Implementing Cisco Nexus 9000 Series NX-OS Mode with F5 Networks’ BIG-IP Local Traffic Manager Building Architectures to Solve Business Problems © 2014 Cisco | F5. All rights reserved. Page 1 Contents Introduction ............................................................................................................................................... 3 Audience ................................................................................................................................................... 3 Document Objectives ................................................................................................................................ 3 Cisco Nexus 9000 Overview..................................................................................................................... 3 Cisco Nexus 9000 Advantages ................................................................................................................. 5 F5 Networks BIG-IP LTM Overview.......................................................................................................... 6 LTM Advantages ..................................................................................................................................... 10 Cisco Nexus 9000 + F5 LTM Design Options ........................................................................................ 10 Validation Approach ................................................................................................................................ 12 Nexus 9000 and F5 BIG-IP Integration .................................................................................................. 13 F5 BIG-IP Integration Overview ......................................................................................................... 13 Hierarchical Topology with F5 BIG-IP ................................................................................................ 13 Traffic Flow Model .............................................................................................................................. 13 Logical Model ..................................................................................................................................... 14 Validation Specifics ................................................................................................................................. 15 Table 1 outlines validated hardware and software. ............................................................................ 15 Topology ............................................................................................................................................. 16 Validation Results ............................................................................................................................... 16 1.1.1 Network High-Availability Validation: Disable vPC Links....................................................................... 16 1.1.2 Validate Layer 4 SLB Round-Robin Algorithm on Port 80 and 443 ....................................................... 17 1.1.3 Validate the Layer 4 SLB Least Connection Algorithm on Port 80 ........................................................ 17 1.1.4 Validate the Layer 4 SLB Source Address Persistence ........................................................................ 18 1.1.5 Validate the Layer 7 SLB Round-Robin Algorithm on Port 80 ............................................................... 18 1.1.6 Validate Health Monitoring by Removing Real Servers ........................................................................ 19 1.1.7 High-Availability Validation: Disable the Server Inside the Pool ............................................................ 20 1.1.8 High-Availability Validation: F5 BIG-IP LTM Switchover with Mirroring Enabled ................................... 20 Appendix A - Configurations Example .................................................................................................... 21 Nexus 9508-1 ..................................................................................................................................... 21 Nexus 9508-2 ..................................................................................................................................... 23 Nexus 9396-1 ..................................................................................................................................... 26 Nexus 9396-2 ..................................................................................................................................... 27 F5 BIG-IP LTM ................................................................................................................................... 29 Reference ............................................................................................................................................... 43 Disclaimer ............................................................................................................................................... 43 © 2014 Cisco | F5. All rights reserved. Page 2 Introduction ® This design guide provides guidelines for implementing Cisco Nexus 9000 Series NX-OS mode with F5 Networks’ BIG-IP Local Traffic Manager (LTM) in order to provide application delivery services. ® The Cisco Nexus 9000 product family is designed to meet both current and emerging needs for multiple stages of network transformation. By providing two modes of operation, Nexus 9000 Series Switches can be used in NXOS mode for traditional three-tier architectures, spine-leaf (CLOS) architectures, or first-generation softwaredefined networking (SDN) solutions. In Cisco Application Centric Infrastructure (ACI) mode, the Nexus 9000 offers an industry-leading architecture for the next generation of data center networking. ACI provides advanced capabilities and an operational model focused on the application to propel business forward. F5 Networks’ BIG-IP Local Traffic Manager (LTM) delivers applications to users in a reliable, secure, and optimized way. BIG-IP LTM provides extensive and flexible application services with the programmability capable of managing physical, virtual, and cloud infrastructure. BIG-IP LTM offers the power to simplify, automate, and customize applications faster and more predictably. Audience This document is intended for, but not limited to, system architects, network design engineers, systems engineers, field consultants, advanced services specialists, and customers who want to understand how to deploy F5 BIG-IP LTM into Cisco Nexus 9000 Series Switches in NX-OS mode for Cisco customers. Document Objectives This document is focused on deploying F5 BIG-IP LTM within a traditional aggregation or access data center design utilizing the latest Cisco Nexus 9000 Series Family of modular and fixed-ports switches. This design incorporates both physical and virtual edition F5 BIG-IP LTM devices. The design uses BIG-IP VIPRION 2400 equipment with a 40-Gigabit B2250 blade connecting to the aggregation layer. The LTM virtual editions were used at the access layer and used 1-Gbps licenses running on VMware vSphere. This document is focused on specific attributes of the Cisco Nexus 9000 Series switching platform and its impact on data center design. It is not intended to introduce the reader to basic Cisco data center design best practices, but to build upon these well-documented concepts. The prerequisite Cisco data center design knowledge can be found at the following URLs: Cisco Data Center Solutions: http://www.cisco.com/go/dc. Cisco Nexus 9000 Series Switches: http://www.cisco.com/c/en/us/products/switches/nexus-9000-seriesswitches/index.html. Cisco Design Zone for Data Center: http://www.cisco.com/en/US/netsol/ns743/networking_solutions_program_home.html. Cisco Nexus 9000 Overview Cisco Nexus 9000 Series Switches (Figure 1) are the next generation of data center switching infrastructure. In Cisco NX-OS Software mode, the Cisco Nexus 9000 Series addresses the new challenges of current infrastructure designs, while building on first-generation SDN solutions and providing a path to Cisco ACI. In Cisco ACI mode, Cisco Nexus 9000 Series Switches provide a powerful combination of hardware and software custom-developed for a powerfully robust and comprehensive solution. © 2014 Cisco | F5. All rights reserved. Page 3 Figure 1: Cisco Nexus 9000 Series Switches Cisco NX-OS Mode The Cisco NX-OS mode of the Cisco Nexus 9000 Series provides important customer benefits, including: Price - industry-leading price per port for 10- and 40-Gbps density systems Performance - industry-leading performance with full line-rate nonblocking 40-Gbps performance Port density - leading port density, with 288 ports of 40-Gbps connectivity per 8-slot chassis Programmability - leading suite of programmability features to support emerging networking models, including first-generation SDN, automation, and development and operations (DevOps) solutions Power - currently the industry’s most efficient chassis in its class, consuming up to 15 percent less power per port than competing solutions In addition to these benefits, the Cisco Nexus 9000 Series in Cisco NX-OS mode offers these major advantages: Best-in-class platform for migration from 1 Gbps to 10 Gbps Best-in-class platform for migration from 10 Gbps to 40 Gbps Optimal platform for replacement of traditional Cisco Catalyst 6000 Series Switches in the data center, with a solution that contains a smaller footprint, lower power draw, and 10- and 40-Gbps ports, all with equal copper port density Designed from the foundation to enable and accelerate Cisco ACI ® The portfolio consists of a broad set of hardware components, with more scheduled for release this year. The current offerings are listed below. Modular chassis options: Cisco Nexus 9504 Switch – Four payload slots – Up to 576 full line-rate 1- and 10-Gbps ports – Up to 144 full line-rate 40-Gbps ports Cisco Nexus 9508 Switch – Eight payload slots – Up to 1152 full line-rate 1- and 10-Gbps ports – Up to 288 full line-rate 40-Gbps ports © 2014 Cisco | F5. All rights reserved. Page 4 Cisco Nexus 9516 Switch – 16 payload slots – Up to 2304 full line-rate 1- and 10-Gbps ports – Up to 576 full line-rate 40-Gbps ports Fixed-switch options: Cisco Nexus 9396PX Switch – 48 ports of 1- and 10-Gbps fiber enhanced Small Form-Factor Pluggable Plus (SFP+) – 12 ports of 40-Gbps fiber Quad SFP (QSFP) Cisco Nexus 9396TX Switch – 48 ports of 1- and 10-Gbps fiber SFP+ – 12 ports of 40-Gbps fiber QSFP Cisco Nexus 93128TX Switch – 96 ports of 1- and 10-Gbps copper RJ-45 – Eight ports of 40-Gbps fiber QSFP All of these benefits are enhanced by innovative Cisco 40-Gbps bidirectional (BiDi) optics. These standardsbased QSFP optics provide 40-Gbps speeds on existing 10-Gbps infrastructure at approximately the same cost as current 10-Gbps optics. These optics are an exclusive Cisco option to help increase adoption of 40-Gbps solutions. Cisco Nexus 9000 Advantages Cisco Nexus 9000 Series Switches offer both modular and fixed 10/40/100 Gigabit Ethernet switch configurations, including high-density 1/10 Gb to servers; 40 Gb to network; and 100 Gb in future releases. Design flexibility with traditional two-tier spine/leaf, as well as three-tier core/aggregation/access design is also available. ACI Support Designed to support the Cisco next-generation data center based on an application-centric strategy Designed to help enable application deployment, simplicity, agility, and flexibility Programmability An intelligent API manages the switch through remote-procedure calls (JavaScript Object Notation or XML) over HTTP or HTTPS A Linux shell access and container environment is used to customize management and monitoring Scalability Up to 60 Tbps of nonblocking performance with less than five-microsecond latency Up to 2304 10 Gbps or 576 40 Gbps non-blocking layer 2 and layer 3 Ethernet ports Wire-speed Virtual Extensible LAN (VXLAN) gateway, bridging, and routing support © 2014 Cisco | F5. All rights reserved. Page 5 High Availability Full Cisco In-Service Software Upgrade (ISSU) and patching without any interruption in operation Mix of third-party and Cisco application-specific integrated circuits (ASICs) for improved reliability and performance Virtual port channel (vPC_ and VXLAN support Energy Efficiency Chassis design without a midplane to optimize airflow and reduce energy requirements Optimized design with fewer ASICs, resulting in lower energy use Efficient power supplies that are rated at 80 Plus Platinum Investment Protection Cisco 40 Gb BiDi transceiver for reuse of existing 10 Gigabit Ethernet cabling plant for 40 Gigabit Ethernet Switches designed to support future ASIC generations Support for Cisco Nexus 2000 Series Fabric Extenders in both NX-OS and ACI mode F5 Networks BIG-IP LTM Overview BIG-IP Local Traffic Manager (LTM) turns the network into an agile infrastructure for application delivery. It is a full proxy between users and application servers, creating a layer of abstraction to secure, optimize, and load-balance application traffic. This gives the control to add servers easily, eliminate downtime, improve application performance, and meet the security requirements. Rapid Application Deployment and Optimization BIG-IP LTM includes iApps, a powerful solution that enables managing application services rather than individual devices and objects. F5 iApps Templates (Figure 2) are a powerful feature of the BIG-IP system that can help deploying faster with fewer configuration mistakes. Unify, simplify, and control the entire application delivery network with a contextual view of the application services that support the business needs. © 2014 Cisco | F5. All rights reserved. Page 6 Figure 2: iApp Templates Application Visibility and Monitoring More efficient troubleshooting, capacity planning, performance tuning, and optimization can be achieved by monitoring exactly how an application is performing for real users based on application response time, network conditions, and user context. F5 Analytics (Figure 3) captures application-specific statistics reported at different levels of the service, such as URL, throughput, and server latency with views per virtual servers, pools, and nodes. BIG-IP LTM makes it simple to integrate with existing tools using industry standards such as sFlow, Simple Network Management Protocol (SNMP), and syslog. © 2014 Cisco | F5. All rights reserved. Page 7 Figure 3: F5 Analytics F5 Analytics gives IT a clear view into the health of the network and the application. Uptime, response time, and even usage spikes are available at a glance. Options enable operators navigate into detailed views to get to the source of application performance problems quickly. Load Balancing BIG-IP LTM intelligently adapts to the changing demands of the applications and ensures their consistent availability, even when servers fail. Active application health monitoring alerts when performance is threatened. Transaction assurance retries connections to different servers in the event of a failure. Secure Sockets Layer (SSL) Acceleration and Offload BIG-IP LTM uses specialized hardware to offload SSL encryption from data center servers. By accelerating encryption and freeing up server resources, BIG-IP LTM improves application performance. SSL acceleration: F5 offers leading SSL performance for transactional and bulk SSL encryption. SSL proxy and SSL forward proxy: Get control and visibility into all aspects of encrypted application traffic. Internet Content Adaptation Protocol (ICAP) services: F5 offers the most flexible ICAP solution for content adaption, with support for integration with services such as video and image optimization, virus scanning, and content filtering via F5 iRules. © 2014 Cisco | F5. All rights reserved. Page 8 Network hardware security module (HSM): Gets FIPS 140-2 level 2 and 3 support on all BIG-IP hardware and virtual editions. Easy Protocol Implementation BIG-IP LTM acts as a full proxy, sitting between servers and users, which makes implementing new protocols as easy as flipping a switch. SPDY: Turn on SPDY support and choose which servers will support it. IPv6: Turn on IPv6 support to service IPv6 clients with IPv6 while still servicing IPv4 requests with IPv4. Protocol Optimization Improve application performance while reducing network traffic. OneConnect: Increase server capacity by up to 60 percent. F5 Fast Cache: Prevent servers from having to handle requests for identical content. TCP connection queuing: Hold overload connections in a queue. Compression: Use fewer bytes to transmit data. Custom Control iRules is a data-plane scripting language which enables a broad range of functionality to be programmatically inserted into the network. Customers routinely implement security mitigation rules, support new protocols, and fix application-related errors in real time. The iRules scripting language lets the user intercept, parse, modify, and route application traffic based on specific business needs. Virtual and Cloud Flexibility BIG-IP LTM Virtual Edition delivers virtual environment and cloud deployment options with exceptional flexibility across all major virtualization platforms, including: VMware vSphere Citrix XenServer Microsoft Hyper-V KVM Industry-Leading Performance BIG-IP LTM delivers superior performance and scalability, including: Maximum layer 4 connections per second - 10 million Maximum layer 7 requests per second - 20 million Maximum layer 4 throughput - 640 Gbps Maximum SSL transactions per second - 240,000 Maximum hardware distributed denial-of-service (DDoS) SYN connections per second - 640 million Maximum virtual edition throughput - 10 Gbps © 2014 Cisco | F5. All rights reserved. Page 9 LTM Advantages Ensuring High Availability for Application Services LTM provides fault tolerance at the application layer (server downtime) as well as at the BIG-IP layer (failure). Application traffic remains uninterrupted despite either failure. This guide enables the following capabilities: Loss of an app server does not interrupt delivery of client traffic Loss of an LTM does not interrupt delivery of client traffic Stateful mirroring ensures that session information is sustained in the event of LTM failure Application traffic is statefully maintained between servers Optimizing Application Performance Deploying more servers doesn’t guarantee better performance. What matters is that you reserve server capacity for the right activities. LTM helps extend server capacity and reduce overall bandwidth usage. This guide enables the following capabilities: Optimize traffic flows by taking full advantage of LTM's full proxy. Separate stacks between F5/client and F5/app enables protocol optimization, specialized connection profiles, and so on. Offload the burden of encryption and decryption from your web servers by using SSL acceleration on F5 ASIC hardware. Reduce the volume of traffic to users by using intelligent compression. Eliminate unnecessary data transfer by using features such as dynamic caching. Securing Applications Applications require a wide variety of security services. LTM provides defense in depth across several layers. In addition, F5 provides other modules that run on top of LTM for additional security services, including web application firewalling, data center firewalling, secure access, authentication/authorization, and DDoS attack prevention. However, these are outside the scope of this guide. This guide enables the following capabilities: Default deny/full firewall Centralized SSL certificate management iRules inspection DDoS protection within LTM to prevent SynFlooding - vulnerability resiliency Cisco Nexus 9000 + F5 LTM Design Options Cisco Nexus 9000 Series Switches use a network appliance model in order to insert the F5 BIG-IP LTM module into its data center architecture. This document provides a validated sample topology that uses F5 VIPRION C2400 chassis equipment with a 40-Gb B2250 blade to configure with the LTM module to provide application delivery services in an active/standby configuration. The B2250 is chosen in this validation effort to demonstrate the 40-Gb compatibility between Nexus 9000 and BIG-IP. If the 10-Gb module is used in the Nexus 9000, any BIG-IP model that supports 10 Gigabits will work with the Nexus 9000 design. © 2014 Cisco | F5. All rights reserved. Page 10 In the validation effort for this document, 1-ARM mode application delivery services were the primary focus of analysis, with redundant F5 VIPRION units configured with device-level failover for high availability. Traffic streams were routed through the F5 LTM directly to the server farm. An illustration of the physical topology, including F5 VIPIRION 2400, is shown in Figure 4. This is a 1-ARM mode topology with vPC configured from the Nexus 9500 Switch to the F5 VIPRION and double-sided vPC to the Nexus 9300 access layer. The Nexus 9300 vPC to the host provides high availability. Figure 4: Cisco Nexus 9000 SLB Services with F5 BIG-IP in 1-ARM Mode A 2-ARM (passthrough) mode design is also supported, and a reference topology is shown in Figure 5. In this design, BIG-IP is also configured in a high-availability (active/standby) pair. Two separate port channels - one for external VLAN and one for internal VLAN - are connected to the BIG-IP, as illustrated in the diagram where BLUE stands for external and ORANGE for internal. In this scenario, all traffic must go through the BIG-IP, where BIG-IP can also act as a firewall device. Both external and internal Port-Channels are vPC to the Nexus 9500 Switch for high availability. © 2014 Cisco | F5. All rights reserved. Page 11 Figure 5: Cisco Nexus 9000 SLB Services with F5 BIG-IP in 2-ARM Mode Virtual Editions (VE) of F5 BIG-IP can also integrate into the Nexus 9000 design. BIG-IP VE products offer the same code, application delivery services, and features as physical BIG-IP hardware. BIG-IP VE offers a wide range of throughput options support on various hypervisors. For details refer to BIG-IP VE data sheet: http://www.f5.com/pdf/products/big-ip-virtual-editions-datasheet.pdf. Validation Approach As customers introduce Nexus 9000 Series Switches into their networks, it is important that these devices interact as expected with existing data center switching platforms such as the Cisco Nexus 7000 and 5000 Series Switches. Interoperability and protocol compliance issues are regression-tested before products are brought to market. The topology validation incorporates an end-to-end solution by placing the products in a hierarchical data center network topology and analyzing how that topology converges as various link and device faults are induced. This approach not only further validates the protocol interoperability between devices, but also ensures that the equipment deployed provides a highly available, redundant network architecture. Figure 6 shows examples of possible failure cases in a redundant data center hierarchical topology. Each red X represents a device or link failure case that has been validated. As each device or link in the primary data path down one side of the topology is forced into a simulated failure, the purpose of the fully redundant network topology is that traffic can converge around the failure. Cisco design validation testing simulated failures in each of the devices and links individually, and verified that the configuration examples being provided allow the network to properly converge in a timely manner. © 2014 Cisco | F5. All rights reserved. Page 12 Figure 6: High-Availability Recovery Analysis Cases Nexus 9000 and F5 BIG-IP Integration F5 BIG-IP Integration Overview Integration of an application delivery controller (ADC), such as F5 BIG-IP LTM, is a critical component of designing the data center architecture. The aggregation layer is a common location for integration of SLB services since it typically provides the boundary between layer 2 and layer 3 in the data center, and allows service devices to be shared across multiple switches in the access layer. As mentioned in the section, “Cisco Nexus 9000 + F5 LTM Insertion,” F5 BIG-IP uses an appliance model for integrating SLB service with a Nexus 9000 NX-OS modebased aggregation layer. The next sections provide detail behind this validation effort. Hierarchical Topology with F5 BIG-IP The topology used for validation of F5 BIG-IP integration is based on the physical topology shown in Figure 4 and described in the section, ”Cisco Nexus 9000 Plus F5 LTM Insertion.” The following sections detail the traffic flows and logical configuration for this topology. Traffic Flow Model Connecting the F5 BIG-IP directly to the aggregation Nexus 9000 Switches allows the centralized application delivery services to be used across multiple access layer switches and server farm tiers. An illustration of the data flows is shown in Figure 7. © 2014 Cisco | F5. All rights reserved. Page 13 Figure 7: Cisco Nexus 9000 Plus F5 BIG-IP Traffic Flow Logical Model The integration of the F5 BIG-IP with the Nexus 9000 NX-OS mode aggregation traffic flows are segregated using the multiple VLAN interfaces. An illustration of the VLAN allocation supporting these flows is provided in Figure 8. Client machines across the core of the network can access server farm VLANs and traffic is directed through the appropriate services based on the server subnet location. Figure 8: Logical Model © 2014 Cisco | F5. All rights reserved. Page 14 Following is a brief analysis of the function of each of the VLANs used in the logical design. Aggregation default VRF to one-armed F5 BIG-IP - This link is shown as VLAN 90 in Figure 7. This is both the ingress and egress interface for traffic being serviced by the F5 BIG-IP. The F5 BIG-IP LTM performs source Network Address Translation (NAT), which changes the source address of packets that it is forwarding to the server farm. In this way, the return packets must also pass through the F5 BIG-IP LTM to have their destination addresses translated back to that of the original requesting client node. This VLAN is extended across the 40-Gb connections between the aggregation switches and the F5 BIG-IP devices, and the port channel between the two aggregation switches. F5 BIG-IP fault tolerance link - This link is shown as VLAN 81 in Figure 7, and is extended across the logical link between the two F5 BIG-IP chassis. This link carries hello traffic and allows configuration synchronization between the two F5 BIG-IPs. F5 BIG-IP chassis to server farm VLANs - These VLANs are referenced as the "server farm VLANs," and are shown in Figure 7. These VLANs are extended across the dual-homed links to the aggregation layer, the port channel between aggregation switches, and also down into the access layer to support server connectivity. Validation Specifics Table 1 outlines validated hardware and software. Table 1: Validated Hardware and Software Device Software Version Quantity Cisco Nexus 9508 Switch NX-OS Release 6.1(2)I2(2) 2 Cisco Nexus 9396 Switch NX-OS Release 6.1(2)I2(2) 2 F5 VIPRION 2400 Chassis + B2250 40G Blade 11.4.1 2 40 Gb QSFP optics Vendor approved As required Blades and rack servers ESXi 5.1 2 © 2014 Cisco | F5. All rights reserved. Page 15 Topology Figure 9 illustrates the proper topology to use. Figure 9: Validation of Physical Topology In the topology shown in Figure 9, the F5 Big-IP LTM devices are connected to the spine switches, with one switch acting as active and other as standby. LTMs are connected through vPC to the Nexus 9000 spine switch using the bundling Link Aggregation Control Protocol (LACP). Static routes are configured to redirect traffic from the source (client) to application servers through the F5 BIG-IP LTM. If BIG-IP VE (Virtual Edition) is being used, then servers running a hypervisor will be connected to the leaf switches to carry the traffic in different VLANs. Leaf and spines are connected in vPC configuration, and allow active-active uplink from leaf to spine. Validation Results 1.1.1 Network High-Availability Validation: Disable vPC Links Shut down the vPC peer-link only, then “no shut” vPC peer link – The test result validates vPC secondary shutdown if all its vPC member ports. There is momentary loss in traffic, and total bandwidth is down to 50 percent. Shut down one of the vPC member links – The test result validates no loss in traffic as all traffic shifts to the other vPC peer. © 2014 Cisco | F5. All rights reserved. Page 16 1.1.2 Validate Layer 4 SLB Round-Robin Algorithm on Port 80 and 443 Establish 1000 HTTP (port 80) sessions from the client IP address to VIP Establish 1000 HTTPS (port 443) sessions from the client IP address to VIP – The test result validates the F5 LTM layer 4 LSB round-robin algorithm, where 50 percent of the traffic goes to server 1 and 50 percent of the traffic goes to server 2. 1.1.3 Validate the Layer 4 SLB Least Connection Algorithm on Port 80 Disable web-103 (server 2) and generate 20 sessions from the client IP address to VIP Server web-102 (server 1) has 20 current sessions; enable web-103 and generate 10 new sessions – The test result validates the F5 LTM L4 LSB least connection algorithm, where server 2 will serve the new sessions while server 1 has more connections. © 2014 Cisco | F5. All rights reserved. Page 17 1.1.4 Validate the Layer 4 SLB Source Address Persistence Configure the source address persistence profile, and establish 1000 HTTP (port 80) sessions from the same client IP address to VIP – The test result validates the persistence profile, where the same source address session goes to the same server. 1.1.5 Validate the Layer 7 SLB Round-Robin Algorithm on Port 80 Configure the virtual server based on the layer 7 SLB profile, and establish 1000 HTTP (port 80) sessions from the client IP address to VIP – The test result validates the layer 7 SLB round-robin algorithm, where 50 percent of the traffic goes to server 1 and 50 percent of the traffic goes to server 2. © 2014 Cisco | F5. All rights reserved. Page 18 1.1.6 Validate Health Monitoring by Removing Real Servers Health monitoring is set up for server load-balancing sessions, so that real servers that are not in service are not used, and can be added back as needed. While load balancing is in progress, a real server is shut down. Application Delivery Controller (ADC) detects this and removes servers from the real server list. There is momentary loss of existing connections and clients will have to open new connections until this real server is removed from service. While load balancing is in progress a real server is added, and ADC detects this and adds to support the incoming load. – The test result validates that the F5 BIG-IP LTM detects the server is down and removes the offline server from the pool. It also detects when an offline server from the pool comes online and starts load balancing traffic to the online server. Both servers are online Detect server 1 offline © 2014 Cisco | F5. All rights reserved. Page 19 All new connections route to server 2 Detect server 1 back online and start taking new requests 1.1.7 High-Availability Validation: Disable the Server Inside the Pool Disable server 1 in the pool – The test results validate that all traffic gets redirected to server 2 within the pool. 1.1.8 High-Availability Validation: F5 BIG-IP LTM Switchover with Mirroring Enabled Force the active F5 BIG-IP LTM to stand by with mirroring enabled – The test result validates after a momentary loss; the client can re-establish the existing session with the newly active F5 BIG-IP and traffic resumes. © 2014 Cisco | F5. All rights reserved. Page 20 Appendix A - Configurations Example Nexus 9508-1 version 6.1(2)I2(3) switchname tme-sol-1-n9508-1 vdc tme-sol-1-n9508-1 id 1 allocate interface Ethernet1/1-36 limit-resource vlan minimum 16 maximum 4094 limit-resource vrf minimum 2 maximum 4096 limit-resource port-channel minimum 0 maximum 768 limit-resource u4route-mem minimum 248 maximum 248 limit-resource u6route-mem minimum 96 maximum 96 limit-resource m4route-mem minimum 58 maximum 58 limit-resource m6route-mem minimum 8 maximum 8 feature telnet cfs eth distribute feature lacp feature vpc feature lldp username admin password 5 $1$ScfGdetY$0ynGuxo6e3Ei1krItPMsc/ role network-admin no password strength-check ip domain-lookup service unsupported-transceiver copp profile strict snmp-server user admin network-admin auth md5 0x6db8c971332f4ee859c22879d4298046 priv 0x6db8c971332f4ee859c22879d4298046 localizedkey rmon event 1 log trap public description FATAL(1) owner PMON@FATAL rmon event 2 log trap public description CRITICAL(2) owner PMON@CRITICAL rmon event 3 log trap public description ERROR(3) owner PMON@ERROR rmon event 4 log trap public description WARNING(4) owner PMON@WARNING rmon event 5 log trap public description INFORMATION(5) owner PMON@INFO vlan 1,80-90 vrf context management © 2014 Cisco | F5. All rights reserved. Page 21 ip route 0.0.0.0/0 172.23.102.1 hardware access-list tcam region racl 256 hardware access-list tcam region qos 256 vpc domain 10 peer-keepalive destination 172.23.102.32 source 172.23.102.31 interface port-channel41 switchport switchport mode trunk vpc 41 interface port-channel42 switchport switchport mode trunk vpc 42 interface port-channel80 switchport switchport mode trunk spanning-tree port type network vpc peer-link interface port-channel100 switchport switchport mode trunk speed 40000 vpc 100 interface Ethernet1/1 switchport switchport mode trunk speed 40000 channel-group 100 mode active no shutdown interface Ethernet1/2 switchport switchport mode trunk speed 40000 channel-group 100 mode active no shutdown interface Ethernet1/11 switchport switchport mode trunk © 2014 Cisco | F5. All rights reserved. Page 22 channel-group 42 mode active no shutdown interface Ethernet1/12 switchport switchport mode trunk channel-group 41 mode active no shutdown interface Ethernet1/35 switchport switchport mode trunk channel-group 80 mode active no shutdown interface Ethernet1/36 switchport switchport mode trunk channel-group 80 mode active no shutdown interface mgmt0 vrf member management ip address 172.23.102.31/23 line console line vty boot nxos bootflash:/n9000-dk9.6.1.2.I2.3.bin sup-1 Nexus 9508-2 version 6.1(2)I2(2) switchname tme-sol-1-n9508-2 vdc tme-sol-1-n9508-2 id 1 allocate interface Ethernet3/1-36 limit-resource vlan minimum 16 maximum 4094 limit-resource vrf minimum 2 maximum 4096 limit-resource port-channel minimum 0 maximum 768 limit-resource u4route-mem minimum 248 maximum 248 limit-resource u6route-mem minimum 96 maximum 96 limit-resource m4route-mem minimum 58 maximum 58 limit-resource m6route-mem minimum 8 maximum 8 feature telnet cfs eth distribute feature interface-vlan feature lacp feature vpc © 2014 Cisco | F5. All rights reserved. Page 23 username admin password 5 $1$DziXjTDu$htYqsaWkMB105.eAhXEqA. role network-admin no password strength-check ip domain-lookup ip name-server 172.21.157.5 use-vrf management service unsupported-transceiver copp profile strict snmp-server user admin network-admin auth md5 0x5a4f3294c8bc84f4a34cc4ab58fbdde0 priv 0x5a4f3294c8bc84f4a34cc4ab58fbdde0 localizedkey rmon event 1 log trap public description FATAL(1) owner PMON@FATAL rmon event 2 log trap public description CRITICAL(2) owner PMON@CRITICAL rmon event 3 log trap public description ERROR(3) owner PMON@ERROR rmon event 4 log trap public description WARNING(4) owner PMON@WARNING rmon event 5 log trap public description INFORMATION(5) owner PMON@INFO vlan 1,80-90,300 vrf context management ip route 0.0.0.0/0 172.23.102.1 vpc domain 10 peer-keepalive destination 172.23.102.31 source 172.23.102.32 interface Vlan1 interface port-channel41 switchport switchport mode trunk vpc 41 interface port-channel42 switchport switchport mode trunk vpc 42 interface port-channel80 switchport switchport mode trunk spanning-tree port type network vpc peer-link interface port-channel100 switchport switchport mode trunk speed 40000 vpc 100 © 2014 Cisco | F5. All rights reserved. Page 24 interface Ethernet3/1 switchport switchport mode trunk speed 40000 channel-group 100 mode active no shutdown interface Ethernet3/2 switchport switchport mode trunk speed 40000 channel-group 100 mode active no shutdown interface Ethernet3/11 switchport switchport mode trunk channel-group 42 mode active no shutdown interface Ethernet3/12 switchport switchport mode trunk channel-group 41 mode active no shutdown interface Ethernet3/35 switchport switchport mode trunk channel-group 80 mode active no shutdown interface Ethernet3/36 switchport switchport mode trunk channel-group 80 mode active no shutdown interface mgmt0 vrf member management ip address 172.23.102.32/23 line console line vty boot nxos bootflash:/n9000-dk9.6.1.2.I2.2.bin sup-1 boot nxos bootflash:/n9000-dk9.6.1.2.I2.2.bin sup-2 © 2014 Cisco | F5. All rights reserved. Page 25 Nexus 9396-1 version 6.1(2)I2(2) switchname tme-sol-1-n9396-1 vdc tme-sol-1-n9396-1 id 1 allocate interface Ethernet1/1-48 allocate interface Ethernet2/1-12 limit-resource vlan minimum 16 maximum 4094 limit-resource vrf minimum 2 maximum 4096 limit-resource port-channel minimum 0 maximum 768 limit-resource u4route-mem minimum 248 maximum 248 limit-resource u6route-mem minimum 96 maximum 96 limit-resource m4route-mem minimum 58 maximum 58 limit-resource m6route-mem minimum 8 maximum 8 feature telnet cfs eth distribute feature lacp feature vpc username admin password 5 $1$pQIH/Qpy$WNqhCY7x.lsFcEjmWFjtG1 role network-admin no password strength-check ip domain-lookup copp profile strict snmp-server user admin network-admin auth md5 0x722bc0810bd8131c0ebf163a5dcff8df priv 0x722bc0810bd8131c0ebf163a5dcff8df localizedkey rmon event 1 log trap public description FATAL(1) owner PMON@FATAL rmon event 2 log trap public description CRITICAL(2) owner PMON@CRITICAL rmon event 3 log trap public description ERROR(3) owner PMON@ERROR rmon event 4 log trap public description WARNING(4) owner PMON@WARNING rmon event 5 log trap public description INFORMATION(5) owner PMON@INFO vlan 1,80-90,300 vrf context management ip route 0.0.0.0/0 172.23.102.1 vpc domain 11 role priority 32768 peer-keepalive destination 172.23.102.34 source 172.23.102.33 interface port-channel81 switchport mode trunk spanning-tree port type network vpc peer-link interface port-channel101 switchport mode trunk © 2014 Cisco | F5. All rights reserved. Page 26 vpc 101 interface port-channel200 switchport mode trunk vpc 200 interface port-channel201 switchport mode trunk vpc 201 interface Ethernet1/1 switchport mode trunk channel-group 200 interface Ethernet1/2 switchport mode trunk channel-group 201 interface Ethernet1/31 switchport mode trunk channel-group 81 mode active interface Ethernet1/32 switchport mode trunk channel-group 81 mode active interface Ethernet2/1 switchport mode trunk channel-group 101 mode active interface Ethernet2/2 switchport mode trunk channel-group 101 mode active interface mgmt0 vrf member management ip address 172.23.102.33/23 line console line vty Nexus 9396-2 version 6.1(2)I2(1) hostname tme-sol-1-n9396-2 vdc tme-sol-1-n9396-2 id 1 allocate interface Ethernet1/1-48 allocate interface Ethernet2/1-12 © 2014 Cisco | F5. All rights reserved. Page 27 limit-resource vlan minimum 16 maximum 4094 limit-resource vrf minimum 2 maximum 4096 limit-resource port-channel minimum 0 maximum 768 limit-resource u4route-mem minimum 248 maximum 248 limit-resource u6route-mem minimum 96 maximum 96 limit-resource m4route-mem minimum 58 maximum 58 limit-resource m6route-mem minimum 8 maximum 8 feature telnet cfs eth distribute feature lacp feature vpc username admin password 5 $1$nqocV2AK$iue5aOprA1moEfjIw1sGX0 role network-admin no password strength-check ip domain-lookup ip name-server 172.21.157.5 use-vrf management copp profile strict snmp-server user admin network-admin auth md5 0xb32a8d8a7f1d7198ea6715996edc8290 priv 0xb32a8d8a7f1d7198ea6715996edc8290 localizedkey rmon event 1 log trap public description FATAL(1) owner PMON@FATAL rmon event 2 log trap public description CRITICAL(2) owner PMON@CRITICAL rmon event 3 log trap public description ERROR(3) owner PMON@ERROR rmon event 4 log trap public description WARNING(4) owner PMON@WARNING rmon event 5 log trap public description INFORMATION(5) owner PMON@INFO vlan 1,80-90,300 vrf context management ip route 0.0.0.0/0 172.23.3.1 ip route 0.0.0.0/0 172.23.102.1 vpc domain 11 role priority 32769 peer-keepalive destination 172.23.102.33 source 172.23.102.34 interface port-channel81 switchport mode trunk spanning-tree port type network vpc peer-link interface port-channel101 switchport mode trunk vpc 101 interface port-channel200 switchport mode trunk © 2014 Cisco | F5. All rights reserved. Page 28 vpc 200 interface port-channel201 switchport mode trunk vpc 201 interface Ethernet1/1 switchport mode trunk channel-group 200 interface Ethernet1/2 switchport mode trunk channel-group 201 interface Ethernet1/31 switchport mode trunk channel-group 81 mode active interface Ethernet1/32 switchport mode trunk channel-group 81 mode active interface Ethernet2/1 switchport mode trunk channel-group 101 mode active interface Ethernet2/2 switchport mode trunk channel-group 101 mode active interface mgmt0 vrf member management ip address 172.23.102.34/23 line console line vty boot nxos bootflash:/n9000-dk9.6.1.2.I2.1.bin F5 BIG-IP LTM cli admin-partitions { update-partition Common } apm client-packaging /Common/client-packaging { } apm resource remote-desktop citrix-client-bundle /Common/default-citrix-client-bundle { } auth user admin { description "Admin User" © 2014 Cisco | F5. All rights reserved. Page 29 encrypted-password "$6$iDQhuwTK$a6F8GTOUUYDSMyP1XKatq6HzIzmovW72Bd9kz/w3i24bqidieYLcuDZcbm1whunKHM/3RWa5joEw g3oJRWFux1" partition-access all role admin shell tmsh } auth user root { description none encrypted-password "$6$oJrU6NKG$htStO2XRxJo2JumBdbiQqCCyxhwvNmInjxjUMIqHY.4Eslk3gV63mSZLJbkX1n2KAX/x2Rg4TSkp VzxOHBAYk." shell bash } cm cert /Common/dtca-bundle.crt { cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtcabundle.crt_29745_3 checksum SHA1:1302:901ff2ebd6e3d2b17306c780fdaed4854c3c0080 revision 3 } cm cert /Common/dtca.crt { cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtca.crt_29741_2 checksum SHA1:1302:901ff2ebd6e3d2b17306c780fdaed4854c3c0080 revision 2 } cm cert /Common/dtdi.crt { cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtdi.crt_29737_2 checksum SHA1:1269:23b24df6de753974970ec7dec19303368473b773 revision 2 } cm device /Common/bigip1.f5.local { active-modules { "Best Bundle, C2200 / C2400 Platforms|T783746-1621305|SDN Services|AFM, C2400|Acceleration Manager, C2400|ASM, Unlimited, VIPRION|DNS and GTM (Unlimited), Viprion|Anti-Virus Checks|Base Endpoint Security Checks|Firewall Checks|Machine Certificate Checks|Network Access|Protected Workspace|Secure Virtual Keyboard|APM, Web Application|TPS SSL, Unlimited, C2400/C4400/C4480|App Tunnel|Remote Desktop|DNS Rate Fallback, Unlimited|DNS Licensed Objects, Unlimited|DNS Rate Limit, Unlimited QPS|GTM Rate Fallback, (UNLIMITED)|GTM Licensed Objects, Unlimited|GTM Rate, Unlimited|Routing Bundle|PSM" "DNS-GTM, Rate Limited, VIPRION|K600758-9714257|DNS Rate Fallback, 100|DNS Licensed Objects, 0|GTM Licensed Objects, 0|DNS Rate Limit, 100 QPS|GTM Rate Fallback, 32|GTM Rate, 32|DNS Rate Fallback, Unlimited|DNS Licensed Objects, Unlimited|DNS Rate Limit, Unlimited QPS|GTM Rate Fallback, (UNLIMITED)|GTM Licensed Objects, Unlimited|GTM Rate, Unlimited|Routing Bundle" "LTM, Base, C2400|G8804572785738|IPV6 Gateway|Rate Shaping|Ram Cache|Cluster Multi-Processing|50 Mbps Compression|SSL, 500 TPS Per Core|Performance Extreme, VPR|Routing Bundle|APM, Limited, Viprion|AAM, Core|Client Authentication|Anti-Virus Checks|Base Endpoint Security Checks|Firewall Checks|Machine Certificate Checks|Network Access|Protected Workspace|Secure Virtual Keyboard|APM, Web Application|TPS SSL, Unlimited, C2400/C4400/C4480|App Tunnel|Remote Desktop|Compression, Unlimited|PSM|DNS Rate Fallback, Unlimited|DNS Licensed Objects, Unlimited|DNS Rate Limit, Unlimited QPS" } base-mac 00:23:e9:9d:36:00 © 2014 Cisco | F5. All rights reserved. Page 30 build 625.0 chassis-id chs407101s chassis-type viprion configsync-ip 10.1.80.41 edition "Hotfix HF1" hostname bigip1.f5.local management-ip 172.23.102.41 marketing-name "BIG-IP VPR-C2400" multicast-ip any optional-modules { "Acceleration Manager, C2400" "ADC, Security Bundle, C2400" "Advanced LTM Protocols, Viprion" "AFM, C2400" "APM, Base, C2400" "APM, Max CCU, C2400" "App Mode (TMSH Only, No Root/Bash)" "ASM, Bundle, VIPRION" "ASM, PSM to ASM Upgrade" "ASM, Unlimited, VIPRION" "Better Bundle, C2200 / C2400 Platforms" "Better to Best Bundle, C2200 / C2400 Platforms" "CGN, Viprion" "Client Authentication" "Compression, Unlimited" "Concurrent Users" "DNS and GTM (1K QPS), Viprion" "DNS and GTM (Unlimited), Viprion" "DNS Services, VPR" "EA Features" "External Interface and Network HSM" "FIX Low Latency" GTM "IPI Subscription, 1Yr, C2400" "IPI Subscription, 3Yr, C2400" "MSM, Unlimited Mailboxes" "PEM URL Filtering, Subscription, 1Yr, C2400" "PEM URL Filtering, Subscription, 3Yr, C2400" "PEM, C2400" "PEM, Quota Management, C2X00" "PSM, Base" "SDN Services" "SSL, Forward Proxy" "SWG Subscription, 1Yr, C2200/C2400" "SWG Subscription, 3Yr, C2200/C2400" "TPS SSL, Unlimited, C2400/C4400/C4480" "URL Filtering Subscription, 1Yr, C2200/C2400" "URL Filtering Subscription, 3Yr, C2200/C2400" "VCMP, 16 Guests" "VCMP, Max Guests" "WBA, Bundle, C2400" } platform-id A112 product BIG-IP time-zone PDT unicast-address { { effective-ip 10.1.80.41 effective-port 1026 ip 10.1.80.41 } { effective-port 1026 } } version 11.4.1 } cm device /Common/bigip2.f5.local { active-modules { "Best Bundle, C2200 / C2400 Platforms|M001120-5515609|SDN Services|AFM, C2400|Acceleration Manager, C2400|ASM, Unlimited, VIPRION|DNS and GTM (Unlimited), Viprion|Anti-Virus Checks|Base Endpoint Security Checks|Firewall Checks|Machine Certificate Checks|Network Access|Protected Workspace|Secure Virtual Keyboard|APM, Web Application|TPS SSL, Unlimited, C2400/C4400/C4480|App Tunnel|Remote Desktop|DNS Rate Fallback, Unlimited|DNS Licensed Objects, Unlimited|DNS Rate Limit, Unlimited QPS|GTM Rate Fallback, (UNLIMITED)|GTM Licensed Objects, Unlimited|GTM Rate, Unlimited|Routing Bundle|PSM" "DNS-GTM, Rate Limited, VIPRION|Q082212-9739992|DNS Rate Fallback, 100|DNS Licensed Objects, 0|GTM Licensed Objects, 0|DNS Rate Limit, 100 QPS|GTM Rate Fallback, 32|GTM Rate, 32|DNS Rate Fallback, Unlimited|DNS Licensed Objects, Unlimited|DNS Rate Limit, Unlimited QPS|GTM Rate Fallback, (UNLIMITED)|GTM Licensed Objects, Unlimited|GTM Rate, Unlimited|Routing Bundle" "LTM, Base, C2400|R5660590312921|IPV6 Gateway|Rate Shaping|Ram Cache|Cluster Multi-Processing|50 Mbps Compression|SSL, 500 TPS Per Core|Performance Extreme, VPR|Routing Bundle|APM, Limited, © 2014 Cisco | F5. All rights reserved. Page 31 Viprion|AAM, Core|Client Authentication|Anti-Virus Checks|Base Endpoint Security Checks|Firewall Checks|Machine Certificate Checks|Network Access|Protected Workspace|Secure Virtual Keyboard|APM, Web Application|TPS SSL, Unlimited, C2400/C4400/C4480|App Tunnel|Remote Desktop|Compression, Unlimited|PSM|DNS Rate Fallback, Unlimited|DNS Licensed Objects, Unlimited|DNS Rate Limit, Unlimited QPS" } base-mac 00:23:e9:9d:f6:00 build 625.0 cert /Common/dtdi.crt chassis-id chs407234s chassis-type viprion configsync-ip 10.1.80.42 edition "Hotfix HF1" hostname bigip2.f5.local key /Common/dtdi.key management-ip 172.23.102.42 marketing-name "BIG-IP VPR-C2400" multicast-ip any optional-modules { "Acceleration Manager, C2400" "ADC, Security Bundle, C2400" "Advanced LTM Protocols, Viprion" "AFM, C2400" "APM, Base, C2400" "APM, Max CCU, C2400" "App Mode (TMSH Only, No Root/Bash)" "ASM, Bundle, VIPRION" "ASM, PSM to ASM Upgrade" "ASM, Unlimited, VIPRION" "Better Bundle, C2200 / C2400 Platforms" "Better to Best Bundle, C2200 / C2400 Platforms" "CGN, Viprion" "Client Authentication" "Compression, Unlimited" "Concurrent Users" "DNS and GTM (1K QPS), Viprion" "DNS and GTM (Unlimited), Viprion" "DNS Services, VPR" "EA Features" "External Interface and Network HSM" "FIX Low Latency" GTM "IPI Subscription, 1Yr, C2400" "IPI Subscription, 3Yr, C2400" "MSM, Unlimited Mailboxes" "PEM URL Filtering, Subscription, 1Yr, C2400" "PEM URL Filtering, Subscription, 3Yr, C2400" "PEM, C2400" "PEM, Quota Management, C2X00" "PSM, Base" "SDN Services" "SSL, Forward Proxy" "SWG Subscription, 1Yr, C2200/C2400" "SWG Subscription, 3Yr, C2200/C2400" "TPS SSL, Unlimited, C2400/C4400/C4480" "URL Filtering Subscription, 1Yr, C2200/C2400" "URL Filtering Subscription, 3Yr, C2200/C2400" "VCMP, 16 Guests" "VCMP, Max Guests" "WBA, Bundle, C2400" } platform-id A112 product BIG-IP self-device true time-zone PDT unicast-address { { effective-ip 10.1.80.42 effective-port 1026 ip 10.1.80.42 } { effective-port 1026 } } version 11.4.1 } cm device-group /Common/device-group-failover-fc99d0cbc202 { devices { /Common/bigip1.f5.local { } /Common/bigip2.f5.local { } © 2014 Cisco | F5. All rights reserved. Page 32 } type sync-failover } cm device-group /Common/device_trust_group { auto-sync enabled devices { /Common/bigip1.f5.local { } /Common/bigip2.f5.local { } } hidden true network-failover disabled } cm device-group /Common/gtm { devices { /Common/bigip2.f5.local { } } hidden true network-failover disabled } cm key /Common/dtca.key { cache-path /config/filestore/files_d/Common_d/trust_certificate_key_d/:Common:dtca.key_29743_2 checksum SHA1:1679:350c3881ac1654fb68d491dd06d53be65bd62782 revision 2 } cm key /Common/dtdi.key { cache-path /config/filestore/files_d/Common_d/trust_certificate_key_d/:Common:dtdi.key_29739_2 checksum SHA1:1679:d30e359dfd3306d4268b74001c56dfe7d2562780 revision 2 } cm traffic-group /Common/traffic-group-1 { ha-order { /Common/bigip1.f5.local /Common/bigip2.f5.local } unit-id 1 } cm traffic-group /Common/traffic-group-local-only { } cm trust-domain /Common/Root { ca-cert /Common/dtca.crt ca-cert-bundle /Common/dtca-bundle.crt ca-devices { /Common/bigip2.f5.local /Common/bigip1.f5.local } ca-key /Common/dtca.key guid c53fb850-be99-4b6a-8b410023e98b13c2 status initialized © 2014 Cisco | F5. All rights reserved. Page 33 trust-group /Common/device_trust_group } gtm global-settings metrics { metrics-collection-protocols { icmp } } gtm global-settings metrics-exclusions { addresses none } ltm default-node-monitor { rule none } ltm node /Common/10.1.80.102 { address 10.1.80.102 monitor /Common/gateway_icmp } ltm node /Common/10.1.80.103 { address 10.1.80.103 monitor /Common/gateway_icmp } ltm pool /Common/HTTP-Pool { members { /Common/10.1.80.102:80 { address 10.1.80.102 } /Common/10.1.80.103:80 { address 10.1.80.103 } } monitor /Common/gateway_icmp } ltm pool /Common/HTTPS-Pool { members { /Common/10.1.80.102:443 { address 10.1.80.102 } /Common/10.1.80.103:443 { address 10.1.80.103 } } monitor /Common/gateway_icmp } ltm virtual /Common/HTTP-L7-VIP { destination /Common/10.1.90.101:80 ip-protocol tcp mask 255.255.255.255 pool /Common/HTTP-Pool © 2014 Cisco | F5. All rights reserved. Page 34 profiles { /Common/fasthttp { } } source 0.0.0.0/0 source-address-translation { type automap } translate-address enabled translate-port enabled } ltm virtual /Common/HTTP-VIP { destination /Common/10.1.90.100:80 ip-protocol tcp mask 255.255.255.255 pool /Common/HTTP-Pool profiles { /Common/fastL4 { } } source 0.0.0.0/0 source-address-translation { type automap } translate-address enabled translate-port enabled } ltm virtual /Common/HTTPS-VIP { destination /Common/10.1.90.100:443 ip-protocol tcp mask 255.255.255.255 pool /Common/HTTPS-Pool profiles { /Common/fastL4 { } } source 0.0.0.0/0 source-address-translation { type automap } translate-address enabled translate-port enabled } ltm virtual-address /Common/10.1.90.100 { address 10.1.90.100 mask 255.255.255.255 traffic-group /Common/traffic-group-1 } ltm virtual-address /Common/10.1.90.101 { © 2014 Cisco | F5. All rights reserved. Page 35 address 10.1.90.101 mask 255.255.255.255 traffic-group /Common/traffic-group-1 } ltm classification signature-version { version-number 0 } net interface 1/2.1 { bundle disabled } net interface 1/2.2 { bundle disabled } net interface 1/2.3 { bundle disabled } net interface 1/2.4 { bundle disabled } net interface 2/2.1 { bundle disabled } net interface 2/2.2 { bundle disabled } net interface 2/2.3 { bundle enabled } net interface 2/2.4 { bundle enabled } net route-domain /Common/0 { id 0 vlans { /Common/internal /Common/external } } net self /Common/10.1.90.254 { address 10.1.90.254/24 allow-service { tcp:443 } traffic-group /Common/traffic-group-1 vlan /Common/external } © 2014 Cisco | F5. All rights reserved. Page 36 net self /Common/10.1.80.254 { address 10.1.80.254/24 allow-service { default } traffic-group /Common/traffic-group-1 vlan /Common/internal } net self /Common/10.1.80.42 { address 10.1.80.42/24 allow-service { default } traffic-group /Common/traffic-group-local-only vlan /Common/internal } net self /Common/10.1.90.42 { address 10.1.90.42/24 allow-service { default } traffic-group /Common/traffic-group-local-only vlan /Common/external } net self-allow { defaults { ospf:any tcp:161 tcp:22 tcp:4353 tcp:443 tcp:53 udp:1026 udp:161 udp:4353 udp:520 udp:53 } } net stp /Common/cist { trunks { PO42 { external-path-cost 200000 internal-path-cost 200000 } } © 2014 Cisco | F5. All rights reserved. Page 37 vlans { /Common/external /Common/internal } } net stp-globals { config-name 00-01-D7-C7-1C-40 } net trunk PO42 { interfaces { 2/2.3 2/2.4 } lacp enabled } net vlan /Common/external { interfaces { PO42 { tagged } } tag 90 } net vlan /Common/internal { interfaces { PO42 { tagged } } tag 80 } net fdb vlan /Common/external { } net fdb vlan /Common/internal { } net ipsec ike-daemon /Common/ikedaemon { } security firewall port-list /Common/_sys_self_allow_tcp_defaults { ports { 22 { } 53 { } 161 { } 443 { } 1029-1043 { } 4353 { } } } security firewall port-list /Common/_sys_self_allow_udp_defaults { ports { © 2014 Cisco | F5. All rights reserved. Page 38 53 { } 161 { } 520 { } 1026 { } 4353 { } } } security firewall rule-list /Common/_sys_self_allow_all { rules { _sys_allow_all { action accept } } } security firewall rule-list /Common/_sys_self_allow_defaults { rules { _sys_allow_tcp_defaults { action accept ip-protocol tcp destination { port-lists { /Common/_sys_self_allow_tcp_defaults } } } _sys_allow_udp_defaults { action accept ip-protocol udp destination { port-lists { /Common/_sys_self_allow_udp_defaults } } } _sys_allow_ospf_defaults { action accept ip-protocol ospf } } } security firewall rule-list /Common/_sys_self_allow_management { rules { _sys_allow_ssh { action accept ip-protocol tcp destination { © 2014 Cisco | F5. All rights reserved. Page 39 ports { 22 { } } } } _sys_allow_web { action accept ip-protocol tcp destination { ports { 443 { } } } } } } sys cluster default { address 172.23.102.42/23 members { 1 { } 2 { } 3 { } 4 { } } min-up-members 1 min-up-members-enabled yes } sys db gtm.peerinfototalgtms { value "0" } sys db provision.extramb { value "0" } sys db provision.tomcat.extramb { value "0" } sys db rule.validation { value "strict" } sys db statemirror.clustermirroring { value "between" } sys db tm.allowmulticastl2destinationtraffic { value "disable" } sys db tm.tcpallowinsecurerst { © 2014 Cisco | F5. All rights reserved. Page 40 value "disable" } sys db tmm.classallocatemetadata { value "enable" } sys db tmm.coredump { value "enable" } sys db tmm.gradualfileloadadjust { value "enable" } sys db tmm.lb.wlcoffset { value "disable" } sys db tmm.verbose { value "disable" } sys db tmm.verbosecmp { value "disable" } sys feature-module cgnat { disabled } sys folder / { device-group /Common/device-group-failover-fc99d0cbc202 hidden false inherited-devicegroup false inherited-traffic-group false traffic-group /Common/traffic-group-1 } sys folder /Common { device-group /Common/device-group-failover-fc99d0cbc202 hidden false inherited-devicegroup true inherited-traffic-group true traffic-group /Common/traffic-group-1 } sys global-settings { gui-setup disabled hostname bigip2.f5.local } sys management-dhcp /Common/sys-mgmt-dhcp-config { } sys management-route /Common/default { description configured-statically gateway 172.23.102.1 network default © 2014 Cisco | F5. All rights reserved. Page 41 } sys provision ltm { level nominal } sys snmp { agent-addresses { tcp6:161 udp6:161 } communities { /Common/comm-public { community-name public source default } } disk-monitors { /Common/root { minspace 2000 path / } /Common/var { minspace 10000 path /var } } process-monitors { /Common/bigd { process bigd } /Common/chmand { process chmand } /Common/httpd { max-processes infinity process httpd } /Common/mcpd { process mcpd } /Common/sod { process sod } /Common/tmm { max-processes infinity process tmm } } } sys sflow global-settings http { } © 2014 Cisco | F5. All rights reserved. Page 42 sys sflow global-settings vlan { } wom deduplication { disabled } wom endpoint-discovery { } Reference Cisco Nexus 9000 NX-OS mode best practice: http://www.cisco.com/c/en/us/products/collateral/switches/nexus-9000-series-switches/guide-c07-730115.html. F5 Local Traffic Manager 11.4.1 implementations: http://support.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/ltm-implementations-11-4-0.html. Disclaimer ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, "DESIGNS") IN THIS MANUAL ARE PRESENTED "AS IS," WITH ALL FAULTS. CISCO AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THE DESIGNS, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE DESIGNS ARE SUBJECT TO CHANGE WITHOUT NOTICE. USERS ARE SOLELY RESPONSIBLE FOR THEIR APPLICATION OF THE DESIGNS. THE DESIGNS DO NOT CONSTITUTE THE TECHNICAL OR OTHER PROFESSIONAL ADVICE OF CISCO, ITS SUPPLIERS OR PARTNERS. USERS SHOULD CONSULT THEIR OWN TECHNICAL ADVISORS BEFORE IMPLEMENTING THE DESIGNS. RESULTS MAY VARY DEPENDING ON FACTORS NOT TESTED BY CISCO. © 2014 Cisco | F5. All rights reserved. Page 43 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) F5 (NASDAQ: FFIV) provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, and software defined networking (SDN) deployments to successfully deliver applications to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and data center orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world's largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends. For more information, go to f5.com. C22-732522-00 © 2014 Cisco | F5. All rights reserved. 08/14 Page 44