AX GSLB Guide v2 7 0-20121010
AX GSLB Guide v2 7 0-20121010
AX GSLB Guide v2 7 0-20121010
Patents Protection
A10 Networks products including all AX Series products are protected by one or more of the following US patents and patents pending: 8291487, 8266235, 8151322, 8079077, 7979585, 7716378, 7675854, 7647635, 7552126, 20120216266, 20120204236, 20120179770, 20120144015, 20120084419, 20110239289, 20110093522, 20100235880, 20100217819, 20090049537, 20080229418, 20080148357, 20080109887, 20080040789, 20070283429, 20070282855, 20070271598, 20070195792, 20070180101
Confidentiality
This document contains confidential materials proprietary to A10 Networks, Inc. This document and information and ideas herein may not be disclosed, copied, reproduced or distributed to anyone outside A10 Networks, Inc. without prior written consent of A10 Networks, Inc. This information may contain forward looking statements and therefore is subject to change.
Disclaimer
The information presented in this document describes the specific products noted and does not imply nor grant a guarantee of any technical performance nor does it provide cause for any eventual claims resulting from the use or misuse of the products described herein or errors and/or omissions. A10 Networks, Inc. reserves the right to make technical and other changes to their products and documents at any time and without prior notification. No warranty is expressed or implied; including and not limited to warranties of non-infringement, regarding programs, circuitry, descriptions and illustrations herein.
Environmental Considerations
Some electronic components may possibly contain dangerous substances. For information on specific component types, please contact the manufacturer of that component. Always consult local authorities for regulations regarding proper disposal of electronic components in your area.
Further Information
For additional information about A10 products, terms and conditions of delivery, and pricing, contact your nearest A10 Networks location, which can be found by visiting www.a10networks.com.
b.
3 of 260
d.
Software, Upgrades and Additional Products or Copies. For purposes of this Agreement, "Software" and Products shall include (and the terms and conditions of this Agreement shall apply to) computer programs, including firmware and hardware, as provided to Customer by A10 Networks or an authorized A10 Networks reseller, and any upgrades, updates, bug fixes or modified versions thereto (collectively, "Upgrades") or backup copies of the Software licensed or provided to Customer by A10 Networks or an authorized A10 Networks reseller. OTHER PROVISIONS OF THIS AGREEMENT: a. CUSTOMER HAS NO LICENSE OR RIGHT TO USE ANY ADDITIONAL COPIES OR UPGRADES UNLESS CUSTOMER, AT THE TIME OF ACQUIRING SUCH COPY OR UPGRADE, ALREADY HOLDS A VALID LICENSE TO THE ORIGINAL SOFTWARE AND HAS PAID THE APPLICABLE FEE FOR THE UPGRADE OR ADDITIONAL COPIES USE OF UPGRADES IS LIMITED TO A10 NETWORKS EQUIPMENT FOR WHICH CUSTOMER IS THE ORIGINAL END USER PURCHASER OR LEASEE OR WHO OTHERWISE HOLDS A VALID LICENSE TO USE THE SOFTWARE WHICH IS BEING UPGRADED THE MAKING AND USE OF ADDITIONAL COPIES IS LIMITED TO NECESSARY BACKUP PURPOSES ONLY.
b.
c.
Term and Termination. This Agreement and the license granted herein shall remain effective until terminated. All confidentiality obligations of Customer and all limitations of liability and disclaimers and restrictions of warranty shall survive termination of this Agreement. Export. Software and Documentation, including technical data, may be subject to U.S. export control laws, including the U.S. Export Administration Act and its associated regulations, and may be subject to export or import regulations in other countries. Customer agrees to comply strictly with all such regulations and acknowledges that it has the responsibility to obtain licenses to export, re-export, or import Software and Documentation.
Trademarks
A10 Networks, the A10 logo, aACI, aCloud, ACOS, aDCS, aDNS, aELB, aFleX, aFlow, aGalaxy, aPlatform, aUSG, aVCS, aWAF, aXAPI, IDAccess, IDSENTRIE, IP to ID, SmartFlow, SoftAX, Unified Service Gateway, Virtual Chassis, VirtualADC, and VirtualN are trademarks or registered trademarks of A10 Networks, Inc. All other trademarks are property of their respective owners.
Patents Protection
A10 Networks products including all AX Series products are protected by one or more of the following US patents and patents pending: 8291487, 8266235, 8151322, 8079077, 7979585, 7716378, 7675854, 7647635, 7552126, 20120216266, 20120204236, 20120179770, 20120144015, 20120084419, 20110239289, 20110093522, 20100235880, 20100217819, 20090049537, 20080229418, 20080148357, 20080109887, 20080040789, 20070283429, 20070282855, 20070271598, 20070195792, 20070180101
4 of 260
5 of 260
6 of 260
Corporate Headquarters A10 Networks, Inc. 3 West Plumeria Dr San Jose, CA 95134 USA Tel: +1-408-325-8668 (main) Tel: +1-888-822-7210 (support toll-free in USA) Tel: +1-408-325-8676 (support direct dial) Fax: +1-408-325-8666 www.a10networks.com
7 of 260
8 of 260
Information is available for AX Series products in the following documents. These documents are included on the documentation CD shipped with your AX Series product, and also are available on the A10 Networks support site:
AX Series Installation Guides AX Series LOM Reference AX Series System Configuration and Administration Guide AX Series Application Delivery and Server Load Balancing Guide AX Series Global Server Load Balancing Guide AX Series GUI Reference AX Series CLI Reference AX Series aRule Reference AX Series MIB Reference AX Series aXAPI Reference
Make sure to use the basic deployment instructions in the AX Series Installation Guide for your AX model, and in the AX Series System Configuration and Administration Guide. Also make sure to set up your devices Lights Out Management (LOM) interface, if applicable.
9 of 260
Audience
This document is intended for use by network architects for determining applicability and planning implementation, and for system administrators for provision and maintenance of A10 Networks AX Series products.
Documentation Updates
Updates to these documents are published periodically to the A10 Networks support site, on an updated documentation CD (posted as a zip archive). To access the latest version, please log onto your A10 support account and navigate to the following page: Support > AX Series > Technical Library. http://www.a10networks.com
10 of 260
End User License Agreement Obtaining Technical Assistance About This Document
3 7 9
GSLB Overview
17
GSLB Deployment Modes.................................................................................................................... 18 Zones, Services, and Sites .................................................................................................................. 18 GSLB Policy .......................................................................................................................................... 18 Policy Metrics .................................................................................................................................. 19 Health Checks ............................................................................................................................. 21 Geo-Location ............................................................................................................................... 22 DNS Options ............................................................................................................................... 23 Metrics That Require the GSLB Protocol on Site AX Devices .................................................... 26
GSLB Configuration
27
Overview................................................................................................................................................ 27 Configure Health Monitors................................................................................................................... 28 Configure the DNS Proxy..................................................................................................................... 29 Configure a GSLB Policy ..................................................................................................................... 31 Enabling / Disabling Metrics ........................................................................................................... 32 Changing the Metric Order .................................................................................................................. 34 Configuring Active-Round Delay Time ............................................................................................ 35 Configuring BW-Cost Settings ........................................................................................................ 42 How Bandwidth Cost Is Measured .............................................................................................. 42 Configuration Requirements ........................................................................................................ 42 Configuring Bandwidth Cost ........................................................................................................ 43 Configuring Alias Admin Preference ............................................................................................... 47 Configuring Weighted Alias ............................................................................................................ 48 Loading or Configuring Geo-Location Mappings ............................................................................ 49 Geo-location Overlap .................................................................................................................. 57
11 of 260
Configure Services................................................................................................................................61 Gateway Health Monitoring ............................................................................................................ 62 CLI ExampleSite with Single Gateway Link ................................................................................ 65 CLI ExampleSite with Multiple Gateway Links ............................................................................ 65 Multiple-Port Health Monitoring ...................................................................................................... 66 Configure Sites......................................................................................................................................67 Configure a Zone...................................................................................................................................69 Enable the GSLB Protocol....................................................................................................................70 Resetting or Clearing GSLB .................................................................................................................70
73 77
Configuration ............................................................................................................................... 74
DNS Active-only ....................................................................................................................................78 Support for DNS TXT Records .............................................................................................................80 Append All NS Records in DNS Authority Section ............................................................................82 Hints in DNS Responses ......................................................................................................................83 DNS Sub-zone Delegation ....................................................................................................................85 DNS Proxy Block ...................................................................................................................................91
97 99
CLI Example...........................................................................................................................................99 Configuration on the GSLB AX Device (GSLB Controller) ............................................................. 99 Configuration on Site AX Device AX-A ......................................................................................... 101 Configuration on Site AX Device AX-B ......................................................................................... 101 GUI Example ........................................................................................................................................102 Configuration on the GSLB AX Device (GSLB Controller) ........................................................... 102 Configuration on Site AX Devices ................................................................................................ 112
113
121
Using a Class List............................................................................................................................... 121 Using a Black/White List .................................................................................................................... 123 Configuring the Black/White List ................................................................................................... 123 Full-Domain Checking........................................................................................................................ 128 Full-Domain Checking .................................................................................................................. 129 Enabling PBSLB Statistics Counter Sharing ................................................................................. 129
131 133
Overview.............................................................................................................................................. 133 DNS without Security .................................................................................................................... 134 DNSSEC (DNS with Security) ...................................................................................................... 137 Building the Chain of Trust ........................................................................................................... 140 Performing Key Rollovers ............................................................................................................. 142 ZSK Key Rollovers .................................................................................................................... 143 KSK Key Rollovers .................................................................................................................... 144 Importing and Exporting the Delegation Signature Keyset ........................................................... 145 DNSSEC Templates .................................................................................................................. 146 Configuration ...................................................................................................................................... 148 Configuration Examples .................................................................................................................... 151 CLI Example #1 CLI Example #2 CLI Example #3 CLI Example #4 ............................................................................................................................ 151 ............................................................................................................................ 151 ............................................................................................................................ 152 ............................................................................................................................ 152
153
13 of 260
14 of 260
15 of 260
16 of 260
GSLB Overview
This chapter provides an overview of Global Server Load Balancing (GSLB). Global Server Load Balancing (GSLB) uses Domain Name Service (DNS) technology and extends load balancing to global geographic scale. AX Series GSLB provides the following key advantages:
Protects businesses from down time due to site failures Ensures business continuity and applications availability Provides faster performance and improved user experience by directing
ple sites
In AX Release 2.7.0, all AX models and software do not have any code for Passive round trip time (RTT) for the time difference between receiving a TCP SYN and a TCP ACK for the TCP connection for GSLB. The code was completely removed starting from 2.7.0 because there was no single customer using this round trip time capability for GSLB.
In AX Release 2.7.0, the AX implementation of GSLB uses an array of fixed active IP addresses and the A10 site selection algorithm illustrated below in the figure, using an innovative method of iterative in-place marking. All AX models and software do not order the multiple network addresses based upon a first set of performance metrics from the stored performance metrics nor do any form of ordering or re-ordering of the network addresses for GSLB. (See GSLB Policy on page 18.)
17 of 260
server. In proxy mode, the AX device can update the A and AAAA records in its response to client requests, but it forwards requests for all other record types to the external DNS server.
Server mode The AX device directly responds to queries for specific
service IP addresses in the GSLB zone. (The AX device still forwards other types of queries to the DNS server.) In server mode, the AX device can reply with A, AAAA, MX, NS, PTR, SRV and SOA records. For all other records, the AX device will attempt proxy mode. Note: An AX device becomes a GSLB AX device when you configure GSLB on the device and enable the GSLB protocol, for the controller function. The A10 Networks GSLB protocol uses port 4149. The protocol is registered on this port for both TCP and UDP.
An AX device can be configured with one or more GSLB zones. Each zone can contain one or more GSLB sites. For example, mydomain.com is a domain.
Services A service is an application; for example, HTTP or FTP. Each
zone can be configured with one or more services. For example: www.mydomain.com is a service where www is the http service or an application.
Sites A site is a server farm that is locally managed by an AX device
GSLB Policy
GSLB by default is not enabled. Use of the feature requires proper configuration. GSLB deals with multiple sites, and each site has unique IP address or IP addresses. GSLB uses an array of fixed site IP addresses and the new site selection algorithm is illustrated below using an innovative method of interactive in-
18 of 260
As Site4-IP and Site6-IP are marked at the end of evaluation, these the two addresses will be selected in round robin manner and that means there is no determination of any single best network address.
Each site IP is tagged with Marked (M) or Un-marked for each evaluated parameter. The subsequent evaluation of the parameters is performed only on the previously marked sites and continues until the end of all the parameters in the metric policy regardless of how many sites are remaining as Marked. In other words, the AX device does not stop the evaluation even if there is one single site left, and continues with the evaluation until the end of the user configured metric parameters. At the end of the evaluation, the responses corresponding to the marked sites are sent back in a round-robin manner and there is no determination of any single best network address.
Policy Metrics
A GSLB policy consists of one or more of the following metrics: 1. Health-Check Services that pass health checks are preferred. 2. Weighted-IP Service IP addresses with higher administratively assigned weights are used more often than service IP addresses with lower weights. (See Weighted-IP and Weighted-Site on page 21.) 3. Weighted-Site Sites with higher administratively assigned weights are used more often than sites with lower weights. (See Weighted-IP and Weighted-Site on page 21.) 4. Session-Capacity Sites with more available sessions based on respective maximum Session-Capacity are preferred. Performance by Design Document No.: D-030-01-00-0029 - Ver. 2.7.0 10/10/2012
19 of 260
Note:
20 of 260
Health Checks
The Health-Check metric checks the availability (health) of the real servers and service ports. Sites whose real servers and service ports respond to the health checks are preferred over sites in which servers or service ports are unresponsive to the health checks. GSLB supports health check methods for the following services: ICMP (Layer 3 health check), TCP, UDP, HTTP, HTTPS, FTP, SMTP, POP3, SNMP, DNS, RADIUS, LDAP, RTSP, SIP You can use the default health methods or configure new methods for any of these services. Note: By default, the GSLB protocol generates its own packets when sending a health check to a service. If the GSLB protocol cannot reach the service, then another health check is performed using standard network traffic. Health-Check Precedence Health monitoring for a GSLB service can be performed at the following levels and in the following order: 1. Gateway health check Performance by Design Document No.: D-030-01-00-0029 - Ver. 2.7.0 10/10/2012
21 of 260
Geo-Location
You can configure GSLB to prefer site VIPs for DNS replies that are geographically closer to the clients. For example, if a domain is served by sites in both the USA and Asia, you can configure GSLB to favor the USA site for USA clients while preferring the Asian site for Asian clients. To configure geo-location:
Leave the Geographic GSLB metric enabled; it is enabled by default. Load geo-location data. You can load geo-location data from a file or
manually configure individual geo-location mappings. Loading geo-location data from a file is simpler than manually configuring geo-location mappings, especially if you have more than a few GSLB sites. For more information, see Loading or Configuring Geo-Location Mappings on page 49. The AX software includes an Internet Assigned Numbers Authority (IANA) database. The IANA database contains the geographic locations of the IP address ranges and subnets assigned by the IANA. The IANA database is loaded on the AX device, and it is enabled by default. CNAME Support As an extension to geo-location support, you can configure GSLB to send a Canonical Name (CNAME) record instead of an Address record in DNS replies to clients. A CNAME record maps a domain name to an alias for that domain. For example, you can associate the following aliases with the domain a10.com:
www.a10.co.cn www.1.a10.com ftp.a10.com
Each of the aliases in the list above can be associated with a different geolocation: If a clients IP address is within the geo-location that is associated with www.1.a10.com, then GSLB places a CNAME record for www.1.a10.com in the DNS reply to that client.
22 of 260
them with geo-locations. Alias-Admin-preference and Weighted-alias The Alias Admin Preference metric, which selects the DNS CNAME record with the highest administratively set preference, can be used in DNS Proxy or DNS Server mode. Similarly, the Weighted Alias metric, which expresses a preference for higher-weighted CNAME records, can be used in DNS Proxy or DNS Server mode. Some additional policy options are required in either mode.
DNS proxy Enable the geoloc-alias option. After GSLB retrieves the
DNS response from the DNS answer, GSLB selects a DNS A record using IP metrics, and then tries to insert the DNS CNAME record into the answer based on geo-location settings. While inserting the CNAME record, if the Alias metrics are enabled, GSLB may remove some CNAME records and related service IPs.
DNS server If applicable, enable the backup-alias option. If there is no
DNS A record to return, GSLB tries to insert all backup DNS CNAME records. During insertion, if Alias metrics are enabled, GSLB may remove some CNAME records. No DNS A records are returned. This option also requires the dns-cname-record as-backup option on the service.
DNS Options
DNS options provide additional control over the IP addresses that are listed in DNS replies to clients. The following DNS options can be set in GSLB policies:
dns action Enable GSLB to perform DNS actions specified in the ser-
vice configurations.
dns active-only Removes IP addresses for services that did not pass
23 of 260
replies for A records, when the device is configured for DNS proxy or cache mode.
dns auto-map Enables creation of A and AAAA records for IP
resources configured on the AX device. For example, this option is useful for auto-mapping VIP addresses to service-IP addresses.
dns backup-alias Returns the alias CNAME record configured for the
service, if GSLB does not receive an answer to a query for the service and no active DNS server exists. This option is valid in server mode or proxy mode.
dns backup-server Designates one or more backup servers that can be
enabled, the GSLB-AX applies the zone and service policy to the Cname record instead of applying it to the address record.
dns delegation Enables sub-zone delegation. The feature allows you to
delegate authority or responsibility for a portion of the DNS namespace from the parent domain to a separate sub-domain which may reside on one or more remote servers and may be managed by someone other than the network administrator who is responsible for the parent zone.
dns external-ip Returns the external IP address configured for a ser-
vice IP. If this option is disabled, the internal address is returned instead.
dns external-soa Replaces the internal SOA record with an external
SOA record to prevent external clients from gaining information that should only be available to internal clients. If this option is disabled, the internal address is returned instead.
dns geoloc-action Performs the DNS traffic handling action specified
for the clients geo-location. The action is specified as part of service configuration in a zone.
dns geoloc-alias Replaces the IP address with its alias configured on
geo-location.
dns hint Enables hints, which appear in the Additional Section of the
DNS response. Hints are A or AAAA records that are sent in the response to a clients DNS request. These records provide a mapping between the host names and IP addresses.
24 of 260
DNS server. The AX device must be in GSLB proxy mode for the feature to work.
dns selected-only Returns only the selected IP addresses. dns server Enables the GSLB AX device to act as a DNS server, for
about this option, see TTL Override on page 25.) The cname-detect and external-ip options are enabled by default. All the other DNS options are disabled by default. Order in Which Sticky, Server, Cache, and Proxy Options Are Used If more than one of the following options are enabled, GSLB uses them in the order listed, beginning with sticky: 1. 2. 3. 4. Note: sticky server cache proxy GSLB does not have a separately configurable proxy option. The proxy option is automatically enabled when you configure the DNS proxy as part of GSLB configuration. The site address selected by the first option that is applicable to the client and requested service is used. TTL Override GSLB ensures that DNS replies to clients contain the optimal set of IP addresses based on current network conditions. However, if the DNS TTL value assigned to the Address records is long, the local DNS servers used by clients might cache the replies for a long time and send those stale replies to clients. Thus, even though the GSLB AX device has current information, clients might receive outdated information. Performance by Design Document No.: D-030-01-00-0029 - Ver. 2.7.0 10/10/2012
25 of 260
Note:
Enabling the GSLB protocol is also required if you are using the default health-check methods. However, if you modify the default health checks, then the GSLB protocol does not need to be enabled. (See Health Checks on page 21.)
26 of 260
GSLB Configuration
This chapter describes the configuration of Global Server Load Balancing (GSLB).
Overview
Configuration is required on the GSLB AX device (GSLB controller) and the site AX devices. Note: The AX device provides an optional mechanism to automatically synchronize GSLB configurations and service IP status among multiple GSLB controllers for a GSLB zone. If you plan to use automatic GSLB configuration synchronization among controllers, first see GSLB Configuration Synchronization on page 113. This chapter shows the GUI pages for detailed configuration. The GUI also provides pages for simple GSLB configuration. Navigate to Config Mode > Getting Started > GSLB Easy Config. See the online help or AX Series GUI Reference for information. Configuration on GSLB Controller To configure GSLB on the GSLB AX device: 1. Configure health monitors for the DNS server to be proxied and for the GSLB services to be load balanced. 2. Configure a DNS proxy. 3. Configure a GSLB policy (unless you plan to use the default policy settings, described in GSLB Policy on page 18). 4. Configure services. 5. Configure sites. 6. Configure a zone. 7. Enable the GSLB protocol for the GSLB controller function. Note: If you plan to run GSLB in server mode, the proxy DNS server does not require configuration of a real server or service group. Only the VIP is required. However, if you plan to run GSLB in proxy mode, the real
Note:
27 of 260
The following sections describe the GSLB configuration steps in the GUI and in the CLI. Required commands and commonly used options are listed. For advanced commands and options, see CLI Command Reference on page 153. Note: Each of the following sections shows the CLI and GUI configuration. For complete configuration examples, see GSLB Configuration Examples on page 99.
28 of 260
29 of 260
30 of 260
All other metrics are disabled. (For detailed information about policy parameters and their defaults, see Policy Configuration Commands on page 188 or the AX Series GUI Reference or online help.) Note: Although the Geographic metric is enabled by default, there are no default geo-location mappings. To use the Geographic metric, you must load or manually configure geo-location mappings. (See Loading or Configuring Geo-Location Mappings on page 49 later in this section.)
Also see GSLB Policy on page 18.
Note:
31 of 260
To disable a GSLB metric, use the no form of the command for the metric, at the configuration level for the policy. For example, to disable the Health-Check metric, enter the following command at the configuration level for the policy:
AX(config gslb-policy)#no health-check
32 of 260
33 of 260
34 of 260
Note:
delay-time (aRDT) for a client, the site AX device sends queries for the domain name to a clients local DNS. An aRDT sample consists of the time between when the site AX device sends a query and when it receives the response. Only one aRDT domain can be configured. It is recommended to use a domain name that is likely to be in the cache of each clients local DNS. The default domain name is google.com. The AX device averages multiple aRDT samples together to calculate the aRDT measurement for a client. (See the description of Track below.)
Interval Specifies the number of seconds between queries. You can
data for a client after a query fails. You can specify 1-300 seconds. The default is 3. Performance by Design Document No.: D-030-01-00-0029 - Ver. 2.7.0 10/10/2012
35 of 260
reply before resending a query. You can specify 1-16383 milliseconds (ms). The default is 3000 ms.
Track Specifies the number of seconds during which the AX device
collects samples for a client. The samples collected during the track time are averaged together, and the averaged value is used as the aRDT measurement for the client. You can specify 3-16383 seconds. The default is 60 seconds. The averaged aRDT measurement is used until it ages out. The aging time for averaged aRDT measurements is 10 minutes by default and is configurable on individual sites, using the aRDT aging-time command. To configure global aRDT options, use the following command at the global configuration level of the CLI: [no] gslb active-rdt { domain domain-name | interval seconds | retry num | sleep seconds | timeout ms | track seconds } Default Settings When you enable aRDT, a site AX device sends some DNS requests to the GSLB domains local DNS. The GSLB AX device then averages the aRDT times of 5 samples. Single Sample (Single Shot) To take a single sample and use that sample indefinitely, use the single-shot option. This option instructs each site AX device to send a single DNS query to the GSLB local DNS. The single-shot option is useful if you do not want to frequently update the aRDT measurements. For example, if the GSLB domain's clients tend to remain logged on for long periods of time, using the single-shot option ensures that clients are not frequently sent to differing sites based on aRDT measurements.
36 of 260
wait for the DNS reply. If the reply does not arrive within the specified timeout, the site becomes ineligible for selection, in cases where selection is based on the aRDT metric. You can specify 1-255 seconds. The default is 3 seconds.
skip Specifies the number of site AX devices that can exceed their sin-
gle-shot timeouts, without the aRDT metric itself being skipped by the GSLB AX device during site selection. You can skip from 1-31 sites. The default is 3. Multiple Samples To periodically retake aRDT samples, do not use the single-shot option. In this case, the AX device uses the averaged aRDT value based on the number of samples measured for the intervals. For example, if you set aRDT to use 3 samples with an interval of 5 seconds, the aRDT is the average over the last 3 samples, collected in 5-second intervals. If you configure single-shot instead, a single sample is taken. The number of samples can be 1-8. The default is 5 samples. Store-By By default, the GSLB AX device stores one aRDT measurement per site SLB device. Optionally, you can configure the GSLB AX device to store one measurement per geo-location instead. This option is configurable on individual GSLB sites. (See Changing aRDT Settings for a Site on page 39.) Tolerance The default measurement tolerance is 10 percent. If the aRDT measurements for more than one site are within 10 percent, the GSLB AX device considers the sites to be equal in terms of aRDT. You can adjust the tolerance to any value from 0-100 percent.
37 of 260
38 of 260
The following commands access the configuration level for GSLB policy gslbp3 and enable the aRDT metric, using single-shot settings:
AX(config)#gslb policy gslbp3 AX(config gslb-policy)#active-rdt single-shot AX(config gslb-policy)#active-rdt skip 3
In this example, each site AX device will send a single DNS query to the GSLB domains local DNS, and wait 3 seconds (the default) for a reply. The site AX devices will then send their aRDT measurements to the GSLB AX device. However, if more than 3 site AX devices fail to send their aRDT measurements to the GSLB AX device, the AX device will not use the aRDT metric. Changing aRDT Settings for a Site You can adjust the following aRDT settings on individual sites:
aging-time Specifies the maximum amount of time a stored aRDT
result can be used. You can specify 1-60 minutes. The default is 10 minutes.
bind-geoloc Stores the aRDT measurements on a per geo-location
basis. Without this option, the measurements are stored on a per siteSLB device basis.
ignore-count Specifies the ignore count if aRDT is out of range. You
128.
limit Specifies the limit. You can specify 1-16383. The default is
16383 milliseconds.
mask Based on the subnet mask or mask length, the entry can be a host
surement can differ from the previous measurement. If the new measurement differs from the previous measurement by more than the allowed percentage, the new measurement is discarded and the previous measurement is used again.
39 of 260
smoothen the measurements. For example, if the smooth-factor is set to 10 (the default), 10% of the new measurement is used, along with 90% of the previous measurement. Similarly, if the smooth-factor is set to 50, 50% of the new measurement is used, along with 50% of the previous measurement. You can specify 1-100. The default is 10.
list, then load the entries from the black/white list into an IP list.
Use this command to configure individual IP list entries.
40 of 260
41 of 260
for the site, then the site is ineligible. The GSLB AX device sends the SNMP requests at regular intervals. Once a site is ineligible, the site can become eligible again at the next interval if the utilization is below the configured limit minus the threshold percentage. (See below.)
Configuration Requirements
To use the BW-Cost metric, an SNMP template must be configured and bound to each site. The GSLB SNMP template specifies the SNMP version and other information necessary to access the SNMP agent on the site AX device, and the Object Identifier (OID) of the MIB object to request. In addition, the following BW-Cost parameters must be configured on each site:
Bandwidth limit The bandwidth limit specifies the maximum value of
the requested MIB object for the site to be eligible for selection.
Bandwidth threshold For a site to regain eligibility when BW-Cost is
being compared, the SNMP objects value must be below the thresholdpercentage of the limit value. For example, if the limit value is 80,000 and the threshold is 90 (percent), then the limit value must be 72,000 or less, for the site to become eligible again based on bandwidth cost. Once a site again becomes eligible, the SNMP objects value is again allowed to increase up to the bandwidth limit value (80,000 in this example).
42 of 260
43 of 260
[no] auth-proto {sha | md5} [no] auth-key string These commands are applicable if the security level is auth-no-priv or auth-priv. The auth-proto command specifies the authentication protocol. The auth-key command specifies the authentication key. The key string can be 1-127 characters long. [no] priv-proto {aes | des} [no] priv-key string These commands are applicable only if the security level is auth-priv. The priv-proto command specifies the privacy protocol used for encryption. The priv-key command specifies the encryption key. The key string can be 1-127 characters long. [no] context-engine-id id [no] context-name id [no] security-engine-id id The context-engine-id command specifies the ID of the SNMPv3 protocol engine running on the site AX device. The context-name command specifies an SNMPv3 collection of management information objects accessible by an SNMP entity. The security-engine-id command specifies the ID of
44 of 260
45 of 260
The following commands apply the SNMP template to a site and set the bandwidth limit and threshold:
AX(config)#gslb site usa AX(config gslb-site)#template snmp-1 AX(config gslb-site)#bw-cost limit 100000 threshold 90 AX(config gslb-site)#exit
The following commands enable the BW-Cost metric in the GSLB policy:
AX(config)#gslb policy pol1 AX(config-gslb policy)#bw-cost AX(config-gslb policy)#exit
46 of 260
The other commands are the same as those shown in CLI Example SNMPv2c on page 46.
your deployment: DNS backup-alias DNS geoloc-alias 3. If using the backup-alias option, use the dns-cname-record as-backup option on the service.
47 of 260
your deployment: DNS backup-alias DNS geoloc-alias 3. If using the backup-alias option, use the dns-cname-record as-backup option on the service.
48 of 260
Geo-Location Database Files You can load the geo-location database (which contains the geo-location mappings) from one of the following types of files:
Internet Assigned Numbers Authority (IANA) database The IANA
database contains the geographic locations of the IP address ranges and subnets assigned by the IANA. Note that this database is loaded by default.
Custom database in CSV format You can load a custom geo-location
database from a file in comma-separated-values (CSV) format. However, before loading the file, you must first configure a CSV template on the AX device because the data in the file is formatted by the template. Note: You can load more than one geo-location database. When you load a new database, if the same IP address or IP address range already exists in a previously loaded database, the address or range is overwritten by the new database. Geo-Location Mappings A geo-location mapping consists of a geo-location name and an IP address or IP range.
If you manually map a geo-location to an GSLB site, GSLB uses the
mapping.
If no geo-location is configured for a GSLB site, GSLB automatically
AX device to a geo-location. Performance by Design Document No.: D-030-01-00-0029 - Ver. 2.7.0 10/10/2012
49 of 260
...
The example above shows how the CSV file appears when displayed in a text editor. If the same data were displayed in a spreadsheet application, it would appear like Figure 1 below. FIGURE 1 CSV File in Spreadsheet Application
The database file can contain more types of information (fields, or columns) than are required for the GSLB database. When you load the CSV file into the geo-location database, the CSV template on the AX device filters the file to extract the required data, while ignoring the rest of the data. In the example below, only the fields shown in bold type will be extracted and placed into the geo-location database:
"1159363840","1159364095","US","UNITED STATES","NA","NORTH AMERICA","EST","MA","MASSACHUSETTS","COMMRAIL INC","MARLBOROUGH","MIDDLESEX","42.3495","-71.5482"
50 of 260
The IP addresses in this example are in bin4 format. Dotted decimal format (for example: 69.26.125.0) is also supported. If you use bin4 format, the AX device automatically converts the addresses into dotted decimal format when you load the database into GSLB. Converting IP Addresses into bin4 Format If you want to use bin4 format in the CSV file, here is how to convert an IP address from dotted-decimal format to bin4 format: 1. Convert each node into Hex. 2. Convert the resulting Hex number into decimal. 3. Enter the decimal number into the database file. Here is an example for IP address 69.26.125.0, the first IP address in the example CSV file: Dotted Decimal 69.26.125.0 Hex of Each Node 45.1a.7d.00 Combined Hex Number 451a7d00 Decimal 1159363840
CSV File Field Delimiters The fields in the CSV file must be separated by a delimiter. By default, the AX device interprets commas as delimiters. When you configure the CSV template on the AX device, you can set the delimiter to any valid ASCII character. Creating and Loading a Custom Geo-Location Database To create and load a custom geo-location database: 1. Prepare the database file. (This step requires an application that can save to text for CSV format, and it cannot be performed on the AX device.) 2. Configure a CSV template on the AX device. The CSV template specifies the field positions (or columns) in the database that should be extracted, such as IP address and location information. 3. Import the CSV file onto the AX device. Performance by Design Document No.: D-030-01-00-0029 - Ver. 2.7.0 10/10/2012
51 of 260
52 of 260
53 of 260
(For information about the use-mgmt-port option, see the Using the Management Interface as the Source for Management Traffic chapter in the AX Series System Configuration and Administration Guide.) Loading the CSV File Data into the Geo-Location Database To load the CSV file, use the following command at the global configuration level of the CLI: [no] gslb geo-location load file-name csv-template-name Use the file name you specified when you imported the CSV file, and the name of the CSV template to be used for extracting data from the file. Note: The file-name option is available only if you have already imported a geolocation database file. To display information about CSV files as they are being loaded, use the following command: show gslb geo-location file [file-name] Manually Configuring Geo-Location Mappings
54 of 260
55 of 260
The following commands initiate loading the data from the CSV file into the geo-location database, and display the status of the load operation:
AX(config)#gslb geo-location load test1.csv test1-tmplte AX(config)#show gslb geo-location file T = T(Template)/B(Built-in), Per = Percentage of loading Filename T Template Per Lines Success Error -----------------------------------------------------------------------------test1 T t1 98% 11 10 0
56 of 260
Geo-location Overlap
The geo-location overlap option searches the geo-location database for the match best instead of searching the database using the match first algorithm. This behavior may be helpful if you suspect that more than one host has been mapped to a single public IP address. Geo-location Databases Background When configuring GSLB on the AX device, a geo-location file containing mappings between geographic regions and IP addresses is imported onto the AX device. For example, the IANA database is pre-installed on the AX device prior to shipping, and it contains thousands of entries mapping geographic regions to IP address ranges.
57 of 260
58 of 260
In this situation, there exists an overlap in the IP address from 1.1.1.1 to 1.1.1.3. To remedy this confusing situation, one can enable the geo-location overlap option to cause the AX device to search the geo-location database for the match best (or longest matching IP address). However, if the geo-location overlap option is disabled, then the AX device will revert to its default behavior, which is to use the match first algorithm to check the clients IP address against the database and then use the first IP address-region mapping discovered when parsing the database.
59 of 260
as IANA) for the longest matching and most-specific address. Policy Enabling this option will search the GSLB policy database for the longest matching and most-specific address. 7. When finished, click OK to save your changes.
60 of 260
Configure Services
A service is an application such as HTTP or FTP. For example: www.mydomain.com is a service where www is the http service or an application. Each zone can be configured with one or more services. To configure services in a GSLB zone, use one of the following procedures.
61 of 260
62 of 260
63 of 260
64 of 260
On the GSLB controller, the following commands enable gateway health checking for site device site-ax:
GSLB-AX(config)#gslb site remote GSLB-AX(config-gslb site)#slb-dev site-ax 10.1.1.1 GSLB-AX(config-slb dev)#gateway 1.1.1.1
The following command displays the gateway health status for GSLB sites:
GSLB-AX(config)#show gslb slb-device Attrs = Attributes, APF = Administrative Preference Sesn-Num/Uzn = Number/Utilization of Available Sessions GW = Gateway Status, IPCnt = Count of Service-IPs P = GSLB Protocol, L = Local Protocol Device IP Attrs APF Sesn-Num Uzn GW IPCnt -------------------------------------------------------------------------------local:self 127.0.0.1 100 0 0% 0 local:self2 127.0.0.1 100 0 0% 0 local:self3 127.0.0.1 100 0 0% 2 remote:site-ax 10.1.1.1 100 0 0% UP 0
In this example, the gateway health status for SLB-device configuration site-ax on the remote site is Up.
On the GSLB controller, the following commands enable gateway health checking for each of the sites links. A unique SLB-device name is used for each link, even though both links are for the same SLB device (20.1.1.1).
GSLB-AX(config)#gslb site remote-link1 GSLB-AX(config-gslb site)#slb-dev site-ax-lnk1 20.1.1.1 GSLB-AX(config-slb dev)#gateway 2.2.2.1
65 of 260
If the same services can be reached through either link, an additional SLBdevice configuration is required:
GSLB-AX(config)#gslb site remote-link-both GSLB-AX(config-gslb site)#slb-dev site-ax-lnkboth 20.1.1.1
No gateway is specified in the SLB-device configuration. The gateway health status will be Up unless the health checks for 2.2.2.1 and 3.3.3.1 both fail.
66 of 260
Note:
Applying a health monitor is required only if you do not plan to use the default health monitors. (See Default Health Monitors on page 66.) The following commands enable a multi-port health check for the HTTP service www on service IP gslb-srvc2 in GSLB zone abc.com:
AX(config)#gslb zone abc.com AX(config-gslb zone)#service http www AX(config-gslb service)#health-check port 80 8080 8081
Configure Sites
To configure GSLB sites, use one of the following procedures.
67 of 260
68 of 260
Configure a Zone
To configure a GSLB zone, use one of the following procedures.
69 of 260
4. Click OK.
70 of 260
database files on the AX device. The default database (IANA) is also unloaded.
no gslb ip-list all Removes all IP lists from the AX devices
configuration. no ip all At the configuration level for an IP-list, removes all IP addresses from the list.
no gslb policy all Removes all GSLB policies from the AX
devices configuration.
no gslb service-ip all Removes all service IPs from the AX
devices configuration.
no gslb site all Removes all GSLB sites from the AX
devices configuration. no ip-server all At the site configuration level, removes all IP servers (real servers) from the site. no slb-device all At the site configuration level, removes all SLB devices. no vip-server all At the configuration level for an SLB device, removes all virtual servers from the device.
no gslb template csv all Removes all CSV templates from
71 of 260
devices configuration. To remove all GSLB configuration items at the same time, you can use the following command instead: no gslb all
72 of 260
Auto-mapping
An AX device acting as a GSLB controller can retrieve the data needed to build the DNS system by automatically returning DNS records by name. This GSLB Auto-Mapping feature reduces the required amount of DNS management work when deploying GSLB. In releases prior to 2.7.0, manual configuration is required for each of the services for which an AX device is to respond. This manual configuration typically involves creating a service IP, applying it to a site, adding the zone, and then mapping the service to the service IP. With, GSLB Auto-mapping, however, the AX device allows you to automatically create the service by taking the name of a system resource, or "module", and appending it to the front of a zone to create the service name (DNS name). Once the servers and other network devices have been configured with basic information, auto-mapping enables the GSLB protocol to support DNS queries for the following modules (or system resources):
SLB server SLB virtual server SLB device GSLB site GSLB service-IP GSLB Group Hostname
Details:
This feature only works with GSLB wildcard service. There is no L3V support for SLB server or SLB virtual server. Names exceeding 20 characters must be changed to DNS domain, with
73 of 260
Configuration
Configuring DNS Auto-mapping requires the following steps: 1. Configure DNS Auto-mapping at the zone level or system level. 2. Enable DNS Auto-mapping the zone and/or system level.
4. Select the Auto Map checkbox, if it is not already selected. 5. Click the Policy tab, and then click the Add button. 6. Scroll down and click the arrow button to expand the Auto Map section. A window similar to the one shown below appears: FIGURE 3 Config Mode > Service > GSLB > Policy > Add
7. By default, all modules (resources) are selected. You can select or clear the checkboxes to determine which modules or system resources for which the GSLB protocol will support DNS queries.
74 of 260
75 of 260
76 of 260
77 of 260
DNS Active-only
By default, if all of the servers failed to pass the health check, then the GSLB controller would return an empty list to the client, rather than sending the list of IP addresses for the servers that had failed the health check. You can configure the AX device to send the list of IP addresses (associated with servers that failed their health checks) back to the client. The feature can be enabled using the new dns active-only metric option. In association with this feature, you can also designate one or more backup servers, and the IP addresses for these servers will be sent to the client in the event that all of the primary servers have failed. This behavior requires that you enable the dns backup-server feature within the GSLB policy, and that you specify the backup servers within the DNS A-record for the GSLB zone service. To summarize, there are now three options:
active-only (Old) Nothing is returned to the client if all servers fail the
health check.
active-only fail-safe (New) A list of IP addresses for the servers that
78 of 260
ture. If all servers fail the health check, then nothing is returned to the client. (Selecting this checkbox activates the Fail Safe checkbox.) Fail Safe checkbox Select this sub-option to have the list of IP addresses associated with failed servers returned to the client. 6. (Optional) Select the Backup Server checkbox if you would like one or more backup servers to be returned to the client in the event that all of the primary servers fail. 7. When finished, click OK to save your changes.
Enabling backup server mode To designate one or more backup servers to be returned to the client if the primary servers fail, do the following: 1. Use the following command to enable the backup server mode within the GSLB policy: dns backup-server
79 of 260
Note:
80 of 260
6. Enter the desired text string in the blank DNS TXT Record field. Then, click the Add button, as shown in Figure 4. Note: Use quotation marks when entering text strings that contain spaces. If a text string is entered without using quotation marks, this will cause the content to be split into different sections of the record. 7. When finished, scroll to the bottom of the page and click OK to save your changes.
81 of 260
82 of 260
5. Select the Server Mode checkbox to place the AX device in Server Mode (and to activate the NS List checkbox). Then, select the NS List checkbox, as shown above. 6. When finished, click OK to save your changes.
83 of 260
84 of 260
85 of 260
Figure 6 shows the root zone at the top of the DNS hierarchy. The figure also illustrates the following important points:
The next level down are the Top Level Domains (TLDs), or the DNS
servers responsible for managing the resource records for the .com, .org and other domains.
The parent zone is located beneath the TLDs. It is at this level within the
York office, has been delegated from the parent zone. As this hypothetical sub-zone is branched off of the parent domain, it might be helpful to delegate responsibility for managing this new sub-zone to an IT administrator who is also located in New York. Keep in mind that during the process of delegating authority for any subzone, an NS record must be added to the zone file within the authoritative name server for the parent zone. This must be done so that other DNS servers and clients will recognize the new server as being authoritative for the particular delegated sub-zone.
86 of 260
zone level.
When delegating a sub-zone, the GSLB AX device must be in server
mode. The feature will not work with the GSLB AX device in proxy mode.
Once a sub-zone has been delegated from the parent zone, client resolv-
ers will send a query for the NS record, and the response from the GSLB AX device will have the NS record in the Authority section and the IP address in the Additional section of the full DNS response. Note: The AX device supports configuration of glue records. A glue record can be configured to prevent circular dependencies, which can occur if the name server is located in a sub-zone of the parent domain. Such a scenario can make it impossible for the client resolver to locate the IP for the name server, because it is located within a sub-zone of the parent domain. Configuring a glue record eliminates this problem by providing an address record that appears in the Additional section of the full DNS response, and this enables the client to find the name server.
87 of 260
The following command creates the NS record in the GSLB policy: AAX(config-gslb service)#dns-ns-record ns.finance.example.com
The following command applies the delegation policy at the zone level for the service group level:
AX(config-gslb zone)#policy delegation
The following optional command can be used at the GSLB zone level to configure a DNS glue record. This configuration helps prevent circular dependencies: AX(config-gslb zone)#service 53 ns.finance AX(config-gslb zone-gslb service)#dns-a-record <service-ip name> AX(config-gslb zone-gslb service)#exit
88 of 260
The following command configures the GSLB service IP dc1-vip at IP 10.10.10.10 and disables the health check at the service IP level and at port 80 for TCP. AX(config)#gslb service-ip dc1-vip 10.10.10.10
AX(config-gslb service ip)#no health-check AX(config-gslb service ip)#port 80 tcp AX(config-gslb service ip-port)#no health-check
The following command configures the GSLB service IP ns-ip-1 at IP 172.16.10.203 and disables the health check at the service IP level and at port 80 for TCP. AX(config)#gslb service-ip dc2-vip 172.16.10.203
AX(config-gslb service ip)#no health-check AX(config-gslb service ip)#port 80 tcp AX(config-gslb service ip-port)#no health-check
The following commands configure a GSLB site called dc1. The site has an AX device, dc1-ax at IP 10.10.10.50. AX(config)#gslb site dc1 AX(config-gslb site)#slb-dev dc1-ax 10.10.10.50
AX(config-gslb site-slb dev)#vip-server dc1-vip AX(config-gslb site-slb dev)#exit
The following commands configure a GSLB site called dc2. The site has an AX device, dc2-ax at IP 172.16.10.50. AX(config)#gslb site dc2 AX(config-gslb site)#slb-dev dc1-ax 172.16.10.50
AX(config-gslb site-slb dev)#vip-server dc2-vip AX(config-gslb site-slb dev)#exit
89 of 260
The following commands configure three GSLB policies: (1) the default GSLB policy, (2) GSLB policy 5 (for delegation), and (3) GSLB policy dns-server. The AX delegates authority for the sub-domain sub.sub.a10networks.jp to nameserver "ns01.sub.sub.a10networks.jp". AX(config)#gslb policy default
AX(config-gslb policy)#exit
AX(config)#gslb policy 5
AX(config-gslb policy)#dns delegation AX(config-gslb policy)#dns server AX(config-gslb policy)#exit
The following commands create the GSLB zone sub.sub.a10networks.jp and creates a wildcard service within the zone. The GSLB policy 5, created above, is assigned to the wildcard service, and an NS record is created for the name server, ns01.sub.sub.a10networks.jp. AX(config)#gslb zone sub.sub.a10networks.jp
AX(config-gslb zone)#service * AX(config-gslb zone-gslb service)#policy 5 AX(config-gslb zone-gslb service)#dns-ns-record ns01.sub.sub.a10networks.jp AX(config-gslb zone-gslb service)#exit
90 of 260
The following commands creates the GSLB zone sub.a10networks.jp and enables the http service. Then, the policy dns-server is bound and A records are create for dc1-vip and dc2-vip. AX(config)#gslb zone sub.a10networks.jp
AX(config-gslb zone)#service http www AX(config-gslb zone-gslb service)#policy dns-server AX(config-gslb zone-gslb service)#dns-a-record dc1-vip static AX(config-gslb zone-gslb service)#dns-a-record dc2-vip static
The following command enables the GSLB and makes this AX device the GSLB controller. AX(config)#gslb protocol enable controller
91 of 260
After specifying the type of DNS query to be blocked, select an action to perform on the selected DNS query type, for example, drop or reject. When selecting an action to perform on a query type, keep in mind the following caveats:
Selecting a DNS query type without specifying the action will cause the
default action to be applied to the selected query type. The default action is drop.
Selecting an action without specifying the query type will cause the fea-
ture to essentially remain disabled. If no query type has been identified, then no action is applied, even if an action has been specified. Benefits Implementing this feature may reduce the amount of traffic sent to back-end DNS servers. This can increase efficiency by reducing the burden on those servers. This feature may also be desirable in situations where resource records reside on a DNS server that is accessible to both internal and external clients. In such situations where the same DNS server is being accessed by both internal and external clients, the DNS Proxy Block feature helps prevent sensitive resource records on an internal DNS server from being leaked to external clients. Note: Prior releases supported a similar DNS Blocking option, which essentially removed the dns-a-record information from DNS responses. By using the no-resp option at the GSLB service level for a zone, dns-arecord information would be stripped from the DNS servers response. This new command, however, simply blocks the clients DNS request before it is received by the back-end DNS server. Details:
The GSLB AX device must be operating in proxy mode to support the
92 of 260
applied to those query types. Therefore, the first bullet below would be an acceptable configuration, but the second bullet would not: Reject both SRV and CNAME query types (OK) Reject SRV but drop CNAME query types (Not OK)
4. Select the Drop or Reject Action radio button. If desired, you can select the No radio button to disable the DNS Proxy Block feature. 5. Click the Type List drop-down menu and select the desired well-known DNS query type that you would like to block. Then, click the Add button. If you want to remove a query type from the list, select the checkbox next to a query type and then click the Delete button. Performance by Design Document No.: D-030-01-00-0029 - Ver. 2.7.0 10/10/2012
93 of 260
The query-type is the numeric value that corresponds to a well-known DNS query type. Specify any number from 1 to 255. The range option allows you to target less well-known DNS query types. The start-query-type is the numeric value used to define the beginning of the range, while the end-query-type is the numeric value used to define the end of the range of DNS query types that will be blocked. The range can go
94 of 260
95 of 260
96 of 260
Implementation Details
Partition-specific GSLB configuration is supported only for partitions in
vidual partitions. They can be configured only globally, for all partitions on the AX device: GSLB system-wide settings: gslb system, gslb dns, gslb protocol and gslb active-rdt GSLB geo-locations (gslb geo-location)
Duplicate names are not supported for GSLB items. For example, the
same zone name can not be configured in more than one partition.
For each partition, only one GSLB Group is supported to implement
mapping.
For each partition, you can create one group, the partition group. In the current release, the following synchronization scenario is sup-
aVCS Notes
In an aVCS deployment there is more than one device in the virtual
chassis. Due to real-time configuration synchronization, all devices in the virtual chassis will have the same configuration. In this case, more than one GSLB controller can have the highest priority. The controller with the highest last 4 bytes in its management interface MAC address is elected as the group master. Performance by Design Document No.: D-030-01-00-0029 - Ver. 2.7.0 10/10/2012
97 of 260
group is enabled and the GSLB configuration can be handled by the GSLB group, aVCS will not synchronize the GSLB configuration to the vBlade.
If the vMaster is not the same device as the as GSLB group master, con-
figuration of GSLB in a member controller requires the config-anywhere option to be enabled in the GSLB group. Note: For additional information about Role Based Partitions, please see the Role-Based Administration chapter in the AX Series System Configuration and Administration Guide.
98 of 260
CLI Example
Configuration on the GSLB AX Device (GSLB Controller)
The following commands configure a health monitor for the local DNS server to be proxied:
AX-Controller(config)#health monitor dns-53 AX-Controller(config-health:monitor)#method dns domain example.com AX-Controller(config-real server)#exit
The following commands configure the service IP addresses. The VIP address and virtual port number of the virtual server in the site AX Series devices SLB configuration are used as the service IP address and port number on the GSLB AX Series device.
99 of 260
The following command loads the IANA file into the geo-location database:
AX-Controller(config)#gslb geo-location load iana
The following commands configure the sites. For each site SLB device, enter the IP address of the AX Series device that provides SLB at the site. For the VIP server names, enter the service IP name specified above.
AX-Controller(config)#gslb site usa AX-Controller(config-gslb site)#slb-dev ax-a 2.1.1.1 AX-Controller(config-gslb site-slb dev)#vip-server servicevip1 AX-Controller(config-gslb site-slb dev)#exit AX-Controller(config-gslb site)#exit AX-Controller(config)#gslb site asia AX-Controller(config-gslb site)#slb-dev ax-b 3.1.1.1 AX-Controller(config-gslb site-slb dev)#vip-server servicevip2 AX-Controller(config-gslb site-slb dev)#exit AX-Controller(config-gslb site)#exit
At the configuration level for the service (www), the CNAME www.a10.co.cn is configured, and the CNAME is associated with geo-location China. If a clients IP address is in the range for the China geo-location, GSLB sends the CNAME www.a10.co.cn in the DNS reply. The following command enables the GSLB protocol:
AX-Controller(config)#gslb protocol enable controller
100 of 260
Note:
The virtual server IP address must be the same as the GSLB service IP address configured on the GSLB AX device. The following command enables the GSLB protocol:
101 of 260
GUI Example
Configuration on the GSLB AX Device (GSLB Controller)
Configure a Health Monitor for the DNS Proxy 1. Select Config Mode > Service > Health Monitor. 2. On the menu bar, select Health Monitor. 3. Click Add. 4. Enter a name for the monitor in the Name field. 5. In the Method section, select DNS from the Type drop-down list. 6. In the Domain field, enter the domain name. (Generally, this is the same as the GSLB zone name you will configure.) Configure the DNS Proxy 1. Begin configuring the proxy: a. Select Config Mode > Service > GSLB. b. On the menu bar, select DNS Proxy. c. Click Add. d. Enter a name for the proxy in the Name field. e. In the IP Address field, enter the IP address that will be advertised as the authoritative DNS server for GSLB zone. Note: The GUI will not accept the configuration if the IP address you enter here is the same as the real DNS server IP address you enter when configuring the service group for this proxy. (below). f. In the GSLB Port section, click Add. The GSLB Port section appears.
102 of 260
103 of 260
FIGURE 10 selected
Configure > Service > GSLB > DNS Proxy - service group
104 of 260
FIGURE 12 configured
Configure > Service > GSLB > DNS Proxy - DNS proxy
Load the IANA Geo-location Database 1. Select Config Mode > Service > GSLB. 2. On the menu bar. select Geo-location > Import. 3. In the Load/Unload section, enter iana in the File field. Leave the Template field blank. 4. Click Add. Configure Services 1. Select Config Mode > Service > GSLB. 2. On the menu bar, select Service IP. 3. Click Add. Performance by Design Document No.: D-030-01-00-0029 - Ver. 2.7.0 10/10/2012
105 of 260
separate GSLB service IP for each SLB VIP.) 5. If needed, assign an external IP address to the service IP. The external IP address allows a service IP that has an internal IP address to be reached from outside the internal network. 6. Add the service port(s): a. Enter the port number and select the protocol (TCP or UDP). b. Optionally, select a health monitor. c. Click Add. The service port appears in the service port list. For this example, add TCP port 80 and leave the health monitor unselected. (See Figure 13 on page 106.) 7. Click OK. 8. Repeat for each service IP. FIGURE 13 Config Mode > Service > GSLB > Service IP
106 of 260
107 of 260
108 of 260
Configure a Zone 1. Select Config Mode > Service > GSLB. 2. On the menu bar, select Zone. 3. Click Add. 4. Enter the zone name in the Name field. 5. In the Service section, click Add. (See Figure 16 on page 110.) The service configuration sections appear. 6. In the Service field, enter the service name. Performance by Design Document No.: D-030-01-00-0029 - Ver. 2.7.0 10/10/2012
109 of 260
9. Click OK. The zone appears in the GSLB zone list. FIGURE 16 Configure > Service > GSLB > Zone
110 of 260
Enable the GSLB Protocol 1. Select Config Mode > Service > GSLB. 2. On the menu bar, select Global. 3. Select Enabled next to Run GSLB as Controller. 4. Click OK.
111 of 260
112 of 260
Overview
The AX device provides a mechanism to automatically synchronize GSLB configurations and service IP status among multiple GSLB controllers for a GSLB zone. (A GSLB controller is an AX device on which GSLB is configured and on which the GSLB controller option is enabled.) To use this feature, add the GSLB controllers to a GSLB controller group. The group members (controllers) elect a master controller for the group. The master controller updates the GSLB configurations on each of the other group members. The master controller also checks the service IPs for their status and sends the status information to the other group members. Note: This feature is different from the AX Series Virtual Chassis System (aVCS) feature. aVCS is used for multiple AX devices that serve as mutual backups within the same LAN. GSLB configuration synchronization is used by GSLB controllers, which typically are connected across WAN links. How AX Devices Join a Controller Group On each GSLB controller, the configuration for a GSLB group includes a list of primary group members. After the GSLB process starts on an AX device, the device joins the controller group by connecting to the primary group members to exchange group management traffic. You can specify up to 15 primary group members. By default, no primary group members are defined. You do not need to configure the list of primary group members on each controller. If you configure the list on the AX device you plan to use as the master controller for the group, that device will send the list to the other controllers in the group. The learning option enables an AX device to learn the IP addresses of additional group members from the primary group members. Learning is enabled by default.
113 of 260
The master controller sends the following status information to the other controllers:
aRDT data Connection load data Virtual port status
114 of 260
Until the configuration synchronization status reaches FullSync, you can change GSLB configuration information directly on group members even if they are not the master. However, if the same configuration items are changed on the master, the changes on the master overwrite the changes on the other group members. After the configuration synchronization status reaches FullSync, directly changing the configuration on a member device is not supported. In this case, the following error message is displayed: Operation denied by Group Master. Notes
In the current release, if there are two or more controllers in a private
network and they are using the same public NAT address, only one of the controllers will be accepted as a member of the GSLB group. The AX GSLB controller will reject the other connection request if it comes from the same external IP.
In HA or VRRP-A deployments, the GSLB configuration synchroniza-
tion feature synchronizes with the active device, which then pushes the GSLB configuration changes to the standby.
Starting in Release 2.6.1-P3, the AX devices CLI prompt displays the
AX devices role within the GSLB group, which can be either Master or Member, as shown in the examples below: AX2500-Master(config)# AX2500-Member(config)# Display of the group role can be disabled by using the no terminal gslbprompt command at the global config level.
115 of 260
Group state
Priority
Primary controller
Learning
116 of 260
Configuration
At a minimum, to add an AX device to a GSLB controller group: 1. On the controller you plan to use as the master: a. Configure the GSLB parameters that will be synchronized with the other controllers. b. Configure local GSLB parameters as applicable to your deployment. c. Add the device to the GSLB controller group and change the group priority value to 255. d. Enable the devices membership in the group. 2. On each of the other controllers: a. Add the device to the GSLB controller group. Set the priority to a value that is less than the master. b. Enable the AX devices membership in the group. c. Configure local GSLB parameters as applicable to your deployment.
117 of 260
118 of 260
Master Member
AX(config-gslb group)#show gslb group Pri = Priority, Attrs = Attributes D = Disabled, L = Learn P = Passive, * = Master Group: default, Master: 192.168.101.72 Member local 192.168.1.131 192.168.1.132 ID Pri Attrs Status OK Synced Synced ----------------------------------------------------------------------------22e40d29 255 L* 941a1229 100 ab301229 100 P
ID
119 of 260
Status
120 of 260
white list) The AX device determines a clients location by looking up the clients subnet in the geo-location database used by Global Server Load Balancing (GSLB). Note: This feature requires you to load a geo-location database, but does not require any other configuration of GSLB. The AX system image includes the Internet Assigned Numbers Authority (IANA) database. By default, the IANA database is not loaded but you can easily load it, as described in the configuration procedure later in this section.
The following commands import the class list onto the AX device, configure a policy template, and bind the template to a virtual port. The connec-
121 of 260
122 of 260
AX device.
Local option Enter the black/white list directly into a management
GUI window. With either method, the syntax is the same. The black/white list must be a text file that contains entries (rows) in the following format: L "geo-location" group-id #conn-limit The L indicates that the clients location will be determined using information in the geo-location database. The geo-location is the string in the geo-location database that is mapped to the clients IP address; for example, US, US.CA, or US.CA.SanJose. The group-id is a number from 1 to 31 that identifies a group of clients (geolocations) in the list. The default group ID is 0, which means no group is assigned. On the AX device, the group ID specifies the action to perform on client traffic. The #conn-limit specifies the maximum number of concurrent connections allowed from a client. The # is required only if you do not specify a group ID. The connection limit is optional. For simplicity, the examples in this section do not specify a connection limit.
123 of 260
3. Click OK. To configure an SLB policy (PBSLB) template: 1. Select Config Mode > Service > Template. 2. On the menu bar, select Application > PBSLB Policy. 3. Click Add. 4. In the Name field, enter a name for the template. 5. From the drop-down list below the Name field, select the black/white list. 6. Select a group ID from the Group ID drop-down list. 7. Select one of the following from the Action drop-down list.
Drop Drops new connections until the number of concurrent con-
nections on the virtual port falls below the ports connection limit. (The connection limit is set in the black/white list.) Reset Resets new connections until the number of concurrent connections on the virtual port falls below the connection limit.
124 of 260
AX device is listed. create This option displays the configuration sections for creating a new service group. 8. Optionally, enable logging. (The AX device uses the same log rate limiting and load balancing features for PBSLB logging as those used for ACL logging. See the "Log Rate Limiting section in the "Basic Setup chapter of the AX Series System Configuration and Administration Guide.) 9. Click Add. 10. Repeat step 6 through step 9 for each group ID. 11. Click OK. To load the IANA geo-location database: 1. Select Config Mode > Service > GSLB. 2. On the menu bar, select Geo-location > Import. 3. In the Load/Unload section, enter iana in the File field. Leave the Template field blank. 4. Click Add. Note: If preferred, you can import a custom geo-location database instead. For information, see Loading or Configuring Geo-Location Mappings on page 49. To apply the policy template to a virtual port: 1. Select Config Mode > Service > SLB. 2. On the menu bar, select Virtual Server. 3. Select the virtual server or click Add to configure a new one. 4. If you are configuring a new VIP, enter the name and IP address for the server. 5. In the Port section, select the port and click Edit, or click Add to add a new port. The Virtual Server Port page appears. 6. Select the policy template from the PBSLB Policy Template drop-down list.
125 of 260
126 of 260
127 of 260
The following commands configure a policy template named geoloc and add the black/white list to it. The template is configured to drop traffic from clients in the geo-location mapped to group 1 in the list.
AX(config)#slb template policy geoloc AX(config-policy)#bw-list name geolist AX(config-policy)#bw-list id 1 drop AX(config-policy)#exit
The following commands apply the policy template to port 80 on virtual server vip1:
AX(config)#slb virtual-server vip1 AX(config-slb virtual server)#port 80 http AX(config-slb vserver-vport)#template policy geoloc AX(config-slb vserver-vport)#show slb geo-location
Full-Domain Checking
By default, when a client requests a connection, the AX device checks the connection count only for the specific geo-location level of the client. If the connection limit for that specific geo-location level has not been reached, then the clients connection is permitted. Likewise, the permit counter is incremented only for that specific geo-location level. Table 5 shows an example set of geo-location connection limits and current connections. TABLE 5 Geo-location connection limit example
Connection Limit 100 50 20 Current Connections 100 37 19
Using the default behavior, the connection request from the client at US.CA.SanJose ia allowed even though CA has reached its connection limit. Likewise, a connection request from a client at US.CA is allowed. However, a connection request from a client whose location match is simply US is denied.
128 of 260
Full-Domain Checking
When full-domain checking is enabled, the AX device checks the current connection count not only for the clients specific geo-location, but for all geo-locations higher up in the domain tree. Based on full-domain checking, all three connection requests from the clients in the example above are denied. This is because the US domain has reached its connection limit. Likewise, the counters for each domain are updated as follows:
US Deny counter is incremented by 1. US.CA Deny counter is incremented by 1.
129 of 260
130 of 260
131 of 260
The following commands configure three sites for each web-based service provider:
AX(config)#gslb site sanjose AX(config-gslb site)#slb-dev AX5200 192.168.1.2 AX(config-gslb site-slb dev)#ip-server ip-server1 AX(config-gslb site-slb dev)#ip-server ip-server2 AX(config-gslb site-slb dev)#ip-server www AX(config-gslb site-slb dev)#ip-server mail
132 of 260
DNSSEC Support
This chapter describes the AX devices DNSSEC support.
Overview
An AX device configured as a Global Server Load Balancer (GSLB) controller can act as an authoritative DNS server for a domain zone. As the authoritative DNS server for the zone, the AX device sends records in response to requests from DNS clients. The AX device supports the ability to respond to client requests for the following types of well-known resource records:
A AAAA CNAME NS MX PTR SRV TXT
Placing the AX device within the DNS infrastructure exposes it to potential online attacks. When DNS was originally designed, there were no mechanisms to ensure the DNS infrastructure would remain secure. In an unsecured DNS environment, the clients DNS resolver has no way to assess the validity of the address it receives for a particular domain name, so the clients DNS resolver cannot tell whether an address received for a particular domain is from the legitimate owner of that domain. This potential security hole opens the door for possible forgeries, thus making DNS vulnerable to so-called man-in-the-middle attacks, DNS cache poisoning attacks, and other types of online attacks that could be used to forge DNS data, hijack traffic, and to potentially steal sensitive information from the user.
133 of 260
134 of 260
A client (shown at upper left) requires access to a server in the domain zone1.example.org (at lower left). The AX device, which is acting as the GSLB controller, is the authoritative DNS server for the zone. In order to access this server, the client requires the IP address for this zone, or domain. The user enters the domain name in the web browsers URL, and from there, the process of obtaining the IP address associated with this domain unfolds as follows: 1. The DNS resolver embedded in the clients web browser sends an address request (A ?) to the Caching DNS server to see if the Caching DNS server already has the required IP address cached in its memory for the requested example.org domain. 2. The Caching DNS server has a list of IP address-to-domain mappings, but the list is not comprehensive, and unfortunately, the Caching DNS Performance by Design Document No.: D-030-01-00-0029 - Ver. 2.7.0 10/10/2012
135 of 260
136 of 260
server uses the DS for a zone directly beneath it in the DNS hierarchy to verify that signed resource records from the Authoritative DNS server for that zone are legitimate.
Resource Record Signature (RRSIG) Digitally signs another resource
record, such as an A record. The digital signature is created by applying a hash function to the DNS record to reduce its file size, an encryption algorithm is applied to the hash value (using the private key), and this encrypted hash value appears as the digital signature at the bottom of the resource record. The RRSIG record, which contains the private key used to encrypt the hash value, appears at the bottom of the record being signed.
While Figure 18 on page 135 shows how basic DNS works without DNSSEC, Figure 19 on page 138 provides an updated version of this illustration showing how the DNS lookup process works with DNSSEC. The recursive lookup process remains largely unchanged, with the higher level DNS servers pointing to lower level servers within the DNS hierarchy in order to move the request closer to the authoritative server for the desired domain. However, when DNSSEC is added to this scenario, the additional records (such as DS, RRSIG, and DNSKEY) are used to sign and authenticate the communications from the DNS servers, thus proving to the client that each of the name servers in the chain of trust are authoritative for their respective domains. For more details, See Building the Chain of Trust on page 140.
137 of 260
Figure 19 shows the resolution process for an address query from the DNS resolver on a client for the IP address of zone1.example.org. 1. The DNS resolver on the client sends an address query for the IP address of a host under zone1.example.org. 2. The Caching DNS server, which does not have the address, forwards the request to the root server. 3. The root server redirects the Caching DNS server to the TLD DNS server for the .org domain. This is accomplished by sending an NS record with the IP address of that TLD server. The root server uses an RRSIG record (used to store the private key) to sign the NS record, and
138 of 260
139 of 260
140 of 260
Figure 20 above shows the Authoritative DNS Server for the zone1.example.org domain at the bottom left, and the Root DNS Server is located at the upper right. Starting from the lower left, the Authoritative DNS Server for the zone1.example.org domain, has a DNS key record (DNSKEY). This DNSKEY record contains the public Zone Signing Key (ZSK) for zone1. The ZSK is used to sign other record types, such as A records, for the zone. The DNSKEY record is signed by another key, the Key Signing Key (KSK), which also belongs to this zone.
141 of 260
142 of 260
1.
143 of 260
1.
144 of 260
in order to create the resulting DS record. The import dnssec-ds/dnssec-dnskey child-zone-name command imports the DS keyset of the child zone. Note that the parent zone must be set up before the record is imported. The export dnssec-ds/dnssec-dnskey authoritative-zone-name command exports the DS keyset from the child zone to the parent zone. Note: Communication between the parent and child zones is performed out-ofband.
145 of 260
DNSSEC Templates
To configure DNSSEC on the AX device, templates are used to define information required by the security standard. The following information is required when configuring DNSSEC templates:
Combinations limits (on signatures)1 The parameter is used to spec-
ify the maximum number of combinations per Resource Record Set (RRset), where RRset is defined as all the records of a particular type for a particular domain, such as all the quad-A (IPv6) records for www.example.com. A static signature is included in the response to DNS queries. This static signature is generated in advance of future requests. For example, suppose there are five A type DNS resource records that correspond to a hypothetical domain name, www.example.net: 1.1.1.1 1.1.1.2 1.1.1.3 1.1.1.4 1.1.1.5 A static signature is generated for all of the possible combinations, such as [1.1.1.1], [1.1.1.1 1.1.1.2], [1.1.1.1 1.1.1.2 1.1.1.3]... [1.1.1.5]. By setting the combinations-limit parameter, this places a limit on the number of combinations of resource records that could be returned, preventing an excessive burden on the system memory. Values for this combination limit range from 1-65535, with a default value of 31 possible combinations per resource record set.
DNSKEY Time to Live The dnskey-ttl parameter is used to set the
lifetime for DNSSEC key resource records. The TTL can range from 1864,000 seconds, with a default of 14,400 seconds (or 4 hours).
Key Signing Key The key signing key (KSK) is needed to establish
the chain of trust and is the private counterpart to the public zone signing key used to sign authentication keys for the zone. At least one KSK is needed to sign successfully, but no more than two KSKs can be configured. There is no default.
Return NSEC/NSEC3 This parameter is used to enable or disable the
return of an NSEC or NSEC3 record in response to a client request for an invalid domain. As originally designed, DNSSEC would expose the list of device names within a zone, allowing an attacker to gain a list of network devices that could be used to create a map of the network.
1.
For more details, please refer to RFC 4033, 4034, 4035 and 4641.
146 of 260
used to set the period for which a signature will remain valid. The time can range from 5-30 days, and the parameter has a default of 10 days.
Zone Signing Key The zone signing key (ZSK) is used to sign the
domain names zone. At least one ZSK is needed to sign successfully, but no more than two ZSKs can be configured. There is no default. The ZSK allows that you specify one of the following sub-options, which are used during the key rollover process: Active Selecting this option sets the status of the ZSK to active, and only the active ZSK can be used to sign the zone. The active option is enabled by default. Only one active ZSK is allowed per zone. Published This option is used to publish a newer ZSK just before deprecating the older key and activating the newer ZSK. This offers a way to push the newer key into the DNS infrastructure, but without activating it. The published ZSK can become active at the expiration of the DNSKEY TTL period. Deprecated This option is used to deprecate an older ZSK prior to activating a new ZSK. This must be done before the new key can become active. FIGURE 21 Life cycle of a ZSK
147 of 260
Configuration
To configure DNSSEC for GSLB: 1. Generate the DNS keys (or import them) to the AX device. 2. Configure the DNSSEC template. 3. Verify the DNSSEC template. 4. Apply the DNSSEC template to GSLB policy.
148 of 260
the DNSSEC key pair (ZSK and KSK). You can specify any of the following algorithms: RSASHA1 (default) RSASHA256 RSASHA512 NSEC3RSASHA1 Selecting one of the first three algorithms (RSASHA1, RSASHA256, or RSASHA512) will cause the standard NSEC resource record to be generated for the zone. However, selecting the fourth algorithm option (NSEC3RSASHA1) causes the NSEC3/NSEC3PARAM record to be generated for the zone, which is helpful in mitigating the threat posed by zone walking.
149 of 260
range from 512-4096 bits. Values must be specified in multiples of 64 bits, and the default value is 1024 bits. Deleting the DNSSEC Key To remove a DNSSEC key from the AX device, use the following CLI command at the config level: no dnssec key-generate name Exporting the DNSSEC Key To export the DNSSEC key from the AX device, use the following CLI command at the config level: export dnssec-key filename Importing the DNSSEC Key To import the DNSSEC key to the AX device, use the following CLI command at the config level: import dnssec-key filename Note: The imported dnssec-key file is a compressed file with the .tar suffix. This tar file includes both the private and public keys, with the respective suffixes of .private and .key. When an example tar file with the name key01 is un-compressed, it includes the public key ("key01.key") and the private key ("key01.private"). Zone Signing Commands After the zone or DNSSEC template configuration is changed, the zone signing will automatically begin 30 seconds later. However, you can use the following command at the global config level to immediately trigger zonesigning: dnssec sign-zone-now name Specify the name for the DNS zone. Note that if a name is not specified, then all zones will be checked for configuration changes and signed (if any changes are found). Details:
DNSSEC Signature timeout All zones will be checked every two
days to guarantee that the dnssec-enabled zones have valid signatures. If the signature has timed-out, then this will cause the zone to be re-signed.
150 of 260
record of the child zone is imported, the parent of that child zone will be re-signed.
Configuration Examples
The following sections show DNSSEC configuration examples.
CLI Example #1
The following commands enable the DNSSEC option for GSLB, so that the AX device can handle DNSSEC queries while in DNS server mode.
AX(config)#gslb policy default AX(config-gslb policy)#dns server authoritative sec AX(config-gslb policy)#exit
Note: Note:
DNSSEC for GSLB is not supported in proxy mode for this release. The AX device supports the following standard DNS records: SOA, A, AAAA, ANY, CNAME, MX, NS, PTR and SRV. The AX device supports the following DNSSEC records: DNSKEY, NSEC, NSEC3, DS and RRSIG
CLI Example #2
When configuring GSLB on the AX device, the default DNSSEC template is used for each zone unless you specify another template. The commands below generate an encryption key called keygen1, using the NSEC3RSASHA1 encryption algorithm. Then, commands are used to create the DNSSEC template called dnssec1, which has a combinations-limit of 10 and uses the key just created. The template is applied to a zone called example.com:
AX(config)#dnssec key-generate keygen1 algorithm NSEC3RSASHA1 keysize 1024 AX(config)#dnssec template dnssec1 AX(config-dnssec)#combinations-limit 10 AX(config-dnssec)#ksk keygen1 AX(config-dnssec)#exit AX(config)#gslb zone example.com AX(config-gslb zone)#template dnssec dnssec1 AX(config-gslb zone)#exit
151 of 260
CLI Example #3
The following command is used to display information for the DNSSEC template created above:
AX(config)#show dnssec template dnssec1 dnssec template dnssec1 ksk keygen1 combinations-limit 10
CLI Example #4
The following command imports the DS record from the delegated child zone (zone1.example.org) to the parent zone (example.org), for which the AX device is the authoritative DNS server:
AX(config)#import dnssec-ds zone1.example.org scp://[email protected]/root/ dsset-zone1.example.org Password []?****** Importing ... ...0 minutes 3 seconds Done.
152 of 260
gslb active-rdt
Description Syntax Configure global aRDT settings. [no] gslb active-rdt { domain domain-name | interval seconds | port portnum | retry num | sleep seconds | timeout ms | track seconds } Parameter domain domain-name Description Specifies the query domain. To measure the active-Round Delay Time (aRDT) for a client, the site AX device sends queries for the domain name to a clients local DNS. An aRDT sample consists of the time between when the site AX device sends a query and when it receives the response.
153 of 260
retry num
sleep seconds
timeout ms
track seconds
154 of 260
Mode
Default Mode
Syntax
155 of 260
gslb geo-location
Description Configure a global geographic location by assigning a location name to a client IP address range. GSLB forwards client requests from addresses within the specified IP address range to the GSLB site that serves the location. [no] gslb geo-location location-name [start-ip-addr {mask ip-mask | end-ip-addr}] no gslb geo-location all Parameter location-name Description Name of the location. Use a period between each string label (range). Each range can contain up to 15 alphanumeric characters. The entire name can contain up to 127 alphanumeric characters. Example: Asia.japan.123456789.xyz The AX device can perform a partial match for a geo-location. For example, if IP 1.1.1.1 belongs to Asia.japan, but only Asia is configured, the AX device still knows which site to select. start-ip-addr mask ip-mask end-ip-addr all Beginning IP address for the range. Network mask. Ending IP address for the range. Removes all manually configured geo-locations from the configuration. The all option is valid only with the no form of the command shown above.
Syntax
If you enter the gslb geo-location location-name command without any additional options, the CLI changes to the configuration level for the geo-location, where you can assign multiple IP address ranges to it. Use the following command for each range: [no] ip start-ip-addr {mask ip-mask | end-ip-addr} Default Mode N/A Global configuration mode
156 of 260
mapping.
If no geo-location is configured for a GSLB site, GSLB automatically
AX device to a geo-location. Example The following example configures geographic location US.CA.SanJose for IP address range 100.1.1.1 through 100.1.1.125:
Default Usage
N/A This command is available only if you have already imported a geo-location database file. This command can replace a loaded geo-location database file but does not unload one without replacing it. To unload a geo-location database file without replacing it, see gslb geo-location load on page 158. Global configuration mode
Mode
157 of 260
Syntax
file-name csv-templatename
Loads a custom database. You can load a custom geo-location database from a file in comma-separated-values (CSV) format. This option requires configuration of a CSV template on the AX device. When you load the CSV file, the data is formatted based on the template. (To configure a CSV template, see gslb template csv on page 175.)
Note:
The file-name option is available only if you have already imported a geolocation database file. To display a list of filenames, enter the following: gslb geo-location load ? all Unloads all geo-location database files, including the default database (IANA). The all option is valid only with the no form of the command shown above.
The IANA geo-location database is loaded by default. Global configuration mode You can load more than one geo-location database. When you load a new database, if the same IP address or IP address range already exists in a previously loaded database, the address or range is overwritten by the new database. Performance by Design Document No.: D-030-01-00-0029 - Ver. 2.7.0 10/10/2012
158 of 260
Example
gslb group
Description Configure GSLB group settings. GSLB controllers within a GSLB group automatically synchronize GSLB configuration information and data. [no] gslb group default The command changes the CLI to the configuration level for the group, where the following group-related commands are available: (The other commands are common to all CLI configuration levels. See the AX Series CLI Reference.) Command [no] configanywhere Description Allows GSLB to be configured on any group member, without restricting the changes to the master controller. If this option is used and the current GSLB controller has the highest priority of all group members, then this current controller will attempt to retrieve the config file from the master GSLB controller before assuming control. Enables automatic configuration save on this GSLB group member when the configuration is saved on the group master. Discover member via DNS protocol. When this option is used, you do not need to configure a primary IP address, because GSLB will send a DNS query (based on the group name) to discover other group members. For example, if group name is group.a10.com then GSLB will send the DNS discover query with domain name group.a10.com. Performance by Design Document No.: D-030-01-00-0029 - Ver. 2.7.0 10/10/2012
Syntax
[no] configmerge
[no] config-save
[no] dnsdiscover
159 of 260
[no] standalone Run GSLB Group in standalone mode. [no] suffix name This option allows you to configure the DNS suffix that will be used for dns-discovery. You can specify the suffix (or name) that GSLB will append to the domain name when sending the dns-discover query. For example, if the group name is group and the suffix is a10.com, then the concatenated strings are sent in the DNS discovery query as group.a10.com.
Default
160 of 260
Mode
gslb ip-list
Description Configure a list of IP addresses and group IDs to use as input to other GSLB commands. [no] gslb ip-list list-name no gslb ip-list all The command changes the CLI to the configuration level for the list, where the following IP-list-related commands are available: (The other commands are common to all CLI configuration levels. See the AX Series CLI Reference.) Command [no] ip ipaddr [subnet-mask | /mask-length] id group-id Description
Syntax
Creates an IP entry in the list. Based on the subnet mask or mask length, the entry can be a host address or a subnet address. The id option adds the entry to a group. The group-id can be 0-31. Removes all manually configured IP addresses from the IP list. Loads the entries from a black/white list into the IP list. For information on configuring a black/ white list, see the Policy-Based SLB (PBSLB) section in the Traffic Security Features chapter of the AX Series System Configuration and Administration Guide. Removes all GSLB IP lists from the configuration. The all option is valid only with the no form of the command shown above.
all
Default
None
161 of 260
list, then load the entries from the black/white list into an IP list.
Use this command to configure individual IP list entries.
Example
The following commands configure a GSLB IP list and use the list to exclude IP addresses from aRDT data collection:
AX(config)#gslb ip-list iplist1 AX(config-gslb ip-list)#ip 192.168.1.0 /24 id 3 AX(config-gslb ip-list)#ip 10.10.10.10 /32 id 3 AX(config-gslb ip-list)#ip 10.10.10.20 /32 id 3 AX(config-gslb ip-list)#ip 10.10.10.30 /32 id 3 AX(config-gslb ip-list)#exit AX(config)#gslb policy pol1 AX(config-gslb policy)#ip-list iplist1 AX(config-gslb policy)#active-rdt ignore-id 3
gslb ping
Description Syntax Test GSLB connectivity from the GSLB AX device to a site AX device. ping {site-name | ipaddr} site-name | ipaddr GSLB site name or the IP address of the site AX device. Description GSLB site name of the site AX device. The IP address of the site AX device.
162 of 260
gslb policy
Description Syntax Configure a GSLB policy. [no] gslb policy {default | policy-name} no gslb policy all Parameter default policy-name all Description The default GSLB policy included in the software. Name of the policy, up to 63 alphanumeric characters. Removes all GSLB policies from the configuration. The all option is valid only with the no form of the command shown above.
This command changes the CLI to the configuration level for the specified GSLB policy. For information about the commands available at the GSLB policy level, see Policy Configuration Commands on page 188. Default Mode Example N/A Global configuration mode The following example creates a GSLB policy called gslb-policy2:
gslb protocol
Description Syntax Enable the GSLB protocol or set protocol options. [no] gslb protocol { enable {controller | device} | status-interval seconds | use-mgmt-port } Note: For the limit options, see gslb protocol limit on page 165.
163 of 260
Enables the GSLB protocol: controller Use this option on the AX device on which GSLB is configured. device Use this option on the AX devices that are SLB devices at the GSLB sites.
status-interval seconds Changes the number of seconds between GSLB status messages. You can specify 1-300 seconds. use-mgmt-port Use the management route table instead of the data route table.
Default
Mode Usage
Global configuration mode The A10 Networks GSLB protocol uses port 4149. The protocol is registered on this port for both TCP and UDP. AX devices use the GSLB protocol for GSLB management traffic. The protocol must be enabled on the GSLB controller, and it is recommended (but not required) that you enable the protocol on the site AX devices. The following GSLB policy metrics require the protocol to be enabled on both the site AX devices as well as the GSLB controller:
Session-Capacity aRDT Connection-Load Num-Session
The GSLB protocol is also required for the Health-Check metric, if the default health checks are used. If you modify the health checks, the GSLB protocol is not required.
164 of 260
Example
The following command enables the GSLB protocol on a site AX Series device:
165 of 260
Mode
gslb service-ip
Description Configure a service IP, which can be a virtual servers or real servers IP address. [no] gslb service-ip service-name [ipaddr] no gslb service-ip all Parameter service-name ipaddr Description Name of the service, up to 63 alphanumeric characters. IP address of the virtual server or real server. You can specify an IPv4 or IPv6 address. (If you are changing the configuration of a GSLB service that is already configured, this parameter is not required.) all Removes all GSLB service IPs from the configuration. The all option is valid only with the no form of the command shown above.
Syntax
This command changes the CLI to the configuration level for the specified service, where the following GSLB-related commands are available: Command disable enable [no] external-ip ipaddr Description Disables GSLB for the service IP address. Enables GSLB for the service IP address. Assigns an external IP address to the service IP. The external IP address allows a service IP that has an internal IP address to be reached from outside the internal network. Configures monitoring of the service IP address. If you enter the command without any options,
166 of 260
{tcp | udp}
167 of 260
Example
The following example creates a GSLB service IP address named gslbsrvc2 with IP address 192.160.20.99:
gslb site
Description Syntax Configure a GSLB site. [no] gslb site site-name no gslb site all Parameter site-name all Description Name for the site, up to 63 alphanumeric characters. Removes all GSLB sites from the configuration. The all option is valid only with the no form of the command shown above.
168 of 260
169 of 260
170 of 260
Associates this site with a specific geographic location. (To configure a location, use the gslb geo-location command.) Associates a real server with this site. Note: Generally, virtual servers rather than real servers are associated with a site. To associate a virtual server with a site, use the vip-server option of the slb-dev command.
Specifies the device that provides SLB for the site. The IP address must be reachable by the GSLB AX Series when the GSLB protocol is enabled. This command changes the CLI to the configuration level for the SLB device. At this CLI level, the following optional GSLB-related commands are available: [no] admin-preference num Assigns a preference value to the SLB device. If the Admin-Preference metric is enabled in the policy and all metrics before this one result in a tie, the SLB device with the highest Admin-Preference value is preferred. You can specify from 0 255. The default is 100. [no] auto-detect [ip | port] Enables DNS auto mapping at the service IP level or the port level. [no] auto-map Enables auto mapping for this site. [no] gateway ipaddr Specifies the gateway the SLB device will use to reach the GSLB local DNS for collecting aRDT measurements. [no] gateway health-check Enables gateway health checking. A gateway health check is a Layer 3 health check (ping) sent to the gateway router for an SLB site. This option is enabled by default.
171 of 260
172 of 260
[no] weight num Assigns a weight to the site. If the Weighted-Site metric is enabled in the policy and all metrics before Weighted-Site result in a tie, the site with the highest weight is preferred. The weight can be from 1 100. The default is 1. Default Mode Example See above. Global configuration mode The following example creates a site named NY-site and adds SLB AX Series site-ax-1 with IP address 10.10.10.10 to the site:
Syntax
173 of 260
Default
300
174 of 260
Syntax
175 of 260
Note:
To remove all CSV templates and SNMP templates, use the following command: no gslb template all This command changes the CLI to the configuration level for the specified template, where the following commands are available. (The other commands are common to all CLI configuration levels. See the AX Series CLI Reference.) Command [no] delimiter {character | ASCII-code} Description
Specifies the character used in the file to delimit fields. You can type the character or enter its decimal ASCII code (0-255). The num option specifies the field position within the CSV file. You can specify from 1-64. The following options specify the type of geolocation that is located in the field position: ip-from Specifies the beginning IP address in the range or subnet. ip-to-mask Specifies the ending IP address in the range, or the subnet mask. continent Specifies the continent where the IP address range or subnet is located. country Specifies the country where the IP address range or subnet is located. state Specifies the state where the IP address range or subnet is located. city Specifies the city where the IP address range or subnet is located.
Default
There is no default CSV template. When you configure one, the field locations are not set. The default delimiter character is a comma ( , ).
176 of 260
Example
AX(config)#gslb template csv test1-tmplte AX(config-gslb template csv)#field 1 ip-from AX(config-gslb template csv)#field 2 ip-to-mask AX(config-gslb template csv)#field 5 continent AX(config-gslb template csv)#field 3 country
Note:
To remove all CSV templates and SNMP templates, use the following command: no gslb template all This command changes the CLI to the configuration level for the specified template, where the following commands are available. (The other commands are common to all CLI configuration levels. See the AX Series CLI Reference.) Command [no] auth-key string Description Specifies the authentication key. The key string can be 1-127 characters long. This command is applicable if the security level is auth-no-priv or auth-priv.
177 of 260
For SNMPv1 or v2c, specifies the community string required for authentication. Specifies the ID of the SNMPv3 protocol engine running on the site AX device. Specifies an SNMPv3 collection of management information objects accessible by an SNMP entity. Specifies the IP address of the site AX device. Specifies the SNMP interface ID. Specifies the amount of time between each SNMP GET to the site AX devices. You can specify 1-999 seconds. The default is 3. Specifies the interface MIB object to query on the site AX device.
Note:
If the object is part of a table, make sure to append the table index to the end of the OID. Otherwise, the AX device will return an error. [no] port portnum Specifies the protocol port on which the site AX devices listen for the SNMP requests from the GSLB AX device. You can specify 1-65535. The default is 161. Specifies the encryption key. The key string can be 1-127 characters long. This command is applicable only if the security level is auth-priv. Specifies the privacy protocol used for encryption. This command is applicable only if the security level is auth-priv.
178 of 260
Specifies the SNMPv3 security level: no-auth Authentication is not used and encryption (privacy) is not used. This is the default. auth-no-priv Authentication is used but encryption is not used. auth-priv Both authentication and encryption are used.
Specifies the SNMPv3 username required for access to the SNMP agent on the site AX device. Specifies the SNMP version running on the site AX device.
See above. Global configuration mode The community command applies only to SNMPv1 or v2c. Most of the other commands, with the exception of the version, interval, port, and interface commands, apply to SNMPv3. You can not delete an SNMP template if the template is in use by a site. To delete a template, first remove it from all site configurations that are using it.
Example
AX(config)#gslb template snmp snmp-1 AX(config-gslb template snmp)#version v2c AX(config-gslb template snmp)#host 192.168.214.124 AX(config-gslb template snmp)#oid .1.3.6.1.2.1.2.2.1.16.12 AX(config-gslb template snmp)#community public AX(config-gslb template snmp)#exit
179 of 260
AX(config)#gslb template snmp snmp-2 AX(config-gslb template snmp)#security-level auth-priv AX(config-gslb template snmp)#host 192.168.214.124 AX(config-gslb template snmp)#username read AX(config-gslb template snmp)#oid .1.3.6.1.2.1.2.2.1.16.12 AX(config-gslb template snmp)#priv-proto des AX(config-gslb template snmp)#auth-key 12345678 AX(config-gslb template snmp)#priv-key 12345678
gslb zone
Description Configure a GSLB zone, which identifies the top-level name for the services load balanced by GSLB. [no] gslb zone zone-name no gslb zone all Note: DNSSEC is not supported for GSLB wildcard zones. Parameter zone-name Description Name of the zone, up to 127 alphanumeric characters, or * (wildcard character matching on all zone names). You can use lower case characters and upper case characters. However, since Internet domain names are case-insensitive, the AX device internally converts all upper case characters in GSLB zone names to lower case. all Removes all GSLB zones from the configuration. The all option is valid only with the no form of the command shown above.
Syntax
This command changes the CLI to the configuration level for the specified zone, where the following zone-related commands are available:
180 of 260
Configures a DNS Mail Exchange (MX) record for the zone. The name is the fully-qualified domain name of the mail server for the zone. If more than one MX record is configured for the same zone, the priority specifies the order in which the mail server should attempt to deliver mail to the MX hosts. The MX with the lowest priority value has the highest priority and is tried first. The priority can be 0-65535. There is no default. MX records configured on a zone are used only for services on which MX records are not configured.
Note:
If you want the GSLB AX device to return the IP address of the mail service in response to MX requests, you must configure Address records for the mail service. [no] dns-nsrecord domain-name
[no] dns-soarecord [external] dns-server-name mailbox-name [expire seconds] [refresh seconds] [retry seconds] [serial num] [ttl seconds] Configures a DNS start of authority (SOA) record for the GSLB zone. The external option causes the AX device to replace the internal SOA record with an external SOA record when a request is received from an external client. This prevents external clients from gaining access to internal information. The feature must also be enabled in the GSLB policy. Performance by Design Document No.: D-030-01-00-0029 - Ver. 2.7.0 10/10/2012
181 of 260
Adds a service to the zone. The port option specifies the service port and can be a well-known name recognized by the CLI or a port number from 1 to 65535. The service-name can be 1-31 alphanumeric characters or * (wildcard character matching on all service names). For the same reason described for zone names, the AX device converts all upper case characters in GSLB service names to lower case. This command changes the CLI to the configuration level for the service, where the following GSLB-related commands are available:
182 of 260
183 of 260
184 of 260
185 of 260
Binds a DNSSEC template to the zone. (See DNSSEC Support on page 133.) Changes the TTL of each DNS record contained in DNS replies received from the DNS for which the AX Series is a proxy, for this zone. You can specify from 0 to 1000000000 (one billion) seconds. This TTL setting overrides the TTL setting in the GSLB policy. The default is 10. The TTL of the DNS reply can be overridden in two different places in the GSLB configuration: (1) If a GSLB policy is assigned to the individual
186 of 260
Example
The following example uses the wildcard character at the end of the gslb zone command. This has the result of identifying all GSLB zones so that the next line of the configuration creates a positive match on all DNS domains that have the prefix of www.
Example
The following commands create a default GSLB policy and then specify that a backup server at IP 192.168.123.1 will be returned to the client if the primary servers fail.
AX(config)#gslb policy default AX(config-gslb policy)#dns backup-server AX(config-gslb policy)#exit AX(config)#gslb zone z1 AX(config-gslb zone)#service 80 http AX(config-gslb zone-gslb service)#dns-a-record 192.168.123.1 as-backup AX(config-gslb zone-gslb service)#exit
no gslb all
Description Syntax Default Mode Delete all GSLB configuration commands. no gslb all N/A Global configuration mode
187 of 260
active-rdt
Description Configure the active-Round Delay Time (aRDT) metric. aRDT measures the round-delay-time for a DNS query and reply between a site AX device and the GSLB local DNS. Syntax [no] active-rdt [difference num] [fail-break] [ignore-id group-id] [keep-tracking] [limit ms] [samples num-samples] [single-shot] [skip count] [timeout seconds] [tolerance num-percentage] Parameter difference num fail-break Description Number from 0 to 16383 specifying the rounddelay-time difference. Enables GSLB to stop if the configured aRDT limit in a policy is reached. The fail-break action depends on whether the GSLB controller is running in server mode or proxy mode: Server mode: If a backup-alias is configured, the GSLB controller returns the backup-alias to
188 of 260
keep-tracking
limit ms
189 of 260
timeout seconds
tolerance num-percentage
Default
Disabled. When you enable the aRDT metric, it has the following default settings:
difference 0 fail-break disabled ignore-id not set keep-tracking disabled limit 16383 ms samples 5 single-shot Disabled. Multiple samples are taken at regular intervals. skip 3 timeout 3 seconds tolerance 10 percent.
Mode Usage
GSLB Policy This metric requires the GSLB protocol to be enabled both on the GSLB controller and on the site AX devices.
190 of 260
AX(config gslb-policy)#active-rdt
active-servers
Description Configure the Active-Servers metric, which prefers the VIP with the highest number of active servers. Active-servers is a measure of the number of active real servers bound to a virtual port residing on a GSLB site. Syntax [no] active-servers [fail-break] Parameter fail-break Description Enables GSLB to stop if the number of active servers for all services is 0. The fail-break action depends on whether the GSLB controller is running in proxy mode or server mode: Server mode: If a backup-alias is configured, the GSLB controller returns the backup-alias to the client; otherwise, the controller returns a SERVFAIL error to the client. Proxy mode: If a backup-alias is configured, the GSLB controller returns the backup-alias to the client; otherwise, the controller returns the response from the backend DNS server. Default Mode Usage Disabled GSLB Policy Use this command to eliminate inactive real servers from being eligible for selection. The following command enables the Active-Servers metric:
Example
AX(config gslb-policy)#active-servers
191 of 260
admin-ip
Description Syntax Allows you to assign administrative weights to IP addresses. [no] admin-ip [top-only] Parameter top-only Description Returns only the first (top) IP address in the IP list. This option overrides the default behavior, in which GSLB sends all IP addresses to the requesting client after those addresses have been vetted according to the metrics in the policy.
Disabled GSLB Policy The prioritized list is sent to the next metric for further evaluation. If admin-ip is the last metric, the prioritized list is sent to the client. To configure the ordered list of IP addresses for a service, use the ip-order command at the service configuration level for the GSLB zone. See gslb zone on page 180.
admin-preference
Description Enable or disable the Admin-Preference metric, which prefers the site whose SLB device has the highest administratively set weight. [no] admin-preference Disabled GSLB Policy To set the GSLB Admin-Preference value for a site, use the admin-preference command at the configuration level for the SLB device within the site. (See gslb site on page 168.) The following command enables the Admin-Preference metric:
Example
AX(config gslb-policy)#admin-preference
192 of 260
alias-admin-preference
Description Enable or disable the Alias Admin Preference metric, which selects the DNS CNAME record with the highest administratively set preference. This metric is similar to the Admin Preference metric, but applies only to DNS CNAME records. [no] alias-admin-preference Disabled GSLB Policy Metric order does not apply to this metric. When enabled, this metric always has high priority. To configure the Alias Admin Preference metric: 1. At the configuration level for the GSLB service, use the admin-preference preference command to assign an administrative preference to the DNS CNAME record for the service. (See gslb service-ip on page 166.) 2. At the configuration level for the GSLB policy:
Use the alias-admin-preference command to enable the Alias
Admin Preference metric. Enable one or both of the following DNS options, as applicable to your deployment: DNS backup-alias DNS geoloc-alias (See dns on page 197.) 3. If using the backup-alias option, use the dns-cname-record as-backup option on the service. (See gslb service-ip on page 166.)
bw-cost
Description Configure the BW-Cost metric. This mechanism queries the bandwidth utilization of each site, and selects the site(s) whose bandwidth utilization has not exceeded a configured threshold during the most recent query interval. [no] bw-cost [fail-break]
Syntax
193 of 260
AX(config gslb-policy)#bw-cost
capacity
Description Configure the TCP/UDP Session-Capacity metric. This mechanism provides a way to shift load away from a site before the site becomes congested. Example: Site As maximum session capacity is 800,000 and Site Bs maximum session capacity is 500,000. If the Session-Capacity threshold is set to 90, then for Site A the capacity threshold is 90% of 800,000, which is 720,000. Likewise, the capacity threshold for Site B is 90% of 500,000, which is 450,000. Syntax [no] capacity [threshold num-percentage] [fail-break] Parameter threshold num-percentage Description Number from 0 to 100 specifying the maximum percentage of a site AX Series session table that can be used. If the session table utilization is greater than the specified percentage, the GSLB AX Series prefers other sites over this site.
194 of 260
Mode Usage
Example
AX(config gslb-policy)#capacity
connection-load
Description Configure the Connection-Load metric, which prefers sites that have not exceeded their thresholds for new connections. [no] connection-load [limit number-of-connections] | [samples number-of-samples interval seconds] [fail-break] Parameter limit numberof-connections Description Number that specifies the maximum average number of new connections per second the site AX Series can have. You can specify from 1 to 999999999 (999,999,999).
Syntax
195 of 260
Mode Usage
196 of 260
dns
Description Syntax Configure DNS parameters for the policy. [no] dns { action | active-only [fail-safe] | addition-mx | auto-map | backup-alias | backup-server | cache [aging-time {seconds | ttl}] | cname-detect | delegation | external-ip | external-soa | geoloc-action | geoloc-alias | geoloc-policy | hint | ip-replace | ipv6 options | logging {both | query | response | none} proxy block option | selected-only [num] | server [addition-mx] [any] [authoritative options] [mx] [ns [auto-ns]] [ptr [auto-ptr]] [srv] [txt] | sticky [network-mask | /prefix-length] [aging-time minutes] [ipv6-mask mask-length] | ttl num }
197 of 260
Note:
To configure the DNS action for a service, use the action action-type command at the configuration level for the service. See gslb zone on page 180. active-only [fail-safe] Removes IP addresses from DNS replies when those addresses fail health checks. Note: If none of the IP addresses in the DNS reply pass the health check, the GSLB AX Series does not use this metric, since it would result in an empty IP address list. The fail-safe option returns a list of server IP addresses for failed servers to the client. Without this option, IP addresses of failed servers are omitted from the reply. addition-mx Appends MX records in the Additional section in replies for A records, when the device is configured for DNS proxy or cache mode. Enables creation of A and AAAA records for IP resources configured on the AX device. For example, this option is useful for auto-mapping VIP addresses to service-IP addresses. (See Auto-mapping on page 73.) Returns the alias CNAME record configured for the service, if GSLB does not receive an answer to a query for the service and no active DNS server exists. This option is valid in server mode or proxy mode. To configure the backup alias for a service within a zone, use the following command at the configuration level for the service: dns-cname-record alias-name as-backup backup-server Designates one or more backup servers that can be returned to the client if the primaries should fail.
auto-map
backup-alias
Enables the GSLB AX device to cache DNS replies. The AX device uses information in the cached DNS entries to reply to subsequent client
198 of 260
delegation
external-ip
199 of 260
Enables hints, which appear in the Additional Section of the DNS response. Hints are A or AAAA records that are sent in the response to a clients DNS request. These records provide a mapping between the host names and IP addresses. addition Appends hints in the Additional Section (default). answer Appends hints in the Answer Section. none Does not append hints in the DNS response. The hint option applies to the following record types: NS, MX, and SRV.
ip-replace
Replaces the IP addresses in the DNS reply with the service IP addresses configured for the service. (To configure the service IP addresses, use the service-ip command at the configuration level for the service. See gslb zone on page 180.) Enables support for IPv6 AAAA records. The following options are supported: mapping {addition | answer | exclusive | replace} Specifies the actions in response to an
ipv6 options
200 of 260
and an IPv6 address. mix Enables GSLB to return both AAAA and A records in the same answer. smart Enables IPv6 return by query type. For the ipv4-ipv6 mapping records, an A query (IPv4) will return an A record and an AAAA query (IPv6) will return an AAAA record. logging options Configures DNS logging. The both | none | query | response option specifies the types of messages to log. To restrict logging to a specific geo-location or IP address, use one of the following options: proxy block options Blocks DNS t queries from being sent to an internal DNS server. The AX device must be in GSLB proxy mode for the feature to work. The options can be one or more of the following: a aaaa ns mx srv cname
201 of 260
server [options]
202 of 260
203 of 260
Default
disabled by default
addition-mx disabled auto-map disabled
204 of 260
for a cached DNS reply is the TTL set by the DNS server in the reply
cname-detect enabled delegation disabled external-ip enabled geoloc-action disabled geoloc-alias disabled geoloc-policy disabled hint enabled for addition option ip-replace disabled ipv6 all options disabled logging disabled proxy disabled selected-only disabled server disabled sticky disabled; when you enable this option, the default prefix is /
32, the default aging time is 5 minutes, and the default IPv6 mask length is 128.
ttl 10 seconds
Mode Usage
GSLB Policy If more than one of the following options are enabled, GSLB uses them in the order listed, beginning with sticky: 1. 2. 3. 4. sticky server cache proxy (The command does not have a separately configurable proxy option. The proxy option is automatically enabled when you configure the DNS proxy.)
205 of 260
Example
The following configuration excerpt uses the ipv6 mix option to enable mixing of IPv4 and IPv6 service-ip addresses in DNS answers. Both A and AAAA records will be included in replies to either A or AAAA requests from clients.
gslb service-ip ip1 20.20.20.100 port 80 tcp gslb service-ip ip2 20.20.20.102 port 80 tcp gslb service-ip ipv61 fe80::1 port 80 tcp gslb service-ip ipv62 fe80::2 port 80 tcp gslb service-ip ipv63 fe80::3 port 80 tcp gslb policy p8 dns ipv6 mix dns server gslb zone a8.com policy p8 service http www dns-a-record ip2 static dns-a-record ip1 static dns-a-record ipv61 static dns-a-record ipv62 static dns-a-record ipv63 static
Example
The following configuration excerpt uses the ipv6 smart option. For IPv4IPv6 mapping records, an A query will be answered by an A record and an AAAA query will be answered by an AAAA record. More specifically, if a client sends an A query, GSLB returns A records in the answer section, and AAAA records in the additional section. If a client sends an AAAA query,
206 of 260
dnssec key-generate
Description Syntax Generate the DNSSEC keyset. [no] dnssec key-generate name algorithm [RSASHA1 | RSASHA256 | RSASHA512 | NSEC3RSASHA1] keysize num Parameter name algorithm Description Name of the DNSSEC keyset. Specify which RSA SHA algorithm is used to generate the DNSSEC key pair (ZSK and KSK): RSASHA1 RSASHA256 RSASHA512 NSEC3RSASHA1 Note: Selecting one of the first three algorithms (RSASHA1, RSASHA256, or RSASHA512) will cause the standard NSEC resource record to be generated for the zone. However, selecting the fourth algorithm option (NSEC3RSASHA1) causes the NSEC3/NSEC3PARAM record to be gen-
207 of 260
Default Mode
export dnssec-dnskey
Description Syntax Export the DS keyset from the child zone to the parent zone. [no] import dnssec-dnskey authoritative-zone-name [use-mgmt-port] url Parameter zone-name use-mgmt-port url Description Authoritative zone name of the dnskey. Uses the management interface as the source interface for the connection to the remote device. File transfer protocol, username (if required), and directory path. You can enter the entire URL on the command line or press Enter to display a prompt for each part of the URL. If you enter the entire URL and a password is required, you will still be prompted for the password. The password can be up to 255 characters long. To enter the entire URL: tftp://host/file ftp://[user@]host[:port]/file scp://[user@]host/file rcp://[user@]host/file http://[user@]host/file https://[user@]host/file sftp://[user@]host/file Default N/A
208 of 260
geo-location
Description Configure a geographic location. GSLB forwards client requests from IP addresses within the locations range to the GSLB site that serves the location. [no] geo-location location-name start-ip-addr [mask ip-mask | end-ip-addr] Parameter location-name start-ip-addr mask ip-mask end-ip-addr Default Mode Usage None. GSLB Policy To prefer the location configured with this command over a globally configured location, use the gslb policy geo-location match-first policy command. (See geo-location match-first on page 209.) The following example configures geographic location CN.BeiJing for IP address range 200.1.1.1 through 200.1.1.253: Description Name of the location, up to 127 alphanumeric characters. Beginning IP address for the range. Network mask. Ending IP address for the range.
Syntax
Example
geo-location match-first
Description Configure the policy to prefer either the globally configured geo-location or the one configured in this policy. If a client IP address matches the IP ranges in a globally configured location and in a location configured in this policy, the geo-location match-first command specifies which matching geo-location to use.
209 of 260
global GSLB Policy The following command configures the GSLB AX Series to prefer locations configured in this policy:
geo-location overlap
Description Enable overlap matching mode. If there are overlapping addresses in the geo-location database, use this option to enable the AX device to find the most precise match. [no] geo-location overlap [global | policy] Parameter global policy Description GSLB prefers globally configured locations over locations configured in this policy. GSLB prefers locations configured in this policy over globally configured locations.
Syntax
Disabled GSLB Policy If you suspect a public IP address in your domain is not unique and the same IP address may be associated with different hosts, you can enable the geolocation overlap option. This causes the AX device to search the geo-location database for the match best (or longest matching IP address). Otherwise, the AX device will use its default behavior, which is to scan the specified geo-location database using the match first algorithm, which uses the first IP address-region mapping discovered. (See Geo-location Overlap on page 57.)
210 of 260
geographic
Description Enable or disable the Geographic metric. The Geographic metric prefers sites that are within the geographic location of the client. [no] geographic Enabled GSLB Policy You must configure the geographic location, by configuring a geo-location name, then assigning the geo-location to a GSLB site. To configure a geolocation, assign a client IP address range to a location name. (See gslb geolocation on page 156 and geo-location on page 209.) To assign the geolocation to a site, use the geo-location command at the site configuration level. (See gslb site on page 168.) The following command disables the Geographic metric:
Example
health-check
Description Enable or disable the Health-Check metric. The Health-Check metric prefers sites that pass their health checks. [no] health-check Enabled GSLB Policy This metric requires the GSLB protocol to be enabled both on the GSLB controller and on the site AX devices, if the default health checks are used on the service IPs. If you use a custom health monitor, or you explicitly apply the default Layer 3 health monitor to the service, the GSLB protocol is not used for any of the health checks. In this case, the GSLB protocol is not required to be enabled on the site AX devices, although use of the protocol is still recommended. Example The following command disables the Health-Check metric:
211 of 260
import dnssec-dnskey
Description Syntax Import the DNSKEY keyset from the child zone to the parent zone. [no] import dnssec-dnskey authoritative-zone-name [use-mgmt-port] url Parameter authoritativezone-name use-mgmt-port url Description Authoritative zone name of the dnskey. Uses the management interface as the source interface for the connection to the remote device. File transfer protocol, username (if required), and directory path. You can enter the entire URL on the command line or press Enter to display a prompt for each part of the URL. If you enter the entire URL and a password is required, you will still be prompted for the password. The password can be up to 255 characters long. To enter the entire URL: tftp://host/file ftp://[user@]host[:port]/file scp://[user@]host/file rcp://[user@]host/file http://[user@]host/file https://[user@]host/file sftp://[user@]host/file Default Mode Usage N/A Global config When using the CLI commands to import/export a DS/DNSKEY record to/ from a parent/child zone, it is not necessary to list the AX devices internal file name for the resource record. Instead, you can simply include the name of the DNS zone from which you will be importing or exporting the file.
212 of 260
import dnssec-ds
Description Syntax Import the DS keyset from the child zone to the parent zone. [no] import dnssec-ds child-zone-name [use-mgmtport] url Parameter Description
child-zone-name Child zone name of the ds keyset. use-mgmt-port url Uses the management interface as the source interface for the connection to the remote device. File transfer protocol, username (if required), and directory path. You can enter the entire URL on the command line or press Enter to display a prompt for each part of the URL. If you enter the entire URL and a password is required, you will still be prompted for the password. The password can be up to 255 characters long. To enter the entire URL: tftp://host/file ftp://[user@]host[:port]/file scp://[user@]host/file rcp://[user@]host/file http://[user@]host/file https://[user@]host/file sftp://[user@]host/file Default Mode Usage N/A Global config When using the CLI commands to import/export a DS/DNSKEY record to/ from a parent/child zone, it is not necessary to list the AX devices internal file name for the resource record. Instead, you can simply include the name of the DNS zone from which you will be importing or exporting the file.
213 of 260
ip-list
Description Syntax Default Usage Example Use an IP list to exclude a set of IP addresses from aRDT polling. [no] ip-list list-name None To configure an IP list, see gslb ip-list on page 161. The following commands configure a GSLB IP list and use the list to exclude IP addresses from aRDT data collection:
AX(config)#gslb ip-list iplist1 AX(config-gslb ip-list)#ip 192.168.1.0 /24 id 3 AX(config-gslb ip-list)#ip 10.10.10.10 /32 id 3 AX(config-gslb ip-list)#ip 10.10.10.20 /32 id 3 AX(config-gslb ip-list)#ip 10.10.10.30 /32 id 3 AX(config-gslb ip-list)#exit AX(config)#gslb policy pol1 AX(config-gslb policy)#ip-list iplist1 AX(config-gslb policy)#active-rdt ignore-id 3
least-response
Description Enable or disable the Least-Response metric, which prefers VIPs that have the fewest hits. [no] least-response Disabled GSLB Policy The following command enables the Least-Response metric:
AX(config gslb-policy)#least-response
214 of 260
metric-fail-break
Description Syntax Default Mode Enable GSLB to stop if there are no valid service IPs. [no] metric-fail-break Disabled GSLB Policy
metric-force-check
Description Syntax Default Force the GSLB controller to always check all metrics in the policy. [no] metric-force-check By default, the GSLB controller stops evaluating metrics for a site once a metric comparison definitively selects or rejects a site. GSLB Policy
Mode
metric-order
Description Syntax Configure the order in which the GSLB metrics in this policy are used. [no] metric-order metric [metric ...] Parameter metric [metric ...] Description One or more of the following metrics: active-rdt active-servers admin-preference bw-cost capacity connection-load geographic health-check least-response Performance by Design Document No.: D-030-01-00-0029 - Ver. 2.7.0 10/10/2012
215 of 260
216 of 260
num-session
Description Configure the Num-Session metric, which evaluates a site based on available session capacity and tolerance threshold compared to another site. Sites that are at or below their thresholds of current available sessions are preferred over sites that are above their thresholds. Example: Site A has 800,000 sessions available and Site B has 600,000 sessions available. If Num-Session is enabled, then Site A is preferred because it has a larger number of available sessions than site B. If the tolerance option is enabled (with a default value of 10 percent), and if Site A has 800,000 sessions available and Site B has 600,000 sessions available, then Site A will continue to be preferred until Site Bs available sessions exceed Site As available sessions by more than 10 percent. In this case, Site A will remain the preferred site until Site Bs available sessions exceed 800,000 by more than ten percent (or 80,000 sessions). If Site As available sessions remain constant, and Site Bs available sessions increase to the point that they exceed 880,000 sessions, the Site B would become the preferred site. Note: When dealing with smaller base numbers, a small fluctuation in the number of available sessions can cause flapping from one site to another. Thus, when configuring sites with smaller capacities, it is recommended to use a larger tolerance number to prevent frequent flapping between preferred sites. [no] num-session [tolerance num] Parameter num-percentage Description Number from 0 to 100 specifying the percentage by which the number of available sessions on site SLB devices can differ without causing the NumSession metric to select one site device over another. (See the Usage description.)
Syntax
Default
Disabled. When you enable the Num-Session metric, the default tolerance is 10 percent. GSLB Policy The GSLB AX Series considers site SLB devices to be equal if the difference in the number of available sessions on each device does not exceed the tolerance percentage. The tolerance percentage ensures that minor differ-
Mode Usage
217 of 260
round-robin
Description Syntax Default Mode Usage Configure the Round-Robin metric, which selects sites in sequential order. [no] round-robin Enabled GSLB Policy The AX device uses Round-Robin to select a site at the end of the policy parameters evaluation. This is true even if the Round-Robin metric is disabled in the GSLB policy. The following command disables the Round-Robin metric:
Example
weighted-alias
Description Enable the Weighted Alias metric, which prefers CNAME records with higher weight values over CNAME records with lower weight values. This metric is similar to Weighted-IP, but applies only to DNS CNAME records. [no] weighted-alias Disabled GSLB Policy
218 of 260
your deployment: DNS backup-alias DNS geoloc-alias (See dns on page 197.) 3. If using the backup-alias option, use the dns-cname-record as-backup option on the service. (See gslb service-ip on page 166.)
weighted-ip
Description Configure the Weighted-IP metric, which uses service IP addresses with higher weight values more often than addresses with lower weight values. [no] weighted-ip [total-hits] Parameter total-hits Description First sends requests to the service IP addresses that have fewer hits. After all service IP addresses have the same number of hits, GSLB sends requests based on weight. This option is disabled by default.
Syntax
Disabled GSLB Policy As a simple example, assume that the Weighted-IP metric is the only enabled metric, or at least always ends up being used as the tie breaker. The total-hits option is disabled. IP address 10.10.10.1 has weight 4 and IP address 10.10.10.2 has weight 2. During a given session aging period, the first 4 requests go to 10.10.10.1, the next 2 requests go to 10.10.10.2, and so on, (4 to 10.10.10.1, then 2 to 10.10.10.2).
219 of 260
weighted-site
Description Configure the Weighted-Site metric, which uses sites with higher weight values more often than sites with lower weight values. [no] weighted-site [total-hits] Parameter total-hits Description First sends requests to the sites that have fewer hits. After all service sites have the same number of hits, GSLB sends requests based on weight. This option is disabled by default.
Syntax
Default
Disabled. When you enable the Weighted-Site metric, the default weight of each site is 1. GSLB Policy As a simple example, assume that the Weighted-Site metric is the only enabled metric, or at least always ends up being the tie breaker. Site A has weight 4 and site B has weight 2. During a given session aging period, the first 4 requests go to site A, the next 2 requests go to site B, and so on, (4 to A, then 2 to B). Here is an example using the same two sites and weights, with the total-hits option enabled. Site A has weight 4 with total hits 8, and site B has weight 2 with total hits 0. In this case, the first 4 requests go to site B, then requests are sent as described above. Four requests go to site A, then 2 requests go to site B, and so on.
Mode Usage
220 of 260
221 of 260
Show Commands
This section describes the GSLB show commands.
Syntax
show gslb cache [service-name ...] [zone zone-name] Option zone-name service-name Description Displays cached DNS messages for the specified zone. Displays cached DNS messages for the specified service.
Mode Example
All The following command displays cached DNS messages for service www.testme.com:http:
AX#show gslb cache www.testme.com:http QD = Question Records, AN = Answer Records NS = Authority Records, AR = Additional Records Flag = DNS Flag, Len = Cache Length A = Authoritative Answer, D = Recursion Desired R = Recursion Available Zone: testme.com Service Alias Len TTL Flag QD AN NS AR --------------------------------------------------------------------------www.testme.com:http 96 3055 DR 1 4 0 0
222 of 260
Mode Usage
223 of 260
When used in private partitions When used within a private partition, the show gslb config command can include the following:
group: Show GSLB Group configuration ip-list: Show GSLB IP list configuration policy: Show GSLB policy configuration service-ip: Show GSLB service-IP configuration site: Show GSLB site configuration template: Show GSLB template configuration zone: Show GSLB zone configuration
Note:
When the show gslb config command is used within a private partition, the following command completions are not supported: active-rdt, dns, geo-location, protocol, system, and view. When used in gslb-view When used in gslb-view, the show gslb config command can include the following:
group: Show GSLB Group configuration ip-list: Show GSLB IP list configuration policy: Show GSLB policy configuration site: Show GSLB site configuration
224 of 260
Note:
When the show gslb config command is used in gslb-view, the following command completions are not supported: active-rdt, dns, geo-location, protocol, service-ip, system, and view. Details about L3V Deployments When using the new show gslb config command filters in L3V partitions, only the following command completions are supported: group, ip-list, policy, service-ip, site, template, and zone. The following show gslb config command options are not supported in L3V deployments, and by extension, not supported by the new gslb show command enhancements: active-rdt, dns, geo-location, protocol, system and view.
225 of 260
Show gslb config for private partition The command syntax when used within a private partition is as follows: show gslb config [ group | ip-list | policy | service-ip | site | template | zone | common filters(| include xxx) ] CLI Example:
Show gslb config zone Show gslb config site template Show gslb config service-ip zone | include aaa
226 of 260
227 of 260
228 of 260
Example
AX#show gslb geo-location pc Last = Last Matched Client, Hits = Count of Client matched Sub = Count of Sub Geo-location T = Type, G(global)/P(policy), P-Name = Policy name Geo-location: pc From To Last Hits Sub T P-Name ----------------------------------------------------------------------------1.2.2.0 1.2.2.255 (empty) 0 0 P default
Table 7 describes the fields in the command output. TABLE 7 show gslb geo-location fields
Description Name of the geo-location. Beginning address in the address range assigned to the geolocation.
229 of 260
Hits Sub
P-Name
P The geo-location is configured within a GSLB policy. Name of the GSLB policy where the geo-location is configured.
Example
The following command shows the load status information for a geo-location database file:
AX(config)#show gslb geo-location file test1 T = T(Template)/B(Built-in), Per = Percentage of loading Filename T Template Per Lines Success Error -----------------------------------------------------------------------------test1 T t1 98% 11 10 0
Example
AX(config)#show gslb geo-location db Last = Last Matched Client, Hits = Count of Client matched T = Type, Sub = Count of Sub Geo-location G(global)/P(policy), S(sub)/R(sub range) M(manually config) Global Name From To Last Hits Sub T -----------------------------------------------------------------------------NA (empty) (empty) (empty) 0 1 G Geo-location: NA, Global
230 of 260
Mode Example
AX(config)#gslb group default AX(config-gslb group)#enable AX(config-gslb group)#show gslb group brief Pri = Priority, Attrs = Attributes D = Disabled, L = Learn P = Passive, * = Master Name default Pri Attrs Master 255 L* local Member 2 ------------------------------------------------------------------------------
231 of 260
Master Member
AX(config-gslb group)#show gslb group Pri = Priority, Attrs = Attributes D = Disabled, L = Learn P = Passive, * = Master Group: default, Master: 192.168.101.72 Member local 192.168.1.131 192.168.1.132 ID Pri Attrs Status OK Synced Synced ----------------------------------------------------------------------------22e40d29 255 L* 941a1229 100 ab301229 100 P
ID
232 of 260
Status
233 of 260
Mode
Mode
AX#show gslb policy www Policy name: www MO = Metric Order, En-Value = Enabled or Value Type | MO| Option | En-Value | Description ================================================================================ DNS | | action | no | Action | | active-only | no | Only return active service-IP(s) | | selected-only| no | Only return selected service-IP(s) | | cname-detect| yes | Apply policy on CNAME records | | external-ip | yes | Return external IP | | external-soa| no | Return external SOA
234 of 260
235 of 260
Table 10 describes the fields in the command output. TABLE 10 show gslb policy fields
Field Policy name Type MO Option En-Value Description Description Name of the GSLB policy. Name of the GSLB metric. For GSLB metrics, indicates the order in which the metrics are used. Metric or option name. For metric, indicates whether they are enabled (yes or no). For options, indicates the value. Description of the metric or option.
Syntax
Mode
236 of 260
The following command shows GSLB protocol status information on an AX device acting as a GSLB controller:
0 1 0 34411 1407 0
0 1 0 34411 1407
237 of 260
ip ipaddr [...] Displays aRDT data only for the specified clients. Mode Usage All All of the options except local-info are applicable when you enter the command on a GSLB AX device. To display local aRDT data on a site AX device, enter the command on the site AX device and use the local-info option. Here is an example of the output for this command when entered on the GSLB AX device:
Example
AX#show gslb rdt
TTL = Time to live(Unit: min), T = Type, A(active) Device: site1/remote IP 10.10.10.2 20.20.20.21 192.168.217.1 192.168.217.11 TTL 10 10 10 10 T| A| A| A| A| 1 0 41 38 41 2 0 40 54 40 3 0 29 46 29 4 0 46 50 46 5 0 38 43 38 6 0 42 38 42 34 30 7 0 34 8 0 30 ------------------------------------------------------------------------------
238 of 260
This example shows the default display (with no additional options). The TTL results are organized by site AX device, then by geo-location. Table 11 describes the fields in the command output. TABLE 11 show gslb rdt fields
Field Device IP TTL T 1-8 Geo-location Site T RDT TS Description Site AX device. IP address at the other end of the aRDT exchange. Time-to-live for the Active-TT entry. RDT type, which can be A (aRDT). Individual aRDT measurements (in units of seconds). Geo-location name for which aRDT measurements have been taken. GSLB site name within the geo-location. RDT type. (See descriptions above.) Individual aRDT measurements (in units of seconds). System time stamp of the aRDT measurement.
239 of 260
Collects samples only for the specified range of service port numbers.
Mode Usage
All The number of connections on the site is sampled based on the GSLB status interval. (This is configurable using the gslb protocol command. See gslb protocol on page 163.) Samples are listed row by row. The first 7 samples appear on row 1, the second 7 samples appear on row 2, and so on. If you disable the GSLB protocol, the data is cleared.
Example
The following example shows connection activity for virtual port 80 on virtual server china.
AX#show gslb samples conn china 80 0 | 1 2 3 4 5 6 7 ---------------------------------------------------------------------------1 | 15000 25000 35000 45000 55000 65000 75000 2 | 85000 95000 105000
240 of 260
Mode Example
All The following command shows 5 connection-load samples, collected at 5second intervals:
AX#show gslb samples conn-load 5 5 ip1:80, average is: 36 | 1 2 3 4 5 6 7 ---------------------------------------------------------------------------1 | 0 0 11 1 168 ip2:80, average is: 38 | 1 2 3 4 5 6 7 ---------------------------------------------------------------------------1 | 0 0 22 2 168 ip3:80, average is: 60 | 1 2 3 4 5 6 7 ---------------------------------------------------------------------------1 | 120 0 0 0 180 ip4:80, average is: 86 | 1 2 3 4 5 6 7 ---------------------------------------------------------------------------1 | 240 0 0 0 192
In this example, five samples, taken at 5-second intervals, are shown for each of four services (ip1:80 to ip4:80). The services are listed by service IP and service port. In each section, the numbers across the top are column numbers. The numbers along the leftmost column are row numbers. The other numbers are the actual connection load data. For example, for ip1:80 (service port 80 on service IP ip1), there were no connections during the first or second data samples, and 11 connections during the third sample.
241 of 260
Mode Usage
All Eight aRDT samples are displayed for each device. Times are shown in 10millisecond (ms) increments. In the example below, the first aRDT time for Device1 is 50 ms. If you disable the GSLB protocol, the data is cleared.
242 of 260
Specifies a client host or subnet address. (This option applies only to the session option.)
Mode
All
243 of 260
AX#show gslb service dns-cname-record a10.com Zone: a10.com Alias = Alias Name, Geoloc = Geo-location G-Geoloc = Matched Global Geo-location P-Geoloc = Matched Policy Geo-location Service Alias Geoloc G-Geoloc P-Geoloc -----------------------------------------------------------------------------http:www http.a10.com pc1 (empty) (empty) ftp:ftp ftpp.a10.com pc1 (empty) pc1
AX#show gslb service-ip beijing V = Is Virtual server, E = Enabled P-Cnt = Count of Service Ports Service-IP IP V E State P-Cnt Hits -----------------------------------------------------------------------------:Device1:beijing 2.1.1.10 Y Y UP 3 0
Table 12 describes the fields in the command output. TABLE 12 show gslb service-ip fields
Field Service-IP IP V E State P-Cnt Hits Description Device name and service IP name. IP address of the service. Indicates whether the service IP is a virtual server IP address (Y) or a real server IP address (N). Indicates whether the service IP is enabled. Indicates the service IP state: UP or DOWN. Number of service ports on the service IP. Number of times the service IP has been selected.
244 of 260
AX#show gslb service-port Attrs = Attributes, Act-Svrs = Active Real Servers Curr-Conn = Current Connections D = Disabled, P = GSLB Protocol, L = Local Protocol Service-Port Attrs State Act-Svrs Curr-Conn -----------------------------------------------------------------------------10.77.27.222:80 L DOWN 0 0 10.10.10.1:80 DOWN 0 0 67.67.6.84:80 UP 1 0 67.67.6.82:21 UP 1 0 192.168.100.6:80 DOWN 0 0
Table 13 describes the fields in the command output. TABLE 13 show gslb service-port fields
Field Service-Port Attrs State Act-Svrs Curr-Conn Description Service IP address and service port number. Indicates whether the service port is reached using the GSLB protocol or the local (SLB) protocol. Indicates the service state: IP or DOWN. Number of active real servers for the service. Current number of connections to the service.
245 of 260
AX#show gslb site Site1 Site Device/server VIP Vport State Hits ------------------------------------------------------------------Site1 Device1 (device) 2.1.1.10 Up 0 1.2.2.2 21 Up 23 Up 80 Up 2.1.1.11 Up 0 21 Up 80 Up 2.1.1.12 Up 0 21 Up 23 Up 80 Up serverB (server) Up 0 3.1.1.10 80 Up
246 of 260
Table 15 describes the fields in the command output when the bw-cost option is used. TABLE 15 show gslb site bw-cost fields
Field Site Template Current Highest Limit U Type Len Value TI Description GSLB site name. SNMP template name. Current value of the SNMP object used for measurement. Highest value of the SNMP object used for measurement. Limit configured for the BW-Cost metric. Indicates whether the site is usable, based on the BW-Cost measurement. Data type of the SNMP object. Data length of the SNMP object. Value of the SNMP object. Time interval between measurements.
Example
AX#show gslb site statistics Site Hits Last ----------------------------------------------------------------------------site1 14 2.1.1.10 site2 0 (empty) site3 0 (empty) site4 0 (empty)
247 of 260
248 of 260
AX#show gslb slb-device Device1 APF = Administrative Preference, Sub-Cnt = Count of Service-IPs Sesn-Uzn = Session Utilization Sesn-Num = Number of Available Sessions Device IP APF Sesn-Uzn Sesn-Num Sub-Cnt -----------------------------------------------------------------------------site1:Device1 1.2.2.2 200 0% 0 3
Table 17 describes the fields in the command output. TABLE 17 show gslb site fields
Field Device IP APF Sesn-Uzn Sesn-Num Sub-Cnt Description Site name and device name. SLB devices IP address. Administrative preference for the device. Current session utilization on the device. Number of sessions available on the device. Number of service IPs on the device.
Example
249 of 260
Example
AX#show gslb statistics message GSLB site: site1 slb-dev: remote (20.20.20.2) Established Session ID: 40576 Connection success: 4 |Connection failure: Open packet sent: 4 |Open packet received: Open session success: 1 |Open session failure: Dropped sessions: 0 |Update packet received: Keepalive packet sent: 1219 |Keepalive packet received: Notify packet sent: 0 |Notify packet received: Message Header Error: 0 | GSLB site: site2 slb-dev: local (192.168.217.2) Established Session ID: 104 Connection success: 1 |Connection failure: Open packet sent: 1 |Open packet received: Open session success: 1 |Open session failure: Dropped sessions: 0 |Update packet received: Keepalive packet sent: 2 |Keepalive packet received: Notify packet sent: 0 |Notify packet received: Message Header Error: 0 | GSLB controller: 192.168.217.2 Established Session ID: 104 Connection success: 0 |Connection failure: Open packet sent: 1 |Open packet received: Open Sent 1 |Open session failure: Dropped sessions: 0 |Update packet sent: Keepalive packet sent: 2 |Keepalive packet received: Notify packet sent: 0 |Notify packet received: Message Header Error: 0 |
0 1 3 5101 1218 0 0
1 1 0 22 1 0 0
0 1 0 22 1 0 0
250 of 260
AX#show gslb zone a10.com Zone Service Policy TTL -----------------------------------------------------------------------------a10.com www 20 http:www www 20 ftp:ftp ftp 30
Table 18 describes the fields in the command output. TABLE 18 show gslb zone fields
Field Zone Service Policy TTL Description Zone name. Service type and service name. GSLB policy name. DNS TTL value set by GSLB in DNS replies to queries for the zone address.
Example
AX#show gslb zone dns-mx-record Pri = Priority, Last = Last Server Owner MX-Record Pri Hits Last -----------------------------------------------------------------------------mail.abc.com:smtp mail1.abc.com 0 0 mail2.xyz.com 10
251 of 260
Example
AX(config-gslb zone-gslb service)#show gslb zone example.com statistics GSLB Zone example.com: Total Number of Services configured: 1 Rcv-query = Received Query, Sent-resp = Sent Response M-Proxy = Proxy Mode, M-Cache = Cache Mode M-Svr = Server Mode, M-Sticky = Sticky Mode Service Rcv-query Sent-resp M-Proxy M-Cache M-Svr M-Sticky ----------------------------------------------------------------------------http:www 16 15 3 0 0 12 Total 16 15 3 0 0 12
Table 20 describes the fields in the command output. TABLE 20 show gslb zone statistics fields
Field GSLB Zone Total Number of Services configured Service Rcv-query Sent-resp M-Proxy M-Cache Description Zone name. Number of GSLB services configured for the zone.
M-Svr
Service type and service name. Number of DNS queries received for the service. Number of DNS replies sent to clients for the service. Number of DNS replies sent to clients by the AX device as a DNS proxy for the service. Number of cached DNS replies sent to clients by the AX device for the service. (This statistic applies only if the DNS cache option is enabled in the policy.) Number of DNS replies sent to clients by the AX device as a DNS server for the service. (This statistic applies only if the DNS server option is enabled in the policy.)
252 of 260
253 of 260
Clear Command
clear
Description Clear statistics or reset functions. Sub-command parameters are required for specific sub-commands. clear gslb {options} Sub-Command all cache debug fqdn geo-location group ip-list memory protocol rdt samples server service session site slb-device statistics options zone Description Clears all GSLB statistics. Clears the GSLB DNS cache. Clears debug statistics. Clears FQDN statistics. Clears geo-location statistics. Clears GSLB group statistics. Clears IP-list statistics. Clears memory statistics. Clears GSLB protocol statistics. Clears RDT samples. Clears aRDT samples. Clears server statistics. Clears service statistics. Clears GSLB sessions. Clears site statistics. Clears SLB device samples. Clears message, site, or zone statistics. Clears zone statistics.
Syntax
254 of 260
DNSSEC Commands
This section describes the commands for DNSSEC. (For more on this feature, see DNSSEC Support on page 133.)
dnssec key-generate
Description Syntax Generate a key for DNSSEC. dnssec key-generate name algorithm [RSASHA1 | RSASHA256 | RSASHA512 | NSEC3RSASHA1] keysize num Parameter name algorithm [RSASHA1 | RSASHA256 | RSASHA512 | NSEC3RSASHA1] Description Key filename.
RSA SHA algorithm to use to generate the DNSSEC key pair (ZSK and KSK). You can specify any of the following algorithms: RSASHA1 (default) RSASHA256 RSASHA512 NSEC3RSASHA1 Selecting one of the first three algorithms (RSASHA1, RSASHA256, or RSASHA512) will cause the standard NSEC resource record to be generated for the zone. However, selecting the fourth algorithm option (NSEC3RSASHA1) causes the NSEC3/NSEC3PARAM record to be generated for the zone, which is helpful in mitigating the threat posed by zone walking. Different zones can use different DNSSEC templates and thus have different algorithms.
keysize num
number of bits in the DNSSEC key, which can range from 512-4096 bits. Values must be specified in multiples of 64 bits, and the default value is 1024 bits.
255 of 260
dnssec template
Description Syntax Configure a DNSSEC template. [no] dnssec template template-name This command changes the CLI to the configuration level for the specified DNSSEC template, where the following commands are available. Command [no] combinationslimit num Description
Maximum number of combinations per Resource Record Set (RRset), where RRset is defined as all the records of a particular type for a particular domain, such as all the quad-A (IPv6) records for www.example.com. You can specify 165535. Lifetime for DNSSEC key resource records. The TTL can range from 1-864,000 seconds. Key signing key (KSK) for establishing the chain of trust and is the private counterpart to the public zone signing key used to sign authentication keys for the zone. At least one KSK is needed to sign successfully, but no more than two KSKs can be configured.
[no] returnnsec-on-failure Returns an NSEC or NSEC3 record in response to a client request for an invalid domain. As originally designed, DNSSEC would expose the list of device names within a zone, allowing an attacker to gain a list of network devices that could be used to create a map of the network. [no] signaturevalidity-period days Period for which a signature will remain valid. The time can range from 5 to 30 days.
256 of 260
Zone signing key (ZSK) for signing the domain names zone. At least one ZSK is needed to sign successfully, but no more than two ZSKs can be configured. active Sets key status to active. published Sets key status to published. deprecated Sets key status to deprecated.
Default
Mode
dnssec sign-zone-now
Description Syntax Immediately trigger zone-signing. dnssec sign-zone-now name Parameter name Default Description Name of the DNS zone.
Signing begins 30 seconds after the zone or DNSSEC template configuration is changed. Global configuration mode
Mode
257 of 260
258 of 260
259 of 260
Performance by Design
Corporate Headquarters A10 Networks, Inc. 3 West Plumeria Dr San Jose, CA 95134 USA Tel: +1-408-325-8668 (main) Tel: +1-888-822-7210 (support toll-free in USA) Tel: +1-408-325-8676 (support direct dial) Fax: +1-408-325-8666 www.a10networks.com
260