BIG-IP TMOS Implementations
BIG-IP TMOS Implementations
Version 13.0
Table of Contents
Table of Contents
3
Table of Contents
Task summary..................................................................................................................32
Creating a trunk.....................................................................................................32
Adding a tagged interface to a VLAN.................................................................... 33
Creating a load balancing pool..............................................................................33
Creating a virtual server with source address affinity persistence........................ 34
Removing the self IP addresses from the default VLANs..................................... 34
Creating a VLAN group......................................................................................... 34
Creating a self IP for a VLAN group...................................................................... 35
4
Table of Contents
Legal Notices............................................................................................................................ 67
Legal notices.................................................................................................................... 67
5
Table of Contents
6
Customizing the BIG-IP Dashboard
Note: The view set name for all pre-defined views is standard.
Note: The windows are not active when in design mode, so the data does not update in real time.
4. When you have placed the windows you want onto the canvas, click the Save icon on the Custom
Views control bar.
The Save View popup window opens.
5. Type a name for the view.
6. Type a new name for the view set, or select from the list.
7. Click OK.
The new view is saved, and appears in the Views list.
8. Click the double-gear icon on the Custom Views control bar to return to active mode.
The dashboard displays the custom view you just created, and updates the display with real-time data.
Customizing the BIG-IP Dashboard
8
Web Hosting Multiple Customers Using an External
Switch
Tip: An alternate way to implement web hosting for multiple customers is to use the route domains
feature.
Task list
Creating a VLAN with a tagged interface
Web Hosting Multiple Customers Using an External Switch
10
BIG-IP TMOS: Implementations
Note: You must create the pool before you create the corresponding virtual server.
Tip: Hold the Shift or Ctrl key to select more than one monitor at a time.
5. From the Load Balancing Method list, select how the system distributes traffic to members of this
pool.
The default is Round Robin.
6. For the Priority Group Activation setting, specify how to handle priority groups:
• Select Disabled to disable priority groups. This is the default option.
• Select Less than, and in the Available Members field type the minimum number of members that
must remain available in each priority group in order for traffic to remain confined to that group.
7. Using the New Members setting, add each resource that you want to include in the pool:
a) (Optional) In the Node Name field, type a name for the node portion of the pool member.
b) In the Address field, type an IP address.
c) In the Service Port field, type a port number, or select a service name from the list.
d) (Optional) In the Priority field, type a priority number.
e) Click Add.
8. Click Finished.
The load balancing pool appears in the Pools list.
Note: The IP address you type must be available and not in the loopback network.
5. In the Service Port field, type 80, or select HTTP from the list.
6. From the HTTP Profile list, select http.
7. In the Resources area of the screen, from the Default Pool list, select the relevant pool name.
8. Click Finished.
11
Web Hosting Multiple Customers Using an External Switch
You now have a virtual server to use as a destination address for application traffic.
12
Web Hosting Multiple Customers Using Untagged
Interfaces
Tip: An alternate way to implement web hosting for multiple customers is to use the route domains
feature.
Task list
Creating a VLAN with an untagged interface
Creating a load balancing pool
Creating a virtual server for HTTP traffic
Web Hosting Multiple Customers Using Untagged Interfaces
Note: You must create the pool before you create the corresponding virtual server.
Tip: Hold the Shift or Ctrl key to select more than one monitor at a time.
5. From the Load Balancing Method list, select how the system distributes traffic to members of this
pool.
The default is Round Robin.
6. For the Priority Group Activation setting, specify how to handle priority groups:
• Select Disabled to disable priority groups. This is the default option.
• Select Less than, and in the Available Members field type the minimum number of members that
must remain available in each priority group in order for traffic to remain confined to that group.
7. Using the New Members setting, add each resource that you want to include in the pool:
a) (Optional) In the Node Name field, type a name for the node portion of the pool member.
b) In the Address field, type an IP address.
c) In the Service Port field, type a port number, or select a service name from the list.
d) (Optional) In the Priority field, type a priority number.
14
BIG-IP TMOS: Implementations
e) Click Add.
8. Click Finished.
The load balancing pool appears in the Pools list.
Note: The IP address you type must be available and not in the loopback network.
5. In the Service Port field, type 80, or select HTTP from the list.
6. From the HTTP Profile list, select http.
7. In the Resources area of the screen, from the Default Pool list, select the relevant pool name.
8. Click Finished.
You now have a virtual server to use as a destination address for application traffic.
15
Web Hosting Multiple Customers Using Untagged Interfaces
16
Web Hosting Multiple Customers Using Route Domains
18
BIG-IP TMOS: Implementations
Task summary
Perform these tasks to host multiple web customers using route domains.
Task list
Creating an administrative partition
Creating a VLAN with a tagged interface
Creating a self IP address for a default route domain in an administrative partition
Creating a route domain on the BIG-IP system
Creating a load balancing pool
Creating a virtual server
Configuring route advertisement for a virtual address
Adding routes that specify VLAN internal as the resource
19
Web Hosting Multiple Customers Using Route Domains
20
BIG-IP TMOS: Implementations
The Syncache Threshold value represents the number of outstanding SYN flood packets on the
VLAN that will trigger the hardware SYN cookie protection feature.
When the Hardware SYN Cookie setting is enabled, the BIG-IP system triggers SYN cookie
protection in either of these cases, whichever occurs first:
• The number of TCP half-open connections defined in the LTM® setting Global SYN Check
Threshold is reached.
• The number of SYN flood packets defined in this Syncache Threshold setting is reached.
11. For the SYN Flood Rate Limit setting, retain the default value or change it to suit your needs.
The SYN Flood Rate Limit value represents the maximum number of SYN flood packets per second
received on this VLAN before the BIG-IP system triggers hardware SYN cookie protection for the
VLAN.
12. Click Finished.
The screen refreshes, and displays the new VLAN in the list.
The new VLAN appears in the VLAN list.
21
Web Hosting Multiple Customers Using Route Domains
• Verify that you have set the current partition on the system to the partition in which you want the
route domain to reside.
You can create a route domain on BIG-IP system to segment (isolate) traffic on your network. Route
domains are useful for multi-tenant configurations.
1. On the Main tab, click Network > Route Domains.
The Route Domain List screen opens.
2. Click Create.
The New Route Domain screen opens.
3. In the Name field, type a name for the route domain.
This name must be unique within the administrative partition in which the route domain resides.
4. In the ID field, type an ID number for the route domain.
This ID must be unique on the BIG-IP system; that is, no other route domain on the system can have
this ID.
An example of a route domain ID is 1.
5. In the Description field, type a description of the route domain.
For example: This route domain applies to application traffic for Customer A.
6. For the Strict Isolation setting, select the Enabled check box to restrict traffic in this route domain
from crossing into another route domain.
7. For the Parent Name setting, retain the default value.
8. For the VLANs setting, from the Available list, select a VLAN name and move it to the Members
list.
Select the VLAN that processes the application traffic relevant to this route domain.
Configuring this setting ensures that the BIG-IP system immediately associates any self IP addresses
pertaining to the selected VLANs with this route domain.
9. For the Dynamic Routing Protocols setting, from the Available list, select one or more protocol
names and move them to the Enabled list.
You can enable any number of listed protocols for this route domain.
10. From the Bandwidth Controller list, select a static bandwidth control policy to enforce a throughput
limit on traffic for this route domain.
11. From the Partition Default Route Domain list, select either Another route domain (0) is the
Partition Default Route Domain or Make this route domain the Partition Default Route
Domain.
This setting does not appear if the current administrative partition is partition Common.
When you configure this setting, either route domain 0 or this route domain becomes the default route
domain for the current administrative partition.
12. Click Finished.
The system displays a list of route domains on the BIG-IP system.
You now have another route domain on the BIG-IP system.
Note: You must create the pool before you create the corresponding virtual server.
22
BIG-IP TMOS: Implementations
2. Click Create.
The New Pool screen opens.
3. In the Name field, type a unique name for the pool.
4. For the Health Monitors setting, in the Available list, select a monitor type, and click << to move the
monitor to the Active list.
Tip: Hold the Shift or Ctrl key to select more than one monitor at a time.
5. From the Load Balancing Method list, select how the system distributes traffic to members of this
pool.
The default is Round Robin.
6. For the Priority Group Activation setting, specify how to handle priority groups:
• Select Disabled to disable priority groups. This is the default option.
• Select Less than, and in the Available Members field type the minimum number of members that
must remain available in each priority group in order for traffic to remain confined to that group.
7. Using the New Members setting, add each resource that you want to include in the pool:
a) (Optional) In the Node Name field, type a name for the node portion of the pool member.
b) In the Address field, type an IP address.
c) In the Service Port field, type a port number, or select a service name from the list.
d) (Optional) In the Priority field, type a priority number.
e) Click Add.
8. Click Finished.
The load balancing pool appears in the Pools list.
Note: The IP address you type must be available and not in the loopback network.
5. In the Service Port field, type a port number or select a service name from the Service Port list.
6. In the Resources area of the screen, from the Default Pool list, select the relevant pool name.
23
Web Hosting Multiple Customers Using Route Domains
Important: This task pertains only to configurations for which you have enabled dynamic routing
protocols on the relevant route domain. If you have not enabled dynamic routing protocols on the
relevant route domain, you can skip this task.
1. On the Main tab, click Local Traffic > Virtual Servers > Virtual Address List.
The Virtual Address List screen opens.
2. In the Name column, click the virtual address for which you want to advertise a route.
This displays the properties of that virtual address.
3. Verify that the ARP field is selected.
4. From the Advertise Route list, choose one of these options:
Option Description
When any virtual server is Specifies that the system advertises a route for this virtual IP address
available whenever any virtual server associated with this virtual IP address is
available.
When all virtual servers(s) Specifies that the system advertises a route for this virtual IP address
are available whenever all virtual servers associated with this virtual IP address is
available.
Always Specifies that the system always advertises a route for this virtual IP
address.
5. For the Route Advertisement setting, select the box.
This makes it possible for the BIG-IP system to advertise this virtual IP address when you have
enabled any dynamic routing protocols.
6. Click Update.
7. Repeat this task for each virtual address for which you want to advertise a route.
The BIG-IP system advertises a route for this virtual address to other routers when one or more dynamic
routing protocols are enabled and are configured for route redistribution.
24
BIG-IP TMOS: Implementations
8. Click Finished.
The BIG-IP system now includes routes to the nodes in the load balancing pool for a specific route
domain.
25
Web Hosting Multiple Customers Using Route Domains
26
Implementing the Link Layer Discovery Protocol
Task summary
Perform these tasks to implement Link Layer Discovery Protocol (LLDP) on selected BIG-IP system
interfaces.
Implementing the Link Layer Discovery Protocol
Task list
Configuring global LLDP properties
Configuring LLDP settings for an individual interface
Note: Although you use this procedure to globally enable the LLDP feature on the BIG-IP system, you
can also disable LLDP for any individual interface. You do this by configuring the specific properties of
that interface.
1. On the Main tab, click Network > Interfaces > LLDP > General.
This displays the general LLDP properties that you can configure on the system.
2. From the LLDP list, select Enabled.
3. For the remainder of the settings, retain or change the default values.
4. Click the Update button.
This task activates support for the LLDP protocol on the BIG-IP system, and configures the system to
transmit LLDPDUs according to the specified frequencies.
Implementation result
This implementation results in this LLDP configuration:
• Support for the LLDP protocol is enabled on the BIG-IP system.
• For all BIG-IP system interfaces, the BIG-IP system attempts to transmit LLDPDUs to neighbor
devices every 30 seconds, with a minimum delay between transmissions of 2 seconds.
• The maximum number of neighbors to which each BIG-IP system interface can send LLDPDUs is 10.
• Every BIG-IP system interface can send LLDPDUs to its neighbors.
• No BIG-IP system interface can receive LLDPDUs from its neighbors.
In addition, the content of the LLDPDUs that each BIG-IP system interface sends to its neighbors
contains this information:
28
BIG-IP TMOS: Implementations
• Chassis ID
• Port ID
• Time-to-Live value
• Port description
• System name
• System description
• System capabilities
• Port VLAN ID
• Port and protocol VLAN ID
• VLAN name
• Protocol identity
• MAC/PHY config status
• Link aggregation
• Max frame size
• Product model
29
Implementing the Link Layer Discovery Protocol
30
Using Link Aggregation with Tagged VLANs for a One-
network Topology
Task summary
Perform the following tasks to configure two interfaces (tagged VLANs) to function as a single link with
higher bandwidth. In this implementation, you combine the two tagged VLANs into one VLAN group,
where the two VLANs are on the same IP network.
Task list
Creating a trunk
Adding a tagged interface to a VLAN
Creating a load balancing pool
Creating a virtual server with source address affinity persistence
Removing the self IP addresses from the default VLANs
Creating a VLAN group
Creating a self IP for a VLAN group
Creating a trunk
You create a trunk on the BIG-IP® system so that the system can then aggregate the links to enhance
bandwidth and ensure link availability.
1. On the Main tab, click Network > Trunks.
The Trunk List screen opens.
2. Click Create.
32
BIG-IP TMOS: Implementations
Note: You must create the pool before you create the corresponding virtual server.
Tip: Hold the Shift or Ctrl key to select more than one monitor at a time.
5. From the Load Balancing Method list, select how the system distributes traffic to members of this
pool.
The default is Round Robin.
6. For the Priority Group Activation setting, specify how to handle priority groups:
• Select Disabled to disable priority groups. This is the default option.
• Select Less than, and in the Available Members field type the minimum number of members that
must remain available in each priority group in order for traffic to remain confined to that group.
7. Using the New Members setting, add each resource that you want to include in the pool:
33
Using Link Aggregation with Tagged VLANs for a One-network Topology
a) (Optional) In the Node Name field, type a name for the node portion of the pool member.
b) In the Address field, type an IP address.
c) In the Service Port field, type a port number, or select a service name from the list.
d) (Optional) In the Priority field, type a priority number.
e) Click Add.
8. Click Finished.
The load balancing pool appears in the Pools list.
34
BIG-IP TMOS: Implementations
35
Using Link Aggregation with Tagged VLANs for a One-network Topology
36
Using Link Aggregation with Tagged VLANs for a Two-
network Topology
Task summary
Perform the following tasks to configure two interfaces (tagged VLANs) to function as a single link with
higher bandwidth. In this implementation, each tagged VLAN is on a separate network.
Task list
Creating a trunk
Adding a tagged interface to a VLAN
Creating a load balancing pool
Creating a virtual server with source address affinity persistence
Creating a trunk
You create a trunk on the BIG-IP® system so that the system can then aggregate the links to enhance
bandwidth and ensure link availability.
1. On the Main tab, click Network > Trunks.
The Trunk List screen opens.
2. Click Create.
38
BIG-IP TMOS: Implementations
Note: You must create the pool before you create the corresponding virtual server.
Tip: Hold the Shift or Ctrl key to select more than one monitor at a time.
5. From the Load Balancing Method list, select how the system distributes traffic to members of this
pool.
The default is Round Robin.
6. For the Priority Group Activation setting, specify how to handle priority groups:
• Select Disabled to disable priority groups. This is the default option.
• Select Less than, and in the Available Members field type the minimum number of members that
must remain available in each priority group in order for traffic to remain confined to that group.
7. Using the New Members setting, add each resource that you want to include in the pool:
39
Using Link Aggregation with Tagged VLANs for a Two-network Topology
a) (Optional) In the Node Name field, type a name for the node portion of the pool member.
b) In the Address field, type an IP address.
c) In the Service Port field, type a port number, or select a service name from the list.
d) (Optional) In the Priority field, type a priority number.
e) Click Add.
8. Click Finished.
The load balancing pool appears in the Pools list.
40
Configuring Packet Filtering
Important: Unlike most IP address configuration settings in the BIG-IP Configuration utility that require
the %ID notation for route domains other than route domain 0, the Source Hosts and Networks and
Destination Hosts and Networks settings for packet filter rules accept IP addresses without the %ID
route domain notation. This is because when you apply the packet filter rule to a VLAN, which belongs to
a route domain, you are indirectly specifying which route domain’s traffic to filter.
You can also configure global packet filtering that applies to all packet filter rules that you create.
Task summary
By setting up some basic IP routing and configuring packet filtering, specific hosts on the internal VLAN
can connect to the internal VLAN's self IP address. These hosts can also use common Internet services
such as HTTP, HTTPS, DNS, FTP, and SSH. Traffic from all other hosts in the internal VLAN is
rejected.
Task list
Enabling SNAT automap for internal and external VLANs
Creating a default gateway pool
Creating a forwarding virtual server
Enabling packet filtering
Creating a packet filter rule
42
BIG-IP TMOS: Implementations
43
Configuring Packet Filtering
11. If you configured the VLANs setting to always accept specific VLANs, then use the Move button to
move one or more VLAN names from the Available list to the Selected list.
12. Click Update.
After you enable packet filtering, the BIG-IP® system filters packets according to the criteria in the
packet filter rule and the values you configured when enabling the packet filter.
Note: Replace internal_self_IP_address with the actual self IP address of VLAN internal.
• Build Expression. When you select this value, you can build an expression that causes the BIG-IP
system to only accept certain protocols, source hosts and networks, destination hosts and
networks, and destination ports.
Important: Unlike most IP address configuration settings in the BIG-IP Configuration utility that
require the %ID notation for route domains other than route domain 0, the Source Hosts and
Networks and Destination Hosts and Networks settings for packet filter rules accept IP addresses
without the %ID route domain notation. This is because when you apply the packet filter rule to a
VLAN, which belongs to a route domain, you are indirectly specifying which route domain’s traffic
to filter.
44
Referencing an External File from within an iRule
}
}
}
Task summary
You can import an existing file to the BIG-IP® system, create an iFile that is based on the imported file,
and then write an iRule that returns the content of that file to a client system, based on an iRule event.
Task list
Importing a file for an iRule
Creating an iFile
Writing an iRule that references an iFile
Creating an iFile
As a prerequisite, ensure that the current administrative partition is set to the partition in which you want
the iFile to reside. Also ensure that the file has been imported to the BIG-IP® system.
You perform this task to create an iFile that you can then reference in an iRule.
1. On the Main tab, click Local Traffic > iRules > iFile List.
2. Click Create.
3. In the Name field, type a new name for the iFile, such as ifileURL.
4. From the File Name list, select the name of the imported file object, such as 1k.html.
5. Click Finished.
The new iFile appears in the list of iFiles.
The result of this task is that you now have a file that an iRule can reference.
46
BIG-IP TMOS: Implementations
Note: If the iFile resides in partition /Common, then specifying the partition when referencing the iFile is
optional. If the iFile resides in a partition other than /Common, such as /Partition_A, you must
include the partition name in the iFile path name within the iRule.
Implementation result
You now have an iRule that accesses a file on the BIG-IP®system, based on a particular iRule event.
47
Referencing an External File from within an iRule
48
Configuring Remote User Authentication and
Authorization
Task summary
You can configure the BIG-IP® system to authorize user accounts that are stored on a remote
authentication server.
Important: If you configure access control settings for group-based accounts (using the remote role
groups feature), the BIG-IP system always applies those settings, rather than the default access control
settings, to group-based accounts.
The BIG-IP® system supports several types of authentication servers for storing BIG-IP system
administrative user accounts. The actual procedure you use to specify the type of remote server differs,
depending on the server type.
Task list
Specifying LDAP or Active Directory server information
Specifying client certificate LDAP server information
Specifying RADIUS server information
Specifying TACACS+ server information
Configuring access control for remote user groups
Saving access control settings to a file
Importing BIG-IP configuration data onto other BIG-IP systems
Configuring Remote User Authentication and Authorization
Important: The values you specify in this procedure for the Role, Partition Access, and Terminal Access
settings do not apply to group-based access control. These values represent the default values that the
BIG-IP system applies to any user account that is not part of a remotely-stored user group. Also, for the
Other External Users user account, you can modify the Role, Partition Access, and Terminal
Access settings only when your current partition on the BIG-IP system is set to Common. If you attempt to
modify these settings when your current partition is other than Common, the system displays an error
message.
50
BIG-IP TMOS: Implementations
a) From the SSL CA Certificate list, select the name of a chain certificate, that is, the third-party
CA or self-signed certificate that normally resides on the remote authentication server.
b) From the SSL Client Key list, select the name of the client SSL key.
Use this setting only when the remote server requires that the client present a certificate.
c) From the SSL Client Certificate list, select the name of the client SSL certificate.
Use this setting only if the remote server requires that the client present a certificate.
13. In the Login LDAP Attribute field, type the account name for the LDAP server.
The value for this option is normally the user ID. However, if the server is a Microsoft® Windows®
Active Directory®server, the value must be the account name sAMAccountName (case-sensitive). The
default value is none.
14. From the Client Certificate Name Field list:
a) Select either a subject alternate name or the subject name (Common Name).
b) If you select the subject alternate name Other Name, then in the OID field, type an object
identifier (OID).
The OID indicates the format and semantics of the subject alternate name.
15. For the Fallback to Local setting, select the check box when you want to allow configuring remote
authentication to fall back to the local authentication when the remote server is unavailable.
16. From the Role list, select the user role that you want the BIG-IP system to assign by default to all
BIG-IP system user accounts authenticated on the remote server.
17. From the Partition Access list, select the default administrative partition that all remotely-
authenticated BIG-IP system user accounts can access.
18. From the Terminal Access list, select either of these as the default terminal access option for
remotely-authenticated user accounts:
Option Description
Disabled Choose this option when you do not want the remotely-stored user accounts to have
terminal access to the BIG-IP system.
tmsh Choose this option when you want the remotely-stored user accounts to have only tmsh
access to the BIG-IP system.
19. Click Finished.
You can now authenticate administrative user accounts that are stored on a remote LDAP or Active
Directory server. If you have no need to configure access control for remotely-stored user groups, your
configuration tasks are complete.
Important: The values you specify in this procedure for the Role, Partition Access, and Terminal Access
settings do not apply to group-based authorization. These values represent the default values or locally
configured user accounts (which override the default role) that the BIG-IP system applies to any user
account that is not part of a remote role group.
1. On the Main tab, click System > File Management > Apache Certificate List > Import, browse for
the certificate file to import, type a name, and click Import.
The certificate will be added to the Apache Certificate list.
2. On the Main tab, click System > Users > Authentication.
51
Configuring Remote User Authentication and Authorization
13. In the Login Name field, type an LDAP search prefix that will contain the distinguished name (DN)
from the user certificate, such as CN.
This specifies the LDAP attribute to be used as a login name. The default is disabled.
14. In the Login LDAP Attribute field, type the account name for the LDAP server.
The value for this option is normally the user ID. However, if the server is a Microsoft® Windows®
Active Directory®server, the value must be the account name sAMAccountName (case-sensitive). The
default value is none.
15. In the Login Filter field, type the LDAP attribute that contains the short name of the user.
This specifies the filter to be applied on the common name (CN) of the client certificate and usually
this is the user ID or sAMAccountName. The filter is a regular expression used to extract required
information from the CN of the client certificate that is matched against the LDAP search results. The
default is disabled.
16. For the Depth setting, retain the default value (10) or type a new value for verification depth.
17. From the Role list, select the user role that you want the BIG-IP system to assign by default to all
BIG-IP system user accounts authenticated on the remote server.
52
BIG-IP TMOS: Implementations
18. From the Partition Access list, select the default administrative partition that all remotely-
authenticated BIG-IP system user accounts can access.
19. From the Terminal Access list, select either of these as the default terminal access option for
remotely-authenticated user accounts:
Option Description
Disabled Choose this option when you do not want the remotely-stored user accounts to have
terminal access to the BIG-IP system.
tmsh Choose this option when you want the remotely-stored user accounts to have only tmsh
access to the BIG-IP system.
20. Click Finished.
You can now authenticate administrative traffic for user accounts that are stored on a remote client
certificate server. If you have no need to configure group-based user authorization, your configuration
tasks are complete.
Important: The values you specify in this procedure for the Role, Partition Access, and Terminal Access
settings do not apply to group-based authorization. These values represent the default values that the
BIG-IP system applies to any user account that is not part of a role group that is defined on the remote
authentication server. Also, for the Other External Users user account, you can modify the Role,
Partition Access, and Terminal Access settings only when your current partition on the BIG-IP system is
set to Common. If you attempt to modify these settings when your current partition is other than Common,
the system displays an error message.
53
Configuring Remote User Authentication and Authorization
8. From the Role list, select the user role that you want the BIG-IP system to assign by default to all
BIG-IP system user accounts authenticated on the remote server.
9. From the Partition Access list, select the default administrative partition that all remotely-
authenticated BIG-IP system user accounts can access.
10. From the Terminal Access list, select either of these as the default terminal access option for
remotely-authenticated user accounts:
Option Description
Disabled Choose this option when you do not want the remotely-stored user accounts to have
terminal access to the BIG-IP system.
tmsh Choose this option when you want the remotely-stored user accounts to have only tmsh
access to the BIG-IP system.
11. Click Finished.
You can now authenticate administrative traffic for BIG-IP system user accounts that are stored on a
remote RADIUS server. If you have no need to configure access control for remotely-stored user groups,
your configuration tasks are complete.
Important: The values you specify in this procedure for the Role, Partition Access, and Terminal Access
settings do not apply to group-based authorization. These values represent the default values that the
BIG-IP system applies to any user account that is not part of a remote role group. Also, for the Other
External Users user account, you can modify the Role, Partition Access, and Terminal Access
settings only when your current partition on the BIG-IP system is set to Common. If you attempt to modify
these settings when your current partition is other than Common, the system displays an error message.
Warning: Do not include the symbol # in the secret. Doing so causes authentication of local user
accounts (such as root and admin) to fail.
54
BIG-IP TMOS: Implementations
Option Description
Enabled Specifies that the system encrypts the TACACS+ packets.
Disabled Specifies that the system sends unencrypted TACACS+ packets.
11. In the Service Name field, type the name of the service that the user is requesting to be authenticated
to use (usually ppp).
Specifying the service causes the TACACS+ server to behave differently for different types of
authentication requests. Examples of service names that you can specify are: ppp, slip, arap,
shell, tty-daemon, connection, system, and firewall.
12. In the Protocol Name field, type the name of the protocol associated with the value specified in the
Service Name field.
This value is usually ip. Examples of protocol names that you can specify are: ip, lcp, ipx, atalk,
vines, lat, xremote, tn3270, telnet, rlogin, pad, vpdn, ftp, http, deccp, osicp, and
unknown.
13. From the Role list, select the user role that you want the BIG-IP system to assign by default to all
BIG-IP system user accounts authenticated on the remote server.
14. From the Partition Access list, select the default administrative partition that all remotely-
authenticated BIG-IP system user accounts can access.
15. From the Terminal Access list, select either of these as the default terminal access option for
remotely-authenticated user accounts:
Option Description
Disabled Choose this option when you do not want the remotely-stored user accounts to have
terminal access to the BIG-IP system.
tmsh Choose this option when you want the remotely-stored user accounts to have only tmsh
access to the BIG-IP system.
16. Click Finished.
You can now authenticate administrative traffic for BIG-IP system user accounts that are stored on a
remote TACACS+ server. If you have no need to configure access control for remotely-stored user
groups, your configuration tasks are complete.
55
Configuring Remote User Authentication and Authorization
The order of the information is important; therefore, F5 Networks recommends that you specify a
value of 1000 for the first line number. This allows you, in the future, to insert lines before the first
line.
6. In the Attribute String field, type an attribute.
An example of an attribute string is
memberOF=cn=BigIPOperatorsGroup,cn=users,dc=dev,dc=net.
The BIG-IP system attempts to match this attribute with an attribute on the remote authentication
server. On finding a match, the BIG-IP system applies the access control settings defined here to the
users in that group. If a match is not found, the system applies the default access control settings to all
remotely-stored user accounts (excluding any user account for which access control settings are
individually configured).
7. From the Remote Access list, select a value.
Option Description
Enabled Choose this value if you want to enable remote access for the defined user group.
Disabled Choose this value if you want to disable remote access for the defined user group. Note
that if you configure multiple instances of this remote role group (one instance for each
role-partition pair for the attribute string), then choosing a value of Disabled disables
remote access for all user group members, regardless of the remote role group instance.
8. From the Assigned Role list, select a user role for the remote user group.
56
BIG-IP TMOS: Implementations
1. On the BIG-IP system on which you created the SCF, access a command-line prompt.
2. Copy the SCF that you previously created to a location on your network that you can access from the
system that you want to configure.
3. Edit the SCF to reflect the management routing and special passwords of the BIG-IP system that you
want to configure:
a) Open the SCF in an editor.
b) Where necessary, change the values of the management IP address, network mask, management
default route, self IP addresses, virtual server IP addresses, routes, default routes, and host name
fields to the values for the new system.
c) If necessary, change the passwords for the root and admin accounts using the command user
name password none newpassword password.
Important: When configuring a unit that is part of a redundant system configuration and that is
using the SCF from the peer unit, do not modify the root and admin accounts. These accounts
must be identical on both units of the redundant system.
d) Save the edited SCF.
4. On the BIG-IP system that you want to configure, open the Traffic Management Shell by typing the
command tmsh.
5. Type sys load scf_filename.
sys load myConfiguration053107.scf saves a backup of the running configuration in
the /var/local/scf directory, and then resets the running configuration with the configuration
contained in the SCF you are loading.
57
Configuring Remote User Authentication and Authorization
58
Configuring Administrative Partitions to Control User
Access
Task summary
There are two main tasks for controlling user access to BIG-IP® system objects.
Task list
Creating an administrative partition
Assigning roles to a user account
Action Result
Clear the check Choose this option if you do not want the folder corresponding to this partition
box and select to inherit the value of the traffic group attribute from folder root.
the name of a
traffic group.
8. Click Finished.
The new partition appears in the partition list.
Important: If you are performing this task while the user is logged into the system through tmsh, the
BIG-IP system terminates the user's tmsh session when the user subsequently issues another tmsh
command. This behavior ensures that the user is notified of the change in permissions and that data
integrity is maintained.
60
BIG-IP TMOS: Implementations
After you configure this setting, one or more role-partition combinations are specified for assignment
to this user account.
6. Click the Update button.
61
Configuring Administrative Partitions to Control User Access
62
Working with Single Configuration Files
vlan external {
tag 4093
interfaces 1.3
}
vlan internal {
tag 4094
interfaces 1.10
}
pool dev_https3 {
members {
10.60.10.105:https{}
10.60.10.106:https{}
}
}
The single configuration file feature allows you to save the configuration of a BIG-IP system in a text
file. You can then use the text file to easily replicate the configuration across multiple BIG-IP systems.
This not only saves you time, but also allows you to create a consistent, secure, comprehensive local
traffic management environment on your network.
load sys config file [filename] Replaces or restores an SCF with a saved
configuration. When you use this command, the
system saves any previously running configuration
to the /var/local/scf/ directory, by default.
load sys config default Restores the factory default settings of the
configuration file, while retaining the management
IP address and the administrator user name and
password.
Working with Single Configuration Files
Task summary
You can perform three main tasks with respect to single configuration files.
Task list
Creating and saving an SCF
Loading an SCF onto a target BIG-IP system
Using an SCF to restore a BIG-IP system configuration
Important: The system configuration data contained in the text file includes any local device certificate
and keys used to establish device trust between this system and the other devices in a BIG-IP device
group. These certificates and keys are unencrypted in the text file and are not included in the .tar file.
Note: If you create an SCF file twice (on two different occasions), you can compare the contents of the
two files.
Note: If you include the .scf extension in the file name, the system does not add an additional file
extension.
The system gathers all of the commands that make up the running configuration, and then saves the
configuration to a .scf file with the name you specify. The system also creates a
corresponding .tar file. By default, the system stores these files in the /var/local/scf directory,
but you can specify a different path if you prefer.
Important: If you run a load command or restart the system before you save your changes to the stored
configuration, you will lose any changes.
Note: To successfully load a configuration that you have replicated, make sure that no line of the
configuration is longer than 4096 characters. If there are more than 4096 characters in a single line, the
system reverts to the previous running configuration.
64
BIG-IP TMOS: Implementations
Note: You must run the save sys config partitions all command to save the running
configuration in the stored configuration files.
65
Working with Single Configuration Files
66
Legal Notices
Legal notices
Publication Date
This document was published on March 2, 2017.
Publication Number
MAN-0379-11
Copyright
Copyright © 2017, F5 Networks, Inc. All rights reserved.
F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5
assumes no responsibility for the use of this information, nor any infringement of patents or other rights
of third parties which may result from its use. No license is granted by implication or otherwise under
any patent, copyright, or other intellectual property right of F5 except as specifically described by
applicable user licenses. F5 reserves the right to change specifications at any time without notice.
Trademarks
For a current list of F5 trademarks and service marks, see http://www.f5.com/about/guidelines-policies/
trademarks.
All other product and company names herein may be trademarks of their respective owners.
Patents
This product may be protected by one or more patents indicated at: https://f5.com/about-us/policies/
patents.
RF Interference Warning
This is a Class A product. In a domestic environment this product may cause radio interference, in which
case the user may be required to take adequate measures.
FCC Compliance
This equipment has been tested and found to comply with the limits for a Class A digital device pursuant
to Part 15 of FCC rules. These limits are designed to provide reasonable protection against harmful
interference when the equipment is operated in a commercial environment. This unit generates, uses, and
can radiate radio frequency energy and, if not installed and used in accordance with the instruction
manual, may cause harmful interference to radio communications. Operation of this equipment in a
residential area is likely to cause harmful interference, in which case the user, at his own expense, will be
required to take whatever measures may be required to correct the interference.
Legal Notices
Any modifications to this device, unless expressly approved by the manufacturer, can void the user's
authority to operate this equipment under part 15 of the FCC rules.
Standards Compliance
This product conforms to the IEC, European Union, ANSI/UL and Canadian CSA standards applicable to
Information Technology products at the time of manufacture.
68
Index
Index
A files (continued)
importing 45, 46
access control forwarding virtual servers
configuring 60 creating 42
access control properties
assigning to user groups 55
access control settings
G
saving 56 global LLDP properties
Active Directory server information 50 configuring 28
administrative partitions
access to 60
creating 19, 59 H
defined 59
health monitors
administrative traffic
assigning to pools 10, 14, 22, 33, 39
authenticating 50, 51
application traffic
isolating on network 19, 59 I
ifile commands 45
B iFiles
creating 46
BIG-IP main dashboard
imported files
customizing 7
listing 46
BIG-IP system
interfaces
restoring SCF 65
tagging 10, 20
iRule commands
C for iFiles 45
iRule events 46, 47
CCLDAP, See remote server authentication iRules
Cert-LDAP, See remote server authentication and external files 45
configuration data and iFiles 46
creating 64
importing 57
loading 64 L
restoring 65
LDAP server information
saving 64
client certificate 51
content
specifying 50
of LLDPDUs 28
link aggregation
creating 32, 38
D described 31, 37
tasks for 32, 38
dashboard windows Link Layer Discovery Protocol, See LLDP
customizing 7 LLDP messages
dashboard, BIG-IP main sending and receiving 28
customizing 7 LLDP properties
default gateway pools global 28
creating 42 per interface 28
LLDP protocol
E overview 27
LLDP tasks 27
external files LLDPDU contents 28
and iRules 45
external switches
incorporating into network 9
M
main BIG-IP dashboard
F customizing 7
message content
files for LLDPDUs 28
69
Index
70
Index
71
Index
72