Dell 3-DNS Especificaciones

Busca en linea o descarga Especificaciones para Redes Dell 3-DNS. Dell 3-DNS Specifications Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 426
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente

Indice de contenidos

Pagina 1 - BIG-IP® Reference Guide

BIG-IP® Reference Guideversion 4.2MAN-0044-01

Pagina 2 - Legal Notices

TableofContentsxUsing network-based fail-over ...6-9

Pagina 3 - Acknowledgments

Chapter 4: Configuring the High-Level Network4-20To configure a monitor for a UC Davis SNMP agent, using default CPU, memory threshold, and disk use v

Pagina 4

PoolsBIG-IP® Reference Guide 4-21be confined to that group. If the number of available nodes in the highest priority group goes below the minimum numb

Pagina 5 - Table of Contents

Chapter 4: Configuring the High-Level Network4-22The BIG-IP tracks information about individual persistent connections, and keeps the information only

Pagina 6

PoolsBIG-IP® Reference Guide 4-23Simple persistenceSimple persistence tracks connections based only on the client IP address. When a client requests a

Pagina 7

Chapter 4: Configuring the High-Level Network4-24For example, if you want to set simple persistence on the pool my_pool, type the following command:b

Pagina 8

PoolsBIG-IP® Reference Guide 4-25You can turn off a persist mask for a pool by using the none option in place of the simple_mask mask. To turn off the

Pagina 9

Chapter 4: Configuring the High-Level Network4-26To activate Insert mode from the command lineTo activate Insert mode from the command line, use the f

Pagina 10 - TableofContents

PoolsBIG-IP® Reference Guide 4-276. Type the timeout value in days, hours, minutes, and seconds. This value determines how long the cookie lives on th

Pagina 11 - Monitoring and Administration

Chapter 4: Configuring the High-Level Network4-28Alternatively, you can perform the encoding using the following equation for address (a.b.c.d): d*(25

Pagina 12 - Glossary

PoolsBIG-IP® Reference Guide 4-29To configure the cookie persistence hash option using theConfiguration utilityBefore you follow this procedure, you m

Pagina 13 - Introduction

TableofContentsBIG-IP® Reference Guide xivlan ...

Pagina 14

Chapter 4: Configuring the High-Level Network4-30The <cookie_name>, <cookie_value_offset>, and <cookie_value_length> values are desc

Pagina 15 - Getting started

PoolsBIG-IP® Reference Guide 4-314. Click the SSL button.5. In the Timeout box, type the number of seconds that the BIG-IP should store SSL session ID

Pagina 16 - Using the Administrator Kit

Chapter 4: Configuring the High-Level Network4-32packet for one of the different types of SIP final messages. A default timeout value exists, which is

Pagina 17 - Stylistic conventions

PoolsBIG-IP® Reference Guide 4-33To activate destination address affinity using theConfiguration utilityYou can only activate destination address affi

Pagina 18 - Identifying command syntax

Chapter 4: Configuring the High-Level Network4-34Hash modeWhen configured in hash mode, a WTS server does not participate in a session directory; that

Pagina 19 - What’s new in version 4.2

PoolsBIG-IP® Reference Guide 4-35To create a virtual server from the command lineTo create a virtual server that uses the pool my_cluster_pool, use th

Pagina 20 - Enhanced rules support

Chapter 4: Configuring the High-Level Network4-363. Click the Allow Persistence Across All Ports for Each Virtual Address check box. (To disable this

Pagina 21 - Enhanced interface statistics

PoolsBIG-IP® Reference Guide 4-37To activate persistence across all virtual servers using theConfiguration utility1. In the navigation pane, click the

Pagina 22 - Enhanced system logging

Chapter 4: Configuring the High-Level Network4-38Using IP addresses and Fully Qualified Domain NamesWhen redirecting traffic to a fallback host, you c

Pagina 23

PoolsBIG-IP® Reference Guide 4-39Using format strings (expansion characters)To allow HTTP redirection to be fully configurable with respect to target

Pagina 24 - Chapter Intro

TableofContentsxiiRemoving and returning items to service ...11-14Removing th

Pagina 25 - BIG-IP Overview

Chapter 4: Configuring the High-Level Network4-40Table 4.8 shows some sample redirection specifications, their explanations, and their resulting redir

Pagina 26

PoolsBIG-IP® Reference Guide 4-41Rewriting HTTP redirectionSometimes, a client request is redirected from the HTTPS protocol to the HTTP protocol, whi

Pagina 27 - What is a BIG-IP?

Chapter 4: Configuring the High-Level Network4-4211. Start the World Wide Web Publishing Service by typing net start w3svc at a command prompt, or by

Pagina 28

PoolsBIG-IP® Reference Guide 4-43The rule variables that can be used for header insertion are:• client_addr• client_port• server_addr• server_port• li

Pagina 29 - Configuration

Chapter 4: Configuring the High-Level Network4-44Quality of Service (QoS) levelAnother attribute of a pool is the Quality of Service (QoS) level. The

Pagina 30 - Base network configuration

PoolsBIG-IP® Reference Guide 4-45Figure 4.14 shows how to configure a pool so that a ToS level is set for a packet sent to that pool. In this example,

Pagina 31 - BIG-IP® Reference Guide 1-5

Chapter 4: Configuring the High-Level Network4-46To disable a SNAT or NAT connection for a pool from thecommand lineb pool <pool_name> modify {

Pagina 32 - The BIG-IP user interface

PoolsBIG-IP® Reference Guide 4-47Figure 4.16 shows the resulting entries in the /config/bigip.conf file.Figure 4.16 Sample entries in the /config/bi

Pagina 33 - BIG-IP® Reference Guide 1-7

Chapter 4: Configuring the High-Level Network4-48Forwarding pools are typically used with wildcard virtual servers or network virtual servers only. Wh

Pagina 34

RulesBIG-IP® Reference Guide 4-49RulesAs described in the Pools section, a pool may be referenced directly by the virtual server, or indirectly throug

Pagina 35 - The bigip.conf file

Introduction• IMPORTANT HARDWARE INFORMATION• Getting started• Using the Administrator Kit• What’s new in version 4.2• Learning more about the BIG-IP

Pagina 36 - Chapter 1

Chapter 4: Configuring the High-Level Network4-50Rule-based pool selectionTable 4.9 lists the various criteria you can use when creating a rule to sel

Pagina 37 - Using the Setup Utility

RulesBIG-IP® Reference Guide 4-51Rules normally run right after the BIG-IP receives a packet that does not match a current connection. However, in the

Pagina 38

Chapter 4: Configuring the High-Level Network4-52IP addressesYou can specify the client_addr or the server_addr variable within a rule to select a poo

Pagina 39 - BIG-IP® Reference Guide 2-1

RulesBIG-IP® Reference Guide 4-53To configure a rule to select a pool based on an IP protocol number, use the syntax shown in the example in Figure 4.

Pagina 40

Chapter 4: Configuring the High-Level Network4-54To configure a rule to select a pool based on the ToS level of a packet, you can use the ip_tos rule

Pagina 41 - BIG-IP® Reference Guide 2-3

RulesBIG-IP® Reference Guide 4-55Using the one of operator instead, you can cause BIG-IP to load balance all incoming AOL connections to the pool aol_

Pagina 42 - Keyboard type

Chapter 4: Configuring the High-Level Network4-56Figure 4.28 shows the resulting numeric type of class: Figure 4.28 An example of a numeric type of c

Pagina 43 - Host name

RulesBIG-IP® Reference Guide 4-57indicated node address and port. When a rule returns both a pool and a node, the BIG-IP does not do any additional lo

Pagina 44 - Redundant system settings

Chapter 4: Configuring the High-Level Network4-58The preceding rule applies the format string to the URL. In this case, the format string sets the pro

Pagina 45 - Assigning interfaces to VLANs

RulesBIG-IP® Reference Guide 4-59• Subjects that stay the same are called constant operands. A question, or expression, asks questions about variable

Pagina 47 - Setting the time zone

Chapter 4: Configuring the High-Level Network4-60case of a rule containing questions about an HTTP request, the rule is evaluated in the context of th

Pagina 48 - Configuring NTP support

RulesBIG-IP® Reference Guide 4-61OperatorsIn a rule, relational operators compare two operands to form relational expressions. Possible relational ope

Pagina 49 - BIG-IP® Reference Guide 2-11

Chapter 4: Configuring the High-Level Network4-62Cache statementsA cache statement may be either the only statement in a rule or it may be nested with

Pagina 50

RulesBIG-IP® Reference Guide 4-632. Click the Add button.The Add Rule screen opens. 3. In the Add Rule screen, fill in the fields to add a rule.You ca

Pagina 51 - Configuring remote access

Chapter 4: Configuring the High-Level Network4-64Configuring a remote origin serverTo ensure that a remote origin server or cache server responds to t

Pagina 52 - Chapter 2

RulesBIG-IP® Reference Guide 4-65Additional rule examplesThis section contains additional examples of rules including:• Cookie rule• Language rule• Ca

Pagina 53

Chapter 4: Configuring the High-Level Network4-66Cache ruleFigure 4.34 shows an example of a rule that you can use to send cache content, such as .gif

Pagina 54

RulesBIG-IP® Reference Guide 4-67Rule using the ip_protocol variableFigure 4.36 shows a rule that uses the ip_protocol variable. Rule using IP address

Pagina 55

Chapter 4: Configuring the High-Level Network4-68Rule using the one of operatorA good use of the one of operator in a rule is when you have a class su

Pagina 56 - Interfaces

Virtual serversBIG-IP® Reference Guide 4-69Virtual serversA virtual server with its virtual address is the visible, routable entity through which node

Pagina 57 - BIG-IP® Reference Guide 3-3

IntroductionBIG-IP® Reference Guide Intro - 1IMPORTANT HARDWARE INFORMATIONReferences to hardware and upgrades contained in this document are specific

Pagina 58 - Media type and duplex mode

Chapter 4: Configuring the High-Level Network4-70Standard virtual serversA standard virtual server represents a specific site, such as an Internet web

Pagina 59 - BIG-IP® Reference Guide 3-5

Virtual serversBIG-IP® Reference Guide 4-71creating VLAN groups and assigning self IP addresses to them, see Chapter 3, Creating VLAN groups, on page

Pagina 60 - Default VLAN configuration

Chapter 4: Configuring the High-Level Network4-72VLAN disabled list applies to default wildcard virtual servers only. You cannot create a VLAN disable

Pagina 61 - BIG-IP® Reference Guide 3-7

Virtual serversBIG-IP® Reference Guide 4-73To turn off port translation for a wildcard virtual serverusing the Configuration utilityAfter you define t

Pagina 62 - Tag-based access to VLANs

Chapter 4: Configuring the High-Level Network4-74To create a default wildcard virtual server from thecommand lineTo create a default wildcard virtual

Pagina 63 - BIG-IP® Reference Guide 3-9

Virtual serversBIG-IP® Reference Guide 4-75For example, the following commands define two wildcard virtual servers, the first for VLAN internal, and t

Pagina 64 - Configuration procedures

Chapter 4: Configuring the High-Level Network4-76Forwarding virtual serversA forwarding virtual server is just like other virtual servers, except that

Pagina 65 - BIG-IP® Reference Guide 3-11

Virtual serversBIG-IP® Reference Guide 4-77other side of the BIG-IP to forward packets to virtual servers receiving connections from the transparent d

Pagina 66

Chapter 4: Configuring the High-Level Network4-78Mirroring virtual server stateMirroring provides seamless recovery for current connections, persisten

Pagina 67 - BIG-IP® Reference Guide 3-13

Virtual serversBIG-IP® Reference Guide 4-79The following example shows the two commands used to enable mirroring for virtual server v1 on the FTP cont

Pagina 68 - Creating VLAN groups

Chapter IntroIntro - 2The Configuration utilityThe Configuration utility is a web-based application that you use to configure and monitor the load bal

Pagina 69 - To create a VLAN group

Chapter 4: Configuring the High-Level Network4-80Again, even when you define a custom netmask and broadcast in a specific network virtual server defin

Pagina 70 - Setting up security for VLANs

Virtual serversBIG-IP® Reference Guide 4-81To enable or disable port translationUse the following syntax to enable or disable port translation for a v

Pagina 71

Chapter 4: Configuring the High-Level Network4-82To set dynamic connection rebinding from the commandlineTo manage dynamic connection rebinding using

Pagina 72 - Self IP addresses

Virtual serversBIG-IP® Reference Guide 4-83Each of these elements is described in Table 4.16.Turning software acceleration off for virtual servers usi

Pagina 73 - BIG-IP® Reference Guide 3-19

Chapter 4: Configuring the High-Level Network4-84For example, if you want to define the virtual server 10.10.10.50:80 with the pool IPFW_pool and acce

Pagina 74 - Spanning Tree Protocol (STP)

Virtual serversBIG-IP® Reference Guide 4-85If you want to disable or enable a virtual server for one or more specific VLANs only, use the following sy

Pagina 75 - BIG-IP® Reference Guide 3-21

Chapter 4: Configuring the High-Level Network4-86Using other BIG-IP features with virtual serversAfter you create a pool and define a virtual server t

Pagina 76

ProxiesBIG-IP® Reference Guide 4-87ProxiesBIG-IP supports two types of proxies--An SSL Accelerator proxy, and a content converter proxy. Using either

Pagina 77 - Port Mirroring

Chapter 4: Configuring the High-Level Network4-88Table 4.17 lists the configurable SSL proxy options.Creating an SSL Accelerator ProxyWhen creating an

Pagina 78 - For example:

ProxiesBIG-IP® Reference Guide 4-89To create an SSL proxy using the Configuration utility1. In the navigation pane, click Proxies.The Proxies screen o

Pagina 79

IntroductionBIG-IP® Reference Guide Intro - 3◆ BIG-IP Reference GuideThis guide provides detailed configuration information for the BIG-IP. It also pr

Pagina 80

Chapter 4: Configuring the High-Level Network4-90Configuring SSL-to-ServerOnce the SSL Accelerator proxy has decrypted a client request, you might wan

Pagina 81

ProxiesBIG-IP® Reference Guide 4-91Figure 4.43 shows the state of the /config/bigip.conf file, after creating an SSL proxy with SSL-to-Server enabled.

Pagina 82

Chapter 4: Configuring the High-Level Network4-92serverssl enable \serverssl key my.client.net.key \serverssl cert my.client.net.crtFigure 4.44 shows

Pagina 83 - Working with pools

ProxiesBIG-IP® Reference Guide 4-93To verify server certificates from the command lineThis option is specified as serverssl server cert on the bigpipe

Pagina 84

Chapter 4: Configuring the High-Level Network4-94Basic authentication optionsYou can configure an SSL proxy to handle authentication of clients in thr

Pagina 85 - Load balancing method

ProxiesBIG-IP® Reference Guide 4-95To modify per-session authentication using theConfiguration utilityYou can modify the SSL proxy to require authenti

Pagina 86 - Dynamic ratio

Chapter 4: Configuring the High-Level Network4-96• Client certificate fields• Client session IDsAn example of when you might want to insert a header i

Pagina 87 - Predictive

ProxiesBIG-IP® Reference Guide 4-97To insert a custom header from the command lineTo insert a custom header into an HTTP request using the command lin

Pagina 88

Chapter 4: Configuring the High-Level Network4-98To insert a cipher specification from the command lineSpecify the cipher insert argument with the big

Pagina 89 - BIG-IP® Reference Guide 4-9

ProxiesBIG-IP® Reference Guide 4-99To insert fields of a client certificate using theConfiguration utility1. In the navigation pane, click Proxies. 2.

Pagina 90 - 192.168.200.52 ratio = 1

Chapter IntroIntro - 4Identifying command syntaxWe show complete commands in bold Courier text. Note that we do not include the corresponding screen p

Pagina 91 - BIG-IP® Reference Guide 4-11

Chapter 4: Configuring the High-Level Network4-100• A header in which the session ID is the current session ID. The proper format of this header is S

Pagina 92

ProxiesBIG-IP® Reference Guide 4 - 101the client connection being closed. If the client is using a browser, the userwill likely receive an error messa

Pagina 93 - BIG-IP® Reference Guide 4-13

Chapter 4: Configuring the High-Level Network4-102To specify invalid protocol versions using the Configurationutility1. In the navigation pane, click

Pagina 94

ProxiesBIG-IP® Reference Guide 4 - 1034. If the file is still not found, the proxy uses the same file name as that of the configured certificate. For

Pagina 95 - BIG-IP® Reference Guide 4-15

Chapter 4: Configuring the High-Level Network4-104configure the proxy to generate these symbolic links. If you do not specify a Trusted CA path, or th

Pagina 96 - Configuring SNMP servers

ProxiesBIG-IP® Reference Guide 4 - 105To advertise a list of trusted CAs using the Configurationutility1. In the navigation pane, click Proxies. 2. Cl

Pagina 97 - BIG-IP® Reference Guide 4-17

Chapter 4: Configuring the High-Level Network4-106Rewriting the protocol nameThis feature allows the SSL proxy to rewrite the HTTP protocol name to HT

Pagina 98

ProxiesBIG-IP® Reference Guide 4 - 107To configure the rewrite feature using the Configurationutility1. In the navigation pane, click Proxies. 2. Clic

Pagina 99 - BIG-IP® Reference Guide 4-19

Chapter 4: Configuring the High-Level Network4-108Server-side timeout values. A single, server-side timeout value is configured globally. This timeou

Pagina 100

ProxiesBIG-IP® Reference Guide 4 - 109The client-side values for the maximum size of the session cache are configured on a per-proxy basis. A single,

Pagina 101 - Persistence

IntroductionBIG-IP® Reference Guide Intro - 5• Individual bigpipe commands have online help, including command syntax and examples, in standard UNIX m

Pagina 102 - Persistence options

Chapter 4: Configuring the High-Level Network4-110This option is configured globally, and by default is set to disable.NoteIn redundant configurations

Pagina 103 - Simple persistence

ProxiesBIG-IP® Reference Guide 4 - 111To configure SSL shutdowns using the Configuration utility1. In the navigation pane, click System. 2. Click the

Pagina 104 - Configuration utility

Chapter 4: Configuring the High-Level Network4-112Adding a last hop pool to an SSL proxyIn cases where you have more than one router sending connectio

Pagina 105 - Insert mode

ProxiesBIG-IP® Reference Guide 4 - 113To configure the on-the-fly conversion software1. On the BIG-IP, bring up the Akamai configuration file /config/

Pagina 106 - Rewrite mode

Chapter 4: Configuring the High-Level Network4-114When the content converter proxy is written in the /config/bigip.conf file, it looks like the exampl

Pagina 107 - Passive mode

ProxiesBIG-IP® Reference Guide 4 - 115For example, if you want to view configuration information for the SSL proxy 209.100.19.22:443, type the followi

Pagina 108 - Hash mode

Chapter 4: Configuring the High-Level Network4-116NodesNodes are the network devices to which the BIG-IP passes traffic. A network device becomes a no

Pagina 109

NodesBIG-IP® Reference Guide 4 - 117To mark a node up, use the node command with the up option: b node 192.168.21.1 upTo mark a particular service dow

Pagina 110 - SSL persistence

Chapter 4: Configuring the High-Level Network4-118The report shows the following information:• Current number of connections• Total number of connecti

Pagina 111 - SIP Call-ID persistence

ServicesBIG-IP® Reference Guide 4 - 119ServicesServices are the standard Internet applications supported by BIG-IP, such as HTTP, HTTPs, FTP, and POP

Pagina 112

iiProduct VersionThis manual applies to version 4.2 of the BIG-IP® product family.Legal NoticesCopyrightInformation in this document is subject to cha

Pagina 113 - WTS persistence

Chapter IntroIntro - 6New filter for rewriting HTTP redirectionsThis release provides an ISAPI filter, called redirectfilter.dll, which allows IIS ser

Pagina 114

Chapter 4: Configuring the High-Level Network4-120To set connection limits on servicesUse the following syntax to set the maximum number of concurrent

Pagina 115 - BIG-IP® Reference Guide 4-35

ServicesBIG-IP® Reference Guide 4 - 121For example, the following command sets the UDP timeout to 300 seconds for port 53:b service 53 timeout udp 300

Pagina 116

Chapter 4: Configuring the High-Level Network4-122Address translation: SNATs, NATs, and IP forwardingThe BIG-IP uses address translation and forwardin

Pagina 117 - HTTP redirection

Address translation: SNATs, NATs, and IP forwardingBIG-IP® Reference Guide 4 - 123The attributes you can configure for a SNAT are shown in Table 4.23.

Pagina 118

Chapter 4: Configuring the High-Level Network4-124To configure SNAT global properties from the commandlineConfiguring global properties for a SNAT req

Pagina 119 - BIG-IP® Reference Guide 4-39

Address translation: SNATs, NATs, and IP forwardingBIG-IP® Reference Guide 4 - 125To add a default SNAT manually using the Configurationutility1. In t

Pagina 120

Chapter 4: Configuring the High-Level Network4-126To add a manual SNAT from the command lineThe bigpipe snat command defines one SNAT for one or more

Pagina 121 - Rewriting HTTP redirection

Address translation: SNATs, NATs, and IP forwardingBIG-IP® Reference Guide 4 - 127•When the equivalent of a default SNAT, that is, a SNAT that continu

Pagina 122 - HTTP header insertion

Chapter 4: Configuring the High-Level Network4-128•If you enable snat automap on more than one self IP address, (implying more than one IP network), t

Pagina 123 - BIG-IP® Reference Guide 4-43

Address translation: SNATs, NATs, and IP forwardingBIG-IP® Reference Guide 4 - 1292. Click the SNATs tab.3. Click the Add button.The Add SNAT screen o

Pagina 124 - Type of Service (ToS) level

IntroductionBIG-IP® Reference Guide Intro - 7SSL Accelerator proxy enhancementsThis release includes several important enhancements to the SSL Acceler

Pagina 125

Chapter 4: Configuring the High-Level Network4-130To create the equivalent of a default SNAT, it is necessary to assign each unit its own floating sel

Pagina 126

Address translation: SNATs, NATs, and IP forwardingBIG-IP® Reference Guide 4 - 131• If multiple external interfaces are not available, the ISP routers

Pagina 127 - Forwarding pools

Chapter 4: Configuring the High-Level Network4-132To enable mirroring for redundant systemsThe following example sets SNAT mirroring for all SNAT conn

Pagina 128

Address translation: SNATs, NATs, and IP forwardingBIG-IP® Reference Guide 4 - 133The IP addresses that identify nodes on the BIG-IP internal network

Pagina 129 - BIG-IP® Reference Guide 4-49

Chapter 4: Configuring the High-Level Network4-134The following example shows a NAT definition:b nat 10.10.10.10 to 10.12.10.10To delete NATsUse the f

Pagina 130 - Rule-based pool selection

Address translation: SNATs, NATs, and IP forwardingBIG-IP® Reference Guide 4 - 135• You must delete a NAT before you can redefine it. • The interface

Pagina 131

Chapter 4: Configuring the High-Level Network4-136Enabling IP forwarding globallyIP forwarding is a global property of the BIG-IP system. To set up IP

Pagina 132 - IP protocol numbers

Health monitorsBIG-IP® Reference Guide 4 - 137Health monitorsHealth monitors verify connections and services on nodes that are members of load balanci

Pagina 133 - BIG-IP® Reference Guide 4-53

Chapter 4: Configuring the High-Level Network4-138This creates a new monitor in /config/bigip.conf, as shown in Figure 4.52. You can display this moni

Pagina 134

Health monitorsBIG-IP® Reference Guide 4 - 139Selecting the monitor templateSelecting a template is straightforward. Like icmp, each of the templates

Pagina 135 - Class types

Chapter IntroIntro - 8Health monitor enhancementsIn addition to the standard SNMP health monitor template included in BIG-IP, this release now include

Pagina 136 - Predefined lists

Chapter 4: Configuring the High-Level Network4-140Using tcp_echoThe tcp_echo template uses Transmission Control Protocol. The check is successful if a

Pagina 137 - Rule-based HTTP redirection

Health monitorsBIG-IP® Reference Guide 4 - 141Both transparent and reverse modes are options. (For more information about transparent and reverse mode

Pagina 138 - Rule statements

Chapter 4: Configuring the High-Level Network4-142Using httpsThe https template is for Hypertext Transfer Protocol Secure. An https monitor attempts t

Pagina 139 - Variable operands (variables)

Health monitorsBIG-IP® Reference Guide 4 - 143URL as a value and automatically fills in the dest value with the address the URL resolves to. (For more

Pagina 140

Chapter 4: Configuring the High-Level Network4-144Using snmp_dcaThe snmp_dca template is used for load balancing traffic to servers that are running a

Pagina 141 - Operators

Health monitorsBIG-IP® Reference Guide 4 - 145Using nntpThe nntp template is for Usenet News. The check is successful if the monitor retrieves a newsg

Pagina 142 - Configuring rules

Chapter 4: Configuring the High-Level Network4-146if the specified message number is retrieved. An imap monitor requires username, password, and a fol

Pagina 143 - BIG-IP® Reference Guide 4-63

Health monitorsBIG-IP® Reference Guide 4 - 147NoteServers to be checked by an imap monitor typically require special configuration to maintain a high

Pagina 144 - Element Description

Chapter 4: Configuring the High-Level Network4-1483. In the Add Monitor screen, type in the name of your monitor (it must be different from the monito

Pagina 145 - Additional rule examples

Health monitorsBIG-IP® Reference Guide 4 - 149Entering string valuesExcept for interval, timeout, and dest, you should enter all attribute values as q

Pagina 146 - AOL rule

IntroductionBIG-IP® Reference Guide Intro - 9◆ The BIG-IP special purpose productsThe special purpose BIG-IP provides the ability to choose from three

Pagina 147 - BIG-IP® Reference Guide 4-67

Chapter 4: Configuring the High-Level Network4-150Setting destinationsBy default, all dest values are set to the wildcard "*" or "*:*&q

Pagina 148

Health monitorsBIG-IP® Reference Guide 4 - 151In transparent mode, the monitor is forced to ping through the node it is associated with, usually a fir

Pagina 149 - Virtual servers

Chapter 4: Configuring the High-Level Network4-152user name and password for the new login, as well as which databases the login is allowed to access.

Pagina 150 - Standard virtual servers

Health monitorsBIG-IP® Reference Guide 4 - 153To show or delete a monitor using the Configuration utility1. In the navigation pane, click Monitors.A s

Pagina 151 - Wildcard virtual servers

Chapter 4: Configuring the High-Level Network4-154This has the effect of disabling all instances of the monitor, as shown in Figure 4.71. To disable a

Pagina 152

Health monitorsBIG-IP® Reference Guide 4 - 155This creates a monitor instance of http for each of these nodes. You can verify this association using t

Pagina 153

Chapter 4: Configuring the High-Level Network4-156value of *:*. Either or both wildcard symbols can be replaced by an explicit dest value by creating

Pagina 154

Health monitorsBIG-IP® Reference Guide 4 - 15711.12.11.20:80, 11.12.11.21:80, and 11.12.11.21:80 it would produce the following instances, (which are

Pagina 155 - Network virtual servers

Chapter 4: Configuring the High-Level Network4-158The monitors themselves must be configured with the grouping in mind. For example, if the dest value

Pagina 156 - Forwarding virtual servers

Health monitorsBIG-IP® Reference Guide 4 - 1594. If you want to associate more than one monitor, click the Move >> button to add the monitor nam

Pagina 158

Chapter 4: Configuring the High-Level Network4-160In deleting specific monitor instances, it is important to consider how the association was made. If

Pagina 159 - BIG-IP® Reference Guide 4-79

5Configuring Filters• Introduction•IPfilters• Rate filters and rate classes

Pagina 161

Configuring FiltersBIG-IP® Reference Guide 5-1IntroductionFilters control network traffic by setting whether packets are accepted or rejected at the e

Pagina 162

Chapter 55-2IP filtersTypical criteria that you define in IP filters are packet source IP addresses, packet destination IP addresses, and upper-layer

Pagina 163 - BIG-IP® Reference Guide 4-83

Configuring FiltersBIG-IP® Reference Guide 5-3Rate filters and rate classesIn addition to IP filters, you can also define rate filters. Rate filters c

Pagina 164

Chapter 55-4To configure a rate filter using the Configuration utility1. In the navigation pane, click Filters.The IP Filters screen opens.2. Click th

Pagina 165 - Deleting a virtual server

6Configuring a Redundant System• Introduction• Synchronizing configurations between units• Configuring fail-safe settings• Mirroring connection inform

Pagina 167 - The SSL Accelerator proxy

Configuring a Redundant SystemBIG-IP® Reference Guide 6-1IntroductionA BIG-IP redundant system consists of two identically configured BIG-IP units, on

Pagina 168

1BIG-IP Overview• Introduction• What is a BIG-IP?• Configuration• Monitoring and administration• The BIG-IP user interface

Pagina 169 - BIG-IP® Reference Guide 4-89

Chapter 66-2Synchronizing configurations between unitsOnce you complete the initial configuration on the first unit in the system, you can synchronize

Pagina 170 - Configuring SSL-to-Server

Configuring a Redundant SystemBIG-IP® Reference Guide 6-3The bigpipe config sync all command synchronizes the following configuration files:•The commo

Pagina 171 - BIG-IP® Reference Guide 4-91

Chapter 66-45. If you are arming fail-safe, in the Timeout box, type the maximum time allowed for a loss of network traffic before a fail-over occurs.

Pagina 172 - Verifying server certificates

Configuring a Redundant SystemBIG-IP® Reference Guide 6-5The mirror feature is intended for use with long-lived connections, such as FTP, Chat, and Te

Pagina 173 - BIG-IP® Reference Guide 4-93

Chapter 66-6Mirroring virtual server stateMirroring provides seamless recovery for current connections when a BIG-IP fails. When you use the mirroring

Pagina 174 - Per-session authentication

Configuring a Redundant SystemBIG-IP® Reference Guide 6-7Using gateway fail-safeFail-safe features on the BIG-IP provide network failure detection bas

Pagina 175 - Authentication depth

Chapter 66-8To configure gateway fail-safe in BIG/dbTo enable gateway fail-safe in BIG/db, you need to change the settings of three specific BIG/db da

Pagina 176 - A custom HTTP header

Configuring a Redundant SystemBIG-IP® Reference Guide 6-9Using network-based fail-overNetwork-based fail-over allows you to configure your redundant B

Pagina 177 - A cipher specification

Chapter 66-10To clarify how this differs from default behavior, contrast the basic behavior of a BIG-IP in the following description. Each of the two

Pagina 178 - Client certificate fields

Configuring a Redundant SystemBIG-IP® Reference Guide 6-11MAC masquerading is not supported in active-active mode.Configuring an active-active systemT

Pagina 180

Chapter 66-12To enable active-active from the command lineSet the Common.Bigip.Failover.ActiveMode key to 1. Use the following commands on each unit t

Pagina 181 - Configuring cipher lists

Configuring a Redundant SystemBIG-IP® Reference Guide 6-13Task 4: Checking the BIG-IP unit numberUsing the bigpipe db get *unit* command, check the va

Pagina 182 - Building a certificate chain

Chapter 66-14Each BIG-IP in an active-active configuration requires a unit number: either a 1 or a 2. Use the Setup utility to specify a unit number

Pagina 183 - Verifying certificates

Configuring a Redundant SystemBIG-IP® Reference Guide 6-15To synchronize the configuration using the Configurationutility1. In the navigation pane, cl

Pagina 184 - Advertising a Trusted CA list

Chapter 66-16Disabling automatic fail backIn some cases, you may not want connections to automatically failback. The fact that a machine has resumed o

Pagina 185

Configuring a Redundant SystemBIG-IP® Reference Guide 6-17◆ Local.Bigip.Failover.UnitIdThis is the default unit number of the BIG-IP. This value is se

Pagina 186 - Selecting URIs to rewrite

Chapter 66-18Reviewing specific active-active bigpipe commandsThere are several specific commands included in bigpipe to support active-active configu

Pagina 189

bigpipe commandsBIG-IP® Reference Guide 7-1bigpipe commandsThis chapter lists the various bigpipe commands, including syntax requirements and function

Pagina 190 - Forcing clean SSL shutdowns

BIG-IP OverviewBIG-IP® Reference Guide 1-1IntroductionThis chapter provides a brief overview of the BIG-IP software and the configuration and monitori

Pagina 191 - Disabling ARP requests

Chapter 7: bigpipe Command Reference7-2makecookie Loads the BIG-IP configuration without resetting the current configuration. 7-21merge Loads a saved

Pagina 192 - The content converter proxy

-?BIG-IP® Reference Guide 7-3-?For certain commands, displays online help, including complete syntax, description, and other related information. For

Pagina 193

Chapter 7: bigpipe Command Reference7-4classCreates, shows, and deletes any classes, such as class AOL. Default classes are also shown.The BIG-IP incl

Pagina 194 - Additional proxy tasks

configBIG-IP® Reference Guide 7-5configSynchronizes configurations of two BIG-IP units in a redundant system by collecting and copying the configurati

Pagina 195

Chapter 7: bigpipe Command Reference7-6Installing an archived configuration fileconfig install <file> reinstalls the archived configuration file

Pagina 196

connBIG-IP® Reference Guide 7-7connDisplays information about current client connections to virtual addresses and virtual servers.The following comman

Pagina 197

Chapter 7: bigpipe Command Reference7-8default_gatewayThis command creates, shows, or deletes a pool of default gateways, with nodes in the pool corre

Pagina 198

failoverBIG-IP® Reference Guide 7-9failoverThis group of commands affects the fail-over status of the BIG-IP or 3-DNS system.In an active/standby or a

Pagina 199 - Services

Chapter 7: bigpipe Command Reference7-10globalauto_lasthopWhen this variable is enabled, it automatically designates the lasthop router inside IP addr

Pagina 200

globalBIG-IP® Reference Guide 7-11fastest_max_idle_timeSets the number of seconds a node can be left idle by the fastest load balancing mode. This for

Pagina 201 - To display service settings

Chapter 11-2Figure 1.1 A basic configurationInsertion of the BIG-IP, with its minimum of two interfaces, divides the network into an external VLAN an

Pagina 202

Chapter 7: bigpipe Command Reference7-12To disarm fail-safe on the gateway, enter the following command: b global gateway failsafe disarmTo see the cu

Pagina 203

globalBIG-IP® Reference Guide 7-13The following command sets this variable to open the Telnet port (23) to allow administrative Telnet connections. Th

Pagina 204 - Configuring a SNAT manually

Chapter 7: bigpipe Command Reference7-14open_failover_portsThis variable enables or disables network failover when a VLAN has port lockdown enabled.Th

Pagina 205 - [netmask <ip>]

globalBIG-IP® Reference Guide 7-15The following command resets the timer only when the persistent connection is initiated. b global persist timer time

Pagina 206 - Configuring SNAT automapping

Chapter 7: bigpipe Command Reference7-16Setting log levels only for TCP trafficThe following command turns on only TCP port denial logging, which logs

Pagina 207

-h and -helpBIG-IP® Reference Guide 7-17-h and -helpDisplays the bigpipe command syntax or usage text for all current commands.NoteMore detailed man p

Pagina 208

Chapter 7: bigpipe Command Reference7-18interfaceDisplays names of installed network interface cards and allows you to set properties for each network

Pagina 209

loadBIG-IP® Reference Guide 7-19loadResets all of the BIG-IP settings and then loads the configuration settings, by default from the /config/bigip.con

Pagina 210 - ISPs and NAT-less firewalls

Chapter 7: bigpipe Command Reference7-20maintToggles a BIG-IP into and out of Maintenance mode. When in Maintenance mode, a BIG-IP accepts no new conn

Pagina 211

makecookieBIG-IP® Reference Guide 7-21makecookieGenerates a cookie string with encoding automatically added for cookie persistence Passive mode:b make

Pagina 212 - To clear statistics

BIG-IP OverviewBIG-IP® Reference Guide 1-3Like the physical network itself, you can add software entities like virtual servers and load balancing pool

Pagina 213

Chapter 7: bigpipe Command Reference7-22mergeUse the merge command to load the BIG-IP configuration from <file_name> without resetting the curre

Pagina 214 - Additional restrictions

mirrorBIG-IP® Reference Guide 7-23mirrorFor the BIG-IP Application Switch, you can copy traffic from any port or set of ports to a single, separate po

Pagina 215 - IP forwarding

Chapter 7: bigpipe Command Reference7-24monitorDefines a health monitor. A health monitor is a configuration object that defines how and at what inter

Pagina 216

monitorBIG-IP® Reference Guide 7-25external run ""args ""ftp username "anonymous"password "bigip1@internal"get

Pagina 217 - Health monitors

Chapter 7: bigpipe Command Reference7-26Table 7.4 defines the attributes used in the templates.Attribute Definitioninterval <seconds> Ping frequ

Pagina 218

monitorBIG-IP® Reference Guide 7-27secret Shared secret for radius EAV checking only.folder Folder name for imap EAV checking only.message_num Optiona

Pagina 219 - Using icmp

Chapter 7: bigpipe Command Reference7-28-nUse the -n option in combination with other commands, such as bigpipe virtual, to display services and IP ad

Pagina 220 - Using tcp

natBIG-IP® Reference Guide 7-29natDefines an IP address, routable on the external network, that a node can use to initiate connections to hosts on the

Pagina 221 - Using http

Chapter 7: bigpipe Command Reference7-30nodeDisplays information about nodes and allows you to set properties for nodes, and node addresses. Nodes may

Pagina 222 - Using ftp

poolBIG-IP® Reference Guide 7-31poolCreates, deletes, modifies, or displays pool definitions. You can use pools to group members together with a commo

Pagina 223 - Using smtp

BIG-IP® Reference Guide iiiStandards ComplianceThe product conforms to ANSI/UL Std 1950 and Certified to CAN/CSA Std. C22.2 No. 950.AcknowledgmentsThi

Pagina 224 - Using snmp_dca_base

Chapter 11-4Figure 1.2 Hardware configuration with base and high-level networks superimposed. Hardware configurationThe hardware configuration includ

Pagina 225 - Using imap

Chapter 7: bigpipe Command Reference7-32For more information about the load balancing modes, refer to Load balancing method, on page 4-5.Fastest Membe

Pagina 226 - Using ldap

proxyBIG-IP® Reference Guide 7-33proxyb proxy <ip>:<service> [unit <id>][{] target <virtual|server>> <ip>:<service

Pagina 227 - Configuring a monitor

Chapter 7: bigpipe Command Reference7-34Creates, deletes, modifies, or displays the SSL or content converter proxy definitions on the BIG-IP. For deta

Pagina 228 - Monitor attributes

ratioBIG-IP® Reference Guide 7-35ratioFor the Ratio load balancing mode, this command sets the weight or proportions for one or more node addresses.b

Pagina 229 - Entering string values

Chapter 7: bigpipe Command Reference7-36resetUse the following syntax to clear the configuration values and counter values from memory:b resetUse this

Pagina 230 - Setting destinations

ruleBIG-IP® Reference Guide 7-37ruleCreates, delete, or display the rules on the BIG-IP. Rules allow a virtual server to access any number of pools on

Pagina 231 - Testing SQL service checks

Chapter 7: bigpipe Command Reference7-38If the rule is defined on the bigpipe command line, you can either surround each pair of parentheses in single

Pagina 232 - Running user-added EAVs

saveBIG-IP® Reference Guide 7-39saveWrites the current BIG-IP configuration settings from memory to the configuration files named /config/bigip.conf a

Pagina 233

Chapter 7: bigpipe Command Reference7-40selfDefines a self IP address on a BIG-IP or 3-DNS system. A self IP address is an IP address mapping to a VLA

Pagina 234

serviceBIG-IP® Reference Guide 7-41serviceEnables and disables network traffic on services, and also sets connection limits and timeouts. You can use

Pagina 235 - Using a simple association

BIG-IP OverviewBIG-IP® Reference Guide 1-5sharing.) When you run the Setup utility as the last part of your initial hardware installation and fill in

Pagina 236 - Using node and port aliasing

Chapter 7: bigpipe Command Reference7-42snatDefines one or more addresses that nodes can use as a source IP address when initiating connections to hos

Pagina 237 - Using logical grouping

stpBIG-IP® Reference Guide 7-43stpThe BIG-IP IP Application Switch provides Spanning Tree Protocol (STP) implementation for loop resolution in configu

Pagina 238

Chapter 7: bigpipe Command Reference7-44summaryDisplays a summary of current usage statistics. The output display format for the summary command is sh

Pagina 239

trunkBIG-IP® Reference Guide 7-45trunkThe trunk command aggregates links (individual physical interfaces) to form a trunk. This link aggregation incre

Pagina 240

Chapter 7: bigpipe Command Reference7-46unitThe unit number on a system designates which virtual servers use a particular unit in an active-active red

Pagina 241 - Configuring Filters

verboseBIG-IP® Reference Guide 7-47verboseUsed to modify the verbose log level. This command is an alternative to using the bigpipe global verbose com

Pagina 242

Chapter 7: bigpipe Command Reference7-48verifyParses the command line and checks syntax without executing the specified command. This distinguishes be

Pagina 243

versionBIG-IP® Reference Guide 7-49versionDisplays the version of the BIG-IP operating system and the features enabled.For example, for a BIG-IP HA, t

Pagina 244 - IP filters

Chapter 7: bigpipe Command Reference7-50virtualCreates, deletes, and displays information about virtual servers. This command also sets connection mir

Pagina 245 - Rate filters and rate classes

vlanBIG-IP® Reference Guide 7-51vlanThe vlan command defines VLANs, VLAN mappings, and VLAN properties. By default, each interface on a BIG-IP or 3-DN

Pagina 246

Chapter 11-6Global settings and filtersGlobal settings and filters are part of the configuration that belong to neither the base network nor the high-

Pagina 247

Chapter 7: bigpipe Command Reference7-52vlangroupThe vlangroup command defines a VLAN group, which is a grouping of two or more VLANs belonging to the

Pagina 248

vlangroupBIG-IP® Reference Guide 7-53L2 forwarding must be enabled for the VLAN group using the VLAN proxy_forward attribute. This attribute is enable

Pagina 249

Chapter 7: bigpipe Command Reference7-54

Pagina 250

8Configuring SNMP• Introduction• Downloading the MIBs• Configuring SNMP using the Configuration utility• SNMP configuration files• Configuring snmpd t

Pagina 252

Configuring SNMPBIG-IP® Reference Guide 8-1IntroductionThis chapter covers the management and configuration tasks for the simple network management pr

Pagina 253 - Commands for mirroring

Chapter 88-2◆ Etherlike-MIB.txtThis is a standard MIB which describes statistics for the collection of ethernet interfaces attached to the system. It

Pagina 254 - Mirroring SNAT connections

Configuring SNMPBIG-IP® Reference Guide 8-3Configuring SNMP using the Configuration utilityTo configure SNMP for a remote network management station,

Pagina 255 - Using gateway fail-safe

Chapter 88-4To allow access to the SNMP agent using the Configurationutility1. In the top of the SNMP Administration screen, check the Enable box to a

Pagina 256

Configuring SNMPBIG-IP® Reference Guide 8-53. In the Community String box, type a community name. The community name is a clear text password used for

Pagina 257 - Using network-based fail-over

BIG-IP OverviewBIG-IP® Reference Guide 1-7Figure 1.3 Configuration utility System screenThe left pane of the screen, referred to as the navigation pa

Pagina 258

Chapter 88-6SNMP configuration filesThe SNMP options that you specify in the SNMP Administration screen are written to one or more of the following co

Pagina 259 - BIG-IP® Reference Guide 6-11

Configuring SNMPBIG-IP® Reference Guide 8-7For example, you can type the following line which sets the SNMP agent to accept connections from the IP ad

Pagina 260

Chapter 88-8• trapcommunity <community string>This sets the community string (password) to use for sending traps. If set, it also sends a trap u

Pagina 261 - BIG-IP® Reference Guide 6-13

Configuring SNMPBIG-IP® Reference Guide 8-9You may, however, insert your own regular expressions and map them to the 110.1 OID. The /etc/snmptrap.conf

Pagina 262

Chapter 88-10Use this command to make the agent list on the specified list of sockets instead of the default port, which is port 161. Separate multipl

Pagina 263 - BIG-IP® Reference Guide 6-15

9BIG/db Configuration Keys• Supported BIG/db configuration keys

Pagina 265 - BIG-IP® Reference Guide 6-17

BIG/db Configuration KeysBIG-IP® Reference Guide 9-1Supported BIG/db configuration keysThe BIG/db is a database that contains configuration elements f

Pagina 266

Chapter 99-2To unset a BIG/db configuration keyTo unset a BIG/db configuration key, use the following syntax:b db unset <key>b db unset <regu

Pagina 267

BIG/db Configuration KeysBIG-IP® Reference Guide 9-3StateMirror keysStateMirror keys (Table 9.2) control state mirroring. If you change one of these v

Pagina 268

Chapter 11-8Figure 1.4 Add Pool screenThe Add Pool screen contains fields for all the attributes you can configure for the pool. The bigpipe command

Pagina 269 - BIG-IP® Reference Guide 7-1

Chapter 99-4Using Gateway Pinger keysThe GatewayPinger keys (Table 9.3) control the gateway failsafe pinger. If you change one of these values, you mu

Pagina 270

BIG/db Configuration KeysBIG-IP® Reference Guide 9-5Bigd keysThe Bigd keys (Table 9.4) control the health monitors. If you change one of these values,

Pagina 271 - BIG-IP® Reference Guide 7-3

Chapter 99-6Common.Bigip.CORBA.AddrResolveNumeric="true" Set to "true" causes the CORBA portal to resolve client addresses numeric

Pagina 272

10Configuration Files• BIG-IP configuration files

Pagina 274

Configuration FilesBIG-IP® Reference Guide 10 - 1BIG-IP configuration filesThe following table includes a list of the configuration files on the BIG-I

Pagina 276

11Monitoring and Administration• Monitoring and administration utilities• Using the bigpipe utility as a monitoring tool• Using the Configuration util

Pagina 278

Monitoring and AdministrationBIG-IP® Reference Guide 11 - 1Monitoring and administration utilitiesThe BIG-IP platform provides several utilities for m

Pagina 279 - BIG-IP® Reference Guide 7-11

BIG-IP OverviewBIG-IP® Reference Guide 1-9The bigip.conf fileRegardless of how a pool, virtual server, proxy or other object is configured, whether yo

Pagina 280

Chapter 1111 - 2Monitoring the BIG-IPThe bigpipe summary command displays performance statistics for the BIG-IP itself. This display summary includes

Pagina 281 - BIG-IP® Reference Guide 7-13

Monitoring and AdministrationBIG-IP® Reference Guide 11 - 3Table 11.1 contains descriptions of each individual statistic included in the summary displ

Pagina 282

Chapter 1111 - 4Resetting statistics on the BIG-IPThe bigpipe commands allow you to selectively reset any statistic on the BIG-IP. The statistics you

Pagina 283 - BIG-IP® Reference Guide 7-15

Monitoring and AdministrationBIG-IP® Reference Guide 11 - 5• Secure network address translations (SNATs) • Global statistics When you reset one of the

Pagina 284

Chapter 1111 - 6To reset statistics for node servers and node addressesUse the following syntax to reset statistics for all node addresses and node se

Pagina 285 - -h and -help

Monitoring and AdministrationBIG-IP® Reference Guide 11 - 7Use the following syntax to reset statistics for the NAT for the IP address <orig_ip>

Pagina 286 - Setting the duplex mode

Chapter 1111 - 8Monitoring virtual servers, virtual addresses and servicesYou can use different variations of the bigpipe virtual command, as well as

Pagina 287 - BIG-IP® Reference Guide 7-19

Monitoring and AdministrationBIG-IP® Reference Guide 11 - 9Displaying information about servicesThe bigpipe port show command allows you to display in

Pagina 288

Chapter 1111 - 10To display NAT status from the command lineUse the following command to display the status of all NATs included in the configuration:

Pagina 289 - BIG-IP® Reference Guide 7-21

Monitoring and AdministrationBIG-IP® Reference Guide 11 - 11Using the Configuration utility for administration andmonitoringYou can use the Configurat

Pagina 290

Chapter 11-10

Pagina 291 - Creatingaportmirror

Chapter 1111 - 12Working with the BIG/top utilityBIG/top™ is a real-time statistics display utility. The display shows the date and time of the latest

Pagina 292 - Monitor template attributes

Monitoring and AdministrationBIG-IP® Reference Guide 11 - 13Using runtime commands in BIG/topUnless you specified the -once option, the BIG/top utilit

Pagina 293 - BIG-IP® Reference Guide 7-25

Chapter 1111 - 14Sample log messagesTable 11.3 shows sample log messages to give you an idea of how the Syslog utility tracks events that are specific

Pagina 294

Monitoring and AdministrationBIG-IP® Reference Guide 11 - 15eventually determine that the nodes associated with the server are down, specifically remo

Pagina 295 - BIG-IP® Reference Guide 7-27

Chapter 1111 - 16Removing individual virtual servers, virtual addresses, and ports fromserviceThe BIG-IP also supports taking only selected virtual se

Pagina 296

Monitoring and AdministrationBIG-IP® Reference Guide 11 - 17To enable and disable nodes and node addresses from thecommand lineThe bigpipe node comman

Pagina 297 - BIG-IP® Reference Guide 7-29

Chapter 1111 - 18• Rate filter statistics, including the number of bits passed through, delayed, and dropped by individual rate filters• Information a

Pagina 298

Monitoring and AdministrationBIG-IP® Reference Guide 11 - 19The user accounts you create in the Configuration utility can have full, partial, or read-

Pagina 299 - BIG-IP® Reference Guide 7-31

Chapter 1111 - 20Working with the BIG/db databaseThe BIG/db™ database holds certain configuration information for the BIG-IP. Most BIG-IP utilities cu

Pagina 300

Monitoring and AdministrationBIG-IP® Reference Guide 11 - 21b db unset <key>b db unset <regular_exp>For example, the following command uns

Pagina 301 - BIG-IP® Reference Guide 7-33

2Using the Setup Utility• Creating the initial software configuration with theSetup utility• Connecting to the BIG-IP for the first time• Using the Se

Pagina 302

Chapter 1111 - 22You can customize the BIG/stat utility statistics display. For example, you can customize your output to display statistics for a sin

Pagina 303 - BIG-IP® Reference Guide 7-35

Monitoring and AdministrationBIG-IP® Reference Guide 11 - 23The following table contains descriptions of each of the metrics collected for the BIG-IP.

Pagina 304

Chapter 1111 - 24BIG/stat Item DescriptionBIG-IP cur - Shows the number of current connections handled by the BIG-IPmax - Shows the maximum number of

Pagina 305 - Creatingarule

12Additional Setup Options• Overview of additional setup options• Defining additional host names• Using the MindTerm SSH Console• Downloading the SSH

Pagina 307 - BIG-IP® Reference Guide 7-39

Additional Setup OptionsBIG-IP® Reference Guide 12 - 1Overview of additional setup optionsThis chapter contains details about additional setup options

Pagina 308

Chapter 1212 - 2This sample hosts file lists the IP addresses for the default router, the internal VLAN, and the external VLAN, and it contains placeh

Pagina 309 - BIG-IP® Reference Guide 7-41

Additional Setup OptionsBIG-IP® Reference Guide 12 - 3Downloading the SSH client to your administrativeworkstationFrom BIG-IP units that support encry

Pagina 310

Chapter 1212 - 46. In the Connection tab, in the Remote Host section, type the following items:•In the Host Name box, type the BIG-IP IP address or ho

Pagina 311 - BIG-IP® Reference Guide 7-43

Additional Setup OptionsBIG-IP® Reference Guide 12 - 5◆ Configuring email on the BIG-IPThere are some special requirements that you need to take into

Pagina 313 - BIG-IP® Reference Guide 7-45

Chapter 1212 - 62. Click the System tab.Look in the Default Gateway Pool list for the name of the default gateway pool. Make sure you have the pool na

Pagina 314

Additional Setup OptionsBIG-IP® Reference Guide 12 - 7Case 2: Different LANsIf you have nodes on different LANs from the BIG-IP, you need to add a sta

Pagina 315 - BIG-IP® Reference Guide 7-47

Chapter 1212 - 8online documentation (in the Configuration utility home screen, under the Online Documentation section, click GateD). Note that the Ga

Pagina 316

Additional Setup OptionsBIG-IP® Reference Guide 12 - 9In place of the <DNS_SERVER_1> parameter, use the IP address of a properly configured name

Pagina 317 - BIG-IP® Reference Guide 7-49

Chapter 1212 - 10Converting from rotary or round robin DNSIf your network is currently configured to use rotary DNS, your node configuration may not n

Pagina 318

Additional Setup OptionsBIG-IP® Reference Guide 12 - 11Setting up SendmailWhen you actually set up Sendmail, you need to open and edit a couple of con

Pagina 319 - BIG-IP® Reference Guide 7-51

Chapter 1212 - 12◆ A serial terminal configured as the console displays system messages and warnings in addition to providing a login prompt. In this

Pagina 320

Additional Setup OptionsBIG-IP® Reference Guide 12 - 13Configuring a serial terminal in addition to the consoleYou can configure a serial terminal for

Pagina 321 - VLAN group is enabled

Chapter 1212 - 14Forcing a serial terminal to be the consoleIn the case where you have not yet connected the serial terminal or it is not active when

Pagina 322

Additional Setup OptionsBIG-IP® Reference Guide 12 - 152. Create the file /etc/raddb/servers. Each line should contain the host name of the radius ser

Pagina 323

Using the Setup UtilityBIG-IP® Reference Guide 2-1Creating the initial software configuration with the SetuputilityOnce you install and connect the ha

Pagina 324

Chapter 1212 - 16To configure an LDAP server that stores encryptedpasswordsIn some LDAP servers, passwords are stored encrypted with DES, or stored as

Pagina 325 - Downloading the MIBs

Additional Setup OptionsBIG-IP® Reference Guide 12 - 172. Locate the default authentication type. Change the tc value to point to the new ldap-default

Pagina 326

Chapter 1212 - 18name. This is useful because you need to be able to log in even if the authentication server is down (or if its name gets changed and

Pagina 329 - Configuring traps

GlossaryBIG-IP® Reference Guide Glossary - 1Any IP TrafficAny IP Traffic is a feature that allows the BIG-IP to load balance protocols other than TCP

Pagina 330 - SNMP configuration files

GlossaryGlossary - 2cacheable content expression The cacheable content expression determines, based on evaluating variables in the HTTP header of the

Pagina 331 - /etc/snmpd.conf

GlossaryBIG-IP® Reference Guide Glossary - 3If you specify a value for hot pool, but do not specify a value for this variable, the cache statement use

Pagina 332 - /etc/snmptrap.conf

GlossaryGlossary - 4platforms equipped with Windows Management Instrumentation (WMI), or on a server equipped with either the UC Davis SNMP agent or W

Pagina 333 - BIG-IP® Reference Guide 8-9

GlossaryBIG-IP® Reference Guide Glossary - 5FDDI (Fiber Distributed Data Interface)FDDI is a multi-mode protocol used for transmitting data on optical

Pagina 335

Chapter 22-2Running the Setup utility remotelyYou can run the Setup utility remotely only from a workstation that is on the same LAN as the unit. To a

Pagina 336

GlossaryGlossary - 6content subsets used for content striping. Requests for hot content are redirected to a cache server in the hot pool, a designated

Pagina 337 - BIG-IP® Reference Guide 9-1

GlossaryBIG-IP® Reference Guide Glossary - 7internal VLANThe internal VLAN is a default VLAN on the BIG-IP. In a basic configuration, this VLAN has th

Pagina 338 - Failover and cluster keys

GlossaryGlossary - 8MAC (Media Access Control)MAC is a protocol that defines the way workstations gain access to transmission media, and is most widel

Pagina 339 - StateMirror keys

GlossaryBIG-IP® Reference Guide Glossary - 9specific to a service type, for example, HTTP and FTP. The template has a template type that corresponds t

Pagina 340 - Using Gateway Pinger keys

GlossaryGlossary - 10Observed modeObserved mode is a dynamic load balancing mode that bases connection distribution on a combination of two factors:

Pagina 341 - Other keys

GlossaryBIG-IP® Reference Guide Glossary - 11Predictive modePredictive mode is a dynamic load balancing mode that bases connection distribution on a c

Pagina 342 - Table 9.5 Other BIG/db keys

GlossaryGlossary - 12RFC 1918 addressesAn RFC 1918 address is an address that is within the range of non-routable addresses described in the IETF RFC

Pagina 343

GlossaryBIG-IP® Reference Guide Glossary - 13spanning tree protocol (STP)Spanning tree protocol is a protocol that provides loop resolution in configu

Pagina 344

GlossaryGlossary - 14transparent nodeA transparent node appears as a router to other network devices, including the BIG-IP.trunkA trunk is a combinati

Pagina 345 - BIG-IP configuration files

GlossaryBIG-IP® Reference Guide Glossary - 15wildcard virtual serverA wildcard virtual server is a virtual server that uses an IP address of 0.0.0.0,

Pagina 346 - Chapter 10

Using the Setup UtilityBIG-IP® Reference Guide 2-3If the alternate network is present on the LAN, 192.168.245.0/24, or if the node address 192.168.1.2

Pagina 347

GlossaryGlossary - 16

Pagina 350 - Monitoring the BIG-IP

IndexBIG-IP® Reference Guide Index - 1/config/aliases file 12-11/config/bigip.conf 7-39/config/gated.conf file 12-7/config/routes file 12-8/co

Pagina 351

IndexIndex - 2bigpipe 4-9bigpipe commands 7-1and active-active mode 6-18config 7-5conn 7-7displaying active data 6-17failover 7-8, 7-9gl

Pagina 352

IndexBIG-IP® Reference Guide Index - 3client certificate authentication 4-91client certificate fieldsinserting as headers 4-95, 4-98client certifi

Pagina 353

IndexIndex - 4default IP addressesalternate address 2-2andIPalias 2-2overview 2-1preferred address 2-2default root password 2-1default route

Pagina 354

IndexBIG-IP® Reference Guide Index - 5GGateDconfiguration file 12-7documentation 12-7dynamic routing 12-7gateway command 7-11gateway fail-safe

Pagina 355 - To reset global statistics

IndexIndex - 6Iicmp monitor 4-139iControl 2-12IDsinserting 4-99if statements 4-58IIS serversand redirection 4-105for rewriting redirections

Pagina 356

IndexBIG-IP® Reference Guide Index - 7MMAC addresses 3-17MAC masquerade 3-17maint command 7-20, 11-15Maintenance mode, activating 11-15masked

Pagina 357 - Monitoring NATs

Chapter 22-4To start the Setup utility from the command line from aremote administrative workstation1. Start an SSH client on a workstation connected

Pagina 358 - Monitoring SNATs

IndexIndex - 8Ppacket activity, displaying 11-12packet counters, resetting 11-5packet header variables 4-59packet statistics 11-1packet status

Pagina 359 - Adding a user

IndexBIG-IP® Reference Guide Index - 9Quality of Service levelSee QoS levelRRADIUS authentication 12-14challenge-response authentication 12-18radi

Pagina 360 - Using BIG/top command options

IndexIndex - 10creating 4-62defined 4-1, 4-49, 7-37elements 4-63example 4-52load balancing pools 7-37referencing pools 4-50Ssave command

Pagina 361 - Option Description

IndexBIG-IP® Reference Guide Index - 11connection limits 4-123defined 4-122defining 4-122disabling 4-45global properties 4-123TCP idle conne

Pagina 362 - Powering down the BIG-IP

IndexIndex - 12TTable 4-63tagged interfacesdefined 3-8tagsembedding in packet headers 3-9target IP addressesSee destination IP addressesTCP conn

Pagina 363

IndexBIG-IP® Reference Guide Index - 13variable operandsand rules 4-59defined 4-58types 4-59variables 4-51, 4-59verbose command 7-47verbose

Pagina 364

IndexIndex - 14

Pagina 365 - Viewing system statistics

Using the Setup UtilityBIG-IP® Reference Guide 2-5• US + Cyrillic• US - Standard 101 key (default)• United KingdomProduct selectionIf you are configur

Pagina 366 - Changing passwords

Chapter 22-6Configuring a default gateway poolIf a BIG-IP does not have a predefined route for network traffic, the unit automatically sends traffic t

Pagina 367

Using the Setup UtilityBIG-IP® Reference Guide 2-7NoteFor best results, choose the auto setting. In some cases, devices configured for the auto media

Pagina 368 - Using the bigpipe db command

Chapter 22-8Associating the primary IP address and VLAN with the host nameAfter you assign interfaces to VLANs, you can choose one VLAN/IP address com

Pagina 369

Using the Setup UtilityBIG-IP® Reference Guide 2-9Setting the time zoneNext, you need to specify your time zone. This ensures that the clock for the B

Pagina 370

Chapter 22-10Configuring remote access for noncrypto-enabled versions of the systemThe Telnet and FTP configuration options are presented only if you

Pagina 371

Using the Setup UtilityBIG-IP® Reference Guide 2-11authoritative DNS, and automatically processes changes and updates to the zone files. (You can acce

Pagina 372 - Chapter 11

Table of Contents

Pagina 373

Chapter 22-12Options available only through the Setup utility menuThis section contains descriptions of options that are available only through the Se

Pagina 374

Using the Setup UtilityBIG-IP® Reference Guide 2-13• You can change the name of the Portal object reference file. • You can specify the Portal PID fil

Pagina 375

Chapter 22-14

Pagina 376

3Additional Base Network Configuration• Introduction• Interfaces•VLANs• Self IP addresses• Trunks• Spanning Tree Protocol (STP)• Port Mirroring

Pagina 378 - ◆ Addressing routing issues

Additional Base Network ConfigurationBIG-IP® Reference Guide 3-1IntroductionSetting up the base network for BIG-IP means configuring elements such as

Pagina 379 - Addressing routing issues

Chapter 33-2Like interfaces, VLANs, and self IP addresses, these features can be configured using either the Configuration utility or the bigpipe comm

Pagina 380 - Case 1: Same LAN

Additional Base Network ConfigurationBIG-IP® Reference Guide 3-3Figure 3.2 Horizontal slot and port numberingFor the Application Switch, slot numberi

Pagina 381 - Case 2: Different LANs

Chapter 33-4Use the following syntax to display the current status and the setting for a specific interface.b interface <if_name> showMedia type

Pagina 382 - Configuring DNS on the BIG-IP

Additional Base Network ConfigurationBIG-IP® Reference Guide 3-5VLANsA VLAN is a grouping of separate networks that allows those networks to behave as

Pagina 384 - Configuring email

Chapter 33-6Default VLAN configurationBy default, the Setup utility configures each interface on the BIG-IP as a member of a VLAN. The BIG-IP identifi

Pagina 385 - Setting up Sendmail

Additional Base Network ConfigurationBIG-IP® Reference Guide 3-7Creating, renaming, and deleting VLANsTypically, if you use the default configuration,

Pagina 386

Chapter 33-8For example, to delete the VLAN named yourvlan, type the following command:b vlan yourvlan deleteConfiguring packet access to VLANsThe BIG

Pagina 387

Additional Base Network ConfigurationBIG-IP® Reference Guide 3-9When you add an interface to a VLAN as a tagged interface, BIG-IP associates the inter

Pagina 388

Chapter 33-10Figure 3.6 Equivalent solutions using untagged and tagged interfacesThe configuration on the left shows a BIG-IP unit with three interna

Pagina 389

Additional Base Network ConfigurationBIG-IP® Reference Guide 3-11To create a VLAN that supports tag-based access using theConfiguration utilityCreatin

Pagina 390

Chapter 33-122. Add the interfaces to the VLAN external as tagged interfaces. This is done by specifying the VLAN name, the tagged keyword, and the in

Pagina 391

Additional Base Network ConfigurationBIG-IP® Reference Guide 3-13For example:b vlan internal fdb showThis produces a display such as the following:For

Pagina 392

Chapter 33-14Setting the L2 forwarding aging timeEntries in the L2 forwarding table have a specified life span, after which they are flushed out if th

Pagina 393

Additional Base Network ConfigurationBIG-IP® Reference Guide 3-15In the example shown in figure 3.5, VLANs external and internal represent separate ne

Pagina 394

TableofContentsBIG-IP® Reference Guide viiIntroductionIMPORTANT HARDWARE INFORMATION ...

Pagina 395

Chapter 33-16To assign the self IP address to the VLAN groupYou can assign a self IP address to the VLAN group using the bigpipe command, as follows:b

Pagina 396 - Glossary - 2

Additional Base Network ConfigurationBIG-IP® Reference Guide 3-17To set the fail-over timeout and arm the fail-safe using theConfiguration utility1. I

Pagina 397

Chapter 33-18Find the MAC address on both the active and standby units, and pick one that is similar but unique. A safe technique for selecting the sh

Pagina 398 - Glossary - 4

Additional Base Network ConfigurationBIG-IP® Reference Guide 3-194. In the IP Address box, type the self IP address to be assigned.5. In the Netmask b

Pagina 399

Chapter 33-20create a single 400 Mbps link. The other advantage of link aggregation is link fail-over. If one link in a trunk goes down, traffic is si

Pagina 400 - Glossary - 6

Additional Base Network ConfigurationBIG-IP® Reference Guide 3-21feature to configure two or more interfaces on the unit as an STP domain. For interfa

Pagina 401

Chapter 33-22Setting time intervals for an STP domainYou can set the time intervals in seconds for hello, max_age, and forward_delay for the STP domai

Pagina 402 - Glossary - 8

Additional Base Network ConfigurationBIG-IP® Reference Guide 3-23Restarting stpdThe stpd does not automatically restart when you synchronize configura

Pagina 403

Chapter 33-24To delete interfaces from the port mirror using thecommand lineUse this bigpipe syntax to delete interfaces from the port mirror:b mirror

Pagina 404 - Glossary - 10

4Configuring the High-Level Network• Introduction•Pools•Rules•Virtualservers•Proxies•Nodes• Services• Address translation: SNATs, NATs, and IPforwardi

Pagina 405

TableofContentsviiiConfiguring a default gateway pool ...2-6Redundant

Pagina 407

IntroductionBIG-IP® Reference Guide 4-1IntroductionThis chapter describes the elements that make up the high-level network of BIG-IP. The high-level n

Pagina 408 - Glossary - 14

Chapter 4: Configuring the High-Level Network4-2PoolsA load balancing pool is the primary object in the high-level network. A pool is a set of devices

Pagina 409

PoolsBIG-IP® Reference Guide 4-3Working with poolsYou can manage pools using either the web-based Configuration utility or the command-line interface.

Pagina 410

Chapter 4: Configuring the High-Level Network4-4To delete a pool from the command lineTo delete a pool, use the following syntax:b pool <pool_name&

Pagina 411

PoolsBIG-IP® Reference Guide 4-5Pool NameThe most basic attribute you can configure for a pool is the pool name. Pool names are case-sensitive and may

Pagina 412

Chapter 4: Configuring the High-Level Network4-6Round RobinThis is the default load balancing mode. Round Robin mode passes each new connection reques

Pagina 413

PoolsBIG-IP® Reference Guide 4-7Least ConnectionsLeast Connections mode is relatively simple in that the BIG-IP passes a new connection to the node th

Pagina 414

Chapter 4: Configuring the High-Level Network4-8Setting the load balancing mode for a poolA load balancing mode is specified as a pool attribute when

Pagina 415

PoolsBIG-IP® Reference Guide 4-9To switch a pool to ratio_member mode from thecommand lineTo switch a pool to ratio_member load balancing, use the mod

Pagina 416

TableofContentsBIG-IP® Reference Guide ixPersistence ...

Pagina 417

Chapter 4: Configuring the High-Level Network4-10b ratio showThe command displays the output shown in Figure 4.1. To display ratio weight for specific

Pagina 418

PoolsBIG-IP® Reference Guide 4-11To configure a real_server monitor for the server nodeUsing the Configuration utility or the bigpipe command, create

Pagina 419

Chapter 4: Configuring the High-Level Network4-12The metric coefficient is a factor determining how heavily the metric’s value counts in the overall r

Pagina 420

PoolsBIG-IP® Reference Guide 4-13To set the load balancing method to Dynamic RatioCreate or modify the load balancing pool to which the server belongs

Pagina 421

Chapter 4: Configuring the High-Level Network4-14To configure a wmi monitor for the server nodeUsing the Configuration utility or the bigpipe command,

Pagina 422

PoolsBIG-IP® Reference Guide 4-15PUTRequestsPerSec 1.0 500POSTRequestsPerSec 1.0 500AnonymousUsersPerSec 1.0 500CurrentAnonymousUsers 1.0 500NonAnonym

Pagina 423

Chapter 4: Configuring the High-Level Network4-16For more information about the metric coefficients and thresholds, refer to the description accompany

Pagina 424

PoolsBIG-IP® Reference Guide 4-17• Associating the health check monitor with the server to gather the metrics• Creating or modifying the server pool t

Pagina 425

Chapter 4: Configuring the High-Level Network4-18Figure 4.5 shows a monitor based on the snmp_dca_base monitor template. This monitor uses the default

Pagina 426 - Index - 14

PoolsBIG-IP® Reference Guide 4-197. Retain or change the values for CPU, memory, and disk use. Also note that in the snmp_dca template, the default va

Comentarios a estos manuales

Sin comentarios