Tmos Redundant Systems Config 11 2 0
Tmos Redundant Systems Config 11 2 0
Tmos Redundant Systems Config 11 2 0
Guide
Version 11.2
Table of Contents
Table of Contents
Legal Notices.....................................................................................................................................7
Acknowledgments............................................................................................................................9
3
Table of Contents
4
Table of Contents
5
Table of Contents
6
Legal Notices
Publication Date
This document was published on May 7, 2012.
Publication Number
MAN-0375-02
Copyright
Copyright © 2012, F5 Networks, Inc. All rights reserved.
F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5 assumes
no responsibility for the use of this information, nor any infringement of patents or other rights of third
parties which may result from its use. No license is granted by implication or otherwise under any patent,
copyright, or other intellectual property right of F5 except as specifically described by applicable user
licenses. F5 reserves the right to change specifications at any time without notice.
Trademarks
3DNS, Access Policy Manager, Acopia, Acopia Networks, Advanced Client Authentication, Advanced
Routing, APM, Application Security Manager, ARX, AskF5, ASM, BIG-IP, Cloud Extender, CloudFucious,
CMP, Data Manager, DevCentral, DevCentral [DESIGN], DNS Express, DSC, DSI, Edge Client, Edge
Gateway, Edge Portal, EM, Enterprise Manager, F5, F5 [DESIGN], F5 Management Pack, F5 Networks,
F5 World, Fast Application Proxy, Fast Cache, FirePass, Global Traffic Manager, GTM, IBR, Intelligent
Browser Referencing, Intelligent Compression, IPv6 Gateway, iApps, iControl, iHealth, iQuery, iRules,
iRules OnDemand, iSession, IT agility. Your way., L7 Rate Shaping, LC, Link Controller, Local Traffic
Manager, LTM, Message Security Module, MSM, Netcelera, OneConnect, Packet Velocity, Protocol
Security Module, PSM, Real Traffic Policy Builder, ScaleN, SSL Acceleration, StrongBox, SuperVIP, SYN
Check, TCP Express, TDR, TMOS, Traffic Management Operating System, TrafficShield, Transparent
Data Reduction, VIPRION, vCMP, WA, WAN Optimization Manager, WANJet, WebAccelerator, WOM,
and ZoneRunner, are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries,
and may not be used without F5's express written consent.
All other product and company names herein may be trademarks of their respective owners.
RF Interference Warning
This is a Class A product. In a domestic environment this product may cause radio interference, in which
case the user may be required to take adequate measures.
FCC Compliance
This equipment has been tested and found to comply with the limits for a Class A digital device pursuant
to Part 15 of FCC rules. These limits are designed to provide reasonable protection against harmful
interference when the equipment is operated in a commercial environment. This unit generates, uses, and
Legal Notices
can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual,
may cause harmful interference to radio communications. Operation of this equipment in a residential area
is likely to cause harmful interference, in which case the user, at his own expense, will be required to take
whatever measures may be required to correct the interference.
Any modifications to this device, unless expressly approved by the manufacturer, can void the user's authority
to operate this equipment under part 15 of the FCC rules.
Standards Compliance
This product conforms to the IEC, European Union, ANSI/UL and Canadian CSA standards applicable to
Information Technology products at the time of manufacture.
8
Acknowledgments
This product includes software developed by Niels Mueller (nisse@lysator.liu.se), which is protected under
the GNU Public License.
In the following statement, This software refers to the Mitsumi CD-ROM driver: This software was developed
by Holger Veit and Brian Moore for use with 386BSD and similar operating systems. Similar operating
systems includes mainly non-profit oriented systems for research and education, including but not restricted
to NetBSD, FreeBSD, Mach (by CMU).
This product includes software developed by the Apache Group for use in the Apache HTTP server project
(http://www.apache.org/).
This product includes software licensed from Richard H. Porter under the GNU Library General Public
License (© 1998, Red Hat Software), www.gnu.org/copyleft/lgpl.html.
This product includes the standard version of Perl software licensed under the Perl Artistic License (© 1997,
1998 Tom Christiansen and Nathan Torkington). All rights reserved. You may find the most current standard
version of Perl at http://www.perl.com.
This product includes software developed by Jared Minch.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
(http://www.openssl.org/).
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
This product contains software based on oprofile, which is protected under the GNU Public License.
This product includes RRDtool software developed by Tobi Oetiker (http://www.rrdtool.com/index.html)
and licensed under the GNU General Public License.
This product contains software licensed from Dr. Brian Gladman under the GNU General Public License
(GPL).
This product includes software developed by the Apache Software Foundation (http://www.apache.org/).
This product includes Hypersonic SQL.
This product contains software developed by the Regents of the University of California, Sun Microsystems,
Inc., Scriptics Corporation, and others.
This product includes software developed by the Internet Software Consortium.
This product includes software developed by Nominum, Inc. (http://www.nominum.com).
This product contains software developed by Broadcom Corporation, which is protected under the GNU
Public License.
This product contains software developed by MaxMind LLC, and is protected under the GNU Lesser General
Public License, as published by the Free Software Foundation.
This product includes software developed by the Computer Systems Engineering Group at Lawrence
Berkeley Laboratory. Copyright ©1990-1994 Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgment: This product includes software developed by the Computer Systems Engineering
Group at Lawrence Berkeley Laboratory.
10
BIG-IP® Redundant Systems Configuration Guide
4. Neither the name of the University nor of the Laboratory may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes software developed by Sony Computer Science Laboratories Inc. Copyright ©
1997-2003 Sony Computer Science Laboratories Inc. All rights reserved. Redistribution and use in source
and binary forms, with or without modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY SONY CSL AND CONTRIBUTORS "AS IS" AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL SONY CSL OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
11
Acknowledgments
12
Chapter
1
Introducing BIG-IP System Redundancy
Topics:
Devices
A device is a physical or virtual BIG-IP system, as well as a member of a local trust domain and a device
group. Each device member has a set of unique identification properties that the BIG-IP® system generates.
Device groups
A device group is a collection of BIG-IP® devices that trust each other and can synchronize, and sometimes
fail over, their BIG-IP configuration data.
Important: To configure redundancy on a device, you do not need to explicitly specify that you
want the BIG-IP device to be part of a redundant configuration. Instead, this occurs automatically
when you add the device to an existing device group.
A BIG-IP device can be a member of only one Sync-Failover group. However, a device can be a member
of both a Sync-Failover device group and a Sync-Only device group.
14
BIG-IP® Redundant Systems Configuration Guide
To minimize issues with config sync, failover, or mirroring, F5 Networks recommends as a best practice
that devices in a device group match as closely as possible with respect to hardware platform, product
licensing, and module provisioning. At a minimum, mirroring requires that the hardware platforms of the
mirrored devices match, and config sync between devices requires that the devices are running the same
version of BIG-IP system software.
Traffic groups
A traffic group is a collection of related configuration objects (such as a virtual IP address and a self IP
address) that run on a BIG-IP device and process a particular type of application traffic. When a BIG-IP
device becomes unavailable, a traffic group can float to another device in a device group to ensure that
application traffic continues to be processed with little to no interruption in service.
Note: In most cases, you can manage redundancy for all device group members remotely from one
specific member. However, there are cases when you must log in locally to a device group member
to perform a task. An example is when resetting device trust on a device.
15
Introducing BIG-IP System Redundancy
Note: When you are configuring a BIG-IP® system for the first time, the Setup utility automatically
performs some or all of these tasks, depending on the preferred configuration.
About failover
When you have more than one BIG-IP® device on the local area network, you can configure a device to fail
over a user-specified set of configuration objects (that is, a traffic group) to any of the devices in a device
group. This selective failover gives you granular control of configuration objects that you want to include
in failover operations.
Group-based failover means that multiple devices are available for the BIG-IP system to choose from to
assume traffic processing for an off-line device. Also, if you want to exclude certain devices from being
peers in failover operations, you simply exclude them from membership in that particular device group.
Note: When you are configuring a BIG-IP® system for the first time, the Setup utility automatically
performs some or all of these tasks, depending on the required configuration.
Required Method
configuration
Existing If you want to upgrade an active/standby pair to the latest version of the BIG-IP
active/standby pair system, the upgrade software performs all redundant system configuration tasks
for you, on each device, including establishing device trust between the two systems,
creating a device group with two members, and creating a default traffic group.
16
BIG-IP® Redundant Systems Configuration Guide
Required Method
configuration
New active/standby If you want to set up a new pair of BIG-IP devices as an active/standby pair, you
pair simply run the Setup utility wizard (on each device), available from the BIG-IP®
Configuration utility Welcome screen. Like the upgrade procedure, the Setup utility
performs all redundant system configuration tasks for you, but based on information
you provide. This includes establishing device trust between the two systems,
creating a device group with two members, and creating a default traffic group.
Existing If you have an existing active/standby pair and want to convert it to an active-active
active/standby pair pair, you can upgrade the active/standby pair to the latest version of the BIG-IP
converted to system, and then use the BIG-IP® Configuration utility Traffic Group screens to
active-active pair convert the pair to an active-active pair.
Multiple new BIG-IP If you want to set up multiple new BIG-IP devices in a redundant system
devices configuration, you can run the Setup utility wizard, and then use the BIG-IP®
Configuration utility Platform, Device Management, and Traffic Group screens to
configure some advanced features.
Note: You can use serial failover only when the device group contains a maximum of two devices.
For a group with more than two devices, network failover is required. Also, if the hardware platform
is a VIPRION® platform, you must use network failover.
17
Introducing BIG-IP System Redundancy
18
Chapter
2
Understanding Devices
Topics:
• What is a device?
• IP addresses for ConfigSync, Failover, and
Mirroring
• About device properties
• About device status
Understanding Devices
What is a device?
A device is a physical or virtual BIG-IP® system. Each device member has a set of unique identification
properties that the BIG-IP system generates. In addition to these properties, each BIG-IP device has
synchronization and failover connectivity information (IP addresses) that you define. Devices that are
members of the trust domain exchange their property and connectivity information through a process known
as device discovery.
Note: To configure IP connectivity (that is, ConfigSync, Failover, and Mirroring IP addresses) on
a device, you must log in locally to that device.
Note: You specify a ConfigSync address, as well as failover and mirroring addresses, for the local
device only. You do not need to specify the addresses of peer devices because devices in a device
group exchange their addresses automatically during device discovery.
ConfigSync IP address
This is the IP address that you want the BIG-IP® system to use when synchronizing configuration objects
to the local device.
By default, the system uses the self IP address of VLAN internal. This is the recommended IP address
to use for ConfigSync. You can, however, use a different self IP address for ConfigSync.
Important: A self IP address is the only type of BIG-IP system address that encrypts the data during
synchronization. For this reason, you cannot use a management IP address for ConfigSync.
Failover IP addresses
These are the IP addresses that you want the BIG-IP system to use when another device in the device group
fails over to the local device. You can specify two types of addresses: unicast and multicast.
For appliance platforms, specifying two unicast addresses should suffice. For VIPRION® platforms, you
should also retain the default multicast address that the BIG-IP system provides.
The recommended unicast addresses for failover are:
• The self IP address that you configured for either VLAN HA or VLAN internal. If you created VLAN
HA when you initially ran the Setup utility on the local device, F5 recommends that you use the self IP
address for that VLAN. Otherwise, use the self IP address for VLAN internal.
• The IP address for the local management port.
20
BIG-IP® Redundant Systems Configuration Guide
Mirroring IP addresses
These are the IP addresses that you want the BIG-IP system to use for connection mirroring. You specify
both a primary addresses, as well as a secondary address for the system to use if the primary address is
unavailable. If you configured VLAN HA, the system uses the associated self IP address as the default
address for mirroring. If you did not configure VLAN HA, the system uses the self IP address of VLAN
internal.
Note: On a VIPRION® system, you can mirror connections between blades within the cluster
(intra-cluster mirroring) or between the clusters in a redundant system configuration (inter-cluster
mirroring).
Important: You must perform this task on each device in the device group.
1. Confirm that you are logged in to the actual device you want to configure.
2. On the Main tab, click Device Management > Devices.
This displays a list of device objects discovered by the local device.
3. In the Name column, click the name of the device to which you are currently logged in.
4. From the Device Connectivity menu, choose ConfigSync.
5. For the Local Address setting, retain the displayed IP address or select another address from the list.
F5 Networks recommends that you use the default value, which is the self IP address for VLAN
internal. This address must be a non-floating self IP address and not a management IP address.
6. Click Update.
Note: The failover addresses that you specify must belong to route domain 0.
1. Confirm that you are logged in to the actual device you want to configure.
2. On the Main tab, click Device Management > Devices.
This displays a list of device objects discovered by the local device.
3. In the Name column, click the name of the device to which you are currently logged in.
4. From the Device Connectivity menu, choose Failover.
5. For the Failover Unicast Configuration settings, retain the displayed IP addresses.
You can also click Add to specify additional IP addresses that the system can use for failover
communications. F5 Networks recommends that you use the self IP address assigned to the HA VLAN.
21
Understanding Devices
6. If the BIG-IP® system is running on a VIPRION® platform, then for the Use Failover Multicast Address
setting, select the Enabled check box.
7. If you enable Use Failover Multicast Address, either accept the default Address and Port values, or
specify values appropriate for the device.
If you revise the default Address and Port values, but then decide to revert back to the default values,
click Reset Defaults.
8. Click Update.
After you perform this task, other devices in the device group can send failover messages to the local device
using the specified IP addresses.
Important: You must perform this task on each device in the device group.
1. Confirm that you are logged in to the actual device you want to configure.
2. On the Main tab, click Device Management > Devices.
This displays a list of device objects discovered by the local device.
3. In the Name column, click the name of the device to which you are currently logged in.
4. From the Device Connectivity menu, choose Mirroring.
5. For the Primary Local Mirror Address setting, retain the displayed IP address or select another address
from the list.
The recommended IP address is the self IP address for either VLAN HA or VLAN internal.
6. For the Secondary Local Mirror Address setting, retain the default value of None, or select an address
from the list.
This setting is optional. The system uses the selected IP address in the event that the primary mirroring
address becomes unavailable.
7. Click Update.
Device properties
The following table lists and describes the properties of a device.
Property Description
Device name The name of the device, such as siterequest.
Host name The host name of the device, such as www.siterequest.com
Device address The IP address for the management port.
22
BIG-IP® Redundant Systems Configuration Guide
Property Description
Serial number The serial number of the device.
Platform MAC address The MAC address for the management port.
Description A user-created description of the device.
Location The location of the device, such as Seattle, Bldg. 1
Contact The name of the person responsible for this device.
Comment Any user-specified remarks about the device.
Status The status of the device, such as Device is active
Time zone The time zone in which the device resides.
Platform ID An identification for the platform.
Platform name The platform name, such as BIG-IP 8900.
Software version The BIG-IP version number, such as BIG-IP 11.0.0.
Active modules The complete list of active modules, that is, the modules for which the device is
licensed.
23
Understanding Devices
Status Description
Active A minimum of one floating traffic group is currently active on the device. This status applies
to Sync-Failover device groups only.
Forced An administrator has intentionally made the device unavailable for processing traffic.
offline
Offline The device is unavailable for processing traffic.
Standby The device is available for processing traffic, but all traffic groups on the device are in a
standby state. This status applies to Sync-Failover device groups only.
Unknown The status of the device is unknown.
24
Chapter
3
Understanding Device Trust
Topics:
Note: You can add devices to a local trust domain from a single device on the network. You can
also view the identities of all devices in the local trust domain from a single device in the domain.
However, to maintain or change the authority of each trust domain member, you must log in locally
to each device.
Important: For security reasons, F5 Networks recommends you limit the number of authority
devices in a local trust domain to as few as possible.
Subordinate non-authorities
A subordinate non-authority device is a device for which a certificate signing authority device signs its
certificate. A subordinate device cannot sign a certificate for another device. Subordinate devices provide
an additional level of security because in the case where the security of an authority device in a trust domain
is compromised, the risk of compromise is minimized for any subordinate device. Designating devices as
subordinate devices is recommended for device groups with a large number of member devices, where the
risk of compromise is high.
26
BIG-IP® Redundant Systems Configuration Guide
Peer authorities
A peer authority is another device in the local trust domain that can sign certificates if the certificate signing
authority is not available. In a standard redundant system configuration of two BIG-IP devices, each device
is typically a peer authority for the other.
Device identity
The devices in a BIG-IP® device group use x509 certificates for mutual authentication. Each device in a
device group has an x509 certificate installed on it that the device uses to authenticate itself to the other
devices in the group.
Device identity is a set of information that uniquely identifies that device in the device group, for the purpose
of authentication. Device identity consists of the x509 certificate, plus this information:
• Device name
• Host name
• Platform serial number
• Platform MAC address
• Certificate name
• Subjects
• Expiration
• Certificate serial number
• Signature status
Tip: From the Device Trust: Identity screen in the BIG-IP Configuration utility, you can view the
x509 certificate installed on the local device.
27
Understanding Device Trust
• You can manage device trust when logged in to a certificate signing authority only. You cannot manage
device trust when logged in to a subordinate non-authority device.
• If you reset trust authority on a certificate signing authority by retaining the authority of the device, you
must subsequently recreate the local trust domain and the device group.
• As a best practice, you should configure the config sync and mirroring addresses on a device before you
add that device to the trust domain.
Note: Any BIG-IP devices that you intend to add to a device group at a later point must be members
of the same local trust domain.
1. On the Main tab, click Device Management/Device Trust, and then either Peer List or Subordinate
List.
2. In the Peer Authority Devices or the Subordinate Non-Authority Devices area of the screen, click Add.
3. Type an IP address, administrator user name, and administrator password for the remote BIG-IP® device.
This IP address can be either a management IP address or a self IP address.
4. Verify that the certificate of the remote device is correct.
5. Verify that the name of the remote device is correct.
6. Verify that the management IP address and name of the remote device are correct.
7. Click Retrieve Device Information.
The local device and the devices you specified in this procedure now have a trust relationship and are
therefore qualified to join a device group.
Caution: If you reset trust authority on a certificate signing authority by retaining the authority
of the device, you must subsequently recreate the local trust domain and the device group. If you
reset trust authority on a subordinate non-authority, the BIG system removes the non-authority
device from the local trust domain. You can then re-add the device as an authority or non-authority
device.
28
BIG-IP® Redundant Systems Configuration Guide
1. On the Main tab, click Device Management > Device Trust > Local Domain.
2. In the Trust Information area of the screen, click Reset Device Trust.
3. Choose a certificate signing authority option, and then click Update.
The system asks you to confirm your choice.
When you confirm your choice, the system changes the Authority Type.
29
Understanding Device Trust
30
Chapter
4
Understanding Folders
Topics:
• What is a folder?
• Basic folder concepts
• About the root folder
Understanding Folders
What is a folder?
At the most basic level, a folder is a container for BIG-IP® configuration objects on a BIG-IP device. A
folder can also contain sub-folders. All BIG-IP system objects reside in folders or sub-folders. Virtual
servers, pools, and self IP addresses are examples of objects that reside in folders or sub-folders on the
system.
You can use folders to set up full or granular synchronization and failover of BIG-IP configuration data in
a device group. You can synchronize and fail over all configuration data on a BIG-IP device, or you can
synchronize and fail over objects within a specific folder only.
32
Chapter
5
Understanding Device Groups
Topics:
Sync-Failover A Sync-Failover device group contains devices that synchronize configuration data
and support traffic groups for failover purposes when a device becomes unavailable.
A maximum of eight devices is supported in a Sync-Failover device group.
Sync-Only A Sync-Only device group contains devices that synchronize configuration data, such
as policy data, but do not synchronize failover objects. A maximum of 32 devices is
supported in a Sync-Only device group.
A BIG-IP® device can be a member of only one Sync-Failover group. However, a device can be a member
of both a Sync-Failover device group and a Sync-Only device group.
34
BIG-IP® Redundant Systems Configuration Guide
Device Group 1 is associated with folder /Common, and Device Group 2 is associated with the
sub-folder /Common/my_app. This configuration causes Device A to synchronize all of the data in folder
/Common to Device B only, and not to Device C. The only data that Device A synchronizes to Device
C is the data in sub-folder my_app.
Now suppose that you created a pool in the my_app folder. When you created the pool members in that
sub-folder, the BIG-IP system automatically created the associated node addresses, putting them in folder
/Common. This results in an invalid configuration, because the node data in folder /Common does not get
synchronized to the device on which the nodes' pool members reside, Device C. When an object is not
synchronized to the device on which its referenced objects reside, an invalid configuration results.
35
Understanding Device Groups
the device group and traffic processing is unaffected. You can perform this task on any authority device
within the local trust domain.
You now have a Sync-Failover type of device group containing BIG-IP devices as members.
Device group B is also a standard active/standby configuration, in which Bigip3 normally processes traffic
for application B. This means that Bigip3 and Bigip4 synchronize their configurations, and Bigip3 fails
over to Bigip4 if Bigip3 becomes unavailable. Bigip3 cannot fail over to Bigip1 or Bigip2 because
those devices are in a separate device group.
36
BIG-IP® Redundant Systems Configuration Guide
37
Understanding Device Groups
4. Select an IP address and host name from the Available list for each BIG-IP device that you want to
include in the device group. Use the Move button to move the host name to the Includes list.
The list shows any devices that are members of the device's local trust domain.
5. For Automatic Sync, select the Enabled check box.
6. Click Finished.
You now have a Sync-Only type of device group containing BIG-IP devices as members.
Note: For Sync-Failover device groups, the BIG-IP® system supports manual synchronization only.
You can use the BIG-IP Configuration utility to enable or disable automatic synchronization. When enabled,
this feature causes any BIG-IP device in the device group to synchronize its configuration data to the other
members of the device group whenever that data changes.
38
BIG-IP® Redundant Systems Configuration Guide
39
Understanding Device Groups
2. In the Group Name column, click the name of the relevant device group.
3. On the menu bar, click ConfigSync.
Note: When synchronizing self IP addresses, the BIG-IP system synchronizes floating self IP
addresses only. Static self IP addresses are not synchronized. Also, for Sync-Only device groups,
you can configure automatic synchronization.
Except for static self IP addresses, the entire set of BIG-IP configuration data is replicated on each device
in the device group.
40
Chapter
6
Understanding Traffic Groups
Topics:
Important: Although a specific traffic group can be active on only one device in a device group,
the traffic group actually resides and is in a standby state on all other device group members, due
to configuration synchronization.
Only certain types of configuration objects can belong to a traffic group. Examples of traffic group objects
are self IP addresses and virtual IP addresses.
An example of a set of objects in a traffic group is an iApps™ application service. If a device with this traffic
group is a member of a device group, and the device becomes unavailable, the traffic group floats to another
member of the device group, and that member becomes the device that processes the application traffic.
When a traffic group fails over to another device in the device group, the device that the system selects is
normally the device with the least number of active traffic groups. When you initially create the traffic
group on a device, however, you specify the device in the group that you prefer that traffic group to run on
in the event that the available devices have an equal number of active traffic groups (that is, no device has
fewer active traffic groups than another). Note that, in general, the system considers the most available
device in a device group to be the device that contains the fewest active traffic groups at any given time.
42
BIG-IP® Redundant Systems Configuration Guide
Note: When you assign a MAC masquerade address to a traffic group, the BIG-IP system sends a
gratuitous ARP to notify other hosts on the network of the new address.
43
Understanding Traffic Groups
Important: This procedure creates a traffic group but does not associate it with failover objects.
You associate a traffic group with specific failover objects when you create or modify each object.
For some objects, such as floating self IP addresses and iApps™ application services, you can use
the BIG-IP® Configuration utility. For other objects, you use tmsh.
8. If auto-failback is enabled, in the Auto Failback Timeout field, type the number of seconds after which
auto-failback expires.
9. Confirm that the displayed traffic group settings are correct.
10. Click Finished.
You now have a floating traffic group with a default device specified.
44
BIG-IP® Redundant Systems Configuration Guide
If failover occurs, the traffic group floats to the other device. In the following illustration, Device A has
become unavailable, causing the traffic group to float to Device B and process traffic on that device. The
traffic group is now standby on Device A.
45
Understanding Traffic Groups
The selected traffic group is now active on another device in the device group.
46
BIG-IP® Redundant Systems Configuration Guide
Important: The association of a traffic group with a virtual IP address or a SNAT translation
address in the BIG-IP Configuration utility exists but is hidden. By default, floating objects that
you create with the BIG-IP Configuration utility are associated with traffic-group-1.
Non-floating objects are associated with traffic-group-local-only. You can change these
associations by using tmsh to modify the properties of those objects.
The default device designation is a user-modifiable property of a traffic group. You actively
specify a default device for a traffic group when you create the traffic group.
Current A current device is the device on which a traffic group is currently running. For example,
Device if Device A is currently processing traffic using the objects in Traffic-Group-1, then
Device A is the current device. If Device A becomes unavailable and Traffic-Group-1
fails over to Device C (currently the device with the fewest number of active traffic
groups), then Device C becomes the current device. The current device is system-selected,
and might or might not be the default device.
Next Active A next active device is the device currently designated to accept a traffic group if failover
Device of a traffic group should occur. For example, if traffic-group-1 is running on Device
A, and the designated device for future failover is currently Device C, then Device C
47
Understanding Traffic Groups
About auto-failback
The failover feature includes an option known as auto-failback. When you enable auto-failback, a traffic
group that has failed over to another device fails back to its default device whenever that default device is
available to process the traffic. This occurs even when other devices in the group are more available than
the default device to process the traffic.
If auto-failback is not enabled for a traffic group and the traffic group fails over to another device, the traffic
group runs on the failover (now current) device until that device becomes unavailable. In that event, the
traffic group fails over to the most available device in the group. The traffic group only fails over to its
default device when the availability of the default device equals or exceeds the availability of another device
in the group.
Managing auto-failback
You can use the BIG-IP® Configuration utility to manage the auto-failback option for a traffic group.
4. If auto-failback is enabled, in the Auto Failback Timeout field, type the number of seconds after which
auto-failback expires.
5. Click Update.
Property Description
Name The name of the traffic group, such as Traffic-Group-1.
Partition / Path The name of the folder or sub-folder in which the traffic group resides.
Description A user-defined description of the traffic group.
48
BIG-IP® Redundant Systems Configuration Guide
Property Description
Default Device The device with which a traffic group has some affinity when auto-failback is not
enabled.
Current Device The device on which a traffic group is currently running.
Next Active Device The device currently most available to accept a traffic group if failover of that traffic
group should occur.
MAC Masquerade A user-created MAC address that floats on failover, to minimize ARP
Address communications and dropped connections.
Auto Failback The condition where the traffic group tries to fail back to the default device whenever
possible.
Auto Failback The number of seconds before auto failback expires. This setting appear only when
Timeout you enable the Auto Failback setting.
Floating A designation that makes if possible for the traffic group to float to another device
in the device group when failover occurs.
49
Understanding Traffic Groups
50
Chapter
7
Working with Folders
Topics:
Note: The device group assigned to a folder must contain the local BIG-IP device. Also, you cannot
remove the local BIG-IP device from the Sync-Failover device group assigned to a folder.
Note: All folders and sub-folders in the root folder hierarchy inherit these attribute values, by
default.
52
BIG-IP® Redundant Systems Configuration Guide
Note: All folders and sub folders in the root folder hierarchy inherit this attribute value, by default.
By default, all failover objects in the rootfolder hierarchy fail over with the named traffic group, when
failover occurs.
The contents of the folder corresponding to the specified partition now will synchronize to the specified
device group and will fail over with the specified traffic group.
53
Working with Folders
54
Chapter
8
Understanding Fast Failover
Topics:
Note: To use the fast failover feature, you must first create a redundant system configuration.
The fast failover feature is designed for a redundant configuration that contains a maximum of two devices
in a device group, with one active traffic group.
Note: Only VIPRION® systems can have a cluster as an object in an HA group. For all other
platforms, HA group members consist of pools and trunks only.
An HA group is typically configured to fail over based on trunk health in particular. Trunk configurations
are not synchronized between units, which means that the number of trunk members on the two units often
differs whenever a trunk loses or gains members. The HA group feature makes it possible for failover to
occur based on changes to trunk health instead of on system or VLAN failure.
Only one HA group can exist on the BIG-IP system. By default, the HA group feature is disabled.
To summarize, when you configure the HA group, the process of one BIG-IP device failing over to the
other based on HA scores is noticeably faster than if failover occurs due to a hardware or daemon failure.
HA score calculation
The BIG-IP® system calculates an HA score based on these criteria:
• The number of available members for each object (such as a trunk)
• The weight that you assign to each object in the HA group
• The threshold you specify for each object (optional)
• The active bonus value that you specify for the HA group
A weight value
A weight is a health value that you assign to each object in the HA group (that is, pool, trunk, and cluster).
The weight that you assign to each object must be in the range of 10 through 100.
The maximum overall score that the BIG-IP system can potentially calculate for a device is the sum of the
individual weights for the HA group objects, plus the active bonus value. There is no limit to the sum of
the object weights for the HA group as a whole.
56
BIG-IP® Redundant Systems Configuration Guide
A threshold value
For each object in an HA group, you can specify an optional setting known as a threshold. A threshold is
a value that specifies the number of object members that must be available to prevent failover. If the number
of available members is less than the threshold, the BIG-IP system assigns a score of 0 to the object, so that
the score of that object no longer contributes to the overall score of the device.
For example, if a trunk in the HA group has four members and you specify a threshold value of 3, and the
number of available trunk members falls to 2, then the trunk contributes a score of 0 to the total device
score.
If the number of available object members equals or exceeds the threshold value, or you do not specify a
threshold, the BIG-IP system calculates the score as described previously, by multiplying the percentage
of available object members by the weight for each object and then adding the scores to determine the
overall device score.
The threshold that you define for pools can be less than or equal to the number of members in the pool. For
clusters, the threshold can be less than or equal to the number of possible blades in the chassis, and for
trunks, the threshold can be less than or equal to the number of possible members in a trunk for that platform.
Tip: Do not configure the tmsh attribute min-up-members on any pool that you intend to include
in the HA group.
Note: An exception to this behavior is when the active device score is 0. If the score of the active
device is 0, the system does not add the active bonus to the active device score.
To decide on an active bonus value, calculate the trunk score for some number of failed members (such as
one of four members), and then specify an active bonus that results in a trunk score that is greater than or
equal to the weight that you assigned to the trunk.
For example, if you assigned a weight of 30 to the trunk, and one of the four trunk members fails, the trunk
score becomes 23 (75% of 30), putting the device at risk for failover. However, if you specified an active
bonus of 7 or higher, failover would not actually occur, because a score of 7 or higher, when added to the
score of 23, is greater than or equal to 30.
57
Understanding Fast Failover
Configuring an HA group
To configure the BIG-IP® system so that failover can occur based on an HA score, you must specify values
for the properties of an HA group. The system makes it possible for you to configure one HA group only;
you cannot create additional HA groups. Once you have configured HA group properties, the BIG-IP system
uses that configuration to calculate an overall HA score for each device in the redundant system configuration.
You now have an HA group that the BIG-IP system can use to calculate an HA score for failover.
58
Index
Index
A configuration synchronization
about 15
active/standby pair setup 16 automating 38
active-active pair overview of 15
conversion to 16 performing manually 40
active bonus values 56 preventing 43
active state scope of 52
defined 45 connection mirroring
administrative partitions about 20
and folders 53 configuring 22
ARP communications 43 connections
authentication preserving on failover 22
and device identity 27 current devices
and local trust domains 26 defined 47
authority
changing 26
authority devices
D
and device trust 27 default devices
auto-failback feature and failback 48
defined 48 defined 47
managing 48 default traffic groups
Automatic Sync described 42
enabling 37 device availability 48
auto synchronization defined 42
enabling and disabling 38 device discovery
availability defined 27
during failover 42 for device trust 28
device group assignments
B to /Common folder 34
to root folder 34
BIG-IP versions device group attribute
and device trust 27 described 52
viewing on root folder 52
device group members
C adding 39
certificate authority viewing 39
importing 28 device group membership 34
managing and retaining 28 device groups
certificates and root folder 32
for device trust 28 configuration restrictions for 34
certificate signing authorities creating 35, 37
described 26 defined 14
resetting trust on 28 types of 34
config sync, See configuration synchronization device group subset 52
config sync address device identity
specifying 21 defined 27
ConfigSync IP addresses 20 device objects
ConfigSync status defined 14
determining 39 device properties
config sync status about 20
viewing 39 configuring 23
configuration objects listed 22
and traffic group associations 46 viewing 23
59
Index
devices G
and mirroring limit 22
defined 20 granular failover
discovering 27 using folders for 53
excluding from config sync 15 granularity
running traffic groups on 47 of synchronization 15
selecting for failover 42, 47 granular synchronization
device service clustering using folders for 53
about 14 with folders 32
device status gratuitous ARPs 43
types of 24
device status types
viewing 24
H
device trust HA groups
about 26 configuring 58
adding domain members 28 defined 56
defined 14 purpose of 58
managing 27 HA scores
resetting 27 calculating 56, 58
purpose of 56
F health scores, See HA scores
failback
defined 48
I
failover iApps applications
and default traffic groups 42 and traffic group associations 46
and dropped packets 43 and traffic groups 42
and failback 48 information exchange 27
and HA scores 56, 58 interfaces
and traffic groups 42 and downtime 36
scope of 52 IP address connectivity 20
failover configuration IP addresses
overview of 16 for redundancy 20
failover devices
selecting 47
failover IP addresses L
about 20
specifying 21 local trust domain
failover objects and device group members 39
associating with traffic groups 44 and device groups 35, 37
viewing 47 defined 26, 28
failover settings joining 27
configuring 36
fast failover 56 M
floating IP addresses
and traffic groups 42 MAC masquerade addresses
floating traffic groups defined 43
and traffic group states 45 members, See device group members
folder attributes mirroring IP addresses 20
changing 53 multiple device setup 16
described 52
folder hierarchy 32
folder inheritance 35
N
folders network failover
and administrative partitions 32, 53 about 17
and traffic group associations 46 configuring 35
associating device groups with 34 next active devices
defined 14, 32 defined 47
Force to Standby option 44
60
Index
61
Index
62