precedence policies are overridden by conflicting subscriber
policies.
9. Click Finished.
The Policy Enforcement Manager creates a listener.
When you create a listener, Policy Enforcement Manager™ also creates virtual servers for each type of
traffic (TCP, UDP, or both and IP), and a virtual server for HTTP traffic. The system sets up classification
and assigns the appropriate policy enforcement profile to the virtual servers. If you are connecting to a
RADIUS authentication server, a virtual server for RADIUS is also added.
Now you can send traffic through the network. As network traffic moves through the BIG-IP® system,
the system classifies the traffic, and if you have developed policies, the system performs the actions
specified by the enforcement policy rules.
112
Provisioning Dynamic Subscribers
Note: When you use an IPv4 address without specifying a prefix, the BIG-IP® system automatically
uses a /32 prefix.
Tip: You can use a catch-all virtual server (0.0.0.0) to specify all traffic that is delivered to the
BIG-IP® system. Configure the source and destination setting, during forwarding mode only. In the
relay mode, the client does not have an IP address and the DHCP provides the client with an IP
address.
The system will create a virtual server using the address or network you specify.
6. For the Service Port setting, type or select the service port for the virtual server.
7. From the Protocol list, select the protocol of the traffic for which to deploy enforcement policies
(TCP, UDP, or TCP and UDP).
The system will create a virtual server for each protocol specified.
Provisioning Dynamic Subscribers
8. To use network address translation, from the Source Address Translation list, select Auto Map.
The system treats all of the self IP addresses as translation addresses.
9. For the VLANs and Tunnels setting, move the VLANs and tunnels that you want to monitor from
the Available list to the Selected list.
10. For the VLANs and Tunnels setting, move the VLANs and tunnels that you want to monitor for
RADIUS traffic from the Available list to the Selected list.
11. In the Policy Provisioning area, select enforcement policies to apply to the traffic.
a) For Global Policy, move policies to apply to all subscribers to High Precedence or Low
Precedence.
Note: For URL categorization to take effect, you need to associate the enforcement policy with a
classification profile.
b) For Unknown Subscriber Policy, move policies to use if the subscriber is unknown to Selected.
The system applies the global policy to all subscribers in parallel with the subscriber policies, and
must be configured with unknown subscriber policy. High-precedence global policies override
conflicting subscriber policies, and low-precedence policies are overridden by conflicting subscriber
policies.
When you create a listener, the Policy Enforcement Manager® also creates virtual servers for each type of
traffic (TCP, UDP, or both), and a virtual server for the Gx interface. The system also creates a virtual
server to handle HTTP traffic. The system assigns the appropriate classification and policy enforcement
profiles to the virtual servers. If you are connecting to a RADIUS authentication server, a virtual server
for RADIUS is also added.
114
Provisioning Static Subscribers
Tip: Assigning the subscriber IP addresses ensures that the subscriber gets the entitled service faster.
6. In the Policies setting, select at least one enforcement policy from the Available list and move it to
the Selected list.
The selected policy is the one that the system enforces for the subscriber you are adding.
Provisioning Static Subscribers
Note: You can assign a transactional policy to an active subscriber if you have created a
transactional policy with the transactional reporting rule action.
7. Click Finished.
Policy Enforcement Manager creates a static subscriber.
When the subscriber accesses the network through the BIG-IP system, Policy Enforcement Manager
applies the policy you assigned to the subscriber traffic.
SubscriberId,SubscriberIdType,NumOfIPs[,IP_i]*[,Policy_i]+
subscriber ID
A unique identifier for the subscriber that depends on the subscriber ID type.
subscriber ID type
The format of the subscriber ID. This field is optional, but the comma is required. If you omit
subscriber ID type, the system assigns the default value of IMSI (International Mobile Subscriber
Identity).
subscriber IP
The IP address of the subscriber. This field is optional, but the comma is required.
subscriber IP list
The list of subscribers. This field is optional, but the comma is required.
policy_1,policy_2,policy_n
One policy or more policies assigned to the subscriber. Multiple policies must be separated by
commas.
Note: To allow multiple IPs you need to change the DB variable (tmm.pem.session.ip.addr.max).
For example:
2083003251,private,2,40.0.1.0,40.0.1.1,policy1,policy2
You must include Subscriber ID and at least one policy enforcement policy for each subscriber. You need
to include the comma for missing fields. Do not include spaces between values. The policies listed must
be included on the policies list in Policy Enforcement > Policies, and be provisioned using a listener or a
policy enforcement profile.
For example, to specify subscriber 2083003252 in IMSI format with a gold policy, you can leave out the
subscriber IP address and include one policy:
2083003252,imsi,0,policy1
116
BIG-IP Policy Enforcement Manager: Implementations
117
Provisioning Static Subscribers
118
Configuring PEM Sessions
Session creation
The PEM profile controls creation of sessions for traffic originated on Internet side.
Flow termination
The PEM global option controls flow termination on session delete.
120
About Subscriber and Policy Provisioning
Task summary
Configuring RADIUS in PEM profile
Configuring RADIUS AVP in PEM profile
Configuring RADIUS message
Configuring Gx in PEM profile
Configuring Gx message
Configuring Subscriber Attributes in PEM profile
Configuring Diameter AVP in PEM profile
122
BIG-IP Policy Enforcement Manager: Implementations
123
About Subscriber and Policy Provisioning
Configuring Gx message
You can configure the Gx message in the Policy Enforcement Manager. The message is defined as
RADIUS accounting on the ingress direction.
1. In the Name field, type a unique name for the protocol.
2. From the Direction list, in the AVP List setting, select Any, In or Out to process the radius message
in both ingress and egress, ingress or egress direction respectively.
3. From the Message Type list, select the message type.
4. From the AVP List setting, apply mapping of Diameter AVPs to subscriber session attribute for
specific Gx message, by configuring the following:
• In the AVP Name field, type the name of the application service to which the AVP belongs.
• In the Default field, type the diameter AVP default value.
• From the Protected Flag list, select Enabled to choose the value of the protected flag, in the
diameter AVP, when the message is inserted. This flag only applies to diameter AVP in outgoing
message.
124
BIG-IP Policy Enforcement Manager: Implementations
• From the Mandatory Flag list, select Enabled to choose the value of the mandatory flag, in the
diameter AVP, when the message is inserted. This flag only applies to diameter AVP in outgoing
message.
• From the Vendor-Specific Flag list, select Enabled to choose the value of the vendor-specific
flag, in the diameter AVP, when the message is inserted. This flag only applies to diameter AVP in
outgoing message.
• From the Diameter AVP list, select the name of a configured diameter AVP. The default value is
None.
• In the Parent Label field, type the name of a parent label which groups AVPs that can be
combined.
Note: The AVPs with the same parent-label are combined in the same grouped AVP.
• From the Subscriber Attribute list, select the name of a configured subscriber session attribute.
The default value is None.
• From the Include Interim Message list, select Enabled for the AVP to be included in the interim-
message (ccr-u only) updates which are generated if there is any change related to session
parameters.
5. Click Finished.
You have created a custom Gx message.
Note: The system provides a special handling for well-known subscriber attributes. Session reporting
records have the most well-known attributes by default.
8. Click Finished.
You have created a subscriber attribute in PEM profile.
125
About Subscriber and Policy Provisioning
126
Updating Signatures for Application Recognition
Task Summary
Scheduling automatic signature updates
128
Creating Custom Classifications
Note: You can update the library (so) and signature definitions for web traffic (cpm) with hitless upgrade
in Policy Enforcement Manager™ (PEM™).
Task summary
Determining and adjusting traffic classifications
Creating a category
Creating classification presets
Creating a custom URL database
Using iRules with classification categories and applications
Modifying iRule event for URL categories
Creating a category
On the BIG-IP® system, you can create customized categories for classifying traffic if the predefined
categories are not sufficient for your needs. For example, if you plan to create new application types
unique to your organization, you can create a category to group them together.
1. On the Main tab, click Traffic Intelligence > Applications > Application List.
The Applications screen displays a list of the supported classification categories.
2. Click Create.
The New Application screen opens.
Creating Custom Classifications
130
BIG-IP Policy Enforcement Manager: Implementations
Option Description
File Click the Browse button, and select the customdb file. The customdb file should be
present on your machine and not present on the BIG-IP system. The customdb file is a
CSV file of the format: URL/IPv4 [,cat1] [,cat2]...
Note: The non-IP URL should have an IANA-registered top level domain. The URL
category ID should be in the form of an integer, and the valid range is 24576 to 32767.
weather.gov, 28678
pconline.com.cn, 28679
kannadaprabha.com, 28680
yandex.ru, 28677, 28676, 28681
pitt.edu,28682
Note: Entries in feed lists must consist of all lowercase characters. Also, any entry of the
form www.tld or www.domain.com will not match.
FTP Type the ftp location and the User and Password.
HTTP Type the HTTP location and the User and Password.
HTTPS Type the HTTPS location and the User and Password.
8. In the Poll Interval field, type the time interval in hours at which the url needs to be polled.
9. Click Finished.
The category lookup is done in the custom database, and the URL list is loaded into the custom database
through file input. You can also perform URL categorization by looking up the server name indication
(SNI) in SSL traffic.
when HTTP_REQUEST {
if { [HTTP::header "Host"] contains "xxx" } {
CLASSIFY::application set xxx_app
}
}
}
For example, to perform an action (in this case, drop) on traffic classified as xxx_app, you can use
this iRule:
when CLASSIFICATION_DETECTED {
if { [CLASSIFICATION::APP == "xxx_app"]} {
131
Creating Custom Classifications
drop
}
}
For complete and detailed information about iRules syntax, see the F5 Networks DevCentral web site
http://devcentral.f5.com.
5. Click Finished.
After creating the iRules, you must assign them as resources for each relevant virtual server on the BIG-
IP® system.
You have modified an iRule event setting for an existing URL category.
132
BIG-IP Policy Enforcement Manager: Implementations
133
Creating Custom Classifications
134
Configuring PEM with Local Traffic Policies
Task Summary
About strategies for local traffic policy matching
About creating custom local traffic policy rules for CE profile
Creating custom local traffic policy for PEM
Creating custom local traffic policy rules for PEM
Creating a virtual server for SSL traffic policy enforcement
Associating a published local traffic policy with a virtual server
Creating custom local traffic policy for PEM
Note: In a best-match or first-match strategy, a rule without conditions becomes the default rule, when
the rule is the last entry in the Rules list.
Matching Description
strategy
all-match strategy An all-match strategy starts the actions for all rules in the Rules list that match.
Note: In an all-match strategy, when multiple rules match, but specify conflicting
actions, only the action of the best-match rule is implemented. A best-match rule
Configuring PEM with Local Traffic Policies
Matching Description
strategy
can be the lowest ordinal, the highest priority, or the first rule that matches in the
Rules list.
best-match strategy A best-match strategy selects and starts the actions of the rule in the Rules list
with the best match, as determined by the following factors.
1. A best-match strategy selects the rule with the most conditions, ignoring
details about the conditions.
2. If a rule with the most conditions is not determined, then the best-match
strategy selects the rule with the highest priority condition types. The best-
match strategy sorts the condition types, highest priority first, comparing one
at a time until a higher priority is found. For example, a priority sequence of
0,1,3,4,6 wins over 0,1,3,5,7 because 4 is a higher priority than 5.
3. If a rule with the highest priority condition types is not determined, then the
best-match strategy selects the rule with equal match types over other match
types, such as starts-with, ends-with, or contains, and processes according to
condition type priority.
4. If a rule of equal match types is not determined, then the best-match strategy
uses an ordinal (the precedence of the operand).
Note: In a best-match strategy, when multiple rules match and specify an action,
conflicting or otherwise, only the action of the best-match rule is implemented. A
best-match rule can be the lowest ordinal, the highest priority, or the first rule
that matches in the Rules list.
first-match strategy A first-match strategy starts the actions for the first rule in the Rules list that
matches.
Task Summary
136
BIG-IP Policy Enforcement Manager: Implementations
A and want to send traffic from company A's website, you can perform actions, such as bandwidth
control and disable Gate status from PEM. This is a rule that can be assigned to an existing policy.
1. On the Main tab, click Local Traffic > Policies.
For more information about local traffic policies, refer to BIG-IP® Local Traffic Manager™:
Implementations.
The Policy List screen opens.
2. Click create.
The New Policy List screen opens.
3. In the Policy Name field, type a unique name for the policy, for example companyA.
4. In the Description field, type descriptive text that identifies the policy definition.
5. From the Strategy list, select the action that is executed when there are multiple rules that match.
Rule Description
All Uses the first or best strategy to resolve the conflict of rule match.
Best Applies the actions of the rule specified in the list of defined strategies for the associated
policy.
First Applies the actions of only the first rule. This implies that the rule with the lowest
ordinal,highest priority or first in the list is executed.
6. From the Type list, select the Traffic Policy to create a custom signature.
7. Click Create Policy to create a policy that manages traffic assigned to a virtual server.
8. Click the down arrow for Save Draft. Select Save Draft Policy to save the policy as a draft or Save
and Publish policy to publish a policy and assign it to a virtual server.
You should be able to create a rule for the Draft Policies list.
9. Click the name of the draft policy you just created.
The Draft Policy screen opens.
10. From the Rules list, select Create.
The New Rule screen opens.
11. In the Name field, type a unique name for the rule.
12. In the Description field, type descriptive text that identifies the rule definition.
13. In Match all of the following conditions, click + and specify the conditions.
For example, select Client SSL, cipher, contains and type COMPAT:AES128-GCM-SHA256, request
14. Click Add.
15. In Do the following when the traffic is matched, click + and specify the actions:
For example, select Enable, cache, at request.
16. Click Save.
Now you have added a new rule to the existing policy. When you send traffic that matches the rule you
defined, you should be able to see the application or category you have configured.
137
Configuring PEM with Local Traffic Policies
4. In the Operands area, define the application traffic to which this rule applies. Specify these values and
use default values for the remainder.
a) From the Operand list, select http-host.
b) From the Event list, select request.
c) From the Selector list, select all.
d) From the Condition list, select ends-with.
e) Type the value; for example, f5.com.
f) Click Finished.
Now you have created a strategy list and changed how the system processes the operands by reordering
the list of definitions.
138
BIG-IP Policy Enforcement Manager: Implementations
5. For the Policies setting, select the local traffic policy you created from the Available list and move it
to the Enabled list.
6. Click Finished.
The published policy is associated with the virtual server.
139
Configuring PEM with Local Traffic Policies
140
Configuring Policy and RADIUS Updates
8. For the Content Insertion Options setting, in the Throttling fields, type the time used to set the
maximum wait time before Policy Enforcement Manager™ applies the insert action again on the same
subscriber.
142
Creating Custom TAC DB
144
Enforcing Policy and Classification on IP Protocols
Note: HTTP redirect is not supported. Based on the protocol, not all actions work and some traffic is not
steered.
Important: You can use SNAT, only when you forward ICMP and ICMPv6 traffic.
Note:
You will see multiple Any IP profiles in the list only if you have created the profiles earlier.
4. To specify the idle timeout, click Custom, select Specify, and type a value (in seconds). The idle time
out specifies the number of seconds for which a connection is idle before the connection is eligible for
deletion.
5. Click Finished.
Now you have created a new Any IP profile. You can view non-TCP and UDP traffic that passes through
the BIG-IP system (Statistics > Classification > Statistics).
Note:
You will see multiple Any IP profiles from the list only if you have created the profiles earlier.
5. Click Update.
Now you have updated the Any IP profile and attached it to the Any IP traffic.
Cloning Yes
BWC (both directions) Yes
L2 QoS markings (both Yes
directions)
Flow Reporting Yes
Session Reporting Yes
Gate status drop Yes
Quota Yes
HTTP-redirect No
Modify HTTP headers No
iRules CLIENT_DATA and CLIENT_ACCEPTED iRules only (like UDP filter).
146
Detecting Tethering, Device Operation System and Type
Task summary
Configuring device type, OS, and tethering
Configuring PEM policy action with tethering
Creating a high-speed logging rule for device detection and tethering
Tip: All rules in a policy are run concurrently. Precedence takes effect when there are conflicting
rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules
differ. For example, if you have rule 1 with precedence 10 and Gate Status disabled for a search
engine, and you have rule 2 with precedence 11 and Gate Status enabled, then rule 1 is processed
first because it has higher precedence. Rules conflict if they have identical or overlapping
classification criteria (for the traffic that matches more than one rule). In some cases, different policy
actions are not conflicting, and hence, applied in parallel.
Detecting Tethering, Device Operation System and Type
6. From the Device and Tethering Detection list, in the Device Type OS Detection setting, select
Enabled.
Note: If you enable device detection, al the filters are disabled for the policy rule.
Note: When the custom TACDB file is generated, it is stored at the location /var/local/pem/
dtos/.
7. From the Device and Tethering Detection list, in the Tethering Detection setting, select Enabled.
Note: If you enable tethering, classification is disabled for the policy rule.
8. Click Finished.
You have created a rule that applies to policy based on device OS, type, and tethering.
The expression in the example evaluates to true, if a subscriber is tethering. You can select the Wrap
Text check box to wrap the definition text, and select the Extend Text Area check box to increase the
field space of format scripts.
8. From the Gate Status list, select Disable, to block the traffic for a subscriber who is tethering.
9. To apply bandwidth policy, for rate control to downlink traffic, in the Bandwidth Controller setting,
select the name of a bandwidth control policy.
Note: You can assign any previously created static or dynamic bandwidth control policies. However,
F5® does not recommend using the default-bwc-policy, which the system provides, nor the
dynamic_spm_bwc_policy, which you can create to enforce dynamic QoS settings provisioned by the
PCRF.
148
BIG-IP Policy Enforcement Manager: Implementations
Depending on the bandwidth control policy, PEM™ restricts bandwidth usage per subscriber, group of
subscribers, per application, per network egress link, or any combination of these.
10. To apply bandwidth policy, for rate control to uplink traffic and per category of application, in the
Bandwidth Controller setting, select the name of a bandwidth control policy.
Note: You can assign any previously created static or dynamic bandwidth control policies. However,
we do not recommend using the default-bwc-policy, which the system provides, nor the
dynamic_spm_bwc_policy, which you can create for communicating with the PCRF.
Depending on the bandwidth control policy, PEM restricts bandwidth usage per subscriber, group of
subscribers, per application, per network egress link, per category of applications or any combination
of these.
11. Click Finished.
You have created a rule that applies to tethering.
Note: The format script is previously configured in Policy Enforcement > Reporting > Format
Script page.
7. Click Finished.
You have created a rule that sends device detection and tethering data about the traffic to external high-
speed logging servers.
Implementation result
The BIG-IP® system allows improved insight to subscriber usage with detection of tethering, and device
OS and type.
149
Detecting Tethering, Device Operation System and Type
150
Troubleshooting
PEM troubleshooting
Follow these general troubleshooting suggestions when using Policy Enforcement Manager™ (PEM™):
• If enforcement policies are not enforced as expected, on the VLAN screen for all VLANs set up to
receive incoming subscriber traffic, verify that you set CMP Hash to Source Address.
• If static subscriber policies are not enforced as expected, verify whether you enforced any global,
high precedence policies with conflicting actions.
• When sending traffic without RADIUS, the unknown subscriber policy (if specified) is assigned to
the first flows from dynamic or static subscribers. Subscriber policies are applied to subsequent flows.
Note: An unknown subscriber policy needs to be specified, if there is at least one dynamically
provisioned subscriber.
• Policy changes are applied to new and existing flows within a reasonable time.
• For applications with connections initiated from the Internet (FTP, RTSP, TFTP), the BIG-IP® system
needs to have CMP Hash set to Destination Address on the Internet VLAN. In this case, the end-to-
end IP addresses have to be preserved; therefore, SNAT should be disabled on all the virtual servers
that the applications will use.
• When importing static subscribers, the file is uploaded in chunks of 1000 subscribers. The system
performs a validation check on each chunk. If a validation fails, the subscribers in the current chunk
and subsequent chunks are not imported. However, the subscribers loaded in previous chunks are
imported onto the system.
Note: PEM™ can use 3rd party database, custom DB or iRule for URL categorisation. The onbox 3rd
party database is limited to the 20M most used URL and is updated regularly.
Steering troubleshooting
• In case of service chains (w-steering), set CMP Hash to Source Address on all the VLANs for
which the w-steering action is to be applied.
• For response-side classification, steering, w-steering, and cloning actions are applied after the results
(based on destination IP address and port) are cached in the classification database (srdb). Actions are
not applied for the first six flows, by default. (This behavior is configurable by the DB variable
tmm.pem.srdb.entry.step.)
RADIUS troubleshooting
• If static subscribers are not working as expected with RADIUS, check whether you selected the same
Subscriber ID Type in the radiusLB profile (Local Traffic > Profiles > Services > RADIUS) as
that assigned when creating the static subscriber. (IMSI in the static subscriber corresponds to 3GPP
IMSI in the RADIUS profile; E164 to Calling Station ID, and NAI to User Name.)
• The RADIUS message also needs to specify the same Subscriber ID Type as the RADIUS profile.
So make sure that if you select IMSI, the IMSI number exists in the RADIUS message. This also
applies to the user-name for NAI, and calling station-id for E164.
Troubleshooting
Important: This bandwidth controller is intended for internal usage only and should not be used for
other purposes.
iRules® troubleshooting
• While running the script, if the BIG-IP system receives an error, ignore the error and implement the
next custom action script. Although this is the default behaviour, it is possible to change it with the
sys db variable key: pem.tcl.action.error.abort.
• If policy priority, event priority, and the rule precedence is the same, then there is no guarantee of
order of execution.
• You can use iRule commands to set accounting report interval, but set the accounting interval larger
than the BIG-IP interval configuration for the accounting report interval to be effective.
IPsec troubleshooting
• For IPsec to work with Policy Enforcement Manager™ (PEM™), disable the DB variable
ipsec.lookupspi.
152
BIG-IP Policy Enforcement Manager: Implementations
Field Description
ID A unique identifier (up to 64 characters) for the subscriber initiating the session, such as a
phone number. The subscriber ID type determines the format.
ID type The format of the subscriber ID attribute. It can be E.164, IMSI, NAI, or Private (RFC 4006).
Subscri Specifies a dynamically or statically subscriber.
ber
Type
Calling Radius Attribute Value Pair (AVP) type 31 (3GPP TS 29.061 V9.6.0).
Station
Called Radius Attribute Value Pair (AVP) type 30 (3GPP TS 29.061 V9.6.0.
Station
Tower Specifies the cell tower where subscriber information goes through.
User Displays the format name name@domain.
Name
IMSI International Mobile Subscriber Identity. A globally unique code number that identifies a
GSM, UMTS, or LTE mobile phone user.
IMSEIS International Mobile Station Equipment Identity Software Version. A globally unique code
V number that identifies a GSM, UMTS, LTE, or iDEN mobile phone.
Predefin Specifies the predetermined policy(ies) assigned to the subscriber.
ed
Dynami Specifies the dynamic PCC rule applied.
c
Statistic Specifies active session statistical information that includes subscriber and session IP identity
s attributes, assigned policy, and traffic flow information.
Field Description
Data Specifies how the system presents the statistics information. The default is Normalized.
Format
Auto Automatically updates the screen information at the interval you specify. For example, if you
Refresh select 60 seconds from the list, the system updates the displayed screen information every 60
seconds. The default is Disabled. When you specify an automatic-refresh interval, the system
presents a Stop button for halting the operation, and counts down the seconds to the next
update. Select Disabled to turn off automatic refreshing.
Session Specifies the session IP address. The IP address is in either IPv4 or IPv6 format.
IP
153
Troubleshooting
Field Description
Subscri Specifies a unique identifier subscriber ID.
ber ID
Uplink Specifies traffic volume from the subscriber to network.
Downli Specifies traffic volume from the network to subscriber.
nk
Current Specifies current number of flows.
Maxim Specifies maximum number of open flows.
um
Total Specifies accumulated number of flows ever opened by the subscriber.
154
IPFIX Templates for PEM Events
156
BIG-IP Policy Enforcement Manager: Implementations
Note: IPFIX, unlike NetFlow v9, supports variable-length IEs, where the length is encoded within the
field in the Data Record. NetFlow v9 collectors (and their variants) cannot correctly process variable-
length IEs, so they are omitted from logs sent to those collector types.
Session logs
This IPFIX template is used for session records used for HSL reporting.
157
IPFIX Templates for PEM Events
Flow logs
This IPFIX template is used for flow records used for HSL reporting.
158
BIG-IP Policy Enforcement Manager: Implementations
Transaction logs
This IPFIX template is used for transactional records used for HSL reporting.
159
IPFIX Templates for PEM Events
160
Legal Notices
Legal notices
Legal notices
Publication Date
This document was published on March 4, 2019.
Publication Number
MAN-0404-09
Copyright
Copyright © 2019, F5 Networks, Inc. All rights reserved.
F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5
assumes no responsibility for the use of this information, nor any infringement of patents or other rights
of third parties which may result from its use. No license is granted by implication or otherwise under
any patent, copyright, or other intellectual property right of F5 except as specifically described by
applicable user licenses. F5 reserves the right to change specifications at any time without notice.
Trademarks
For a current list of F5 trademarks and service marks, see http://www.f5.com/about/guidelines-policies/
trademarks.
All other product and company names herein may be trademarks of their respective owners.
Patents
This product may be protected by one or more patents indicated at: https://f5.com/about-us/policies/
patents.
RF Interference Warning
This is a Class A product. In a domestic environment this product may cause radio interference, in which
case the user may be required to take adequate measures.
FCC Compliance
This equipment has been tested and found to comply with the limits for a Class A digital device pursuant
to Part 15 of FCC rules. These limits are designed to provide reasonable protection against harmful
interference when the equipment is operated in a commercial environment. This unit generates, uses, and
Legal Notices
can radiate radio frequency energy and, if not installed and used in accordance with the instruction
manual, may cause harmful interference to radio communications. Operation of this equipment in a
residential area is likely to cause harmful interference, in which case the user, at his own expense, will be
required to take whatever measures may be required to correct the interference.
Any modifications to this device, unless expressly approved by the manufacturer, can void the user's
authority to operate this equipment under part 15 of the FCC rules.
Standards Compliance
This product conforms to the IEC, European Union, ANSI/UL and Canadian CSA standards applicable to
Information Technology products at the time of manufacture.
Legal Notices
162
Index
Index
A categories (continued)
creating custom classification 16, 129
active sessions determining classification 15, 129
records 153 classification
statistics 153 using iRules 131
all-match strategy classification applications
about 135 creating custom 16, 130
Any IP profile overview 129
updating 145 classification categories
Any IP profiles creating custom 16, 129
creating 145 determining 15, 129
application rules classification data
adding to enforcement policy 23, 38, 109 overview 15
application visibility classification iRule commands 132
defined 15 classification signatures
application visibility statistics updating automatically 127
examining 18 updating overview 57, 127
applications classification statistics
creating custom classification 16, 130 examining 18
overview custom classification 129 collectors
for IPFIX 41
content insertion
B creating policy action 33
bandwidth control creating 104, 105
creating a rule for 83 custom action policies
bandwidth control policies creating 22
about Max User Rate setting 89 using iRules 22
adding categories to 91
and SNMP 87 D
creating dynamic for PCRF 93
dynamic, about 88 destinations
dynamic, adding to virtual server 92 for IPFIX logging 42
dynamic, classifying traffic 91 device detection
dynamic, creating 90 enabling tethering 49, 147–149
dynamic, prerequisites 89 overview 147
for tiered services 97 DHCP lease query
overview 87, 97 configuring 75
static, about 87 overview 75
static, adding to virtual server 88 DHCPv4 profiles
static, creating 82, 87, 88 creating 69
bandwidth control with PEM DHCPv6 profile
overview 81, 93 creating 71
result of 95 Diameter
bandwidth control with tiered services about 36
result of 101 configuring AVP 126
bandwidth controller categories dynamic bandwidth control policies, See bandwidth control
adding 91 policies. 88, 91, 92
bandwidth controllers dynamic service chains
compared with rate shaping 87 creating 107
best practices, PEM 11 dynamic subscribers
best-match strategy overview 113
about 135 provisioning 113
C E
CARP endpoints
overview 19 creating 20
categories creating for service chains 106
163
Index
164
Index
R
M
radius
maximum rate of throughput, See bandwidth control policies provision 121
modify header RADIUS
creating 109 configuring profile 121
Profile 123
N RADIUS AAA profiles 63
RADIUS AAA virtual
New virtual group creating 64
connecting to a PCRF 84 RADIUS accounting
creating 84 report 64
RADIUS authentication
overview 63
O RADIUS AVP
online charging creating 122
about 36 RADIUS message
online charging system (OCS) ingress 123
connecting to 39 RADIUS re-transmission
overview 141
re-transmit timeout 141
P rate shaping
compared with bandwidth controllers 87
password 63
rating group
PCRF
configuring 37
enforcing bandwidth control 93
rating groups
provisioning subscribers 11
about 35
PEM
creating 37
custom TAC DB 143
defination 36
IANA IPFIX IEs for 155
recommendations, PEM 11
IPFIX template for PEM flow logs 158
reporting format
IPFIX template for PEM session logs 157
HSL DTOS session-based 53
IPFIX template for PEM transaction logs 159
HSL flow-based 50
performance, PEM 12
HSL qoe-based 61
policy
HSL session-based 49
creating enforcement 21, 31, 83, 98, 108
HSL tethering-based 54
provisioning dynamic subscribers 113
request adapt profile 104
Policy and Charging Rules Function (PCRF)
response adapt profile 105
connecting to 77, 94, 100
rule
policy enforcement
creating 64
overview 9
rules
policy re-evaluation
about enforcement 10
interval 141
for bandwidth control 83, 98
policy updates
for classifying traffic 24, 26
overview 141
for QoS 28
pools
local traffic policy 136, 139
165
Index
T
tac db
custom configuration 143
TAC DB
overview custom creating 143
TCL filter 119
TCP
optimization 30
166