BIG-IP Global Traffic Manager Implementations
BIG-IP Global Traffic Manager Implementations
Implementations
Version 11.4
Table of Contents
Table of Contents
Legal Notices.....................................................................................................7
Acknowledgments.............................................................................................9
Chapter 1: Integrating BIG-IP GTM Into a Network with BIG-IP LTM Systems...................13
Overview: Integrating GTM with other BIG-IP systems on a network..............................14
About iQuery and communications between BIG-IP systems...............................14
Task summary..................................................................................................................14
Defining a data center...........................................................................................14
Defining BIG-IP GTM systems..............................................................................15
Defining BIG-IP LTM systems...............................................................................16
Running the big3d_install script............................................................................17
Implementation result.......................................................................................................18
Chapter 2: Integrating BIG-IP LTM Into a Network with BIG-IP GTM Systems...................19
Overview: Integrating BIG-IP LTM with BIG-IP GTM systems.........................................20
Defining a data center...........................................................................................20
Defining BIG-IP GTM systems..............................................................................20
Defining BIG-IP LTM systems...............................................................................22
Running the bigip_add script.................................................................................23
Implementation result.......................................................................................................23
3
Table of Contents
4
Table of Contents
Implementation result.......................................................................................................57
5
Table of Contents
Implementation result.......................................................................................................79
Chapter 15: Configuring How and When GTM Saves Configuration Changes..................87
Overview: Configuring how and when GTM saves configuration changes......................88
Changing the automatic configuration save timeout..............................................88
Enabling manual saves of configuration changes.................................................88
Configuring how and when GTM saves configuration changes using tmsh..........89
6
Legal Notices
Publication Date
This document was published on May 15, 2013.
Publication Number
MAN-0388-03
Copyright
Copyright © 2012-2013, F5 Networks, Inc. All rights reserved.
F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5 assumes
no responsibility for the use of this information, nor any infringement of patents or other rights of third
parties which may result from its use. No license is granted by implication or otherwise under any patent,
copyright, or other intellectual property right of F5 except as specifically described by applicable user
licenses. F5 reserves the right to change specifications at any time without notice.
Trademarks
Access Policy Manager, Advanced Client Authentication, Advanced Routing, APM, Application Security
Manager, ARX, AskF5, ASM, BIG-IP, BIG-IQ, Cloud Extender, CloudFucious, Cloud Manager, Clustered
Multiprocessing, CMP, COHESION, Data Manager, DevCentral, DevCentral [DESIGN], DNS Express,
DSC, DSI, Edge Client, Edge Gateway, Edge Portal, ELEVATE, EM, Enterprise Manager, ENGAGE, F5,
F5 [DESIGN], F5 Management Pack, F5 Networks, F5 World, Fast Application Proxy, Fast Cache, FirePass,
Global Traffic Manager, GTM, GUARDIAN, IBR, Intelligent Browser Referencing, Intelligent Compression,
IPv6 Gateway, iApps, iControl, iHealth, iQuery, iRules, iRules OnDemand, iSession, L7 Rate Shaping,
LC, Link Controller, Local Traffic Manager, LTM, Message Security Manager, MSM, OneConnect,
OpenBloX, OpenBloX [DESIGN], Packet Velocity, Policy Enforcement Manager, PEM, Protocol Security
Manager, PSM, Real Traffic Policy Builder, Rosetta Diameter Gateway, ScaleN, Signaling Delivery
Controller, SDC, SSL Acceleration, StrongBox, SuperVIP, SYN Check, TCP Express, TDR, TMOS, Traffic
Management Operating System, Traffix Diameter Load Balancer, Traffix Systems, Traffix Systems
(DESIGN), Transparent Data Reduction, UNITY, VAULT, VIPRION, vCMP, virtual Clustered
Multiprocessing, WA, WAN Optimization Manager, WebAccelerator, WOM, and ZoneRunner, are
trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries, and may not be used
without F5's express written consent.
All other product and company names herein may be trademarks of their respective owners.
RF Interference Warning
This is a Class A product. In a domestic environment this product may cause radio interference, in which
case the user may be required to take adequate measures.
FCC Compliance
This equipment has been tested and found to comply with the limits for a Class A digital device pursuant
to Part 15 of FCC rules. These limits are designed to provide reasonable protection against harmful
Legal Notices
interference when the equipment is operated in a commercial environment. This unit generates, uses, and
can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual,
may cause harmful interference to radio communications. Operation of this equipment in a residential area
is likely to cause harmful interference, in which case the user, at his own expense, will be required to take
whatever measures may be required to correct the interference.
Any modifications to this device, unless expressly approved by the manufacturer, can void the user's authority
to operate this equipment under part 15 of the FCC rules.
Standards Compliance
This product conforms to the IEC, European Union, ANSI/UL and Canadian CSA standards applicable to
Information Technology products at the time of manufacture.
8
Acknowledgments
In the following statement, This software refers to the Mitsumi CD-ROM driver: This software was developed
by Holger Veit and Brian Moore for use with 386BSD and similar operating systems. Similar operating
systems includes mainly non-profit oriented systems for research and education, including but not restricted
to NetBSD, FreeBSD, Mach (by CMU).
This product includes software developed by the Apache Group for use in the Apache HTTP server project
(http://www.apache.org/).
This product includes software licensed from Richard H. Porter under the GNU Library General Public
License (© 1998, Red Hat Software), www.gnu.org/copyleft/lgpl.html.
This product includes the standard version of Perl software licensed under the Perl Artistic License (© 1997,
1998 Tom Christiansen and Nathan Torkington). All rights reserved. You may find the most current standard
version of Perl at http://www.perl.com.
This product includes software developed by Jared Minch.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
(http://www.openssl.org/).
This product includes cryptographic software written by Eric Young ([email protected]).
This product contains software based on oprofile, which is protected under the GNU Public License.
This product includes RRDtool software developed by Tobi Oetiker (http://www.rrdtool.com/index.html)
and licensed under the GNU General Public License.
This product contains software licensed from Dr. Brian Gladman under the GNU General Public License
(GPL).
This product includes software developed by the Apache Software Foundation (http://www.apache.org/).
This product includes Hypersonic SQL.
This product contains software developed by the Regents of the University of California, Sun Microsystems,
Inc., Scriptics Corporation, and others.
This product includes software developed by the Internet Software Consortium.
This product includes software developed by Nominum, Inc. (http://www.nominum.com).
This product contains software developed by Broadcom Corporation, which is protected under the GNU
Public License.
This product contains software developed by MaxMind LLC, and is protected under the GNU Lesser General
Public License, as published by the Free Software Foundation.
This product includes Intel QuickAssist kernel module, library, and headers software licensed under the
GNU General Public License (GPL).
This product includes software licensed from Gerald Combs ([email protected]) under the GNU General
Public License as published by the Free Software Foundation; either version 2 of the License, or any later
version. Copyright ©1998 Gerald Combs.
This product includes software developed by Thomas Williams and Colin Kelley. Copyright ©1986 - 1993,
1998, 2004, 2007
Permission to use, copy, and distribute this software and its documentation for any purpose with or without
fee is hereby granted, provided that the above copyright notice appear in all copies and that both that
copyright notice and this permission notice appear in supporting documentation. Permission to modify the
software is granted, but not the right to distribute the complete modified source code. Modifications are to
be distributed as patches to the released version. Permission to distribute binaries produced by compiling
modified sources is granted, provided you
1. distribute the corresponding source modifications from the released version in the form of a patch file
along with the binaries,
10
BIG-IP® Global Traffic Manager™: Implementations
2. add special version identification to distinguish your version in addition to the base release version
number,
3. provide your name and address as the primary contact for the support of your modified version, and
4. retain our contact information in regard to use of the base software.
Permission to distribute the released version of the source code along with corresponding source modifications
in the form of a patch file is granted with same provisions 2 through 4 for binary distributions. This software
is provided "as is" without express or implied warranty to the extent permitted by applicable law.
This product contains software developed by Google, Inc. Copyright ©2011 Google, Inc.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated
documentation files (the "Software"), to deal in the Software without restriction, including without limitation
the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software,
and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions
of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
11
Chapter
1
Integrating BIG-IP GTM Into a Network with BIG-IP LTM
Systems
Note: The GTM systems in a GTM synchronization group, and theLTM and systems that are configured
to communicate with the systems in the GTM synchronization group must have TCP port 4353 open through
the firewall between the systems. The BIG-IP systems connect and communicate through this port.
Task summary
To authorize communications between BIG-IP® systems, perform the following tasks on the BIG-IP GTM™
system that you are adding to the network.
Defining a data center
Defining BIG-IP GTM systems
Defining BIG-IP LTM systems
Running the big3d_install script
14
BIG-IP® Global Traffic Manager™: Implementations
2. Click Create.
The New Data Center screen opens.
3. In the Name field, type a name to identify the data center.
4. In the Location field, type the geographic location of the data center.
5. In the Contact field, type the name of either the administrator or the department that manages the data
center.
6. From the State list, select Enabled.
7. Click Finished.
You can now create server objects and assign them to this data center.
Repeat this procedure to create additional data centers.
Important: You must use a self IP address for a BIG-IP system; you cannot use the management IP
address.
6. From the Data Center list, select the data center where the server resides.
7. In the Health Monitors area, assign the bigip monitor to the server by moving it from the Available list
to the Selected list.
8. From the Virtual Server Discovery list, select how you want virtual servers to be added to the system.
Option Description
Disabled The system does not use the discovery feature to automatically add virtual servers.
This is the default value. Use this option for a standalone BIG-IP GTM or for a
BIG-IP GTM/LTM combo system when you plan to manually add virtual servers
to the system, or if your network utilizes multiple route domains.
15
Integrating BIG-IP GTM Into a Network with BIG-IP LTM Systems
Option Description
Enabled The system uses the discovery feature to automatically add virtual servers. Use
this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM
to discover BIG-IP LTM virtual servers.
Enabled (No The system uses the discovery feature to automatically add virtual servers and
Delete) does not delete any virtual servers that already exist. Use this option for a BIG-IP
GTM/LTM combo system when you want BIG-IP GTM to discover BIG-IP LTM
virtual servers.
9. From the Link Discovery list, select how you want links to be added to the system.
Option Description
Disabled The system does not use the discovery feature to automatically add links. This
is the default value. Use this option for a standalone BIG-IP GTM or for a BIG-IP
GTM/LTM combo system when you plan to manually add links to the system.
Enabled The system uses the discovery feature to automatically add links. Use this option
for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover
links.
Enabled (No The system uses the discovery feature to automatically add links and does not
Delete) delete any links that already exist. Use this option for a BIG-IP GTM/LTM
combo system when you want BIG-IP GTM to discover links.
4. From the Product list, select either BIG-IP System (Single) or BIG-IP System (Redundant).
The server type determines the metrics that the system can collect from the server.
5. In the Address List area, add the IP addresses of the server.
You can add more than one IP address, depending on how the server interacts with the rest of your
network.
Important: You must use a self IP address for a BIG-IP system; you cannot use the management IP
address.
6. From the Data Center list, select the data center where the server resides.
7. In the Health Monitors area, assign the bigip monitor to the server by moving it from the Available list
to the Selected list.
16
BIG-IP® Global Traffic Manager™: Implementations
8. From the Virtual Server Discovery list, select how you want virtual servers to be added to the system.
Option Description
Disabled The system does not use the discovery feature to automatically add virtual servers.
This is the default value. Use this option for a standalone BIG-IP GTM or for a
BIG-IP GTM/LTM combo system when you plan to manually add virtual servers
to the system, or if your network utilizes multiple route domains.
Enabled The system uses the discovery feature to automatically add virtual servers. Use
this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM
to discover BIG-IP LTM virtual servers.
Enabled (No The system uses the discovery feature to automatically add virtual servers and
Delete) does not delete any virtual servers that already exist. Use this option for a BIG-IP
GTM/LTM combo system when you want BIG-IP GTM to discover BIG-IP LTM
virtual servers.
9. From the Link Discovery list, select how you want links to be added to the system.
Option Description
Disabled The system does not use the discovery feature to automatically add links. This
is the default value. Use this option for a standalone BIG-IP GTM or for a BIG-IP
GTM/LTM combo system when you plan to manually add links to the system.
Enabled The system uses the discovery feature to automatically add links. Use this option
for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover
links.
Enabled (No The system uses the discovery feature to automatically add links and does not
Delete) delete any links that already exist. Use this option for a BIG-IP GTM/LTM
combo system when you want BIG-IP GTM to discover links.
Note: You must perform this task from the command-line interface.
Important: All target BIG-IP systems must be running the same or an older version of BIG-IP software.
1. Log in as root to the BIG-IP GTM system you are adding to your network .
2. Run this command to access tmsh.
tmsh
17
Integrating BIG-IP GTM Into a Network with BIG-IP LTM Systems
The SSL certificates are exchanged, authorizing communications between the systems. The big3d agent
on each system is upgraded to the same version as is installed on the BIG-IP GTM system from which you
ran the script.
Implementation result
You now have an implementation in which the BIG-IP® systems can communicate with each other. BIG-IP
GTM™ can now use the other BIG-IP systems when load balancing DNS requests, and can acquire statistics
and status information for the virtual servers these systems manage.
18
Chapter
2
Integrating BIG-IP LTM Into a Network with BIG-IP GTM
Systems
Note: The BIG-IP GTM and BIG-IP LTM systems must have TCP port 4353 open through the firewall
between the systems. The BIG-IP systems connect and communicate through this port.
Task summary
To authorize communications between BIG-IP® GTM™ and BIG-IP LTM™ systems, perform the following
tasks on GTM.
Defining a data center
Defining BIG-IP GTM systems
Defining BIG-IP LTM systems
Running the bigip_add script
4. In the Location field, type the geographic location of the data center.
5. In the Contact field, type the name of either the administrator or the department that manages the data
center.
6. From the State list, select Enabled.
7. Click Finished.
You can now create server objects and assign them to this data center.
Repeat this procedure to create additional data centers.
20
BIG-IP® Global Traffic Manager™: Implementations
Important: You must use a self IP address for a BIG-IP system; you cannot use the management IP
address.
6. From the Data Center list, select the data center where the server resides.
7. In the Health Monitors area, assign the bigip monitor to the server by moving it from the Available list
to the Selected list.
8. From the Virtual Server Discovery list, select how you want virtual servers to be added to the system.
Option Description
Disabled The system does not use the discovery feature to automatically add virtual servers.
This is the default value. Use this option for a standalone BIG-IP GTM or for a
BIG-IP GTM/LTM combo system when you plan to manually add virtual servers
to the system, or if your network utilizes multiple route domains.
Enabled The system uses the discovery feature to automatically add virtual servers. Use
this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM
to discover BIG-IP LTM virtual servers.
Enabled (No The system uses the discovery feature to automatically add virtual servers and
Delete) does not delete any virtual servers that already exist. Use this option for a BIG-IP
GTM/LTM combo system when you want BIG-IP GTM to discover BIG-IP LTM
virtual servers.
9. From the Link Discovery list, select how you want links to be added to the system.
Option Description
Disabled The system does not use the discovery feature to automatically add links. This
is the default value. Use this option for a standalone BIG-IP GTM or for a BIG-IP
GTM/LTM combo system when you plan to manually add links to the system.
Enabled The system uses the discovery feature to automatically add links. Use this option
for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover
links.
Enabled (No The system uses the discovery feature to automatically add links and does not
Delete) delete any links that already exist. Use this option for a BIG-IP GTM/LTM
combo system when you want BIG-IP GTM to discover links.
21
Integrating BIG-IP LTM Into a Network with BIG-IP GTM Systems
4. From the Product list, select either BIG-IP System (Single) or BIG-IP System (Redundant).
The server type determines the metrics that the system can collect from the server.
5. In the Address List area, add the IP addresses of the server.
You can add more than one IP address, depending on how the server interacts with the rest of your
network.
Important: You must use a self IP address for a BIG-IP system; you cannot use the management IP
address.
6. From the Data Center list, select the data center where the server resides.
7. In the Health Monitors area, assign the bigip monitor to the server by moving it from the Available list
to the Selected list.
8. From the Virtual Server Discovery list, select how you want virtual servers to be added to the system.
Option Description
Disabled The system does not use the discovery feature to automatically add virtual servers.
This is the default value. Use this option for a standalone BIG-IP GTM or for a
BIG-IP GTM/LTM combo system when you plan to manually add virtual servers
to the system, or if your network utilizes multiple route domains.
Enabled The system uses the discovery feature to automatically add virtual servers. Use
this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM
to discover BIG-IP LTM virtual servers.
Enabled (No The system uses the discovery feature to automatically add virtual servers and
Delete) does not delete any virtual servers that already exist. Use this option for a BIG-IP
GTM/LTM combo system when you want BIG-IP GTM to discover BIG-IP LTM
virtual servers.
9. From the Link Discovery list, select how you want links to be added to the system.
Option Description
Disabled The system does not use the discovery feature to automatically add links. This
is the default value. Use this option for a standalone BIG-IP GTM or for a BIG-IP
GTM/LTM combo system when you plan to manually add links to the system.
Enabled The system uses the discovery feature to automatically add links. Use this option
for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM to discover
links.
22
BIG-IP® Global Traffic Manager™: Implementations
Option Description
Enabled (No The system uses the discovery feature to automatically add links and does not
Delete) delete any links that already exist. Use this option for a BIG-IP GTM/LTM
combo system when you want BIG-IP GTM to discover links.
Note: You must perform this task from the command-line interface.
1. Log in as root to the BIG-IP GTM system you are installing on your network.
2. Run this command to access tmsh.
tmsh
The specified BIG-IP® systems can now communicate with BIG-IP GTM.
Implementation result
You now have an implementation in which the BIG-IP® systems can communicate with each other. BIG-IP
GTM™ can now use the other BIG-IP systems when load balancing DNS name resolution requests, and can
acquire statistics and status information for the virtual servers the other BIG-IP systems manage.
23
Chapter
3
Adding a new BIG-IP GTM to a GTM Synchronization Group
When you add a BIG-IP® (GTM)™ system to a network that contains older BIG-IP GTM systems, the
devices can exchange heartbeat messages, even though the BIG-IP software versions are different. However,
to add a GTM to a configuration synchronization group, you must run the gtm_add script.
Task Summary
When adding a BIG-IP® GTM™ to a network that already contains BIG-IP GTM systems in a synchronization
group, perform the following tasks.
Enabling synchronization on the existing GTM
Creating a data center on the existing GTM
Defining a server on the existing GTM
Running the gtm_add script
26
BIG-IP® Global Traffic Manager™: Implementations
Tip: If you are using NTP, leave this setting at the default value of 10. In the event that NTP fails, the
system uses the time_tolerance variable to maintain synchronization.
4. In the Synchronization Group Name field, type the name of the synchronization group to which you
want this system to belong.
5. Click Update.
When a change is made on one BIG-IP GTM in the GTM synchronization group, that change is automatically
synchronized to the other systems in the group.
4. In the Location field, type the geographic location of the data center.
5. In the Contact field, type the name of either the administrator or the department that manages the data
center.
6. Click Finished.
27
Adding a new BIG-IP GTM to a GTM Synchronization Group
Important: You must use a self IP address for a BIG-IP® system; you cannot use the management IP
address.
6. From the Data Center list, select the data center where the server resides.
7. From the Virtual Server Discovery list, select how you want virtual servers to be added to the system.
Option Description
Disabled The system does not use the discovery feature to automatically add virtual servers.
This is the default value. Use this option for a standalone BIG-IP GTM or for a
BIG-IP GTM/LTM combo system when you plan to manually add virtual servers
to the system, or if your network utilizes multiple route domains.
Enabled The system uses the discovery feature to automatically add virtual servers. Use
this option for a BIG-IP GTM/LTM combo system when you want BIG-IP GTM
to discover BIG-IP LTM virtual servers.
Enabled (No The system uses the discovery feature to automatically add virtual servers and
Delete) does not delete any virtual servers that already exist. Use this option for a BIG-IP
GTM/LTM combo system when you want BIG-IP GTM to discover BIG-IP LTM
virtual servers.
8. Click Create.
The Server List screen opens displaying the new server in the list.
The status of the newly defined BIG-IP GTM system is Unknown , because you have not yet run the gtm_add
script.
Note: You must perform this task from the command-line interface.
1. Log in as root to the BIG-IP GTM system you are adding to your network.
2. Run this command to access tmsh.
tmsh
The BIG-IP GTM system you are installing on your network acquires the configuration of the BIG-IP GTM
system already installed on your network.
28
BIG-IP® Global Traffic Manager™: Implementations
Implementation result
The new BIG-IP® GTM™ that you added to the network is a part of a GTM synchronization group. Changes
you make to any system in the GTM synchronization group are automatically propagated to all other systems
in the group.
29
Chapter
4
Delegating DNS Traffic to BIG-IP GTM
Figure 3: Traffic flow when DNS server delegates traffic to BIG-IP GTM
This implementation focuses on the fictional company SiteRequest that recently purchased BIG-IP GTM
to help resolve queries for two web-based applications: store.siterequest.com and
checkout.siterequest.com. These applications are delegated zones of www.siterequest.com.
Currently, a DNS server manages www.siterequest.com.
SiteRequest administrators have already configured BIG-IP GTM with two wide IPs,
www.store.siterequest.com and www.checkout.siterequest.com. These wide IPs correspond
to the two web applications.
About listeners
A listener is a specialized virtual server that passively checks for DNS packets on port 53 and the IP address
you assign to the listener. When a DNS name resolution request is sent to the IP address of the listener,
BIG-IP GTM either handles the request locally or forwards the request to the appropriate resource.
Task summary
Perform these tasks to delegate DNS traffic to wide IPs on BIG-IP GTM.
Creating a delegated zone on a local DNS server
Creating a listener to handle traffic for wide IPs
32
BIG-IP® Global Traffic Manager™: Implementations
1. Create an address record (A record) that defines the domain name and IP address of each BIG-IP GTM
in your network.
2. Create a nameserver record (NS record) that defines the delegated zone for which BIG-IP GTM is
responsible.
3. Create canonical name records (CNAME records) to forward requests for store.siterequest.com
and checkout.siterequest.com to the wide IPs store.siterequest.com and
checkout.siterequest.com, respectively.
Implementation result
You now have an implementation of BIG-IP® GTM™ in which the DNS server manages DNS traffic unless
the query is for store.sitrequest.com or checkout.siterequest.com. When the DNS server
receives these queries, it delegates them to BIG-IP GTM, which then load balances the queries to the
appropriate wide IPs.
33
Chapter
5
Redirecting DNS Requests Using a CNAME Record
The executives at siterequest.com recently purchased a competitor. Site Request's administrator wants
to redirect DNS requests for competitor.com to a rebranded web site named
competitor.siterequest.com.
Task summary
Perform these tasks to redirect a DNS request using a wide IP, which includes a pool that is configured with
a CNAME.
Creating a pool using a CNAME
Creating a wide IP with a CNAME pool
Viewing statistics for wide IP CNAME resolutions
36
BIG-IP® Global Traffic Manager™: Implementations
Tip: When you provide a canonical name, you do not add members to the pool, because the CNAME
record always takes precedence over pool members. Additionally, a pool with a CNAME is not monitored
for availability.
6. Click Finished.
Tip: You can use two different wildcard characters in the wide IP name: asterisk (*) to represent several
characters and question mark (?) to represent a single character. This reduces the number of aliases
you have to add to the configuration.
4. From the Pool list, select the CNAME pool, and then click Add.
5. Click Finished.
Implementation result
You now have an implementation in which BIG-IP® GTM™ resolves a DNS name resolution request for a
wide IP to a CNAME. The LDNS must further resolve the CNAME to an IP address.
37
Chapter
6
Replacing a DNS Server with BIG-IP GTM
About listeners
A listener is a specialized virtual server that passively checks for DNS packets on port 53 and the IP address
you assign to the listener. When a DNS name resolution request is sent to the IP address of the listener,
BIG-IP GTM either handles the request locally or forwards the request to the appropriate resource.
Task summary
Perform these tasks to replace a DNS server with BIG-IP GTM.
Configuring a back-end DNS server to allow zone file transfers
Acquiring zone files from the legacy DNS server
Creating a self IP address using the IP address of the legacy DNS server
Designating GTM as the primary server for the zone
Creating listeners to alert GTM to DNS traffic destined for the system
Creating a wide IP
40
BIG-IP® Global Traffic Manager™: Implementations
You can modify the following allow-transfer statement to use a self IP address on the BIG-IP system:
Creating a self IP address using the IP address of the legacy DNS server
To avoid a conflict on your network, unplug BIG-IP® GTM™ from the network.
When you want BIG-IP GTM to handle DNS traffic previously handled by a DNS server, create a self IP
address on BIG-IP GTM using the IP address of the legacy DNS server.
1. On the Main tab, click Network > Self IPs.
The Self IPs screen opens.
2. Click Create.
The New Self IP screen opens.
3. In the Name field, type a unique name for the self IP.
4. In the IP Address field, type the IP address of the legacy DNS server.
41
Replacing a DNS Server with BIG-IP GTM
Note: If you are using BIND servers, and you are unfamiliar with how to change a DNS server from
a primary to a secondary, refer to the fifth edition of DNS and BIND, available from O’Reilly Media.
BIG-IP GTM is now the primary authoritative name server for the zone. The servers for the zone do not
need to be updated, because the IP address of the legacy DNS server was assigned to BIG-IP GTM.
Creating listeners to alert GTM to DNS traffic destined for the system
To alert the BIG-IP® GTM™ system to DNS traffic (previously handled by the DNS server), create two
listeners: one that uses the UDP protocol, and one that uses the TCP protocol.
Note: DNS zone transfers use TCP port 53. If you do not configure a listener for TCP the client might
receive the error: connection refused or TCP RSTs.
42
BIG-IP® Global Traffic Manager™: Implementations
6. Click Finished.
Create another listener with the same IP address, but select TCP from the Protocol list.
Creating a wide IP
Ensure that at least one load balancing pool exists in the configuration before you start creating a wide IP.
Create a wide IP to map a FQDN to one or more pools of virtual servers that host the content of the domain.
1. On the Main tab, click Global Traffic > Wide IPs.
The Wide IP List screen opens.
2. Click Create.
The New Wide IP screen opens.
3. In the Name field, type a name for the wide IP.
Tip: You can use two different wildcard characters in the wide IP name: asterisk (*) to represent several
characters and question mark (?) to represent a single character. This reduces the number of aliases
you have to add to the configuration.
4. From the Pool list, select the pools that this wide IP uses for load balancing.
The system evaluates the pools based on the wide IP load balancing method configured.
a) From the Pool list, select a pool.
A pool can belong to more than one wide IP.
b) Click Add.
5. Click Finished.
Implementation result
BIG-IP® GTM™ replaces the legacy DNS server as the primary authoritative nameserver for the zone.
BIG-IP GTM handles all incoming DNS traffic, whether destined for a wide IP or handled by the BIND
instance on the system.
43
Chapter
7
Placing BIG-IP GTM in Front of a DNS Server
Figure 5: Traffic flow when BIG-IP GTM screens traffic to a DNS server
About listeners
A listener is a specialized virtual server that passively checks for DNS packets on port 53 and the IP address
you assign to the listener. When a DNS name resolution request is sent to the IP address of the listener,
BIG-IP GTM either handles the request locally or forwards the request to the appropriate resource.
46
BIG-IP® Global Traffic Manager™: Implementations
Task summary
Perform these tasks to send traffic through BIG-IP® GTM™.
Placing GTM on your network to forward traffic
Creating a listener to forward traffic to a DNS server
Creating a wide IP
Important: The destination must not match a self IP address on BIG-IP GTM.
Creating a wide IP
Ensure that at least one load balancing pool exists in the configuration before you start creating a wide IP.
Create a wide IP to map a FQDN to one or more pools of virtual servers that host the content of the domain.
1. On the Main tab, click Global Traffic > Wide IPs.
The Wide IP List screen opens.
2. Click Create.
The New Wide IP screen opens.
3. In the Name field, type a name for the wide IP.
47
Placing BIG-IP GTM in Front of a DNS Server
Tip: You can use two different wildcard characters in the wide IP name: asterisk (*) to represent several
characters and question mark (?) to represent a single character. This reduces the number of aliases
you have to add to the configuration.
4. From the Pool list, select the pools that this wide IP uses for load balancing.
The system evaluates the pools based on the wide IP load balancing method configured.
a) From the Pool list, select a pool.
A pool can belong to more than one wide IP.
b) Click Add.
5. Click Finished.
Implementation result
You now have an implementation in which BIG-IP® GTM™ receives all DNS queries. If the query is for a
wide IP, BIG-IP GTM load balances the request to the appropriate resource. If the query is for an IP address
of a DNS server, BIG-IP GTM either routes or forwards the query to the DNS server for resolution.
48
Chapter
8
Placing BIG-IP GTM in front of a Pool of DNS Servers
Figure 6: Traffic flow when BIG-IP GTM screens traffic to a pool of DNS servers
About listeners
A listener is a specialized virtual server that passively checks for DNS packets on port 53 and the IP address
you assign to the listener. When a DNS name resolution request is sent to the IP address of the listener,
BIG-IP GTM either handles the request locally or forwards the request to the appropriate resource.
Task summary
Perform these tasks to screen non-wide IP traffic and forward the traffic to a pool of DNS servers.
Creating a pool of local DNS servers
Creating a listener that alerts GTM to DNS queries for a pool of DNS servers
50
BIG-IP® Global Traffic Manager™: Implementations
6. Click Finished.
Creating a listener that alerts GTM to DNS queries for a pool of DNS servers
Configure a listener that alerts BIG-IP® GTM™ to DNS queries destined for DNS servers that are members
of a pool.
1. Log on to the command-line interface of BIG-IP GTM.
2. Type tmsh, to access the Traffic Management Shell.
3. Run this command sequence to create a listener: create /gtm listener <name of listener>
address <IP address on which you want the listener to alert GTM to DNS traffic>
ip-protocol udp pool <name of pool> translate-address enabled
The system creates a listener with the specified name and IP address that alerts BIG-IP GTM to queries
destined for the members of the specified pool.
4. Run this command sequence to save the listener: save /sys config
5. Run this command sequence to display the listener: list /gtm listener
The system displays the new listener configuration.
Implementation result
You now have an implementation in which BIG-IP® GTM™ receives DNS queries, handles wide IP requests,
and forwards all other DNS queries to members of the pool of DNS servers.
51
Chapter
9
Configuring GTM on a Network with One Route Domain
Overview: How do I deploy BIG-IP GTM on a network with one route domain?
You can deploy BIG-IP® Global Traffic Manager™ (GTM™) on a network where BIG-IP Local Traffic
Manager™ (LTM®) is configured with one route domain and no overlapping IP addresses.
Caution: For BIG-IP systems that include both LTM and GTM, you can configure route domains on internal
interfaces only. F5 Networks does not support the configuration of route domains on a standalone BIG-IP
GTM.
Figure 7: BIG-IP GTM deployed on a network in front of a BIG-IP LTM configured with a route domain
Task summary
Perform these tasks to configure a route domain, and then to configure BIG-IP GTM to be able to monitor
the BIG-IP LTM systems.
Creating VLANs for a route domain on BIG-IP LTM
Creating a route domain on the BIG-IP system
Creating a self IP address for a route domain on BIG-IP LTM
Defining a server for a route domain on BIG-IP GTM
54
BIG-IP® Global Traffic Manager™: Implementations
55
Configuring GTM on a Network with One Route Domain
8. For the VLANs setting, from the Available list, select a VLAN name and move it to the Members list.
Select the VLAN that processes the application traffic relevant to this route domain.
Configuring this setting ensures that the BIG-IP system immediately associates any self IP addresses
pertaining to the selected VLANs with this route domain.
9. For the Dynamic Routing Protocols setting, from the Available list, select one or more protocol names
and move them to the Enabled list.
You can enable any number of listed protocols for this route domain. This setting is optional.
10. From the Bandwidth Controller list, select a static bandwidth control policy to enforce a throughput
limit on traffic for this route domain.
11. From the Partition Default Route Domain list, select either Another route domain (0) is the Partition
Default Route Domain or Make this route domain the Partition Default Route Domain.
This setting does not appear if the current administrative partition is partition Common.
When you configure this setting, either route domain 0 or this route domain becomes the default route
domain for the current administrative partition.
12. Click Finished.
The system displays a list of route domains on the BIG-IP system.
56
BIG-IP® Global Traffic Manager™: Implementations
4. From the Product list, select either BIG-IP System (Single) or BIG-IP System (Redundant).
The server type determines the metrics that the system can collect from the server.
5. In the Address List area, add the self IP address that you assigned to the VLAN that you assigned to the
route domain.
Important: Do not include the route domain ID in this IP address. Use the format x.x.x.x, for example,
10.10.10.1.
6. From the Data Center list, select the data center where the server resides.
7. In the Health Monitors area, assign the bigip monitor to the server by moving it from the Available list
to the Selected list.
8. From the Virtual Server Discovery list, select how you want virtual servers to be added to the system.
Virtual server discovery is supported when you have only one route domain.
Option Description
Disabled Use this option when you plan to manually add virtual servers to the system,
or if your network utilizes multiple route domains. This is the default value.
Enabled The system automatically adds virtual servers using the discovery feature.
Enabled (No Delete) The system uses the discovery feature and does not delete any virtual
servers that already exist.
9. Click Create.
The Server List screen opens displaying the new server in the list.
Implementation result
You now have an implementation in which BIG-IP® GTM™ can monitor virtual servers on BIG-IP LTM®
systems configured with one route domain.
57
Chapter
10
Configuring GTM on a Network with Multiple Route Domains
Important: On a network with route domains, you must ensure that virtual server discovery (autoconf) is
disabled, because virtual server discovery does not discover translation IP addresses.
Caution: For BIG-IP systems that include both LTM and GTM, you can configure route domains on internal
interfaces only. F5 Networks does not support the configuration of route domains on a standalone BIG-IP
GTM.
The following figure shows BIG-IP GTM deployed in a network with multiple BIG-IP Local Traffic
Manager™ (LTM®) systems configured with the default route domain (zero), and two additional route
domains. BIG-IP GTM can monitor the Application1 and Application2 servers that have overlapping IP
addresses and reside in different route domains. The firewalls perform the required address translation
between the BIG-IP GTM and BIG-IP LTM addresses; you must configure the firewalls to segment traffic
and avoid improperly routing packets between route domain 1 and route domain 2.
60
BIG-IP® Global Traffic Manager™: Implementations
Before BIG-IP® GTM™ can gather status and statistics for the virtual servers hosted on BIG-IP LTM®
systems on your network that are configured with route domains, you must configure the following on each
BIG-IP LTM that handles traffic for route domains:
• VLANs through which traffic for your route domains passes
• Route domains that represent each network segment
• Self IP addresses that represent the address spaces of the route domains
Additionally, on BIG-IP GTM you must:
• Configure, for each route domain, a server object with virtual server discovery disabled
• Disable virtual server discovery globally
Task summary
Perform the following tasks to configure BIG-IP GTM to monitor BIG-IP LTM systems with route domains.
Creating VLANs for a route domain on BIG-IP LTM
61
Configuring GTM on a Network with Multiple Route Domains
Repeat this procedure, but in Step 3, name the second VLAN internal.
62
BIG-IP® Global Traffic Manager™: Implementations
8. Click Finished.
The system displays a list of route domains on the BIG-IP system.
63
Configuring GTM on a Network with Multiple Route Domains
4. From the Product list, select either BIG-IP System (Single) or BIG-IP System (Redundant).
The server type determines the metrics that the system can collect from the server.
5. In the Address List area, add the self IP address that you assigned to the VLAN that you assigned to the
route domain.
Important: Do not include the route domain ID in this IP address. Use the format x.x.x.x, for example,
10.10.10.1.
6. From the Data Center list, select the data center where the server resides.
7. From the Prober Pool list, select one of the following.
Option Description
Inherit from Data Center By default, a server inherits the Prober pool assigned to the data
center in which the server resides.
Prober pool name Select the Prober pool that contains the BIG-IP systems that you
want to perform monitor probes of this server.
Note: The selected Prober pool must reside in the same route domain as the servers you want the pool
members to probe.
8. In the Health Monitors area, assign the bigip monitor to the server by moving it from the Available list
to the Selected list.
9. From the Virtual Server Discovery list, select Disabled.
10. Click Create.
The New Server screen opens.
Implementation result
You now have an implementation in which BIG-IP GTM monitors BIG-IP LTM virtual servers on the
various route domains in your network.
64
Chapter
11
Setting Up a BIG-IP GTM Redundant System Configuration
Task Summary
Perform the following tasks to configure a BIG-IP GTM redundant system configuration.
Before you begin, ensure that the Setup utility was run on both devices. During the Setup process, you create
VLANs internal and external and the associated floating and non-floating IP addresses, and VLAN HA and
the associated non-floating self IP address. You also configure the devices to be in an active-standby
redundant system configuration.
Defining an NTP server
Creating listeners to identify DNS traffic
Defining a data center
Defining a server to represent each BIG-IP system
Enabling global traffic configuration synchronization
Running the gtm_add script
Important: Perform the following procedure on both the active and standby systems.
1. On the Main tab, click System > Configuration > Device > NTP.
The NTP Device configuration screen opens.
2. In the Time Server Lookup List area, in the Address field, type the IP address of the NTP that you want
to add. Then, click Add.
Note: If you did not disable DHCP before the first boot of the BIG-IP system, and if the DHCP server
provides the information about your NTP server, then this field is automatically populated.
3. Click Update.
During configuration synchronization, the systems use this time value to determine if any newer configuration
files exist.
66
BIG-IP® Global Traffic Manager™: Implementations
Note: DNS zone transfers use TCP port 53. If you do not configure a listener for TCP the client might
receive the error: connection refused or TCP RSTs.
Create another listener with the same IP address, but select TCP from the Protocol list.
4. In the Location field, type the geographic location of the data center.
5. In the Contact field, type the name of either the administrator or the department that manages the data
center.
6. From the State list, select Enabled.
7. Click Finished.
You can now create server objects and assign them to this data center.
Repeat this procedure to create additional data centers.
67
Setting Up a BIG-IP GTM Redundant System Configuration
Important: You must use a self IP address for a BIG-IP® system; you cannot use the management IP
address.
6. In the Address List area, add the IP addresses of the back up system using the Peer Address List setting.
a) Type an external (public) IP address in the Address field, and then click Add.
b) Type an internal (private) IP address in the Translation field, and then click Add.
You can add more than one IP address, depending on how the server interacts with the rest of your
network.
7. From the Data Center list, select the data center where the server resides.
8. From the Virtual Server Discovery list, select Disabled.
9. Click Create.
The Server List screen opens displaying the new server in the list.
Note: You must perform this task from the command-line interface.
68
BIG-IP® Global Traffic Manager™: Implementations
The gtm_add script acquires configuration data from the active system; Once this process completes, you
have successfully created a redundant system consisting of two BIG-IP GTM systems.
69
Chapter
12
Authenticating with SSL Certificates Signed by a Third Party
Task Summary
Importing the device certificate
Importing the root certificate for the gtmd agent
Importing the root certificate for the big3d agent
Verifying the certificate exchange
Note: Perform this procedure on all BIG-IP® systems that you want to handle Level 1 SSL authentication.
72
BIG-IP® Global Traffic Manager™: Implementations
Note: Perform this procedure on only one BIG-IP® GTM™ system in the GTM synchronization group. The
system automatically synchronizes the setting with the other systems in the group.
1. On the Main tab, click Global Traffic > Servers > Trusted Server Certificates.
The Trusted Server Certificates screen opens.
2. Click Import.
3. From the Import Method list, select Replace.
4. For the Certificate Source setting, select Upload File and browse to select the root certificate file.
5. Click Import.
Note: Perform this procedure on all BIG-IP® systems that you want to configure for Level 1 SSL
authentication.
1. On the Main tab, click System > Device Certificates > Trusted Device Certificates.
The Trusted Device Certificates screen opens.
2. Click Import.
3. From the Import Method list, select Replace.
4. For the Certificate Source setting, select Upload File and browse to select the certificate signed by the
CA server.
5. Click Import.
73
Authenticating with SSL Certificates Signed by a Third Party
If the certificate was installed correctly, these commands display a continuous stream of information.
Implementation Results
The BIG-IP® systems are now configured for Level 1 SSL authentication.
Task Summary
Creating a certificate chain file
Importing the device certificate from the last CA server in the chain
Importing a certificate chain file for the gtmd agent
Importing a certificate chain for the big3d agent
Verifying the certificate chain exchange
Importing the device certificate from the last CA server in the chain
Import the device certificate signed by the last CA in the certificate chain.
Note: Perform this procedure on all BIG-IP systems that you want to configure for certificate chain SSL
authentication.
74
BIG-IP® Global Traffic Manager™: Implementations
6. Click Import.
Note: Perform this procedure on only one BIG-IP® GTM™ in a GTM synchronization group. The system
automatically synchronizes the setting with the other systems in the group.
1. On the Main tab, click Global Traffic > Servers > Trusted Server Certificates.
The Trusted Server Certificates screen opens.
2. Click Import.
3. From the Import Method list, select Replace.
4. For the Certificate Source setting, select Upload File and browse to select the device certificate for
the last CA in the certificate chain.
5. Click Import.
Note: Perform this procedure on all BIG-IP® systems that you want to configure for certificate chain SSL
authentication.
1. On the Main tab, click System > Device Certificates > Trusted Device Certificates.
The Trusted Device Certificates screen opens.
2. Click Import.
3. From the Import Method list, select Replace.
4. For the Certificate Source setting, select Upload File and browse to select the certificate chain file.
5. Click Import.
If the certificate chain was installed correctly, these commands display a continuous stream of information.
75
Authenticating with SSL Certificates Signed by a Third Party
Implementation result
The BIG-IP® systems are now configured for certificate chain SSL authentication. For information about
troubleshooting BIG-IP device certificates, see SOL8187 on AskF5.com (www.askf5.com).
76
Chapter
13
Configuring a TTL in a DNS NoError Response
Task summary
You can configure GTM™ to provide a negative caching TTL for a domain name by performing these
specific tasks.
Creating a pool
Creating a wide IP that provides for negative caching
Creating a pool
Ensure that at least one virtual server exists in the configuration before you start to create a load balancing
pool.
Create a pool to which the system can load balance global traffic.
1. On the Main tab, click Global Traffic > Pools.
The Pools list screen opens.
2. Click Create.
3. Type a name for the pool.
Names must begin with a letter, and can contain only letters, numbers, and the underscore (_) character.
4. For the Health Monitors setting, in the Available list, select a monitor type, and click << to move the
monitor to the Active list.
Tip: Hold the Shift or Ctrl key to select more than one monitor at a time.
5. For the Member List setting, add virtual servers as members of this load balancing pool.
The system evaluates the virtual servers (pool members) in the order in which they are listed. A virtual
server can belong to more than one pool.
a) Select a virtual server from the Virtual Server list.
b) Click Add.
78
BIG-IP® Global Traffic Manager™: Implementations
6. Click Finished.
Tip: You can use two different wildcard characters in the wide IP name: asterisk (*) to represent several
characters and question mark (?) to represent a single character. This reduces the number of aliases
you have to add to the configuration.
8. Click Finished.
Implementation result
You now have an implementation in which GTM™ returns a TTL in an IPv6 DNS NoError response for a
web site represented by a wide IP in the GTM configuration.
79
Chapter
14
Configuring Device-Specific Probing and Statistics
Collection
The generic load balancers on the left side of the graphic are not assigned a Prober pool
BIG-IP GTM can solicit any BIG-IP system to perform FTP monitor probes of these load balancers,
including systems that are Prober pool members.
82
BIG-IP® Global Traffic Manager™: Implementations
Note: If a Prober pool member has red status (Offline), no iQuery connection exists between the member
and the BIG-IP GTM system on which you are viewing status. Therefore, that BIG-IP GTM system cannot
request that member to perform probes, and the Prober pool will not select the member for load balancing.
83
Configuring Device-Specific Probing and Statistics Collection
Task summary
Perform these tasks to configure device-specific probing and statistics collection.
Creating a Prober pool
Assigning a Prober pool to a data center
Assigning a Prober pool to a server
Viewing Prober pool statistics and status
Determining which Prober pool member marked a resource down
5. Assign members to the pool by moving servers from the Available list to the Selected list.
6. To reorder the members in the Selected list, choose a server and use the Up and Down buttons to move
the server to a different location in the list.
The order of the servers in the list is important in relation to the load balancing method you selected.
7. Click Finished.
84
BIG-IP® Global Traffic Manager™: Implementations
4. Click Update.
85
Configuring Device-Specific Probing and Statistics Collection
Implementation result
You now have an implementation in which a specific BIG-IP® system probes the resources on a specific
server, or the servers in a specific data center.
86
Chapter
15
Configuring How and When GTM Saves Configuration
Changes
Task summary
Perform one of these tasks to configure how and when the BIG-IP system saves GTM configuration changes.
Changing the automatic configuration save timeout
Enabling manual saves of configuration changes
Configuring how and when GTM saves configuration changes using tmsh
Warning: Setting the value of Automatic Configuration Save Timeout to less than 10 seconds can
impact system performance.
The BIG-IP system waits the specified number of seconds before saving GTM configuration changes to
the stored configuration.
88
BIG-IP® Global Traffic Manager™: Implementations
You can disable automatic saves of GTM configuration changes when you want to have strict control over
when GTM configuration changes are saved to the stored configuration. CPU usage can be affected simply
by saving small changes to a large configuration.
1. On the Main tab, click System > Configuration > Global Traffic > General.
The General configuration screen opens.
2. For the Automatic Configuration Save setting, clear the Enabled check box to disable automatic saves
of GTM configuration changes.
Important: If you disable automatic saves of GTM configuration changes, to save those changes you
must run this command from the command line: tmsh save sys config gtm-only partitions
all
3. Click Update.
Configuring how and when GTM saves configuration changes using tmsh
Ensure that GTM™ is provisioned on the device, and that your user role provides access to tmsh.
By default, the BIG-IP® system automatically saves GTM configuration changes made in the Configuration
utility and tmsh. You can change how long the system waits to save GTM configuration changes. You can
also configure the system for manual saves that require you to run a tmsh command to save GTM
configuration changes.
1. Log in to the command-line interface of the BIG-IP system.
2. Run a variation of this command, based on how and when you want the BIG-IP system to save GTM
configuration changes:
tmsh modify gtm global-settings general automatic-configuration-save-timeout
<interval in seconds>
Note the value for each save-timeout interval:
Interval in seconds Value description
0 BIG-IP GTM immediately saves changes to the configuration.
-1 BIG-IP GTM never saves changes to the configuration (manual save required).
86400 Maximum number of seconds following a GTM configuration change before
the system saves the change.
15 Default number of seconds following a GTM configuration change before the
system saves the change.
BIG-IP GTM waits the number of seconds you specify before saving GTM configuration changes. If you
specified -1, then you must save the configuration manually using this command: tmsh save sys config
gtm-only partitions all
89
Chapter
16
Configuring Logging of Global Server Load Balancing
Decisions
Example log for a wide IP configured for Ratio load balancing when Load-Balancing Decision Log is
set to only Pool Selection: 2013-03-14 15:40:05 bigip1.com to 10.10.10.9#34824:
[wip.test.net A] [ratio selected pool (pool_b) with the first highest ratio
counter (1)]
Example log for a wide IP configured for Ratio load balancing when Load-Balancing Decision Log is
set to both Pool Selection and Pool Traversal: 2013-03-14 16:18:41 bigip1.com from
10.10.10.9#35902 [wip.test.net A] [ratio selected pool (pool_a) - ratio counter
(0) is higher] [ratio skipped pool (pool_b) - ratio counter (0) is not higher]
[ratio reset IPv4 ratio counter to original ratios - the best had zero ratio
count] [ratio selected pool (pool_a) - ratio counter (1) is not higher] [ratio
selected pool (pool_b) - ratio counter (1) is not higher] [ratio selected
pool (pool_a) with the first highest ratio counter (1)]
92
Chapter
17
Monitoring Third-Party Servers with SNMP
Task summary
To configure BIG-IP® GTM™ to acquire information about the health of a third-party server using SNMP,
perform the following tasks.
Creating an SNMP monitor
Defining a third-party host server that is running SNMP
4. Click Finished.
94
BIG-IP® Global Traffic Manager™: Implementations
4. From the Product list, select a third-party host server or select Generic Host.
The server type determines the metrics that the system can collect from the server.
5. In the Address List area, add the IP addresses of the server.
a) Type an external (public) IP address in the Address field, and then click Add.
b) If you use NAT, type an internal (private) IP address in the Translation field, and then click Add.
You can add more than one IP address, depending on how the server interacts with the rest of your
network.
6. From the Data Center list, select the data center where the server resides.
7. From the Prober Pool list, select one of the following.
Option Description
Inherit from Data Center By default, a server inherits the Prober pool assigned to the data
center in which the server resides.
Prober pool name Select the Prober pool that contains the BIG-IP systems that you
want to perform monitor probes of this server.
8. In the Health Monitors area, assign an SNMP monitor to the server by moving it from the Available
list to the Selected list.
9. From the Virtual Server Discovery list, select Disabled.
10. In the Virtual Server List area, create a virtual server to represent (in a pool) the host server that you are
creating.
a) In the Name field, type a name for the virtual server.
b) In the Address field, type the IP address of the host server.
c) From the Service Port list, select SNMP.
d) Click Add.
Implementation result
BIG-IP® GTM™ can now use the SNMP monitor to verify the availability of and to collect statistics about
the generic host.
95
Chapter
18
Troubleshooting a BIG-IP System with a Rate-Limited
License
5. In the Global Traffic Management area, view the Effective Rate Limit (RPS), Object Count, and Rate
Rejects statistics.
Tip: The GTM license includes the DNS Services license. Global traffic
management requests (requests for wide IPs) are a subset of DNS requests.
Therefore, when the number of requests that GTM receives for a wide IP
exceeds the DNS Services rate limit, the Rate Rejects count for DNS
increments, rather than the Rate Rejects count for Global Traffic
Management incrementing.
98
Chapter
19
How to Diagnose Network Connection Issues
To view information about the iQuery® connections between a different and the BIG-IP systems in your
network, log in to that BIG-IP GTM and repeat this procedure.
100
BIG-IP® Global Traffic Manager™: Implementations
101
Index
Index
A CNAME resolutions
viewing statistics about 37
allow-transfer statement, modifying for zone file transfers 41 configuration changes
authentication and configuring manual save 88
and SSL certificate chains 76 configuration files, acquiring 28
and SSL certificates 72 configuration saves
authoritative name server, designating GTM 42 and changing the save timeout 88
authorizing BIG-IP communications 14 configuration synchronization
auto-discovery, disabling at the global-level 63 enabling for GTM 68
automatic configuration save connection refused error
changing the save interval 89 and listeners 42
disabling 88 and TCP protocol 42
disabling using tmsh 89 connections
automatic configuration save timeout viewing iQuery statistics 100
changing 88 viewing status 100
automatic save
about 88
configuring the save timeout 88
D
auto-save data centers
configuring the save timeout 88 assigning Prober pools 84
creating 27
B defining 14, 20, 67
delegated zones
big3d_install script, running 17 and listeners 33
big3d agent creating on local DNS servers 33
and iQuery 14 deterministic probing, implementing 82
and SSL certificates 72 device certificates
importing certificate chains 75 and CA servers 72
importing root certificate 73 importing 72, 74
upgrading 17 disabling automatic configuration save 88
bigip_add utility disabling automatic save 89
and integrating LTM with GTM 20 DNS requests for GTM, load balancing 18
running 23 DNS server pools, and listeners 51
BIG-IP communications 14 DNS servers
BIG-IP LTM and creating pools 51
and route domains 54 and GTM 46
and server definition 16, 22 and pools 50
BIG-IP systems, and iQuery connections 100 and wide IPs 32
Bridge mode, and global traffic management 47 configuring to allow zone file transfers 41
delegating wide IP requests 32
identifying legacy 41
C modifying 42
canonical names replacing with GTM 40
and pools 36 DNS Services
canonical names, and creating pools 36 about rate-limited license statistics 98
CA servers, and device certificates 74 DNS statistics
certificate chains viewing per wide IP 37
and SSL authentication 74 DNS traffic
creating 74 and GTM 46
verifying exchange 75 and statistics per wide IP 37
certificate exchange, verifying 73 and wide IPs 46
certificates creating listeners to forward 47
importing device 72 creating listeners to identify 42
certificates, importing device 74 forwarding 46
CNAME record identifying 33
and redirecting DNS requests 36 routing 46
CNAME records
about 36
103
Index
E L
effective rate limit (RPS) LDNS, creating delegated zones 33
about rate-limited license statistics 98 legacy DNS servers
enabling automatic save 89 and zone files 41
enabling manual save 88 identifying by self IP addresses on BIG-IP GTM 41
Level 1, about SSL authentication 72
listeners
F about wildcard 46
file transfers, See zone file transfers. and pools of DNS servers 51
forwarding traffic to DNS servers 46 and refused connection error 42
and TCP protocol 42
and UDP protocol 42
G creating to forward DNS traffic 47
creating to handle wide IP traffic locally 33
global server load balancing
creating to identify DNS traffic 42, 66
and decision logs 92
listeners, defined 32, 40, 46, 50
global traffic management
load balancing DNS requests for GTM 18
and wildcard listeners 46
load balancing process
load balancing to a pool of DNS servers 50
about Prober pool status 83
global traffic management, and Bridge mode 47
about traffic management capabilities 14
GTM
and non-wide IP traffic 50
about rate-limited license statistics 98
and Prober pools 82
and bigip_add utility 23
load balancing traffic to a pool of DNS servers 50
integrating with LTM 20
local DNS servers, and replacing with GTM 40
gtm_add script
logging
and server status 27
enabling load-balancing decision logs for a wide IP 92
running 28
logical network components
using 68
and creating wide IPs 43, 47
gtmd agent
logs, and Prober pool data 86
and importing root certificates 73
LTM
and SSL certificates 72
and bigip_add utility 23
importing certificate chains 75
and route domains 54, 60
gtmd agent, and iQuery 14
and server definition 16, 22
GTM synchronization groups
integrating with GTM 20
about 26
adding new GTM 26
illustrated 26 M
manual save
H configuring using tmsh 89
enabling 88
high-speed remote logs
and load-balancing decisions 92
hosts, defining 94 N
negative DNS responses, and GTM 78
I network, deploying GTM for single route domain 54
network connection issues, diagnosing 100
integrating with existing DNS servers 32
network placement of GTM forwarding traffic 47
integration of GTM with older systems 14
network traffic, and listeners 32, 40, 46, 50
integration of LTM and GTM systems 20
NTP servers, defining 66
intelligent probing, about 82
iQuery
and big3d agent 14 O
and gtmd agent 14
and statistics 100 object count
viewing statistics about connections 100 about rate-limited license statistics 98
viewing status of connections 100
iQuery connections P
and statistics 100
and status 100 placement of GTM on network to forward traffic 47
pools
and CNAME records 36
104
Index
S T
saving configuration changes TCP protocol
about 88 and connection refused error 42
and changing the save interval using tmsh 89 and listeners 42
and changing the save timeout 88 third-party servers, and SNMP monitoring 94
and configuring manual save 88 traffic forwarding, placement of GTM 47
scripts
running big3d_install script 17 U
running gtm_add script 27
self IP addresses UDP protocol, and listeners 42
and route domains 63
creating for route domains 56
creating on GTM for legacy DNS servers 41
V
self-signed SSL certificates, about 72 virtual servers
server pools, and listeners 51 disabling auto-discovery at the global-level 63
105
Index
106