Implementing Cisco Nexus 9000 Series NX-OS Mode with F5 Manager

Implementing Cisco Nexus 9000
Series NX-OS Mode with F5
Networks’ BIG-IP Local Traffic
Manager
Building Architectures to Solve Business Problems
© 2014 Cisco | F5. All rights reserved.
Page 1
Contents
Introduction ............................................................................................................................................... 3
Audience ................................................................................................................................................... 3
Document Objectives ................................................................................................................................ 3
Cisco Nexus 9000 Overview..................................................................................................................... 3
Cisco Nexus 9000 Advantages ................................................................................................................. 5
F5 Networks BIG-IP LTM Overview.......................................................................................................... 6
LTM Advantages ..................................................................................................................................... 10
Cisco Nexus 9000 + F5 LTM Design Options ........................................................................................ 10
Validation Approach ................................................................................................................................ 12
Nexus 9000 and F5 BIG-IP Integration .................................................................................................. 13
F5 BIG-IP Integration Overview ......................................................................................................... 13
Hierarchical Topology with F5 BIG-IP ................................................................................................ 13
Traffic Flow Model .............................................................................................................................. 13
Logical Model ..................................................................................................................................... 14
Validation Specifics ................................................................................................................................. 15
Table 1 outlines validated hardware and software. ............................................................................ 15
Topology ............................................................................................................................................. 16
Validation Results ............................................................................................................................... 16
1.1.1 Network High-Availability Validation: Disable vPC Links....................................................................... 16
1.1.2 Validate Layer 4 SLB Round-Robin Algorithm on Port 80 and 443 ....................................................... 17
1.1.3 Validate the Layer 4 SLB Least Connection Algorithm on Port 80 ........................................................ 17
1.1.4 Validate the Layer 4 SLB Source Address Persistence ........................................................................ 18
1.1.5 Validate the Layer 7 SLB Round-Robin Algorithm on Port 80 ............................................................... 18
1.1.6 Validate Health Monitoring by Removing Real Servers ........................................................................ 19
1.1.7 High-Availability Validation: Disable the Server Inside the Pool ............................................................ 20
1.1.8 High-Availability Validation: F5 BIG-IP LTM Switchover with Mirroring Enabled ................................... 20
Appendix A - Configurations Example .................................................................................................... 21
Nexus 9508-1 ..................................................................................................................................... 21
Nexus 9508-2 ..................................................................................................................................... 23
Nexus 9396-1 ..................................................................................................................................... 26
Nexus 9396-2 ..................................................................................................................................... 27
F5 BIG-IP LTM ................................................................................................................................... 29
Reference ............................................................................................................................................... 43
Disclaimer ............................................................................................................................................... 43
© 2014 Cisco | F5. All rights reserved.
Page 2
Introduction
®
This design guide provides guidelines for implementing Cisco Nexus 9000 Series NX-OS mode with F5
Networks’ BIG-IP Local Traffic Manager (LTM) in order to provide application delivery services.
®
The Cisco Nexus 9000 product family is designed to meet both current and emerging needs for multiple stages
of network transformation. By providing two modes of operation, Nexus 9000 Series Switches can be used in NXOS mode for traditional three-tier architectures, spine-leaf (CLOS) architectures, or first-generation softwaredefined networking (SDN) solutions. In Cisco Application Centric Infrastructure (ACI) mode, the Nexus 9000 offers
an industry-leading architecture for the next generation of data center networking. ACI provides advanced
capabilities and an operational model focused on the application to propel business forward.
F5 Networks’ BIG-IP Local Traffic Manager (LTM) delivers applications to users in a reliable, secure, and
optimized way. BIG-IP LTM provides extensive and flexible application services with the programmability capable
of managing physical, virtual, and cloud infrastructure. BIG-IP LTM offers the power to simplify, automate, and
customize applications faster and more predictably.
Audience
This document is intended for, but not limited to, system architects, network design engineers, systems
engineers, field consultants, advanced services specialists, and customers who want to understand how to deploy
F5 BIG-IP LTM into Cisco Nexus 9000 Series Switches in NX-OS mode for Cisco customers.
Document Objectives
This document is focused on deploying F5 BIG-IP LTM within a traditional aggregation or access data center
design utilizing the latest Cisco Nexus 9000 Series Family of modular and fixed-ports switches.
This design incorporates both physical and virtual edition F5 BIG-IP LTM devices. The design uses BIG-IP
VIPRION 2400 equipment with a 40-Gigabit B2250 blade connecting to the aggregation layer. The LTM virtual
editions were used at the access layer and used 1-Gbps licenses running on VMware vSphere.
This document is focused on specific attributes of the Cisco Nexus 9000 Series switching platform and its impact
on data center design. It is not intended to introduce the reader to basic Cisco data center design best practices,
but to build upon these well-documented concepts. The prerequisite Cisco data center design knowledge can be
found at the following URLs:
Cisco Data Center Solutions: http://www.cisco.com/go/dc.
Cisco Nexus 9000 Series Switches: http://www.cisco.com/c/en/us/products/switches/nexus-9000-seriesswitches/index.html.
Cisco Design Zone for Data Center:
http://www.cisco.com/en/US/netsol/ns743/networking_solutions_program_home.html.
Cisco Nexus 9000 Overview
Cisco Nexus 9000 Series Switches (Figure 1) are the next generation of data center switching infrastructure. In
Cisco NX-OS Software mode, the Cisco Nexus 9000 Series addresses the new challenges of current
infrastructure designs, while building on first-generation SDN solutions and providing a path to Cisco ACI. In
Cisco ACI mode, Cisco Nexus 9000 Series Switches provide a powerful combination of hardware and software
custom-developed for a powerfully robust and comprehensive solution.
© 2014 Cisco | F5. All rights reserved.
Page 3
Figure 1:
Cisco Nexus 9000 Series Switches
Cisco NX-OS Mode
The Cisco NX-OS mode of the Cisco Nexus 9000 Series provides important customer benefits, including:

Price - industry-leading price per port for 10- and 40-Gbps density systems

Performance - industry-leading performance with full line-rate nonblocking 40-Gbps performance

Port density - leading port density, with 288 ports of 40-Gbps connectivity per 8-slot chassis

Programmability - leading suite of programmability features to support emerging networking models,
including first-generation SDN, automation, and development and operations (DevOps) solutions

Power - currently the industry’s most efficient chassis in its class, consuming up to 15 percent less power
per port than competing solutions
In addition to these benefits, the Cisco Nexus 9000 Series in Cisco NX-OS mode offers these major advantages:

Best-in-class platform for migration from 1 Gbps to 10 Gbps

Best-in-class platform for migration from 10 Gbps to 40 Gbps

Optimal platform for replacement of traditional Cisco Catalyst 6000 Series Switches in the data center,
with a solution that contains a smaller footprint, lower power draw, and 10- and 40-Gbps ports, all with
equal copper port density

Designed from the foundation to enable and accelerate Cisco ACI
®
The portfolio consists of a broad set of hardware components, with more scheduled for release this year. The
current offerings are listed below.
Modular chassis options:

Cisco Nexus 9504 Switch
– Four payload slots
– Up to 576 full line-rate 1- and 10-Gbps ports
– Up to 144 full line-rate 40-Gbps ports

Cisco Nexus 9508 Switch
– Eight payload slots
– Up to 1152 full line-rate 1- and 10-Gbps ports
– Up to 288 full line-rate 40-Gbps ports
© 2014 Cisco | F5. All rights reserved.
Page 4

Cisco Nexus 9516 Switch
– 16 payload slots
– Up to 2304 full line-rate 1- and 10-Gbps ports
– Up to 576 full line-rate 40-Gbps ports
Fixed-switch options:

Cisco Nexus 9396PX Switch
– 48 ports of 1- and 10-Gbps fiber enhanced Small Form-Factor Pluggable Plus (SFP+)
– 12 ports of 40-Gbps fiber Quad SFP (QSFP)

Cisco Nexus 9396TX Switch
– 48 ports of 1- and 10-Gbps fiber SFP+
– 12 ports of 40-Gbps fiber QSFP

Cisco Nexus 93128TX Switch
– 96 ports of 1- and 10-Gbps copper RJ-45
– Eight ports of 40-Gbps fiber QSFP
All of these benefits are enhanced by innovative Cisco 40-Gbps bidirectional (BiDi) optics. These standardsbased QSFP optics provide 40-Gbps speeds on existing 10-Gbps infrastructure at approximately the same cost
as current 10-Gbps optics. These optics are an exclusive Cisco option to help increase adoption of 40-Gbps
solutions.
Cisco Nexus 9000 Advantages
Cisco Nexus 9000 Series Switches offer both modular and fixed 10/40/100 Gigabit Ethernet switch configurations,
including high-density 1/10 Gb to servers; 40 Gb to network; and 100 Gb in future releases. Design flexibility with
traditional two-tier spine/leaf, as well as three-tier core/aggregation/access design is also available.
ACI Support

Designed to support the Cisco next-generation data center based on an application-centric strategy

Designed to help enable application deployment, simplicity, agility, and flexibility
Programmability

An intelligent API manages the switch through remote-procedure calls (JavaScript Object Notation or
XML) over HTTP or HTTPS

A Linux shell access and container environment is used to customize management and monitoring
Scalability

Up to 60 Tbps of nonblocking performance with less than five-microsecond latency

Up to 2304 10 Gbps or 576 40 Gbps non-blocking layer 2 and layer 3 Ethernet ports

Wire-speed Virtual Extensible LAN (VXLAN) gateway, bridging, and routing support
© 2014 Cisco | F5. All rights reserved.
Page 5
High Availability

Full Cisco In-Service Software Upgrade (ISSU) and patching without any interruption in operation

Mix of third-party and Cisco application-specific integrated circuits (ASICs) for improved reliability and
performance

Virtual port channel (vPC_ and VXLAN support
Energy Efficiency

Chassis design without a midplane to optimize airflow and reduce energy requirements

Optimized design with fewer ASICs, resulting in lower energy use

Efficient power supplies that are rated at 80 Plus Platinum
Investment Protection

Cisco 40 Gb BiDi transceiver for reuse of existing 10 Gigabit Ethernet cabling plant for 40 Gigabit
Ethernet

Switches designed to support future ASIC generations

Support for Cisco Nexus 2000 Series Fabric Extenders in both NX-OS and ACI mode
F5 Networks BIG-IP LTM Overview
BIG-IP Local Traffic Manager (LTM) turns the network into an agile infrastructure for application delivery. It is a full
proxy between users and application servers, creating a layer of abstraction to secure, optimize, and load-balance
application traffic. This gives the control to add servers easily, eliminate downtime, improve application
performance, and meet the security requirements.
Rapid Application Deployment and Optimization
BIG-IP LTM includes iApps, a powerful solution that enables managing application services rather than individual
devices and objects. F5 iApps Templates (Figure 2) are a powerful feature of the BIG-IP system that can help
deploying faster with fewer configuration mistakes.
Unify, simplify, and control the entire application delivery network with a contextual view of the application
services that support the business needs.
© 2014 Cisco | F5. All rights reserved.
Page 6
Figure 2:
iApp Templates
Application Visibility and Monitoring
More efficient troubleshooting, capacity planning, performance tuning, and optimization can be achieved by
monitoring exactly how an application is performing for real users based on application response time, network
conditions, and user context. F5 Analytics (Figure 3) captures application-specific statistics reported at different
levels of the service, such as URL, throughput, and server latency with views per virtual servers, pools, and
nodes. BIG-IP LTM makes it simple to integrate with existing tools using industry standards such as sFlow,
Simple Network Management Protocol (SNMP), and syslog.
© 2014 Cisco | F5. All rights reserved.
Page 7
Figure 3:
F5 Analytics
F5 Analytics gives IT a clear view into the health of the network and the application.
Uptime, response time, and even usage spikes are available at a glance.
Options enable operators navigate into detailed views to get to the source of application performance problems
quickly.
Load Balancing
BIG-IP LTM intelligently adapts to the changing demands of the applications and ensures their consistent
availability, even when servers fail.
Active application health monitoring alerts when performance is threatened.
Transaction assurance retries connections to different servers in the event of a failure.
Secure Sockets Layer (SSL) Acceleration and Offload
BIG-IP LTM uses specialized hardware to offload SSL encryption from data center servers. By accelerating
encryption and freeing up server resources, BIG-IP LTM improves application performance.
SSL acceleration: F5 offers leading SSL performance for transactional and bulk SSL encryption.
SSL proxy and SSL forward proxy: Get control and visibility into all aspects of encrypted application traffic.
Internet Content Adaptation Protocol (ICAP) services: F5 offers the most flexible ICAP solution for content
adaption, with support for integration with services such as video and image optimization, virus scanning, and
content filtering via F5 iRules.
© 2014 Cisco | F5. All rights reserved.
Page 8
Network hardware security module (HSM): Gets FIPS 140-2 level 2 and 3 support on all BIG-IP hardware and
virtual editions.
Easy Protocol Implementation
BIG-IP LTM acts as a full proxy, sitting between servers and users, which makes implementing new protocols as
easy as flipping a switch.
SPDY: Turn on SPDY support and choose which servers will support it.
IPv6: Turn on IPv6 support to service IPv6 clients with IPv6 while still servicing IPv4 requests with IPv4.
Protocol Optimization
Improve application performance while reducing network traffic.
OneConnect: Increase server capacity by up to 60 percent.
F5 Fast Cache: Prevent servers from having to handle requests for identical content.
TCP connection queuing: Hold overload connections in a queue.
Compression: Use fewer bytes to transmit data.
Custom Control
iRules is a data-plane scripting language which enables a broad range of functionality to be programmatically
inserted into the network. Customers routinely implement security mitigation rules, support new protocols, and fix
application-related errors in real time. The iRules scripting language lets the user intercept, parse, modify, and
route application traffic based on specific business needs.
Virtual and Cloud Flexibility
BIG-IP LTM Virtual Edition delivers virtual environment and cloud deployment options with exceptional flexibility
across all major virtualization platforms, including:

VMware vSphere

Citrix XenServer

Microsoft Hyper-V

KVM
Industry-Leading Performance
BIG-IP LTM delivers superior performance and scalability, including:

Maximum layer 4 connections per second - 10 million

Maximum layer 7 requests per second - 20 million

Maximum layer 4 throughput - 640 Gbps

Maximum SSL transactions per second - 240,000

Maximum hardware distributed denial-of-service (DDoS) SYN connections per second - 640 million

Maximum virtual edition throughput - 10 Gbps
© 2014 Cisco | F5. All rights reserved.
Page 9
LTM Advantages
Ensuring High Availability for Application Services
LTM provides fault tolerance at the application layer (server downtime) as well as at the BIG-IP layer (failure).
Application traffic remains uninterrupted despite either failure.
This guide enables the following capabilities:

Loss of an app server does not interrupt delivery of client traffic

Loss of an LTM does not interrupt delivery of client traffic

Stateful mirroring ensures that session information is sustained in the event of LTM failure

Application traffic is statefully maintained between servers
Optimizing Application Performance
Deploying more servers doesn’t guarantee better performance. What matters is that you reserve server capacity
for the right activities. LTM helps extend server capacity and reduce overall bandwidth usage.
This guide enables the following capabilities:

Optimize traffic flows by taking full advantage of LTM's full proxy. Separate stacks between F5/client and
F5/app enables protocol optimization, specialized connection profiles, and so on.

Offload the burden of encryption and decryption from your web servers by using SSL acceleration on F5
ASIC hardware.

Reduce the volume of traffic to users by using intelligent compression.

Eliminate unnecessary data transfer by using features such as dynamic caching.
Securing Applications
Applications require a wide variety of security services. LTM provides defense in depth across several layers. In
addition, F5 provides other modules that run on top of LTM for additional security services, including web
application firewalling, data center firewalling, secure access, authentication/authorization, and DDoS attack
prevention. However, these are outside the scope of this guide.
This guide enables the following capabilities:

Default deny/full firewall

Centralized SSL certificate management

iRules inspection

DDoS protection within LTM to prevent SynFlooding - vulnerability resiliency
Cisco Nexus 9000 + F5 LTM Design Options
Cisco Nexus 9000 Series Switches use a network appliance model in order to insert the F5 BIG-IP LTM module
into its data center architecture. This document provides a validated sample topology that uses F5 VIPRION
C2400 chassis equipment with a 40-Gb B2250 blade to configure with the LTM module to provide application
delivery services in an active/standby configuration. The B2250 is chosen in this validation effort to demonstrate
the 40-Gb compatibility between Nexus 9000 and BIG-IP. If the 10-Gb module is used in the Nexus 9000, any
BIG-IP model that supports 10 Gigabits will work with the Nexus 9000 design.
© 2014 Cisco | F5. All rights reserved.
Page 10
In the validation effort for this document, 1-ARM mode application delivery services were the primary focus of
analysis, with redundant F5 VIPRION units configured with device-level failover for high availability. Traffic
streams were routed through the F5 LTM directly to the server farm.
An illustration of the physical topology, including F5 VIPIRION 2400, is shown in Figure 4. This is a 1-ARM mode
topology with vPC configured from the Nexus 9500 Switch to the F5 VIPRION and double-sided vPC to the Nexus
9300 access layer. The Nexus 9300 vPC to the host provides high availability.
Figure 4:
Cisco Nexus 9000 SLB Services with F5 BIG-IP in 1-ARM Mode
A 2-ARM (passthrough) mode design is also supported, and a reference topology is shown in Figure 5. In this
design, BIG-IP is also configured in a high-availability (active/standby) pair. Two separate port channels - one for
external VLAN and one for internal VLAN - are connected to the BIG-IP, as illustrated in the diagram where BLUE
stands for external and ORANGE for internal. In this scenario, all traffic must go through the BIG-IP, where BIG-IP
can also act as a firewall device. Both external and internal Port-Channels are vPC to the Nexus 9500 Switch for
high availability.
© 2014 Cisco | F5. All rights reserved.
Page 11
Figure 5:
Cisco Nexus 9000 SLB Services with F5 BIG-IP in 2-ARM Mode
Virtual Editions (VE) of F5 BIG-IP can also integrate into the Nexus 9000 design. BIG-IP VE products offer the
same code, application delivery services, and features as physical BIG-IP hardware. BIG-IP VE offers a wide
range of throughput options support on various hypervisors. For details refer to BIG-IP VE data sheet:
http://www.f5.com/pdf/products/big-ip-virtual-editions-datasheet.pdf.
Validation Approach
As customers introduce Nexus 9000 Series Switches into their networks, it is important that these devices interact
as expected with existing data center switching platforms such as the Cisco Nexus 7000 and 5000 Series
Switches. Interoperability and protocol compliance issues are regression-tested before products are brought to
market. The topology validation incorporates an end-to-end solution by placing the products in a hierarchical data
center network topology and analyzing how that topology converges as various link and device faults are induced.
This approach not only further validates the protocol interoperability between devices, but also ensures that the
equipment deployed provides a highly available, redundant network architecture.
Figure 6 shows examples of possible failure cases in a redundant data center hierarchical topology. Each red X
represents a device or link failure case that has been validated. As each device or link in the primary data path
down one side of the topology is forced into a simulated failure, the purpose of the fully redundant network
topology is that traffic can converge around the failure. Cisco design validation testing simulated failures in each
of the devices and links individually, and verified that the configuration examples being provided allow the network
to properly converge in a timely manner.
© 2014 Cisco | F5. All rights reserved.
Page 12
Figure 6:
High-Availability Recovery Analysis Cases
Nexus 9000 and F5 BIG-IP Integration
F5 BIG-IP Integration Overview
Integration of an application delivery controller (ADC), such as F5 BIG-IP LTM, is a critical component of
designing the data center architecture. The aggregation layer is a common location for integration of SLB services
since it typically provides the boundary between layer 2 and layer 3 in the data center, and allows service devices
to be shared across multiple switches in the access layer. As mentioned in the section, “Cisco Nexus 9000 + F5
LTM Insertion,” F5 BIG-IP uses an appliance model for integrating SLB service with a Nexus 9000 NX-OS modebased aggregation layer. The next sections provide detail behind this validation effort.
Hierarchical Topology with F5 BIG-IP
The topology used for validation of F5 BIG-IP integration is based on the physical topology shown in Figure 4 and
described in the section, ”Cisco Nexus 9000 Plus F5 LTM Insertion.” The following sections detail the traffic flows
and logical configuration for this topology.
Traffic Flow Model
Connecting the F5 BIG-IP directly to the aggregation Nexus 9000 Switches allows the centralized application
delivery services to be used across multiple access layer switches and server farm tiers. An illustration of the data
flows is shown in Figure 7.
© 2014 Cisco | F5. All rights reserved.
Page 13
Figure 7:
Cisco Nexus 9000 Plus F5 BIG-IP Traffic Flow
Logical Model
The integration of the F5 BIG-IP with the Nexus 9000 NX-OS mode aggregation traffic flows are segregated using
the multiple VLAN interfaces. An illustration of the VLAN allocation supporting these flows is provided in Figure 8.
Client machines across the core of the network can access server farm VLANs and traffic is directed through the
appropriate services based on the server subnet location.
Figure 8:
Logical Model
© 2014 Cisco | F5. All rights reserved.
Page 14
Following is a brief analysis of the function of each of the VLANs used in the logical design.

Aggregation default VRF to one-armed F5 BIG-IP - This link is shown as VLAN 90 in Figure 7. This is
both the ingress and egress interface for traffic being serviced by the F5 BIG-IP. The F5 BIG-IP LTM
performs source Network Address Translation (NAT), which changes the source address of packets that it
is forwarding to the server farm. In this way, the return packets must also pass through the F5 BIG-IP
LTM to have their destination addresses translated back to that of the original requesting client node. This
VLAN is extended across the 40-Gb connections between the aggregation switches and the F5 BIG-IP
devices, and the port channel between the two aggregation switches.

F5 BIG-IP fault tolerance link - This link is shown as VLAN 81 in Figure 7, and is extended across the
logical link between the two F5 BIG-IP chassis. This link carries hello traffic and allows configuration
synchronization between the two F5 BIG-IPs.

F5 BIG-IP chassis to server farm VLANs - These VLANs are referenced as the "server farm VLANs," and
are shown in Figure 7. These VLANs are extended across the dual-homed links to the aggregation layer,
the port channel between aggregation switches, and also down into the access layer to support server
connectivity.
Validation Specifics
Table 1 outlines validated hardware and software.
Table 1:
Validated Hardware and Software
Device
Software Version
Quantity
Cisco Nexus 9508 Switch
NX-OS Release 6.1(2)I2(2)
2
Cisco Nexus 9396 Switch
NX-OS Release 6.1(2)I2(2)
2
F5 VIPRION 2400 Chassis + B2250 40G Blade
11.4.1
2
40 Gb QSFP optics
Vendor approved
As required
Blades and rack servers
ESXi 5.1
2
© 2014 Cisco | F5. All rights reserved.
Page 15
Topology
Figure 9 illustrates the proper topology to use.
Figure 9:
Validation of Physical Topology
In the topology shown in Figure 9, the F5 Big-IP LTM devices are connected to the spine switches, with one
switch acting as active and other as standby. LTMs are connected through vPC to the Nexus 9000 spine switch
using the bundling Link Aggregation Control Protocol (LACP). Static routes are configured to redirect traffic from
the source (client) to application servers through the F5 BIG-IP LTM.
If BIG-IP VE (Virtual Edition) is being used, then servers running a hypervisor will be connected to the leaf
switches to carry the traffic in different VLANs.
Leaf and spines are connected in vPC configuration, and allow active-active uplink from leaf to spine.
Validation Results
1.1.1 Network High-Availability Validation: Disable vPC Links

Shut down the vPC peer-link only, then “no shut” vPC peer link
– The test result validates vPC secondary shutdown if all its vPC member ports. There is momentary
loss in traffic, and total bandwidth is down to 50 percent.

Shut down one of the vPC member links
– The test result validates no loss in traffic as all traffic shifts to the other vPC peer.
© 2014 Cisco | F5. All rights reserved.
Page 16
1.1.2 Validate Layer 4 SLB Round-Robin Algorithm on Port 80 and 443

Establish 1000 HTTP (port 80) sessions from the client IP address to VIP

Establish 1000 HTTPS (port 443) sessions from the client IP address to VIP
– The test result validates the F5 LTM layer 4 LSB round-robin algorithm, where 50 percent of the traffic
goes to server 1 and 50 percent of the traffic goes to server 2.
1.1.3 Validate the Layer 4 SLB Least Connection Algorithm on Port 80

Disable web-103 (server 2) and generate 20 sessions from the client IP address to VIP

Server web-102 (server 1) has 20 current sessions; enable web-103 and generate 10 new sessions
– The test result validates the F5 LTM L4 LSB least connection algorithm, where server 2 will serve the
new sessions while server 1 has more connections.
© 2014 Cisco | F5. All rights reserved.
Page 17
1.1.4 Validate the Layer 4 SLB Source Address Persistence

Configure the source address persistence profile, and establish 1000 HTTP (port 80) sessions from the
same client IP address to VIP
– The test result validates the persistence profile, where the same source address session goes to the
same server.
1.1.5 Validate the Layer 7 SLB Round-Robin Algorithm on Port 80

Configure the virtual server based on the layer 7 SLB profile, and establish 1000 HTTP (port 80) sessions
from the client IP address to VIP
– The test result validates the layer 7 SLB round-robin algorithm, where 50 percent of the traffic goes to
server 1 and 50 percent of the traffic goes to server 2.
© 2014 Cisco | F5. All rights reserved.
Page 18
1.1.6 Validate Health Monitoring by Removing Real Servers

Health monitoring is set up for server load-balancing sessions, so that real servers that are not in service
are not used, and can be added back as needed. While load balancing is in progress, a real server is shut
down.

Application Delivery Controller (ADC) detects this and removes servers from the real server list.

There is momentary loss of existing connections and clients will have to open new connections until this
real server is removed from service.

While load balancing is in progress a real server is added, and ADC detects this and adds to support the
incoming load.
– The test result validates that the F5 BIG-IP LTM detects the server is down and removes the offline
server from the pool. It also detects when an offline server from the pool comes online and starts load
balancing traffic to the online server.
Both servers are online
Detect server 1 offline
© 2014 Cisco | F5. All rights reserved.
Page 19
All new connections route to server 2
Detect server 1 back online and start taking new requests
1.1.7 High-Availability Validation: Disable the Server Inside the Pool

Disable server 1 in the pool
– The test results validate that all traffic gets redirected to server 2 within the pool.
1.1.8 High-Availability Validation: F5 BIG-IP LTM Switchover with Mirroring Enabled

Force the active F5 BIG-IP LTM to stand by with mirroring enabled
– The test result validates after a momentary loss; the client can re-establish the existing session with
the newly active F5 BIG-IP and traffic resumes.
© 2014 Cisco | F5. All rights reserved.
Page 20
Appendix A - Configurations Example
Nexus 9508-1
version 6.1(2)I2(3)
switchname tme-sol-1-n9508-1
vdc tme-sol-1-n9508-1 id 1
allocate interface Ethernet1/1-36
limit-resource vlan minimum 16 maximum 4094
limit-resource vrf minimum 2 maximum 4096
limit-resource port-channel minimum 0 maximum 768
limit-resource u4route-mem minimum 248 maximum 248
limit-resource u6route-mem minimum 96 maximum 96
limit-resource m4route-mem minimum 58 maximum 58
limit-resource m6route-mem minimum 8 maximum 8
feature telnet
cfs eth distribute
feature lacp
feature vpc
feature lldp
username admin password 5 $1$ScfGdetY$0ynGuxo6e3Ei1krItPMsc/
role network-admin
no password strength-check
ip domain-lookup
service unsupported-transceiver
copp profile strict
snmp-server user admin network-admin auth md5 0x6db8c971332f4ee859c22879d4298046 priv
0x6db8c971332f4ee859c22879d4298046 localizedkey
rmon event 1 log trap public description FATAL(1) owner PMON@FATAL
rmon event 2 log trap public description CRITICAL(2) owner PMON@CRITICAL
rmon event 3 log trap public description ERROR(3) owner PMON@ERROR
rmon event 4 log trap public description WARNING(4) owner PMON@WARNING
rmon event 5 log trap public description INFORMATION(5) owner PMON@INFO
vlan 1,80-90
vrf context management
© 2014 Cisco | F5. All rights reserved.
Page 21
ip route 0.0.0.0/0 172.23.102.1
hardware access-list tcam region racl 256
hardware access-list tcam region qos 256
vpc domain 10
peer-keepalive destination 172.23.102.32 source 172.23.102.31
interface port-channel41
switchport
switchport mode trunk
vpc 41
interface port-channel42
switchport
switchport mode trunk
vpc 42
interface port-channel80
switchport
switchport mode trunk
spanning-tree port type network
vpc peer-link
interface port-channel100
switchport
switchport mode trunk
speed 40000
vpc 100
interface Ethernet1/1
switchport
switchport mode trunk
speed 40000
channel-group 100 mode active
no shutdown
interface Ethernet1/2
switchport
switchport mode trunk
speed 40000
channel-group 100 mode active
no shutdown
interface Ethernet1/11
switchport
switchport mode trunk
© 2014 Cisco | F5. All rights reserved.
Page 22
channel-group 42 mode active
no shutdown
interface Ethernet1/12
switchport
switchport mode trunk
channel-group 41 mode active
no shutdown
interface Ethernet1/35
switchport
switchport mode trunk
channel-group 80 mode active
no shutdown
interface Ethernet1/36
switchport
switchport mode trunk
channel-group 80 mode active
no shutdown
interface mgmt0
vrf member management
ip address 172.23.102.31/23
line console
line vty
boot nxos bootflash:/n9000-dk9.6.1.2.I2.3.bin sup-1
Nexus 9508-2
version 6.1(2)I2(2)
switchname tme-sol-1-n9508-2
vdc tme-sol-1-n9508-2 id 1
allocate interface Ethernet3/1-36
limit-resource vlan minimum 16 maximum 4094
limit-resource vrf minimum 2 maximum 4096
limit-resource port-channel minimum 0 maximum 768
limit-resource u4route-mem minimum 248 maximum 248
limit-resource u6route-mem minimum 96 maximum 96
limit-resource m4route-mem minimum 58 maximum 58
limit-resource m6route-mem minimum 8 maximum 8
feature telnet
cfs eth distribute
feature interface-vlan
feature lacp
feature vpc
© 2014 Cisco | F5. All rights reserved.
Page 23
username admin password 5 $1$DziXjTDu$htYqsaWkMB105.eAhXEqA.
role network-admin
no password strength-check
ip domain-lookup
ip name-server 172.21.157.5 use-vrf management
service unsupported-transceiver
copp profile strict
snmp-server user admin network-admin auth md5 0x5a4f3294c8bc84f4a34cc4ab58fbdde0 priv
0x5a4f3294c8bc84f4a34cc4ab58fbdde0 localizedkey
rmon event 1 log trap public description FATAL(1) owner PMON@FATAL
rmon event 2 log trap public description CRITICAL(2) owner PMON@CRITICAL
rmon event 3 log trap public description ERROR(3) owner PMON@ERROR
rmon event 4 log trap public description WARNING(4) owner PMON@WARNING
rmon event 5 log trap public description INFORMATION(5) owner PMON@INFO
vlan 1,80-90,300
vrf context management
ip route 0.0.0.0/0 172.23.102.1
vpc domain 10
peer-keepalive destination 172.23.102.31 source 172.23.102.32
interface Vlan1
interface port-channel41
switchport
switchport mode trunk
vpc 41
interface port-channel42
switchport
switchport mode trunk
vpc 42
interface port-channel80
switchport
switchport mode trunk
spanning-tree port type network
vpc peer-link
interface port-channel100
switchport
switchport mode trunk
speed 40000
vpc 100
© 2014 Cisco | F5. All rights reserved.
Page 24
interface Ethernet3/1
switchport
switchport mode trunk
speed 40000
channel-group 100 mode active
no shutdown
interface Ethernet3/2
switchport
switchport mode trunk
speed 40000
channel-group 100 mode active
no shutdown
interface Ethernet3/11
switchport
switchport mode trunk
channel-group 42 mode active
no shutdown
interface Ethernet3/12
switchport
switchport mode trunk
channel-group 41 mode active
no shutdown
interface Ethernet3/35
switchport
switchport mode trunk
channel-group 80 mode active
no shutdown
interface Ethernet3/36
switchport
switchport mode trunk
channel-group 80 mode active
no shutdown
interface mgmt0
vrf member management
ip address 172.23.102.32/23
line console
line vty
boot nxos bootflash:/n9000-dk9.6.1.2.I2.2.bin sup-1
boot nxos bootflash:/n9000-dk9.6.1.2.I2.2.bin sup-2
© 2014 Cisco | F5. All rights reserved.
Page 25
Nexus 9396-1
version 6.1(2)I2(2)
switchname tme-sol-1-n9396-1
vdc tme-sol-1-n9396-1 id 1
allocate interface Ethernet1/1-48
allocate interface Ethernet2/1-12
limit-resource vlan minimum 16 maximum 4094
limit-resource vrf minimum 2 maximum 4096
limit-resource port-channel minimum 0 maximum 768
limit-resource u4route-mem minimum 248 maximum 248
limit-resource u6route-mem minimum 96 maximum 96
limit-resource m4route-mem minimum 58 maximum 58
limit-resource m6route-mem minimum 8 maximum 8
feature telnet
cfs eth distribute
feature lacp
feature vpc
username admin password 5 $1$pQIH/Qpy$WNqhCY7x.lsFcEjmWFjtG1
role network-admin
no password strength-check
ip domain-lookup
copp profile strict
snmp-server user admin network-admin auth md5 0x722bc0810bd8131c0ebf163a5dcff8df priv
0x722bc0810bd8131c0ebf163a5dcff8df localizedkey
rmon event 1 log trap public description FATAL(1) owner PMON@FATAL
rmon event 2 log trap public description CRITICAL(2) owner PMON@CRITICAL
rmon event 3 log trap public description ERROR(3) owner PMON@ERROR
rmon event 4 log trap public description WARNING(4) owner PMON@WARNING
rmon event 5 log trap public description INFORMATION(5) owner PMON@INFO
vlan 1,80-90,300
vrf context management
ip route 0.0.0.0/0 172.23.102.1
vpc domain 11
role priority 32768
peer-keepalive destination 172.23.102.34 source 172.23.102.33
interface port-channel81
switchport mode trunk
spanning-tree port type network
vpc peer-link
interface port-channel101
switchport mode trunk
© 2014 Cisco | F5. All rights reserved.
Page 26
vpc 101
interface port-channel200
switchport mode trunk
vpc 200
interface port-channel201
switchport mode trunk
vpc 201
interface Ethernet1/1
switchport mode trunk
channel-group 200
interface Ethernet1/2
switchport mode trunk
channel-group 201
interface Ethernet1/31
switchport mode trunk
channel-group 81 mode active
interface Ethernet1/32
switchport mode trunk
channel-group 81 mode active
interface Ethernet2/1
switchport mode trunk
channel-group 101 mode active
interface Ethernet2/2
switchport mode trunk
channel-group 101 mode active
interface mgmt0
vrf member management
ip address 172.23.102.33/23
line console
line vty
Nexus 9396-2
version 6.1(2)I2(1)
hostname tme-sol-1-n9396-2
vdc tme-sol-1-n9396-2 id 1
allocate interface Ethernet1/1-48
allocate interface Ethernet2/1-12
© 2014 Cisco | F5. All rights reserved.
Page 27
limit-resource vlan minimum 16 maximum 4094
limit-resource vrf minimum 2 maximum 4096
limit-resource port-channel minimum 0 maximum 768
limit-resource u4route-mem minimum 248 maximum 248
limit-resource u6route-mem minimum 96 maximum 96
limit-resource m4route-mem minimum 58 maximum 58
limit-resource m6route-mem minimum 8 maximum 8
feature telnet
cfs eth distribute
feature lacp
feature vpc
username admin password 5 $1$nqocV2AK$iue5aOprA1moEfjIw1sGX0
role network-admin
no password strength-check
ip domain-lookup
ip name-server 172.21.157.5 use-vrf management
copp profile strict
snmp-server user admin network-admin auth md5 0xb32a8d8a7f1d7198ea6715996edc8290 priv
0xb32a8d8a7f1d7198ea6715996edc8290 localizedkey
rmon event 1 log trap public description FATAL(1) owner PMON@FATAL
rmon event 2 log trap public description CRITICAL(2) owner PMON@CRITICAL
rmon event 3 log trap public description ERROR(3) owner PMON@ERROR
rmon event 4 log trap public description WARNING(4) owner PMON@WARNING
rmon event 5 log trap public description INFORMATION(5) owner PMON@INFO
vlan 1,80-90,300
vrf context management
ip route 0.0.0.0/0 172.23.3.1
ip route 0.0.0.0/0 172.23.102.1
vpc domain 11
role priority 32769
peer-keepalive destination 172.23.102.33 source 172.23.102.34
interface port-channel81
switchport mode trunk
spanning-tree port type network
vpc peer-link
interface port-channel101
switchport mode trunk
vpc 101
interface port-channel200
switchport mode trunk
© 2014 Cisco | F5. All rights reserved.
Page 28
vpc 200
interface port-channel201
switchport mode trunk
vpc 201
interface Ethernet1/1
switchport mode trunk
channel-group 200
interface Ethernet1/2
switchport mode trunk
channel-group 201
interface Ethernet1/31
switchport mode trunk
channel-group 81 mode active
interface Ethernet1/32
switchport mode trunk
channel-group 81 mode active
interface Ethernet2/1
switchport mode trunk
channel-group 101 mode active
interface Ethernet2/2
switchport mode trunk
channel-group 101 mode active
interface mgmt0
vrf member management
ip address 172.23.102.34/23
line console
line vty
boot nxos bootflash:/n9000-dk9.6.1.2.I2.1.bin
F5 BIG-IP LTM
cli admin-partitions {
update-partition Common
}
apm client-packaging /Common/client-packaging { }
apm resource remote-desktop citrix-client-bundle /Common/default-citrix-client-bundle { }
auth user admin {
description "Admin User"
© 2014 Cisco | F5. All rights reserved.
Page 29
encrypted-password
"$6$iDQhuwTK$a6F8GTOUUYDSMyP1XKatq6HzIzmovW72Bd9kz/w3i24bqidieYLcuDZcbm1whunKHM/3RWa5joEw
g3oJRWFux1"
partition-access all
role admin
shell tmsh
}
auth user root {
description none
encrypted-password
"$6$oJrU6NKG$htStO2XRxJo2JumBdbiQqCCyxhwvNmInjxjUMIqHY.4Eslk3gV63mSZLJbkX1n2KAX/x2Rg4TSkp
VzxOHBAYk."
shell bash
}
cm cert /Common/dtca-bundle.crt {
cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtcabundle.crt_29745_3
checksum SHA1:1302:901ff2ebd6e3d2b17306c780fdaed4854c3c0080
revision 3
}
cm cert /Common/dtca.crt {
cache-path
/config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtca.crt_29741_2
checksum SHA1:1302:901ff2ebd6e3d2b17306c780fdaed4854c3c0080
revision 2
}
cm cert /Common/dtdi.crt {
cache-path
/config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtdi.crt_29737_2
checksum SHA1:1269:23b24df6de753974970ec7dec19303368473b773
revision 2
}
cm device /Common/bigip1.f5.local {
active-modules { "Best Bundle, C2200 / C2400 Platforms|T783746-1621305|SDN
Services|AFM, C2400|Acceleration Manager, C2400|ASM, Unlimited, VIPRION|DNS and GTM
(Unlimited), Viprion|Anti-Virus Checks|Base Endpoint Security Checks|Firewall
Checks|Machine Certificate Checks|Network Access|Protected Workspace|Secure Virtual
Keyboard|APM, Web Application|TPS SSL, Unlimited, C2400/C4400/C4480|App Tunnel|Remote
Desktop|DNS Rate Fallback, Unlimited|DNS Licensed Objects, Unlimited|DNS Rate Limit,
Unlimited QPS|GTM Rate Fallback, (UNLIMITED)|GTM Licensed Objects, Unlimited|GTM Rate,
Unlimited|Routing Bundle|PSM" "DNS-GTM, Rate Limited, VIPRION|K600758-9714257|DNS Rate
Fallback, 100|DNS Licensed Objects, 0|GTM Licensed Objects, 0|DNS Rate Limit, 100 QPS|GTM
Rate Fallback, 32|GTM Rate, 32|DNS Rate Fallback, Unlimited|DNS Licensed Objects,
Unlimited|DNS Rate Limit, Unlimited QPS|GTM Rate Fallback, (UNLIMITED)|GTM Licensed
Objects, Unlimited|GTM Rate, Unlimited|Routing Bundle" "LTM, Base, C2400|G8804572785738|IPV6 Gateway|Rate Shaping|Ram Cache|Cluster Multi-Processing|50 Mbps
Compression|SSL, 500 TPS Per Core|Performance Extreme, VPR|Routing Bundle|APM, Limited,
Viprion|AAM, Core|Client Authentication|Anti-Virus Checks|Base Endpoint Security
Checks|Firewall Checks|Machine Certificate Checks|Network Access|Protected
Workspace|Secure Virtual Keyboard|APM, Web Application|TPS SSL, Unlimited,
C2400/C4400/C4480|App Tunnel|Remote Desktop|Compression, Unlimited|PSM|DNS Rate Fallback,
Unlimited|DNS Licensed Objects, Unlimited|DNS Rate Limit, Unlimited QPS" }
base-mac 00:23:e9:9d:36:00
© 2014 Cisco | F5. All rights reserved.
Page 30
build 625.0
chassis-id chs407101s
chassis-type viprion
configsync-ip 10.1.80.41
edition "Hotfix HF1"
hostname bigip1.f5.local
management-ip 172.23.102.41
marketing-name "BIG-IP VPR-C2400"
multicast-ip any
optional-modules { "Acceleration Manager, C2400" "ADC, Security Bundle, C2400"
"Advanced LTM Protocols, Viprion" "AFM, C2400" "APM, Base, C2400" "APM, Max CCU, C2400"
"App Mode (TMSH Only, No Root/Bash)" "ASM, Bundle, VIPRION" "ASM, PSM to ASM Upgrade"
"ASM, Unlimited, VIPRION" "Better Bundle, C2200 / C2400 Platforms" "Better to Best
Bundle, C2200 / C2400 Platforms" "CGN, Viprion" "Client Authentication" "Compression,
Unlimited" "Concurrent Users" "DNS and GTM (1K QPS), Viprion" "DNS and GTM (Unlimited),
Viprion" "DNS Services, VPR" "EA Features" "External Interface and Network HSM" "FIX Low
Latency" GTM "IPI Subscription, 1Yr, C2400" "IPI Subscription, 3Yr, C2400" "MSM,
Unlimited Mailboxes" "PEM URL Filtering, Subscription, 1Yr, C2400" "PEM URL Filtering,
Subscription, 3Yr, C2400" "PEM, C2400" "PEM, Quota Management, C2X00" "PSM, Base" "SDN
Services" "SSL, Forward Proxy" "SWG Subscription, 1Yr, C2200/C2400" "SWG Subscription,
3Yr, C2200/C2400" "TPS SSL, Unlimited, C2400/C4400/C4480" "URL Filtering Subscription,
1Yr, C2200/C2400" "URL Filtering Subscription, 3Yr, C2200/C2400" "VCMP, 16 Guests" "VCMP,
Max Guests" "WBA, Bundle, C2400" }
platform-id A112
product BIG-IP
time-zone PDT
unicast-address {
{
effective-ip 10.1.80.41
effective-port 1026
ip 10.1.80.41
}
{
effective-port 1026
}
}
version 11.4.1
}
cm device /Common/bigip2.f5.local {
active-modules { "Best Bundle, C2200 / C2400 Platforms|M001120-5515609|SDN
Services|AFM, C2400|Acceleration Manager, C2400|ASM, Unlimited, VIPRION|DNS and GTM
(Unlimited), Viprion|Anti-Virus Checks|Base Endpoint Security Checks|Firewall
Checks|Machine Certificate Checks|Network Access|Protected Workspace|Secure Virtual
Keyboard|APM, Web Application|TPS SSL, Unlimited, C2400/C4400/C4480|App Tunnel|Remote
Desktop|DNS Rate Fallback, Unlimited|DNS Licensed Objects, Unlimited|DNS Rate Limit,
Unlimited QPS|GTM Rate Fallback, (UNLIMITED)|GTM Licensed Objects, Unlimited|GTM Rate,
Unlimited|Routing Bundle|PSM" "DNS-GTM, Rate Limited, VIPRION|Q082212-9739992|DNS Rate
Fallback, 100|DNS Licensed Objects, 0|GTM Licensed Objects, 0|DNS Rate Limit, 100 QPS|GTM
Rate Fallback, 32|GTM Rate, 32|DNS Rate Fallback, Unlimited|DNS Licensed Objects,
Unlimited|DNS Rate Limit, Unlimited QPS|GTM Rate Fallback, (UNLIMITED)|GTM Licensed
Objects, Unlimited|GTM Rate, Unlimited|Routing Bundle" "LTM, Base, C2400|R5660590312921|IPV6 Gateway|Rate Shaping|Ram Cache|Cluster Multi-Processing|50 Mbps
Compression|SSL, 500 TPS Per Core|Performance Extreme, VPR|Routing Bundle|APM, Limited,
© 2014 Cisco | F5. All rights reserved.
Page 31
Viprion|AAM, Core|Client Authentication|Anti-Virus Checks|Base Endpoint Security
Checks|Firewall Checks|Machine Certificate Checks|Network Access|Protected
Workspace|Secure Virtual Keyboard|APM, Web Application|TPS SSL, Unlimited,
C2400/C4400/C4480|App Tunnel|Remote Desktop|Compression, Unlimited|PSM|DNS Rate Fallback,
Unlimited|DNS Licensed Objects, Unlimited|DNS Rate Limit, Unlimited QPS" }
base-mac 00:23:e9:9d:f6:00
build 625.0
cert /Common/dtdi.crt
chassis-id chs407234s
chassis-type viprion
configsync-ip 10.1.80.42
edition "Hotfix HF1"
hostname bigip2.f5.local
key /Common/dtdi.key
management-ip 172.23.102.42
marketing-name "BIG-IP VPR-C2400"
multicast-ip any
optional-modules { "Acceleration Manager, C2400" "ADC, Security Bundle, C2400"
"Advanced LTM Protocols, Viprion" "AFM, C2400" "APM, Base, C2400" "APM, Max CCU, C2400"
"App Mode (TMSH Only, No Root/Bash)" "ASM, Bundle, VIPRION" "ASM, PSM to ASM Upgrade"
"ASM, Unlimited, VIPRION" "Better Bundle, C2200 / C2400 Platforms" "Better to Best
Bundle, C2200 / C2400 Platforms" "CGN, Viprion" "Client Authentication" "Compression,
Unlimited" "Concurrent Users" "DNS and GTM (1K QPS), Viprion" "DNS and GTM (Unlimited),
Viprion" "DNS Services, VPR" "EA Features" "External Interface and Network HSM" "FIX Low
Latency" GTM "IPI Subscription, 1Yr, C2400" "IPI Subscription, 3Yr, C2400" "MSM,
Unlimited Mailboxes" "PEM URL Filtering, Subscription, 1Yr, C2400" "PEM URL Filtering,
Subscription, 3Yr, C2400" "PEM, C2400" "PEM, Quota Management, C2X00" "PSM, Base" "SDN
Services" "SSL, Forward Proxy" "SWG Subscription, 1Yr, C2200/C2400" "SWG Subscription,
3Yr, C2200/C2400" "TPS SSL, Unlimited, C2400/C4400/C4480" "URL Filtering Subscription,
1Yr, C2200/C2400" "URL Filtering Subscription, 3Yr, C2200/C2400" "VCMP, 16 Guests" "VCMP,
Max Guests" "WBA, Bundle, C2400" }
platform-id A112
product BIG-IP
self-device true
time-zone PDT
unicast-address {
{
effective-ip 10.1.80.42
effective-port 1026
ip 10.1.80.42
}
{
effective-port 1026
}
}
version 11.4.1
}
cm device-group /Common/device-group-failover-fc99d0cbc202 {
devices {
/Common/bigip1.f5.local { }
/Common/bigip2.f5.local { }
© 2014 Cisco | F5. All rights reserved.
Page 32
}
type sync-failover
}
cm device-group /Common/device_trust_group {
auto-sync enabled
devices {
/Common/bigip1.f5.local { }
/Common/bigip2.f5.local { }
}
hidden true
network-failover disabled
}
cm device-group /Common/gtm {
devices {
/Common/bigip2.f5.local { }
}
hidden true
network-failover disabled
}
cm key /Common/dtca.key {
cache-path
/config/filestore/files_d/Common_d/trust_certificate_key_d/:Common:dtca.key_29743_2
checksum SHA1:1679:350c3881ac1654fb68d491dd06d53be65bd62782
revision 2
}
cm key /Common/dtdi.key {
cache-path
/config/filestore/files_d/Common_d/trust_certificate_key_d/:Common:dtdi.key_29739_2
checksum SHA1:1679:d30e359dfd3306d4268b74001c56dfe7d2562780
revision 2
}
cm traffic-group /Common/traffic-group-1 {
ha-order {
/Common/bigip1.f5.local
/Common/bigip2.f5.local
}
unit-id 1
}
cm traffic-group /Common/traffic-group-local-only { }
cm trust-domain /Common/Root {
ca-cert /Common/dtca.crt
ca-cert-bundle /Common/dtca-bundle.crt
ca-devices { /Common/bigip2.f5.local /Common/bigip1.f5.local }
ca-key /Common/dtca.key
guid c53fb850-be99-4b6a-8b410023e98b13c2
status initialized
© 2014 Cisco | F5. All rights reserved.
Page 33
trust-group /Common/device_trust_group
}
gtm global-settings metrics {
metrics-collection-protocols { icmp }
}
gtm global-settings metrics-exclusions {
addresses none
}
ltm default-node-monitor {
rule none
}
ltm node /Common/10.1.80.102 {
address 10.1.80.102
monitor /Common/gateway_icmp
}
ltm node /Common/10.1.80.103 {
address 10.1.80.103
monitor /Common/gateway_icmp
}
ltm pool /Common/HTTP-Pool {
members {
/Common/10.1.80.102:80 {
address 10.1.80.102
}
/Common/10.1.80.103:80 {
address 10.1.80.103
}
}
monitor /Common/gateway_icmp
}
ltm pool /Common/HTTPS-Pool {
members {
/Common/10.1.80.102:443 {
address 10.1.80.102
}
/Common/10.1.80.103:443 {
address 10.1.80.103
}
}
monitor /Common/gateway_icmp
}
ltm virtual /Common/HTTP-L7-VIP {
destination /Common/10.1.90.101:80
ip-protocol tcp
mask 255.255.255.255
pool /Common/HTTP-Pool
© 2014 Cisco | F5. All rights reserved.
Page 34
profiles {
/Common/fasthttp { }
}
source 0.0.0.0/0
source-address-translation {
type automap
}
translate-address enabled
translate-port enabled
}
ltm virtual /Common/HTTP-VIP {
destination /Common/10.1.90.100:80
ip-protocol tcp
mask 255.255.255.255
pool /Common/HTTP-Pool
profiles {
/Common/fastL4 { }
}
source 0.0.0.0/0
source-address-translation {
type automap
}
translate-address enabled
translate-port enabled
}
ltm virtual /Common/HTTPS-VIP {
destination /Common/10.1.90.100:443
ip-protocol tcp
mask 255.255.255.255
pool /Common/HTTPS-Pool
profiles {
/Common/fastL4 { }
}
source 0.0.0.0/0
source-address-translation {
type automap
}
translate-address enabled
translate-port enabled
}
ltm virtual-address /Common/10.1.90.100 {
address 10.1.90.100
mask 255.255.255.255
traffic-group /Common/traffic-group-1
}
ltm virtual-address /Common/10.1.90.101 {
© 2014 Cisco | F5. All rights reserved.
Page 35
address 10.1.90.101
mask 255.255.255.255
traffic-group /Common/traffic-group-1
}
ltm classification signature-version {
version-number 0
}
net interface 1/2.1 {
bundle disabled
}
net interface 1/2.2 {
bundle disabled
}
net interface 1/2.3 {
bundle disabled
}
net interface 1/2.4 {
bundle disabled
}
net interface 2/2.1 {
bundle disabled
}
net interface 2/2.2 {
bundle disabled
}
net interface 2/2.3 {
bundle enabled
}
net interface 2/2.4 {
bundle enabled
}
net route-domain /Common/0 {
id 0
vlans {
/Common/internal
/Common/external
}
}
net self /Common/10.1.90.254 {
address 10.1.90.254/24
allow-service {
tcp:443
}
traffic-group /Common/traffic-group-1
vlan /Common/external
}
© 2014 Cisco | F5. All rights reserved.
Page 36
net self /Common/10.1.80.254 {
address 10.1.80.254/24
allow-service {
default
}
traffic-group /Common/traffic-group-1
vlan /Common/internal
}
net self /Common/10.1.80.42 {
address 10.1.80.42/24
allow-service {
default
}
traffic-group /Common/traffic-group-local-only
vlan /Common/internal
}
net self /Common/10.1.90.42 {
address 10.1.90.42/24
allow-service {
default
}
traffic-group /Common/traffic-group-local-only
vlan /Common/external
}
net self-allow {
defaults {
ospf:any
tcp:161
tcp:22
tcp:4353
tcp:443
tcp:53
udp:1026
udp:161
udp:4353
udp:520
udp:53
}
}
net stp /Common/cist {
trunks {
PO42 {
external-path-cost 200000
internal-path-cost 200000
}
}
© 2014 Cisco | F5. All rights reserved.
Page 37
vlans {
/Common/external
/Common/internal
}
}
net stp-globals {
config-name 00-01-D7-C7-1C-40
}
net trunk PO42 {
interfaces {
2/2.3
2/2.4
}
lacp enabled
}
net vlan /Common/external {
interfaces {
PO42 {
tagged
}
}
tag 90
}
net vlan /Common/internal {
interfaces {
PO42 {
tagged
}
}
tag 80
}
net fdb vlan /Common/external { }
net fdb vlan /Common/internal { }
net ipsec ike-daemon /Common/ikedaemon { }
security firewall port-list /Common/_sys_self_allow_tcp_defaults {
ports {
22 { }
53 { }
161 { }
443 { }
1029-1043 { }
4353 { }
}
}
security firewall port-list /Common/_sys_self_allow_udp_defaults {
ports {
© 2014 Cisco | F5. All rights reserved.
Page 38
53 { }
161 { }
520 { }
1026 { }
4353 { }
}
}
security firewall rule-list /Common/_sys_self_allow_all {
rules {
_sys_allow_all {
action accept
}
}
}
security firewall rule-list /Common/_sys_self_allow_defaults {
rules {
_sys_allow_tcp_defaults {
action accept
ip-protocol tcp
destination {
port-lists {
/Common/_sys_self_allow_tcp_defaults
}
}
}
_sys_allow_udp_defaults {
action accept
ip-protocol udp
destination {
port-lists {
/Common/_sys_self_allow_udp_defaults
}
}
}
_sys_allow_ospf_defaults {
action accept
ip-protocol ospf
}
}
}
security firewall rule-list /Common/_sys_self_allow_management {
rules {
_sys_allow_ssh {
action accept
ip-protocol tcp
destination {
© 2014 Cisco | F5. All rights reserved.
Page 39
ports {
22 { }
}
}
}
_sys_allow_web {
action accept
ip-protocol tcp
destination {
ports {
443 { }
}
}
}
}
}
sys cluster default {
address 172.23.102.42/23
members {
1 { }
2 { }
3 { }
4 { }
}
min-up-members 1
min-up-members-enabled yes
}
sys db gtm.peerinfototalgtms {
value "0"
}
sys db provision.extramb {
value "0"
}
sys db provision.tomcat.extramb {
value "0"
}
sys db rule.validation {
value "strict"
}
sys db statemirror.clustermirroring {
value "between"
}
sys db tm.allowmulticastl2destinationtraffic {
value "disable"
}
sys db tm.tcpallowinsecurerst {
© 2014 Cisco | F5. All rights reserved.
Page 40
value "disable"
}
sys db tmm.classallocatemetadata {
value "enable"
}
sys db tmm.coredump {
value "enable"
}
sys db tmm.gradualfileloadadjust {
value "enable"
}
sys db tmm.lb.wlcoffset {
value "disable"
}
sys db tmm.verbose {
value "disable"
}
sys db tmm.verbosecmp {
value "disable"
}
sys feature-module cgnat {
disabled
}
sys folder / {
device-group /Common/device-group-failover-fc99d0cbc202
hidden false
inherited-devicegroup false
inherited-traffic-group false
traffic-group /Common/traffic-group-1
}
sys folder /Common {
device-group /Common/device-group-failover-fc99d0cbc202
hidden false
inherited-devicegroup true
inherited-traffic-group true
traffic-group /Common/traffic-group-1
}
sys global-settings {
gui-setup disabled
hostname bigip2.f5.local
}
sys management-dhcp /Common/sys-mgmt-dhcp-config { }
sys management-route /Common/default {
description configured-statically
gateway 172.23.102.1
network default
© 2014 Cisco | F5. All rights reserved.
Page 41
}
sys provision ltm {
level nominal
}
sys snmp {
agent-addresses { tcp6:161 udp6:161 }
communities {
/Common/comm-public {
community-name public
source default
}
}
disk-monitors {
/Common/root {
minspace 2000
path /
}
/Common/var {
minspace 10000
path /var
}
}
process-monitors {
/Common/bigd {
process bigd
}
/Common/chmand {
process chmand
}
/Common/httpd {
max-processes infinity
process httpd
}
/Common/mcpd {
process mcpd
}
/Common/sod {
process sod
}
/Common/tmm {
max-processes infinity
process tmm
}
}
}
sys sflow global-settings http { }
© 2014 Cisco | F5. All rights reserved.
Page 42
sys sflow global-settings vlan { }
wom deduplication {
disabled
}
wom endpoint-discovery { }
Reference
Cisco Nexus 9000 NX-OS mode best practice:
http://www.cisco.com/c/en/us/products/collateral/switches/nexus-9000-series-switches/guide-c07-730115.html.
F5 Local Traffic Manager 11.4.1 implementations:
http://support.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/ltm-implementations-11-4-0.html.
Disclaimer
ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS
(COLLECTIVELY, "DESIGNS") IN THIS MANUAL ARE PRESENTED "AS IS," WITH ALL FAULTS. CISCO AND
ITS SUPPLIERS DISCLAIM ALL WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING
FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS
SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES,
INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF
THE USE OR INABILITY TO USE THE DESIGNS, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED
OF THE POSSIBILITY OF SUCH DAMAGES.
THE DESIGNS ARE SUBJECT TO CHANGE WITHOUT NOTICE. USERS ARE SOLELY RESPONSIBLE FOR
THEIR APPLICATION OF THE DESIGNS. THE DESIGNS DO NOT CONSTITUTE THE TECHNICAL OR
OTHER PROFESSIONAL ADVICE OF CISCO, ITS SUPPLIERS OR PARTNERS. USERS SHOULD CONSULT
THEIR OWN TECHNICAL ADVISORS BEFORE IMPLEMENTING THE DESIGNS. RESULTS MAY VARY
DEPENDING ON FACTORS NOT TESTED BY CISCO.
© 2014 Cisco | F5. All rights reserved.
Page 43
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered
trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to
this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective
owners. The use of the word partner does not imply a partnership relationship between Cisco and any other
company. (1110R)
F5 (NASDAQ: FFIV) provides solutions for an application world. F5 helps organizations seamlessly scale cloud,
data center, and software defined networking (SDN) deployments to successfully deliver applications to anyone,
anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich
partner ecosystem of leading technology and data center orchestration vendors. This approach lets customers
pursue the infrastructure model that best fits their needs over time. The world's largest businesses, service
providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility
trends. For more information, go to f5.com.
C22-732522-00
© 2014 Cisco | F5. All rights reserved.
08/14
Page 44
Study collections