You are on page 1of 350

Configuration Guide for BIG-IP Global Traffic Manager

version 10.2
MAN-0305-01

Product Version
This manual applies to product version 10.2 of the BIG-IP Global Traffic Manager.

Publication Date
This manual was published on October 21, 2011.

Legal Notices
Copyright
Copyright 2011, F5 Networks, Inc. All rights reserved. F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5 assumes no responsibility for the use of this information, nor any infringement of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent, copyright, or other intellectual property right of F5 except as specifically described by applicable user licenses. F5 reserves the right to change specifications at any time without notice.

Trademarks
3DNS, Access Policy Manager, Acopia, Acopia Networks, Advanced Client Authentication, Advanced Routing, APM, Application Security Manager, ARX, AskF5, ASM, BIG-IP, Cloud Extender, CloudFucious, CMP, Data Manager, DevCentral, DevCentral [DESIGN], DNS Express, DSC, DSI, Edge Client, Edge Gateway, Edge Portal, EM, Enterprise Manager, F5, F5 [DESIGN], F5 Management Pack, F5 Networks, F5 World, Fast Application Proxy, Fast Cache, FirePass, Global Traffic Manager, GTM, IBR, Intelligent Browser Referencing, Intelligent Compression, IPv6 Gateway, iApps, iControl, iHealth, iQuery, iRules, iRules OnDemand, iSession, IT agility. Your way., L7 Rate Shaping, LC, Link Controller, Local Traffic Manager, LTM, Message Security Module, MSM, Netcelera, OneConnect, Packet Velocity, Protocol Security Module, PSM, Real Traffic Policy Builder, ScaleN, SSL Acceleration, StrongBox, SuperVIP, SYN Check, TCP Express, TDR, TMOS, Traffic Management Operating System, TrafficShield, Transparent Data Reduction, VIPRION, vCMP, WA, WAN Optimization Manager, WANJet, WebAccelerator, WOM, and ZoneRunner, are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries, and may not be used without F5's express written consent. All other product and company names herein may be trademarks of their respective owners.

Patents
This product may be protected by U.S. Patents 6,374,300; 6,473,802; 6,970,733; 7,047,301; 7,707,289. This list is believed to be current as of October 21, 2011.

Export Regulation Notice


This product may include cryptographic software. Under the Export Administration Act, the United States government may consider it a criminal offense to export this product from the United States.

RF Interference Warning
This is a Class A product. In a domestic environment this product may cause radio interference, in which case the user may be required to take adequate measures.

FCC Compliance
This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This unit generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user, at his own expense, will be required to take whatever measures may be required to correct the interference.

Configuration Guide for BIG-IP Global Traffic ManagerTM

Any modifications to this device, unless expressly approved by the manufacturer, can void the user's authority to operate this equipment under part 15 of the FCC rules.

Canadian Regulatory Compliance


This class A digital apparatus complies with Canadian I CES-003.

Standards Compliance
This product conforms to the IEC, European Union, ANSI/UL and Canadian CSA standards applicable to Information Technology products at the time of manufacture.

Acknowledgments
This product includes software developed by Gabriel Fort. This product includes software developed by Bill Paul. This product includes software developed by Jonathan Stone. This product includes software developed by Manuel Bouyer. This product includes software developed by Paul Richards. This product includes software developed by the NetBSD Foundation, Inc. and its contributors. This product includes software developed by the Politecnico di Torino, and its contributors. This product includes software developed by the Swedish Institute of Computer Science and its contributors. This product includes software developed by the University of California, Berkeley and its contributors. This product includes software developed by the Computer Systems Engineering Group at the Lawrence Berkeley Laboratory. This product includes software developed by Christopher G. Demetriou for the NetBSD Project. This product includes software developed by Adam Glass. This product includes software developed by Christian E. Hopps. This product includes software developed by Dean Huxley. This product includes software developed by John Kohl. This product includes software developed by Paul Kranenburg. This product includes software developed by Terrence R. Lambert. This product includes software developed by Philip A. Nelson. This product includes software developed by Herb Peyerl. This product includes software developed by Jochen Pohl for the NetBSD Project. This product includes software developed by Chris Provenzano. This product includes software developed by Theo de Raadt. This product includes software developed by David Muir Sharnoff. This product includes software developed by SigmaSoft, Th. Lockert. This product includes software developed for the NetBSD Project by Jason R. Thorpe. This product includes software developed by Jason R. Thorpe for And Communications, http://www.and.com. This product includes software developed for the NetBSD Project by Frank Van der Linden. This product includes software developed for the NetBSD Project by John M. Vinopal. This product includes software developed by Christos Zoulas. This product includes software developed by the University of Vermont and State Agricultural College and Garrett A. Wollman. In the following statement, "This software" refers to the Mitsumi CD-ROM driver: This software was developed by Holger Veit and Brian Moore for use with "386BSD" and similar operating systems. "Similar operating systems" includes mainly non-profit oriented systems for research and education, including but not restricted to "NetBSD," "FreeBSD," "Mach" (by CMU). This product includes software developed by the Apache Group for use in the Apache HTTP server project (http://www.apache.org/). This product includes software licensed from Richard H. Porter under the GNU Library General Public License ( 1998, Red Hat Software), www.gnu.org/copyleft/lgpl.html.

ii

This product includes the standard version of Perl software licensed under the Perl Artistic License ( 1997, 1998 Tom Christiansen and Nathan Torkington). All rights reserved. You may find the most current standard version of Perl at http://www.perl.com. This product includes software developed by Jared Minch. This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product contains software based on oprofile, which is protected under the GNU Public License. This product includes RRDtool software developed by Tobi Oetiker (http://www.rrdtool.com/index.html) and licensed under the GNU General Public License. This product contains software licensed from Dr. Brian Gladman under the GNU General Public License (GPL). This product includes software developed by the Apache Software Foundation <http://www.apache.org/>. This product includes Hypersonic SQL. This product contains software developed by the Regents of the University of California, Sun Microsystems, Inc., Scriptics Corporation, and others. This product includes software developed by the Internet Software Consortium. This product includes software developed by Nominum, Inc. (http://www.nominum.com). This product contains software developed by Broadcom Corporation, which is protected under the GNU Public License. This product contains software developed by MaxMind LLC, and is protected under the GNU Lesser General Public License, as published by the Free Software Foundation. This product includes the GeoPoint Database developed by Quova, Inc. and its contributors. This product includes software developed by Balazs Scheidler <bazsi@balabit.hu>, which is protected under the GNU Public License. This product includes software developed by NLnet Labs and its contributors. This product includes software written by Steffen Beyer and licensed under the Perl Artistic License and the GPL. This product includes software written by Makamaka Hannyaharamitu 2007-2008.

Configuration Guide for BIG-IP Global Traffic ManagerTM

iii

iv

Table of Contents

Table of Contents

1
Overview of the Global Traffic Manager
Introducing the Global Traffic Manager .................................................................................... 1-1 Security features .................................................................................................................... 1-2 Introducing Local Traffic Manager resources ................................................................. 1-2 Internet protocol and network management support ................................................. 1-3 System synchronization options ........................................................................................ 1-3 Configuring data collection for server status and network path data ...................... 1-3 Redundant system configurations ..................................................................................... 1-4 Introducing the Configuration utility ......................................................................................... 1-5 Introducing the Traffic Management Shell ................................................................................ 1-5

2
Introducing Global Traffic Manager Components
Defining Global Traffic Manager components ......................................................................... 2-1 Introducing physical network components .............................................................................. 2-2 Data centers ........................................................................................................................... 2-2 Servers ..................................................................................................................................... 2-2 Links ......................................................................................................................................... 2-3 Virtual servers ........................................................................................................................ 2-3 Introducing logical network components ................................................................................. 2-4 Listeners .................................................................................................................................. 2-4 Pools ......................................................................................................................................... 2-4 Wide IPs .................................................................................................................................. 2-5 Distributed applications ....................................................................................................... 2-5 Locating a component using the search feature ..................................................................... 2-6

3
Setting Up and Configuring the Global Traffic Manager
Setting up the Global Traffic Manager ....................................................................................... 3-1 Configuring the Global Traffic Manager .................................................................................... 3-1 Defining the Global Traffic Manager ................................................................................. 3-2 Establishing system communications ................................................................................ 3-4 Configuring synchronization settings ................................................................................ 3-9 Configuring auto-discovery ............................................................................................... 3-14 Configuring global monitor settings ................................................................................ 3-15 Configuring domain validation ......................................................................................... 3-18

4
Working with Listeners
Introducing listeners ...................................................................................................................... 4-1 Creating a listener for local resolution ..................................................................................... 4-3 Configuring listeners for traffic forwarding .............................................................................. 4-4 Configuring a wildcard listener ................................................................................................... 4-5 Modifying listeners ......................................................................................................................... 4-5 Deleting listeners ........................................................................................................................... 4-6 Using listeners with VLANs ......................................................................................................... 4-6 Configuring a listener for all VLANs ................................................................................ 4-6 Configuring a listener for specific VLANs ....................................................................... 4-7 Disabling a listener for specific VLANs ............................................................................ 4-8

Configuration Guide for BIG-IP Global Traffic ManagerTM

vii

Table of Contents

5
Defining the Physical Network
Introducing physical network components .............................................................................. 5-1 Managing data centers ................................................................................................................... 5-2 Configuring data centers ..................................................................................................... 5-2 Modifying data centers ......................................................................................................... 5-3 Deleting data centers ........................................................................................................... 5-4 Enabling and disabling data centers ................................................................................... 5-4 Managing servers ............................................................................................................................ 5-5 Defining BIG-IP systems ...................................................................................................... 5-5 Defining third-party load balancing servers .................................................................... 5-9 Defining third-party host servers .................................................................................... 5-10 Searching for a specific server ......................................................................................... 5-12 Assigning monitors to servers ......................................................................................... 5-13 Specifying thresholds for availability ............................................................................... 5-13 Discovering resources automatically .............................................................................. 5-17 Managing virtual servers ............................................................................................................. 5-19 Adding virtual servers manually ....................................................................................... 5-19 Modifying virtual servers ................................................................................................... 5-20 Removing virtual servers ................................................................................................... 5-20 Managing links ............................................................................................................................... 5-21 Defining links ........................................................................................................................ 5-21 Adding and removing routers .......................................................................................... 5-22 Assigning monitors to links ............................................................................................... 5-22 Removing monitors from links ........................................................................................ 5-23 Configuring link weighting and billing properties ........................................................ 5-23

6
Defining the Logical Network
Introducing logical network components ................................................................................. 6-1 Understanding logical components ................................................................................... 6-1 Managing pools ............................................................................................................................... 6-2 Defining pools ........................................................................................................................ 6-3 Adding virtual servers to pools ......................................................................................... 6-3 Removing virtual servers from pools ............................................................................... 6-4 Organizing virtual servers within pools ........................................................................... 6-4 Weighting virtual servers within pools ............................................................................ 6-5 Disabling and enabling pools ............................................................................................... 6-7 Defining pools using a canonical name ............................................................................. 6-8 Managing wide IPs .......................................................................................................................... 6-9 Defining wide IPs ................................................................................................................... 6-9 Searching for a specific wide IP ........................................................................................ 6-10 Adding pools to wide IPs .................................................................................................. 6-11 Removing pools from wide IPs ........................................................................................ 6-12 Organizing pools within wide IPs .................................................................................... 6-12 Weighting pools within wide IPs ..................................................................................... 6-13 Disabling and enabling wide IPs ....................................................................................... 6-15 Incorporating iRules ........................................................................................................... 6-15 Implementing the NoError response for IPv6 resolution ......................................... 6-18 Managing distributed applications ............................................................................................. 6-19 Defining distributed applications ..................................................................................... 6-19 Adding wide IPs to distributed applications .................................................................. 6-20 Removing wide IPs from distributed applications ....................................................... 6-21 Setting dependencies for distributed applications ....................................................... 6-21

viii

Table of Contents

Enabling and disabling distributed application traffic ................................................... 6-23 Enabling persistent connections ...................................................................................... 6-24

7
Load Balancing with the Global Traffic Manager
Understanding load balancing on the Global Traffic Manager ............................................. 7-1 Using static load balancing modes .............................................................................................. 7-3 Drop Packet mode ............................................................................................................... 7-3 Fallback IP mode .................................................................................................................... 7-4 Global Availability mode ...................................................................................................... 7-4 None mode ............................................................................................................................ 7-4 Ratio mode ............................................................................................................................. 7-5 Return to DNS mode .......................................................................................................... 7-5 Round Robin mode ............................................................................................................... 7-5 Static Persist mode ............................................................................................................... 7-5 Topology mode ..................................................................................................................... 7-6 Using dynamic load balancing modes ......................................................................................... 7-6 Types of dynamic load balancing modes .......................................................................... 7-7 Implementing the Quality of Service load balancing mode ......................................... 7-9 Using the Dynamic Ratio option ..................................................................................... 7-12 Configuring load balancing ......................................................................................................... 7-14 Configuring load balancing methods for wide IPs ....................................................... 7-14 Configuring load balancing methods for pools ............................................................. 7-15 Using the fallback load balancing method ............................................................................... 7-16 Configuring the fallback load balancing method .......................................................... 7-16 Employing additional load balancing options .......................................................................... 7-17

8
Managing Connections
Introducing connection management ........................................................................................ 8-1 Determining resource health ...................................................................................................... 8-2 Determining resource availability ............................................................................................... 8-3 Establishing limit settings ..................................................................................................... 8-3 Using monitors to determine availability ......................................................................... 8-4 Managing dependencies for virtual servers ..................................................................... 8-7 Resuming connections to resources ........................................................................................ 8-10 Establishing persistent connections .......................................................................................... 8-11 Draining persistent requests ............................................................................................ 8-12 Setting the last resort pool ........................................................................................................ 8-13

9
Load Balancing Connection Requests Using Topologies
Overview of topologies ................................................................................................................ 9-1 Understanding topology records ...................................................................................... 9-1 Understanding user-defined regions ................................................................................. 9-4 Configuring the Global Traffic Manager to route connection requests to the c losest data center ........................................................................................................................... 9-5 Configuring Topology load balancing at the wide IP level ........................................... 9-5 Configuring Topology load balancing at the pool level ................................................ 9-7 Configuring Topology load balancing at both the wide IP and pool levels .............. 9-8 Implementing topologies ............................................................................................................ 9-10 Downloading and installing updates to the IP geolocation data ............................... 9-10 Creating a topology record .............................................................................................. 9-11

Configuration Guide for BIG-IP Global Traffic ManagerTM

ix

Table of Contents

Configuring a wide IP for Topology load balancing ..................................................... 9-12 Configuring a pool for Topology load balancing .......................................................... 9-12 Reloading default geolocation data .......................................................................................... 9-13 Removing topology records ...................................................................................................... 9-14 Disabling the Longest Match option ........................................................................................ 9-15

10
Working with DNSSEC Keys and Zones
About DNSSEC ............................................................................................................................ 10-1 Introducing DNSSEC keys and zones ...................................................................................... 10-1 Understanding DNSSEC keys .......................................................................................... 10-1 Managing DNSSEC keys ............................................................................................................. 10-4 Creating DNSSEC zone-signing and key-signing keys ................................................ 10-4 Modifying DNSSEC keys ................................................................................................... 10-6 Deleting DNSSEC keys ...................................................................................................... 10-6 Modifying generations of a DNSSEC key ...................................................................... 10-7 Performing a manual rollover of a key ........................................................................... 10-8 Managing DNSSEC zones .........................................................................................................10-11 Creating DNSSEC zones .................................................................................................10-11 Viewing the status of DNSSEC zones ..........................................................................10-12 Modifying DNSSEC zones ...............................................................................................10-12 Deleting DNSSEC zones .................................................................................................10-13 Viewing DNSSEC resource records ......................................................................................10-14

11
Configuring Monitors
Introducing monitors .................................................................................................................. 11-1 Summary of monitor types ............................................................................................... 11-2 Overview of monitor settings .......................................................................................... 11-4 Understanding pre-configured and custom monitors ................................................ 11-5 Creating a custom monitor ....................................................................................................... 11-7 Configuring monitor settings ..................................................................................................... 11-8 Simple monitors .................................................................................................................. 11-8 Extended Content Verification (ECV) monitors .......................................................11-10 External Application Verification (EAV) monitors ....................................................11-12 Special configuration considerations ......................................................................................11-35 Setting destinations ...........................................................................................................11-35 Using transparent and reverse modes .........................................................................11-35 Configuring when a virtual server is marked down ..................................................11-37 Configuring an ECV monitor to ignore a down response ......................................11-37 Associating monitors with resources ....................................................................................11-38 Types of monitor associations .......................................................................................11-38 Managing monitors .....................................................................................................................11-40 Displaying monitor settings ............................................................................................11-40 Deleting monitors .............................................................................................................11-40 Enabling and disabling monitor instances .....................................................................11-41

12
Viewing Statistics
Introducing statistics .................................................................................................................... 12-1 Accessing statistics ....................................................................................................................... 12-2 Viewing the Status Summary screen ........................................................................................ 12-3 Understanding the types of statistics ....................................................................................... 12-4

Table of Contents

Distributed application statistics ..................................................................................... 12-5 Wide IP statistics ................................................................................................................. 12-6 Pool statistics ....................................................................................................................... 12-8 Data center statistics ......................................................................................................... 12-9 Link statistics ......................................................................................................................12-10 Server statistics ..................................................................................................................12-11 Virtual server statistics ....................................................................................................12-12 Paths statistics ....................................................................................................................12-13 Local DNS statistics ..........................................................................................................12-15 Understanding persistence records .......................................................................................12-16

13
Collecting Metrics
Introducing metrics collection .................................................................................................. 13-1 Defining metrics ........................................................................................................................... 13-2 Assigning probes to local domain name systems .................................................................. 13-3 Configuring TTL and timer values ............................................................................................ 13-5 Excluding an LDNS from probes .............................................................................................. 13-6 Removing an LDNS from the address exclusion list .................................................. 13-7

14
Viewing Performance Data
Introducing performance data graphs ..................................................................................... 14-1 Viewing performance data ......................................................................................................... 14-1 About the GTM Performance graph .............................................................................. 14-1 About the GTM Request Breakdown graph ................................................................. 14-1

15
Managing iRules
Introducing iRules for the Global Traffic Manager ............................................................... 15-1 What is an iRule? ................................................................................................................. 15-1 Creating iRules .............................................................................................................................. 15-2 Assigning iRules ............................................................................................................................ 15-3 Controlling iRule evaluation ...................................................................................................... 15-4 Specifying events ................................................................................................................. 15-4 Using the when keyword .................................................................................................. 15-5 Listing iRules on wide IPs .................................................................................................. 15-5 Using statement commands ....................................................................................................... 15-6 Using wide IP commands ............................................................................................................ 15-7 Using utility commands ............................................................................................................... 15-8 Parsing and manipulating content .................................................................................... 15-8 Ensuring data integrity ....................................................................................................... 15-8 Retrieving resource information ..................................................................................... 15-9 Using protocol commands ......................................................................................................... 15-9 IP commands ......................................................................................................................15-10 TCP commands .................................................................................................................15-10 UDP commands .................................................................................................................15-10 Removing iRules .........................................................................................................................15-11

Configuration Guide for BIG-IP Global Traffic ManagerTM

xi

Table of Contents

16
Managing DNS Files with ZoneRunner
Introducing ZoneRunner ............................................................................................................ 16-1 Working with DNS and BIND ......................................................................................... 16-1 Understanding ZoneRunner tasks .................................................................................. 16-1 Working with zone files ............................................................................................................. 16-2 Types of zone files .............................................................................................................. 16-2 Creating zone files .............................................................................................................. 16-3 Importing zone files ............................................................................................................ 16-7 Searching for a specific zone ..........................................................................................16-10 Modifying zones .................................................................................................................16-10 Deleting zones ...................................................................................................................16-11 Working with resource records ............................................................................................16-12 Types of resource records .............................................................................................16-12 Creating resource records .............................................................................................16-13 Modifying a resource record ..........................................................................................16-21 Working with views ..................................................................................................................16-22 Adding views ......................................................................................................................16-23 Modifying views .................................................................................................................16-23 Deleting views ....................................................................................................................16-24 Adding zones to views .....................................................................................................16-24 Managing the named.conf file ..................................................................................................16-25

A
Working with the big3d Agent
Introducing the big3d agent .........................................................................................................A-1 Collecting path data and server performance metrics ..........................................................A-2 Setting up data collection with the big3d agent .............................................................A-3 Understanding the data collection and broadcasting sequence .................................A-3 Setting up communication between Global Traffic Manager systems and other servers ..............................................................................................................................................A-5 Setting up iQuery communications for the big3d agent ..............................................A-5 Allowing iQuery communications to pass through firewalls .....................................A-6 Communications between Global Traffic Manager systems, big3d agents, and local DNS servers .................................................................................................................A-7

B
Understanding Probes
Introducing probes ......................................................................................................................... B-1 Understanding iQuery ................................................................................................................... B-2 Determining probe responsibility ............................................................................................... B-3 Selecting a big3d agent .................................................................................................................. B-5 Designating a specific server ........................................................................................................ B-7 Managing LDNS probes ................................................................................................................ B-8 Using log entries to tune probes ..............................................................................................B-10 Enabling probe logs .............................................................................................................B-10 Understanding the probe information in the log file ..................................................B-10

Glossary Index

xii

1
Overview of the Global Traffic Manager

Introducing the Global Traffic Manager Introducing the Configuration utility Introducing the Traffic Management Shell

Overview of the Global Traffic Manager

Introducing the Global Traffic Manager


You can use the BIG-IP Global Traffic Manager system to monitor the availability and performance of global resources and use that information to manage network traffic patterns. The Global Traffic Manager uses load balancing algorithms, topology-based routing, and iRules to control and distribute traffic according to specific policies. The Global Traffic Manager is one of several products that constitute the BIG-IP product family. All products in the BIG-IP product family run on the powerful Traffic Management Operating System, commonly referred to as TMOS. F5 Networks recommends that before you configure the Global Traffic Manager, you read the following guides that are available in PDF format from the F5 Technical Support web site, https://support.f5.com. These guides are also available from the first web page you see when you log on to the administrative web server on the BIG-IP system.

BIG-IP Systems: Getting Started Guide This guide provides detailed information about installing upgrades to the BIG-IP system. It also provides information about licensing the BIG-IP system software, and connecting the system to a management workstation or network. TMOS Management Guide for BIG-IP Systems This guide contains the information you need to configure and maintain the network and system-related components for the BIG-IP system. With this guide, you can perform tasks such as configuring routes and VLANs, assigning self IP addresses, creating administrative user accounts, and managing a redundant system configuration. Configuration Guide for BIG-IP Local Traffic Manager This guide contains any information you need for configuring the BIG-IP system to manage local network traffic. With this guide, you can perform tasks such as creating virtual servers and load balancing pools, configuring application and persistence profiles, implementing health monitors, and setting up remote authentication.

The Global Traffic Manager provides a variety of features that meet special needs. For example, with this product you can: Ensure wide-area persistence by maintaining a mapping between a local domain name server (LDNS) and a virtual server in a wide IP pool Direct local clients to local servers for globally-distributed sites using Topology mode load balancing Change the load balancing configuration according to current traffic patterns or time of day Customize load balancing modes Set up global load balancing among Local Traffic Manager systems and other load balancing hosts Monitor real-time network conditions

Configuration Guide for BIG-IP Global Traffic ManagerTM

1-1

Chapter 1

Configure a content delivery network with a CDN provider Guarantee multiple port availability for e-commerce sites When you install a Global Traffic Manager system on the network, the actions you take to integrate it into the network fall into two categories: setup tasks and configuration tasks.

Setup tasks are tasks in which you create or modify settings that apply to the Global Traffic Manager itself, or that apply universally to all other configuration components, such as servers, data centers, or wide IPs that you create later. Examples of setup tasks include running the Setup utility, assigning self IP address, and enabling high-availability functions. For more information about setup tasks, see Setting up the Global Traffic Manager, on page 3-1. Configuration tasks are tasks in which you define a specific aspect of the Global Traffic Manager, such as load balancing methods, pools and pool members, or iRules. These configuration tasks, while important, only affect specific aspects of how you manage Domain Name System (DNS) traffic with the Global Traffic Manager. For more information about the components of the Global Traffic Manager that you can configure, see Configuring the Global Traffic Manager, on page 3-1.

Security features
The Global Traffic Manager offers a variety of security features that can help prevent hostile attacks on your site or equipment.

Secure administrative connections The Global Traffic Manager supports Secure Shell (SSH) administrative connections for remote administration from the command line. The web server, which hosts the web-based Configuration utility, supports SSL connections as well as user authentication. Secure iQuery communications The Global Traffic Manager supports web certificate authentication for iQuery communications between itself and other systems running the big3d agent. TCP wrappers The Global Traffic Manager supports the use of TCP wrappers to provide an extra layer of security for network connections.

Introducing Local Traffic Manager resources


If you use the Global Traffic Manager in conjunction with a Local Traffic Manager, it is important to understand the following network resources. You do not manage these resources directly through the Global Traffic Manager, but understanding their role in your network configuration can assist you in optimizing your networks availability and performance:

1-2

Overview of the Global Traffic Manager

Self IP address A self IP address is an IP address that you define on a VLAN of a BIG-IP system. Note that this concept does not apply to the management IP address of a BIG-IP system or to IP addresses on other devices. Node A node is a logical object on the BIG-IP system that identifies the IP address of a physical resource on the network, such as a web server. You define a node object in the Local Traffic Manager. For more information about nodes, see the Configuring Nodes chapter in the Configuration Guide for BIG-IP Local Traffic Manager.

Internet protocol and network management support


The Global Traffic Manager supports both the standard DNS protocol and the BIG-IP iQuery protocol (a protocol used for collecting dynamic load balancing information). The Global Traffic Manager also supports administrative protocols, such as Simple Network Management Protocol (SNMP), and Simple Mail Transfer Protocol (SMTP) (outbound only), for performance monitoring and notification of system events. For administrative purposes, you can use SSH, RSH, Telnet, and FTP. The Configuration utility supports HTTPS, for secure web browser connections using SSL, as well as standard HTTP connections. You can use the proprietary SNMP agent to monitor status and current traffic flow using popular network management tools. This agent provides detailed data such as current connections being handled by each virtual server.

System synchronization options


The synchronization feature offers a high degree of administrative control by allowing you to automatically synchronize configurations from one Global Traffic Manager to any other Global Traffic Manager or Link Controller in the network; thus, simplifying administrative management. For example, you can set the Global Traffic Manager to synchronize a specific configuration to specific systems on the network.

Configuring data collection for server status and network path data
The Global Traffic Manager includes the big3d agent, which is an integral part of its load balancing operations. The big3d agent continually monitors the availability of the servers that the Global Traffic Manager load balances. The agent also monitors the integrity of the network paths between the servers that host the domain, and the various local DNS servers that attempt to connect to the domain. The big3d agent runs on many of the F5 Networks

Configuration Guide for BIG-IP Global Traffic ManagerTM

1-3

Chapter 1

products, including the Global Traffic Manager, Local Traffic Manager, and Link Controller. Each big3d agent broadcasts its collected data to all of the Global Traffic Manager systems and Link Controller systems in your network, ensuring that all Global Traffic Manager systems work with the latest information. The big3d agent offers a variety of configuration options that allow you to choose the data collection methods you want to use. For example, you can configure the big3d agent to track the number of router hops (intermediate system transitions) along a given network path, and you can also set the big3d agent to collect host server performance information using the SNMP protocol. For further details on the big3d agent, see Appendix A, Working with the big3d Agent.

Redundant system configurations


A redundant system configuration is a set of two Global Traffic Manager systems: one operating as the active unit, the other operating as the standby unit. If the active unit goes offline, the standby unit immediately assumes responsibility for managing DNS traffic. The new active unit remains active until another event occurs that causes the unit to go offline, or you manually reset the status of each unit. The Global Traffic Manager supports two methods of checking the status of the peer system in a redundant system configuration:

Hardware-based failover In a redundant system configuration that has been set up with hardware-based failover, the two units in the system are connected to each other directly using a failover cable attached to the serial ports. The standby unit checks on the status of the active unit once every second using this serial link. Network-based failover In a redundant system configuration that has been set up with network-based failover, the two units in the system communicate with each other across an Ethernet network instead of across a dedicated failover serial cable. Using the Ethernet connection, the standby unit checks on the status of the active unit once every second. Note that network-based failover is disabled by default. For information about how to enable this feature, see Enabling high availability for network-based failover, on page 3-3.
Note

In a network-based failover configuration, the standby Global Traffic Manager immediately takes over if the active unit fails. If a client has queried the failed Global Traffic Manager, and has not received an answer, it automatically re-issues the request (after five seconds) and the standby unit, functioning as the active unit, responds.

1-4

Overview of the Global Traffic Manager

Introducing the Configuration utility


The Configuration utility is a browser-based graphical user interface that you use to configure and monitor the Global Traffic Manager. Using the Configuration utility, you can define the load balancing configuration along with the network setup, including data centers, synchronization groups, and servers used for load balancing and path probing. In addition, you can configure advanced features, such as Topology mode settings and SNMP agents. The Configuration utility also monitors network traffic, current connections, load balancing statistics, performance metrics, and the operating system itself. The Welcome screen of the Configuration utility provides convenient access to downloads such as the SNMP MIB, and documentation for third-party applications, such as ZebOS. For the most current list of the supported browsers for the Configuration utility, see the current release note on the AskF5 Knowledge Base web site, https://support.f5.com.

Introducing the Traffic Management Shell


The Traffic Management Shell (tmsh) is a utility that you can use to configure the Global Traffic Manager from the command line. Using tmsh, you can set up your network and configure local and global traffic management. In addition, you can configure advanced features, such as Topology mode settings and SNMP agents. You can also use tmsh to display information about performance, load balancing decisions, network traffic, and the operating system itself. For information about using tmsh to configure the system, see the Traffic Management Shell (tmsh) Reference Guide.

Configuration Guide for BIG-IP Global Traffic ManagerTM

1-5

Chapter 1

1-6

2
Introducing Global Traffic Manager Components

Defining Global Traffic Manager components Introducing physical network components Introducing logical network components Locating a component using the search feature

Introducing Global Traffic Manager Components

Defining Global Traffic Manager components


For the BIG-IP Global Traffic Manager system to operate effectively, you need to define the components that make up the segments of your network. These components include physical components, such as data centers and servers, as well as logical components, such as wide IPs, addresses, and pools. By defining these components, you essentially build a network map that the Global Traffic Manager can use to direct Domain Name System (DNS) traffic to the best available resource. The most basic configuration of the Global Traffic Manager includes: A listener that is a specific virtual server that identifies network traffic for global traffic management A data center that contains at least one server A server that contains at least one resource, or virtual server Once this basic configuration is complete, the Global Traffic Manager has enough information available to begin directing DNS traffic. You can increase the systems capabilities by adding additional network components as appropriate. The components that you define in the Global Traffic Manager can be divided into two basic categories: Physical components Logical components

Configuration Guide for BIG-IP Global Traffic ManagerTM

2-1

Chapter 2

Introducing physical network components


Several components that you can configure on the Global Traffic Manager system have a direct correlation to a physical location or device on the network. These components include: Data centers Servers Links Virtual servers

Data centers
Data centers are the top level of your physical network setup. You must configure one data center for each physical location in your global network. When you create a data center in the Global Traffic Manager, you define the servers (Global Traffic Manager systems, Local Traffic Manager systems, Link Controller systems, hosts, and routers) that reside at that location. A data center can contain any type of server. For example, one data center can contain a Global Traffic Manager and a host, while another might contain two Global Traffic Manager systems and eight Local Traffic Manager systems.
Important

The data center name is limited to 63 characters. For information about configuring data centers, see Managing data centers, on page 5-2.

Servers
A server is a physical device on which you can configure one or more virtual servers. The servers that you define for the Global Traffic Manager to manage can include both BIG-IP systems and third-party servers, for example, Local Traffic Manager systems and Windows 2000 Servers. One server that you must define is the Global Traffic Manager. This places the system on the network map. You can also define Local Traffic Manager systems, and the virtual servers that these servers manage.
Important

The server name is limited to 63 characters. For information about configuring servers, see Managing servers, on page 5-5.

2-2

Introducing Global Traffic Manager Components

Links
A link is a logical representation of a physical device (router) that connects your network to the Internet. You can assign multiple links to each data center by logically attaching links to a collection of servers in order to manage access to your data sources. Configuring links is optional, although they are very useful when determining resource availability.
Important

The link name is limited to 63 characters. For information about configuring links, see Managing links, on page 5-21.

Virtual servers
Servers, excluding Global Traffic Manager systems and Link Controller systems, contain at least one virtual server. A virtual server, in the context of the Global Traffic Manager, is a combination of an IP address and a port number that points to a resource that provides access to an application or data source on your network. In the case of host servers, this IP address and port number likely point to the resource itself. With load balancing systems, such as the Local Traffic Manager, these virtual servers are often proxies that allow the load balancing server to manage the resource request across a multitude of resources. Virtual servers are the ultimate destination for connection requests.
Important

The virtual server name is limited to 63 characters. For information about configuring virtual servers, see Managing virtual servers, on page 5-19.

Configuration Guide for BIG-IP Global Traffic ManagerTM

2-3

Chapter 2

Introducing logical network components


In addition to the physical components of your network, the Global Traffic Manager also handles DNS traffic over logical components. Logical network components consist of network elements that may not represent a physical location or device. These components include: Listeners Pools Wide IPs Distributed applications

Listeners
To communicate with the rest of your network, you must configure the Global Traffic Manager so that it can correctly identify the resolution requests for which it is responsible. A listener is an object that monitors the network for DNS queries, and thus is critical for global traffic management. The listener instructs the system to monitor the network traffic destined for a specific IP address. In most installations, when you define a listener for the Global Traffic Manager, you use the IP address of the Global Traffic Manager; however, there are many different ways you can configure listeners so that the system handles DNS traffic correctly. For more information on configuring listeners, see Chapter 4, Working with Listeners.

Pools
A pool is a collection of virtual servers that can reside on multiple network servers. When you define the virtual servers to which the Global Traffic Manager directs DNS traffic, you combine those virtual servers into pools. You can then configure the Global Traffic Manager to direct traffic to a specific virtual server within a pool, using a specific load balancing method. You can apply a different set of options to the same resources as a virtual server. When you add a virtual server to a pool, it becomes a pool member to which you can apply monitors, iRules, and other configuration options.
Important

The pool name is limited to 63 characters. For more information about configuring pools and pool members, see Defining pools, on page 6-3.

2-4

Introducing Global Traffic Manager Components

Wide IPs
One of the most common logical components you create in the Global Traffic Manager is a wide IP. A wide IP maps a fully-qualified domain name to one or more pools of virtual servers that host the domains content. When an LDNS requests a connection to a specific domain name, the wide IP definition specifies which pools of virtual servers are eligible to answer the request, and which load balancing modes to use in choosing a pool. The Global Traffic Manager then load balances the request across the virtual servers within that pool to resolve the request. For information about configuring wide IPs, see Managing wide IPs, on page 6-9.

Distributed applications
A distributed application is a collection of one or more wide IPs, data centers, and links that serve as a single application to a web site visitor. A distributed application is the highest-level component that the Global Traffic Manager supports. You can configure the Global Traffic Manager so that the availability of distributed applications is dependent on a specific data center, link, or server. For example, if the New York data center goes offline, this information causes the wide IP and its corresponding distributed application to become unavailable. Consequently, the system does not send resolution requests to any of the distributed application resources, until the entire application becomes available again. For more information about configuring distributed applications, see Managing distributed applications, on page 6-19.

Configuration Guide for BIG-IP Global Traffic ManagerTM

2-5

Chapter 2

Locating a component using the search feature


The Global Traffic Manager has a search feature that allows you to search for a specific component or group of components that you want to manage or configure. The search feature can be especially useful for companies with large networks that contain numerous physical and logical components as defined earlier in this chapter. You can find the search feature on the main screen for each type of component. When the main screen opens, an asterisk displays in the box next to the Filter button, and the list of components that displays below the box includes all of the components of that type. You use the search feature to limit the number of components that display in the list. When you use the search feature, the system always does a wildcard search. For example, when you search for a wide IP, you can use the search criteria www.do, and the system returns wide IPs with names that include those characters, such as www.domain.net and www.domain2.net. Additionally, you can use wildcard characters in your search criteria; however, in this case, the system tries to match the search pattern exactly. For example, if you search for wide IPs using *www.do, the system does not return the wide IPs www.domain.net and www.domain2.net, because the search pattern has the wildcard character on its left side. The system matches only wide IPs with names ending with www.do.
Note

If you do not specify at least one wildcard character in a search pattern, the Global Traffic Manager automatically adds a wildcard character to each side of the search pattern; therefore, the search patterns www.do and *www.do* return the same results.

2-6

3
Setting Up and Configuring the Global Traffic Manager

Setting up the Global Traffic Manager Configuring the Global Traffic Manager

Setting Up and Configuring the Global Traffic Manager

Setting up the Global Traffic Manager


After you install the BIG-IP Global Traffic Manager, you should run the Setup utility. This utility guides you through licensing the product, assigning an IP address to the management port of the system, and configuring the passwords for your root and administrator accounts. The Setup utility can also assist you in configuring some of the basic settings of the Global Traffic Manager, such as its IP address and the VLAN to which it belongs. After you finish using the Setup utility, the next step is to configure the network and system settings that apply to the Global Traffic Manager. Because these settings have a variety of applications, they are discussed in a separate guide: the TMOS Management Guide for BIG-IP Systems. F5 Networks recommends that you review this guide to ensure that you configure the basic network and system settings in a way that best fits the needs of your network and your Domain Name System (DNS) traffic. You can access this guide by visiting the F5 Technical Support web site: https://support.F5.com.

Configuring the Global Traffic Manager


Once you have the basic network settings configured, you can work on configuring the Global Traffic Manager itself. Specifically, you complete the following tasks: Define the Global Traffic Manager For more information, see Defining the Global Traffic Manager, on page 3-2. Establish system communications For more information, see Establishing system communications, on page 3-4. Configure synchronization settings For more information, see Configuring synchronization settings, on page 3-9. Configure auto-discovery For more information, see Configuring auto-discovery, on page 3-14. Configure global monitoring options For more information, see Configuring global monitor settings, on page 3-15. Configure domain validation For more information, see Configuring domain validation, on page 3-18. Once you complete these tasks, you are ready to work on the configuration tasks that allow your network to get the full benefit of the features of the Global Traffic Manager.

Configuration Guide for BIG-IP Global Traffic ManagerTM

3-1

Chapter 3

Defining the Global Traffic Manager


The Global Traffic Manager is designed to manage DNS traffic as it moves from outside the network, to the appropriate resource, and back again. The management capabilities of the system require that it has an accurate definition of the sections of the network over which it has jurisdiction. You must define network elements such as data centers, servers (including BIG-IP systems), and virtual servers in the Global Traffic Manager. Defining these elements is similar to drawing a network diagram; you must include all of the relevant components in such a diagram in order to have an accurate depiction of how the system works as a whole. When you configure a Global Traffic Manager to communicate with other BIG-IP systems, the IP addresses of the system servers must reside within the default route domain on the BIG-IP system. Otherwise, the Global Traffic Manager cannot communicate with those systems. For more information about configuring route domains, see the TMOS Management Guide for BIG-IP Systems.
Note

In existing version 9.x systems, by default, the IP addresses of the system servers are in the default route domain. As part of specifying this network topology, you must configure the Global Traffic Manager itself, as described in Defining the current Global Traffic Manager, on page 5-6. You specify the role of the Global Traffic Manager within the network, as well as what interactions it can and cannot have with other network components. Without this configuration, many of the capabilities of the Global Traffic Manager cannot operate effectively. Additionally, if you are defining a Global Traffic Manager redundant system configuration that uses network-based failover, you must manually enable high availability on both Global Traffic Manager systems, as described in Enabling high availability for network-based failover, on page 3-3. Before you define a Global Traffic Manager, you must first specify the data center in which it resides. This step is important because all network components that the system manages must belong to a data center. For more information, see Configuring data centers, on page 5-2.

To create a data center


1. On the Main tab of the navigation pane, expand Global Traffic and click Data Centers. The main screen for data centers opens. 2. Click the Create button. The New Data Center screen opens 3. Specify settings for the new data center. For additional assistance with these settings, see the online help. 4. Click the Finished button.

3-2

Setting Up and Configuring the Global Traffic Manager

To define the Global Traffic Manager


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the Create button. The New Server screen opens. 3. In the Name box, type a name that identifies the Global Traffic Manager. 4. From the Product list, select the appropriate server product. If the server is composed of a single physical system, select BIG-IP System (Single). If the system is a redundant system configuration, select BIG-IP System (Redundant). 5. Add IP addresses to the Address List. For BIG-IP System (Single), type the self IP address in the Address box, and then click Add. For BIG-IP System (Redundant), type the self IP address in the Address box, and then click Add. Then, add the self IP address of the backup system to the Peer Address List, by typing the self IP address in the Address box, and then click Add. Note: You can add more than one address to any given server, depending on how that server interacts with the rest of your network. However, you must use a self IP address when you define a Global Traffic Manager. You cannot use the management IP address of the system. 6. From the Data Center list, select a data center to which the Global Traffic manager belongs. For additional information, see Managing data centers, on page 5-2. 7. Configure the remaining server settings. For additional assistance with these settings, see the online help. 8. Click the Create button to create the new server.

Enabling high availability for network-based failover


A redundant system configuration is a set of two Global Traffic Manager systems: one operating as the active unit, the other operating as the standby unit. If the active unit goes offline, the standby unit immediately assumes responsibility for managing DNS traffic. The new active unit remains active until another event occurs that causes the unit to go offline, or until you manually reset the status of each unit. The Global Traffic Manager supports two methods of checking the status of the peer system in a redundant system configuration:

Configuration Guide for BIG-IP Global Traffic ManagerTM

3-3

Chapter 3

Hardware-based failover In a redundant system configuration that has been set up with hardware-based failover, the two units in the system are connected to each other directly using a failover cable attached to the serial ports. The standby unit checks on the status of the active unit once every second using this serial link. Network-based failover In a redundant system configuration that has been set up with network-based failover, the two units in the system communicate with each other across an Ethernet network instead of across a dedicated failover serial cable. Using the Ethernet connection, the standby unit checks on the status of the active unit once every second. In a network-based failover configuration, if a client queries a failed Global Traffic Manager, and does not receive an answer, the client automatically re-issues the request (after five seconds), and the standby unit, functioning as the active unit, responds. Network-based failover is disabled by default. To enable high availability on both units in the redundant system configuration, use the tmsh command sequence: tmsh run / util bigpipe daemon gtmd running enable Important: If you remove provisioning for a Global Traffic Manager, and you want to re-enable high availability for network-based failover after you re-provision the Global Traffic Manager, you must run the tmsh command sequence again.

For more information about provisioning a Global Traffic Manager, see the TMOS Management Guide for BIG-IP Systems. For specific information about using tmsh commands to configure the system, see the Traffic Management Shell (tmsh) Reference Guide.

Establishing system communications


Before the Global Traffic Manager can operate as an integrated component within your network, you must first establish how it can communicate with other external systems. An external system is any server with which the Global Traffic Manager must exchange information to perform its functions. In general, system communications are established for the purpose of: Communicating with other BIG-IP systems Communicating with third-party systems When the Global Traffic Manager communicates with other BIG-IP systems, such as Local Traffic Manager systems or Link Controller systems, it uses a proprietary protocol called iQuery to send and receive information. If the Global Traffic Manager is communicating with another BIG-IP system, it uses the big3d utility to handle the communication traffic.

3-4

Setting Up and Configuring the Global Traffic Manager

If the Global Traffic Manager is instead communicating with another Global Traffic Manager, it uses a different utility, called gtmd, which is designed for that purpose. Part of the process when establishing communications between the Global Traffic Manager and other BIG-IP systems is to open port 22 and port 4353 between the two systems. Port 22 allows the Global Traffic Manager to copy the newest version of the big3d utility to existing systems, while iQuery requires the port 4353 for its normal communications. In order for other BIG-IP systems to communicate with Global Traffic Manager, F5 Networks recommends that you update the big3d utility on older BIG-IP systems by running the big3d_install script from Global Traffic Manager. For more information about running the big3d_install script, see Installing the big3d agent, on page A-3, and SOL8195 on AskF5.com.
Note

The Global Traffic Manager supports web certificate authentication for iQuery communications between itself and other systems running the big3d agent. Table 3.1 lists the requirements for each communication component between the Global Traffic Manager and other BIG-IP systems.
Communication Component Ports Requirements Port 22, for secure file copying of entities like big3d. Port 4353, for iQuery communication. Utilities big3d, for Global Traffic Manager to BIG-IP system communication. iQuery

Protocols

Table 3.1 Requirements for communication components (BIG-IP system) When the Global Traffic Manager communicates with third-party systems, whether that system is a load balancing server or a host, it can use SNMP to send and receive information. For details on how the Global Traffic Manager uses SNMP, see the TMOS Management Guide for BIG-IP Systems.

Configuration Guide for BIG-IP Global Traffic ManagerTM

3-5

Chapter 3

Table 3.2 lists the requirements for each communication component between the big3d agent and other external systems.
Communication Component Ports Protocols Requirements Port 161 SNMP

Table 3.2 Requirements for communication components (third-party systems) When you configure the Global Traffic Manager to communicate with external systems, you must complete one or more of the following tasks: Define the systems in the Global Traffic Manager. This task applies regardless of whether the system is a BIG-IP system, or a third-party system. Run the gtm_add utility. This utility is designed for situations in which you are installing the system in a network that already has one or more Global Traffic Manager systems running. Run the big3d_install utility. This utility ensures that the Global Traffic Manager and other BIG-IP systems use the same version of the big3d utility, and establishes that these systems are authorized to exchange information. Run the bigip_add utility. If you are certain that the other BIG-IP systems on the network use the same version of the big3d utility as the Global Traffic Manager, you can run the bigip_add utility instead of the big3d_install utility. The bigip_add utility authorizes communications between the Global Traffic Manager and other BIG-IP systems on the network.

Defining the systems in the Global Traffic Manager


As described in Defining the Global Traffic Manager, on page 3-2, the Global Traffic Manager needs to have information on the different systems with which it interacts when managing DNS traffic. These systems include other Global Traffic Manager systems, BIG-IP systems, and third-party systems. When you configure a Global Traffic Manager, you must add these systems into the configuration for the Global Traffic Manager to communicate with these systems. For information about defining these systems, see Managing servers, on page 5-5.

Running the gtm_add utility


If you are integrating a new Global Traffic Manager into a Global Traffic Manager synchronization group on your network, you must run the gtm_add utility on the new device. When you run this utility, you specify

3-6

Setting Up and Configuring the Global Traffic Manager

the self IP address of an existing Global Traffic Manager in the synchronization group from which you want the new device to acquire configuration files. The utility accesses the specified system and copies its configuration files to the new Global Traffic Manager. The gtm_add script acquires all configuration files, including SSL certificates. As a result, it is ideal for acquiring SSL certificates for a new Global Traffic Manager.

Configuration Guide for BIG-IP Global Traffic ManagerTM

3-7

Chapter 3

To run the gtm_add utility


1. Log on to the command-line interface for the system that hosts the new Global Traffic Manager. 2. At the command prompt, type the following command:
gtm_add <Global Traffic Manager IP address>

The utility logs on to the specified Global Traffic Manager and acquires its configuration files, including relevant SSL certificates.

You can now add the Global Traffic Manager to the appropriate synchronization group, as described in Creating synchronization groups, on page 3-13.

Running the bigip_add utility


If your network includes existing BIG-IP systems, such as Local Traffic Manager systems, and this is the first Global Traffic Manager you are connecting to the network, you must establish a communication between the new device and the existing systems. If all of the existing BIG-IP systems use the same version of the big3d agent that comes with the new Global Traffic Manager, you run the bigip_add utility. This utility exchanges SSL certificates so that each system is authorized to communicate with each other.
Note

If the existing BIG-IP systems use an older version of the big3d agent than the one that comes with the new Global Traffic Manager you are connecting to the network, you must instead run the big3d_install utility. For more information, see Running the big3d_install utility, following.

To run the bigip_add utility


1. Log on to the command-line interface for the system that hosts the new Global Traffic Manager. 2. At the prompt, type the following command:
bigip_add <IP address of existing BIG-IP systems>

3. Press the Enter key. The utility exchanges the appropriate SSL certificates, and authorizes communications between the systems. You can now add the Global Traffic Manager to the appropriate synchronization group, as described in Creating synchronization groups, on page 3-13.

3-8

Setting Up and Configuring the Global Traffic Manager

Running the big3d_install utility


If your network includes existing BIG-IP systems, such as Local Traffic Manager systems, which are of an earlier version than the first Global Traffic Manager you are connecting to the network, you must run the big3d_install utility to establish a communication between the new device and the existing systems. When you run the big3d_install utility, it connects to each existing BIG-IP system, extracts the IP addresses of the devices, and automatically updates the big3d agents on all the devices. If you specify IP addresses when you run the utility, it connects to the system associated with each IP address, and prompts you to supply the appropriate logon information to access that system.
Note

The big3d_install utility modifies the big3d agent that is already present on existing BIG-IP systems.

To run the big3d_install utility


1. Log on to the command-line interface for the system that hosts the new Global Traffic Manager. 2. At the prompt, type one of the following commands: big3d_install big3d_install <IP addresses of existing BIG-IP systems> 3. Press the Enter key. The utility connects to each existing BIG-IP system, extracts the IP addresses of the devices, exchanges the appropriate SSL certificates, authorizes communications between the systems, and automatically updates the big3d agents on all the devices. You can now add the Global Traffic Manager to the appropriate synchronization group, as described in Creating synchronization groups, on page 3-13.

Configuring synchronization settings


The primary goal of the Global Traffic Manager is to ensure that name resolution requests are sent to the best available resource on the network. Consequently, it is typical for multiple Global Traffic Manager systems to reside in several locations within a network. For example, a standard installation might include a Global Traffic Manager at each data center within an organization. When an LDNS submits a name resolution request, you cannot control to which Global Traffic Manager the request is sent. As a result, you often want multiple Global Traffic Manager systems to share the same configuration values, and maintain those configurations over time.

Configuration Guide for BIG-IP Global Traffic ManagerTM

3-9

Chapter 3

In network configurations that contain more than one Global Traffic Manager, synchronization means that each Global Traffic Manager regularly compares the timestamps of its configuration files with the timestamps of configuration files on other Global Traffic Manager systems. If a Global Traffic Manager determines that its configuration files are older than those on another system, it acquires the newer files and begins using them to load balance name resolution requests. With synchronization, you can change settings on one system and have that change distributed to all other systems. You can separate the Global Traffic Manager systems on your network into separate groups, called synchronization groups. A synchronization group is a collection of multiple Global Traffic Manager systems that share and synchronize configuration settings. These groups are identified by a synchronization group name, and only systems that share this name also shares configuration settings. These synchronization groups allow you to customize the synchronization behavior. For example, the Global Traffic Manager systems residing in data centers in Europe might belong to one synchronization group, while the systems in North America belong to another group. The following pages provide additional information on synchronization, and specifically cover the following topics: Defining servers Activating synchronization Controlling file synchronization Synchronizing DNS zone files Creating synchronization groups

Defining NTP servers


Before you can synchronize Global Traffic Manager systems, you must define the Network Time Protocol (NTP) servers that the Global Traffic Manager references. These servers ensure that each Global Traffic Manager is referencing the same time when verifying timestamps for configuration files. If you have already used the TMOS Management Guide for BIG-IP Systems, you may have already configured a list of NTP servers for the Global Traffic Manager. If you have not yet done so, you can find detailed information on configuring these settings in that guide.

Activating synchronization
Activating synchronization for the Global Traffic Manager has an immediate effect on its configurations, provided that another Global Traffic Manager is already available on the network. F5 Networks recommends that you activate synchronization only after you have finished configuring one of the systems.

3 - 10

Setting Up and Configuring the Global Traffic Manager

To activate synchronization
1. On the Main tab of the navigation pane, expand System and then click Configuration. The general properties screen opens. 2. From the Global Traffic menu, choose General. The general global properties screen opens. 3. Check the Synchronization box. 4. Click the Update button to save your changes.

Controlling file synchronization


When you synchronize multiple Global Traffic Manager systems, you are instructing each system to share its configuration files with the other systems on the network. These files are synchronized based on their timestamp: if a Global Traffic Manager determines that its configuration files are older than those on another system, it acquires the newer files and begins using them to load balance name resolution requests. By default, the value for the synchronization time tolerance is set to 10 seconds. The minimum value you can set for this value is 5 seconds, while the maximum you can set is 600 seconds. The time tolerance specifies how many seconds of difference there can be between the time settings on the Global Traffic Manager systems in a synchronization group. The lower the value of the Synchronization Time Tolerance setting, the more often the local system makes an entry in the log indicating that there is a difference in the time settings of the systems in the synchronization group.
Note

If you are using NTP to synchronize the time of the Global Traffic Manager with a time server, leave the Synchronization Time Tolerance setting at the default value of 10. In the event that NTP fails, the Global Traffic Manager uses the time_tolerance variable to maintain synchronization.

Configuration Guide for BIG-IP Global Traffic ManagerTM

3 - 11

Chapter 3

To specify a value for synchronization time tolerance


1. On the Main tab of the navigation pane, expand System and then click Configuration. The general properties screen opens. 2. From the Global Traffic menu, choose General. The general global properties screen opens. 3. Check the Synchronization box. 4. In the Synchronization Time Tolerance box, type the maximum number of seconds that the time setting on one system is allowed to be out of synchronization with the time setting on another system that is in the same synchronization group. 5. Click the Update button to save your changes.

In the event that you need to deactivate file synchronization, you can do so at any time. Situations in which you want to disable synchronization include updating the data center in which the Global Traffic Manager resides, or when you are testing a new configuration change.

To deactivate file synchronization


1. On the Main tab of the navigation pane, expand System and then click Configuration. The general properties screen opens. 2. From the Global Traffic menu, choose General. The general global properties screen opens. 3. Clear the Synchronization box. 4. Click the Update button to save your changes.

3 - 12

Setting Up and Configuring the Global Traffic Manager

Synchronizing DNS zone files


During synchronization operations, the Global Traffic Manager verifies that it has the latest configuration files available and, if it does not, the Global Traffic Manager downloads the newer files from the appropriate system. You can expand the definition of the configuration files to include the DNS zone files used to respond to name resolution requests by using the Synchronize DNS Zone Files setting. This setting is enabled by default.

To synchronize DNS zone files


1. On the Main tab of the navigation pane, expand System and then click Configuration. The general properties screen opens. 2. From the Global Traffic menu, choose General. The general global properties screen opens. 3. Check the Synchronize DNS Zone Files box. 4. Click the Update button to save your changes.

It is important to note that when a Global Traffic Manager is a member of a synchronization group, the configuration of each Global Traffic Manager in the group automatically synchronizes with the group member that has the newest user configuration set (UCS). Therefore, if you roll back the configuration of a member of the synchronization group to a UCS that contains DNS configuration files that are dated earlier than the same file on another system in the group, the system that you roll back synchronizes with that other system, effectively losing the configuration to which it was rolled back. You can stop the automatic synchronization of the DNS files by clearing the Synchronize DNS Zone Files box on the system before you roll it back to an earlier configuration.

Creating synchronization groups


Each Global Traffic Manager that you synchronize must belong to a specific group of systems, called a synchronization group. A synchronization group is a collection of multiple Global Traffic Manager systems that share and synchronize configuration settings. Initially, when you enable synchronization for a Global Traffic Manager, the system belongs to a synchronization group called default. However, you can create new groups at any time to customize the synchronization process, ensuring that only certain sets of Global Traffic Manager systems share configuration values. To illustrate how synchronization groups work, consider the fictional company, SiteRequest. SiteRequest has decided to add a new data center in Los Angeles. As part of bringing this data center online, SiteRequest has decided that it wants the Global Traffic Manager systems installed in New York and in Los Angeles to share configurations, and the Paris and Tokyo data centers to share configurations. This setup exists because SiteRequests network optimization processes require slightly different settings within the United States than the rest of the world. To accommodate this new network
Configuration Guide for BIG-IP Global Traffic ManagerTM 3 - 13

Chapter 3

configuration, SiteRequest enables synchronization for the New York and Los Angeles data centers, and assigns them a synchronization group name of United States. The remaining data centers are also synchronized, but with a group name of Rest Of World. As a result, a configuration change at the Paris Global Traffic Manager immediately modifies the Tokyo system, but does not affect the systems in the United States.

To create a synchronization group


1. On the Main tab of the navigation pane, expand System and then click Configuration. The general properties screen opens. 2. From the Global Traffic menu, choose General. The general global properties screen opens. 3. In the Synchronization Group Name box, type a name of either an existing synchronization group, or a new group. Note: When you change the name of a synchronization group, the new name is synchronized to all systems that belong to that synchronization group. 4. Click the Update button to save your changes.

Configuring auto-discovery
A large network may consist of hundreds of virtual servers. Keeping track of these virtual servers can be a time-consuming process itself. The Global Traffic Manager includes a means of simplifying the addition of new virtual servers into a network: auto-discovery. Auto-discovery is a process through which the Global Traffic Manager automatically identifies resources that it manages. The Global Traffic Manager can discover two types of resources: virtual servers and links. Each resource is discovered on a per-server basis, so you can employ auto-discovery only on the servers you specify. The auto-discovery feature of the Global Traffic Manager has three modes that control how the system identifies resources. These modes are: Disabled In this mode, the Global Traffic Manager does not attempt to discover any resources. Auto-discovery is disabled on the Global Traffic Manager by default. Enabled In this mode, the Global Traffic Manager regularly checks the server to discover any new resources. If a previously-discovered resource cannot be found, the Global Traffic Manager deletes it from the system.

3 - 14

Setting Up and Configuring the Global Traffic Manager

Enabled (No Delete) In this mode, the Global Traffic Manager constantly checks the server to discover any new resources. Unlike the Enabled mode, the Enabled (No Delete) mode does not delete resources, even if the system cannot currently verify their presence. If you want to use the auto-discovery feature, you must globally enable the feature and configure the frequency at which the system queries for new resources in the general properties screen. When enabled, by default, the system queries servers for new resources every 30 seconds.
Important

You must also enable auto-discovery at both the server and link levels. For information about enabling auto-discovery on virtual servers and links, see Discovering resources automatically, on 5-17.

To globally enable the auto-discovery feature and configure the auto-discovery frequency
1. On the Main tab of the navigation pane, expand System and click Configuration. The general properties screen opens. 2. From the Global Traffic menu, choose General. The general global properties screen opens. 3. Check the Auto-Discovery check box. 4. In the Auto-Discovery Request Interval box, type the frequency at which you want the system to attempt to discover new resources. 5. Click the Update button to save your changes.

Configuring global monitor settings


As you employ the Global Traffic Manager to load balance DNS traffic across different network resources, you must acquire information on these resources. You acquire this information by applying monitors to each resource. A monitor is a component of the Global Traffic Manager that tests to see if a given resource responds as expected. These tests can range from verifying that a connection to the resource is available, to conducting a database query. The Global Traffic Manager uses the information it gathers from monitors not only to inform you of what resources are available, but to determine which resource is the best candidate to handle incoming DNS requests. For detailed information on monitors and the Global Traffic Manager, see Chapter 11, Configuring Monitors. In most cases, you apply specific monitors to resources, depending on the type of resource and its importance. However, the following Global Traffic Manager settings affect all monitors:

Configuration Guide for BIG-IP Global Traffic ManagerTM

3 - 15

Chapter 3

Heartbeat Interval Indicates how often the Global Traffic Manager communicates with other BIG-IP systems on the network. Maximum Synchronous Monitor Requests Indicates how many monitors can query a resource at any given time. Monitor Disabled Objects Indicates whether monitors continue to check the availability of a resource that you disabled through the Global Traffic Manager. While monitors supply information you need to ensure that network traffic moves efficiently across the network, they do so at the cost of increasing that network traffic. These settings allow you to control this increase.

Configuring a heartbeat interval


In daily operations, the Global Traffic Manager frequently acquires much of its network data from other BIG-IP systems that you employ, such as Local Traffic Manager systems. For example, the Local Traffic Manager system monitors the resources it manages. When the Global Traffic Manager requires this same information for load balancing DNS requests, it can query the Local Traffic Manager, instead of each resource itself. This process ensures that the system efficiently acquires the information it needs. Because the Global Traffic Manager queries other BIG-IP systems to gather information, you can configure the frequency at which these queries occur, by configuring the Heartbeat Interval setting. Based on the value you specify for this setting, the Global Traffic Manager queries other BIG-IP systems more or less often. F5 Networks recommends the default value of 10 seconds for this setting; however, you can configure this setting to best suit the configuration of your network.
Tip

F5 Networks recommends that, when configuring resource monitors, you ensure that the frequency at which the monitor attempts to query a resource is greater than the value of the Heartbeat Interval setting. Otherwise, the monitor might acquire out-of-date data during a query. For more information about configuring monitors, see Chapter 11, Configuring Monitors.

To specify a value for the Heartbeat Interval setting


1. On the Main tab of the navigation pane, expand System and then click Configuration. The general properties screen opens. 2. From the Global Traffic menu, choose General. The general global properties screen opens. 3. In the Heartbeat Interval box, type the frequency at which you want the system to attempt to discover new resources. 4. Click the Update button to save your changes.

3 - 16

Setting Up and Configuring the Global Traffic Manager

Limiting the number of synchronous monitor queries


Another aspect of resource monitoring that you want to control is how many monitors can query a resource at any given time. Network resources often serve many different functions at the same time and it is likely you want more than one monitor checking the availability of these resources in different ways. You might monitor a single resource, for example, to verify that the connection to the resource is available, that you can reach a specify HTML page on that resource, and that a database query returns an expected result. If this resource is used in more than one context, you might have many more monitors assigned to it, each one performing an important check to ensure the availability of the resource. While these monitors are helpful in determining availability, it is equally helpful to control how many monitors can query a resource at any given time. This control ensures that monitor requests are more evenly distributed during a given period of time.

To specify the number of synchronous monitor requests


1. On the Main tab of the navigation pane, expand System and then click Configuration. The general properties screen opens. 2. From the Global Traffic menu, choose General. The general global properties screen opens. 3. In the Maximum Synchronous Monitor Requests box, type the number of queries that resources can accept from monitors at any given time. F5 Networks recommends the default value of 20 requests. 4. Click the Update button to save your changes.

Monitoring disabled resources


One of the ways in which a given network resource becomes unavailable during the load balancing of DNS traffic occurs when you manually disable the resource. You might disable a resource because you are upgrading its server, or because you are modifying the resource itself and need to remove it temporarily from service. You can control whether the Global Traffic Manager monitors these disabled resources. In some network configurations, for example, you might want to continue monitoring these resources when you put them offline.
Note

By default, the Monitor Disabled Objects setting is disabled for the Global Traffic Manager. F5 Networks recommends that you enable it only if you are certain you want the Global Traffic Manager to continue monitoring resources that you have manually disabled.

Configuration Guide for BIG-IP Global Traffic ManagerTM

3 - 17

Chapter 3

To monitor disabled resources


1. On the Main tab of the navigation pane, expand System and then click Configuration. The general properties screen opens. 2. From the Global Traffic menu, choose General. The general global properties screen opens. 3. Check the Monitor Disabled Objects box. 4. Click the Update button to save your changes.

Configuring domain validation


The Global Traffic Manager handles traffic using DNS and BIND to translate domain names into IP addresses. By configuring the Domain Validation setting, you can specify which domain names the Global Traffic Manager recognizes. You can configure the system so that it accepts all domain names, or you can restrict the use of certain characters in domain names.

To configure domain validation


1. On the Main tab of the navigation pane, expand System and then click Configuration. The general properties screen opens. 2. From the Global Traffic menu, choose General. The general global properties screen opens. 3. From the Domain Validation list, select how the Global Traffic Manager validates domain names: None Specifies that the system does not restrict the use of any characters in domain names. Strict Specifies that the system allows only the most narrow interpretation of DNS names; that is, alphanumeric characters and the dash ( - ) character. Allow Underscores Specifies that the system follows the Strict validation rules, and also allows the underscore ( _ ) character. 4. Click the Update button to save your changes.

3 - 18

4
Working with Listeners

Introducing listeners Creating a listener for local resolution Configuring listeners for traffic forwarding Configuring a wildcard listener Modifying listeners Deleting listeners Using listeners with VLANs

Working with Listeners

Introducing listeners
Before you can fully configure the Global Traffic Manager to handle name resolution requests, you must determine how you want the system to integrate with the existing network. Specifically, you must identify what network traffic you want the Global Traffic Manager to handle and how. In general, the system performs global traffic management in two ways:

Node mode The Global Traffic Manager receives the traffic, processes it locally, and sends the appropriate Domain Name System (DNS) response back to the querying server. Bridge or Router mode The Global Traffic Manager receives the traffic and forwards it; either to another part of the network or another DNS server.

To control how the Global Traffic Manager handles network traffic, you configure one or more listeners. A listener is a specialized resource to which you assign a specific IP address and port 53, the DNS query port. When traffic is sent to that IP address, the listener alerts the Global Traffic Manager, allowing it to either handle the traffic locally or forward the traffic to the appropriate resource.
Tip

If you are familiar with the Local Traffic Manager, it might be helpful to consider a listener as a specialized type of virtual server that is responsible for handling traffic for the Global Traffic Manager.
Note

If you configure user accounts on the Local Traffic Manager, you can assign listeners, like other virtual servers, to specific partitions. However, because listeners play an important role in global traffic management, F5 Networks recommends that you assign all listeners to partition Common. You control how the Global Traffic Manager responds to network traffic on a per-listener basis. For example, a single Global Traffic Manager can be the authoritative server for one domain, while forwarding other requests to a separate DNS server. Regardless of how many listeners you configure, the system manages and responds to requests for the wide IPs that are configured on it. To further illustrate how you configure listeners to control how the Global Traffic Manager responds to DNS traffic, consider the fictional company SiteRequest. At this company, a Global Traffic Manager is being integrated into a network with the following characteristics: A DNS server already exists at IP address 10.2.5.37. There are two VLANs, named external and guests. There are two wide IPs: www.siterequest.com and downloads.siterequest.com.

Configuration Guide for BIG-IP Global Traffic ManagerTM

4-1

Chapter 4

Once integrated into the network, the Global Traffic Manager is responsible for the following actions: Managing and responding to requests for the wide IPs Forwarding other DNS traffic to the existing DNS server Forwarding any traffic from the guests VLAN to the rest of the network To implement this configuration, the Global Traffic Manager requires three listeners: A listener with an IP address that is the same as the self IP address of the Global Traffic Manager. This listener allows the system to manage DNS traffic that pertains to its wide IPs. A listener with an IP address of 10.2.5.37, the IP address of the existing DNS server. This listener allows the system to forward incoming traffic to the existing DNS server. A wildcard listener enabled on the guests VLAN. This listener allows the Global Traffic Manager to forward traffic sent from the guests VLAN to the rest of the network. As you can see from this example, the role that the Global Traffic Manager plays in managing DNS traffic varies depending on the listener through which the traffic arrives. As a result, the Global Traffic Manager becomes a flexible system for managing DNS traffic in a variety of ways.

4-2

Working with Listeners

Creating a listener for local resolution


Often, when you add a Global Traffic Manager to your network, you want the system to respond to at least a subset of your incoming DNS requests. You can configure the system to direct the requests to the wide IPs that are configured on the Global Traffic Manager; however, you can also configure the system to respond to DNS requests for other network resources that are not associated with a wide IP, such as other DNS servers. When a Global Traffic Manager is responsible for managing and responding to DNS traffic locally, it is operating in Node mode. In this situation, you create a listener that corresponds to an IP address on the system. If the Global Traffic Manager operates as a standalone unit, this IP address is the self IP address of the system. If the Global Traffic Manager is part of a redundant system configuration for high availability purposes, this IP address is the floating IP address that belongs to both systems.

To configure a listener for local resolution


1. On the Main tab of the navigation pane, expand Global Traffic and click Listeners. The main listeners screen opens. 2. Click the Create button. The new listener screen opens. 3. In the Destination box, type the IP address on which the Global Traffic Manager listens for network traffic. In this case, the IP address that you add is either the self IP address of the system, or, in the case of a redundant system configuration, the floating IP address that corresponds to both systems. 4. From the VLAN Traffic list, select a VLAN setting appropriate for this listener. Note: Typically, if the Global Traffic Manager is handling traffic on this IP address locally, you select All VLANs for this option. 5. Click the Finished button to save the new listener.

Configuration Guide for BIG-IP Global Traffic ManagerTM

4-3

Chapter 4

Configuring listeners for traffic forwarding


Another common way to use the Global Traffic Manager is to integrate it with the existing DNS servers. In this scenario, the Global Traffic Manager handles any traffic related to the wide IPs you assign to it, while sending other DNS requests to a separate DNS server on the network. When forwarding traffic in this manner, the Global Traffic Manager is operating in Bridge or Router mode, depending on how the traffic was initially sent to the system. In this configuration, you assign to the Global Traffic Manager a listener that corresponds to the IP address of the DNS server to which you want to forward to traffic. You can create multiple listeners to forward network traffic. The number of listeners you create is based on your network configuration and the ultimate destination to which you want to send specific DNS requests.

To configure a listener for traffic forwarding


1. On the Main tab of the navigation pane, expand Global Traffic and click Listeners. The main listeners screen opens. 2. Click the Create button. The new listener screen opens. 3. In the Destination box, type the IP address on which the Global Traffic Manager listens for network traffic. In this case, the IP address that you add is the IP address of the DNS server that you want to handle the DNS request. 4. From the VLAN Traffic list, select a VLAN setting appropriate for this listener. 5. Click the Finished button to save the new listener.

4-4

Working with Listeners

Configuring a wildcard listener


In some cases, you might want the Global Traffic Manager to handle the traffic coming into your network, regardless of the destination IP address of the given DNS request. In this configuration, the Global Traffic Manager continues to process and respond to requests for the wide IPs that you configure, but in addition it is responsible for forwarding other DNS requests to other network resources, such as other DNS servers. To accomplish this type of configuration, you create a wildcard listener.

To configure a wildcard listener


1. On the Main tab of the navigation pane, expand Global Traffic and click Listeners. The main listeners screen opens. 2. Click the Create button. The new listener screen opens. 3. In the Destination box, type: 0.0.0.0. 4. From the VLAN Traffic list, select a VLAN setting appropriate for this listener. 5. Click the Finished button to save the new wildcard listener.

Modifying listeners
After you create a listener, you can modify it as necessary, for example, when you add an additional VLAN to the system, or when you want to change the IP address of a listener

To modify a listener
1. On the Main tab of the navigation pane, expand Global Traffic and click Listeners. The main listeners screen opens. 2. Click the name of the listener. The properties screen for that listener appears. 3. Modify the settings for the listener as required. 4. Click the Update button to save your changes to the listener.

Configuration Guide for BIG-IP Global Traffic ManagerTM

4-5

Chapter 4

Deleting listeners
In the event that you no longer need a listener, you can delete it.

To delete a listener
1. On the Main tab of the navigation pane, expand Global Traffic and click Listeners. The main listeners screen opens. 2. Check the box that corresponds to the listener that you want to delete. 3. Click the Delete button. A confirmation screen appears. 4. Click the Delete button to delete the listener.

Using listeners with VLANs


On BIG-IP systems you can create one or more VLANs and assign specific interfaces to the VLANs of your choice. By default, each BIG-IP system includes at least two VLANs, named internal and external. However, you can create as many VLANs as the needs of your network demand. When you assign listeners to the Global Traffic Manager, you must take into account the VLANs that are configured on the system. For example, a listener that forwards traffic to another DNS server might only be appropriate for a specific VLAN, while a wildcard listener might be applicable to all VLANs. You can configure a listener to be applicable to all VLANs, or enabled only on specific VLANs.
Note

For more information about BIG-IP systems and VLANs, see the TMOS Management Guide for BIG-IP Systems.

Configuring a listener for all VLANs


When you configure a listener, set the VLAN Traffic setting to All VLANs if either of these conditions exist: The IP address you assign as a listener is valid for all VLANs for which the Global Traffic Manager is responsible. The Global Traffic Manager handles locally the traffic on the IP address you assign as a listener.

4-6

Working with Listeners

To configure a listener for all available VLANs


1. On the Main tab of the navigation pane, expand Global Traffic and click Listeners. The main listeners screen opens. 2. Click the Create button. The new listener screen opens. 3. In the Destination box, type the IP address on which you want the Global Traffic Manager to listen for network traffic. 4. From the VLAN Traffic list, select All VLANs. 5. Click the Finished button to save your changes.

Configuring a listener for specific VLANs


If the Global Traffic Manager is configured with multiple VLANs, and you want the system to handle traffic for only specific VLANs, use the Enabled on setting.

To configure a listener for specific VLANs


1. On the Main tab of the navigation pane, expand Global Traffic and click Listeners. The main listeners screen opens. 2. Click the Create button. The new listener screen opens. 3. In the Destination box, type the IP address on which you want the Global Traffic Manager to listen for network traffic. 4. From the VLAN Traffic list, select Enabled on. A new setting, VLAN List, appears on the screen. 5. Select the appropriate VLANs from the Available list and use the Move buttons (<< >>) to move them to the Selected list. The listener alerts the Global Traffic Manager about traffic on only the VLANs in the Selected list. 6. Click the Finished button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

4-7

Chapter 4

Disabling a listener for specific VLANs


If the Global Traffic Manager is configured with multiple VLANs, and you want to exclude some of these VLANs from the listener, set the VLAN Traffic option to Disabled on.

To disable a listener for specific VLANs


1. On the Main tab of the navigation pane, expand Global Traffic and click Listeners. The main listeners screen opens. 2. Click the Create button. The new listener screen opens. 3. From the VLAN Traffic list, select Disabled on. A new option, VLAN List, appears on the screen. 4. Select the appropriate VLANs from the Available list and use the Move buttons (<< >>) to move them to the Selected list. The listener alerts the Global Traffic Manager about traffic on all VLANs except those listed in the Selected list. 5. Click the Finished button to save your changes.

4-8

5
Defining the Physical Network

Introducing physical network components Managing data centers Managing servers Managing virtual servers Managing links

Defining the Physical Network

Introducing physical network components


The components that make up the Global Traffic Manager can be divided into two categories: logical network components and physical networks components. Logical network components are abstractions of network resources, such as virtual servers. Physical network components have a direct correlation with one or more physical entities on the network. This chapter deals with the physical components of the Global Traffic Manager. For information on the logical components, see Chapter 6, Defining the Logical Network. This chapter describes how to use the Global Traffic Manager to define the physical network components that make up your network: Data centers Servers Virtual servers Links

Configuration Guide for BIG-IP Global Traffic ManagerTM

5-1

Chapter 5

Managing data centers


A data center defines the servers and links that share the same subnet on the network. All resources on your network, whether physical or logical, are associated in some way with a data center. The Global Traffic Manager consolidates the paths and metrics data collected from servers, virtual servers, and links into the data center, and uses that data to conduct load balancing operations. When you create a data center on the Global Traffic Manager, you must add at least one server and one link. It is important to note that you must configure at least one data center before you can add servers to the Global Traffic Manager system configuration. Additionally, each server or link can belong to one, and only one, data center. While working with data centers, you can perform several common tasks: Configuring data centers Modifying data centers Deleting data centers Enabling and disabling data centers

Configuring data centers


Depending on your router configuration, the following data center configurations are available: One data center in one physical location One data center that includes servers in multiple physical locations Multiple data centers in one physical location For example, the fictional company SiteRequest has a network operation center in New York, which contains two subnets: 192.168.11.0/24 and 192.168.22.0/24. Because there are two subnets, the IT team needs to create two data centers: New York 1 and New York 2, within the Global Traffic Manager. On the opposite side of the country, SiteRequest has three operational centers, but they all share the same subnet of 192.168.33.0/24. Therefore, the IT team needs to create only a single data center: West Coast. Within the Global Traffic Manager, you define a data center by configuring the following settings: Name Specifies a descriptive name for the data center, such as New York 1 or West Coast. Location Specifies the geographical area in which the data center resides, such as New York City - Building A.

5-2

Defining the Physical Network

Contact Specifies the name of the individual responsible for managing the network at the data center. State Specifies whether the data center is Enabled or Disabled.

To configure a data center


1. On the Main tab of the navigation pane, expand Global Traffic and click Data Centers. The main screen for data centers opens. 2. Click the Create button. The New Data Center screen opens. 3. Specify the settings for the new data center. For additional assistance with these settings, see the online help. 4. Click the Finished button.

Repeat this process for each data center in your network.

Modifying data centers


After you create a data center, you can change its settings, as needed.

To modify a data center


1. On the Main tab of the navigation pane, expand Global Traffic and click Data Centers. The main screen for data centers opens. 2. Click the name of the data center that you want to modify. The properties screen for that data center appears. 3. Modify the settings for the data center. For additional assistance with these settings, see the online help. 4. Click the Update button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

5-3

Chapter 5

Deleting data centers


You can delete data centers that you no longer need.

To delete a data center


1. On the Main tab of the navigation pane, expand Global Traffic and click Data Centers. The main screen for data centers opens. 2. Check the Select box that corresponds to the data center that you want to delete. 3. Click the Delete button. A confirmation screen opens. 4. Click the Delete button to delete the selected data center.

Enabling and disabling data centers


When you create a data center, it is enabled by default. You can disable a data center manually, which allows you to temporarily remove it from global traffic management load balancing operations; for example, during a maintenance period. When the maintenance period ends, you can once again enable the data center. The resources associated with a data center are available only when the data center is also available, based on the metrics collected by the Global Traffic Manager.

To enable or disable a data center


1. On the Main tab of the navigation pane, expand Global Traffic and click Data Centers. The main screen for data centers opens. 2. Check the Select box that corresponds to the data center that you want to either enable or disable. 3. Click the button that performs the action that you want to accomplish: Click the Enable button to enable the data center. The icon representing the availability of the data center changes to a blue square, indicating that it is enabled. Click the Disable button to disable the data center. The icon representing the availability of the data center changes to a black square, indicating that it is disabled.

5-4

Defining the Physical Network

Managing servers
A server defines a specific physical system on the network. Within the Global Traffic Manager, servers are not only physical entities that you can configure and modify as needed; they also contain the virtual servers that are the ultimate destinations of name resolution requests. When you configure a server on the Global Traffic Manager, unless the server is either a Global Traffic Manager or a Link Controller, the server must contain at least one virtual server. The Global Traffic Manager supports three types of servers:

BIG-IP systems A BIG-IP system can be a Global Traffic Manager, a Local Traffic Manager, a Link Controller, or a VIPRION system. Third-party load balancing systems A third-party load balancing system is any system, other than a BIG-IP system, that supports and manages virtual servers on the network. See Defining third-party load balancing servers, on page 5-9, for a list of supported load balancing servers and instructions on how to define these servers. Third-party host servers A third-party host system is any server on the network that does not support virtual servers. See Defining third-party host servers, on page 5-10, for a list of supported host servers and instructions on how to define these servers.

At a minimum, you must define the following servers on the Global Traffic Manager: The current Global Traffic Manager A managed server (either a load balancing server or a host) The following procedures describe how to define each server type in your network. These procedures assume that the servers are up and running in the network, and that they already have virtual servers defined (if the server manages virtual servers).

Defining BIG-IP systems


When you configure a Global Traffic Manager, you first define the system itself. Then you define the other BIG-IP systems in the physical network, such as backup systems on the current network segment, or systems that reside at other data centers.

Configuration Guide for BIG-IP Global Traffic ManagerTM

5-5

Chapter 5

Defining the current Global Traffic Manager


Global Traffic Manager systems are load balancing servers that are part of your physical network. You first configure the settings of a Global Traffic Manager itself, and then you can add other Global Traffic Manager systems to the configuration. If the Global Traffic Manager that you are configuring has multiple links (that is, multiple network devices that connect it to the internet), you can add the self IP addresses of these devices to the system. After you configure these systems, the agents and other utilities, such as the big3d agent, can gather and analyze network traffic path and metrics information. After you configure the additional servers and links, you can synchronize the settings of a specific Global Traffic Manager to other Global Traffic Managers on the physical network.
Important

You must use a self IP address when you define a Global Traffic Manager. You cannot use the management IP address.

To define the current Global Traffic Manager


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the Create button. The New Server screen opens. 3. In the Name box, type a name that identifies the Global Traffic Manager. 4. From the Product list, specify the type of system that is required: BIG-IP System (Single) specifies a primary system. BIG-IP System (Redundant) specifies a backup system. 5. Add IP addresses to the Address List. For BIG-IP System (Single), type the self IP address in the Address box, and then click Add. For BIG-IP System (Redundant), type the self IP address in the Address box, and then click Add. Then add the self IP address of the backup system to the Peer Address List, by typing the self IP address in the Address box, and click Add. 6. From the Data Center list, select a data center to which the Global Traffic Manager belongs. Note: A server must belong to a data center. See Managing data centers, on page 5-2, for additional information. 7. Configure the remaining server settings, and then click the Create button to create the new server. For additional assistance with these settings, see the online help.
5-6

Defining the Physical Network

Defining Local Traffic Manager systems


Local Traffic Manager systems are load balancing servers that manage virtual servers on the network. There are two standard configurations for a Local Traffic Manager: A stand-alone system on the network A component module residing on the same hardware as the Global Traffic Manager Regardless of whether the Local Traffic Manager shares the same hardware as the Global Traffic Manager, you should ensure that you have the following information available before you define the system: The self IP addresses and translations of the Local Traffic Manager systems interfaces Note: When you define a Local Traffic Manager, you must use a self IP address. You cannot use a management IP address. The IP address and service name or port number of each virtual server managed by the Local Traffic Manager, unless you want to use auto-configuration to discover the virtual servers on the Local Traffic Manager system Note: If your installation of the Global Traffic Manager resides on the same system as a Local Traffic Manager, you define only one BIG-IP server. This server entry represents both the Global Traffic Manager and Local Traffic Manager modules.

To define a Local Traffic Manager


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the Create button. The New Server screen opens. 3. In the Name box, type a name that identifies the Local Traffic Manager. 4. From the Product list, specify the type of system that is required: BIG-IP System (Single) specifies a primary system. BIG-IP System (Redundant) specifies a backup system. 5. Add IP addresses to the Address List. For BIG-IP System (Single), type the self IP address in the Address box, and then click Add. For BIG-IP System (Redundant), type the self IP address in the Address box, and then click Add. Then add the self IP address of the backup system to the Peer Address List, by typing the self IP address in the Address box, and click Add.

Configuration Guide for BIG-IP Global Traffic ManagerTM

5-7

Chapter 5

6. From the Data Center list, select a data center to which the Local Traffic Manager belongs. Note: A server must belong to a data center. See Managing data centers, on page 5-2, for additional information. 7. Configure the remaining server settings, including the virtual servers managed by the Local Traffic Manager. For additional assistance with these settings, see the online help. 8. Click the Create button to create the new server.

Defining Link Controller Systems


The Link Controller is also part of the BIG-IP product family. Link Controller systems monitor the performance and availability of wide-area connections.

To define a Link Controller


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the Create button. The New Server screen opens. 3. In the Name box, type a name that identifies the Link Controller. 4. From the Product list, select BIG-IP System (Single). 5. Type the IP address in the Address box, and then click Add. Note: You can add more than one address to any given server, depending on how that server interacts with the rest of your network. 6. From the Data Center list, select a data center to which the Link Controller belongs. Note: A server must belong to a data center. See Managing data centers, on page 5-2, for additional information. 7. Configure the remaining server settings. For additional assistance on these settings, see the online help. 8. Click the Create button to create the new server.

5-8

Defining the Physical Network

Defining third-party load balancing servers


In addition to BIG-IP systems, the Global Traffic Manager can interact with other load balancing servers to determine availability and performance metrics for load balancing connection requests. The Global Traffic Manager supports these load balancing servers: Alteon Ace Director Cisco CSS Cisco LocalDirector v2 Cisco LoadDirector v3 Cisco SLB Extreme Foundry ServerIron Radware WSD
Note

If your network uses a load balancing server that is not found on this list, you can use the Generic Load Balancer option. See Defining a generic load balancing server, on page 5-10.

Adding load balancing servers


You can add as many third-party load balancing servers as you need into your configuration of the Global Traffic Manager.

To add a load balancing server


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the Create button. The New Server screen opens. 3. In the Name box, type a name that identifies the server. 4. From the Product list, select the appropriate load balancing server. If your network uses a load balancing server that is not on this list, you can use the Generic Load Balancer option. See Defining a generic load balancing server, on page 5-10. 5. Type the IP address of the server in the Address box, and then click Add. Note: You can add more than one address to any given server, depending on how that server interacts with the rest of your network.

Configuration Guide for BIG-IP Global Traffic ManagerTM

5-9

Chapter 5

6. From the Data Center list, select a data center to which the server belongs. Note: A server must belong to a data center. See Managing data centers, on page 5-2, for additional information. 7. Configure the remaining server settings. For additional assistance on these settings, see the online help. 8. Click the Create button to create the new server.

Defining a generic load balancing server


In the event that your network uses a load balancing server that is not explicitly supported by the Global Traffic Manager, you can define a generic load balancer.

To define a generic load balancing server


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the Create button. The New Server screen opens. 3. In the Name box, type a name that identifies the server. 4. From the Product list, select Generic Load Balancer. 5. Type the IP address of the server in the Address box, and then click Add. Note: You can add more than one address to any given server, depending on how that server interacts with the rest of your network. 6. From the Data Center list, select a data center to which the server belongs. Note: A server must belong to a data center. See Managing data centers, on page 5-2, for additional information. 7. Configure the remaining server settings. For additional assistance with these settings, see the online help. 8. Click the Create button to create the new server.

Defining third-party host servers


Another server type that you might include as part of your network is a host. A host is an individual network resource, such as web page or a database, that is not a part of the BIG-IP product family and does not provide load balancing capabilities for the resources it supports.

5 - 10

Defining the Physical Network

The Global Traffic Manager supports the following host servers: CacheFlow NetApp Sun Solaris Windows 2000 Server (You can monitor the Windows Vista Enterprise Server using the Windows 2000 Server-based computer.) Windows Server 2003 Windows NT 4.0
Note

If your network uses a host server that is not on this list, you can use the Generic Host option. See Defining a generic host server, on page 5-12.

To define a host server


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the Create button. The New Server screen opens. 3. In the Name box, type a name that identifies the server. 4. From the Product list, select the appropriate host server. 5. Type the IP address of the server in the Address box, and then click Add. Note: You can add more than one address to any given server, depending on how that server interacts with the rest of your network. 6. From the Data Center list, select a data center to which the server belongs. Note: A server must belong to a data center. See Managing data centers, on page 5-2, for additional information. 7. Configure the remaining server settings. For additional assistance on these settings, see the online help. 8. Click the Create button to create the new server.

Configuration Guide for BIG-IP Global Traffic ManagerTM

5 - 11

Chapter 5

Defining a generic host server


In the event that your network uses a host server that is not explicitly supported by the Global Traffic Manager, you can add a generic host server.

To define a generic host server


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the Create button. The New Server screen opens. 3. In the Name box, type a name that identifies the server. 4. From the Product list, select Generic Host. 5. Type the IP address of the server in the Address box, and then click Add. Note: You can add more than one address to any given server, depending on how that server interacts with the rest of your network. 6. From the Data Center list, select a data center to which the server belongs. Note: A server must belong to a data center. See Managing data centers, on page 5-2, for additional information. 7. Configure the remaining server settings. For additional assistance with these settings, see the online help. 8. Click the Create button to create the new server.

Searching for a specific server


If you want to view or modify the properties of a server, you can locate that specific server using the search feature. You can search by either the full or partial name or the IP address of the server. The search feature can be especially useful for companies with large networks that contain numerous servers. For more information about how the search feature works see Locating a component using the search feature, on page 2-6.

To search for a specific a server


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. In the selection criteria box, type the name or IP address of the server that you want to modify, and then click Filter. A list of servers that matches the criteria you entered displays.

5 - 12

Defining the Physical Network

3. Click the name of the server that you want to view or modify. The properties screen for that server opens. 4. Make changes to the server properties as required. 5. Click the Update button to save your changes.

Assigning monitors to servers


Each server that you add to the Global Traffic Manager, whether it is a BIG-IP system, a third-party load balancing server, or a host server, has a variety of monitors available. You can assign these monitors to track specific data, and use that data to determine load balancing or other actions. Detailed information about monitors is available in Chapter 11, Configuring Monitors.

To add monitors to a server


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the name of the server to which you want to add monitors. The properties screen for that server opens. 3. From the Configuration list, select Advanced. Additional fields display with default settings. 4. For Health Monitors, use the Move buttons (<< >>) to move monitors from the Available list to the Selected list. Monitors in the Selected list are active for the server. 5. Click the Update button to save your changes.

Specifying thresholds for availability


When you set thresholds for availability, the Global Traffic Manager can detect when a managed server is low on resources, and redirect the traffic to another server. Setting limits can help eliminate any negative impact on a server's performance of tasks that may be time critical, require high bandwidth, or put high demand on system resources. The system resources vary depending on the monitors you assign to the server. You can specify thresholds for the following components: Servers Virtual servers Pools Pool members

Configuration Guide for BIG-IP Global Traffic ManagerTM

5 - 13

Chapter 5

Setting thresholds for servers


When you configure a server, you can set limits for specific elements depending upon whether the server is part of the BIG-IP product family, such as a Local Traffic Manager, or another server type. If the server is part of the BIG-IP product family, you can base thresholds on: Bits (per second) Packets (per second) Current Connections If the server is not part of the BIG-IP product family, such as a generic host server, you can base thresholds on: CPU Memory Bits Packets Current Connections The following procedure provides general instructions for configuring thresholds. For detailed information about these settings, see the online help.

To set thresholds for servers


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the name of the server for which you want to set the threshold. The properties screen for that server opens. 3. From the Configuration list, select Advanced. Additional fields display with default settings. For more information about the settings, see the online help. 4. For Limit Settings, select Enabled from the list that corresponds to the threshold you want to use. A new box appears. 5. Type the appropriate value for each threshold. 6. Click the Update button to save your changes.

You can also set limits for virtual server resources. For more information see, Setting thresholds for virtual servers, on page 5-15. If a server meets or exceeds its limits, both the server and the virtual servers it manages are marked as unavailable for load balancing. You can quickly review the availability of any of your servers or virtual servers on the Statistics screens.

5 - 14

Defining the Physical Network

Setting thresholds for virtual servers


When you configure a virtual server, you can set thresholds for: Bits (per second) Packets (per second) Current connections The following procedure provides general instructions for configuring these thresholds. For detailed information about Limit Settings, see the online help.

To set thresholds for virtual servers


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the name of the server that contains the virtual server. The properties screen for that server opens. 3. On the menu bar, click Virtual Servers. The virtual servers screen opens. 4. Click the name of the virtual server for which you want to set limits. 5. From the Configuration list, select Advanced. Additional fields display with default settings. 6. For Limit Settings, select Enabled from the list that corresponds to the threshold you want to use. A new box appears. 7. Type the appropriate value for each threshold. 8. Click the Update button to save your changes.

Setting thresholds for pools


When you configure a pool, you can set thresholds for: Bits (per second) Packets (per second) Current connections The following procedure provides general instructions for configuring these thresholds. For detailed information about setting thresholds, see the online help.

Configuration Guide for BIG-IP Global Traffic ManagerTM

5 - 15

Chapter 5

To set thresholds for pools


1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. The main screen for pools opens. 2. Click the name of the pool for which you want to set limits. The properties screen for that pool appears. 3. From the Configuration list, select Advanced. Additional fields display with default settings. 4. For Limit Settings, select Enabled from the list that corresponds to the threshold you want to use. A new box appears. 5. Type the appropriate value for each threshold. 6. Click the Update button to save your changes.

You can also set limits for pool members. For more information, see Setting thresholds for pool members, following. If a pool meets or exceeds its limits, both the pool and the pool members it manages are marked as unavailable for load balancing. You can quickly review the availability of any of your pools or pool members on the Statistics screens.

Setting thresholds for pool members


When you configure a pool member, you can set thresholds for: Bits (per second) Packets (per second) Current Connections The following procedure provides general instructions for configuring these thresholds. For detailed information on these thresholds, see the online help.

To set thresholds for pool members


1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. The main screen for pools opens. 2. Click the name of the pool that contains the pool member. The properties screen for that pool appears. 3. On the menu bar, click Members. The members screen opens. 4. Click the name of the pool member for which you want to set limits. 5. From the Configuration list, select Advanced. Additional fields display with default settings.

5 - 16

Defining the Physical Network

6. For Limit Settings, select Enabled from the list that corresponds to the threshold you want to use. A new box appears. 7. Type the appropriate value for each threshold. 8. Click the Update button to save your changes.

Discovering resources automatically


You can configure the Global Traffic Manager to automatically discover virtual servers and links that are associated with any member of the BIG-IP product family. This capability is available by enabling the Virtual Server Discovery option, which identifies virtual servers, and the Link Discovery option, which discovers links. When you enable either virtual server or link discovery, the system automatically searches for resources of the specified type, and adds them to its configuration. You configure discovery of virtual servers and links at the server level. For more information on discovery options, see Configuring auto-discovery, on page 3-14. Depending on the server you are configuring, you have two discovery options available: On Local Traffic Manager systems, you can enable discovery for both virtual servers and links. On load balancing servers, you can only enable discovery for virtual servers.
Note

The Global Traffic Manager requires that each virtual server has a unique name. In instances where the auto-discovery process finds two virtual servers with the same name, the system modifies the name by creating a new name using the pattern, <server name>_<bigip system name>. In the event that this does not resolve the name conflict, the system appends a number to the name, for example, <server name>_<bigip system name>_1.

To discover virtual servers


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the name of the server for which you want to discover virtual servers. The properties screen for that server appears. 3. On the menu bar, click Virtual Servers. The virtual servers screen opens.

Configuration Guide for BIG-IP Global Traffic ManagerTM

5 - 17

Chapter 5

4. From the Virtual Server Discovery list, select the appropriate setting. If you select Disabled, the virtual server list appears, which provides options for adding virtual servers manually. 5. Click the Update button to save your changes.

To discover links
You can enable discovery for links only on BIG-IP systems. 1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the name of the server for which you want to discover links. The properties screen for that server opens. 3. On the menu bar, click Links. The virtual servers screen opens. 4. From the Link Discovery list, select the appropriate setting. 5. Click the Update button to save your changes.

5 - 18

Defining the Physical Network

Managing virtual servers


Servers, excluding Global Traffic Manager systems and Link Controller systems, contain at least one virtual server. A virtual server, in the context of the Global Traffic Manager, is a specific IP address and port number that points to a resource on the network. In the case of host servers, this IP address and port number likely point to the resource itself. With load balancing systems, such as the Local Traffic Manager, these virtual servers are often proxies that allow the load balancing server to manage the resource request across a multitude of resources. You can add virtual servers in two ways: Automatically, through the use of the discovery feature. For more information on automatically discovering virtual servers, see Discovering resources automatically, on page 5-17. Manually, through the properties screens of the given server.

Adding virtual servers manually


You can manually add a virtual server to a given server using the following procedure. If you want to add virtual servers through the use of the discovery feature, see Discovering resources automatically, on page 5-17.
Important

Each virtual server that you add to the Global Traffic Manager must have a unique name.

To add a virtual server


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the name of the server to which you want to add virtual servers. The properties screen for that server opens. 3. On the menu bar, click Virtual Servers. The virtual servers screen opens. 4. From the Virtual Server Discovery list, select Disabled. 5. Click the Update button to implement this change. 6. Click the Add button to begin adding a new virtual server. The new virtual server screen opens. 7. From the Configuration list, select Advanced. This displays additional fields, and allows you to modify additional default settings.

Configuration Guide for BIG-IP Global Traffic ManagerTM

5 - 19

Chapter 5

8. For the Dependency List option, select a virtual server from the Virtual Servers list, and then click Add. For more information on these options, see the online help. 9. Click the Create button to save the new virtual server.

Modifying virtual servers


You can modify the configuration of a virtual server at any time; for example, when you want to change the IP address and port number of the virtual server, or when you want to modify the IP address translation settings.

To edit a virtual server


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the name of the server on which the virtual server you want to edit resides. The properties screen for that server opens. 3. On the menu bar, click Virtual Servers. The virtual servers screen opens. 4. Click the name of the virtual server that you want to modify. The properties page of the virtual server opens. 5. Edit the virtual server as needed. For more information on these options, see the online help. 6. Click the Finished button to save your changes.

Removing virtual servers


You can remove a virtual server from the system configuration at any time.

To remove a virtual server


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the name of the server from which you want to remove virtual servers. The properties screen for that server appears. 3. On the menu bar, click Virtual Servers. The virtual servers screen opens. 4. Check the box that corresponds to the virtual server that you want to remove, and then click Remove.

5 - 20

Defining the Physical Network

Managing links
A link defines a physical connection to the Internet that is associated with one or more routers on the network. The Global Traffic Manager tracks the performance of links, which in turn can dictate the overall availability of a given pool, data center, wide IP, or distributed application. To configure the links that you want the Global Traffic Manager to load balance, you add a link entry, and then associate one or more routers with that entry. You can also configure monitors to check certain metrics associated with a link, and modify how the system load balances network traffic across links. You can manage links by: Defining a link Adding routers to a link Assigning monitors to a link Configuring link weighting and billing properties

Defining links
Before you can load balance inbound and outbound traffic, you must configure basic link properties. The following procedure describes how to configure the basic properties of a link.

To configure a link
1. On the Main tab of the navigation pane, expand Global Traffic and click Links. The main screen for links opens. 2. Click the Create button. The New Link screen opens. 3. In the Name box, type a name that identifies the link. 4. In the Address box, type the router address of the link, and then click Add. Note: You can add more than one address to any given link, depending on how that server interacts with the rest of your network. 5. From the Data Center list, select the data center to which you want to associate the link. Note: A link must be associated with a data center. 6. Configure the other link options as needed. For detailed information on these options, see the online help. 7. Click the Create button to create the link.

Configuration Guide for BIG-IP Global Traffic ManagerTM

5 - 21

Chapter 5

Adding and removing routers


You can add or remove routers associated with a link at any time.

To add a router to a link


1. On the Main tab of the navigation pane, expand Global Traffic and click Links. The main screen for links opens. 2. Click the name of the link to which you want to add a router. The properties screen for that link opens. 3. In the Address box, type the router address of the link, and then click Add. Note: You can add more than one address to any given link, depending on how that server interacts with the rest of your network. 4. Click the Update button to save your changes.

To remove a router from a link


1. On the Main tab of the navigation pane, expand Global Traffic and click Links. The main screen for links opens. 2. Click the name of the link from which you want to remove a router. The Properties screen for that link opens. 3. For Router Address List, select a router, and then click Remove. Repeat this step for any other routers that you want to remove. 4. Click the Update button to save your changes.

Assigning monitors to links


After you configure a link, you can assign to the link monitors that track specific data. The system can use this data to manage global traffic. For detailed information about monitors, see Chapter 11, Configuring Monitors.

To add monitors to a link


1. On the Main tab of the navigation pane, expand Global Traffic and click Links. The main screen for links opens. 2. Click the name of the link to which you want to add monitors. The properties screen for that link opens. 3. From the Configuration list, select Advanced. Additional fields display with default settings.

5 - 22

Defining the Physical Network

4. For Health Monitors, use the Move buttons (<< >>) to move monitors from the Available list to the Enabled list. Monitors in the Enabled list are active for the link. 5. Click the Update button to save your changes.

Removing monitors from links


You can remove a monitor association from a link at any time. For detailed information about monitors, see Chapter 11, Configuring Monitors.

To remove a monitor from a link


1. On the Main tab of the navigation pane, expand Global Traffic and click Links. The main screen for links opens. 2. Click the name of the link from which you want to remove monitors. The properties screen for that link opens. 3. From the Configuration list, select Advanced. Additional fields display with default settings. 4. For Health Monitors, use the Move buttons (<< >>) to move monitors from the Enabled list to the Available list. Monitors in the Available list are not active for the link. 5. Click the Update button to save your changes.

Configuring link weighting and billing properties


You can configure how the system manages and distributes traffic for a given link on the properties screen for the link, using these settings:

Ratio Weighting If you have links of varying bandwidth sizes, and you want to load balance the traffic to the controller based on a ratio, you can select the Ratio option from the Weighting list. You use this configuration to avoid oversaturating a smaller link with too much traffic. Price Weighting If you pay varying fees for the bandwidth usage associated with the links, you can select the Price (Dynamic Ratio) option from the Weighting list. You use this configuration to direct traffic over the least expensive link first and to avoid the costs associated with exceeding a prepaid bandwidth.

Configuration Guide for BIG-IP Global Traffic ManagerTM

5 - 23

Chapter 5

Duplex Billing If your ISP provider uses duplex billing, you can configure the Duplex Billing setting so that the statistics and billing report screens accurately reflect the bandwidth usage for the link.
Important

You can use either the Ratio or Price (Dynamic Ratio) weighting option to load balance the traffic through all of your links. You must use the same weighting option for all links.

To configure Ratio or Price weighting properties for a link


1. On the Main tab of the navigation pane, expand Global Traffic and click Links. The main screen for links opens. 2. Click the name of the link for which you want to configure link weighting properties. The properties screen for that link opens. 3. From the Configuration list, select Advanced. Additional fields, including the Weighting list, display. 4. From the Weighting list, select either Ratio or Price (Dynamic Ratio), depending on how you want to weight the link. 5. Configure additional options as needed. For more information, see the online help. 6. Click the Update button to save your changes.

To configure duplex billing properties


1. On the Main tab of the navigation pane, expand Global Traffic and click Links. The main screen for links opens. 2. Click the name of the link for which you want to configure duplex billing properties. The properties screen for that link opens. 3. From the Configuration list, select Advanced. Additional fields display, including the Duplex Billing setting. 4. Check the Duplex Billing box. 5. Click the Update button to save your changes.

5 - 24

6
Defining the Logical Network

Introducing logical network components Managing pools Managing wide IPs Managing distributed applications

Defining the Logical Network

Introducing logical network components


After you define the physical components of your network, such as data centers, servers, and links, you can configure the Global Traffic Manager with the logical components of your network. Logical components are abstractions of network resources, such as a virtual servers. Unlike physical components, the logical network can often span multiple physical devices, or encompass a subsection of a single device. Through the Global Traffic Manager, you define three primary types of logical network components: Pools Wide IPs Distributed applications

Understanding logical components


To better understand the interactions between pools, wide IPs, and data centers, consider the fictional company of SiteRequest. SiteRequest is an online application repository. Currently, its presence on the World Wide Web consists of a main site, www.siterequest.com; a download area, downloads.siterequest.com; and a search area, search.siterequest.com. These three fully-qualified domain names (FQDNs), www.siterequest.com, downloads.siterequest.com, and search.siterequest.com, are wide IPs. Each of these wide IPs contain several pools of virtual servers. For example, www.siterequest.com contains two pools of virtual servers: poolMain, and poolBackup. When the Global Traffic Manager receives a connection request for www.siterequest.com, it applies its load balancing logic to select the appropriate pool to handle the request. Once the Global Traffic Manager selects a pool, it then load balances the request to the appropriate virtual server. For example, mainPool contains three virtual servers: 192.168.3.10:80, 192.168.4.20:80, and 192.168.5.30:80. The Global Traffic Manager responds to the system that made the connection request with the selected virtual server. From then on, the Global Traffic Manager steps out of the communication, and the system requesting the resource communicates directly with the virtual server.
Note

If a virtual server is managed by a load balancing server that is not in the BIG-IP product family, the IP address and port number of the virtual server often point to a proxy on which the load balancing server listens for connection requests. In that case, the load balancing server remains in the communication directing the connection to the appropriate resource.

Configuration Guide for BIG-IP Global Traffic ManagerTM

6-1

Chapter 6

For administration purposes, the wide IPs downloads.siterequest.com and search.siterequest.com are added to a single distributed application, siterequest_download_store. This configuration provides the IT staff the ability to track the performance of the distributed application, as performance has an immediate impact on the users that visit the web sites.

Managing pools
A pool represents one or more virtual servers that share a common role on the network. A virtual server, in the context of the Global Traffic Manager, is a combination of IP address and port number that points to a specific resource on the network. The Global Traffic Manager considers any virtual servers that you add to a pool to be pool members. A pool member is a virtual server that has specific attributes that pertain to the virtual server only in the context of that pool. Through this differentiation, you can customize settings, such as thresholds, dependencies, and health monitors, for a given virtual server on a per-pool basis. As an example of the difference between pool members and virtual servers, consider the fictional company SiteRequest. In the London data center, the IT team has a virtual server that acts as a proxy for a Local Traffic Manager. This virtual server is the main resource for name resolution requests for the companys main web page that originate from Europe. This same virtual server is the backup resource for name resolution requests that originate from the United States. Because these are two distinctly different roles, the virtual server is a pool member in two different pools. This configuration allows the IT team to customize the virtual server for each pool to which it belongs, without modifying the actual virtual server itself. As described in Chapter 5, Defining the Physical Network, before you can add virtual servers to the Global Traffic Manager, you must define a server that represents a physical component of your network. Then you can add virtual servers to the server, and group the virtual servers in pools. You manage pools in the following ways: Define pools Add virtual servers to pools Remove virtual servers from pools Organize virtual servers within pools Weight virtual servers within pools Disable or enable pools

6-2

Defining the Logical Network

Defining pools
When you create a pool, you name it and add at least one virtual server as a member of the pool. You can also assign specific load balancing methods, a fallback IP address, and one or more health monitors to the pool. You assign a fallback IP address in the event that the load balancing methods you assign to the pool fail to return a valid virtual server. The health monitors that you assign to the pool use various methods to determine if the virtual servers within the pool are available.

To define a pool
1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. The main pools screen opens. 2. Click the Create button. The New Pool screen opens. 3. In the Name box, type a name for the pool. 4. For Member List, from the Virtual Server list, select the virtual servers that you want to include in this pool, and then click Add. Note: A virtual server can belong to more than one pool. 5. Configure the remaining pool settings. For additional assistance with these settings, see the online help. 6. Click the Finished button to save the new pool.

Repeat this process for each pool that you want to create.

Adding virtual servers to pools


A pool is one or more virtual servers (pool members) that share a common role on the network. As your network changes, you might find that you need to add new virtual servers to a pool.

To add a virtual server to a pool


1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. The main pools screen opens. 2. Click the name of the pool to which you want to add a virtual server. The properties screen of that pool opens. 3. On the menu bar, click Members. The pool members screen opens displaying the virtual servers currently assigned to the pool. 4. Click the Manage button. The manage members screen opens.

Configuration Guide for BIG-IP Global Traffic ManagerTM

6-3

Chapter 6

5. For the Member List setting, from the Virtual Server list, select the appropriate virtual server, and then click Add. Repeat this step for each virtual server that you want to add to the pool. 6. Click Finished to update the pool with the new virtual server.

Removing virtual servers from pools


Networks often change over time. As a result, you might find that you need to remove virtual servers from a pool. For example, a virtual server might become obsolete due to an upgrade, or you might reconfigure a pool to perform a different role, and certain virtual servers may no longer be needed. You can remove a virtual server from a pool at any time. Removing a virtual server does not delete it from the Global Traffic Manager; the virtual server still exists and remains associated with its physical server. However, if you remove a pool member from a pool, the customizations of the virtual server that pertain to the pool member no longer exist. If you want to delete a virtual server completely from the Global Traffic Manager, see Removing virtual servers, on page 5-20.

To remove a virtual server from a pool


1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. The main pools screen opens. 2. Click the name of the pool from which you want to remove a virtual server. The properties screen of that pool opens. 3. On the menu bar, click Members. The pool members screen opens displaying the virtual servers currently assigned to the pool. 4. Click the Manage button. The manage members screen opens. 5. From the Member List, select the virtual server you want to remove, and click Remove. Repeat this step for each virtual server that you want to remove from the pool. 6. Click the Finished button to update the pool.

Organizing virtual servers within pools


Certain load balancing methods within the Global Traffic Manager select virtual servers based on the order in which they are listed in the pool. For example, the load balancing method, Global Availability, instructs the
6-4

Defining the Logical Network

Global Traffic Manager to select the first virtual server in the pool until it reaches capacity or goes offline, at which point it selects the next virtual server until the first pool becomes available again.
Note

For more information on the load balancing methods that the Global Traffic Manager supports, see Chapter 7, Load Balancing with the Global Traffic Manager. If you use a load balancing method that selects virtual servers based on the order in which they are listed in the pool, you may want to change the order in which the virtual servers are listed in the Member List. When you organize your virtual servers in conjunction with these load balancing methods, you can ensure that your most robust virtual server always receives resolution requests, while the other virtual servers act as backups in case the primary virtual server becomes unavailable.

To organize virtual servers within a pool


1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. The main pools screen opens. 2. Click the name of the pool for which you want to organize virtual servers. The properties screen of that pool opens. 3. On the menu bar, click Members. The pool members screen opens displaying the virtual servers currently assigned to the pool. 4. Click the Manage button. The Manage Members screen opens. 5. From the Member List, select a virtual server and click either the Up or Down button to change its position in the list. Repeat this step for each virtual server that you want to reposition in the list. 6. Click the Finished button to update the pool.

Weighting virtual servers within pools


One of the load balancing methods that the Global Traffic Manager supports is the Ratio mode. This mode instructs the system to load balance network requests based on the weights assigned to a specific resource. If you use the Ratio mode to load balance across virtual servers in a pool, you must assign weights to the virtual servers. A weight is a value assigned to a resource, such as a pool, that the Global Traffic Manager uses to determine the frequency at which the resource receives connection requests. The Global Traffic Manager selects a resource based on the weight of that resource as a percentage of the total of all weights in that resource group.

Configuration Guide for BIG-IP Global Traffic ManagerTM

6-5

Chapter 6

To illustrate the use of weights in connection load balancing, consider the fictional company SiteRequest. One of SiteRequests wide IPs, www.siterequest.com, contains a pool labeled poolMain. This pool uses the Ratio load balancing mode and contains three virtual servers, with the following weight assignments: Virtual server 1: weight 50 Virtual server 2: weight 25 Virtual server 3: weight 25 Notice that the total of all the weights in this pool is 100. Each time the Global Traffic Manager selects this pool, it load balances across all three virtual servers. Over time, the load balancing statistics for this pool appear as follows: Virtual server 1: selected 50 percent of the time Virtual server 2: selected 25 percent of the time Virtual server 3: selected 25 percent of the time This pattern exists because the weight value, 50, is 50 percent of the total weight for all virtual servers (100), while the weight value, 25, is 25 percent of the total.
Note

For information on the Ratio mode and other load balancing methods, see Chapter 7, Load Balancing with the Global Traffic Manager.

To weight virtual servers within a pool


1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. The main pools screen opens. 2. Click the name of the pool with which the virtual server that you want to assign a weight is associated. The properties screen of that pool opens. 3. On the menu bar, click Members. The pool members screen opens displaying the virtual servers currently assigned to the pool. 4. Click the Manage button. The manage members screen opens. 5. From the Virtual Server list, select the virtual server to which you want to assign a weight. Note: If the virtual server already belongs to the pool, you must first remove the virtual server from the pool, and then add it back in again. For more information, see Removing virtual servers from pools, on page 6-4.

6-6

Defining the Logical Network

6. In the Ratio box, type a numerical value that represents the weight of the virtual server as compared to other virtual servers within the same pool. The higher the value in this setting, the greater the frequency at which the Global Traffic Manager selects the virtual server. 7. Click the Add button to add the virtual server, with ratio value, to the pool. 8. Click the Finished button to save your changes.

Repeat this process for each virtual server.

Disabling and enabling pools


By default, any pool that you create in the Global Traffic Manager is enabled. This means that the pool is accessible to the Global Traffic Manager as it balances connection requests. You can temporarily disable a pool, such as for a maintenance period, and then re-enable the pool when it is ready to receive name resolution requests.

To disable a pool
1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. The main pools screen opens. 2. Check the Select box for the pool that you want to disable. 3. Click the Disable button. After a few seconds, the pool becomes disabled. You can verify that the pool is disabled by looking at its status icon, located in the Status column in the table of pools. The status of a disabled pool is a black square.

To enable a pool
1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. The main pools screen opens. 2. Check the Select box for the pool that you want to enable. 3. Click the Enable button. After a few seconds, the pool becomes enabled. The status icon of the pool, located in the Status column in the table of pools, changes to reflect the current availability of the pool. For example, a pool that is enabled and verified as available by the Global Traffic Manager has a status icon of a green circle.

Configuration Guide for BIG-IP Global Traffic ManagerTM

6-7

Chapter 6

Defining pools using a canonical name


A canonical name is the official name for a domain. In DNS, a CNAME record maps an alias to the canonical name for a domain, for example, a CNAME record can map the alias downloads.siterequest.com to the canonical name siterequest.com. When you define a pool using a canonical name, the system delegates DNS queries by responding to queries with a CNAME record, rather than a pool member. A content delivery network is identified by a domain name (canonical name). A CND is a network that includes devices designed and configured to maximize the speed at which a content provider's content is delivered. The purpose and goal of a CDN is to cache content closer, in Internet terms, to the user than the origin site is. Using a CDN to deliver content greatly reduces wide area network (WAN) latency so the content gets to the user more quickly, and the origin site servers are not overloaded and slowed by requests for content.

To define a pool using a CNAME


1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. The main pools screen opens. 2. Click the Create button. The New Pool screen opens. 3. In the Name box, type a name for the pool. 4. In the CNAME box, type the canonical name that is the resource for this pool. 5. Configure the remaining pool settings. For additional assistance with these settings, see the online help. 6. Click the Finished button to save the new pool.

6-8

Defining the Logical Network

Managing wide IPs


A wide IP is a mapping of a fully-qualified domain name (FQDN) to a set of virtual servers that host the domains content, such as a web site, an e-commerce site, or a content delivery network (CDN). Wide IPs use pools to organize virtual servers, which creates a tiered load balancing effect: the Global Traffic Manager first load balances requests to the appropriate pool of a wide IP, and then load balances within the pool to the appropriate virtual server. You can interact with wide IPs in many ways. You can: Define a wide IP Add pools to wide IPs Remove pools from wide IPs Organize pools within wide IPs Weight pools within wide IPs Disable and enable wide IPs Incorporate iRules

Defining wide IPs


When you create a wide IP, you name it and add at least one pool. You can also assign specific load balancing methods to the wide IP. Additionally, you can assign iRules, which are scripts that programmatically control how the Global Traffic Manager handles name resolution requests, to the wide IP.

To define a wide IP
1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. The wide IP screen opens. 2. Click the Create button. The New Wide IP screen opens. 3. In the Name box, type the fully-qualified domain name for the wide IP. 4. In the Pools section, use the Pool List option to add the pools that belong to this wide IP. Note that a pool can belong to more than one wide IP. 5. Configure the remaining wide IP settings. For additional assistance with these settings, see the online help. 6. Click the Finish button to save the new wide IP. Repeat this process for each wide IP that you want to create.

Configuration Guide for BIG-IP Global Traffic ManagerTM

6-9

Chapter 6

Using wildcard characters in wide IP names


The Global Traffic Manager supports wildcard characters in both wide IP names and wide IP aliases. If you have a large quantity of wide IP names and aliases, you can use wildcard characters to simplify your maintenance tasks. The wildcard characters you can use are: the question mark ( ? ), and the asterisk ( * ). The guidelines for using the wildcard characters are as follows:

The question mark ( ? ) Use the question mark to replace a single character, with the exception of dots ( . ). Use more than one question mark in a wide IP name or alias. Use both the question mark and the asterisk in the same wide IP name or alias.

The asterisk ( * ) Use the asterisk to replace multiple consecutive characters, with the exception of dots ( . ). Use more than one asterisk in a wide IP name or alias. Use both the question mark and the asterisk in the same wide IP name or alias.

The following examples are all valid uses of the wildcard characters for the wide IP name, www.mydomain.net. ???.mydomain.net www.??domain.net www.my*.net www.??*.net www.my*.* ???.my*.* *.*.net www.*.???

Searching for a specific wide IP


When you want to modify a wide IP, you can locate that specific wide IP using the search feature. You can search either by the full or partial name or alias of the wide IP. The search feature can be especially useful for companies with large networks that contain numerous wide IPs. For more information about how the search feature works see Locating a component using the search feature, on page 2-6.

6 - 10

Defining the Logical Network

To search for a specific wide IP


1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. The main screen for wide IPs opens. 2. In the Filter box, type the name or alias of the wide IP that you want to modify, and then click Filter. A list of wide IPs that matches the criteria you entered displays. For information about using a search pattern that includes a wildcard, see Locating a component using the search feature, on page 2-6. 3. Click the name of the wide IP that you want to modify. The properties screen for that wide IP opens. 4. Make changes to the wide IP properties as required. 5. Click the Update button to save your changes.

Adding pools to wide IPs


A wide IP must contain at least one pool, which must contain at least one pool member. This hierarchal configuration allows the Global Traffic Manager to load balance connection requests for a wide IP at two levels: first, the connection is load balanced across the pools assigned to the wide IP; second, the connection is load balanced across the pool members within the given pool.
Tip

You can assign the same pool to multiple wide IPs.

To add a pool to a wide IP


1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. The Wide IPs screen opens. 2. Click the name of the wide IP to which you want to add a pool. The properties screen of that wide IP opens. 3. On the menu bar, click Pools. The pools screen opens displaying a list of the pools currently assigned to the wide IP. 4. Click the Manage button. The manage pools screen opens. 5. Use the Pool List settings to add a pool to the wide IP. For more information, see the online help. 6. Click the Finished button to save your changes to the wide IP.

Repeat this process for each pool that you want to add to the wide IP.

Configuration Guide for BIG-IP Global Traffic ManagerTM

6 - 11

Chapter 6

Removing pools from wide IPs


When you remove a pool from a wide IP, the Global Traffic Manager ceases to use that pool when load balancing name resolution requests. Removing a pool does not delete it from the Global Traffic Manager; the pool remains available, and you can add it to another wide IP.

To remove a pool from a wide IP


1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. The Wide IPs screen opens. 2. Click the name of the wide IP from which you want to remove a pool. The properties screen of that wide IP opens. 3. On the menu bar, click Pools. The Pools screen opens displaying a list of the pools currently assigned to the wide IP. 4. Click the Manage button. The manage pools screen opens. 5. Use the Pools List option to select the pool that you want to remove, and then click Remove. 6. Click the Update button to save your changes to the wide IP.

Repeat this process for each pool that you want to remove from the wide IP.

Organizing pools within wide IPs


Certain load balancing methods within the Global Traffic Manager select pools based on the order in which they are listed in the wide IP. For example, the load balancing method, Global Availability, instructs the Global Traffic Manager to select the first pool in the wide IP until it becomes unavailable, at which point it selects the next pool until the first pool becomes available again.
Note

For more information on load balancing methods that the Global Traffic Manager supports, see Chapter 7, Load Balancing with the Global Traffic Manager. If you use a load balancing method that selects pools based on the order in which they are listed in a wide IP, you may want to change the order in which the pools are listed in the Pools List. When you organize your pools in conjunction with these load balancing methods, you can ensure that your most robust pool always receives resolution requests, while the other pools act as backups in case the primary pool becomes unavailable.

6 - 12

Defining the Logical Network

To organize pools within a wide IP


1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. The Wide IPs screen opens. 2. Click the name of the wide IP in which you want to organize pools. The properties page of that wide IP opens. 3. On the menu bar, click Pools. The Pools screen opens displaying a list of the pools currently assigned to the wide IP. 4. Click the Manage button. The manage pools screen opens. 5. Use the Pools List settings to select the pool and click either the Up or Down button to change its sequence. For more information, see the online help. 6. Click the Update button to save your changes to the wide IP. Repeat this process until the pools are listed in the necessary order.

Weighting pools within wide IPs


One of the load balancing methods that the Global Traffic Manager supports is the Ratio mode. This mode instructs the system to load balance network requests based on the weights assigned to a specific resource. If you use the Ratio mode to load balance across pools in a wide IP, you must assign weights to those pools. A weight is a value assigned to a resource, such as a pool, that the Global Traffic Manager uses to determine the frequency at which the resource receives connection requests. The Global Traffic Manager selects a resource based on the weight of that resource as a percentage of the total of all weights in that resource group. To illustrate the use of weights in connection load balancing, consider the fictional company SiteRequest. One of SiteRequests wide IPs, www.siterequest.com, uses the Ratio load balancing mode and contains three pools, with the following weight assignments: Pool 1: weight 50 Pool 2: weight 25 Pool 3: weight 25 Notice that the total of all the weights in this wide IP is 100. Each time the Global Traffic Manager selects this wide IP, it load balances across all three pools. Over time, the load balancing statistics for this wide IP appear as follows: Pool 1: selected 50 percent of the time Pool 2: selected 25 percent of the time Pool 3: selected 25 percent of the time

Configuration Guide for BIG-IP Global Traffic ManagerTM

6 - 13

Chapter 6

This pattern exists because the weight value, 50, is 50 percent of the total weight for all pools, while the weight value, 25, is 25 percent of the total.
Note

For information on the Ratio mode and other load balancing methods, see Chapter 7, Load Balancing with the Global Traffic Manager.

To weight pools within a wide IP


1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. The Wide IPs screen opens. 2. Click the name of the wide IP in which you want to weight pools. The properties page of that wide IP opens. 3. On the menu bar, click Pools. The Pools screen opens displaying a list of the pools currently assigned to the wide IP. 4. Click the Manage button. The Manage Pools screen opens. 5. Use the Pool List to select the pool to which you want to assign a ratio value. Note: If the pool already belongs to the wide IP, you must first remove the pool from the wide IP, and then add it back in again. 6. In the Ratio box, type a numerical value that represents the weight of the pool as compared to other pools within the same pool. The higher the value in this box, the greater the frequency at which the Global Traffic Manager selects the pool. 7. Click the Add button to add the pool, with ratio value, to the pool. 8. Click the Finished button to save your changes.

Repeat this process for each pool.

6 - 14

Defining the Logical Network

Disabling and enabling wide IPs


By default, any wide IP that you create in the Global Traffic Manager is enabled. This means that the wide IP is accessible to the Global Traffic Manager as it balances connection requests. You can temporarily disable a wide IP, such as for a maintenance period, and then re-enable the wide IP when it is ready to receive name resolution requests.

To disable a wide IP
1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. The Wide IPs screen opens. 2. Check the Select box for the wide IP that you want to disable. 3. Click the Disable button. After a few seconds, the wide IP becomes disabled. You can verify that the wide IP is disabled by looking at its status icon, located in the Status column in the table of wide IPs. The status of a disabled wide IP is a black square.

To enable a wide IP
1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. The wide IP screen opens. 2. Check the Select box for the wide IP that you want to enable. 3. Click the Enable button. After a few seconds, the wide IP becomes enabled. The status icon of the pool, located in the Status column in the table of wide IP, changes to reflect the current availability of the wide IP. For example, a wide IP that is enabled and verified as available by the Global Traffic Manager has a status icon of a green circle.

Incorporating iRules
An iRule is a set of one or more Tcl-based expressions that you can use with wide IPs to customize how the Global Traffic Manager handles network connection requests. You can use iRules with wide IPs in the following ways: Add an iRule to a wide IP Remove an iRule from a wide IP Organize multiple iRules assigned to a wide IP For information on creating iRules, see Chapter 15, Managing iRules.

Configuration Guide for BIG-IP Global Traffic ManagerTM

6 - 15

Chapter 6

Adding iRules to wide IPs


You can add an iRule to a wide IP at any time. When you add an iRule to a wide IP, the Global Traffic Manager uses the iRule to determine how to load balance name resolution requests.

To add an iRule to a wide IP


1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. The Wide IPs screen opens. 2. Click the name of the wide IP in which you want to add an iRule. The properties page of that wide IP opens. 3. On the menu bar, click iRules. The iRules screen opens displaying a list of the iRules currently assigned to the wide IP. 4. Click the Manage button. The manage iRules screen opens. 5. Use the iRules List option to add an iRule to the wide IP. 6. Click the Finished button to save your iRule to the wide IP.

Repeat this process for each iRule that you want to add to the wide IP.

Removing iRules from wide IPs


When you remove an iRule from a wide IP, the Global Traffic Manager no longer uses the iRule to determine how to load balance a name resolution request. Removing an iRule does not delete it from the Global Traffic Manager; you can still access the iRule by clicking iRules in the Global Traffic section of the Main tab.

To remove an iRule from a wide IP


1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. The Wide IPs screen opens. 2. Click the name of the wide IP in which you want to remove an iRule. The properties page of that wide IP opens. 3. On the menu bar, click iRules. The iRules screen opens displaying a list of the iRules currently assigned to the wide IP. 4. Click the Manage button. The manage iRules screen opens.

6 - 16

Defining the Logical Network

5. Use the iRules List option to select the iRule that you want to remove and click Remove. 6. Click the Update button to save your changes to the wide IP.

Repeat this process for each iRule that you want to remove from the wide IP.

Organizing iRules within wide IPs


You can customize a wide IP using more than one iRule. For example, a wide IP might have an iRule that focuses on the geographical source of the name resolution request, and another that focuses on redirecting specific requests to a different wide IP. If you assign more than one iRule to a wide IP, the Global Traffic Manager applies iRules in the order in which they are listed in the iRules List for the wide IP. You can change the order in which the Global Traffic Manager applies iRules to network connection requests at any time.

To organize iRules within a wide IP


1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. The Wide IPs screen opens. 2. Click the name of the wide IP in which you want to organize iRules. The properties page of that wide IP opens. 3. On the menu bar, click iRules. The iRules screen opens displaying a list of the iRules currently assigned to the wide IP. 4. Click the Manage button. The manage iRules screen opens. 5. Use the iRules List to select the iRule, and click either the Up or Down button to reposition the iRule in the list. 6. Click the Finished button to save your changes.

Repeat this process until the iRules are listed in the necessary order.

Configuration Guide for BIG-IP Global Traffic ManagerTM

6 - 17

Chapter 6

Implementing the NoError response for IPv6 resolution


In networks that use IPv6 addresses, a system receiving a Domain Name System (DNS) request for a zone is required to send a specific response, called a NoError response, any time it receives an IPv6 request for a zone that does not contain a corresponding AAAA record. After receiving this response, the client making the request can re-send the request for an equivalent IPv4 A record instead. Using the NoError response allows the client to send the equivalent request sooner and receive the name resolution faster. By default, the Global Traffic Manager does not send a NoError response when it does not have a AAAA record for a given zone. However, you can enable this response on a per-wide IP basis.

To implement the IPv6 NoError response


1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. The Wide IPs screen opens. 2. Click the name of the wide IP to which you want to implement the NoError response. The properties screen of that wide IP opens. 3. From the General Properties list, select Advanced. 4. From the IPv6 NoError Response list, select Enabled. 5. Click Update to save your changes.

6 - 18

Defining the Logical Network

Managing distributed applications


A distributed application is a collection of wide IPs that serves as a single application to a site visitor. Within the Global Traffic Manager, distributed applications provide you with several advantages:

You can organize logical network components into groups that represent the business environment for which these components were designed. You can configure a distributed application so that it is dependent on a physical component of your network, such as a data center, server, or link. If this physical component becomes unavailable, the Global Traffic Manager flags the distributed application as unavailable as well. These dependencies ensure that a user cannot access a distributed application that does not have all of its resources available. You can define persistence for a distributed application, ensuring that a user accessing the distributed application uses the same network resources until they end their session.

You can manage distributed applications in the following ways: Define distributed applications Add wide IPs to distributed applications Remove wide IPs from distributed applications Set dependencies Enable and disable distributed application traffic Enable persistent connections

Defining distributed applications


When you create a distributed application, you name it and add at least one wide IP. You can also configure the distributed application so that its availability depends on the availability of specific servers, virtual servers, or data centers. Additionally, you can configure whether the system routes requests coming from the same source during a specific time period to the same pool, or to a different pool. This is known as persistence.

To define a distributed application


1. On the Main tab of the navigation pane, expand Global Traffic and click Distributed Applications. The distributed applications screen opens. 2. Click the Create button. The New Distributed Application screen opens. 3. In the Name box, type a name for the distributed application.

Configuration Guide for BIG-IP Global Traffic ManagerTM

6 - 19

Chapter 6

4. Use the Member List settings to add the wide IPs that belong to this distributed application. Note: A wide IP can belong to only one distributed application. For more information on wide IPs, see Managing wide IPs, on page 6-9. 5. Configure the remaining distributed application settings. For assistance with these settings, see the online help. 6. Click the Finish button to create the distributed application.

Repeat this process for each distributed application that you want to create.

Adding wide IPs to distributed applications


A distributed application typically consists of multiple wide IPs that, collectively, provide a common set of functions for end-users. Through the Global Traffic Manager, you can add wide IPs to a distributed application.
Note

A wide IP can belong to only one distributed application.

To add a wide IP to a distributed application


1. On the Main tab of the navigation pane, expand Global Traffic and click Distributed Applications. The distributed applications screen opens. 2. Click the name of the distributed application to which you want to add a wide IP. 3. On the menu bar, click Members. The members screen opens displaying a list of the wide IPs currently assigned to the distributed application. 4. Click the Manage button. The manage wide IPs screen opens. 5. Use the Member List settings to add a wide IP to the distributed application. 6. Click the Finished button to save the distributed application.

6 - 20

Defining the Logical Network

Removing wide IPs from distributed applications


You can remove a wide IP from a distributed application at any time. For example, the role of a distributed application might change, resulting in one of its associated wide IPs being unnecessary. Alternatively, you might remove a wide IP from a distributed application, because it has been replaced with a newer one. Removing a wide IP does not delete it from the Global Traffic Manager; it remains available to the Global Traffic Manager when load balancing connection requests.

To remove a wide IP from a distributed application


1. On the Main tab of the navigation pane, expand Global Traffic and click Distributed Applications. The distributed applications screen opens. 2. Click the name of the distributed application from which you want to remove a wide IP. 3. On the menu bar, click Members. The members screen opens displaying a list of the wide IPs currently assigned to the distributed application. 4. Click the Manage button. The Manage Wide IPs screen opens. 5. Use the Member List settings to select the wide IP that you want to remove and click Remove. 6. Click the Finished button to save the distributed application.

Repeat this process for each wide IP that you want to add to the distributed application.

Setting dependencies for distributed applications


When you create a distributed application on the Global Traffic Manager, the system acquires information about the data centers, servers, and links that make up the application, including the status of each of these components. You have the option of setting the status of the distributed application to be dependent upon the status of one of these types of components. For example, when you configure the distributed application for server dependency, and a specified server becomes unavailable, the Global Traffic Manager considers the distributed application to be unavailable as well. The following examples illustrate how dependencies can affect the availability of a given distributed application. These examples involve the fictional company SiteRequest. This company has a distributed application that consists of two wide IPs: www.siterequest.com and downloads.siterequest.com. The company also has data centers in New York, Paris, and Tokyo, each of which provides resources that the

Configuration Guide for BIG-IP Global Traffic ManagerTM

6 - 21

Chapter 6

distributed application can access. In each example, a lightning storm caused the New York data center to lose power. Although the emergency power starts immediately, one of the wide IPs, one of the virtual servers, and one of the Internet links used by the application are offline, and thus unavailable.

Example 1: Data Center Dependency If the application uses data center dependency, the Global Traffic Manager considers the entire data center to be unavailable to the application, even if other virtual servers for the application remain available at the data center. Other connection requests, independent of the application, can still be sent to the data center. Example 2: Server Dependency Level If the application uses server dependency, the Global Traffic Manager considers the server hosting the virtual server to be unavailable to the application, even if other virtual servers on that server are online. Other connection requests, independent of the application, can still be sent to the server. Example 3: Link Dependency Level If the application uses link dependency, the Global Traffic Manager considers all resources for the application that use that link to be unavailable to the application. Other connection requests, independent of the application, can still be sent to these resources through other links. Example 4: Wide IP Dependency Level If the application uses wide IP dependency, the Global Traffic Manager considers all wide IPs that host that application to be unavailable, even if only one of the wide IPs is unavailable. Other connection requests, independent of the application, can still be sent to the data center.
Note

You do not have to set a dependency for a distributed application. You can accept the default value of None. If you do not set a dependency, then the Global Traffic Manager considers the application available as long as there is at least one wide IP to which it can load balance a name resolution request.

To set a dependency for a distributed application


1. On the Main tab of the navigation pane, expand Global Traffic and click Distributed Applications. The distributed applications screen opens. 2. Click the name of the distributed application for which you want to set a dependency. 3. On the menu bar, click Members. The members screen opens displaying a list of the wide IPs currently assigned to the distributed application.

6 - 22

Defining the Logical Network

4. From the Dependency Level list, select the physical component on which you want the distributed application to depend. Note: If the component you select becomes unavailable, the Global Traffic Manager considers the distributed application to be unavailable as well. 5. Click the Update button to save the changes to the application.

Enabling and disabling distributed application traffic


Distributed applications often consist of many data centers, servers, and links. You might find that you need to remove a given physical component without interrupting access to the application. For example, you might want to take a server down to update it, yet do not want its absence to affect the application. To accommodate this and similar situations, the Global Traffic Manager provides options so you can enable and disable distributed application traffic for a specific physical component on the network.
Note

When you add a physical component to a distributed application, by default, distributed application traffic is enabled for that component.

To disable distributed application traffic


1. On the Main tab of the navigation pane, expand Global Traffic and click Distributed Applications. The distributed applications screen opens. 2. Click the name of distributed application for which you want to disable traffic. The properties screen for that application opens. 3. On the menu bar, click Data Centers, Links, or Servers. A screen listing the available physical components opens. 4. Check the box for each physical component for which you want to disable application traffic. 5. Click Disable Distributed Application Traffic.

To enable distributed application traffic


1. On the Main tab of the navigation pane, expand Global Traffic and click Distributed Applications. The distributed applications screen opens. 2. Click the name of distributed application for which you want to enable traffic. The properties screen for that application opens. 3. On the menu bar, click either Data Centers, Links, or Servers. A screen listing the available physical components opens.

Configuration Guide for BIG-IP Global Traffic ManagerTM

6 - 23

Chapter 6

4. Check the box for each physical component for which you want to enable application traffic. 5. Click Enable Distributed Application Traffic.

Enabling persistent connections


Many distributed applications require that users access a single set of resources until they complete their transaction. For example, customers purchasing a product online might need to remain with the same data center until they finish their order. In the context of the Global Traffic Manager, this requirement is called persistence. Persistence is the state in which a user of the system remains with the same set of resources until the user closes the connection. When you enable persistence for a distributed application, and an LDNS makes repetitive requests on behalf of a client, the system reconnects the client to the same resource to which it was connected for previous requests. For persistence to work correctly for a distributed application, you must also specify a dependency level. This is because a connection to the distributed application persists to the dependency object you specify (that is, the specified wide IP, server, data center, or link), and not to a specific pool member.

To enable persistence for a distributed application


1. On the Main tab of the navigation pane, expand Global Traffic and click Distributed Applications. The distributed applications screen opens. 2. Click the name of distributed application for which you want to enable persistent connections. The properties screen for that application opens. 3. On the menu bar, click Members. The Members screen appears. 4. From the Dependency Level list, select the type of resource to which you want connections to persist. 5. Click the Persistence box. 6. In the Persistence TTL box, type the number of seconds that you want the system to maintain a connection between an LDNS and a particular virtual server. 7. Click the Update button to save your changes to the application.

6 - 24

7
Load Balancing with the Global Traffic Manager

Understanding load balancing on the Global Traffic Manager Using static load balancing modes Using dynamic load balancing modes Configuring load balancing Using the fallback load balancing method Employing additional load balancing options

Load Balancing with the Global Traffic Manager

Understanding load balancing on the Global Traffic Manager


When the Global Traffic Manager receives a name resolution request, the system employs a load balancing mode to determine the best available virtual server to which to send the request. Once the Global Traffic Manager identifies the virtual server, it constructs a Domain Name System (DNS) answer and sends that answer back to the requesting clients LDNS. The DNS answer, or resource record, can be either an A record or AAAA record that contains the IP address of the virtual server, or a CNAME record that contains the canonical name for a DNS zone. Within the Global Traffic Manager, there are two categories of load balancing modes from which to select: static and dynamic. A static load balancing mode selects a virtual server based on a pre-defined pattern. A dynamic load balancing mode selects a virtual server based on current performance metrics. The Global Traffic Manager provides a tiered load balancing system. A tiered load balancing system is a load balancing system that occurs at more than one point during the resolution process. The tiers within the Global Traffic Manager are as follows:

Wide IP-level load balancing A wide IP contains two or more pools. The Global Traffic Manager load balances requests, first to a specific pool, and then to a specific virtual server in the selected pool. If the preferred, alternate, and fallback load balancing methods that are configured for the pool or virtual server fail, then the requests fail, or the system falls back to DNS. Pool-level load balancing A pool contains one or more virtual servers. After the Global Traffic Manager uses wide IP-level load balancing to select the best available pool, it uses a pool-level load balancing to select a virtual server within that pool. If the first virtual server within the pool is unavailable, the Global Traffic Manager selects the next best virtual server based on the load balancing mode assigned to that pool.

For each pool that you manage, the Global Traffic Manager supports three types of load balancing methods: preferred, alternate, and fallback. The preferred load balancing method is the load balancing mode that the system attempts to use first. If the preferred method fails to provide a valid resource, the system uses the alternate load balancing method. Should the alternate load balancing method also fail to provide a valid resource, the system uses the fallback method. One of the key differences between the alternate methods and the other two load balancing methods is that only static load balancing modes are available from the alternate load balancing list. This limitation exists because dynamic load balancing modes, by definition, rely on metrics collected from different resources. If the preferred load balancing mode does not return a valid resource, it is likely that the Global Traffic Manager was

Configuration Guide for BIG-IP Global Traffic ManagerTM

7-1

Chapter 7

unable to acquire the proper metrics to perform the load balancing operation. By limiting the alternate load balancing options to static methods only, the Global Traffic Manager can better ensure that, should the preferred method prove unsuccessful, the alternate method returns a valid result.
Note

You can select static or dynamic load balancing modes for the fallback load balancing method. Table 7.1 shows a list of the supported static load balancing modes. Table 7.2 shows a list of the supported dynamic load balancing modes. Both tables indicate where you can use each mode in the Global Traffic Manager configuration. The following sections in this chapter describe how each load balancing mode works.
Use for wide IP load balancing Use for preferred method X X X X Use for alternate method X X X X X X X X X X X X X X X X X Use for fallback method X X X X X X X X X

Load Balancing mode Drop Packet Fallback IP Global Availability None Ratio Return to DNS Round Robin Static Persist Topology

Table 7.1 Static load balancing mode usage

Load Balancing mode Completion Rate CPU Hops Kilobytes/Second Least Connections

Use for wide IP load balancing

Use for preferred method X X X X X

Use for alternate method

Use for fallback method X X X X X

Table 7.2 Dynamic load balancing mode usage

7-2

Load Balancing with the Global Traffic Manager

Load Balancing mode Packet Rate Quality of Service Round Trip Time Virtual Server Score VS Capacity

Use for wide IP load balancing

Use for preferred method X X X X X

Use for alternate method X

Use for fallback method X X X

X X

X X

Table 7.2 Dynamic load balancing mode usage

Using static load balancing modes


Static load balancing modes distribute connections across the network according to predefined patterns, and take server availability into account. The Global Traffic Manager supports the following static load balancing modes: Drop Packet Fallback IP Global Availability None Ratio Return to DNS Round Robin Static Persist Topology The None and Return to DNS load balancing modes are special modes that you can use to skip load balancing under certain conditions. The other static load balancing modes perform true load balancing as described in the following sections.

Drop Packet mode


When you specify the Drop Packet load balancing mode, the Global Traffic Manager does nothing with the packet, and simply drops the request.
Note

A typical LDNS iteratively queries other authoritative nameservers when it times out on a query.

Configuration Guide for BIG-IP Global Traffic ManagerTM

7-3

Chapter 7

Fallback IP mode
When you specify the Fallback IP load balancing mode, the Global Traffic Manager returns the IP address that you specify as the fallback IP, as an answer to the query. Note that you can specify both an IPv4 and an IPv6 address as the fallback IP address. The IP address that you specify is not monitored for availability before being returned as an answer. When you use the Fallback IP mode, you can specify a disaster recovery site to return when no load balancing mode returns an available virtual server. F5 Networks recommends that you use the Fallback IP load balancing mode only for the fallback method. The Global Traffic Manager uses the fallback method when the preferred and alternate load balancing modes do not provide at least one virtual server to return as an answer to a query.

Global Availability mode


The Global Availability load balancing mode uses the virtual servers included in the pool in the order in which they are listed. For each connection request, this mode starts at the top of the list and sends the connection to the first available virtual server in the list. Only when the current virtual server is full or otherwise unavailable does Global Availability mode move to the next virtual server in the list. Over time, the first virtual server in the list receives the most connections and the last virtual server in the list receives the least number of connections.

None mode
The None load balancing mode is a special mode you can use if you want to skip the current load balancing method, or skip to the next pool in a multiple pool configuration. For example, if you set an alternate method to None in a pool, the Global Traffic Manager skips the alternate method and immediately tries the load balancing mode specified as the fallback method. If the fallback method is set to None, and you have multiple pools configured, the Global Traffic Manager uses the next available pool. If all pools become unavailable, the Global Traffic Manager returns an aggregate of the IP addresses of all pool members using BIND.
Tip

If you do not want the Global Traffic Manager to return multiple addresses that are potentially unavailable, F5 Networks recommends that you set the alternate method to Drop Packet. You can also use the None mode to limit each pool to a single load balancing mode. For example, you can set the preferred method in each pool to the desired load balancing mode, and then you can set both the alternate and fallback methods to None in each pool. If the preferred method fails, the None value for both the alternate and fallback methods forces the Global Traffic Manager to go to the next pool for a load balancing answer.
7-4

Load Balancing with the Global Traffic Manager

Ratio mode
The Ratio load balancing mode distributes connections among a pool of virtual servers as a weighted round robin. Weighted round robin refers to a load balancing pattern in which the Global Traffic Manager rotates connection requests among several resources based on a priority level, or weight, assigned to each resource. For example, you can configure the Ratio mode to send twice as many connections to a fast, new server, and only half as many connections to an older, slower server. The Ratio load balancing mode requires that you define a ratio weight for each virtual server in a pool, or for each pool if you are load balancing requests among multiple pools. The default ratio weight for a server or a pool is set to 1.

Return to DNS mode


The Return to DNS load balancing mode is another special mode that you can use to immediately return connection requests to the LDNS for resolution. This mode is particularly useful if you want to temporarily remove a pool from service, or if you want to limit a pool in a single pool configuration to only one or two load balancing attempts.

Round Robin mode


The Round Robin load balancing mode distributes connections in a circular and sequential pattern among the virtual servers in a pool. Over time, each virtual server receives an equal number of connections.

Static Persist mode


The Static Persist load balancing mode uses the persist mask with the source IP address of the LDNS in a deterministic algorithm to map to a specific pool member (virtual server) in a pool. Like the Global Availability mode, the Static Persist mode resolves to the first available pool member; however, the list of pool members is ordered in a significantly different manner. With the Global Availability mode, a system administrator manually configures the order of the members in the list. With the Static Persist mode, the Global Traffic Manager system uses a hash algorithm to determine the order of the members in the list.

Configuration Guide for BIG-IP Global Traffic ManagerTM

7-5

Chapter 7

This hash algorithm orders the pool members in the list differently for each LDNS that is passing traffic to the system taking into account the specified CIDR of the LDNS. Thus, while each LDNS (and thus each client) generally resolves to the same virtual server, the Global Traffic Manager system distributes traffic across all of the virtual servers.
Note

When the selected virtual server becomes unavailable, the system resolves requests to another virtual server. When the original virtual server becomes available again, the system resolves requests to that virtual server.

Topology mode
The Topology load balancing mode allows you to direct or restrict traffic flow by adding topology records to a topology statement in the configuration file. When you use the Topology load balancing mode, you can develop proximity-based load balancing. For example, a client request in a particular geographic region can be directed to a data center or server within that same region. The Global Traffic Manager determines the proximity of servers by comparing location information derived from the DNS message to the topology records. This load balancing mode requires you to do some advanced configuration planning, such as gathering the information you need to define the topology records. The Global Traffic Manager contains an IP classifier that accurately maps the LDNS, so when you create topology records, you can refer to continents and countries, instead of IP subnets. See Chapter 9, Load Balancing Connection Requests Using Topologies, for detailed information about working with this and other topology features.

Using dynamic load balancing modes


Dynamic load balancing modes distribute connections to servers that show the best current performance. The performance metrics taken into account depend on the particular dynamic mode you are using. All dynamic load balancing modes make load balancing decisions based on the metrics collected by the big3d agents running in each data center. The big3d agents collect the information at set intervals that you define when you set the global timer variables. If you want to use the dynamic load balancing modes, you must run one or more big3d agents in each of your data centers, to collect the required metrics.

7-6

Load Balancing with the Global Traffic Manager

Types of dynamic load balancing modes


The Global Traffic Manager supports the following dynamic load balancing modes: Completion Rate CPU Hops Kilobytes/Second Least Connections Packet Rate Quality of Service (QoS) Round Trip Times (RTT) Virtual Server Score VS Capacity

Completion Rate mode


The Completion Rate load balancing mode selects the virtual server that currently maintains the least number of dropped or timed-out packets during a transaction between a data center and the clients LDNS.

CPU mode
The CPU load balancing mode selects the virtual server that currently has the most CPU processing time available to handle name resolution requests.

Hops mode
The Hops load balancing mode is based on the traceroute utility, and tracks the number of intermediate system transitions (router hops) between a clients LDNS and each data center. Hops mode selects a virtual server in the data center that has the fewest router hops from the LDNS.

Kilobyte/Second mode
The Kilobytes/Second load balancing mode selects a virtual server that is currently processing the fewest number of kilobytes per second. You can use this mode only with servers for which the Global Traffic Manager can collect the kilobytes per second metric. See Chapter 13, Collecting Metrics, for details on the metrics the Global Traffic Manager collects.

Configuration Guide for BIG-IP Global Traffic ManagerTM

7-7

Chapter 7

Least Connections mode


The Least Connections load balancing mode is used for load balancing to virtual servers managed by a load balancing server, such as a Local Traffic Manager. The Least Connections mode selects the virtual server that currently hosts the fewest connections.

Packet Rate mode


The Packet Rate load balancing mode selects a virtual server that is currently processing the fewest number of packets per second.

Quality of Service mode


The Quality of Service load balancing mode uses current performance information to calculate an overall score for each virtual server, and then distributes connections based on each virtual servers score. The performance factors that the Global Traffic Manager takes into account include: Round Trip Time Hops Virtual Server Score Packet Rate Topology Link Capacity VS Capacity Kilobytes/Second Figure 7.1 illustrates the equation that Global Traffic Manager uses to calculate the overall QoS score.
QoS_RTT * (QoSFACTOR_RTT / rtt) * 10 + QoS_HOPS * (QoSFACTOR_HOPS / hops) + QoS_HIT_RATIO * (hit_ratio / QoSFACTOR_HIT_RATIO) + QoS_PACKET_RATE * (QoSFACTOR_PACKET_RATE / packet_rate) * 100 + QoS_BPS * (QoSFACTOR_BPS / bps ) + QoS_TOPOLOGY * (topology/ QoSFACTOR_TOPOLOGY) + QoS_VS_CAPACITY * vs_capacity_score + QoS_VS_SCORE * vs_score + 10 * QoS_LCS * lcs_score

Figure 7.1 Equation for calculating overall QoS score The Quality of Service load balancing mode is a customizable load balancing mode. For simple configurations, you can easily use this load balancing mode with its default settings. For more advanced configurations, you can specify different weights for each performance factor in the equation.

7-8

Load Balancing with the Global Traffic Manager

You can also configure the Quality of Service load balancing mode to use the dynamic ratio feature. With the dynamic ratio feature turned on, the Quality of Service mode becomes similar to the Ratio mode, where the connections are distributed in proportion to ratio weights assigned to each virtual server. The ratio weights are based on the QoS scores: the better the score, the higher percentage of connections the virtual server receives. For details about customizing the Quality of Service mode, see Implementing the Quality of Service load balancing mode, on page 7-9.

Round Trip Times mode


The Round Trip Times (RTT) load balancing mode selects the virtual server with the fastest measured round trip time between a data center and a clients LDNS.

Virtual Server Score mode


The Virtual Server Score load balancing mode instructs the Global Traffic Manager to assign connection requests to virtual servers based on a user-defined ranking system. This load balancing mode is available only for managing connections between virtual servers controlled by Local Traffic Manager systems. Unlike other settings that affect load balancing operations, you cannot assign a virtual server score to a virtual server through the Global Traffic Manager. Instead, you assign this setting through the Local Traffic Manager that is responsible for the virtual server. For more information, see the F5 DevCentral web site: http://devcentral.f5.com.

VS Capacity mode
The VS Capacity load balancing mode creates a list of the virtual servers, weighted by capacity, then picks one of the virtual servers from the list. The virtual servers with the greatest capacity are picked most often, but over time all virtual servers are returned. If more than one virtual server has the same capacity, then the Global Traffic Manager load balances using the Round Robin mode among those virtual servers.

Implementing the Quality of Service load balancing mode


The Quality of Service mode is a dynamic load balancing mode that includes a configurable combination of the Round Trip Time (RTT), Completion Rate, Packet Rate, Topology, Hops, Link Capacity, VS Capacity, and Kilobytes/Second (KBPS) modes. The Quality of Service mode is based on an equation that takes each of these performance factors into account.

Configuration Guide for BIG-IP Global Traffic ManagerTM

7-9

Chapter 7

When the Global Traffic Manager selects a virtual server, it chooses the server with the best overall score. In the event that one or more resources has an identical score based on the Quality of Service criteria, the Global Traffic Manager load balances connections between those resources using the Round Robin methodology. If the system cannot determine a Quality of Service score, it load balances connections across all pool members using the Round Robin load balancing mode, as well. The Quality of Service mode has default settings that make it easy to use. There is no need to customize this mode; however, you can change the equation to put more or less weight on each individual factor. The following topics explain how to use and adjust the various settings of this mode.

Understanding QoS coefficients


Table 7.3 lists each Quality of Service (QoS) coefficient, its scale, a likely upper limit for each, and whether a higher or lower value is more efficient.
Example upper limit 100% Higher or lower? Higher

Coefficient Completion rate

How measured Percentage of successfully transferred packets (0-100%) Number of intermediate systems transitions (hops) Kilobytes per second throughput Based on the target dynamic ratio Packets per second Microseconds Score that defines network proximity by comparing server and LDNS IP addresses (0-232)

Default value 5

Hops

64

Lower

Kilobytes/second Link Capacity Packet rate Round trip time Topology

3 30 1 50 0

15000 2,000,000 700 2,000,000 100

Lower Higher Lower Lower Higher

Virtual Server Score

User-defined ranking of virtual servers Number of nodes up

100

Higher

VS Capacity

20

Higher

Table 7.3 QoS coefficients: Default values, ranges, and limits

If you change the default QoS coefficients, keep the following issues in mind.

Scale The raw metrics for each coefficient are not on the same scale. For example, completion rate is measured in percentages, while the packet rate is measured in packets per second.

7 - 10

Load Balancing with the Global Traffic Manager

Normalization The Global Traffic Manager normalizes the raw metrics to values in the range of 0 to10. As the QoS value is calculated, a high measurement for completion rate is good, because a high percentage of completed connections are being made, but a high value for packet rate is not desirable because the packet rate load balancing mode attempts to find a virtual server that is not overly taxed at the moment.

Emphasis You can adjust coefficients to emphasize one normalized metric over another. For example, consider the following QoS configuration: Round Trip Time: 50 Hops: 0 Topology: 0 Completion Rate: 5 Packet Rate: 10 VS Capacity: 0 Bits/second: 35 Link Capacity: 30 Virtual Server Score: 10 In this configuration, if the completion rates for two virtual servers are close, the system chooses the virtual server with the best packet rate. If both the completion rates and the packet rates are close, the round trip time (RTT) breaks the tie. In this example, the metrics for Topology, Hops, Link Capacity, VS Capacity, and Kilobytes/Second modes are not used in determining how to distribute connections.
Note

You cannot set a value for both the Round Trip Time and Hops settings simultaneously. In situations where the Global Traffic Manager has a value for both settings, the round trip time is incorporated, while the value for the Hops setting is reset to 0.

Configuration Guide for BIG-IP Global Traffic ManagerTM

7 - 11

Chapter 7

Customizing the QoS equation


You can establish your own custom settings for the Quality of Service load balancing method; however, you can customize the Quality of Service equation only at the pool level.

To customize the QoS equation


1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. The main screen for pools opens. 2. Click the name of the pool for which you want to modify the QoS equation. The properties screen for that pool opens. 3. On the menu bar, click Members. The members screen opens. 4. From either the Preferred or Fallback list, select Quality of Service. 5. Define the global QoS coefficients in the appropriate fields. 6. Click the Update button to save your changes.

Using the Dynamic Ratio option


The dynamic load balancing modes also support the Dynamic Ratio option. When you activate this option, the Global Traffic Manager treats dynamic load balancing values as ratios, and it uses each server in proportion to the ratio determined by this option. When the Dynamic Ratio option is disabled, the Global Traffic Manager uses only the server with the best result based on the dynamic load balancing mode you implemented (in which case it is a winner-takes-all situation), until the metrics information is refreshed.
Note

By default, the Dynamic Ratio setting is disabled (cleared). To illustrate how the Dynamic Ratio setting works, consider a pool, primaryOne, that contains several pool members. This pool is configured so that the Global Traffic Manager load balances name resolution requests based on the Round Trip Time load balancing mode. The primaryOne pool contains two pool members: memberOne and memberTwo. For this example, the Global Traffic Manager determines that the round trip time for memberOne is 50 microseconds, while the round trip time for memberTwo is 100 microseconds. If the primaryOne pool has the Dynamic Ratio setting disabled (the default setting), the Global Traffic Manager always load balances to the pool with the best value. In this case, this results in requests going to memberOne, because it has the lowest round trip time value.
7 - 12

Load Balancing with the Global Traffic Manager

If the primaryOne pool has the Dynamic Ratio setting enabled, however, the Global Traffic Manager treats the round trip time values as ratios and divide requests among pool members based on these ratios. In this case, this results in memberOne getting twice as many connections as memberTwo, because the round trip time for memberOne is twice as fast as the round trip time for memberTwo. Note that, with the Dynamic Ratio option enabled, both pool members are employed to handle connections, while if the option is disabled, only one pool member receives connections.

To enable the Dynamic Ratio option for a pool


1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. The main screen for pools opens. 2. Click the name of the pool for which you want to enable the Dynamic Ratio option. The properties screen for the pool opens. 3. From the Configuration list, select Advanced. Additional fields display with default settings. 4. Check the Dynamic Ratio box. 5. Click the Update button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

7 - 13

Chapter 7

Configuring load balancing


You configure load balancing at the wide IP and pool levels:

Wide IP When you define a wide IP, and you have multiple pools in your wide IP, you specify which load balancing mode to use in selecting a pool in the wide IP. To configure load balancing for a wide IP, see Configuring load balancing methods for wide IPs, following. Pool After the Global Traffic Manager selects a pool of virtual servers, it then employs the settings you specified as the preferred, alternate, and fallback load balancing methods to select a virtual server within the selected pool. To configure load balancing for a pool, see Configuring load balancing methods for pools, on page 7-15.

There may be situations (for example, e-commerce, and other sites with multiple services) where you need to configure a wide IP so that connections are not sent to a given address unless multiple ports or services are available. You configure this behavior after you define the wide IP. For details, see Employing additional load balancing options, on page 7-17.

Configuring load balancing methods for wide IPs


The Global Traffic Manager supports a wide variety of load balancing methods for distributing network connection requests across the pools in a wide IP. For information on these load balancing methods, see Understanding load balancing on the Global Traffic Manager, on page 7-1.

To configure load balancing methods for a wide IP


1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. The main screen for wide IPs opens. 2. Click the name of the wide IP for which you want to configure a load balancing method. The properties screen for the wide IP opens. 3. On the menu bar, click Pools. The pools screen opens displaying a list of the pools currently assigned to the wide IP. 4. Select the appropriate load balancing options. For additional information on these load balancing options, see the online help. 5. Click the Update button to save your changes to the wide IP.

Repeat this process for each wide IP as needed.

7 - 14

Load Balancing with the Global Traffic Manager

Configuring load balancing methods for pools


The Global Traffic Manager supports a wide variety of load balancing methods for distributing network connection requests across the virtual servers in a pool. For information on these load balancing modes, see Understanding load balancing on the Global Traffic Manager, on page 7-1. For each pool that you manage, the Global Traffic Manager supports three types of load balancing methods: preferred, alternate, and fallback. The preferred load balancing method is the load balancing method that the system attempts to use first. If the preferred method fails to provide a valid resource, the system uses the alternate load balancing method. Should the alternate load balancing method also fail to provide a valid resource, the system uses the fallback method.

To configure load balancing methods for a pool


1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. The main screen for pools opens. 2. Click the name of the pool for which you want to configure load balancing methods. The properties screen for that pool opens. 3. On the menu bar, click Members. The members screen opens displaying a list of the virtual servers currently assigned to the pool. 4. Select the appropriate load balancing options. For additional information on these load balancing options, see the online help. 5. Click the Update button to save your changes to the pool.

Repeat this process for each pool as needed.

Configuration Guide for BIG-IP Global Traffic ManagerTM

7 - 15

Chapter 7

Using the fallback load balancing method


The Global Traffic Manager supports three types of load balancing methods at the pool level: preferred, alternate, and fallback. The preferred load balancing method is the load balancing method that the system attempts to use first. If the preferred method fails to provide a valid resource, the system uses the alternate load balancing method. Should the alternate load balancing method also fail to provide a valid resource, the system uses the fallback method. The fallback load balancing method is unique among the three load balancing method that you can apply to a pool. Unlike the preferred and alternate methods, the fallback method ignores the availability status of a resource. This occurs to ensure that the Global Traffic Manager returns a response to the DNS request. For more information on the determining resource health and availability, see Chapter 8, Managing Connections.
Note

If you do not want the Global Traffic Manager to return an address that is potentially unavailable, F5 Networks recommends that you set the alternate load balancing method to Drop Packet. The Global Traffic Manager contains several options that help you control how the system responds when using a fallback load balancing setting. These options allow you to: Configure the fallback load balancing method Configure the fallback IP load balancing mode

Configuring the fallback load balancing method


When you assign a load balancing mode to the fallback load balancing method for a pool, the Global Traffic Manager uses the mode differently than for the preferred and alternate methods. With the fallback load balancing method, the Global Traffic Manager load balances the name resolution request after verifying that the virtual server address returned is up or down. However, unlike with other load balancing methods, you can opt to use the fallback load balancing method to resolve a name resolution request without verifying the status of the virtual server.
Note

By default, the Respect Fallback Dependency option is disabled. When you enable it, the system verifies that the virtual server is available for using it for fallback load balancing.

7 - 16

Load Balancing with the Global Traffic Manager

To use the fallback load balancing method without verifying virtual server availability
1. On the Main tab of the navigation pane, expand System and click Configuration. The general properties screen opens. 2. From the Global Traffic menu, choose Load Balancing. The load balancing properties screen opens. 3. Verify that the Respect Fallback Dependency box is clear. 4. Click the Update button to save your changes.

Employing additional load balancing options


The Global Traffic Manager supports additional options that affect how the system load balances name resolution requests. These options are: Ignore path TTL Verify virtual server availability The Ignore Path TTL option instructs the Global Traffic Manager to use path information gathered during metrics collection even if the time-to-live value for that information has expired. This option is often used when you want the system to continue using a dynamic load balancing mode even if some metrics data is temporarily unavailable, and you want the Global Traffic Manager to use old metric data rather than employ an alternate load balancing method. This option is disabled by default. The Verify Virtual Server Availability option instructs the Global Traffic Manager to verify that a virtual server is available before returning it as a response to a name solution request. If this option is disabled, the system responds to a name resolution request with the virtual servers IP address regardless of whether the server is up or down. This option is rarely deactivated outside of a test or staging environment, and is enabled by default.

To access the Ignore Path TTL and Verify Virtual Server Availability options
1. On the Main tab of the navigation pane, expand System and click Configuration. The general properties screen opens. 2. From the Global Traffic menu, choose Load Balancing. The load balancing properties screen opens. 3. Enable or disable the Ignore Path TTL and Verify Virtual Server Availability options as needed. 4. Click the Update button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

7 - 17

Chapter 7

7 - 18

8
Managing Connections

Introducing connection management Determining resource health Determining resource availability Resuming connections to resources Establishing persistent connections Setting the last resort pool

Managing Connections

Introducing connection management


When you integrate a Global Traffic Manager into your network, one of its primary responsibilities is to load balance incoming connection requests to the virtual server resource that best fits the configuration parameters you defined. However, load balancing is only one part of managing connections to your network resources. Additional issues that you must consider include:

Resource health Resource health refers to the ability of a given resource to handle incoming connection requests. For example, the Configuration utility uses a green circle to identify a resource, such as a wide IP, that has available pools and virtual servers, while a pool that is down appears as a red diamond. These visual clues can help you identify connection issues quickly and efficiently. Resource availability Resource availability refers to the settings within the Configuration utility that you use to control when a resource is available for connection request. For example, you can establish limit settings, which instruct the Global Traffic Manager to consider a resource as unavailable when a statistical threshold (such as CPU usage) is reached. Restoring availability When a resource goes offline, the Global Traffic Manager immediately sends incoming connection requests to the next applicable resource. When you bring that resource online again, you can control how to restore its availability to the Global Traffic Manager, ensuring that connections are sent to the resource only when it is fully ready to receive them. Persisting connections Certain interactions with your network require that a given user access the same virtual server resource until their connection is completed. An example of this situation is an online store, in which you want the user to access the same virtual server for their shopping cart until they place their order. With the Global Traffic Manager, you can configure your load balancing operations to take persistent connections into account. Selecting a last resort pool The Global Traffic Manager includes the ability to create a last resort pool. A last resort pool is a collection of virtual servers that are not used during normal load balancing operations. Instead, these virtual servers are held in reserve unless all other pools for a given wide IP become unavailable.

In addition, it is important to understand what happens when the Global Traffic Manager cannot find an available resource with which to respond to a connection request. You can find more information on this topic in Determining resource health, following.

Configuration Guide for BIG-IP Global Traffic ManagerTM

8-1

Chapter 8

Determining resource health


In the Global Traffic Manager, resource health refers to the ability of a given resource to handle incoming connection requests. The Global Traffic Manager determines this health through the use of limit settings, monitors, and dependencies on other network resources. The health of a resource is indicated by a status code in the Configuration utility. A status code is a visual representation of the availability of a given resource. The Global Traffic Manager displays these status codes in the main screens for a given resource. The types of status codes available for a resource are:

Blue A blue status code indicates that the resource has not been checked. This status often appears when you first add a resource into the Configuration utility. Green A green status code indicates that the resource is available and operational. The Global Traffic Manager uses this resource to manage traffic as appropriate. Red A red status code indicates that the resource did not respond as expected to a monitor. The Global Traffic Manager uses this resource only when two conditions are met: The Global Traffic Manager is using the load balancing mode specified in the Fallback load balancing setting. The Fallback load balancing setting for the pool is not None. Yellow A yellow status code indicates that the resource is operational, but has exceeded one of its established bandwidth thresholds. The Global Traffic Manager uses a resource that has a yellow status code only if no other resource is available. Black A black status code indicates that the resource has been manually disabled and is no longer available for load balancing operations.

As the preceding list illustrates, the health of a resource does not necessarily impact the availability of that resource. For example, the Global Traffic Manager can select a virtual server that has a red status code.

To view the resource health of a given resource


1. On the Main tab of the navigation pane, expand Global Traffic Manager. 2. Click the resource type that you want to view, such as Wide IPs. The main screen for the resource opens displaying a list of the resources of that type currently managed through the Global Traffic Manager, including the latest status code for each resource.

8-2

Managing Connections

Determining resource availability


To load balance effectively, the Global Traffic Manager must determine whether the appropriate resources are available. In the context of the Global Traffic Manager, availability means that the resource meets one or more sets of pre-defined requirements. These requirements can be a set of statistical thresholds, a dependency on another resource, or set of values returned by a monitoring agent. If a resource fails to meet one or more of these requirements, the Global Traffic Manager considers it unavailable and attempts to select the next resource based on the load balancing methodology you defined. The Global Traffic Manager includes three methods of determining resource availability: Limit settings Monitor availability requirements Virtual server dependencies The following sections describe each of these methods and how you can configure them within the Global Traffic Manager.

Establishing limit settings


One of the methods for determining the availability of a resource is to establish limit settings. A limit setting is a threshold for a particular statistic associated with a system. The Global Traffic Manager supports the following limit settings: Kilobytes Packets Total Connections For BIG-IP systems, the Global Traffic Manager also supports a Connections limit setting. For hosts, the Global Traffic Manager also supports CPU and Memory limit settings.

To establish limit settings for a BIG-IP system


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the name of the server that you want to configure. The properties screen for the server appears. 3. From the Configuration list, select Advanced. Additional fields display with default settings.

Configuration Guide for BIG-IP Global Traffic ManagerTM

8-3

Chapter 8

4. For each limit setting you want to configure, select Enabled from the corresponding list. The screen refreshes to show a box in which you can type a value for the limit setting. 5. Type the value for each limit setting in the corresponding box. 6. Click the Update button to save your changes.

Using monitors to determine availability


Another method for determining the availability of a given resource is through the use of monitors. A monitor is a software utility that specializes in a specific metric of a Global Traffic Manager resource. You can customize monitors to be as specific or as general as needed. To illustrate the use of monitors to determine the availability of a resource, consider the fictional company SiteRequest. One of the servers at SiteRequests Paris data center, serverWeb1, contains the main web site content for the wide IP, www.siterequest.com. To ensure that this server is available, SiteRequest configures an HTTP monitor within the Global Traffic Manager and assigns it to serverWeb1. This monitor periodically accesses the server to verify that the main index.html page is available. If the monitor cannot access the page, it notifies the Global Traffic Manager, which then considers the server unavailable until the monitor is successful. Monitors provide a robust, customizable means of determining the availability of a given resource with the Global Traffic Manager. The following procedure describes how to control the impact that a set of monitors has on the availability of a resource. For more detailed information on the types of monitors available to the Global Traffic Manager and how to configure them, see Chapter 11, Configuring Monitors.

To control how monitors determine the availability of a virtual server


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the name of the server that contains the virtual server you want to configure. The properties screen for the server appears. 3. On the menu bar, click Virtual Servers. The virtual server screen opens. 4. Click the name of the virtual server that you want to configure. The properties screen for the virtual server appears. 5. From the Configuration list, select Advanced. Additional fields display with default settings.

8-4

Managing Connections

6. Determine the availability requirements for the virtual server: If you want the Global Traffic Manager to consider the virtual server only if all monitors assigned to the virtual server are successful, select All Health Monitors from the Availability Requirements list. If you want the Global Traffic Manager to consider the virtual server as available only if some monitors assigned to it are successful, select At Least from the Availability Requirements list. When you select At Least, a box appears where you can type the number of monitors that must be successful for the virtual server to be available. 7. Click the Update button to save your changes.

You can also assign monitors to a specific server. In most cases, when you assign a monitor to a server, that monitor checks all virtual servers associated with that server. An exception to this guideline is the SNMP monitor. If you assign an SNMP monitor to a Cisco, Alteon, Extreme Networks, Foundry, or Radware server, that monitor obtains information on the virtual servers associated with that server. If you assign the SNMP monitor to any other server type, that monitor obtains data on the server itself.
Note

For more information on the SNMP monitor, see Chapter 11, Configuring Monitors. In cases where you assign a monitor to a virtual server both directly and to its parent server, the availability information acquired from the monitor directly assigned to the virtual server takes precedence over any other data.

To assign a monitor to check virtual servers associated with a server


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the name of the server that you want to configure. The properties screen for the server appears. 3. From the Configuration list, select Advanced. Additional fields display with default settings.

Configuration Guide for BIG-IP Global Traffic ManagerTM

8-5

Chapter 8

4. Determine the availability requirements for the virtual servers: If you want the Global Traffic Manager to consider a virtual server only if all monitors assigned to the virtual server are successful, select All Health Monitors from the Availability Requirements list. If you want the Global Traffic Manager to consider the virtual server as available only if some monitors assigned to it are successful, select At Least from the Availability Requirements list. When you select At Least, a box appears where you can type the number of monitors that must be successful for the virtual server to be available. 5. Click the Update button to save your changes.

To control how monitors determine the availability of a pool


1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. The main screen for pools opens. 2. Click the name of the pool that you want to configure. The properties screen for the pool appears. 3. From the Configuration list, select Advanced. Additional fields display with default settings. 4. Determine the availability requirements for the pool: If you want the Global Traffic Manager to consider the pool only if all monitors assigned to the pool are successful, select All Health Monitors from the Availability Requirements list. If you want the Global Traffic Manager to consider the pool as available only if some monitors assigned to it are successful, select At Least from the Availability Requirements list. When you select At Least, a box appears where you can type the number of monitors that must be successful for the pool to be available. 5. Click the Update button to save your changes.

To control how monitors determine the availability of a link


1. On the Main tab of the navigation pane, expand Global Traffic and click Links. The main screen for links opens. 2. Click the name of the link that you want to configure. The properties screen for the link appears. 3. From the Configuration list, select Advanced. Additional fields display with default settings.

8-6

Managing Connections

4. Determine the availability requirements for the link: If you want the Global Traffic Manager to consider the link only if all monitors assigned to the link are successful, select All Health Monitors from the Availability Requirements list. If you want the Global Traffic Manager to consider the link as available only if some monitors assigned to it are successful, select At Least from the Availability Requirements list. When you select At Least, a box appears where you can type the number of monitors that must be successful for the link to be available. 5. Click the Update button to save your changes.

Managing dependencies for virtual servers


Within the Global Traffic Manager, you can configure a virtual server to be dependent on one or more virtual servers. In such a configuration, the virtual server is available only if all of the resources in its Dependency List are available as well. For an example of virtual server dependencies, consider the fictional company SiteRequest. One of the servers, serverMain, at the Tokyo data center has two virtual servers: vsContact, which points to the contacts page of SiteRequests web site, and vsMail, which points to their mail system. The vsContact virtual server has vsMail added in its Dependency List. As a result, the Global Traffic Manager considers the vsContact virtual server available only if the vsMail virtual server is also available.

Setting virtual server dependencies


You can set dependencies for a virtual server at any time.

To set the dependency of a virtual server


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the name of the server that contains the virtual server you want to configure. The properties screen for the server appears. 3. On the menu bar, click Virtual Servers. The virtual server screen opens. 4. Click the name of the virtual server that you want to configure. The properties screen for the virtual server appears. 5. From the Configuration list, select Advanced. Additional fields display with default settings.

Configuration Guide for BIG-IP Global Traffic ManagerTM

8-7

Chapter 8

6. For the Dependency List setting, select a virtual server from the Virtual Servers list, and then click Add. The virtual server appears in the list. 7. Add additional virtual servers as needed. 8. Click the Update button to save your changes.

Removing virtual server dependencies


You can remove a virtual server from another virtual servers Dependency List at any time.

To remove a virtual server from a Dependency List


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the name of the server that contains the virtual server you want to configure. The properties screen for the server opens. 3. On the menu bar, click Virtual Servers. The virtual server screen opens. 4. Click the name of the virtual server that you want to configure. The properties screen for the virtual server opens. 5. From the Configuration list, select Advanced. Additional fields display with default settings. 6. For the Dependency List setting, select a virtual server from the Virtual Servers list, and then click Remove. 7. Remove additional virtual servers as needed. 8. Click the Update button to save your changes.

8-8

Managing Connections

Organizing virtual server dependencies


When you configure the Dependency List option for a virtual server, the Global Traffic Manager checks each virtual server in the order in which you added it to the Configuration utility. You can change this order at any time.

To organize virtual server dependencies


1. On the Main tab of the navigation pane, expand Global Traffic and click Servers. The main screen for servers opens. 2. Click the name of the server that contains the virtual server you want to configure. The properties screen for the server appears. 3. On the menu bar, click Virtual Servers. The virtual server screen opens. 4. Click the name of the virtual server that you want to configure. The properties screen for the virtual server appears. 5. From the Configuration list, select Advanced. Additional fields display with default settings. 6. In the Dependency List option, use the buttons provided to move the listed virtual servers up or down in the list. 7. Click the Update button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

8-9

Chapter 8

Resuming connections to resources


When a network resource, such as a virtual server, goes offline, the Global Traffic Manager considers that resource to be unavailable and proceeds to send name resolution requests to other resources based on the configured load balancing mode. By default, the Global Traffic Manager resumes sending requests to an offline resource as soon as that the resource becomes available again, provided that the resource meets the appropriate load balancing requirements. Under certain circumstances, you might not want the Global Traffic Manager to resume connections to a resource immediately. For example, a server for the fictional company, SiteRequest, goes offline. The Global Traffic Manager detects that the virtual servers associated with this server are unavailable, and proceeds to send name resolution requests to other virtual servers as appropriate. When the server is online again, it must still run several synchronization processes before it is fully ready to handle name resolution requests. However, the Global Traffic Manager might detect that the server is available before these processes are complete, and send requests to the server before that server can handle them. To avoid this possibility, you can configure pools to use the manual resume feature. The manual resume feature ensures that the Global Traffic Manager does not load balance requests to a virtual server within a pool until you manually re-enable it.

To activate the manual resume feature


1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. The main pools screen opens. 2. Click the name of the pool. The properties screen of the pool opens. 3. From the Configuration list, select Advanced. Additional fields display with default settings. 4. Check Manual Resume. 5. Click the Update button to save your changes.

8 - 10

Managing Connections

Establishing persistent connections


Most load balancing modes divide name resolution requests among available pools or virtual servers. Each time the Global Traffic Manager receives a request, it sends that request to the most appropriate resource based on the configuration of your network. For example, when a user visits a web site, it results in multiple name resolution requests as that user moves from page to page. Depending on the load balancing mode selected, the system sends each request to a completely different server, virtual server, or data center. In certain circumstances, you might want to ensure that a user remains with a given set of resources throughout the session. For example, a user attempting to conduct a transaction through an online bank needs to remain with the same set of resources to ensure the transaction is completed successfully. To ensure that users stay with a specific set of resources, the Global Traffic Manager includes a persistence option. The persistence option instructs the system to send a user to the same set of resources until a specified period of time has elapsed.

To establish persistent connections to a wide IP


1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. The main wide IP screen opens. 2. Click the name of the wide IP. The Properties screen for the wide IP opens. 3. On the menu bar, click Pools. The Pools List screen opens. 4. From the Persistence list, select Enabled. A new option, Persistent TTL, appears in which you can state how long a connection should persist to the same resources. 5. In the Persistent TTL box, type the time-to-live value, in seconds. 6. Click the Update button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

8 - 11

Chapter 8

Draining persistent requests


If you elect to use persistent connections with a load balancing mode, you must decide how to handle connection requests when you need to take a specific pool of virtual servers offline. By default, the Global Traffic Manager immediately sends connection requests to other pools when you take that pool offline, even if persistent connections are enabled. In some situations, this behavior might not be desirable. For example, consider an online store. You might need to take a pool of virtual servers for this store offline; however, you do not want to interrupt shoppers currently purchasing any products. In this situation, you want to drain persistent requests. Draining requests refers to allowing existing sessions to continue accessing a specific set of resources while disallowing new connections. In the Global Traffic Manager, you configure this capability through the Drain Persistent Requests option. This option applies only when you manually disable the pool. It does not apply when the pool goes offline for any other reason.

To drain persistent requests


1. On the Main tab of the navigation pane, expand System and click Configuration. The general properties screen opens. 2. From the Global Traffic menu, choose General. The General Global Properties screen opens. 3. Check Drain Persistent Requests. 4. Click the Update button to save your changes.

8 - 12

Managing Connections

Setting the last resort pool


When the Global Traffic Manager load balances name resolution requests, it considers any pool associated with a given wide IP as a potential resource. You can, however, modify this behavior by creating a last resort pool. A last resort pool is a pool of virtual servers to which the system sends connection requests in the event that all other pools are unavailable. It is important to remember that any pool you assign as the last resort pool is not a part of the normal load balancing operations of the Global Traffic Manager. Instead, this pool is kept in reserve. The system uses the resources included in this pool only if no other resources are available to handle the name resolution request.

To set the last resort pool


1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. The main wide IP screen opens. 2. Click the name of the Wide IP for which you want to set the last resort pool. The properties screen for the Wide IP opens. 3. On the menu bar, click Pools. The pools screen opens displaying a list of the pools currently assigned to the wide IP. 4. From the Last Resort Pool list, select a pool to be used as the last resort pool. 5. Click the Update button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

8 - 13

Chapter 8

8 - 14

9
Load Balancing Connection Requests Using Topologies

Overview of topologies Configuring the Global Traffic Manager to route connection requests to the closest data center Implementing topologies Reloading default geolocation data Removing topology records Disabling the Longest Match option

Load Balancing Connection Requests Using Topologies

Overview of topologies
You can configure the BIG-IP Global Traffic Manager to load balance incoming connection requests to a resource based on the physical proximity of the resource to the client making the request. You can also configure the system to deliver region specific content such as news and weather to a client making a request from a specific location. This can be accomplished by configuring the Global Traffic Manager to perform Topology load balancing. The Topology load balancing mode helps ensure that connection requests are answered and managed in the fastest possible time.

Understanding topology records


A topology record is a set of characteristics that maps the origin of a connection request to a specific destination. You create topology records in the Global Traffic Manager that instruct the system where to route connection requests when Topology load balancing is enabled. Figure 9.1 shows the Topology record creation screen in the Configuration utility.

Figure 9.1 Topology Record Builder

Each topology record contains the following elements: A request source statement that defines the origin of a connection request. A destination statement that defines the resource to which the Global Traffic Manager directs the connection request. A weight (topology score) that the system assigns to a server object during the load balancing process. By default, each time the system configuration is loaded, the Global Traffic Manager automatically sorts the topology records into an ordered list based on the topology longest match sorting algorithm. Before you create topology records, it is essential that you understand how the system sorts the topology record list, and then uses the ordered list to load balance connection requests.
Configuration Guide for BIG-IP Global Traffic ManagerTM

9-1

Chapter 9

Understanding how the system sorts topology records


By default, the Global Traffic Manager automatically sorts topology records using the longest match sorting algorithm. The system sorts the records in the following manner: First by the request source statement (LDNS or right-side of the record). If the LDNS match priority is the same in multiple topology records, the system sorts these records by the server match priority (server object or left-side of the record). The system sorts both the LDNS and server objects using the following priority from highest to lowest:
Topology priority (highest to lowest) IP subnet in CIDR format (most specific IP subnet placed at top of list) For example, the following IP subnets are ordered as follows: 10.15.1.0/24 10.15.0.0/16 10.0.0.0/8 Data Center Pool Region (customized collection of topologies) ISP State Country Continent Server negation (record excludes server object) LDNS negation (record excludes LDNS) Wildcard records (least specific record placed at bottom of list)

Table 9.1 Topologies ordered by priority

Important

The topology records list in the Configuration utility are not displayed in a sorted list.

9-2

Load Balancing Connection Requests Using Topologies

Understanding how the system load balances connection requests based on topology longest match
When Topology load balancing is enabled, by default the Global Traffic Manager load balances connection requests using the longest match sorting algorithm. When a connection request comes into the system the load balancing decision is based on the following process: For each server object that the Global Traffic Manager load balances connection requests to, the system iterates through an ordered list of topology records from first to last and assigns a weight to every server object. The system locates the first topology record that most specifically matches both the LDNS and the server object and assigns the topology score in the record to the server object. If the iteration through the list does not find a topology record that matches both the LDNS and the server object, then that server object is assigned a zero score. The Global Traffic Manager routes the connection request to the server object with the highest score. When server objects have equal scores, the Global Traffic Manager distributes connection requests among those server objects in a round robin fashion. To understand the default behavior when Topology load balancing is configured, consider the following scenario. The company Site Request has internal and external customers. The IT department wants to route all connection requests from internal customers on the 10.15.0.0/16 IP subnet to the internal_customer_pool, and all connection requests from external customers on the 10.0.0.0/8 IP subnet to the external_customer_pool. To do this the system administrator creates two topology records as shown in Figure 9.2. Note that the weights of the topology records are different. This instructs the Global Traffic Man aa ger to route the connection requests correctly.

Figure 9.2 Example topology records

Configuration Guide for BIG-IP Global Traffic ManagerTM

9-3

Chapter 9

When a connection request arrives from a source with an IP address of 10.15.65.8, the Global Traffic Manager assigns a weight of 200 to the internal_customer_pool and a weight of 100 to the external_customer_pool. This is because the LDNS 10.15.65.8 matches both request sources 10.15.0.0/16 and 10.0.0.0/8. However, the system load balances the request to the internal_customer_pool, because the weight assigned to that server object is higher.

Understanding user-defined regions


To further refine the Topology load balancing capabilities of the Global Traffic Manager, you can create regions. A region is a customized collection of topologies that defines a specific geographical location that has meaning for your network. For example, you can create a custom region called Scandinavia that includes Denmark, Iceland, Finland, Norway, and Sweden. After you create a region, you can create a topology record based on that region. The Global Traffic Manager is much more efficient when using the region topology for load balancing, because when setting load balancing scores for server objects the system iterates through the topology records in order from first to last. Table 9.1 shows how the use of topology regions improves the load balancing performance of the Global Traffic Manager. The system tests region membership for CIDR-based region members using a (log N) route lookup-based method; for topology record matches, the system uses a linear (N squared) search-based method.
Faster Load Balancing Configuration 2 data centers 1000 pool members in each data center 2 regions with 5000 CIDR entries each 2 topology records: 1 entry routes all requests from region1 to data center1 1 entry routes all requests from region2 to data center2 10,000 topology records: 5000 CIDR topology records route requests to data center1 5000 CIDR topology records route requests to data center2 Slower Load Balancing Configuration 2 data centers 1000 pool members in each data center

Table 9.2 Comparing configurations with and without using regions

9-4

Load Balancing Connection Requests Using Topologies

Configuring the Global Traffic Manager to route connection requests to the closest data center
You can configure the Global Traffic Manager to route connection requests to the closest data center using the Topology load balancing mode across pools at the wide IP level and across virtual servers (pool members) at the pool level.

Configuring Topology load balancing at the wide IP level


When you configure the Global Traffic Manager for Topology load balancing at the wide IP level, the system load balances connection requests to the pools that are associated with the wide IP. This configuration allows you to route connection requests to the data center that is closest to the requestor, and then to use another load balancing mode to route these connections among the resources in that data center.
Important

Important: To use Topology load balancing at the wide IP level to route connections to a specific data center, you must create pools that have all of their members in the same data center. Figure 9.3 shows siterequest.net configured for Topology load balancing at the wide IP level. All connection requests from a local domain name server (LDNS) in South America with an IP address of 10.0.0.1 are directed to Pool2 in SouthAmericaDC. All connection requests from an LDNS in North America with an IP address of 11.0.0.1 are directed to Pool1 in NorthAmericaDC. In this example, the Global Traffic Manager selects a pool to which to direct a connection based on topology records that match an LDNS (request source) to a pool (destination). How the system distributes the connections to the members is based on the load balancing mode that you set for each pool.

Figure 9.3 Example of topology load balancing at the wide IP level


Configuration Guide for BIG-IP Global Traffic ManagerTM 9-5

Chapter 9

Figure 9.4 shows the topology records that the Site Request administrator created. Based on these records, when a connection request comes in from the LDNS with an IP address of 10.0.0.1, the Global Traffic Manager assigns a weight of 100 to Pool2 and routes the request to Pool2. When a connection request comes in from the LDNS with an IP address of 11.0.0.1, the Global Traffic Manager assigns a weight of 100 to Pool1 and routes the request to Pool1.

Figure 9.4 Example of topology records for load balancing at the wide IP level

9-6

Load Balancing Connection Requests Using Topologies

Configuring Topology load balancing at the pool level


When you configure the Global Traffic Manager for Topology load balancing at the pool level, the system load balances connection requests to the members of a pool. This configuration allows you to set the weight of pool members in different data centers at different levels, and instruct the system to direct traffic to the pool members in a specific data center. Figure 9.5 shows siterequest.net configured for Topology load balancing at the pool level with all connection requests being directed from an LDNS with an IP address of 10.0.0.1 to pool members that are located in SouthAmericaDC, and all connection requests being directed from an LDNS with an IP address of 10.1.0.1 to pool members that are located in NorthAmericaDC. In this example, the Global Traffic Manager selects a pool member to which to direct a request based on topology records that match a specific LDNS (request source) to a specific virtual server (destination).

Figure 9.5 Example of topology load balancing at the pool level

Configuration Guide for BIG-IP Global Traffic ManagerTM

9-7

Chapter 9

Figure 9.6 shows the topology records that the Site Request administrator created. Based on these records, when a connection request comes in from the LDNS with an IP address of 10.0.0.1, the Global Traffic Manager assigns a weight of 100 to SouthAmericaDC and routes the request to SouthAmericaDC. When a connection request comes in from the LDNS with an IP address of 10.1.0.1, the Global Traffic Manager assigns a weight of 100 to NorthAmericaDC and routes the request to NorthAmericaDC.

Figure 9.6 Example of topology records for load balancing at the pool level

Configuring Topology load balancing at both the wide IP and pool levels
When you configure the Global Traffic Manager for Topology load balancing at both the wide IP and pool levels, the system first load balances the requests to a pool assigned to the wide IP and then to a member of the pool. Figure 9.7 shows siterequest.net configured for Topology load balancing at both the wide IP and pool levels with connection requests being directed from an LDNS in Buenos Aires to the SpanishPool in SouthAmericaDC. In this example, the Global Traffic Manager selects a pool to which to direct a connection based on topology records that match an LDNS (request source) to a pool (destination). How the system distributes the connections to the members of SpanishPool is based on topology records that match a specific LDNS (request source) to a specific virtual server (destination).

9-8

Load Balancing Connection Requests Using Topologies

Figure 9.7 Example of topology load balancing at the wide IP and pool levels

Figure 9.8 shows the topology records that the Site Request administrator created. Based on these records, when a connection request comes in from an LDNS in Buenos Aires, the Global Traffic Manager assigns a weight of 100 to SpanishPool and SouthAmericaDC. The system routes the request to the SpanishPool pool members that are in SouthAmericaDC.

Figure 9.8 Example of topology records for load balancing at both the wide IP and pool levels

Configuration Guide for BIG-IP Global Traffic ManagerTM

9-9

Chapter 9

Implementing topologies
To implement Topology load balancing, complete these tasks: Download and install updates to the IP geolocation data. Create topology records for the Global Traffic Manager to use for handling connection requests. Configure the Topology load balancing mode at the wide IP level, pool level, or both.

Downloading and installing updates to the IP geolocation data


The Global Traffic Manager uses an IP geolocation database to determine the origin of connection requests. The database that comes with the Global Traffic Manager provides geolocation data for IPv6 addresses at the continent and country levels. It also provides geolocation data for IPv4 addresses at the continent, country, state, ISP, and organization levels. The state-level data is worldwide, and thus includes designations in other countries that correspond to the U.S. state-level in the geolocation hierarchy, such as, provinces in Canada. You can download a monthly update to the IP geolocation database from F5 Networks. If you require geolocation data at the city-level, contact your F5 Networks sales representative to purchase additional database files.
Note

You can access the ISP and organization-level geolocation data for IPv4 addresses only using the iRules whereis command.

To download and install an update to the IP geolocation database


1. Log in to the F5 Networks customer web site at https://downloads.f5.com, and click Find a Download. 2. In the F5 Product Family column, find BIG-IP, and then in the Product Line column, click BIG-IP v10.x. 3. Select a version from the list preceding the table. 4. In the Name column, click Quova-GeolocationUpdates. 5. Click I Accept to accept the license. 6. In the Filename column, click the name of the most recent compressed file that you want to download. 7. In the Ready to Download table, click the download method that you want to use. 8. In the dialog box, click OK. 9. Select the directory in which you want to save the compressed file, and then decompress the file to save the RPM files on the system.
9 - 10

Load Balancing Connection Requests Using Topologies

10. Install and load one of the RPM files using the following command, where the path and file name are case-sensitive: geoip_update_data -f </path to RPM file and file name> The system installs and loads the specified database file. 11. Repeat step 10 for each of the RPM files that you saved to the system in step 9.

Creating a topology record


To create a topology record
1. On the Main tab of the navigation pane, expand Global Traffic and click Topology. 2. Click the Create button. The new record screen opens. 3. To create a request source statement, use the Request Source settings: a) Select an origin type from the first list. b) Select an operator, either is or is not. c) Define the criteria for the request source statement based on the request source type you selected. 4. To create a destination statement, use the Destination settings: a) Select a destination type from the first list. b) Select an operator, either is or is not. c) Define the criteria for the destination statement based on the destination type you selected. 5. In the Weight box, specify the priority this record has over other topology records. 6. Click the Create button to save the new topology record.

Configuration Guide for BIG-IP Global Traffic ManagerTM

9 - 11

Chapter 9

Configuring a wide IP for Topology load balancing


You can use the Topology load balancing mode to distribute traffic among the pools in a wide IP. To do this, you must have at least two pools configured in the wide IP.

To configure a wide IP for Topology load balancing


1. On the Main tab of the navigation pane, expand Global Traffic and click Wide IPs. 2. Click the name of the wide IP for which you want to assign topology-based load balancing. The wide IP properties screen opens. 3. On the menu bar, click Pools. The pools screen opens displaying a list of the pools currently assigned to the wide IP. 4. From the Load Balancing Method list, select Topology. 5. Click the Update button to save your changes.

Repeat this process for each wide IP that you want to configure for Topology load balancing.

Configuring a pool for Topology load balancing


In addition to setting up the Topology load balancing mode to select a pool within a wide IP, you can also set up the Topology load balancing mode to select a virtual server within a pool.

To configure a pool for Topology load balancing


1. On the Main tab of the navigation pane, expand Global Traffic and click Pools. 2. Click the name of the pool to which you want to assign topology-based load balancing. The pool properties screen opens. 3. On the menu bar, click Members. The Members screen opens displaying a list of the virtual servers currently assigned to the pool. 4. In the Load Balancing Method option, select Topology from the Preferred list. 5. Click the Update button to save your changes.

Repeat this process for each pool that you want to configure for Topology load balancing.

9 - 12

Load Balancing Connection Requests Using Topologies

Reloading default geolocation data


To uninstall an update to the IP geolocation database, reload the default geolocation database files using either the Configuration utility or tmsh.
Important

Before you reload the default geolocation data, delete the RPM files that are in the /shared/GeoIP directory.

To reload the default geolocation data using the Configuration utility


1. Log on to the Configuration utility. 2. On the Main tab of the navigation pane, expand System and click Configuration. 3. In the Geolocation area, click the Reload button in the Operations setting. The system reloads the default geolocation database files that are stored in /usr/share/GeoIP.

To reload the default geolocation data from tmsh


1. Log on to tmsh. 2. Run the command sequence: load / sys geoip The system reloads the default geolocation database files that are stored in /usr/share/GeoIP.

Configuration Guide for BIG-IP Global Traffic ManagerTM

9 - 13

Chapter 9

Removing topology records


As your network changes, you might need to refine your existing topology records, or remove outdated topology records. For example, the fictional company SiteRequest has an existing topology statement that routes all traffic originating from the United States to the New York data center. Last week, a new data center in Los Angeles came online. As a result, the topology record that the Global Traffic Manager was using to direct traffic became obsolete, and needed to be removed.

To remove a topology record


1. On the Main tab of the navigation pane, expand Global Traffic and click Topology. 2. Select the topology record that you want to remove from the topology records list by selecting the corresponding Select box. 3. Click the Delete button. A confirmation screen appears. 4. Click the Delete button again to confirm that you want to delete the record.

9 - 14

Load Balancing Connection Requests Using Topologies

Disabling the Longest Match option


You can create topology records and order the records manually. To do this, you must disable the Longest Match option.

To access the Longest Match option


1. On the Main tab of the navigation pane, expand System and click Configuration. 2. From the Global Traffic menu, choose Load Balancing. The load balancing properties screen opens. 3. Using the Topology Options settings, select or clear the check box to enable or disable the Longest Match option, as needed. 4. Click the Update button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

9 - 15

Chapter 9

9 - 16

10
Working with DNSSEC Keys and Zones

About DNSSEC Introducing DNSSEC keys and zones Managing DNSSEC keys Managing DNSSEC zones Viewing DNSSEC resource records

Working with DNSSEC Keys and Zones

About DNSSEC
The Domain Name System Security Extensions (DNSSEC) is an industry-standard protocol that functions as an extension to the Domain Name System (DNS) protocol. The BIG-IP Global Traffic Manager uses DNSSEC to guarantee the authenticity of DNS responses to queries and to return Denial of Existence responses. You can use the DNSSEC feature of the Global Traffic Manager to protect your network infrastructure from DNS protocol and DNS server attacks such as spoofing, ID hacking, cache poisoning, and denial of service.

Introducing DNSSEC keys and zones


The Global Traffic Manager responds to DNS requests to a specific zone by returning signed nameserver responses based on the currently available generations of a key. Before you can configure the Global Traffic Manager to handle nameserver responses that are DNSSEC-compliant, you must create DNSSEC keys and zones. There are two kinds of DNSSEC keys: zone-signing keys and key-signing keys. The Global Traffic Manager uses a zone-signing key to sign all of the records in a DNSSEC record set, and a key-signing key to sign only the DNSKEY record in a DNSSEC record set. DNSSEC zones are containers that map a domain name to a set of keys. You can create a DNSSEC zone, but before the Global Traffic Manager can sign requests to that zone, you must assign at least one enabled zone-signing and one enabled key-signing key to the zone. Additionally, after you create a DNSSEC zone, you must submit the DS record for the zone to the administrators of your parent zone, who sign the DS record with their own key and upload it to their zone. You can find the DS record for your zone in /config/gtm/dsset-<dnssec.zone.name>.

Understanding DNSSEC keys


To enhance key security, the BIG-IP system has an automatic key rollover feature that uses overlapping generations of a key to ensure that the system can always respond to requests with a signature. The system dynamically creates new generations of each key based on the values of the Rollover Period and Expiration Period settings of the key. The first generation of a key has an ID of 0 (zero). Each time the system dynamically creates a new generation of the key, the ID increments by 1. Once the expiration time of a generation of a key is reached, the system automatically removes that generation of the key from the configuration and updates the DS record for the zone.

Configuration Guide for BIG-IP Global Traffic ManagerTM

10 - 1

Chapter 10

Figure 10.1 illustrates this, and shows how over time each generation of a key overlaps the previous generation of the key.

Figure 10.1 Overlapping generations of a key and TTL value

The value that you assign to the TTL (time-to-live) setting for a key specifies how long a client resolver can cache the key. As shown in Figure 10.1, the value you assign to the TTL setting of the key must be less than the difference between the values of the Rollover Period and Expiration Period settings of the key; otherwise, a client can make a query and the system can send a valid key that the client cannot recognize.
Important

To ensure that each Global Traffic Manager system is referencing the same time when generating keys, you must synchronize the time setting on each system with the Network Time Protocol (NTP) servers that the Global Traffic Manager references. For information, see Defining NTP servers, on page 3-10.

10 - 2

Working with DNSSEC Keys and Zones

Providing DS records to the parent domain


Each time a new generation of a key-signing key is created, you must provide the updated DS record to the administrators of the parent zone. For example, in Figure 10.1, the value of the Rollover Period of the key is 30 days, and the value of the Expiration Period of the key is 37 days. In the case of a key-signing key, a new generation of the key is created every 30 days, and you have seven days before the old generation of the key expires to provide the new DS record to the administrators of the parent zone. These administrators sign the new DS record with their own key and upload it their zone. There are numerous ways to provide the new DS record to the administrators of the parent zone, including secure FTP or use of a secure web site for this purpose. Provide the new DS record to the administrators of the parent zone according to your company policy.

Configuration Guide for BIG-IP Global Traffic ManagerTM

10 - 3

Chapter 10

Managing DNSSEC keys


You can create, modify, and delete both zone-signing and key-signing keys. F5 Networks recommends that for emergency rollover purposes, when you create a key, you create a duplicate version of the key with a similar name, but do not enable that version. For example, create a key-signing key called ksk1a that is enabled. Then create a duplicate key, but name it ksk1b, and change the state to disabled. When you associate both of these keys with the same zone, you are prepared to easily perform a manual rollover of the key, if necessary. For more information about emergency rollover, see Performing a manual rollover of a key, on page 10-8.
Note

Only users with Administrator or Resource Administrator roles can create, modify, and delete DNSSEC keys. In order for the Global Traffic Manager to use the keys that you create to sign requests, you must assign the keys to a zone. For more information, see Creating DNSSEC zones, on page 10-11.

Creating DNSSEC zone-signing and key-signing keys


You must create at least one zone-signing and one key-signing key, and assign both keys to a zone before the Global Traffic Manager can sign requests using the keys. For more information about DNSSEC zones, see Managing DNSSEC zones, on page 10-11.

To create a zone-signing or key-signing key


1. On the Main tab of the navigation pane, expand Global Traffic. 2. Click DNSSEC Key List. 3. Click Create. 4. Configure the properties of the key using the information in Table 10.1 or the online help. 5. Click Finished.

Setting Name

Description Type a name that contains any characters except a pound sign (#), dollar sign ($), caret (^), or exclamation point (!). Accept the default value. There is only one algorithm available.

Default Value

Algorithm

RSA/SHA1

Table 10.1 DNSSEC key settings

10 - 4

Working with DNSSEC Keys and Zones

Setting Bit Width

Description Type the size of the key. The allowed values are determined by your hardware platform or the FIPS hardware security module (HSM), if your system contains one. These three options are valid: 1024 and 2048

Default Value 1024

Use FIPS

If your system contains a FIPS HSM on which you store the DNSSEC keys to protect the keys from physical and software attacks, select Enabled. Note: If your system does not contain a FIPS HSM, and you set this option to Enabled, the system automatically resets the value to Disabled.

Disabled

Type

If you are creating a key to sign all of the record sets in a zone, select Zone Signing Key. If you are creating a key to sign only the DNSKEY record set, select Key Signing Key.

Zone Signing Key

State

Select Enabled when you are creating a key-signing or zone-signing key that you plan to associate with a zone as an active key. Important: You can assign both enabled and disabled key-signing and zone-signing keys to a zone; however, the system uses only enabled keys to sign requests.

Enabled

TTL

Type the number of seconds that client resolvers can cache the key. 0 seconds indicates that the key is not cached by client resolvers. The value of the TTL must be less than the difference between the values of the rollover and expiration periods.

86400

Rollover Period

Type the number of seconds after which the system creates a new generation of the key. 0 seconds indicates not set, and thus the key does not roll over. The value of the rollover period must be greater than or equal to one third of the value of the expiration period, and strictly less than the value of the expiration period. Additionally, the difference between the values of the rollover and expiration periods must be more than the value of the TTL.

Expiration Period

Type the number of seconds after which the system deletes an expired generation of the key. 0 seconds indicates not set, and thus the key does not expire. The value of the expiration period must be more than the value of the rollover period. Additionally, the difference between the values of the rollover and expiration periods must be more than the value of the TTL. Tip: The National Institute of Standards and Technology (NIST) recommends that a key-signing key expire once a year.

Signature Validity Period

Type the number of seconds after which the system no longer uses the expired signature. 0 seconds indicates not set, and thus the server verifying the signature never succeeds, because the signature is always expired. The value of this setting must be more than the value of the signature publication period.

604800 (one week)

Signature Publication Period

Type the number of seconds after which the system creates a new signature. 0 seconds indicates not set, and thus the system does not cache the signature. The value of this setting must be less than the value of the signature validity period.

403200 (two-thirds of a week)

Table 10.1 DNSSEC key settings

Configuration Guide for BIG-IP Global Traffic ManagerTM

10 - 5

Chapter 10

Modifying DNSSEC keys


After you create a DNSSEC key, you can modify it as necessary. For example, if you created a disabled key that you are now ready to put into production, you can change the state of the key to enabled.

To modify a key
1. On the Main tab of the navigation pane, expand Global Traffic. 2. Click DNSSEC Key List. 3. Click the name of the key. 4. Modify the settings of the key as required. For example, to disable the key, select Disabled from the State list. 5. Click Update.

Deleting DNSSEC keys


You can delete a DNSSEC key, for example, when you perform an emergency rollover of a compromised key. For more information about emergency rollover, see Performing a manual rollover of a key, on page 10-8.
WARNING

If you delete a key that is associated with a zone that is available (enabled and online), if there are no other enabled keys of that type associated with the zone, the status of the zone immediately becomes offline.

To delete a key
1. On the Main tab of the navigation pane, expand Global Traffic. 2. Click DNSSEC Key List. 3. Check the Select box next to the key that you want to delete. 4. Click Delete. 5. Click Delete again to delete the key.

10 - 6

Working with DNSSEC Keys and Zones

Modifying generations of a DNSSEC key


You can modify a generation of a DNSSEC key, for example, when you perform an emergency rollover of a compromised key for which you do not have a standby key. For more information about emergency rollover, see Performing a manual rollover of a key, on page 10-8.
WARNING

F5 Networks recommends that you modify only the Rollover Time and Expiration Time settings of a generation of a key. Modifying the ID or Public Key settings can cause the system to return denial of service messages rather than signed responses.

To modify a generation of a DNSSEC key


1. On the Main tab of the navigation pane, expand Global Traffic. 2. Click DNSSEC Key List. 3. Click the name of the key that you want to modify, and then on the menu bar click Generations. 4. Modify the Rollover Time or Expiration Time settings of a generation of a key, using the information in Table 10.2 or the online help to assist you. 5. Click Update.

Setting ID Public Key

Description Important: Do not modify this setting. Important: Do not modify this setting. This is the public key that the Global Traffic Manager is currently using to sign responses.

Rollover Time

Type the exact time that you want the system to create and begin to use a new generation of the key. Note: Modifying this setting does not affect the value of the rollover and expiration periods of the key.

Expiration Time

Type the exact time that you want this generation of the key to expire. Note: Modifying this setting does not affect the value of the rollover and expiration periods of the key.

Table 10.2 DNSSEC key generation settings

Configuration Guide for BIG-IP Global Traffic ManagerTM

10 - 7

Chapter 10

Performing a manual rollover of a key


If necessary, you can manually perform an emergency rollover of a compromised key. If, when you created the key, you created a duplicate of the key (a standby key) with a different name and disabled the standby key, manually rolling over the key is easier.

Performing a manual rollover of a key for which you have a standby key
To perform a manual rollover of a key-signing key for which you have a standby key
1. On the Main tab of the navigation pane, expand Global Traffic. 2. Click DNSSEC Key List. 3. Click the name of the standby key-signing key. 4. From the State list, select Enabled. 5. Click Update. 6. Provide the records for the compromised key and the newly enabled key to the administrator of the parent zone. After the administrator has loaded the newly active key records to the zone and the records have been signed, complete the remainder of the steps in this procedure. 7. Expand Global Traffic and click DNSSEC Key List. 8. Check the Select box next to the name of the compromised key. 9. Click Delete. 10. Click Delete again to delete the key.

To perform a manual rollover of a zone-signing key for which you have a standby key
1. On the Main tab of the navigation pane, expand Global Traffic. 2. Click DNSSEC Key List. 3. Click the name of the standby zone-signing key. 4. From the State list, select Enabled. 5. Click Update. 6. Click DNSSEC Key List. 7. Check the Select box next to the name of the compromised key. 8. Click Delete. 9. Click Delete again to delete the key.

10 - 8

Working with DNSSEC Keys and Zones

Performing a manual rollover of a key without a standby key


To perform a manual roll over of a key-signing key without a standby key
1. On the Main tab of the navigation pane, expand Global Traffic. 2. Click DNSSEC Key List. 3. Click the name of the key-signing key. 4. Click Generations. 5. Change the Rollover Time to todays date and the current time. 6. Change the Expiration Time to todays date and a future time. Important: This date must be no sooner than the maximum TTL of the key. Additionally, this date must also allow time for you to perform step 6. Your BIND administrator can provide you with the maximum TTL of the key. 7. Provide the new DS record to the administrator of the parent zone according to your company policy. After the administrator configures the zone with the new DS record and the system creates a new signature, complete the remainder of the steps in this procedure. 8. Expand Global Traffic and click DNSSEC Key List. 9. Click the name of the key. 10. Click Generations. 11. Check the Select box next to generation of the key. 12. Click Delete. 13. Click Delete again to delete the generation of the key.

The system rolls over this generation of the key at the time specified in the Rollover Time setting. The system removes the old generation of the key at the time specified in the Expiration Time setting.

To perform a manual rollover of a zone-signing key without a standby key


1. On the Main tab of the navigation pane, expand Global Traffic. 2. Click DNSSEC Key List. 3. Click the name of the zone-signing key. 4. Click Generations. 5. Change the Rollover Time to todays date and the current time. 6. Change the Expiration Time to a future date.

Configuration Guide for BIG-IP Global Traffic ManagerTM

10 - 9

Chapter 10

Important: This date must be no sooner than the maximum TTL of the zone. Additionally, this date must also allow time for you to perform step 6. Your BIND administrator can provide you with the maximum TTL of the key. 7. Click Update.

The system rolls over this generation of the key at the time specified in the Rollover Time setting. The system removes the old generation of the key at the time specified in the Expiration Time setting.

10 - 10

Working with DNSSEC Keys and Zones

Managing DNSSEC zones


DNSSEC zones map a domain name to a set of DNSSEC keys that the system uses to sign DNSSEC-compliant nameserver responses to DNS queries. You can create, modify, or delete a DNSSSEC zone.
Note

Only users with Administrator or Resource Administrator roles can create, modify, and delete DNSSEC zones.

Creating DNSSEC zones


You can create a DNSSEC zone, but before the Global Traffic Manager can sign requests to that zone, you must assign at least one enabled zone-signing and one enabled key-signing key to the zone. For more information about DNSSEC keys, see Managing DNSSEC keys, on page 10-4.

To create a DNSSEC zone


1. On the Main tab of the navigation pane, expand Global Traffic. 2. Click DNSSEC Zone List. 3. Click Create. 4. Configure the zone, using the information in Table 10.3 or the online help. 5. Click Finished. Warning: When you click Finished, even if you selected Enabled from the State list, if there is not at least one zone-signing and one key-signing key in the Active column, the status of the zone changes to offline.
Default Value

Setting Name

Description Type a the name of the zone for which you want the system to sign responses. The name should be a subset of the name of the wide IP within which the zone resides. For example, if the wide IP is named www.siterequest.com, name the zone siterequest.com. If you want the zone to be live, select Enabled. If you do not want the zone to be live, select Disabled.

State

Enabled

Table 10.3 DNSSEC zone settings

Configuration Guide for BIG-IP Global Traffic ManagerTM

10 - 11

Chapter 10

Setting Zone Signing Key

Description Move the zone-signing keys that you want to assign to this zone from the Available list to the Active list. Note: You can associate the same zone-signing key with multiple zones.

Default Value

Key Signing Key

Move the key-signing keys that you want to assign to this zone from the Available list to the Active list. Note: You can associate the same key-signing key with multiple zones.

Table 10.3 DNSSEC zone settings

Viewing the status of DNSSEC zones


After you create a DNSSEC zone, you can view the status of the zone.

To view the status of a zone


1. On the Main tab of the navigation pane, expand Global Traffic. 2. Click DNSSEC Zone List. 3. The status of the zone displays in the Status column. The status of a zone can be: Available (green circle) Offline (red diamond)

Modifying DNSSEC zones


After you create a DNSSEC zone, you can modify it as necessary. For example, if you created a disabled zone that you are now ready to put into production, you can change the state of the zone to enabled.

To modify a zone
1. On the Main tab of the navigation pane, expand Global Traffic. 2. Click DNSSEC Zone List. 3. Click the name of the zone. 4. Modify the settings for the zone as required. Refer to the online help or Table 10.3, on page 10-11 for specifics. 5. Click Update.

10 - 12

Working with DNSSEC Keys and Zones

Deleting DNSSEC zones


You can delete a DNSSEC zone at any time, but once you delete the zone, the system no longer signs DNSSEC requests for the domain that zone represents.

To delete a zone
1. On the Main tab of the navigation pane, expand Global Traffic. 2. Click DNSSEC Zone List. 3. Check the Select box next to the name of the zone that you want to delete. 4. Click Delete. 5. Click Delete again to delete the zone.

Configuration Guide for BIG-IP Global Traffic ManagerTM

10 - 13

Chapter 10

Viewing DNSSEC resource records


Your configuration of BIND is independent of the configuration of DNSSEC on the Global Traffic Manager. If you want to use BIND for delegation or other tasks, you must add the DNSSEC resource records to your BIND configuration; otherwise, BIND is not aware of these records. If you do this, you can view the DNSSEC resource records in Zone Runner.

To view DNSSEC resource records


1. On the Main tab of the navigation pane, expand Global Traffic. 1. Click ZoneRunner. 2. From the Type list, select the type of record that you want to view. 3. Click Search. The system returns records of the type you selected. Note that a value of 0 (zero) seconds in the TTL column indicates that the TTL is not set.

10 - 14

11
Configuring Monitors

Introducing monitors Creating a custom monitor Configuring monitor settings Special configuration considerations Associating monitors with resources Managing monitors

Configuring Monitors

Introducing monitors
An important feature of the Global Traffic Manager is set of load balancing tools called monitors. Monitors verify connections on pools and virtual servers. A monitor can be either a health monitor or a performance monitor. Monitors are designed to check the status of a pool or virtual server on an ongoing basis, at a set interval. If a pool or virtual server being checked does not respond within a specified timeout period, or the status of a pool or virtual server indicates that performance is degraded, then the Global Traffic Manager can redirect the traffic to another resource. Some monitors are included as part of the Global Traffic Manager, while other monitors are user-created. Monitors that the Global Traffic Manager provides are called pre-configured monitors. User-created monitors are called custom monitors. For more information on pre-configured and custom monitors, see Understanding pre-configured and custom monitors, on page 11-5. Before configuring and using monitors, it is helpful to understand some basic concepts regarding monitor types, monitor settings, and monitor implementation. For more information on monitor types, see Summary of monitor types, on page 11-2, and Configuring monitor settings, on page 11-8.

Monitor types Every monitor, whether pre-configured or custom, belongs to a certain category, or monitor type. Each monitor type checks the status of a particular protocol, service, or application. For example, an HTTP monitor allows you to monitor the availability of the HTTP service on a pool member (that is a virtual server). Monitor settings Every monitor consists of settings with values. The settings and their values differ depending on the type of monitor. In some cases, the Global Traffic Manager assigns default values. For example, the following are the default values for the HTTP monitor: Interval: 30 seconds Timeout: 120 seconds Probe Timeout: 5 seconds Reverse: No Transparent: No These settings specify that an HTTP monitor is configured to check the status of an IP address every 30 seconds, to time out after 120 seconds, to timeout the probe request every 5 seconds, and specifies that the monitor does not operate in either Reverse or Transparent mode.

Monitor implementation The task of implementing a monitor varies depending on whether you are using a pre-configured monitor or creating a custom monitor. If you want to implement a pre-configured monitor, you need only associate the

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 1

Chapter 11

monitor with a pool or virtual server. If you want to implement a custom monitor, you must first create the custom monitor, and then associate it with a pool or virtual server.

Summary of monitor types


The Global Traffic Manager includes many different types of monitors, each designed to perform a specific type of monitoring. The monitors belong to one of three categories: simple, extended content verification (ECV), and extended application verification (EAV).

Simple monitors check the health of a resource by sending a packet using the specified protocol, and waiting for a response from the resource. If the monitor receives a response, then the health check is successful and the resource is considered up. For information about configuring monitor settings for Simple monitors, see Simple monitors, on page 11-8. ECV monitors check the health of a resource by sending a query for content using the specified protocol, and waiting to receive the content from the resource. If the monitor receives the correct content, then the health check is successful and the resource is considered up. For information about configuring monitor settings for ECV monitors, see Extended Content Verification (ECV) monitors, on page 11-10. EAV monitors check the health of a resource by accessing the specified application. If the monitor receives the correct response, then the health check is successful and the resource is considered up. For information about configuring monitor settings for EAV monitors, see External Application Verification (EAV) monitors, on page 11-12.

Table 11.1 briefly describes the types of monitors that you can apply to your load balancing resources.
Monitor Category Simple Monitor Type Gateway ICMP Possible Object Associations link, pool member, server, virtual server pool member, server, virtual server

Description Uses Internet Control Message Protocol (ICMP) to make a simple resource check. The check is successful if the monitor receives a response to an ICMP_ECHO datagram.

TCP Half Open

Monitors the associated service by sending a TCP SYN packet to the service. As soon as the monitor receives the SYN-ACK packet, the monitor marks the service as up.

Table 11.1 Monitor types available on a Global Traffic Manager

11 - 2

Configuring Monitors

Monitor Category ECV

Monitor Type HTTP

Description Verifies the Hypertext Transfer Protocol (HTTP) service by attempting to receive specific content from a web page.

Possible Object Associations pool member, server, virtual server pool member, server, virtual server pool member, server, virtual server server, virtual server

HTTPS

Verifies the Hypertext Transfer Protocol Secure (HTTPS) service by attempting to receive specific content from a web page protected by Secure Socket Layer (SSL) security. Verifies the Transmission Control Protocol (TCP) service by attempting to receive specific content from a resource.

TCP

EAV

BIG IP

Acquires data captured through monitors managed by a Local Traffic Manager. Note: You cannot configure the Ignore Down Response setting of this monitor to configure a BIG-IP system to allow more than one probe attempt per interval.

BIG IP Link

Acquires data captured through monitors managed by a Link Controller. Allows users to monitor services using their own programs.

link, node pool member, server, virtual server pool member, server, virtual server pool member, server, virtual server pool member, server, virtual server pool member, server, virtual server pool member, server, virtual server pool member, server, virtual server pool member, server, virtual server

External

FTP

Verifies the File Transfer Protocol (FTP) service by attempting to download a specific file to the /var/tmp directory on the system. Once downloaded successfully, the file is not saved. Verifies the Internet Message Access Protocol (IMAP) by attempting to open a specified mail folder on a server. This monitor is similar to the POP3 monitor. Verifies the Lightweight Directory Access Protocol (LDAP) service by attempting to authenticate the specified user.

IMAP

LDAP

MSSQL

Verifies Microsoft Windows SQL-based services.

NNTP

Verifies the Usenet News protocol (NNTP) service by attempting to retrieve a newsgroup identification string from the server.

Oracle

Verifies services based on Oracle by attempting to perform an Oracle logon to a service.

POP3

Verifies the Post Office Protocol version 3 (POP3) service by attempting to connect to a pool, pool member, or virtual server, log on as the specified user, and log off.

Table 11.1 Monitor types available on a Global Traffic Manager

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 3

Chapter 11

Monitor Category

Monitor Type RADIUS

Description Verifies the Remote Access Dial-in User Service (RADIUS) service by attempting to authenticate the specified user.

Possible Object Associations pool member, server, virtual server node, pool member, server, virtual server pool member, server, virtual server pool member, server, virtual server pool member, server, virtual server node, pool member, server, virtual server pool member, server, virtual server pool member, server, virtual server pool member, server, virtual server node, pool member, virtual server

Real Server

Checks the performance of a pool, pool member, or node that is running the RealServer data collection agent, and then dynamically load balances traffic accordingly.

Scripted

Generates a simple script that reads a file that you create. The file contains Send and Expect strings to specify lines that you want to send or that you expect to receive. Checks the status of Session Initiation Protocol (SIP) Call-ID services on a device. The SIP protocol enables real-time messaging, voice, data, and video. Checks the status of a pool, pool member, or virtual server by issuing standard Simple Mail Transport Protocol (SMTP) commands. Checks the current CPU, memory, and disk usage of a pool, pool member, or virtual server that is running an SNMP data collection agent, and then dynamically load balances traffic accordingly.

SIP

SMTP

SNMP Link

SOAP

Tests a web service based on the Simple Object Access Protocol (SOAP).

UDP

Verifies the User Datagram Protocol (UDP) service by attempting to send UDP packets to a pool, pool member, or virtual server and receiving a reply. Requests the URL specified in the Send setting, and finds the string specified in the Recv setting somewhere in the data returned by the URL response. Checks the performance of a pool, pool member, or virtual server that is running the Windows Management Infrastructure (WMI) data collection agent and then dynamically load balances traffic accordingly.

WAP

WMI

Table 11.1 Monitor types available on a Global Traffic Manager

Overview of monitor settings


Monitors contain settings with corresponding values. These settings and their values affect the way that a monitor performs its status check. When you create a custom monitor, you must configure these setting values. For those settings that have default values, you can either retain the default

11 - 4

Configuring Monitors

values, or modify them to suit your needs. You can find details about the settings for each monitor type in Configuring monitor settings, on page 11-8.

Understanding pre-configured and custom monitors


When you want to monitor the health or performance of pool members or virtual servers, you can either use a pre-configured monitor, or create and configure a custom monitor.

Using pre-configured monitors


For a subset of monitor types, the Global Traffic Manager includes a set of pre-configured monitors. A pre-configured monitor is an existing monitor with default settings already configured. You use a pre-configured monitor when the default values of the settings meet your needs. The Global Traffic Manager includes these pre-configured monitors: big ip big ip link gateway_icmp http https real_server snmp tcp tcp_half_open udp An example of a pre-configured monitor is the http monitor. If the default values of this monitor meet your needs, you simply assign the http pre-configured monitor directly to a pool or virtual server. In this case, you do not need to use the Monitors screens, unless you simply want to view the default settings of the pre-configured monitor. If you do not want to use the values configured in a pre-configured monitor, you can create a custom monitor.

Using custom monitors


A custom monitor is a monitor that you create based on one of the allowed monitor types. (For information on monitor types, see Summary of monitor types, on page 11-2.) Like http, each of the custom monitors has a Type setting based on the type of service it checks (for example, https, ftp, pop3), and takes that type as its name. (Exceptions are port-specific monitors, like the external monitor, which calls a user-supplied program.)
Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 5

Chapter 11

For procedures on selecting and configuring a monitor, see Creating a custom monitor, on page 11-7.

Importing settings from a pre-configured monitor


If a pre-configured monitor exists that corresponds to the type of custom monitor you are creating, you can import the settings and values of that pre-configured monitor into the custom monitor. For example, if you create a custom monitor called my_http, the monitor can inherit the settings and values of the pre-configured monitor http. This ability to import existing setting values is useful when you want to retain some setting values for your new monitor, but modify others. The following list shows an example of a custom HTTP monitor called my_http, which is based on the pre-configured monitor http. Note that the value of the Interval setting has been changed from the default value of 30 to a new value of 60. The other settings retain the values defined in the pre-configured monitor. Name: my_http Type: HTTP Interval: 60 Timeout: 120 Reverse: No Transparent: No

Importing settings from a custom monitor


You can import settings from another custom monitor instead of from a pre-configured monitor. This is useful when you want to use the setting values defined in another custom monitor, or when no pre-configured monitor exists for the type of monitor you are creating. For example, if you create a custom monitor called my_oracle_server2, you can import settings from an existing Oracle monitor such as my_oracle_server1. In this case, because the Global Traffic Manager does not provide a pre-configured Oracle monitor, a custom monitor is the only kind of monitor from which you can import setting values.

Importing settings from a monitor template


If no pre-configured or custom monitor exists that corresponds to the type of monitor you are creating, the Global Traffic Manager imports settings from a monitor template. A monitor template is an abstraction that exists within the Global Traffic Manager for each monitor type and contains a group of settings and default values. A monitor template serves as a tool for the Global Traffic Manager to use for importing settings to a custom monitor when no monitor of that type already exists.

11 - 6

Configuring Monitors

Creating a custom monitor


When you create a custom monitor, you use the Configuration utility to give the monitor a unique name, specify a monitor type, and, if a monitor of that type already exists, import settings and their values from the existing monitor. You can then change the values of any imported settings. You must base each custom monitor on a monitor type. When you create a monitor, the Configuration utility displays a list of monitor types. To specify a monitor type, select the one that corresponds to the service you want to check. For example, if you want to want to create a monitor that checks the health of the HTTP service on a pool, you choose HTTP as the monitor type. For information on monitor types, see Configuring monitor settings, on page 11-8. If you want to check more than one service on a pool or virtual server (for example HTTP and HTTPS), you can associate more than one monitor on that pool or virtual server. For more information, see Chapter 7, Load Balancing with the Global Traffic Manager. Checking services is not the only reason for implementing a monitor. If you want to verify only that the destination IP address is live, or that the path to it through a transparent virtual server is live, use one of the simple monitors, such as gateway_icmp. Or, if you want to verify TCP only, use the monitor tcp.

To create a custom monitor


1. On the Main tab of the navigation pane, expand Global Traffic and click Monitors. The main monitors screen opens. 2. Click the Create button. The New Monitor screen opens. 3. In the Name box, type a name for the monitor. 4. For the Type setting, select the type of monitor that you want to create. If a monitor of that type already exists, Import Settings appears. 5. From the Configuration list, select Advanced. Additional fields display with default settings. 6. Configure all settings shown. 7. Click the Finished to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 7

Chapter 11

Configuring monitor settings


The Global Traffic Manager supports a wide variety of monitor types. Each of these monitor types contains specific settings that you can configure to ensure that the monitor accurately tests a given resource before determining if that resource is available for load balancing operations. When you configure these settings, you are creating a custom monitor for your network. The types of monitors the Global Traffic Manager supports correspond to three categories:

Simple monitors These are health monitors that monitor the status of a resource. Extended Content Verification (ECV) monitors These are health monitors that verify service status by retrieving specific content from pool members or virtual servers. External Application Verification (EAV) monitors These are health or performance monitors that verify service status by accessing remote applications, using an external service-checker program.

Simple monitors
Simple monitors are those that check the status of a resource. The simple monitor types are: Gateway ICMP TCP Half Open The Global Traffic Manager provides a set of pre-configured simple monitors: gateway_icmp and tcp_half_open. You can either use these pre-configured monitors as is, or create custom monitors of these types. The following sections describe each type of simple monitor and show the pre-configured monitor settings and their values.

Gateway ICMP
You can use a Gateway ICMP monitor for a virtual server, a server (that is, all of the virtual servers on a specified server), a pool member, a pool (that is, all of the pool members of a specified pool), or a link. This monitor uses the Internet Control Message Protocol (ICMP) to perform a simple resource check. The check is successful if the monitor receives a response to an ICMP_ECHO datagram.

11 - 8

Configuring Monitors

The following list shows the settings and their values for the pre-configured gateway_icmp monitor. Type: Gateway ICMP Import Settings: Gateway ICMP Interval: 30 seconds Timeout: 120 seconds Probe Interval: 1 second Probe Timeout: 5 seconds Probe Attempts: 3 Ignore Down Response: No Transparent: No Alias Address: * All Addresses Alias Service Port: * All Ports

TCP Half Open


A TCP Half Open monitor performs a check on the associated service by sending a TCP SYN packet to the service. If the monitor receives the SYN-ACK packet from the service, the monitor considers the service to be in an up state, and sends a RESET packet to the service instead of completing the three-way handshake. The following list shows the settings for the pre-configured monitor tcp_half_open. Import Settings: TCP Half Open Type: TCP Half Open Interval: 30 seconds Timeout: 120 seconds Probe Interval: 1 second Probe Timeout: 5 seconds Probe Attempts: 3 Ignore Down Response: No Transparent: No Alias Address: * All Addresses Alias Service Port: * All Ports

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 9

Chapter 11

Extended Content Verification (ECV) monitors


Extended Content Verification (ECV) monitors use Send String and Receive String settings in an attempt to retrieve explicit content from resources. The Global Traffic Manager provides the pre-configured monitors http, https, and tcp for these ECV monitor types: HTTP HTTPS TCP You can either use the pre-configured ECV monitors as is, or create custom monitors from these monitor types. The following sections describe each type of ECV monitor, and show the pre-configured monitor settings and their values.

HTTP
You use an HTTP monitor to check the status of Hypertext Transfer Protocol (HTTP) traffic. Like a TCP monitor, an HTTP monitor attempts to receive specific content from a web page, and unlike a TCP monitor, may send a user name and password. The check is successful when the content matches the Receive String value. An HTTP monitor uses a send string, a receive string, a user name, a password, and optional Reverse and Transparent modes. (If there is no password security, you must use blank strings [""] for the Username and Password settings.) For more information on transparent and reverse modes, see Using transparent and reverse modes, on page 11-35. The following list shows the settings of the pre-configured monitor http: Import Settings: http Type: HTTP Interval: 30 seconds Timeout: 120 seconds Probe Timeout: 5 seconds Ignore Down Response: No Send String: Get / Receive String: (empty) User Name: (empty) Password: (empty) Reverse: No Transparent: No Alias Address: * All Addresses Alias Service Port: * All Ports

11 - 10

Configuring Monitors

HTTPS
You use an HTTPS monitor to check the status of Hypertext Transfer Protocol Secure (HTTPS) traffic. An HTTPS monitor attempts to receive specific content from a web page protected by SSL security. The check is successful when the content matches the Receive String value. HTTPS monitors use a send string, a receive string, a user name, a password, and an optional Reverse setting. (If there is no password security, you must use blank strings [""] for the Username and Password settings.) For more information on the Reverse setting, see Using transparent and reverse modes, on page 11-35. HTTP monitors also include the settings Cipher List, Compatibility, and Client Certificate. If you do not specify a cipher list, the monitor uses the default cipher list DEFAULT:+SHA:+3DES:+kEDH. When you set the Compatibility setting to Enabled, this sets the SSL options to ALL. You use the Client Certificate setting to specify a certificate file that the monitor then presents to the server. The following list shows the settings of the pre-configured monitor https: Type: HTTPS Import Settings: https Interval: 30 seconds Timeout: 120 seconds Probe Timeout: 5 seconds Ignore Down Response: No Send String: Get / Receive String: (empty) Cipher List: DEFAULT:+SHA:+#DES:+kEDH User Name: (empty) Password: (empty) Compatibility: Enabled Client Certificate: (empty) Client Key: (empty) Reverse: No Transparent: No Alias Address: * All Addresses Alias Service Port: * All Ports The Reverse setting is an option for monitors that import settings from the https monitor. In most monitor settings, the Global Traffic Manager considers the resource available when the monitor successfully probes it. However, in some cases you may want the resource to be considered unavailable after a successful monitor test. You accomplish this configuration with the Reverse setting. For more information on Reverse mode, see Using transparent and reverse modes, on page 11-35.

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 11

Chapter 11

TCP
The TCP monitor attempts to receive specific content sent over TCP. The check is successful when the content matches the Receive String value. A TCP monitor takes a Send String value and a Receive String value. If the Send String value is blank and a connection can be made, the service is considered up. A blank Receive String value matches any response. Both Transparent and Reverse modes are options. For more information about Transparent and Reverse modes, see Using transparent and reverse modes, on page 11-35. The following list shows the settings for the pre-configured monitor tcp. Type: TCP Import Settings: tcp Interval: 30 seconds Timeout: 120 seconds Probe Timeout: 5 seconds Ignore Down Response: No Send String: (empty) Receive String: (empty) Reverse: No Transparent: No Alias Address: * All Addresses Alias Service Port: * All Ports

External Application Verification (EAV) monitors


EAV monitors verify applications on servers by running those applications remotely, using an external service checker program located in the directory /config/monitors. The following list shows the types of EAV monitors that you can create. BIG IP BIG IP Link External FTP IMAP LDAP MSSQL NNTP Oracle POP3 RADIUS

11 - 12

Configuring Monitors

Real Server Scripted SIP SMTP SNMP SNMP Link SOAP UDP WAP WMI The Global Traffic Manager provides pre-configured monitors for several of these monitor types. In cases where a pre-configured monitor does not meet your needs or does not exist, you can create a custom monitor. For more information on custom monitors, see Creating a custom monitor, on page 11-7. The following sections describe each type of EAV monitor and show the pre-configured monitor settings and their values.

BIG-IP
When you use the Global Traffic Manager in a network that contains a Local Traffic Manager, you must assign a BIG-IP monitor to the Local Traffic Manager. This monitor is automatically assigned to the Local Traffic Manager if you do not manually assign it. The BIG-IP monitor gathers metrics and statistics information that the Local Traffic Manager acquires through the monitoring of its own resources. In general, it is sufficient to assign only the BIG-IP monitor to a Local Traffic Manager. In situations where you want to verify the availability of a specific resource managed by the Local Traffic Manager, F5 Networks recommends that you first assign the appropriate monitor to the resource through the Local Traffic Manager, and then assign a BIG-IP monitor to the Local Traffic Manager through the Global Traffic Manager. This configuration provides the most efficient means of tracking resources managed by a BIG-IP system. The following list shows the settings and default values of a BIG-IP monitor. Type: BIG-IP Import Settings: bigip Interval: 30 seconds Timeout: 90 seconds Probe Timeout: 1 second Ignore Down Response: No Note that F5 recommends that you leave this setting at the default value for the BIG-IP monitor.
Configuration Guide for BIG-IP Global Traffic ManagerTM 11 - 13

Chapter 11

Alias Address: * All Addresses Alias Service Port: * All Ports Aggregate Dynamic Ratios: None
Note

If the Global Traffic Manager and the Local Traffic Manager are on the same machine, you must still assign a BIG-IP monitor to the server that you added to your configuration that represents the Global Traffic Manager/Local Traffic Manager system. See Chapter 5, Defining the Physical Network, for more information.

BIG-IP Link
When you use the Global Traffic Manager in a network that contains a Link Controller, you must assign a BIG-IP Link monitor to the Link Controller. This monitor is automatically assigned to the Link Controller if you do not manually assign it. The BIG-IP Link monitor gathers metrics and statics information that the Link Controller acquires through the monitoring of its own resources. The following list shows the settings and default values of a BIG-IP Link monitor. Type: BIG-IP Link Import Settings: bigip_link Interval: 10 seconds Timeout: 30 seconds Probe Timeout: 1 second Ignore Down Response: No Note that F5 recommends that you leave this setting at the default value for BIG-IP Link monitor. Alias Address: * All Addresses
Note

If the Global Traffic Manager and the Link Controller systems are on the same machine, you must still assign a BIG-IP Link monitor to the server that represents these two systems. See Chapter 5, Defining the Physical Network, for more information.

External
You can use an External monitor to create your own monitor type. To do this, you create a custom External monitor and within it, specify a user-supplied monitor to run.

11 - 14

Configuring Monitors

The External Program setting specifies the name of your user-supplied monitor program. An External monitor searches the directory /config/monitors for that monitor name. The Arguments setting allows you to specify any command-line arguments that are required. The following list shows the settings and default values of an External monitor. Type: External Import Settings: external Interval: 30 seconds Timeout: 120 seconds Probe Timeout: 5 seconds Ignore Down Response: No External Program: (empty) Arguments: (empty) Variables: (empty) Alias Address: * All Addresses Alias Service Port: * All Ports

FirePass
You use a FirePass monitor to verify FirePass traffic. This monitor checks the health of FirePass systems. The following list shows the settings and default values of a FirePass type monitor. Type: FirePass Import Settings: firepass_gtm Interval: 30 seconds Timeout: 90 seconds Probe Timeout: 5 seconds Ignore Down Response: No Cipher List: HIGH:!ADH Max Load Average: 20 Concurrency Limit: 95 User Name: gtmuser Password: (empty) Alias Address: * All Addresses Alias Service Port: * All Ports

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 15

Chapter 11

FTP
You use an FTP monitor to verify File Transfer Protocol (FTP) traffic. A monitor of this type attempts to download a specified file to the /var/tmp directory, and if the file is retrieved, the check is successful. An FTP monitor specifies a user name, a password, and a full path to the file to be downloaded.
Note

Once an FTP file is successfully downloaded, the Global Traffic Manager does not save it. The following list shows the settings and default values of an FTP monitor. Type: FTP Import Settings: ftp Interval: 10 seconds Probe Timeout: 5 seconds Ignore Down Response: No User Name: (empty) Password: (empty) Path/Filename: (empty) Mode: Passive Alias Address: * All Addresses Alias Service Port: * All Ports Debug: No

IMAP
You use an IMAP monitor to check the status of Internet Message Access Protocol (IMAP) traffic. An IMAP monitor is essentially a POP3 monitor with the addition of the Folder setting. The check is successful if the monitor is able to log onto a server and open the specified mail folder. An IMAP monitor requires that you specify a user name and password. The following list shows the settings and default values of an IMAP monitor. Type: IMAP Import Settings: imap Interval: 10 seconds Timeout: 31 seconds Probe Timeout: 5 seconds Ignore Down Response: No User Name: (empty) Password: (empty) Folder: INBOX

11 - 16

Configuring Monitors

Alias Address: * All Addresses Alias Service Port: * All Ports Debug: No
Note

Servers checked by an IMAP monitor typically require special configuration to maintain a high level of security, while also allowing for monitor authentication.

LDAP
You use an LDAP monitor to check the status of Lightweight Directory Access Protocol (LDAP) servers. The LDAP protocol implements standard X.500 for email directory consolidation. A check is successful if entries are returned for the base and filter specified. An LDAP monitor requires a user name, a password, and base and filter strings. The following list shows the settings and default values of an LDAP monitor. Type: LDAP Import Settings: ldap Interval: 10 seconds Timeout: 31 seconds Probe Timeout: 5 seconds Ignore Down Response: No User Name: (empty) Password: (empty) Base: (empty) Filter: (empty) Security: None Mandatory Attributes: No Alias Address: * All Addresses Alias Service Port: * All Ports Debug: No The User Name setting specifies a distinguished name, that is, an LDAP-format user name. The Base setting specifies the starting place in the LDAP hierarchy from which to begin the query. The Filter setting specifies an LDAP-format key of the search item. The Security setting specifies the security protocol to be used. Acceptable values are SSL, TLS, or None.

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 17

Chapter 11

MSSQL
You use an MSSQL monitor to perform service checks on Microsoft SQL Server-based services such as Microsoft SQL Server versions 6.5 and 7.0. The remainder of this section on MSSQL monitors describes prerequisite tasks, the default monitor settings, and troubleshooting tips.

MSSQL monitor settings and their default values


The following list shows the settings and default settings of an MSSQL monitor. Type: mssql Import Settings: mssql Interval: 30 seconds Timeout: 91 seconds Probe Timeout: 5 seconds Ignore Down Response: No Send String: (empty) Receive String: (empty) User Name: (empty) Password: (empty) Database: (empty) Receive Row: (empty) Receive Column: (empty) Count: 0 Alias Address: * All Addresses Alias Service Port: * All Ports Debug: No For an MSSQL monitor, the Database setting specifies the name of the data source on the Microsoft SQL-based server. Examples are sales and hr. The Send String setting is optional and specifies a SQL query statement that the Global Traffic manager should send to the server. Examples are SELECT * FROM sales and SELECT FirstName, LastName From Employees. If you configure the Send String setting, you can also configure the following settings:

Receive String The Receive String setting is an optional parameter that specifies the value expected to be returned for the row and column specified with the Receive Row and Receive Column settings. An example of a Receive String value is ALAN SMITH. You can only configure this setting when you configure the Send String setting.

11 - 18

Configuring Monitors

Receive Row The Receive Row setting is optional, and is useful only if the Receive String setting is specified. This setting specifies the row in the returned table that contains the Receive String value. You can only configure this setting when you configure the Send String setting. Receive Column The Receive Column setting is optional and is useful only if the Receive String setting is specified. This setting specifies the column in the returned table that contains the Receive String value. You can only configure this setting when you configure the Send String setting.

Troubleshooting MSSQL logons


If an MSSQL monitor cannot log on to the server, and you have checked that the specified IP address and port number or service are correct, try the following troubleshooting options:

Verify that you can log on using another tool. For example, the server program Microsoft NT SQL Server version 6.5 includes a client program named ISQL/w. This client program performs simple logons to SQL servers. Use this program to test whether you can log on to the server using the ISQL/w program. Add logon accounts using the Microsoft SQL Enterprise Manager. On the Microsoft SQL Server, you can run the SQL Enterprise Manager to add logon accounts. When first logging on the SQL Enterprise Manager, you may be prompted for the SQL server that you want to manage. You can register servers by specifying the machine name, user name, and password. If these names are correct, the server is registered, and then you can click an icon for the server. When you expand the subtree for the server, there is an icon for logon accounts. Beneath this subtree, you can find the SQL logons. To change passwords or add new logons, right-click the Logins icon. Click this icon to access the Add login option. After you open this option, type the user name and password for the new logon, as well as which databases the logon is allowed to access. You must grant the test account access to the database you specify in the EAV configuration.

NNTP
You use an NNTP monitor to check the status of Usenet News traffic. The check is successful if the monitor retrieves a newsgroup identification line from the server. An NNTP monitor requires a newsgroup name (for example, alt.cars.mercedes) and, if necessary, a user name and password. The following list shows the settings and default values of an NNTP monitor. Type: NNTP Import Settings: nntp

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 19

Chapter 11

Interval: 30 seconds Timeout: 120 seconds Probe Timeout: 5 seconds Ignore Down Response: No User Name: (empty) Password: (empty) Newsgroup: (empty) Alias Address: * All Addresses Alias Service Port: * All Ports Debug: No

Oracle
You use an Oracle monitor to check the status of an Oracle database server. The check is successful if the monitor is able to connect to the server, log on as the indicated user, and log off. The following list shows the settings and default values of an Oracle monitor. Type: Oracle Import Settings: oracle Interval: 30 seconds Timeout: 91 seconds Probe Timeout: 5 seconds Ignore Down Response: No Send String: (empty) Receive String: (empty) User Name: (empty) Password: (empty) Database: (empty) Receive Row: (empty) Receive Column: (empty) Count: 0 Alias Address: * All Addresses Alias Service Port: * All Ports Debug: No The Send String setting specifies a SQL statement that the Global Traffic Manager should send to the Oracle server. An example is SELECT * FROM sales.

11 - 20

Configuring Monitors

The Receive String setting is an optional parameter that specifies the value expected to be returned for a specific row and column of the table that the Send String setting retrieved. An example of a Receive String value is SMITH. In an Oracle monitor, the Database setting specifies the name of the data source on the Oracle server. Examples are sales and hr. The Receive Row setting is optional, and is useful only if the Receive String setting is specified. This setting specifies the row in the returned table that contains the Receive String value. The Receive Column setting is optional and is useful only if the Receive String setting is specified. This setting specifies the column in the returned table that contains the Receive String value.

POP3
You use a POP3 monitor to check the status of Post Office Protocol version 3 (POP3) traffic. The check is successful if the monitor is able to connect to the server, log on as the indicated user, and log off. A POP3 monitor requires a user name and password. The following list shows the settings and default values of a POP3 monitor. Type: POP3 Import Settings: pop3 Interval: 30 seconds Timeout: 120 seconds Probe Timeout: 5 seconds Ignore Down Response: No User Name: (empty) Password: (empty) Alias Address: * All Addresses Alias Service Port: * All Ports Debug: No

RADIUS
You use a RADIUS monitor to check the status of Remote Access Dial-in User Service (RADIUS) servers. The check is successful if the server authenticates the requesting user. A RADIUS monitor requires a user name, a password, and a shared secret string for the code number.
Note

Configure the servers to be checked by a RADIUS monitor to maintain a high level of security while also allowing for monitor authentication.

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 21

Chapter 11

The following list shows the settings and default values of a RADIUS monitor. Type: RADIUS Import Settings: radius Interval:10 seconds Timeout: 31 seconds Probe Timeout: 5 seconds Ignore Down Response: No User Name: (empty) Password: (empty) Secret: (empty) NAS IP Address: (empty) Alias Address: * All Addresses Alias Service Port: * All Ports Debug: No

Real Server
You use a Real Server monitor to check the performance of a pool or virtual server that is running the RealSystem Server data collection agent and dynamically load balances traffic accordingly. Performance monitors are generally used with dynamic ratio load balancing. For more information on performance monitors and dynamic ratio load balancing, see Chapter 7, Load Balancing with the Global Traffic Manager.
Note

Unlike health monitors, performance monitors do not report on the status of a pool, pool member, or virtual server. The Global Traffic Manager provides a pre-configured Real Server monitor named real_server. The following list shows the settings and default values of the real_server monitor. Type: Real Server Import Settings: real_server Interval: 30 seconds Timeout: 120 seconds Probe Timeout: 5 seconds Ignore Down Response: No Method: GET Command: GetServerStats Metrics: ServerBandwidth: 1.5, CPUPercentUsage, MemoryUsage, TotalClientCount Agent: Mozilla/4.0 (compatible: MSIE 5.0, Windows NT)
11 - 22

Configuring Monitors

Like all pre-configured monitors, the real_server monitor is not user-modifiable. However, if you want to modify the Metrics setting, you can create a custom Real Server monitor, to which you can add metrics and modify metric values.
Note

When creating a custom Real Server monitor, you cannot modify the values of the Method, Command, and Agent settings. Table 11.2 shows the complete set of server-specific metrics and metric setting default values that apply to the command GetServerStats.
Metric ServerBandwidth (Kbps) CPUPercentUsage MemoryUsage (Kb) TotalClientCount RTSPClientCount HTTPClientCount PNAClientCount UDPTransportCount TCPTransportCount MulticastTransportCount Default Coefficient 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 Default Threshold 10,000 80 100,000 1,000 500 500 500 500 500 500

Table 11.2 Metrics for a Real Server monitor

The metric coefficient is a factor determining how heavily the metrics value counts in the overall ratio weight calculation. The metric threshold is the highest value allowed for the metric if the metric is to have any weight at all. To understand how to use these values, it is necessary to understand how the overall ratio weight is calculated. The overall ratio weight is the sum of relative weights calculated for each metric. The relative weights, in turn, are based on three factors: The value for the metric returned by the monitor The coefficient value The threshold value Given these values, the relative weight is calculated as follows: w=((threshold-value)/threshold)*coefficient

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 23

Chapter 11

You can see that the higher the coefficient, the greater the relative weight calculated for the metric. Similarly, the higher the threshold, the greater the relative weight calculated for any metric value that is less than the threshold. (When the value reaches the threshold, the weight goes to zero.) Note that the default coefficient and default threshold values shown in Table 11.2 are metric defaults, not monitor defaults. The monitor defaults take precedence over the metric defaults, just as user-specified values in the custom real_server monitor take precedence over the monitor defaults. For example, the monitor shown specifies a coefficient value of 1.5 for ServerBandwidth and no value for the other metrics. This means that the monitor uses the monitor default of 1.5 for the ServerBandwidth coefficient and the metric default of 1 for the coefficients of all other metrics. However, if a custom monitor my_real_server were configured specifying 2.0 as the ServerBandwidth coefficient, this user-specified value overrides the monitor default. Metric coefficient and threshold are the only non-monitor defaults. If a metric not in the monitor is to be added to the custom monitor, it must be added to the list of metrics for the Metrics setting. The syntax for specifying non-default coefficient or threshold values is:
<metric>:<coefficient |<*>:<threshold>

Scripted
You use the Scripted monitor to generate a simple script that reads a file that you create. The file contains send and expect strings to specify lines that you want to send or that you expect to receive. For example, Figure 11.1 shows a sample file that specifies a simple SMTP sequence. Note that the system always reads the lines of the file in the specified sequence.
expect 220 send HELLO bigip1.siterequest.com\r\n expect 250 send quit\r\n

Figure 11.1 A sample file specifying an SMTP sequence Using a Scripted monitor, you can generate a script that acts on the above file. When the Scripted monitor script reads this file, the script examines each line, and if the line has no quotation marks, the line is sent or expected as is. If the line is surrounded by quotation marks, the script strips off the quotation marks, and examines the line for escape characters, treating them accordingly. The following list shows the settings and default values of a Scripted monitor. Type: Scripted Import Settings: scripted Interval: 10 seconds Timeout: 31 seconds

11 - 24

Configuring Monitors

Probe Timeout: 5 seconds Ignore Down Response: No File name: (empty) Alias Address: * All Addresses Alias Service Port: * All Ports Debug: No
Note

When you create a file containing send and expect strings, store the file in the directory /config/eav.

SIP
You use a SIP monitor to check the status of SIP Call-ID services. This monitor type uses UDP to issue a request to a server device. The request is designed to identify the options that the server device supports. If the proper request is returned, the device is considered to be up and responding to commands. The following list shows the settings and default values of a SIP monitor. Type: SIP Import Settings: sip Interval: 30 seconds Timeout: 120 seconds Probe Timeout: 5 seconds Ignore Down Response: No Mode: UDP Additional Accepted Status Codes: None Additional Rejected Status Codes: Status Code List... Rejected Status Code List: (empty) Header List: (empty) SIP Request: (empty) Alias Address: * All Addresses Alias Service Port: * All Ports Debug: No Possible values for the Mode setting are TCP and UDP. Possible values for the Additional Accepted Status Codes setting are Any, None, and Status Code List. The Status Code List setting specifies one or more status codes, in addition to status code 200, that are acceptable in order to indicate an up status. Multiple status codes should be separated by spaces. Specifying an asterisk (*) indicates that all status codes are acceptable.

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 25

Chapter 11

SMTP
You use an SMTP monitor to check the status of Simple Mail Transport Protocol (SMTP) servers. This monitor is a basic monitor that checks only that the server is up and responding to commands. The check is successful if the mail server responds to the standard SMTP HELO and QUIT commands. An SMTP monitor requires a domain name. The following list shows the settings and default values of an SMTP monitor. Type: SMTP Import Settings: smtp Interval: 30 seconds Timeout: 120 seconds Probe Timeout: 5 seconds Ignore Down Response: No Domain: (empty) Alias Address: * All Addresses Alias Service Port: * All Ports Debug: No

SNMP
You use an SNMP monitor to check the performance of a server running an SNMP agent such as UC Davis, for the purpose of load balancing traffic to that server. This monitor conducts an SNMP query for a specific number of times, counting the number of times the query is successful. If the number of successful queries matches the number that you set when configuring the monitor, the Global Traffic Manager considers the resource available. Performance monitors are generally used with dynamic ratio load balancing. For more information on performance monitors and dynamic ratio load balancing, see Chapter 7, Load Balancing with the Global Traffic Manager. Unlike health monitors, performance monitors do not report on the status of a pool, pool member, or virtual server; they report on the status of the server itself. The exception to this is when you assign the monitor to a Cisco, Alteon, Extreme, or Radware server. In those situations, the monitor can obtain availability information on the virtual servers associated with that server. On Foundry servers, you can only obtain the administrative status of the virtual server. The Global Traffic Manager provides a pre-configured SNMP monitor named snmp_gtm. The following list shows the settings and values of the snmp_gtm pre-configured monitor. Type: SNMP Import Settings: snmp_gtm Interval: 90 seconds Timeout: 180 seconds Probe Interval: 1 second
11 - 26

Configuring Monitors

Probe Timeout: 1 second Probe Attempts: 1 Ignore Down Response: No Community: public Version: v1 Port: 161 Alias Address: * All Addresses Alias Service Port: * All Ports Pre-configured monitors are not user-modifiable. Thus, if you want to change the values for the SNMP monitor settings, you must create an SNMP custom monitor. Possible values for the Version setting are v1, v2c, and Other.

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 27

Chapter 11

SNMP Link
You use an SNMP Link monitor to check the performance of links that are running an SNMP agent. The Global Traffic Manager provides a pre-configured SNMP monitor named snmp_link. The following list shows the settings and values of the snmp_link pre-configured monitor. Type: SNMP Link Import Settings: snmp_link Interval: 10 seconds Timeout: 30 seconds Probe Interval: 1 second Probe Timeout: 5 seconds Probe Attempts: 3 Ignore Down Response: No Community: public Version: v1 Port: 161 Alias Address: * All Addresses Unlike health monitors, performance monitors do not report on the status of pool, pool member, or virtual server. Performance monitors are generally used with dynamic ratio load balancing. For more information on performance monitors and dynamic ratio load balancing, see Chapter 7, Load Balancing with the Global Traffic Manager. Pre-configured monitors are not user-modifiable. Thus, if you want to change the values for the SNMP Link monitor settings, you must create an SNMP Link custom monitor.

SOAP
You use a SOAP monitor to test a web service based on the Simple Object Access protocol (SOAP). More specifically, the monitor submits a request to a SOAP-based web service, and optionally, verifies a return value or fault. The following list shows the settings and default values of a SOAP monitor. Type: SOAP Import Settings: soap Interval: 30 seconds Timeout: 120 seconds Probe Timeout: 5 seconds Ignore Down Response: No User Name: (empty) Password: (empty)
11 - 28

Configuring Monitors

Protocol: HTTP Possible values are HTTP and HTTPS. URL Path: (empty) Namespace: (empty) Method: (empty) Parameter Name: (empty) Parameter Type: bool Possible values are: bool, int, long, and string. Parameter Value: (empty) Return Type: bool Possible values are: bool, int, short, long, float, double, and string. Return Value: (empty) Expect Fault: No Possible values are No and Yes. Alias Address: * All Addresses Alias Service Port: * All Ports Debug: No

UDP
You use a UDP monitor to check the status of User Datagram Protocol (UDP) packets. A UDP monitor sends one or more UDP packets to a target pool, pool member, or virtual server. The following list shows the settings and default values of a UDP monitor. Type: UDP Import Settings: udp Interval: 30 seconds Timeout: 120 seconds Probe Interval: 1 second Probe Timeout: 5 seconds Probe Attempts: 3 Ignore Down Response: No Send String: default send string Transparent: No Send Packets: 2 Timeout Packets: 2 Alias Address: * All Addresses Alias Service Port: * All Ports Debug: No

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 29

Chapter 11

Important

The value in seconds of the Timeout Packets setting must be lower than the value of the Interval setting. When using a UDP monitor to check a pool or virtual server, you must also enable another monitor type, such as HTTP, to monitor the pool or virtual server. Until both a UDP monitor and another type of monitor report the status of the UDP service as up, the UDP service receives no traffic. See Table 11.3 for details.
If a UDP monitor reports status as up up down down And another monitor reports status as up down up down Then the UDP service is up down down down

Table 11.3 Determining status of the UDP service

WAP
You use a WAP monitor to check Wireless Application Protocol (WAP) servers. The WAP monitor requests a URL (the Send String setting), finds the string in the Receive String setting in the data returned by the URL response. The following list shows the settings and default values of a WAP monitor. Type: WAP Import Settings: wap Interval: 10 seconds Timeout: 31 seconds Probe Timeout: 5 seconds Ignore Down Response: No Send String: (empty) Receive String: (empty) Secret: (empty) Accounting Node: (empty) Accounting Port: (empty) Server ID: (empty) Call ID: (empty) Session ID: (empty) Framed Address: (empty)
11 - 30

Configuring Monitors

Alias Address: * All Addresses Alias Service Port: * All Ports Debug: No The Secret setting is the RADIUS secret, a string known to both the client and the RADIUS server, and is used in computing the MD5 hash. The Accounting Node setting specifies the RADIUS resource. If this a null string and RADIUS accounting has been requested (accounting port is non-zero), then the WAP server resource is assumed to also be the RADIUS resource. If set to non-zero, the Accounting Port setting requests RADIUS accounting and uses the specified port. The Server ID setting specifies the RADIUS NAS-ID of the requesting server (that is, the BIG-IP system). It is a string used as an alias for the FQDN. See the section on testing WAP_monitor just below. The Call ID setting is an identifier similar to a telephone number, that is, a string of numeric characters. For testing purposes, this value is usually a string of eleven characters. The Session ID setting is a RADIUS session ID, used to identify this session. This is an arbitrary numeric character string, often something like 01234567. The Framed Address setting is a RADIUS framed IP address. The setting has no special use and is usually specified simply as 1.1.1.1. RADIUS accounting is optional. To implement RADIUS accounting, you must set the accounting port to a non-zero value. If you set the Accounting Port setting to a non-zero value, then the monitor assumes that RADIUS accounting is needed, and an accounting request is sent to the specified accounting node and port to start accounting. This is done before the URL is requested. After the successful retrieval of the URL with the correct data, an accounting request is sent to stop accounting.

WMI
You use a WMI monitor to check the performance of a pool or virtual server that is running the Windows Management Infrastructure (WMI) data collection agent and then dynamically load balances traffic accordingly. Unlike health monitors, performance monitors do not report on the status of a pool, pool member, or virtual server. You generally use performance monitors such as a WMI monitor with dynamic ratio load balancing. For more information on performance monitors and dynamic ratio load balancing, see Chapter 7, Load Balancing with the Global Traffic Manager. The following list shows the settings and default values of a WMI monitor. Type: WMI Import Settings: wmi Interval: 30 seconds
Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 31

Chapter 11

Timeout: 120 seconds Probe Timeout: 5 seconds Ignore Down Response: No User Name: (empty) Password: (empty) Method: POST URL: /scripts/F5lsapi.dll Command: GetCPUInfo, GetDiskInfo, GetOSInfo Metrics: LoadPercentage, DiskUsage, PhsyicalMemoryUsage Agent: Mozilla/4.0 (compatible: MSIE 5.0; Windows NT) Post: RespFormat=HTML Note that when creating a custom WMI monitor, the only default values that you are required to change are the null values for user name and password. Also note that you cannot change the value of the Method setting. Table 11.4 shows the complete set of commands and metrics that you can specify with the Command and Metrics settings. Also shown are the default metric values.
Default Coefficient 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 Default Threshold 80 80 80 100 90 10,000 500 500 500 500 500 500 500

Command GetCPUInfo GetOSInfo

Metric LoadPercentage (%) PhysicalMemoryUsage (%) VirtualMemoryUsage (%) NumberRunningProcesses

GetDiskInfo GetPerfCounters

DiskUsage (%) TotalKBytesPerSec ConnectionAttemptsPerSec CurrentConnections GETRequestsPerSec PUTRequestsPerSec POSTRequestsPerSec AnonymousUsersPerSec CurrentAnonymousUsers

Table 11.4 WMI monitor commands and metrics

11 - 32

Configuring Monitors

Command

Metric NonAnonymousUsersPerSec CurrentNonAnonymousUser CGIRequestsPerSec CurrentCGIRequests ISAPIRequestsPerSec CurrentISAPIRequests

Default Coefficient 1.0 1.0 1.0 1.0 1.0 1.0 1.0

Default Threshold 500 500 500 500 500 500 10,000 Kbps 10,000 Kbps 1000 1000 1000 1000 10,000 Kbps 1000 100 1000 100 500 500 1000 500 500 100 100

GetWinMediaInfo

AggregateReadRate

AggregateSendRate

1.0

ActiveLiveUnicastStreams ActiveStreams ActiveTCPStreams ActiveUDPStreams AllocatedBandwidth

1.0 1.0 1.0 1.0 1.0

AuthenticationRequests AuthenticationsDenied AuthorizationRequests AuthorizationsRefused ConnectedClients ConnectionRate HTTPStreams HTTPStreamsReadingHeader HTTPStreamsStreamingBody LateReads PendingConnections

1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0

Table 11.4 WMI monitor commands and metrics

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 33

Chapter 11

Command

Metric PluginErrors PluginEvents SchedulingRate StreamErrors StreamTerminations UDPResendRequests UDPResendsSent

Default Coefficient 1.0 1.0 1.0 1.0 1.0 1.0 1.0

Default Threshold 100 100 100 100 100 100 100

Table 11.4 WMI monitor commands and metrics

11 - 34

Configuring Monitors

Special configuration considerations


Every pre-configured or custom monitor has settings with some default values assigned. The following sections contain information that is useful when changing these default values.

Setting destinations
By default, the value for the Alias Address setting for most monitors is set to the wildcard * Addresses, and the Alias Service Port setting is set to the wildcard * Ports (exceptions to this rule are the WMI and Real Server monitors). This value causes the monitor instance created for a pool or virtual server to take that resources address or address and port as its destination. You can, however, replace either or both wildcard symbols with an explicit destination value, by creating a custom monitor. An explicit value for the Alias Address and/or Alias Service Port setting is used to force the instance destination to a specific address and/or port which may not be that of the pool or virtual server. The ECV monitors http, https, and tcp have the settings Send String and Receive String for the send string and receive expression, respectively. The most common Send String value is GET /, which retrieves a default HTML page for a web site. To retrieve a specific page from a web site, you can enter a Send String value that is a fully qualified path name:
"GET /www/support/customer_info_form.html"

The Receive String expression is the text string the monitor looks for in the returned resource. The most common Receive String expressions contain a text string that is included in a particular HTML page on your site. The text string can be regular text, HTML tags, or image names. The sample Receive expression below searches for a standard HTML tag:
"<HEAD>"

You can also use the default null Receive String value [""]. In this case, any content retrieved is considered a match. If both the Send String and Receive String are left empty, only a simple connection check is performed. For HTTP monitors, you can use the special settings get or hurl in place of Send String and Receive String statements, respectively.

Using transparent and reverse modes


The normal and default behavior for a monitor is to ping the destination pool or virtual server by an unspecified route, and to mark the resource up if the test is successful. However, with certain monitor types, you can specify a route through which the monitor pings the destination server. You configure this by specifying the Transparent or Reverse setting within a custom monitor.

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 35

Chapter 11

Transparent setting Sometimes it is necessary to ping the aliased destination through a transparent pool or virtual server. When you create a custom monitor and set the Transparent setting to Yes, the Global Traffic Manager forces the monitor to ping through the pool or virtual server with which it is associated (usually a firewall) to the pool or virtual server. (In other words, if there are two firewalls in a load balancing pool, the destination pool or virtual server is always pinged through the pool or virtual server specified and not through the pool or virtual server selected by the load balancing method.) In this way, the transparent pool or virtual server is tested: if there is no response, the transparent pool or virtual server is marked as down. Common examples are checking a router, or checking a mail or FTP server through a firewall. For example, you might want to check the router address 10.10.10.53:80 through a transparent firewall 10.10.10.101:80. To do this, you create a monitor called http_trans in which you specify 10.10.10.53:80 as the monitor destination address, and set the Transparent setting to Yes. Then you associate the monitor http_trans with the transparent firewall (10.10.10.101:80). This causes the monitor to check the address 10.10.10 53:80 through 10.10.10.101:80. (In other words, the Global Traffic Manager routes the check of 10.10.10.53:80 through 10.10.10.101:80.) If the correct response is not received from 10.10.10.53:80, then 10.10.10.101:80 is marked down. For more information on associating monitors with virtual servers, see Associating monitors with resources, on page 11-38.

Reverse setting In most monitor settings, the Global Traffic Manager considers the resource available when the monitor successfully probes it. However, in some cases you may want the resource to be considered unavailable after a successful monitor test. You accomplish this configuration with the Reverse setting. With the Reverse setting set to Yes, the monitor marks the pool or virtual server down when the test is successful. For example, if the content on your web site home page is dynamic and changes frequently, you may want to set up a reverse ECV service check that looks for the string: Error. A match for this string means that the web server was down.

Table 11.5 shows the monitors that contain the Transparent setting, the Reverse setting, or both.
Monitor Type Gateway ICMP TCP HTTP HTTPS Transparent Transparent Transparent Transparent Setting N/A Reverse Reverse Reverse

Table 11.5 Monitors that contain the Transparent or Reverse settings


11 - 36

Configuring Monitors

Monitor Type TCP TCP Half Open UDP Transparent Transparent Transparent

Setting Reverse N/A N/A

Table 11.5 Monitors that contain the Transparent or Reverse settings

Configuring when a virtual server is marked down


If all iQuery connections between a Global Traffic Manager and a BIG-IP system are lost, by default the Global Traffic Manager marks all of the virtual servers on the BIG-IP system as down. However, you can configure the Global Traffic Manager so that even when all iQuery connections from the Global Traffic Manager to the BIG-IP system are lost, the Global Traffic Manager marks the virtual servers as down only when the monitors associated with the virtual servers time out. To do this, you change the value of the virtuals-depend-on-server-state option to no. Note that even after you set this option to no, as long as the iQuery connections between the Global Traffic Manager and the BIG-IP system are still connected, when the Global Traffic Manager receives a down response for a virtual server from the BIG-IP system, it immediately marks that virtual server down. The default value of the virtuals-depend-on-server-state option is yes. To change the value to no, use the following tmsh command:
tmsh gtm settings general modify virtuals-depend-on-server-state no

For information about the command syntax you use to change this variable, see the gtm settings component in the Traffic Management Shell (tmsh) Reference Guide.

Configuring an ECV monitor to ignore a down response


By default, an ECV monitor marks a virtual server as unavailable immediately after receiving a down response from the virtual server. If you want to configure a Global Traffic Manager ECV monitor to allow more than one probe attempt before a failure is detected, you can enable the Ignore Down Response setting on the monitor. When you enable this option, the monitor ignores a down response from the system it is monitoring. Assuming the Interval value is a fraction of the Timeout value, the system sends multiple probes per timeout period. The monitor only marks the system down if it does not receive an up response within the specified monitor timeout period.

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 37

Chapter 11

To configure an ECV monitor to ignore a down response


1. On the Main tab of the navigation pane, expand Global Traffic and click Monitors. The main screen for monitors opens. 2. Click the name of the monitor that you want to configure. The properties screen for the monitor appears. 3. From the Configuration list, select Advanced. Additional fields display with default settings. 4. For Ignore Down Response setting, click the Yes button. 5. Click the Update button to save your changes.

Associating monitors with resources


Once you create a monitor and configure its settings, the final task is to associate the monitor with the resources to be monitored. The resources that can be monitored are nodes, servers, pools, pool members, and links. When you associate a monitor with a resource, the Global Traffic Manager automatically creates an instance of that monitor for that resource. Therefore, you can have multiple instances of the same monitor. The Configuration utility allows you to disable an instance of a monitor that is running on a server. This allows you to suspend health or performance checking, without having to actually remove the monitor association. When you are ready to begin monitoring that server again, you simply re-enable that instance of the monitor.

Types of monitor associations


Some monitor types are designed for association only with nodes (IP address), while other monitor types are intended for association only with pools and virtual servers (IP address and service port). Therefore, when you use the Configuration utility to associate a monitor with a pool or virtual server, the utility displays only those pre-configured monitors that are designed for association with that object type. For more information about the monitors that you can assign to different objects, see Table 11.1, on page 11-2. The types of monitor associations are:

Monitor-to-pool association Links a monitor with an entire load balancing pool. In this case, the monitor checks all members of the pool. For example, you can create an instance of the monitor http for the pool my_pool, thus ensuring that all members of that pool are checked.

11 - 38

Configuring Monitors

Monitor-to-pool member association Links a monitor with a pool member within a given pool. For example, you can create an instance of the monitor FTP for specific pools within the pool my_pool, ensuring that only specific pool members are verified as available through the FTP monitor. Monitor-to-virtual server association Links a monitor with a specific virtual server. In this case, the monitor checks only the virtual server itself, and not any services running on that virtual server. For example, you can create an instance of the monitor http for virtual server 10.10.10.10. In this case, the monitor checks the specific virtual server only, and not any services running on that virtual server.

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 39

Chapter 11

Managing monitors
The procedures for adding and removing monitors are specific to the resource. See Chapter 5, Defining the Physical Network, and Chapter 6, Defining the Logical Network, for information on adding and removing monitors from a resource. In addition to adding and removing monitors from network resources, you can interact with monitors in the following ways: Displaying monitor settings Deleting monitors Enabling and disabling monitor instances

Displaying monitor settings


Because you can create a large number of monitors to accurately track the performance and availability of your network resources, it is helpful to view monitor settings to determine if a given monitor is the correct one for a given resource.

To display the settings of a monitor


1. On the Main tab of the navigation pane, expand Global Traffic and click Monitors. The main monitors screen opens. 2. Click a monitor name. The properties screen of the monitor opens.

Deleting monitors
In the event that your configuration of the Global Traffic Manager no longer requires a specific monitor, you can delete the monitor. You cannot delete a monitor that has one or more instances assigned to resources on your network. See Chapter 5, Defining the Physical Network, and Chapter 6, Defining the Logical Network, for information on adding and removing monitors from a resource.

To delete a monitor
1. On the Main tab of the navigation pane, expand Global Traffic and click Monitors. The main monitors screen opens. 2. Check the Select box for the monitor that you want to delete. 3. Click the Delete button. A confirmation message opens. 4. Click the Delete button to delete the monitor.

11 - 40

Configuring Monitors

Enabling and disabling monitor instances


When you add a monitor to a resource, the Global Traffic Manager creates a copy of that monitor, or instance, and assigns it to that resource. You can enable or disable these instances as needed. For example, if you wanted to temporarily suspend the monitoring of a given virtual server that is undergoing maintenance, you can disable the monitor for that virtual server and then re-enable it when the maintenance is complete.

To enable or disable a monitor instance


1. On the Main tab of the navigation pane, expand Global Traffic and click Monitors. The main monitors screen opens. 2. Click a monitor name in the list. The properties screen for the monitor opens. 3. On the menu bar, click Instances. The monitor instance screen opens. 4. For the instance you want to manage, check the Select box. 5. Click the Enable or Disable button, as appropriate. 6. Click the Update button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

11 - 41

Chapter 11

11 - 42

12
Viewing Statistics

Introducing statistics Accessing statistics Viewing the Status Summary screen Understanding the types of statistics Understanding persistence records

Viewing Statistics

Introducing statistics
One of the most important aspects of managing a network is timely access to accurate information on network performance. This information can verify that the Global Traffic Manager is handling your name resolution requests as efficiently as possible, as well as provide data on the overall performance of a specific resource, such as a data center or distributed application. The Global Traffic Manager gathers statistical data on multiple aspects of your network. You access these statistics through the statistics screen. The types of statistics you can select from this screen include: A summary of network components, as defined in the Global Traffic Manager Distributed applications Wide IPs Pools Data centers Links Servers Virtual servers iRules Paths Local DNS The Global Traffic Manager also contains persistence records. A persistence record provides information on network load balancing when the persistence option is enabled for a given pool or virtual server. This option ensures that the system sends name resolution from the same source within a given session to the same resource on your network. The Global Traffic Manager gathers statistics through a software component called the big3d agent. This agent probes the various monitors that you assign to your network components, and returns statistics based on those monitors. The gtmd utility manages those monitors, determining when to probe and when to time out the probe attempts. Statistics are often paired with metrics collection; however, the two have different roles. Statistics pertain to a broad set of data that focuses on how often a given set of resources are used and how well those resources are performing. Metrics collection, on the other hand, focuses specifically on data that relates to overall communication between the Global Traffic Manager and an LDNS. Unlike statistics, metrics collection is designed to provide performance data, as opposed to usage or historical data. See Chapter 13, Collecting Metrics, for more information on metrics.

Configuration Guide for BIG-IP Global Traffic ManagerTM

12 - 1

Chapter 12

Accessing statistics
You can access Global Traffic Manager statistics in two ways: Through the Statistics option on the Main tab of the navigation pane Through the Statistics menu from various main screens for different components Both methods take you to the same screen within the Global Traffic Manager. When you access statistics through a menu on the main screen for a given network component, the Statistics screen is pre-configured for the given network element, although you can switch to a different set of statistics at any time. Additionally, you can use the search feature to locate a specific component or group of components. The default search value is an asterisk (*), which instructs the system to display all relevant components in a list. You can type a string in the box, and when you click the Search button, the system modifies the list to show only those components that match the string. For more information about how the search feature works, see Locating a component using the search feature, on page 2-6.
Tip

You can also access statistics from the command line using the tmsh command show. For more information about viewing statistics using tmsh, see the Traffic Management Shell (tmsh) Reference Guide.

To access statistics through the Main tab


1. On the Main tab of the navigation pane, expand Overview and click Statistics. The Statistics screen opens. 2. On the menu bar, click Global Traffic. The Statistics screen for Global Traffic opens. 3. From the Statistics Type list, select the type of statistics you want to view. These statistics are described in later sections of this chapter. 4. Select the data format in which you want to view the statistics: If you select Normalized, the Global Traffic Manager rounds the data to the nearest digit. If you select Unformatted, the Global Traffic Manager displays the exact value to as many decimal places as the value requires. 5. From the Auto Refresh list, select the frequency at which the Global Traffic Manager refreshes data on the screen. If you select Disabled from this list, the system does not refresh the screen; instead, you can click the Refresh button to update the screen with the latest statistical data.

12 - 2

Viewing Statistics

To access statistics through a components main screen


1. On the Main tab of the navigation pane, expand Global Traffic and click a component, such as Wide IPs. The main screen for the component opens. 2. On the menu bar, click Statistics. The Statistics screen opens displaying statistics relevant to the component. 3. Select the data format in which you want to view the statistics: If you select Normalized, the Global Traffic Manager rounds the data to the nearest digit. If you select Unformatted, the Global Traffic Manager displays the exact value to as many decimal places as the value requires. 4. From the Auto Refresh list, select the frequency at which the Global Traffic Manager refreshes data on the screen. If you select Disabled from this list, the system does not refresh the screen; instead, you can click the Refresh button to update the screen with the latest statistical data.

Viewing the Status Summary screen


As you track the performance of your data centers, virtual servers, and other resources, you may find it helpful to have a single screen in which you can get a snapshot of overall resource availability. In the Global Traffic Manager, you can view this data on the Status Summary screen. The Status Summary screen consists of a Global Traffic Summary table that contains the following information:

Object Type The Object Type column describes the specific resource type. These types are: distributed application, wide IPs, pools, data centers, links, and servers. Total The Total column describes the total number of resources of the type corresponding to the Object Type column, regardless of whether the resource is available. Available The Available column describes the total number of resources of the type corresponding to the Object Type column that the Global Traffic Manager can verify as available. Unavailable The Unavailable column describes the total number of resources of the type corresponding to the Object Type column that the Global Traffic Manager can verify as unavailable.

Configuration Guide for BIG-IP Global Traffic ManagerTM

12 - 3

Chapter 12

Offline The Offline column describes the total number of resources of the type corresponding to the Object Type column that the Global Traffic Manager can verify as offline. Unknown The Available column describes the total number of resources of the type corresponding to the Object Type column that the Global Traffic Manager can verify as available.

Each value within the Total, Available, Unavailable, Offline, and Unknown columns is a link. When you click the link, you access the main screen for that resource, with the list of resources filtered to show only those resources with the corresponding status. For example, if the Available column for data centers has a value of 5, clicking the 5 brings up a filtered main screen for data centers that shows only the five data centers that are available.

Understanding the types of statistics


You can view a variety of statistics through the Global Traffic Manager, including:

Distributed applications The statistics for distributed applications provide you with information on what distributed applications exist, what wide IPs make up that application, and how the Global Traffic Manager has load balanced traffic to the application. Wide IPs The statistics for wide IPs provide you with information on what wide IPs exist and how the Global Traffic Manager has load balanced traffic to the wide IP. Pools The statistics for pools provide details on how the Global Traffic Manager has load balanced traffic to each pool. Data centers The statistics for data centers revolve around the amount of traffic flowing to and from each data center. Links The statistics for links focus on how much traffic is flowing in and out through a specific link to the Internet. Servers The statistics for servers display the amount of traffic flowing to and from each server. Virtual servers The statistics for virtual servers provide information on the amount of traffic flowing to and from each virtual server.

12 - 4

Viewing Statistics

Paths The statistics for paths provide information on how quickly traffic moves between an LDNS and a resource for which the Global Traffic Manager is responsible. Local DNS The Local DNS statistics provide location details related to the different local DNS servers that communicate with the Global Traffic Manager.

Distributed application statistics


The Global Traffic Manager captures several statistics related to the performance of a distributed application. You can use these statistics to see how many resolution requests have been sent for the application, and how the system has load balanced these requests. You can access the wide IP statistics by selecting Distributed Applications from the Statistics Type list in the Statistics screen. For information on accessing the Statistics screen, see Accessing statistics, on page 12-2. As an example of distributed application statistics, consider the fictional company SiteRequest. The IT department at SiteRequest has a distributed application, downloader, which contains multiple wide IPs associated with the viewing and downloading of SiteRequest applications. The wide IPs in the downloader application use the Global Availability load balancing mode. This mode sends all name resolution requests for this wide IP to a specific pool until that pool is unavailable. Because the distributed application is critical to SiteRequests operations, the IT department wants to track traffic to the application and ensure that it is being managed effectively. The distributed applications statistics provide the IT department the information they need to see how many requests are being sent for the application, allowing them to plan additional resource allocations more effectively. The distributed application statistics screen consists of a Distributed Application Statistics table. This table contains the following information:

Status The Status column indicates the current status of the wide IP. The available status types are: Available, Unavailable, Offline, and Unknown. Each status type is represented by a symbol; for example, the available status type is represented by a green circle. Distributed Application The Distributed Application column displays the name of an application for which the Global Traffic Manager is responsible. Each name appears as a link. When you click the link, the properties screen for the distributed application opens. Members The Members column provides a link that opens a wide IP details screen for the distributed application. This screen displays load balancing

Configuration Guide for BIG-IP Global Traffic ManagerTM

12 - 5

Chapter 12

statistics for each pool within the distributed application. You can return to the main distributed application statistics screen by clicking the Back button in the Display Options area of the screen.

Requests The Requests column displays the cumulative number of Domain Name System (DNS) requests sent to the distributed application. Load Balancing The Load Balancing column provides information on how the Global Traffic Manager load balanced connection requests to this resource. This column consists of four subcolumns: The Preferred subcolumn displays the cumulative number of requests that the Global Traffic Manager load balanced with the preferred load balancing method. The Alternate subcolumn displays the cumulative number of requests that the Global Traffic Manager load balanced with the alternate load balancing method. The Fallback subcolumn displays the cumulative number of requests that the Global Traffic Manager load balanced with the Fallback load balancing method. The Returned to DNS subcolumn displays the cumulative number of requests that the Global Traffic Manager did not resolve and returned to the DNS.

Wide IP statistics
The Global Traffic Manager captures several statistics related to the performance of a wide IP. These statistics primarily focus on how many resolution requests have been sent for the wide IP, and how the Global Traffic Manager has load balanced these requests. You can access the wide IP statistics by selecting Wide IPs from the Statistics Type list in the Statistics screen. For information on accessing the Statistics screen, see Accessing statistics, on page 12-2. As an example of wide IP statistics, consider the fictional company SiteRequest. The IT department at SiteRequest has a wide IP, www.siterequest.com, which uses the Global Availability load balancing mode. This mode sends all name resolution requests for this wide IP to a specific pool until that pool is unavailable. Because the wide IP, www.siterequest.com, is critical to SiteRequests operations, the IT department wants to track traffic to the wide IP and ensure that the primary pool is not at risk of getting overloaded. The wide IP statistics provide the IT department the information they need to see how many requests are being sent for the wide IP, allowing them to plan additional resource allocations more effectively.

12 - 6

Viewing Statistics

The wide IP statistics screen consists of a Wide IP Statistics table. This table contains the following information:

Status The Status column indicates the current status of the wide IP. The available status types are: Available, Unavailable, Offline, and Unknown. Each status type is represented by a symbol; for example, the available status type is represented by a green circle. Wide IP The Wide IP column displays the name of a wide IP for which the Global Traffic Manager is responsible. Each name appears as a link. When you click the link, the properties screen for the wide IP opens. Pools The Pools column provides a link that opens a pool details screen for the wide IP. This screen displays load balancing statistics for each pool within the wide IP. You can return to the main wide IP statistics screen by clicking the Back button in the Display Options area of the screen. Requests The Requests column displays the cumulative number of DNS requests sent to the wide IP. Requests Persisted The Requests Persisted column displays the cumulative number of requests that persisted. Persisted requests use the same pool during a connection session. Load Balancing The Load Balancing column provides information on how the Global Traffic Manager load balanced connection requests to this resource. This column consists of four subcolumns: The Preferred subcolumn displays the cumulative number of requests that the Global Traffic Manager load balanced with the preferred load balancing method. The Alternate subcolumn displays the cumulative number of requests that the Global Traffic Manager load balanced with the alternate load balancing method. The Fallback subcolumn displays the cumulative number of requests that the Global Traffic Manager load balanced with the Fallback load balancing method. The Returned to DNS subcolumn displays the cumulative number of requests that the Global Traffic Manager did not resolve and returned to the DNS.

Configuration Guide for BIG-IP Global Traffic ManagerTM

12 - 7

Chapter 12

Pool statistics
The pool statistics available through the Global Traffic Manager focus on how the Global Traffic Manager has load balanced name resolution requests. You can access the pool statistics by selecting Pools from the Statistics Type list in the Statistics screen. For information on accessing the Statistics screen, see Accessing statistics, on page 12-2. As an example of pool statistics, consider the fictional company SiteRequest. The IT department at SiteRequest has a wide IP, www.siterequest.com, which contains pools that use the dynamic load balancing mode, Quality of Service. This mode acquires statistical data on response times between the Global Traffic Manager and an LDNS sending a name resolution request. There has been some concern of late as to how well this new load balancing mode is working and if the Global Traffic Manager is able to gather the statistical information it needs to load balance with this mode, or if it has to resort to an alternate or fallback method. By using the pool statistics screen, the IT department can track how many name resolution requests are load balanced using the preferred Quality of Service method, and how many are load balanced using another method. The pool statistics screen consists of a Pool Statistics table. This table contains the following information:

Status The Status column indicates the current status of the pool. The available status types are: Available, Unavailable, Offline, and Unknown. Each status type is represented by a symbol; for example, the available status type is represented by a green circle. Pool The Pool column displays the name of a wide IP for which the Global Traffic Manager is responsible. Each name appears as a link. When you click the link, the properties screen for the pool opens. Members The Members column provides a link that opens a virtual server details screen for the pool. This screen displays connection statistics for each virtual server within the pool, including the number of times the virtual server was selected for a name resolution request and the amount of traffic flowing from and to the virtual server. You can return to the main wide IP statistics screen by clicking the Back button in the Display Options area of the screen. Load Balancing The Load Balancing column provides information on how the Global Traffic Manager load balanced connection requests to this resource. This column consists of four subcolumns: The Preferred subcolumn displays the cumulative number of requests that the Global Traffic Manager load balanced with the preferred load balancing method. The Alternate subcolumn displays the cumulative number of requests that the Global Traffic Manager load balanced with the alternate load balancing method.

12 - 8

Viewing Statistics

The Fallback subcolumn displays the cumulative number of requests that the Global Traffic Manager load balanced with the Fallback load balancing method. The Returned to DNS subcolumn displays the cumulative number of requests that the Global Traffic Manager did not resolve and returned to the DNS.

Data center statistics


Data center statistics revolve around the amount of traffic flowing to and from each data center. This information can tell you if your resources are distributed appropriately for your network. You can access the data center statistics by selecting Data Centers from the Statistics Type list in the Statistics screen. For information on accessing the Statistics screen, see Accessing statistics, on page 12-2. As an example of how the statistics for data centers can help you manage your network resources, consider the fictional company SiteRequest. SiteRequest has decided that its New York data center should handle all name resolution requests originating in North America. However, since a new marketing campaign started in the United States and the IT department is concerned it might overload the data center. By using the data center statistics, the IT department can track the overall amount of traffic that the New York data center is handling, allowing them to make adjustments to their load balancing methods in a timely manner. The data center statistics screen consists of a Data Center Statistics table. This table contains the following information:

Status The Status column indicates the current status of the data center. The available status types are: Available, Unavailable, Offline, and Unknown. Each status type is represented by a symbol; for example, the available status type is represented by a green circle. Data Center The Data Center column displays the name of a data center. Each name appears as a link. When you click the link, the properties screen for the data center opens. Servers The Servers column provides a link that opens a server details screen for the data center. This screen displays connection statistics for each server at a data center, including the number of times the server was selected for a name resolution request and the amount of traffic flowing from and to the server. You can return to the main data center statistics screen by clicking the Back button in the Display Options area of the screen. Connections The Connections column displays the cumulative number of requests that the Global Traffic Manager resolved using a resource from the corresponding data center.

Configuration Guide for BIG-IP Global Traffic ManagerTM

12 - 9

Chapter 12

Throughput (bits/sec) The Throughput (bits/sec) column contains two subcolumns: The In column displays the cumulative number of bits per second sent to the data center. The Out column displays the cumulative number of bits per second sent from the data center.

Throughput (packets/sec) The Throughput (packets/sec) column contains two subcolumns: The In column displays the cumulative number of packets per second sent to the data center. The Out column displays the cumulative number of packets per second sent from the data center.

Link statistics
Link statistics focus on how much traffic is flowing in and out through a specific link to the Internet. This information can help you prevent a link from getting over-used, saving your organization from higher bandwidth costs. You can access the link statistics by selecting Links from the Statistics Type list in the Statistics screen. For information on accessing the Statistics screen, see Accessing statistics, on page 12-2. As an example of how the statistics for data centers can help you manage your network resources, consider the fictional company SiteRequest. SiteRequest has two links with two different Internet Service Providers (ISPs). The primary ISP is paid in advance for a specific amount of bandwidth usage. This allows SiteRequest to save money, but if the bandwidth exceeds the prepaid amount, the costs increase considerably. As a result, the IT department uses a second ISP, which has a slower connection but considerably lower costs. By using the links statistics, the IT department can ensure that links to the Internet are used as efficiently as possible. The link statistics screen consists of a Link Statistics table. This table contains the following information:

Status The Status column indicates the current status of the link. The available status types are: Available, Unavailable, Offline, and Unknown. Each status type is represented by a symbol; for example, the available status type is represented by a green circle. Link The Link column displays the name of a link for which the Global Traffic Manager is responsible. Each name appears as a link. When you click the link, the properties screen for the link opens. Throughput (bits/sec) The Throughput (bits/sec) column contains four subcolumns: The In column displays the cumulative number of bits per second sent to the data center.

12 - 10

Viewing Statistics

The Out column displays the cumulative number of bits per second sent from the data center. The Total column displays the cumulative number of both incoming and outgoing bits per second for the link. The Over Prepaid column displays the amount of traffic, in bits per second, that has exceeded the prepaid traffic allotment for the link. In addition to viewing the link data as a table, you can also view it in a graph format. To use this format, click the Graph button. A graph screen opens, which shows the amount of traffic used over time. You can change the amount of time shown in the graph by selecting a value from the Graph Interval list, located in the Display Options area of the screen.

Server statistics
With server statistics, you can analyze the amount of traffic flowing to and from each server. This information can tell you if your resources are distributed appropriately for your network. You can access the server statistics by selecting Servers from the Statistics Type list in the Statistics screen. For information on accessing the Statistics screen, see Accessing statistics, on page 12-2. As an example of how the statistics for servers can help you manage your network resources, consider the fictional company SiteRequest. The IT department at SiteRequest is considering whether it needs a few more servers to better manage name resolution requests; however, there is some debate as to whether the servers should be consolidated at the New York data center (which the New York team prefers) or spread out over all of the data centers. It is also possible that an under-utilized server at one data center might be moved to another data center. By using the server statistics, the IT department can look at how much traffic is handled by each server, giving them the information they need to decide where these new servers, if any, should go. The server statistics screen consists of a Server Statistics table. This table contains the following information:

Status The Status column indicates the current status of the server. The available status types are: Available, Unavailable, Offline, and Unknown. Each status type is represented by a symbol; for example, the available status type is represented by a green circle. Server The Server column displays the name of a server for which the Global Traffic Manager is responsible. Each name appears as a link. When you click the link, the properties screen for the server opens. Virtual Servers The Virtual Servers column provides a link that opens a virtual server details screen for the server. This screen displays connection statistics for each virtual server at a data center, including the number of times the
12 - 11

Configuration Guide for BIG-IP Global Traffic ManagerTM

Chapter 12

virtual server was selected for a name resolution request and the amount of traffic flowing from and to the server. You can return to the main data center statistics screen by clicking the Back button in the Display Options area of the screen.

Picks The Picks column displays the cumulative number of times the Global Traffic Manager picked a server to handle a name resolution request. Connections The Connections column displays the cumulative number of requests that the Global Traffic Manager resolved using a resource from the corresponding data center. Throughput (bits/sec) The Throughput (bits/sec) column contains two subcolumns: The In column displays the cumulative number of bits per second sent to the server. The Out column displays the cumulative number of bits per second sent from the server.

Throughput (packets/sec) The Throughput (packets/sec) column contains two subcolumns: The In column displays the cumulative number of packets per second sent to the server. The Out column displays the cumulative number of packets per second sent from the server.

Virtual server statistics


Virtual server statistics provide information on the amount of traffic flowing to and from each virtual server. This information can tell you if your resources are distributed appropriately for your network. You can access the virtual server statistics by selecting Virtual Servers from the Statistics Type list in the Statistics screen. For information on accessing the Statistics screen, see Accessing statistics, on page 12-2. As an example of how the statistics for servers can help you manage your network resources, consider the fictional company SiteRequest. SiteRequest recently added a Local Traffic Manager to their Tokyo data center. The IT department wants to see how well the new system is handling the traffic, and if it can perhaps be utilized to handle traffic for a new wide IP, www.SiteRequestAsia.com. After installing the Local Traffic Manager and adding it to the Global Traffic Manager as a server, the IT department can use the virtual server statistics to monitor the performance of the virtual servers that compose the new Local Traffic Manager, allowing them to determine if more resources are required for the new wide IP. The server statistics screen consists of a Virtual Server Statistics table. This table contains the following information:

12 - 12

Viewing Statistics

Status The Status column indicates the current status of the server. The available status types are: Available, Unavailable, Offline, and Unknown. Each status type is represented by a symbol; for example, the available status type is represented by a green circle. Virtual Server The Virtual Server column displays the name of a virtual server for which the Global Traffic Manager is responsible. Each name appears as a link. When you click the link, the properties screen for the virtual server opens. Server The Servers column provides a link that opens a server details screen for the data center. This screen displays connection statistics for each server at a data center, including the number of times the server was selected for a name resolution request and the amount of traffic flowing from and to the server. You can return to the main data center statistics screen by clicking the Back button in the Display Options area of the screen. Picks The Picks column displays the cumulative number of times the Global Traffic Manager picked a server to handle a name resolution request. Connections The Connections column displays the cumulative number of requests that the Global Traffic Manager resolved using a resource from the corresponding data center. Throughput (bits/sec) The Throughput (bits/sec) column contains two subcolumns: The In column displays the cumulative number of bits per second sent to the server. The Out column displays the cumulative number of bits per second sent from the server.

Throughput (packets/sec) The Throughput (packets/sec) column contains two subcolumns: The In column displays the cumulative number of packets per second sent to the server. The Out column displays the cumulative number of packets per second sent from the server.

Paths statistics
The paths statistics captured by the Global Traffic Manager provide information on how quickly traffic moves between an LDNS and a resource for which the Global Traffic Manager is responsible. Information presented in the paths statistics screen includes details on round trip times (RTT),

Configuration Guide for BIG-IP Global Traffic ManagerTM

12 - 13

Chapter 12

hops, and completion rates. You can access the paths statistics by selecting Paths from the Statistics Type list in the Statistics screen. For information on accessing the Statistics screen, see Accessing statistics, on page 12-2. Paths statistics are primarily used when you employ a dynamic load balancing mode for a given wide IP or pool. You can use the information in the Paths statistics to get an overall sense of how responsive your wide IPs are in relation to the local DNS servers that have been sending name resolution requests to a wide IP. The paths statistics screen consists of a paths statistics table. This table contains the following information:

Local DNS Address The Local DNS Address column displays the IP address of each LDNS that has sent a name resolution request for a wide IP for which the Global Traffic Manager is responsible. Link The Link column displays the ISP link that the Global Traffic Manager used to send and receive data from the LDNS. Round Trip Time (RTT) The Round Trip Time (RTT) column contains two subcolumns: The Current subcolumn displays the current round trip time between the LDNS and the Global Traffic Manager. The Average subcolumn displays the average round trip time between the LDNS and the Global Traffic Manager.

Hops The Hops column contains two subcolumns: The Current subcolumn displays the current number of hops between the LDNS and the Global Traffic Manager. The Average subcolumn displays the average number of hops between the LDNS and the Global Traffic Manager.

Completion Rate The Completion Rate column contains two subcolumns: The Current subcolumn displays the current completion rate of transactions between the LDNS and the Global Traffic Manager. The Average subcolumn displays the average completion rate of transactions between the LDNS and the Global Traffic Manager.

Last Probe Time The Last Probe Time column displays the last time the Global Traffic Manager probed the LDNS for metrics data.

12 - 14

Viewing Statistics

Local DNS statistics


The Local DNS statistics screen provides location details related to the different local DNS servers that communicate with the Global Traffic Manager. These statistics include the geographical location of each LDNS as well as a timestamp for the last time that the LDNS accessed the Global Traffic Manager. You can access LDNS statistics by selecting Local DNS from the Statistics Type list in the Statistics screen. For information on accessing the Statistics screen, see Accessing statistics, on page 12-2. As an example of how the statistics for servers can help you manage your network resources, consider the fictional company SiteRequest. SiteRequest is currently considering whether it needs a new data center in North America to ensure that its customers can access SiteRequests web site as effectively as possible. To help make their decision, the IT department uses the local DNS statistics to see where most of their European traffic is coming from. By using these statistics, the IT department discovers that a high concentration of local DNS servers accessing SiteRequest is in the southwest United States. This information proves helpful in determining that a new data center in Las Vegas might be appropriate. The Local DNS statistics screen displays a statistics table that contains the following information:

IP Address The IP Address column displays the IP address of each LDNS that has sent a name resolution request for a wide IP for which the Global Traffic Manager is responsible. Requests The Requests column displays the number of times this LDNS has made a name resolution request that the Global Traffic Manager handled. Last Accessed The Last Accessed column displays the last time the LDNS attempted a connection to the Global Traffic Manager. Location The Location column contains four subcolumns: The Continent subcolumn displays the continent on which the LDNS resides. The Country subcolumn displays the country in which the LDNS is located. The State subcolumn displays the state in which the LDNS is located. The City subcolumn displays the city in which the LDNS is located.

Configuration Guide for BIG-IP Global Traffic ManagerTM

12 - 15

Chapter 12

Understanding persistence records


One of the common methods of modifying name resolution requests with the Global Traffic Manager is to activate persistent connections. A persistent connection is a connection in which the Global Traffic Manager sends name resolution requests from a specific LDNS to the same set of resources until a time-to-live value has been reached. If you use persistent connections in your configuration of the Global Traffic Manager, you may want to see what persistent connections are currently active on your network. You can access the persistence records by selecting Persistence Records from the Statistics Type list in the Statistics screen. For information on accessing the Statistics screen, see Accessing statistics, on page 12-2. The persistence records screen consists of a persistence records table. This table contains the following information:

Local DNS Address The LDNS Address column displays the IP address of each LDNS that has sent a name resolution request for a wide IP for which the Global Traffic Manager is responsible. Level The Level column displays the level at which the persistent connection is based. Available types are wide IPs and distributed applications. Destination The Destination column displays the wide IP or distributed application to which the name resolution request was directed. Target Type The Target Type column displays the type of resource on which persistence is based. Examples of target types include data centers, servers, pools, and virtual servers. Target Name The Target Name column displays the name of the resource on which persistence is based. Expires The Expires column displays the time at which the persistence for the given LDNS request expires.

12 - 16

13
Collecting Metrics

Introducing metrics collection Defining metrics Assigning probes to local domain name systems Configuring TTL and timer values Excluding an LDNS from probes

Collecting Metrics

Introducing metrics collection


In Chapter 11, Configuring Monitors, we described how the Global Traffic Manager system uses specialized software components, called monitors, to capture data regarding the availability of a resource, such as a virtual server. Monitors represent one half of the statistical gathering capabilities of the Global Traffic Manager. The second half, metrics collection, captures data on how well network traffic flows between the Global Traffic Manager and the external local DNS servers and internal resources with which it communicates. The resources you make available to your users over the Internet are often critical to your organization; consequently, it is vital that these resources are not only available, but highly responsive to your users. Typically, two main criteria determine the responsiveness of a resource: hops and paths. A hop is one point-to-point transmission between a host and a client server in a network. A network path that includes a stop at a network router has two hops: the first from the client to the router, and the second from the router to the host server. A path is a logical network route between a data center server and an LDNS. It is important to remember that hops and paths can differ from each other widely on a per-connection basis. For example, an LDNS might take a long path to reach a specific resource, but require only a few hops to get there. On the other hand, that same LDNS might select a short path, yet have to move between a larger number of routers, increasing the number of hops it takes to reach the resource. It is up to you to determine what thresholds for hops and paths are acceptable for your network, as the needs of each network, and even each application within the same network, can vary widely. Through the metrics collection capabilities of the Global Traffic Manager, you can accomplish several tasks related to improving the availability and responsiveness of your network applications and resources. You can: Define the types of metrics that the Global Traffic Manager collects, and how long the system keeps those metrics before acquiring fresh data. Assign probes to local DNS servers that attempt to acquire the metrics information. Configure Time-to-Live (TTL) values for your metrics data. Exclude specific local DNS servers from Global Traffic Manager probes. Implement the Quality of Service load balancing mode, which uses metrics to determine the best resource for a particular name resolution request.

Configuration Guide for BIG-IP Global Traffic ManagerTM

13 - 1

Chapter 13

Defining metrics
When you decide to use the Global Traffic Manager to collect metrics on the local DNS servers that attempt to access your network resources, you can define the following characteristics: Types of metrics collected (either hops, paths, both, or disabled) Time-to-live (TTL) values for each metric Frequency at which the system updates the data Size of a packet sent (relevant for hop metrics only) Length of time that can pass before the system times out the collection attempt Number of packets sent for each collection attempt While each of these settings is important, the ones that perhaps require the most planning beforehand are the TTL values. In general, the lower the TTL value, the more often the Global Traffic Manager probes an LDNS. This improves the accuracy of the data, but increases bandwidth usage. Conversely, increasing the TTL value for a metric lowers the bandwidth your network uses, but increases the chance that the Global Traffic Manager is basing its load balancing operations off of stale data An additional consideration is the number of local DNS servers that the Global Traffic Manager queries. The more local DNS servers that the system queries, the more bandwidth is required to ensure those queries are successful. Therefore, setting the TTL values for metrics collection can require incremental fine-tuning. F5 Networks recommends that you periodically check the TTL values, and verify that they are appropriate for your network.

To define metrics
1. On the Main tab of the navigation pane, expand System and click Configuration. The General properties screen opens. 2. From the Global Traffic menu, choose Metrics Collection. The metrics collection screen opens. 3. In the Configuration area, assign values to the metrics-related settings. For detailed information about these settings, see the online help. 4. Click the Update button.

13 - 2

Collecting Metrics

Assigning probes to local domain name systems


To capture accurate metrics data from the local DNS servers that send name resolution requests to the Global Traffic Manager, you assign probes to each LDNS. A probe is a query that employs a specific methodology to learn more about an LDNS. You can assign one or more of the following probes to query local DNS servers:

DNS_REV The DNS_REV probe sends a DNS message to the probe target LDNS querying for a resource record of class IN, type PTR. Most versions of DNS answer with a record containing their fully-qualified domain name. The system makes these requests only to measure network latency and packet loss; it does not use the information contained in the responses. DNS_DOT The DNS.DOT probe sends a DNS message to the probe target LDNS querying for a dot (.). If the LDNS is not blocking queries from unknown addresses, it answers with a list of root nameservers. The system makes these requests only to measure network latency and packet loss; it does not use the information contained in the responses. UDP The UDP probe uses the user datagram protocol (UDP) to query the responsiveness of an LDNS. The UDP protocol provides simple but unreliable datagram services. The UDP protocol adds a checksum and additional process-to-process addressing information. UDP is a connectionless protocol which, like TCP, is layered on top of IP. UDP neither guarantees delivery nor requires a connection. As a result, it is lightweight and efficient, but the application program must take care of all error processing and retransmission. TCP The TCP probe uses the transmission control protocol (TCP) to query the responsiveness of an LDNS. The TCP protocol is the most common transport layer protocol used on Ethernet and Internet. The TCP protocol adds reliable communication, flow-control, multiplexing, and connection-oriented communication. It provides full-duplex, process-to-process connections. TCP is connection-oriented and stream-oriented. ICMP The ICMP probe uses the Internet control message protocol (ICMP) to query the responsiveness of an LDNS. The ICMP protocol is an extension to the Internet Protocol (IP). The ICMP protocol generates error messages, test packets, and informational messages related to IP.

With these probes, it does not matter whether the Global Traffic Manager receives a valid response, such as the name of the LDNS as queried by the DNS_REV probe, or a request refused statement. The relevant information is the metrics generated between the probe request and the response. For example, the Global Traffic Manager uses the DNS_REV probe to query
Configuration Guide for BIG-IP Global Traffic ManagerTM

13 - 3

Chapter 13

two local DNS servers. The first LDNS responds to the probe with its name, as per the request. The second LDNS, however, responds with a request refused statement, because it is configured to not allow such requests. In both cases, the probe was successful, because the Global Traffic Manager was able to acquire data on how long it took for both local DNS servers to respond to the probe. You can configure the Global Traffic Manager to use a select number of probes, or you can assign all five. The more probes that the Global Traffic Manager uses, the more bandwidth is required.

To assign a probe
1. On the Main tab of the navigation pane, expand System and click Configuration. The General screen opens. 2. From the Global Traffic menu, choose Metrics Collection. The metrics collection screen opens. 3. In the Local DNS (LDNS) area, use the options provided in the Metrics Collection Protocol option to assign the relevant probes. 4. In the Metrics Caching box, define the number of seconds for which the Global Traffic Manager keeps the collected metrics data. This value determines how often the system probes a given LDNS. The default value is 3600 seconds, or one hour. 5. In the Inactive Local DNS TTL box, define the number of seconds for which an LDNS can be inactive before the Global Traffic Manager considers it inactive. The Global Traffic Manager stops probing local DNS servers that are considered inactive. The default value is 2419200, or 28 days. 6. Click the Update button to save your changes.

13 - 4

Collecting Metrics

Configuring TTL and timer values


Each resource in the Global Traffic Manager has an associated time-to-live (TTL) value. A TTL is the amount of time (measured in seconds) for which the system considers metrics valid. The timer values determine how often the Global Traffic Manager refreshes the information. Table 13.1 describes each TTL value, as well as its default setting.
Parameter Description Default number of seconds 604800 (seven days) 2400 604800 (seven days) 2419200 (28 days)

Hops TTL

Specifies how often the Global Traffic Manager probes hops.

Paths TTL Inactive Path TTL

Specifies how often the Global Traffic Manager probes paths. Specifies the number of seconds that a path remains in the cache after its last access. Specifies the number of seconds that an LDNS remains in the cache after its last access.

Inactive Local DNS TTL

Table 13.1 TTL values and default settings

Each resource also has a timer value. A timer value defines the frequency (measured in seconds) at which the Global Traffic Manager refreshes the metrics information it collects. In most cases, the default values for the TTL and timer parameters are adequate. However, if you make changes to any TTL or timer values, keep in mind that an objects TTL value must be greater than its timer value. Table 13.2 describes each timer value, as well as its default setting.
Parameter Metrics Caching Description Specifies the interval (in seconds) at which the Global Traffic Manager archives the paths and metrics data. This setting is available in the Local DNS (LDNS) section at the bottom of the Configuration: Global Traffic: Metrics Collection screen. Paths retry Specifies how long (in seconds) the BIG-IP system waits before attempting another probe, if a previous probe failed. Specifies the number of seconds that the big3d agent waits for a probe. 120 Default 3600

Timeout

Table 13.2 Time values and default settings

Configuration Guide for BIG-IP Global Traffic ManagerTM

13 - 5

Chapter 13

To configure global TTL and timer values


1. On the Main tab of the navigation pane, expand System and click Configuration. The General screen opens. 2. From the Global Traffic menu, choose Metrics Collection. The metrics collection screen opens. 3. Add the TTL and timer values settings. For help on configuring the TTL and timer values settings, see the online help. 4. Click the Update button to save your changes.

Excluding an LDNS from probes


When the Global Traffic Manager attempts to probe an LDNS, it is actively attempting to acquire data from that LDNS. Certain Internet Service Providers and other organizations might request that you do not probe their local DNS servers, while other local DNS servers might be known to act as proxies, which do not provide accurate metrics data. In these situations, you can configure the Global Traffic Manager to exclude local DNS servers from probes. When you exclude an LDNS, the Global Traffic Manager does not probe that server; however, the Global Traffic Manager is also unable to use the Quality of Service load balancing mode to load balance name resolution requests from that LDNS.

To exclude an LDNS from probes


1. On the Main tab of the navigation pane, expand System and click Configuration. The General screen opens. 2. From the Global Traffic menu, choose Metrics Collection. The metrics collection screen opens. 3. In the Address Exclusions area, in the IP Subnet box, type the IP address and subnet that contains the local DNS servers you want to exclude. 4. Click the Add button to add the LDNS or network segment to the address exclusion list. 5. Click the Update button to save your changes.

13 - 6

Collecting Metrics

Removing an LDNS from the address exclusion list


You can remove an LDNS from the address exclusion list at any time. Situations in which you want to remove an LDNS include the LDNS becoming inactive, or the IP address of the LDNS changing to a different network subnet.

To remove an LDNS from the address exclusion list


1. On the Main tab of the navigation pane, expand System and click Configuration. The General screen opens. 2. From the Global Traffic menu, choose Metrics Collection. The metrics collection screen opens. 3. In the Address Exclusions area, select from the list, the LDNS that you want to remove and click Remove. 4. Click the Update button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

13 - 7

Chapter 13

13 - 8

14
Viewing Performance Data

Introducing performance data graphs Viewing performance data

Viewing Performance Data

Introducing performance data graphs


Chapter 13, Collecting Metrics, describes how the Global Traffic Manager captures data on how network traffic flows between the Global Traffic Manager and the external local DNS servers and internal resources with which it communicates. You can view graphs that display information about how the Global Traffic Manager is performing. You can use this information to help you determine how to modify the configuration to obtain the best possible performance from the system.

Viewing performance data


The Global Traffic Manager provides two types of performance data graphs on the performance screen: the GTM Performance and GTM Request Breakdown graphs. You can view detailed versions of each graph by clicking the View Detailed Graph link.

About the GTM Performance graph


The GTM Performance graph shows the throughput of the Global Traffic Manager. The graph includes the following data: GTM Requests Represents the number of incoming DNS requests. GTM Resolutions Represents the number of incoming DNS requests that were resolved by any method. GTM Resolutions Persisted Represents the number of incoming DNS requests that were resolved by a persistence record. GTM Resolutions Returned to DNS Represents the number of incoming DNS requests that were not resolved by the Global Traffic Manager, but were instead passed on to the DNS server for resolution.

About the GTM Request Breakdown graph


The GTM Request Breakdown graph includes the following data: GTM Type A - IPv4 Requests Represents IPv4-formatted requests. GTM Type AAAA/A6 - IPv6 Requests Represents IPv6-formatted requests.

Configuration Guide for BIG-IP Global Traffic ManagerTM

14 - 1

Chapter 14

To view performance data


1. On the Main tab of the navigation pane, expand Overview and then click Performance. The Performance screen opens. 2. On the menu bar, click Global Traffic. The Performance screen displays the global traffic management Graphs. 3. From the Graph Interval list, select the time period for which you want to view performance data. 4. Click the Refresh button to update the graphs. 5. Click the View Detailed Graph links to view the detailed graphs.

14 - 2

15
Managing iRules

Introducing iRules for the Global Traffic Manager Creating iRules Assigning iRules Controlling iRule evaluation Using statement commands Using wide IP commands Using utility commands Using protocol commands Removing iRules

Managing iRules

Introducing iRules for the Global Traffic Manager


As you work with the Global Traffic Manager, you might find that you want to incorporate additional customizations beyond the available features associated with load balancing, monitors, or other aspects of your traffic management. For example, you might want to have the system respond to a name resolution request with a specific CNAME record, but only when the request is for a particular wide IP and originates from Europe. In the Global Traffic Manager, these customizations are defined through iRules. iRules are code snippets that are based on TCL 8.4. These snippets allow you a great deal of flexibility in managing your global network traffic. If you are familiar with the Local Traffic Manager, you might already be aware of and use iRules to manage your network traffic on a local level. The iRules in the Global Traffic Manager share a similar syntax with their Local Traffic Manager counterparts, but support a different set of events and objects. Due to the dynamic nature of iRules development, the following sections focus on providing an overview of iRule operations and describe the events and command specific to the Global Traffic Manager. For additional information on how to write iRules, visit the F5 DevCentral web site: http://devcentral.f5.com. At this site, you can learn more about iRules development, as well as discuss iRules functionality with others.

What is an iRule?
An iRule is a script that you write if you want individual connections to target a pool other than the default pool defined for a virtual server. iRules allow you to more directly specify the pools to which you want traffic to be directed. Using iRules, you can send traffic not only to pools, but also to individual pool members or hosts. The iRules you create can be simple or sophisticated, depending on your content-switching needs. Figure 15.1 shows an example of a simple iRule.
when DNS_REQUEST { if { [IP::addr [IP::client_addr] equals 10.10.10.10] } { pool my_pool } }

Figure 15.1 Example of an iRule This iRule is triggered when a DNS request has been detected, causing the Global Traffic Manager to send the packet to the pool my_pool, if the IP address of the local DNS making the request matches 10.10.10.10. iRules can direct traffic not only to specific pools, but also to individual pool members, including port numbers and URI paths, either to implement persistence or to meet specific load balancing requirements.

Configuration Guide for BIG-IP Global Traffic ManagerTM

15 - 1

Chapter 15

The syntax that you use to write iRules is based on the Tool Command Language (Tcl) programming standard. Thus, you can use many of the standard Tcl commands, plus a set of extensions that the Global Traffic Manager provides to help you further increase load balancing efficiency. For information about standard Tcl syntax, see the Tcl Reference Manual at http://tmml.sourceforge.net/doc/tcl/index.html.

Creating iRules
You can create an iRule using the Configuration utility.

To create an iRule
1. On the Main tab of the navigation pane, expand Global Traffic and click iRules. The iRules screen opens. 2. Click the Create button. 3. In the Name box, type a 1- to 31-character name. 4. In the Definition box, type the syntax for your iRule. 5. If you want to expand the length of the Definition box, check Extend Text Area. Also, if you want the contents of the iRule to wrap within the box, check Wrap Text. 6. Click the Finished button to save your changes.

For detailed syntax information on writing iRules, see pages 15-4 through 15-9.

15 - 2

Managing iRules

Assigning iRules
Within the Global Traffic Manager, you assign iRules to the wide IPs in your network configuration.

To assign an iRule
1. On the Main tab of the navigation pane, expand Global Traffic and then click Wide IPs. The main screen for wide IPs opens. 2. Click the name of the wide IP to which you want to assign an iRule. The properties screen for the wide IP opens. 3. On the menu bar, click iRules. The main iRules screen for the wide IP opens. 4. Click the Manage button. The Manage iRules screen opens. 5. From the iRule list, select an appropriate iRule. 6. Click the Add button. The new rule appears in the list of assigned iRules. 7. Click the Finished button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

15 - 3

Chapter 15

Controlling iRule evaluation


In a basic system configuration where no iRule exists, the Global Traffic Manager directs incoming traffic to the default pool assigned to the wide IP that receives that traffic based on the assigned load balancing modes. However, you might want the Global Traffic Manager to direct certain kinds of connections to other destinations. The way to do this is to write an iRule that directs traffic to that other destination, contingent on a certain type of event occurring. Otherwise, traffic continues to go to the default pool assigned to the wide IP. iRules are therefore evaluated whenever an event occurs that you have specified in the iRule. For example, if an iRule includes the event declaration DNS_REQUEST, then the iRule is triggered whenever the Global Traffic Manager receives a name resolution request. The Global Traffic Manager then follows the directions in the remainder of the iRule to determine the destination of the packet.

Specifying events
The iRules feature includes several types of event declarations that you can make in an iRule. Specifying an event declaration determines when the Global Traffic Manager evaluates the iRule. The following sections list and describe these event types. Also described is the concept of iRule context and the use of the when keyword.

Event types
The event declarations that you can make in an iRule are listed in Table 15.1.
iRule Event DNS_REQUEST LB_SELECTED LB_FAILED Description Triggered when a DNS request is received from a client. Triggered when the Global Traffic Manager has selected a target node. Triggered when a connection to the server was unable to complete. This might occur if the pool has no available members or a selected pool member is otherwise not available. Triggered when an iRule that contains the RULE_INIT event is changed, or when the gtmd utility restarts. Note that only the following commands are valid with this event: whoami, whereami, crc32, findstr, log, substr, and whereis.

RULE_INIT

Table 15.1 Event declarations for iRules

15 - 4

Managing iRules

Using the when keyword


You make an event declaration in an iRule by using the when keyword, followed by the event name. For example:
when DNS_REQUEST { iRule details... }

Listing iRules on wide IPs


When you assign multiple iRules as resources for a wide IP, it is important to consider the order in which you list them on the wide IP. This is because the Global Traffic Manager processes duplicate iRule events in the order that the applicable iRules are listed. An iRule event can therefore terminate the triggering of events, thus preventing the Global Traffic Manager from triggering subsequent events.

To organize the list of iRules


1. On the Main tab of the navigation pane, expand Global Traffic and then click Wide IPs. The main screen for wide IPs opens. 2. Click the name of the wide IP to which you want to assign an iRule. The properties screen for the wide IP opens. 3. On the menu bar, click iRules. The main iRules screen for the wide IP opens. 4. Click the Manage button. The Manage iRules screen opens. 5. Click the name of an assigned iRule and then use either the Up button to move the iRule up one position, or the Down button to move the iRule down one position. 6. Click the Finished button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

15 - 5

Chapter 15

Using statement commands


Some of the commands available for use within iRules are known as statement commands. Statement commands enable the Global Traffic Manager to perform a variety of different actions. For example, some of these commands specify the pools or servers to which you want the Global Traffic Manager to direct traffic. Table 15.2 lists and describes statement commands that you can use within iRules.
Statement Command discard Description Causes the current packet or connection (depending on the context of the event) to be discarded. This statement must be conditionally associated with an if statement. Same as the discard command. Causes the server host, as identified by a string, to be used directly, thus bypassing any load balancing. Asks a true or false question and, depending on the answer, takes some action. Note that the maximum number of if statements that you can nest in an iRule is 100.

drop [use] host <string>

if { <expression> } { <statement_command> } elseif { <expression> } { <statement_command> } log [<facility>.<level>] <message> [use] host <addr> [<port>]

Generates and logs the specified message to the Syslog facility. Causes the server host, as identified by IP address and, optionally, port number, to be used directly, thus bypassing any load balancing. Causes the Global Traffic Manager to load balance traffic to the named pool. This statement must be conditionally associated with an if statement. Optionally, you can specify a specific pool member to which you want to direct the traffic. Causes the connection to be rejected, returning a reset as appropriate for the protocol. Terminates running of the iRule event.

[use] pool <pool_name> [member <addr> [<port>]]

reject

return

Table 15.2 iRule statement commands

15 - 6

Managing iRules

Using wide IP commands


The Global Traffic Manager supports several iRule commands that are unique to its global traffic management capabilities. These commands can specify a specific CNAME or wide IP name, or determine the geographic origin of the request. Table 15.3 lists and describes wide IP commands that you can use within iRules.
Statement Command cname <cname> persist [enable | disable] Description Returns the <cname> referenced. Returns the persistence state value, when enabled. If you specify arguments, returns the previous state value. Returns the number of pools or a list of pools in the wide IP that are in the specified state. If you do not specify a state, returns all pools. Overrides the default time-to-live value. If this command is used for a CNAME, the value overrides the default of 0. If this command is used for a pool, the value overrides the time-to-live value for that pool. Returns the geographic location of the specified IP address. The default geolocation database (GeoPoint by Quova), includes data for IPv4 addresses at the continent, country, state, ISP, and organization levels, and for IPv6 addresses at the continent and country levels. Note that you can access the ISP and organization-level geolocation data for IPv4 addresses only using the iRules whereis command. If you do not specify keywords, the command returns continent, country, state, and city data with curly braces in place of the value of any of these parameters for which data is not available. The following definitions are useful if you are using a database that provides additional geolocation data: abbrev The abbreviation of the name of a state or region. org The name of an organization. country_cf, state_cf, and city_cf The confidence level, as a percentage, for the accuracy of the country, state, and city data. proxy_type The type of connection. The options are unknown, anonymizer, aoldialup, aolpop, aolproxy, cache proxy, fixed, international proxy, mobile gateway, none, pop, regional proxy, satellite, and superpop. wideip name Returns the wide IP name requested.

pools [-list] [blue | green | yellow | red | gray]

ttl <value>

whereis <ip_addr> [ [continent] | [country] | [state] | [abbrev] | [city] | [zip] | [area_code] | [latitude] | [longitude] | [isp] | [org] | [country_cf] | [state_cf] | [city_cf] | [proxy_type] ]

Table 15.3 iRule wide IP commands

Configuration Guide for BIG-IP Global Traffic ManagerTM

15 - 7

Chapter 15

Using utility commands


The Global Traffic Manager includes a number of utility commands that you can use within iRules. You can use these commands to parse and retrieve content, verify data integrity, and retrieve information about active pools and pool members.

Parsing and manipulating content


Table 15.4 lists and describes the commands that return a string that you specify. The pages following the table provide detail and examples of the commands.
Command findstr Description Finds a string within another string and returns the string starting at the offset specified from the match. Finds a string within another string and returns the string starting at the offset specified from the match. Finds the member of a data group that contains the result of the specified expression, and returns that data group member or the portion following the separator, if a separator was provided. Searches for a specific host name within the supplied <string>.

substr

findclass

host

Table 15.4 Utility commands that parse and manipulate content

Ensuring data integrity


Some of the commands available for use within iRules allow you to check the integrity of data. Table 15.5 lists and describes these commands.
Utility Command crc32 <string>

Description Returns the crc32 checksum for the provided string, or if an error occurs, an empty string. Used to ensure data integrity. Returns the RSA Data Security, Inc. MD5 Message Digest Algorithm (md5) message digest of the provided string, or if an error occurs, an empty string. Used to ensure data integrity.

md5 <string>

Table 15.5 Utility commands for ensuring data integrity

15 - 8

Managing iRules

Retrieving resource information


The iRules commands listed in Table 15.6 allow you to retrieve data about the Global Traffic Manager, data centers, servers, pools, and pool members.
Utility Command active_members <pool name> LB::server [<pool | name | address | <port>] LB::status [<up | down | session enabled | session disabled>] LB::status pool <name> member <address> [<port> <up | down | session enabled | session disabled>] LB::status vs <ip> <port> [<up | down | session enabled | session disabled>] member_priority <pool name> member <ip> [<port>] members [-list] <pool name> [blue | green | yellow | red | gray] nodes_up [<virtual server name> | <ip address/port>] Description Returns the number of active members in the pool. Returns the name of the server selected for a load balancing operation.

Returns the status of the selected resource.

Returns the status of the selected pool.

Returns the status of the selected virtual server.

Returns the priority for pool member ip:port.

Returns the number or list of pool members in the specified pool that are in the specified state. If you do not specify a state, returns all pool members. Returns the number of up nodes behind a virtual server. Local Traffic Manager virtual servers can have a pool with multiple nodes. If there is not a monitor on the Local Traffic Manager side, the server is blue. However, the Global Traffic Manager interprets this blue virtual server as green, and the nodes_up value is 1. Returns the number of seconds the local Global Traffic Manager has been up. Returns the datacenter name for the local Global Traffic Manager. Returns the server name for the local Global Traffic Manager.

uptime whereami whoami

Table 15.6 Utility commands for retrieving resource information

Using protocol commands


The Global Traffic Manager includes a number of protocol commands that you can use within iRules. You can use these commands to identify IP addresses and ports of both the clients and servers for a given name resolution transaction.

Configuration Guide for BIG-IP Global Traffic ManagerTM

15 - 9

Chapter 15

IP commands
The Global Traffic Manager supports the following IP commands.
Protocol Command IP::remote_addr Description Returns the IP address of the client for a given name resolution request. Equivalent to IP::client_addr. Returns the IP address of the server for a given name resolution request. Equivalent to IP::server_addr. Returns the IP address of the client for a given name resolution request. Equivalent to IP::remote_addr. Returns the IP address of the server for a given name resolution request. Equivalent to IP::local_addr. Returns the IP protocol value, such as TCP or UDP.

IP::local_addr

IP::client_addr

IP::server_addr

IP::protocol

Table 15.7 IP commands for iRules

TCP commands
The Global Traffic Manager supports the following TCP commands.
Protocol Command TCP::client_port TCP::server_port Description Returns the clients TCP port/service number. Returns the servers TCP port/service number.

Table 15.8 TCP commands for iRules

UDP commands
The Global Traffic Manager supports the following UDP commands.
Protocol Command UDP::client_port UDP::server_port Description Returns the clients UDP port/service number. Returns the servers UDP port/service number.

Table 15.9 UDP commands for iRules

15 - 10

Managing iRules

Removing iRules
Within the Global Traffic Manager, you can remove an iRule from a wide IP at any time.

To remove an iRule
1. On the Main tab of the navigation pane, expand Global Traffic and then click Wide IPs. The main screen for wide IPs opens. 2. Click the name of the wide IP to which you want to assign an iRule. The properties screen for the wide IP opens. 3. On the menu bar, click iRules. The main iRules screen for the wide IP opens. 4. Click the Manage button The Manage iRules screen opens. 5. Select the iRule that you want to remove, and then click Remove. 6. Click the Finished button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

15 - 11

Chapter 15

15 - 12

16
Managing DNS Files with ZoneRunner

Introducing ZoneRunner Working with zone files Working with resource records Working with views Managing the named.conf file

Managing DNS Files with ZoneRunner

Introducing ZoneRunner
One of the modes in which you can operate the Global Traffic Manager system is the node mode. In node mode, the Global Traffic Manager is responsible not only for load balancing name resolution requests and monitoring the health of your physical and logical network; it is also responsible for maintaining the DNS zone files that map name resolution requests to the appropriate network resource. In the Global Traffic Manager, you create, manage, and maintain DNS files using the ZoneRunner utility. The ZoneRunner utility is a zone file management utility that can manage both DNS zone files and your BIND configuration. With the ZoneRunner utility, you can: Manage the DNS zones and zone files for your network, including importing and transferring zone files Manage the resource records for those zones Manage views (a BIND 9 feature) Manage a local nameserver and its configuration file, named.conf

Working with DNS and BIND


The ZoneRunner utility is an advanced feature of the Global Traffic Manager. F5 Networks highly recommends that you become familiar with the various aspects of BIND and DNS before you use this feature. For in-depth information, see the following resources: DNS and BIND, 4th edition, Paul Albitz and Cricket Liu The IETF DNS documents, RFC 1034 and RFC 1035 The Internet Systems Consortium web site, http://www.isc.org/index.pl?/sw/bind/

Understanding ZoneRunner tasks


When you use the ZoneRunner utility to manage your DNS zones and resource records, you can accomplish several tasks, including: Configure a zone Configure the resource records that make up the zone Configure a view, for access control Configure options in the named.conf file
Note

In the Configuration utility, you must configure a zone before you configure any other objects in the ZoneRunner utility. The remainder of this chapter discusses these tasks in detail.

Configuration Guide for BIG-IP Global Traffic ManagerTM

16 - 1

Chapter 16

Working with zone files


With the ZoneRunner utility, you can create, modify, and delete zone files. Additionally, you can transfer zone files to another nameserver, or import zone files from another nameserver. A zone file contains resource records and directives that describe the characteristics and hosts of a zone, otherwise known as a domain or sub-domain.

Types of zone files


There are five types of zone files. Each type has its own content requirements and role in the DNS. The types of zones are:

Primary (Master) Zone files for a primary zone contain, at minimum, the start of authority (SOA) and nameserver (NS) resource records for the zone. Primary zones are authoritative, that is, they respond to DNS queries for the domain or sub-domain. A zone can have only one SOA record, and must have at least one NS record. Secondary (Slave) Zone files for a secondary zone are copies of the principal zone files. At an interval specified in the SOA record, secondary zones query the primary zone to check for and obtain updated zone data. A secondary zone responds authoritatively for the zone as long as the zone data is valid. Stub Stub zones are similar to secondary zones, except that stub zones contain only the NS records for the zone. Note that stub zones are a specific feature of the BIND implementation of DNS. F5 Networks recommends that you use stub zones only if you have a specific requirement for this functionality. Forward The zone file for a forwarding zone contains only information to forward DNS queries to another nameserver on a per-zone (or per-domain) basis. Hint The zone file for a hint zone specifies an initial set of root nameservers for the zone. Whenever the local nameserver starts, it queries a root nameserver in the hint zone file to obtain the most recent list of root nameservers.

16 - 2

Managing DNS Files with ZoneRunner

Creating zone files


You can use the ZoneRunner utility to create any of the zone types described in the previous section. You can use the following procedure to create any type of zone. You choose the type of zone that you want to create in step 6.

To create a zone
1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click Zone List. The Zone List screen opens. 3. Click the Create button. The New Zone screen opens. 4. From the View Name list, select a view with which to associate the new zone. 5. In the Zone Name box, type a fully-qualified domain name for the zone. Note: Do not forget the trailing dot ( . ) at the end of the name. 6. From the Zone Type list, select the type of zone that you are configuring. The screen refreshes to display the configuration settings for the zone type.

Each zone type has unique characteristics. The following sections describe how to create each zone type.

Creating a primary zone


Primary zones have many components. When you create a primary zone, you create a zone file, an SOA record, and an initial NS record. You can also create a reverse zone and its corresponding reverse zone file.

To create a primary zone configuration


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click Zone List. The Zone List screen opens. 3. Click the Create button. The New Zone screen opens. 4. From the View Name list, select the view with which you want to associate the zone.

Configuration Guide for BIG-IP Global Traffic ManagerTM

16 - 3

Chapter 16

5. In the Zone Name box, type a name for the zone. 6. From the Zone Type list, select Master. The screen refreshes to display the configuration options and records creation options for a primary zone. 7. From the Records Creation Method list, select Manual. The configuration options in the Records Creation section in the following procedure change, depending on the record creation method that you select in this step. Note: The Records Creation Method list has two additional options: Load From File and Transfer from Server. These options are discussed in Importing zone files, on page 16-7. 8. In the Zone File Name box, type the name you want to use for the zone file. 9. In the Options box, you can type any additional statements that the zone requires. Do not delete the allow-update statement as the system needs this to maintain compatibility with the wide IP information. Important: Use caution when typing in the Options box. The system writes any changes you make directly to the named.conf file. For information on available options and syntax, refer to the BIND documentation mentioned at the beginning of this chapter. 10. Check the Create Reverse Zone box to specify that the system creates a reverse zone for this zone. 11. In the Reverse Zone Name box, type a name for the reverse zone, and then select whether the reverse zone applies to IPv4 or IPv6 networks. 12. In the Reverse Zone File Name box, type the name you want to use for the reverse zone file. 13. In the SOA Record section, supply the relevant configuration for the Start of Authority (SOA) record associated with this zone. 14. In the NS Record section, supply the information for the first nameserver associated with this zone. See Creating NS resource records, on page 16-18 for more information. 15. Click the Finished button to save your changes.

Creating a secondary zone


Secondary zones are essentially copies of primary zones. Secondary zones can respond to DNS queries, which significantly reduces the possibility that a query goes unanswered. Secondary zones regularly poll primary zones to get up-to-date zone information.

16 - 4

Managing DNS Files with ZoneRunner

To create a secondary zone


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click Zone List. The Zone List screen opens. 3. Click the Create button. The New Zone screen opens. 4. From the View Name list, select the view with which you want to associate the zone. 5. In the Zone Name box, type a name for the zone. 6. From the Zone Type list, select Slave. The screen refreshes to display the configuration options for a secondary zone. 7. In the Zone File Name box, type the name you want to use for the zone file. 8. In the Options box, you can type any additional statements that the zone requires. Do not delete the allow-update statement as the system needs this to maintain compatibility with the wide IP information. Important: Use caution when typing in the Options box. The system writes any changes you make directly to the named.conf file. For information on available options and syntax, refer to the BIND documentation mentioned at the beginning of this chapter. 9. Click the Finished button to save your changes.

Creating a stub zone


Stub zones contain only the NS records for a zone and are a unique feature of the BIND implementation of DNS. As such, F5 Networks recommends that you carefully evaluate using stub zones in your configuration. Refer to the BIND documentation for additional information about stub zones.

To create a stub zone


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click Zone List. The Zone List screen opens. 3. Click the Create button. The New Zone screen opens. 4. From the View Name list, select the view with which you want to associate the zone.

Configuration Guide for BIG-IP Global Traffic ManagerTM

16 - 5

Chapter 16

5. In the Zone Name box, type a name for the zone. 6. From the Zone Type list, select Stub. The screen refreshes to display the configuration options for a stub zone. 7. In the Zone File Name box, type the name you want to use for the zone file. 8. In the Options box, you can type any additional statements that the zone requires. Do not delete the allow-update statement, as the system needs this to maintain compatibility with the wide IP information. Important: Use caution when typing in the Options box. The system writes any changes you make directly to the named.conf file. For information on available options and syntax, refer to the BIND documentation mentioned at the beginning of this chapter. 9. Click the Finished button to save your changes.

Creating a hint zone


Hint zones designate a subset of the root servers list. When the local nameserver starts (or restarts), the nameserver queries the root servers in the hint zone for the most current list of root servers.

To create a hint zone


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click Zone List. The Zone List screen opens. 3. Click the Create button. The New Zone screen opens. 4. From the View Name list, select the view with which you want to associate the zone. 5. In the Zone Name box, type a name for the zone. 6. From the Zone Type list, select Hint. The screen refreshes to display the configuration options for a hint zone. 7. Click the Finished button to save your changes.

Creating a forward zone


Forward zones provide forwarding information for a zone or a domain. When a query comes in that matches a forward zone, the ZoneRunner utility sends the query to the server specified in the forward zone, rather than returning the query to the requesting local DNS server.
16 - 6

Managing DNS Files with ZoneRunner

To create a forward zone


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click Zone List. The Zone List screen opens. 3. Click the Create button. The New Zone screen opens. 4. From the View Name list, select the view with which you want to associate the zone. 5. In the Zone Name box, type a name for the zone. 6. From the Zone Type list, select Forward. The screen refreshes to display the configuration options for a forward zone. 7. In the Options box, you can type any additional statements that the zone requires. Do not delete the forwarders statement as the system needs this to maintain compatibility with the wide IP information. Important: Exercise caution when typing in the Options box. The system writes any changes you make directly to the named.conf file. For information on available options and syntax, refer to the BIND documentation mentioned at the beginning of this chapter. 8. Click the Finished button to save your changes.

Importing zone files


Often, when you add the Global Traffic Manager to your network, you already have a DNS server that manages your zone files. Typically, the Global Traffic Manager can then become either a secondary server that provides backup DNS information in case your primary DNS server goes offline, or the primary DNS server. In either situation, you can use the ZoneRunner utility to import existing zone files into the Global Traffic Manager instead of re-creating them manually. It is important to note that you can import only primary zones files. Through the ZoneRunner utility, you can import zone files using one of two methods: Loading zones from a file Transferring zones from a server

Configuration Guide for BIG-IP Global Traffic ManagerTM

16 - 7

Chapter 16

Loading zones from a file


If you know where the zone files you want to import reside on your server, you can load these files directly into the Global Traffic Manager through the ZoneRunner utility. Once you load a zone file into the Global Traffic Manager, the ZoneRunner utility displays information about the zone and any of its resource records within the Configuration utility.
Important

You can load only primary zones files.

To load a zone from a file


1. On the Main tab, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click Zone List. The Zone List screen opens. 3. Click the Create button. The New Zone screen opens. 4. From the View Name list, select a view with which to associate the new zone. The default setting is external. 5. In the Zone Name box, type a fully-qualified domain name for the zone. 6. From the Zone Type list, select Master. 7. From the Records Creation Method, select Load From File. 8. In the Upload Records File box, located in the Records Creation section, type the path to the zone file. Alternatively, you can click the Browse button to navigate to the file. 9. Click the Finished button to save your changes.

16 - 8

Managing DNS Files with ZoneRunner

Transferring zones from servers


Instead of loading zones from a file, you have the option of transferring them from existing DNS server. This method is useful if the zone files you need reside at a remote location. Once you transfer a zone file into the Global Traffic Manager, the ZoneRunner utility displays information about the zone and any of its resource records within the Configuration utility. Before you can transfer zone files from another server, you must ensure that the you have configured the source server to allow transfers to the destination server. You typically accomplish this task using the allow-transfer option. See your DNS and BIND documentation for more information.
Important

You can transfer only primary zones files.

To transfer a zone from a server


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click Zone List. The Zone List screen opens. 3. Click the Create button. The New Zone screen opens. 4. From the View Name list, select a view with which to associate the new zone. The default setting is external. 5. In the Zone Name box, type a fully-qualified domain name for the zone. 6. From the Zone Type list, select Master. 7. From the Records Creation Method, select Transfer from Server. 8. In the Source Server box, located in the Records Creation section, type the path to DNS server. 9. Click the Finished button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

16 - 9

Chapter 16

Searching for a specific zone


When you want to modify a zone, you can locate that specific zone using the search feature. You can search by either the full or a partial name, or by resource record of the zone. This feature can be especially useful for companies with large networks that contain numerous zones. For more information about how the search feature works see Locating a component using the search feature, on page 2-6.

To search for a specific zone


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The main ZoneRunner screen opens. 2. In the Name or RDATA box, type the name or resource record of the zone that you want to modify. 3. Click the Search button. A list of zones that matches the criteria you entered displays. 4. Click the name of the zone that you want to modify. The properties screen for that zone opens. 5. Make changes to the zone properties as required. 6. Click the Update button to save your changes.

Modifying zones
You can use the ZoneRunner utility to modify zones on an as-needed basis. For example, you can increase or decrease the time-to-live (TTL) value for the zone, or change the master server for the zone. You can also add resource records to an existing zone file. For more information, see Working with resource records, on page 16-12.

To modify a zone
1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click Zone List. The main screen for the zone opens. 3. Click the name of the zone that you want to modify. The properties screen for the zone opens. 4. Modify the settings for the zone as needed. 5. Click the Update button to save your changes.

16 - 10

Managing DNS Files with ZoneRunner

Deleting zones
With the ZoneRunner utility, you can delete zones that either have become obsolete or are no longer relevant to the Global Traffic Manager due to a network configuration change. For example, you might adjust your nameservers, after which the Global Traffic Manager is no longer responsible for a specific zone.

To delete a zone
1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click Zone List. The main screen for the zone opens. 3. Click the Select box next to the zone name that you want to delete. 4. Click the Delete button. A confirmation screen opens. 5. Click the Delete button again to delete the zone.

Configuration Guide for BIG-IP Global Traffic ManagerTM

16 - 11

Chapter 16

Working with resource records


Resource records are the files that contain details about a zone. These resource records, in a hierarchical structure, make up the domain name system (DNS). Once you have created a zone, you can use the ZoneRunner utility to view, create, modify, and delete the resource records for that zone.
Note

Although case is preserved in names and data fields when loaded into the nameserver, comparisons and lookups in the nameserver database are not case-sensitive.

Types of resource records


This section describes the common resource records that the ZoneRunner utility supports. For information on additional resource record types, see DNS and BIND, 4th edition, Albitz and Liu. The types of resource records are:

SOA (Start of authority) The start of authority resource record, SOA, starts every zone file and indicates that a nameserver is the best source of information for a particular zone. The SOA record indicates that a nameserver is authoritative for a zone. There must be exactly one SOA record per zone. Unlike other resource records, you create a SOA record only when you create a new master zone file. A (Address) The Address record, or A record, lists the IP address for a given host name. The name field is the hosts name, and the address is the network interface address. There should be one A record for each IP address of the machine. AAAA (IPv6 Address) The IPv6 Address record, or AAAA record, lists the 128-bit IPv6 address for a given host name. CNAME (Canonical Name) The Canonical Name resource record, CNAME, specifies an alias or nickname for the official, or canonical, host name. This record must be the only one associated with the alias name. It is usually easier to supply one A record for a given address and use CNAME records to define alias host names for that address. DNAME (Delegation of Reverse Name) The Delegation of Reverse Name resource record, DNAME, specifies the reverse lookup of an IPv6 address. These records substitute the suffix of one domain name with another. The DNAME record instructs the Global Traffic Manager (or any DNS server) to build an alias that substitutes a portion of the requested IP address with the data stored in the DNAME record.

16 - 12

Managing DNS Files with ZoneRunner

HINFO (Host Information) The Host Information resource record, HINFO, contains information on the hardware and operating system relevant to the Global Traffic Manager (or other DNS). MX (Mail Exchanger) The Mail Exchange resource record, MX, defines the mail system(s) for a given domain. NS (Nameserver) The nameserver resource record, NS, defines the nameservers for a given domain, creating a delegation point and a subzone. The first name field specifies the zone that is served by the nameserver that is specified in the nameservers name field. Every zone needs at least one nameserver. PTR (Pointer) A name pointer resource record, PTR, associates a host name with a given IP address. These records are used for reverse name lookups. SRV (Service) The Service resource record, SRV, is a pointer that allows an alias for a given service to be redirected to another domain. For example, if the fictional company SiteRequest had an FTP archive hosted on archive.siterequest.com, the IT department can create an SRV record that allows an alias, ftp.siterequest.com to be redirected to archive.siterequest.com. TXT (Text) The Text resource record, TXT, allows you to supply any string of information, such as the location of a server or any other relevant information that you want available.

Creating resource records


You can use the ZoneRunner utility to create any of the resource record types described in Types of zone files, on page 16-2.

To create a resource record


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. Click the Create button. The New Resource Record screen opens. 3. From the View Name list, select a view with which to associate the new zone. 4. In the Zone Name box, select the zone with which this record is associated. 5. In the Name box, type the name for the resource record. 6. In the TTL box, type the time-to-live value for the record.

Configuration Guide for BIG-IP Global Traffic ManagerTM

16 - 13

Chapter 16

7. From the Type list, select the type of resource record that you are configuring. The screen refreshes to display the configuration settings for the resource record type. 8. Configure settings as needed. 9. Click the Finished button to save your changes.

Each resource record type has unique characteristics. The following sections describe how to create each resource record type, using the steps listed in this procedure, and specifying details for each record type.

Creating A resource records


The Address record, or A record, lists the IP address for a given host name.

To create an A record
1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. Click the Create button. The New Resource Record screen opens. 3. From the View Name list, select a view with which to associate the new zone. 4. In the Zone Name box, select the zone with which this record is associated. 5. In the Name box, type the name for the resource record. 6. In the TTL box, type the time-to-live value for the record. 7. From the Type list, select A. The screen refreshes to display the configuration options for an A resource record. 8. In the IP Address box, type the IP address for the A record. 9. If you want to create a reverse record that corresponds to this record, for the Create Reverse Record option, check the Enable box. 10. Click the Finished button to save your changes.

16 - 14

Managing DNS Files with ZoneRunner

Creating AAAA resource records


The IPv6 Address record, or AAAA record, is a record used for 128-bit IPv6 addresses.

To create an AAAA record


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. Click the Create button. The New Resource Record screen opens. 3. From the View Name list, select a view with which to associate the new zone. 4. In the Zone Name box, select the zone with which this record is associated. 5. In the Name box, type the name for the resource record. 6. In the TTL box, type the time-to-live value for the record. 7. From the Type list, select AAAA. The screen refreshes to display the configuration options for an AAAA resource record. 8. In the IP Address box, type the IP address for the AAAA record. 9. If you want to create a reverse record that corresponds to this record, for the Create Reverse Record option, check the Enable box. 10. Click the Finished button to save your changes.

Creating CNAME resource records


The Canonical Name resource record, CNAME, specifies an alias or nickname for the official, or canonical, host name.

To create a CNAME record


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. Click the Create button. The New Resource Record screen opens. 3. From the View Name list, select a view with which to associate the new zone. 4. In the Zone Name box, select the zone with which this record is associated. 5. In the Name box, type the name for the resource record. 6. In the TTL box, type the time-to-live value for the record.

Configuration Guide for BIG-IP Global Traffic ManagerTM

16 - 15

Chapter 16

7. From the Type list, select CNAME. The screen refreshes to display the configuration options for a CNAME resource record. 8. In the CNAME box, type the appropriate alias for the resource record. 9. Click the Finished button to save your changes.

Creating DNAME resource records


The Delegation of Reverse Name resource record, DNAME, specifies the reverse lookup of an IPv6 address.

To create a DNAME record


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. Click the Create button. The New Resource Record screen opens. 3. From the View Name list, select a view with which to associate the new zone. 4. In the Zone Name box, select the zone with which this record is associated. 5. In the Name box, type the name for the resource record. 6. In the TTL box, type the time-to-live value for the record. 7. From the Type list, select DNAME. The screen refreshes to display the configuration options for a DNAME resource record. 8. In the DNAME box, type the appropriate reverse name for the resource record. 9. Click the Finished button to save your changes.

16 - 16

Managing DNS Files with ZoneRunner

Creating HINFO resource records


The Host Information resource record, HINFO, contains information on the hardware and operating system relevant to the Global Traffic Manager (or other DNS).

To create an HINFO record


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. Click the Create button. The New Resource Record screen opens. 3. From the View Name list, select a view with which to associate the new zone. 4. In the Zone Name box, select the zone with which this record is associated. 5. In the Name box, type the name for the resource record. 6. In the TTL box, type the time-to-live value for the record. 7. From the Type list, select HINFO. The screen refreshes to display the configuration options for an HINFO resource record. 8. In the Hardware box, type the appropriate hardware information for the resource record. 9. In the OS box, type the appropriate operating system information for the resource record. 10. Click the Finished button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

16 - 17

Chapter 16

Creating MX resource records


The Mail Exchange resource record, MX, defines the mail system(s) for a given domain.

To create an MX record
1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. Click the Create button. The New Resource Record screen opens. 3. From the View Name list, select a view with which to associate the new zone. 4. In the Zone Name box, select the zone with which this record is associated. 5. In the Name box, type the name for the resource record. 6. In the TTL box, type the time-to-live value for the record. 7. From the Type list, select MX. The screen refreshes to display the configuration options for an MX resource record. 8. In the Preference box, type the preference for the mail server. Preference is a numeric value for the preference of this mail exchange host relevant to all other mail exchange hosts for the domain. Lower numbers indicate a higher preference, or priority. 9. In the Mail Server box, type the appropriate domain name for the mail server. 10. Click the Finished button to save your changes.

Creating NS resource records


The nameserver resource record, NS, defines the nameservers for a given domain, creating a delegation point and a subzone.

To create an NS record
1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. Click the Create button. The New Resource Record screen opens. 3. From the View Name list, select a view with which to associate the new zone. 4. In the Zone Name box, select the zone with which this record is associated.

16 - 18

Managing DNS Files with ZoneRunner

5. In the Name box, type the name for the resource record. 6. In the TTL box, type the time-to-live value for the record. 7. From the Type list, select NS. The screen refreshes to display the configuration options for an NS resource record. 8. In the Name Server box, type the appropriate domain name for the resource record. 9. Click the Finished button to save your changes.

Creating PTR resource records


A name pointer resource record, PTR, associates a host name with a given IP address. These records are used for reverse name lookups.

To create a PTR record


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. Click the Create button. The New Resource Record screen opens. 3. From the View Name list, select a view with which to associate the new zone. 4. In the Zone Name box, select the zone with which this record is associated. 5. In the Name box, type the name for the resource record. 6. In the TTL box, type the time-to-live value for the record. 7. From the Type list, select PTR. The screen refreshes to display the configuration options for a PTR resource record. 8. In the Domain box, type the appropriate domain name for the resource record. 9. Click the Finished button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

16 - 19

Chapter 16

Creating SRV resource records


The Service resource record, SRV, is a pointer that allows an alias for a given service to be redirected to another domain.

To create an SRV record


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. Click the Create button. The New Resource Record screen opens. 3. From the View Name list, select a view with which to associate the new zone. 4. In the Zone Name box, select the zone with which this record is associated. 5. In the Name box, type the name for the resource record. 6. In the TTL box, type the time-to-live value for the record. 7. From the Type list, select SRV. The screen refreshes to display the configuration options for an SRV resource record. 8. In the Priority box, type the appropriate priority level for this host. The lower the number in this box, the higher the priority level. 9. In the Weight box, type the proportion of requests that should be targeted at this server. This value is used when two hosts have the same priority. The higher the number in this box, the greater the weight. 10. In the Port box, type the port on which the service is running. 11. In the Target Server box, type the domain name of a host running the service on the port specified in the Port box. 12. Click the Finished button to save your changes.

16 - 20

Managing DNS Files with ZoneRunner

Creating TXT resource records


The Text resource record, TXT, allows you to supply any string of information, such as the location of a server or any other relevant information that you want available.

To create a TXT record


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. Click the Create button. The New Resource Record screen opens. 3. From the View Name list, select a view with which to associate the new zone. 4. In the Zone Name box, select the zone with which this record is associated. 5. In the Name box, type the name for the resource record. 6. In the TTL box, type the time-to-live value for the record. 7. From the Type list, select TXT. The screen refreshes to display the configuration options for a TXT resource record. 8. In the Text box, type the appropriate text for the resource record. 9. Click the Finished button to save your changes.

Modifying a resource record


If you decide you need to change the settings for a given resource record, you can modify it at any time.

To modify a resource record


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The ZoneRunner screen opens. 2. Click the name of the resource record that you want to modify. The properties screen for the resource record opens. 3. Modify the resource record as needed. 4. Click the Update button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

16 - 21

Chapter 16

Adding resource records to an existing zone file


In addition to creating a resource record through the ZoneRunner screen, you can create one when you modify an existing zone file.

To add a resource record to an existing zone file


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click Zone List. The Zone List screen opens. 3. Click the name of the zone to which you want to add a resource record. The properties screen for that zone opens. 4. Click the Add Resource Record button, located at the bottom of the screen. The New Resource Record screen opens, with the View Name and Zone Name options filled out to reflect the appropriate settings for the zone file. 5. Create the new resource record as needed. See Creating resource records, on page 16-13, for more information. 6. Click the Finished button to save your changes.

Working with views


One of the features available in BIND 9 is the addition of views to your DNS configuration. A view allows you to modify the nameserver configuration based on the community attempting to access it. For example, if your DNS handles requests from both inside and outside your company, you can create two views: internal and external. Through views, you can build nameserver configurations on the same server, and have those configurations apply dynamically when the request originates from a specified source. In the Global Traffic Manager, a single view is created automatically within the ZoneRunner utility: external. If you do not want to create views, all zones that the Global Traffic Manager maintains are associated with this default view. Through the ZoneRunner utility, you can: Add views Modify views Delete views

16 - 22

Managing DNS Files with ZoneRunner

Adding views
If you have a DNS that is accessed from multiple communities, you can create a view for each community. Depending on the community, the nameserver uses a different configuration for resolving name requests.

To add a view
1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click View List. The View List screen opens. 3. Click the Create button. The New View screen opens. 4. In the View Name box, type a name for the view. 5. From the View Order list, select where the view resides in the view hierarchy for the nameserver. 6. In the Options box, specify the criteria that determines when the DNS should use the zone files associated with this view. 7. Click the Finished button to save your changes.

Modifying views
As the needs change for the communities attempting to access the Global Traffic Manager as a DNS, you might need to modify your views. Through the ZoneRunner utility, you can modify a view at any time.

To modify a view
1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click View List. The View List screen opens. 3. Click the name of the view you want to modify. The properties screen for the view opens. 4. Modify the view settings as needed. Note that you cannot change the name of the view. 5. Click Update to apply your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

16 - 23

Chapter 16

Deleting views
If a view is no longer necessary for your name resolutions, you can delete it from the ZoneRunner utility.

To delete a view
1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click View List. The View List screen opens. 3. Click the Select box next to the name of the view that you want to delete. 4. Click the Delete button. A confirmation screen opens. 5. Click the Delete button again to delete the view.

Adding zones to views


Once you create a view, you can add zones to the view.

To add a zone to a view


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click View List. The View List screen opens. 3. Click the name of the view to which you want to add a zone. The properties screen for the view opens. 4. Click the Add Zone button. The New Zone screen opens. 5. Create the new zone as needed. See Creating zone files, on page 16-3, for more information on creating zone files. 6. Click the Update button to save your changes.

16 - 24

Managing DNS Files with ZoneRunner

Managing the named.conf file


You define the primary operational characteristics of BIND using a single file, named.conf. The functions defined in this file include views, access control list definitions, and zones. You can control most of the contents of the named.conf file through the ZoneRunner utility, as this utility updates the named.conf file to implement any modifications that you make. However, you can also use the ZoneRunner utility to edit the named.conf file directly.
Important

In the following procedure, we assume that you are fully familiar with the named.conf file and the syntax of its contents. Modifying the named.conf file carries a high level of risk, as a syntax error can prevent the entire BIND system from performing as expected. For this reason, F5 Networks recommends that you use the user interface of the ZoneRunner utility whenever possible, and that you exercise caution when editing the named.conf file.

To modify the named.conf file


1. On the Main tab of the navigation pane, expand Global Traffic and click ZoneRunner. The Resource Records List screen opens. 2. On the menu bar, click Named Configuration. The named.conf configuration screen opens. 3. Edit the contents of the named.conf file as needed: You can increase the size of the box containing the named.conf contents by checking Extend Text Area. You can have the contents of the named.conf file wrap to fit the box by checking Wrap Text. 4. Click the Update button to save your changes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

16 - 25

Chapter 16

16 - 26

A
Working with the big3d Agent

Introducing the big3d agent Collecting path data and server performance metrics Setting up communication between Global Traffic Manager systems and other servers

Working with the big3d Agent

Introducing the big3d agent


The big3d agent runs on all BIG-IP systems, collects performance information on behalf of the Global Traffic Manager system, and continually monitors the availability of the servers that the Global Traffic Manager load balances. The agent also monitors the integrity of the network paths between the servers that host the domain, and the various local DNS servers that attempt to connect to the domain. Each big3d agent broadcasts its collected data to all of the Global Traffic Manager systems and Link Controller systems in your network, ensuring that these systems work with the latest information. You can turn off the big3d agent on any BIG-IP system at any time; however, if you turn off the big3d agent on a server, the Global Traffic Manager can no longer check the availability of the server or its virtual servers, and the statistics screens display the status of these servers as unknown (blue ball).
Tip

F5 Networks recommends that you have at least one BIG-IP system running the big3d agent in each data center in your network. This ensures that the Global Traffic Manager has timely access to the metrics associated with network traffic.
Important

When you set up a Global Traffic Manager to communicate with other BIG-IP systems, you must use IP addresses that are defined within the default route domain on the BIG-IP system. IP addresses within the default route domain are the only addresses that can process Global Traffic Manager traffic. For more information about configuring route domains, see the TMOS Management Guide for BIG-IP systems.

Configuration Guide for BIG-IP Global Traffic ManagerTM

A-1

Appendix A

Collecting path data and server performance metrics


A big3d agent collects the following types of performance information that the system uses for load balancing. The big3d agent broadcasts this information to all Global Traffic Manager systems in your network.

Network path round trip time The big3d agent calculates the round trip time for the network path between the agents data center and the clients LDNS that is making the resolution request. The Global Traffic Manager uses round trip time to determine the best virtual server to answer the request when a pool uses a dynamic load balancing mode, such as Round Trip Time, or Quality of Service. Network path packet loss The big3d agent calculates the packet completion percentage for the network path between the agents data center and the clients LDNS that is making the resolution request. The Global Traffic Manager uses the packet completion rate to determine the best virtual server to answer the request when a wide IP or pool uses either the Completion Rate or the Quality of Service load balancing modes. Router hops along the network path The big3d agent calculates the number of intermediate system transitions (router hops) between the agents data center and the clients LDNS. The Global Traffic Manager uses hops to determine the best virtual server to answer the request when a pool uses the Hops or the Quality of Service load balancing modes. Server performance The big3d agent returns server metrics, such as the packet rate, for BIG-IP systems or SNMP-enabled hosts. The Global Traffic Manager uses packet rate to determine the best virtual server to answer the request when a pool uses the Packet Rate, KBPS, Least Connections, or Quality of Service load balancing modes. Virtual server availability and performance The big3d agent queries virtual servers to verify whether they are up and available to receive connections, and uses only those virtual servers that are up for load balancing. The big3d agent also determines the number of current connections to virtual servers that are defined on BIG-IP systems or SNMP-enabled hosts. The Global Traffic Manager uses the number of current connections to determine the best virtual server when a pool uses the Least Connections or VS Capacity load balancing mode.

A-2

Working with the big3d Agent

Setting up data collection with the big3d agent


Setting up the big3d agents involves the following tasks:

Installing big3d agents on BIG-IP systems Each new version of the Global Traffic Manager software includes the latest version of the big3d agent. You need to distribute that copy of the big3d agent to each BIG-IP system in the network. See the release notes provided with the Global Traffic Manager software for information about which versions of the BIG-IP software the current big3d agent supports. For details on installing the big3d agent, see Installing the big3d agent, following. Setting up communications between big3d agents and other systems Before the big3d agents can communicate with the Global Traffic Manager systems in the network, you need to configure the appropriate ports and tools to allow communication between the devices running the big3d agent and Global Traffic Manager systems in the network. These planning issues are discussed in Setting up communication between Global Traffic Manager systems and other servers, on page A-5.

Installing the big3d agent


The big3d agent is installed by running the big3d_install script. With the correct ports open, the Global Traffic Manager also automatically updates older big3d agents on the network. When you install the big3d agent, you must complete the following tasks: Install the Global Traffic Manager. Add the BIG-IP systems as servers to the Global Traffic Manager. Note that the IP address of the server you are adding must reside within the default route domain on the BIG-IP system. Exchange the appropriate web certificates between the Global Traffic Manager and other systems. Open ports 22 and 4353 between the Global Traffic Manager and the other BIG-IP systems.

Understanding the data collection and broadcasting sequence


The big3d agents collect and broadcast information on demand. The Global Traffic Manager in a synchronization group issues a data collection request to all big3d agents running in the network. In turn, the big3d agents collect the requested data, and then broadcast that data to all Global Traffic Manager systems running in the network.

Configuration Guide for BIG-IP Global Traffic ManagerTM

A-3

Appendix A

Evaluating big3d agent configuration trade-offs


You must run a big3d agent on each BIG-IP system in your network if you use dynamic load balancing modes (those that rely on path data). (For information about dynamic load balancing, see Chapter 7, Load Balancing with the Global Traffic Manager.) You must have a big3d agent running on at least one system in each data center to gather the necessary path metrics. The load on the big3d agents depends on the timer settings that you assign to the different types of data the big3d agents collect. The shorter the timers, the more frequently the big3d agent needs to refresh the data. While short timers guarantee that you always have valid data readily available for load balancing, they also increase the frequency of data collection. Another factor that can affect data collection is the number of client local DNS servers that make name resolution requests. The more local DNS servers that make resolution requests, the more path data that the big3d agents have to collect. While round trip time for a given path may vary constantly due to current network load, the number of hops along a network path between a data center and a specific LDNS does not often change. Consequently, you may want to set short timer settings for round trip time data so that it refreshes more often, but set high timer settings for hops data because it does not need to be refreshed often.

A-4

Working with the big3d Agent

Setting up communication between Global Traffic Manager systems and other servers
In order to copy big3d agents from a Global Traffic Manager to BIG-IP systems, the Global Traffic Manager must be able to communicate with these other systems. Specifically, every BIG-IP system, which you define as a server on the Global Traffic Manager, must have sufficient network privileges and configured routes to be able to probe the virtual servers that it hosts, as well as the virtual servers hosted by other servers defined on the Global Traffic Managers in a synchronization group. In the following configuration, every big3d agent that the Global Traffic Manager synchronization group recognizes must be able to probe the virtual server 10.1.0.1:80 via TCP.
server { // datacenter=DC1, #VS=1 name type box { address 10.1.0.1 unit_id 1 } monitor "http" vs { name address } } "Generic_VS1" 10.1.0.1:80 // http "Generic Host Server 1" generic

Setting up iQuery communications for the big3d agent


The iQuery protocol uses one of two ports to communicate between the big3d agents throughout the network and Global Traffic Manager systems. The ports used by iQuery traffic change, depending on whether the traffic is inbound from the big3d agent or outbound from the Global Traffic Manager. Table A.1 shows the protocols and ports for both inbound and outbound iQuery communications between Global Traffic Manager systems and big3d agents distributed in your network.
From GTM system big3d agent To big3d agent GTM system Protocol TCP TCP From Port >1023 4353 To Port 4353 >1023

Table A.1 Communication between big3d agents and Global Traffic Manager systems

Configuration Guide for BIG-IP Global Traffic ManagerTM

A-5

Appendix A

Table A.2 shows the protocols and corresponding ports used for iQuery communications between big3d agents and SNMP agents that run on host servers.
From big3d agent To host SNMP agent Protocol UDP From Port >1023 To Port 161 Purpose Ephemeral ports used to make SNMP queries for host statistics Ephemeral ports used to receive host statistics using SNMP

host SNMP agent

big3d agent

UDP

161

>1023

Table A.2 Communication between big3d agents and SNMP agents on hosts

Table A.3 shows the ports used for communications between big3d agents and virtual servers that are not hosted by a BIG-IP system.
From big3d agent To virtual server Protocol UDP From Port >1024 To Port Service Port Service Port Purpose Ephemeral ports used to monitor host virtual server Ephemeral ports used to monitor host virtual servers

big3d agent

virtual server

TCP

>1024

Table A.3 Communication between big3d agents and virtual servers not hosted by BIG-IP systems

Allowing iQuery communications to pass through firewalls


The payload information of an iQuery packet contains information that potentially requires network address translation when there is a firewall in the path between the big3d agent and the Global Traffic Manager. The firewall translates only the packet headers, not the payloads. The virtual server translation option resolves this issue. When you configure address translation for virtual servers, the iQuery packet stores the original IP address in the packet payload itself. When the packet passes through a firewall, the firewall translates the IP address in the packet header normally, but the IP address within the packet payload is preserved. The Global Traffic Manager reads the IP address out of the packet payload, rather than out of the packet header. For example, firewall separates the path between a BIG-IP system running a big3d agent, and the Global Traffic Manager. The packet addresses are translated at the firewall. However, addresses within the iQuery payload are not translated, and they arrive at the BIG-IP system in their original states.

A-6

Working with the big3d Agent

Communications between Global Traffic Manager systems, big3d agents, and local DNS servers
Table A.4 shows the protocols and ports that the big3d agent uses when collecting path data for local DNS servers.
From big3d big3d To LDNS LDNS Protocol ICMP TCP From Port N/A >1023 To Port N/A 53 Purpose Probe using ICMP pings Probe using TCP (Cisco routers: allow establish) Replies using TCP (Cisco routers: allow establish) Probe using UDP or traceroute utility Replies to ICMP, UDP pings, or traceroute probes Probe using DNS rev or DNS dot

LDNS

big3d

TCP

53

>1023

big3d LDNS

LDNS big3d

UDP ICMP

53 N/A

33434 N/A

big3d

LDNS

dns_rev dns_dot dns_rev dns_dot

>1023

53

LDNS

big3d

53

>1023

Replies to DNS rev or DNS dot probes

Table A.4 Communications between big3d agents and local DNS servers

Configuration Guide for BIG-IP Global Traffic ManagerTM

A-7

Appendix A

A-8

B
Understanding Probes

Introducing probes Understanding iQuery Determining probe responsibility Selecting a big3d agent Designating a specific server Managing LDNS probes Using log entries to tune probes

Understanding Probes

Introducing probes
When you install a Global Traffic Manager in a network, that system typically works within a larger group of BIG-IP products. These products include other Global Traffic Manager systems, Link Controller systems, and Local Traffic Manager systems. The Global Traffic Manager must be able to communicate with these other systems to maintain an accurate assessment of the health and availability of different network components. For example, the Global Traffic Manager must be able to acquire statistical data from resources that are managed by a Local Traffic Manager in a different data center. BIG-IP systems acquire this information through the use of probes. A probe is an action a BIG-IP system takes to acquire data from other network resources. Probes are an essential means by which the Global Traffic Manager tracks the health and availability of network resources; however, it is equally important that the responsibility for conducting probes be distributed across as many BIG-IP products as possible. This distribution ensures that no one system becomes overloaded with conducting probes, which can cause a decrease in performance in the other tasks for which a BIG-IP system is responsible. To distribute probe requests effectively across multiple BIG-IP systems, Global Traffic Manager systems employ several different technologies and methodologies, including: iQuery, which is the communication protocol used between Global Traffic Manager systems and the big3d agents that reside on other BIG-IP systems A selection methodology that determines which Global Traffic Manager is responsible for managing the probe request A selection methodology that determines which big3d agent actually conducts the probe One of the important concepts to remember when understanding how the Global Traffic Manager acquires network data is that the process consists of several tasks: A Global Traffic Manager is chosen to be responsible for the probe. The Global Traffic Manager delegates the probe to a big3d agent. The big3d agent conducts the probe. The big3d agent broadcasts the results of the probe, allowing all Global Traffic Manager systems to receive the information.

Configuration Guide for BIG-IP Global Traffic ManagerTM

B-1

Appendix B

Understanding iQuery
At the heart of probe management with Global Traffic Manager systems is iQuery, the communications protocol that these systems use to send information from one system to another. With iQuery, Global Traffic Manager systems in the same synchronization group can share configuration settings, assign probe requests to big3d agents, and receive data on the status of network resources. The iQuery protocol is an XML protocol that is sent between each system using gzip compression and SSL. These communications can only be allowed between systems that have a trusted relationship established, which is why configuration tools such as big3d_install, bigip_add, and gtm_add are critical when installing or updating Global Traffic Manager systems. If two systems have not exchanged their SSL certificates, they cannot share information with each other using iQuery. In addition to requiring trusted relationships, systems send iQuery communications only on the VLAN in which the system received the incoming message. Also, iQuery communications occur only within the same synchronization group. If your network consists of two synchronization groups, with each group sharing a subset of network resources, these groups both probe the network resources and communicate with iQuery separately. Generally, iQuery communications require no user intervention; however, on occasion it can be necessary to view the data transmitted between each system. For example, you might be troubleshooting the reason that a Global Traffic Manager is exhibiting a particular behavior. In such a situation, you can use the command, iqdump.

To use the iqdump command


1. Access the system prompt for the BIG-IP system. 2. Type iqdump <ip address> <synchronization group name>. The IP address that you type must be the IP address with which the system is communicating with iQuery. This IP address can be either the local system or a remote system. 3. Press Enter. Immediately, information the BIG-IP system has received through iQuery appears in the command window. Note that the data displayed represents only the information the system receives; it does not display the information the system has sent through iQuery.
Note

One of the first pieces of information the system displays when running iQuery is the version of the remote big3d agent. This allows you to determine if a system is running the latest version of the big3d agent.

B-2

Understanding Probes

Determining probe responsibility


When you assign a monitor to a network resource through the Configuration utility of the Global Traffic Manager, the first action is for a Global Traffic Manager to be responsible for ensuring that a big3d agent probes the selected resource. It is important to remember that this does not necessarily mean the selected Global Traffic Manager actually conducts the probe; it means only that a specific Global Traffic Manager is in charge of assigning a big3d agent to probe the resource. The big3d agent can be installed on the same system as the Global Traffic Manager, a different Global Traffic Manager, or the big3d agent on another BIG-IP system. A crucial component to determining which system manages a probe request is the data centers that you defined in the Global Traffic Manager configuration. For each probe, the Global Traffic Manager systems determine the following: Is there a Global Traffic Manager in the same data center as the resource? Is there more than one Global Traffic Manager at that data center? By default, Global Traffic Manager systems delegate probe management to a system that belongs to the same data center as the resource, since the close proximity of system and resource improves probe response time. To illustrate how these considerations factor into probe management, consider a fictional company, SiteRequest. This company has three data centers: one in Los Angeles, one in New York, and one in London. The following table lists a few characteristics of each data center.
Data Center Los Angeles Characteristics Two Global Traffic Manager systems, configured as a redundant system A single Global Traffic Manager Resources only; no Global Traffic Manager systems

New York London

Table B.1 Characteristics of the data centers at SiteRequest

Now, consider that you want to acquire statistical data from a resource in the New York data center. First, the Global Traffic Manager systems, based on their iQuery communications with each other, identify whether there is a Global Traffic Manager that belongs to the New York data center. In this case, the answer is yes; the New York data center contains a Global Traffic Manager. Next, the systems determine if more than one Global Traffic Manager belongs to the New York data center. In this case, the answer is no; the New York data center has only a stand-alone system. Consequently, the Global Traffic Manager in the New York data center assumes responsibility for conducting the probe on this particular resource.

Configuration Guide for BIG-IP Global Traffic ManagerTM

B-3

Appendix B

In situations where more than one Global Traffic Manager belongs to a data center, the systems use an algorithm to distribute the responsibility for probes equally among Global Traffic Manager systems. This distribution ensures that each Global Traffic Manager has an equal chance of being responsible for managing a probe request. To demonstrate how probe requests are delegated between two Global Traffic Manager systems at the same data center, consider again the network configuration at SiteRequest. This time, the company needs to acquire data from a resource that resides at the Los Angeles data center. As with the previous example, the first step identifies whether the Los Angeles data center has any Global Traffic Manager systems; in this case, the answer is yes. The next criteria is whether there is more than one Global Traffic Manager at that data center; in this case, the answer is also yes: the Los Angeles data center has a redundant system configuration that consists of two Global Traffic Manager systems. Because there are two Global Traffic Manager systems at this data center, each system compares the hash value of the resource with its own information; whichever Global Traffic Manager has the closest value to the resource becomes responsible for managing the probe request. A final consideration is if a data center does not have any Global Traffic Manager systems at all, such as the London data center in the configuration for SiteRequest. In these situations, the responsibility for probing a resource at that data center is divided among the other Global Traffic Manager systems; much in the same way as the responsibility is divided among Global Traffic Manager systems within the same data center. Once a Global Traffic Manager becomes responsible for managing a probe, it remains responsible for that probe until the network configuration changes in one of the following ways: The Global Traffic Manager goes offline. A new Global Traffic Manager is added to the data center. The network configuration of the resource (such as its IP address) changes.

B-4

Understanding Probes

Selecting a big3d agent


As described in Determining probe responsibility, on page B-3, the first stage in conducting a probe of a network resource is to select the Global Traffic Manager. In turn, the Global Traffic Manager delegates the probe to a big3d agent, which is responsible for querying the given network resource for data. One way in which you can consider the probe delegation process of network resources is in the similar to the two-tiered load balancing method the Global Traffic Manager uses when delegating traffic. With DNS traffic, the Global Traffic Manager identifies the wide IP to which the traffic belongs. Then, it load balances that traffic among the pools associated with the wide IP. One it selects a pool, the system load balances the request across the pool members within that pool. Delegating probe requests occurs in a similar two-tiered fashion. First, the Global Traffic Manager systems within a synchronization group determine which system is responsible for managing the probe. This does not necessarily mean that the selected Global Traffic Manager conducts the probe itself; it means only that a specific Global Traffic Manager ensures that the probe takes place. Next, the Global Traffic Manager selects one of the available big3d agents to actually conduct the probe. As each BIG-IP system has a big3d agent, the number of agents available to conduct the probe depends on the number of BIG-IP systems. To illustrate how these considerations factor into probe management, consider a fictional company, SiteRequest, that was used in Determining probe responsibility, on page B-3. This company has three data centers: one in Los Angeles, one in New York, and one in London. The following table lists a few characteristics of each data center:
Data Center Los Angeles Characteristics Two Global Traffic Manager systems, configured as a redundant system Two Local Traffic Manager systems New York A single Global Traffic Manager Two Local Traffic Manager systems, configured as a redundant system London Resources only; no Global Traffic Manager systems A single Local Traffic Manager

Table B.2 Characteristics of the data centers at SiteRequest

Now, consider that a Global Traffic Manager in the Los Angeles data center has assumed responsibility for managing a probe for a network resource. At this data center, the system can assign the probe to one of four big3d agents: one for each BIG-IP system at the data center. To select a big3d, the Global Traffic Manager looks to see which big3d agent has the fewest number of

Configuration Guide for BIG-IP Global Traffic ManagerTM

B-5

Appendix B

probes for which it is responsible. The big3d agent with the lowest number of probes is tasked with conducting the probe. The Global Traffic Manager checks this statistic each time it needs to delegate the probe; as a result, the big3d select can change from probe instance to probe instance. In situations where a big3d agent does not reside in the same data center as the resource, the designated Global Traffic Manager selects a big3d from all available big3d agents on the network. Again, the agent selected is the agent with the fewest number of probe requests, and this check occurs each time the probe is conducted. For example, SiteRequest adds a new set of web servers in Tokyo. At this location, the company has yet to install its BIG-IP systems; however, the current set of Global Traffic Manager systems in Los Angeles and New York are managing traffic to these web servers. When initiating a probe request to determine the availability of one of these servers, a Global Traffic Manager is selected to manage the probe request. Then, that system chooses a big3d agent to probe the web server, selecting any big3d agent located in Los Angeles, New York, or London.

B-6

Understanding Probes

Designating a specific server


In most cases, the probes sent to internal network resources are handled through a distributed load balancing system that first selects a Global Traffic Manager, and then selects a big3d agent. However, in some circumstances you might want to assign a specific server to conduct a probe of a given resource. For those situations, you can use the Statistics Collection Server setting. This option is only available for non-BIG-IP systems.

To designate a specific server


1. On the Main tab of the navigation pane, expand Global Traffic and then click Servers. The main Servers screen opens. 2. Click the Create button. The New Server screen opens. Alternatively, you can select an existing server by clicking the appropriate server entry from the main Servers screen. 3. Define the appropriate settings for the new server. 4. From the Configuration list, select Advanced. A new set of configuration options appear. 5. From the Statistics Collection Server list, select a BIG-IP system that you want to use to conduct probes for this server. 6. Click the Finished button to save your changes.

The Global Traffic Manager uses the specified BIG-IP system to conduct probes on this server unless that system becomes unavailable.

Configuration Guide for BIG-IP Global Traffic ManagerTM

B-7

Appendix B

Managing LDNS probes


Global Traffic Manager systems are responsible for probes of local DNS servers. Unlike probes conducted on internal systems, such as web servers, probes of local DNS servers require that the Global Traffic Manager verify data from a resource that exists outside the network. Typically, this data is the path information the Global Traffic Manager requires when conducting Quality of Service, Round Trip Time, Completion Rate, and Hops load balancing methods.
Note

If you do not use Quality of Service load balancing, the Global Traffic Manager does not conduct probes of local DNS servers. When a given LDNS makes a DNS request for a wide IP, that request is sent to a single Global Traffic Manager. The Global Traffic Manager then creates an LDNS entry, and assigns that entry one of the following states: New: the Global Traffic Manager has not come across this particular LDNS before Active: the Global Traffic Manager already has an existing entry for this LDNS Pending: the Global Traffic Manager has been contacted by this LDNS before, however, this server has yet to respond to a probe from a Global Traffic Manager on this network In general, the New and Pending states are temporary states; an LDNS remains in one of these states only until it responds to the first probe request from a Global Traffic Manager. Once the Global Traffic Manager receives a response, the LDNS entry is moved to the Active state. Each Global Traffic Manager within a given synchronization group shares the LDNS entries that are assigned this state, resulting in the synchronization group having a common list of known local DNS servers. Unlike internal probes, LDNS probes are not load balanced across Global Traffic Manager systems. Instead, the Global Traffic Manager that the LDNS first queries becomes responsible for the initial probe to that LDNS. These probes are load balanced, however, across the multiple big3d agents, with preference given to big3d agents that either belong to the same data center as the responding Global Traffic Manager, or belong to the same link through which the Global Traffic Manager received the LDNS query. After the initial probe, an algorithm is used to load balance subsequent probes across the available Global Traffic Manager systems.

B-8

Understanding Probes

The process for identifying and managing LDNS probe requests is as follows: 1. An LDNS sends a DNS request to a Global Traffic Manager. 2. The Global Traffic Manager that responds to the request determines if it already has an entry for the LDNS. If it does not, it creates an entry with a status of New. 3. The Global Traffic Manager delegates the probe of the LDNS to a big3d agent; preferably a big3d agent that resides in the same data center as the Global Traffic Manager. 4. When the LDNS responds to the probe, it sends its information to the Global Traffic Manager. 5. The Global Traffic Manager updates its entry for the LDNS, assigning it an Active status. 6. The Global Traffic Manager synchronizes its list of active local DNS servers with the other members of its synchronization group.

If you do not use Quality of Service load balancing modes, the Global Traffic Manager systems do not conduct LDNS server probes.

Configuration Guide for BIG-IP Global Traffic ManagerTM

B-9

Appendix B

Using log entries to tune probes


As mentioned at the beginning of this chapter, probes are the means by which the Global Traffic Manager tracks the health and availability of network resources, and it is important that the responsibility for conducting probes is distributed across as many BIG-IP products as possible. You can use information in the Global Traffic Manager log file to determine how to fine tune the probes that you have configured. However, the probe logs feature is disabled by default. You must turn on the feature for the probe information to appear in the log file.

Enabling probe logs


If you want the Global Traffic Manager to gather information about probes and save it in the log file, you must set the database variable GTM.DebugProbeTuningInterval to a non-zero value. The value of the variable indicates, in seconds, how often you want the system to add probe information to the log file. By default this variable is set to 0 (zero), which disables the logging of information about probes. To change the value of the database variable, use the tmsh command:
modify / sys db gtm.debugprobetuninginterval value [database variable value]

For information about the command syntax you use to change this variable, see the Traffic Management Shell (tmsh) Reference Guide and the Bigpipe Utility Reference Guide.

Understanding the probe information in the log file


The probe information displays in the logs in the Configuration utility when the GTM setting on the Logs screen is set to the default value of Notice. When you set the GTM.DebugProbeTuningInterval database variable to a non-zero value, the log file contains information about probes including the number of local DNS servers, Global Traffic Manager systems, paths, and persistence records in your network. The log file also includes the information in the following list.

For monitors: The time in microseconds that each monitor spends in the active queue For each active monitor, the log file displays the following information: Base name Monitor name Number of total instances

B - 10

Understanding Probes

Number of up instances and the average and maximum probe time for each up instance Number of down instances, the average probe time for each down instance, and a sorted list of reasons that the instance is down. Each reason in the list is followed the number of instances that were marked down for this reason.

For each Global Traffic Manager and Local Traffic Manager: Datacenter name Server name IP address Current tmm CPU usage Number of virtual servers in each state: up or down Active and pending queue sizes for monitors, SNMP monitors, and paths Number of monitors that have received a down response from the system

For each host server: Datacenter name Server name IP address CPU usage Memory usage Note: This value is -1, unless an SNMP monitor is assigned to the server. Number of virtual servers in each state: up or down

Configuration Guide for BIG-IP Global Traffic ManagerTM

B - 11

Appendix B

B - 12

Glossary

Glossary

3-DNS Controller See Global Traffic Manager. A record The A record is the ADDRESS resource record that a Global Traffic Manager returns to a local DNS server in response to a name resolution request. The A record contains a variety of information, including one or more IP addresses that resolve to the requested domain name. access control list (ACL) An access control list is a list of local DNS server IP addresses that are excluded from path probing or hops queries. active unit In a redundant system configuration, an active unit is a system that currently load balances name resolution requests. If the active unit in the redundant system fails, the standby unit assumes control and begins to load balance requests. alternate method The alternate method specifies the load balancing mode that the Global Traffic Manager uses to pick a virtual server if the preferred method fails. See also fallback method, preferred method. auto-discovery Auto-discovery is a process through which the Global Traffic Manager identifies a resource automatically so you can manage it. big3d agent The big3d agent is a monitoring agent that collects metrics information about server performance and network paths between a data center and a specific local DNS server. The Global Traffic Manager uses the information collected by the big3d agent for dynamic load balancing. BIG-IP system A BIG-IP system can be a Global Traffic Manager (including the current Global Traffic Manager), a Local Traffic Manager, or a Link Controller. BIND (Berkeley Internet Name Domain) BIND is the most common implementation of the Domain Name System (DNS). BIND provides a system for matching domain names to IP addresses. For more information, refer to http://www.isc.org/products/BIND.

Configuration Guide for BIG-IP Global Traffic ManagerTM

Glossary - 1

Glossary

bridge mode Bridge mode instructs the Global Traffic Manager to forward the traffic it receives to another part of the network. CIDR (Classless Inter-Domain Routing) Classless Inter-Domain Routing (CIDR) is an expansion of the IP address system that allows a single IP address to be used to designate many unique IP addresses. A CIDR IP address looks like a standard IP address except that it ends with a slash followed by a number, which is the IP network prefix. For example: 172.200.0.0/16 CNAME record A canonical name (CNAME) record acts as an alias to another domain name. A canonical name and its alias can belong to different zones, so the CNAME record must always be entered as a fully qualified domain name. CNAME records are useful for setting up logical names for network services so that they can be easily relocated to different physical hosts. completion rate The completion rate is the percentage of packets that a server successfully returns during a given session. Completion Rate mode The Completion Rate mode is a dynamic load balancing mode that distributes connections based on which network path drops the fewest packets, or allows the fewest number of packets to time out. Configuration utility The Configuration utility is the browser-based application that you use to configure the BIG-IP system. content delivery network (CDN) A content delivery network (CDN) is an architecture of web-based network components that helps dramatically reduce the wide-area network latency between a client and the content they wish to access. A CDN includes some or all of the following network components: wide-area traffic managers, Internet service providers, content server clusters, caches, and origin content providers. custom monitor A custom monitor is a user-created monitor. See also monitor, health monitor, performance monitor, pre-configured monitor. data center A data center is a physical location that houses one or more Global Traffic Manager systems, BIG-IP systems, or host machines.

Glossary - 2

Glossary

data center server A data center server is any server recognized in the Global Traffic Manager configuration. A data center server can be any of the following: a Global Traffic Manager, a BIG-IP system, or a host. destination statement A destination statement defines the resource to which the Global Traffic Manager directs the name resolution request. distributed application A distributed application is a collection of wide IPs, data center, and links. It is the highest level component that the Global Traffic Manager supports. DNSSEC (DNS Security Extensions) DNSSEC is a set of extensions to DNS that protects a computer network against most of the threats to the Domain Name System. DNSSEC zones DNSSEC zones are containers that map a domain name to a set of DNSSEC keys. domain name A domain name is a unique name that is associated with one or more IP addresses. Domain names are used in URLs to identify particular web pages. For example, in the URL http://www.f5.com/index.html, the domain name is f5.com. draining requests Draining requests refers to allowing existing sessions to continue accessing a specific set of resources while disallowing new connections. Drop Packet load balancing mode Drop Packet load balancing mode instructs the Global Traffic Manager to do nothing with a packet, and simply drop the request. dynamic load balancing modes Dynamic load balancing modes base the distribution of name resolution requests to virtual servers on the matrix of live data, such as current server performance and current connection load. Dynamic Ratio weighting Dynamic Ratio weighting is a methodology in which the system continuously checks the performance of each link and sends traffic through the link with the best performance data.

Configuration Guide for BIG-IP Global Traffic ManagerTM

Glossary - 3

Glossary

dynamic site content Dynamic site content is a type of site content that is automatically generated each time a user accesses the site. Examples are current stock quotes or weather satellite images. EAV (Extended Application Verification) EAV is a health check that verifies an application on a node by running that application remotely. EAV health check is only one of the three types of health checks available on an Link Controller. See also health monitor, external monitor. EAV monitor An EAV monitor checks the health of a resource by accessing the specified application. ECV (Extended Content Verification) On the Global Traffic Manager, ECV is a service monitor that checks the availability of actual content, (such as a file or an image) on a server, rather than just checking the availability of a port or service, such as HTTP on port 80. ECV monitor An ECV monitor checks the health of a resource by sending a query for content using the specified protocol, and waiting to receive the content from the resource. See also monitor, health monitor, external monitor. external monitor An external monitor is a user-supplied health monitor. See also health monitor. external system An external system is any server with which the Global Traffic Manager must exchange information to perform its functions. failover Failover is the process whereby a standby unit in a redundant system configuration takes over when a software failure or hardware failure is detected on the active unit. failover cable The failover cable is the cable that directly connects the two system units in a hardware-based redundant system configuration.

Glossary - 4

Glossary

fallback method The fallback method is the third method in a load balancing hierarchy that the Global Traffic Manager uses to load balance a resolution request. The Global Traffic Manager uses the fallback method only when the load balancing modes specified for the preferred and alternate methods fail. Unlike the preferred method and the alternate method, the fallback method uses neither server nor virtual server availability for load balancing calculations. See also preferred method, alternate method. Global Availability mode Global Availability is a static load balancing mode that bases connection distribution on a particular server order, always sending a connection to the first available server in the list. This mode differs from Round Robin mode in that it searches for an available server always starting with the first server in the list, while Round Robin mode searches for an available server starting with the next server in the list (with respect to the server selected for the previous connection request). Global Traffic Manager The Global Traffic Manager provides wide-area traffic management and high availability of IP applications/services running across multiple data centers. gtmd The gtmd utility processes communications between two Global Traffic Manager systems. health monitor A health monitor checks a node to see if it is up and functioning for a given service. If the node fails the check, it is marked down. Different monitors exist for checking different services. See also monitor, custom monitor, pre-configured monitor, performance monitor. host A host is a network server that manages one or more virtual servers that the Global Traffic Manager uses for load balancing. ICMP (Internet Control Message Protocol) ICMP is an Internet communications protocol used to determine information about routes to destination addresses, such as nodes that are managed by BIG-IP systems. iQuery The iQuery protocol is used to exchange information between Global Traffic Manager systems and BIG-IP systems. The iQuery protocol is officially registered with IANA for port 4353, and works on UDP and TCP connections.

Configuration Guide for BIG-IP Global Traffic ManagerTM

Glossary - 5

Glossary

iRule An iRule is a user-written script that controls the behavior of a connection passing through the Global Traffic Manager. iRules are an F5 Networks feature and are frequently used to direct certain connections to a non-default load balancing pool. However, iRules can perform other tasks, such as implementing secure network address translation and enabling session persistence. key-signing key The Global Traffic Manager uses key signing keys to sign only the DNSKEY record of a DNSSEC record set. See also DNSSEC (DNS Security Extensions), DNSSEC zones, and zone-signing key. Kilobytes/Second mode The Kilobytes/Second mode is a dynamic load balancing mode that distributes connections based on which available server currently processes the fewest kilobytes per second. LDNS (local DNS) An LDNS is a server that makes name resolution requests on behalf of a client. With respect to the Global Traffic Manager, local DNS servers are the source of name resolution requests. Least Connections mode The Least Connections mode is a dynamic load balancing mode that bases connection distribution on which server currently manages the fewest open connections. link A link is a logical representation of a physical device (router), which connects your network to the rest of the Internet. Link Controller The Link Controller is an IP application switch that manages traffic to and from a site across multiple links, regardless of connection type or provider. listener A listener is an object that listens for DNS queries. A listener instructs the Global Traffic Manager to listen for network traffic destined for a specific IP address. load balancing methods Load balancing methods are the settings that specify the hierarchical order in which the Global Traffic Manager uses three load balancing modes. The preferred method specifies the first load balancing mode that the Global Traffic Manager tries, the alternate method specifies the next load balancing

Glossary - 6

Glossary

mode to try if the preferred method fails, and the fallback method specifies the last load balancing mode to use if both the preferred and the alternate methods fail. load balancing mode A load balancing mode is the way in which the Global Traffic Manager determines how to distribute connections across an array. logical network components Logical components are abstractions of network resources, such as a virtual servers. See also physical network components. metrics information Metrics information is the data that is typically collected about the paths between BIG-IP systems and local DNS servers. Metrics information is also collected about the performance and availability of virtual servers. Metrics information is used for load balancing, and it can include statistics such as round trip time, packet rate, and packet loss. monitor A monitor is a software utility that specializes in a specific metric of a Global Traffic Manager resource. A monitor tests to see if a given resource responds as expected. See also custom monitor, pre-configured monitor, health monitor, performance monitor. monitor template A monitor template is an abstraction that exists within the Global Traffic Manager for each monitor type, and contains a group of settings and default values. named The named daemon manages domain nameserver software. nameserver A nameserver is a server that maintains a DNS database, and resolves domain name requests to IP addresses using that database. name resolution Name resolution is the process by which a nameserver matches a domain name request to an IP address, and sends the information to the client requesting the resolution. Network Time Protocol (NTP) Network Time Protocol functions over the Internet to synchronize system clocks to Universal Coordinated Time. NTP provides a mechanism to set and maintain clock synchronization within milliseconds.

Configuration Guide for BIG-IP Global Traffic ManagerTM

Glossary - 7

Glossary

node A node is a logical object on the BIG-IP system that identifies the IP address of a physical resource on the network, such as a web server. Node mode The Node mode instructs the Global Traffic Manager to process traffic locally, and send the appropriate DNS response back to the querying server. NS record A nameserver (NS) record is used to define a set of authoritative nameservers for a DNS zone. A nameserver is considered authoritative for some given zone when it has a complete set of data for the zone, allowing it to answer queries about the zone on its own, without needing to consult another nameserver. packet rate The packet rate is the number of data packets per second processed by a server. Packet Rate mode The Packet Rate mode is a dynamic load balancing mode that distributes connections based on which available server currently processes the fewest packets per second. path A path is a logical network route between a data center server and a local DNS server. path probing Path probing is the process of collecting metrics data, such as round trip time and packet rate, for a given path between a requesting LDNS and a data center server. performance monitor Performance monitors check the performance of a pool or virtual server, and dynamically load balance traffic accordingly. See also monitor, pre-configured monitor, custom monitor, health monitor. persistence On a Global Traffic Manager, persistence is a series of related requests received from the same local DNS server for the same wide IP name. When persistence is turned on, a Global Traffic Manager sends all requests from a particular local DNS server for a specific wide IP to the same virtual server, instead of load balancing the requests.

Glossary - 8

Glossary

physical network components Physical network components have a direct correlation with one or more physical entities on the network. See also logical network components. picks Picks represent the number of times a particular virtual server is selected to receive a load balanced connection. pool A pool is a group of virtual servers managed by a BIG-IP system, or a host. The Global Traffic Manager load balances among pools (using the Pool LB Mode), as well as among individual virtual servers. pool-level load balancing With pool-level load balancing, after the Global Traffic Manager uses wide IP-level load balancing to select the best available pool, it uses a pool-level load balancing to select a virtual server within that pool. If the first virtual server within the pool is unavailable, the Global Traffic Manager selects the next best virtual server based on the load balancing mode assigned to that pool. See also tiered load balancing and wide IP-level load balancing. pool ratio A pool ratio is a ratio weight applied to pools in a wide IP. If the Pool LB mode is set to Ratio, the Global Traffic Manager uses each pool for load balancing in proportion to the weight defined for the pool. preferred method The preferred method specifies the first load balancing mode that the Global Traffic Manager uses to load balance a resolution request. See also alternate method, fallback method. pre-configured monitor Pre-configured monitors are monitors that the Global Traffic Manager provides. See also monitor, custom monitor, health monitor. probe A probe is a specific query, initiated by a big3d agent, that attempts to gather specific data from a given network resource. Probes are most often employed when a health monitor attempts to verify the availability of a resource. QoS equation The QoS equation is the equation on which the Quality of Service load balancing mode is based. The equation calculates a score for a given path between a data center server and a local DNS server. The Quality of Service

Configuration Guide for BIG-IP Global Traffic ManagerTM

Glossary - 9

Glossary

mode distributes connections based on the best path score for an available data center server. You can apply weights to the factors in the equation, such as round trip time and completion rate. Quality of Service mode The Quality of Service load balancing mode is a dynamic load balancing mode that bases connection distribution on a configurable combination of the packet rate, completion rate, round trip time, hops, virtual server capacity, kilobytes per second, link capacity, and topology information. ratio A ratio is the parameter in a virtual server statement that assigns a weight to the virtual server for load balancing purposes. Ratio mode The Ratio load balancing mode is a static load balancing mode that distributes connections across an pool of virtual servers in proportion to the ratio weight assigned to each individual virtual server. Ratio weighting Ratio weighting is a methodology in which the system uses a frequency that you set to determine to which link to send traffic. redundant system configuration A redundant system configuration is a pair of units that are configured for failover. One system runs as the active unit and the other system runs as the standby unit. If the active unit fails, the standby unit takes over and manages resolution requests. region A region is a customized collection of topologies. See topology. request source statement A request source statement defines the origin of a name resolution request for a connection. resource record A resource record is a record in a DNS database that stores data associated with domain names. A resource record typically includes a domain name, a TTL, a record type, and data specific to that record type. See also A record, CNAME record, NS record. reverse domain A reverse domain is a type of DNS resolution request that matches a given IP address to a domain name. The more common type of DNS resolution request starts with a given domain name and matches that to an IP address.

Glossary - 10

Glossary

root nameserver A root nameserver is a master DNS server that maintains a complete DNS database. There are approximately 13 root nameservers in the world that manage the DNS database for the World Wide Web. Round Robin mode Round Robin mode is a static load balancing mode that bases connection distribution on a set server order. Round Robin mode sends a connection request to the next available server in the order. round trip time (RTT) Round trip time is the calculation of the time (in microseconds) that a local DNS server takes to respond to a ping issued by the big3d agent running on a data center server. The Global Traffic Manager takes RTT values into account when it uses dynamic load balancing modes. Round Trip Time mode Round Trip Time is a dynamic load balancing mode that bases connection distribution on which virtual server has the fastest measured round trip time between the data center server and the local DNS server. router hops Router hops are intermediate system transitions along a given network path. Router mode Router mode instructs the Global Traffic Manager to forward the traffic it receives to another DNS server. secondary DNS The secondary DNS is a nameserver that retrieves DNS data from the nameserver that is authoritative for the DNS zone. See also nameserver. self IP address A self IP address is an IP address that you define on a VLAN of a BIG-IP system. This term does not apply to the management IP address of a BIG-IP system, or to IP addresses on other devices. server A server is a physical device on which you can configure one or more virtual servers. Setup utility The Setup utility is a utility that takes you through the initial system configuration process. The Setup utility runs automatically when you turn on a system for the first time.

Configuration Guide for BIG-IP Global Traffic ManagerTM

Glossary - 11

Glossary

Simple monitor A Simple monitor checks the health of a resource by sending a packet using the specified protocol, and waiting for a response from the resource. See also health monitor. SNMP (Simple Network Management Protocol) SNMP is the Internet standard protocol, defined in STD 15, RFC 1157, that was developed to manage nodes on an IP network. standby unit A standby unit is the system in a redundant system configuration that is always prepared to become the active unit if the active unit fails. static load balancing modes Static load balancing modes base the distribution of name resolution requests to virtual servers on a pre-defined list of criteria and server and virtual server availability; they do not take current server performance or current connection load into account. See also dynamic load balancing modes. subdomain A subdomain is a sub-section of a higher level domain. For example, .com is a high level domain, and F5.com is a subdomain within the .com domain. synchronization Synchronization means that each Global Traffic Manager regularly compares the timestamps of its configuration files with the timestamps of the configuration files on the other Global Traffic Manager systems on the network. synchronization group A synchronization group is a group of Global Traffic Manager systems that synchronize system configurations and zone files (if applicable). All synchronization group members receive broadcasts of metrics data from the big3d agents throughout the network. All synchronization group members also receive broadcasts of updated configuration settings from the Global Traffic Manager that has the latest configuration changes. tiered load balancing Tiered load balancing is load balancing that occurs at more than one point during the resolution process. See also wide IP-level load balancing and pool-level load balancing. tmsh The Traffic Management Shell (tmsh) is a command-line utility that you can use to configure the Global Traffic Manager.

Glossary - 12

Glossary

topology A topology is a set of characteristics that identify the origin of a given name resolution request. Topology mode The Topology mode is a static load balancing mode that bases the distribution of name resolution requests on the weighted scores for topology records. Topology records are used by the Topology load balancing mode to redirect DNS queries to the closest virtual server, geographically, based on location information derived from the DNS query message. topology record A topology record specifies a score for a local DNS server location endpoint and a virtual server location endpoint. topology score The topology score is the weight assigned to a topology record when the Global Traffic Manager is filtering the topology records to find the best virtual server match for a DNS query. topology statement A topology statement is a collection of topology records. TTL (Time to Live) The TTL is the number of seconds for which a DNS record or metric is valid, or for which a DNSSEC key is cached by a client resolver. When a TTL expires, the server usually must refresh the information before using it again. See also DNSSEC (DNS Security Extensions). unavailable The unavailable status is used for data center servers and virtual servers. When a data center server or virtual server is unavailable, the Global Traffic Manager does not use it for load balancing. unknown The unknown status is used for data center servers and virtual servers. When a data center server or virtual server is new to the Global Traffic Manager and does not yet have metrics information, the Global Traffic Manager marks its status as unknown. The Global Traffic Manager can use unknown servers for load balancing, but if the load balancing mode is dynamic, the Global Traffic Manager uses default metrics information for the unknown server until it receives live metrics data. up The up status is used for data center servers and virtual servers. When a data center server or virtual server is up, the data center server or virtual server is available to respond to name resolution requests.
Configuration Guide for BIG-IP Global Traffic ManagerTM Glossary - 13

Glossary

user configuration set (UCS) A user configuration set is a backup file that you create for the BIG-IP system configuration data. When you create a UCS, the BIG-IP system assigns a .ucs extension to the file name. virtual server A virtual server, in the context of the Global Traffic Manager, is a combination of an IP address and a port number that, together, provide access to an application or data source on your network. wide IP A wide IP is a collection of one or more domain names that maps to one or more groups of virtual servers managed either by BIG-IP systems, or by host servers. The Global Traffic Manager load balances name resolution requests across the virtual servers that are defined in the wide IP that is associated with the requested domain name. wide IP-level load balancing With wide IP-level load balancing, the Global Traffic Manager load balances requests, first to a specific pool, and then to a specific virtual server in the selected pool. If the preferred, alternate, and fallback load balancing methods that are configured for the pool or virtual server fail, then the requests fail, or the system falls back to DNS. See also tiered load balancing and pool-level load balancing. wildcard listener A wildcard listener monitors all traffic coming into your network, regardless of the destination IP address of the given DNS request. zone In DNS terms, a zone is a subset of DNS records for one or more domains. zone file In DNS terms, a zone file is a database set of domains with one or many domain names, designated mail servers, a list of other nameservers that can answer resolution requests, and a set of zone attributes, which are contained in an SOA record. zone-signing key The Global Traffic Manager uses a zone-signing key to sign all of the record sets in a DNSSEC zone. See also DNSSEC (DNS Security Extensions), DNSSEC zones, and key-signing key. ZoneRunner ZoneRunner is the utility that allows you manage your resource records, zone files, and named configuration associated with your implementation of DNS and BIND.
Glossary - 14

Index

Index

A
A record creating 16-14 defined 16-12 AAAA record creating 16-15 defined 16-12 address exclusion list 13-7 alias addresses 11-35 alternate load balancing method 7-2 applications See distributed applications. auto-discovery described 3-14 setting polling frequency 3-15 availability, defined 8-3

communications and big3d A-5 and probes B-1 system 3-4 Completion Rate load balancing mode 7-7 Configuration utility introducing 1-5 connections, resuming 8-10 CPU load balancing mode 7-7 custom monitors importing from another custom monitor 11-6 importing from pre-configured monitor 11-6 importing from template 11-6 using 11-5 using pre-configured 11-5

D B
big3d agent and broadcasting sequence A-3 and configuration trade-offs A-4 and data collection A-3 and dynamic load balancing 7-6 and iQuery A-5, B-2 and metrics A-2 defined 1-4 getting version number B-2 installing A-3 introducing A-1 selecting for probe requests B-3, B-5 setting up A-3 using with system communications 3-4 big3d_install script and setup tasks 3-6, 3-9 running 3-8, 3-9 BIG-IP health monitor 11-13 BIG-IP Link health monitor 11-14 bigip_add script and setup tasks 3-6, 3-8 billing, and links 5-23 BIND configuration and DNSSEC 10-14 Bridge mode and listeners 4-1 configuring listeners for traffic forwarding 4-4 defined 4-1 broadcast sequence and big3d agent A-3 data center statistics 12-9 data centers and defining physical network components 5-1 configuring 5-2 defined 2-2 deleting 5-4 disabling 5-4 enabling 5-4 managing 5-2 modifying 5-3 data collection, and big3d agent A-3 data graphs, performance 14-1 denial of service, preventing 10-1 dependencies creating for virtual servers 8-7 organizing for virtual servers 8-9 removing from virtual servers 8-8 setting 6-21 setting for virtual servers 8-7 destination statements 9-1 distributed applications adding wide IPs 6-20 and dependencies 6-21 and persistent connections 6-24 and statistics for 12-5 and wide IPs 2-5 defined 6-19 defining in Global Traffic Manager 6-19 disabling traffic 6-23 enabling traffic 6-23 introducing 2-5 managing 6-19 removing wide IPs 6-21 removing wide IPs from 6-21 DNAME record creating 16-16 defined 16-12

C
cache poisoning, preventing 10-1 CNAME record creating 16-15 defined 16-12

Configuration Guide for BIG-IP Global Traffic ManagerTM

Index - 1

Index

DNS zone files adding to views 16-24 synchronizing 3-13 DNSSEC and independence from BIND 10-14 DNSSEC key expiration 10-2 DNSSEC keys about generations of 10-1 about key-signing keys 10-4 about zone-signing keys 10-4 creating 10-4 deleting 10-6 introducing 10-1 manually rolling over a generation of 10-8 modifying 10-6 modifying generations of 10-7 setting TTL for 10-2 DNSSEC resource records 10-14 DNSSEC zones creating 10-11 deleting 10-13 introducing 10-1 managing 10-11 modifying 10-12 domain names configuring system validation 3-18 domain validation, configuring 3-18 domains, about providing DS records to parent 10-3 Drain Persistent Requests option 8-12 Drop Packet load balancing mode 7-3 DS records, providing to parent domains 10-3 dynamic load balancing modes and big3d agents 7-6 and fallback load balancing method 7-2 defined 7-1 listing of types 7-7 overview 7-6 using 7-6 See also Completion Rate load balancing mode. See also CPU load balancing mode. See also Hops load balancing mode. See also Kilobyte/Second load balancing mode. See also Least Connections load balancing mode. See also Packet Rate load balancing mode. See also Quality of Service load balancing mode. See also Round Trip Times load balancing mode. See also Virtual Server Score load balancing mode. See also VS Capacity load balancing mode. dynamic ratio and Quality of Service mode 7-9 introducing 7-12 using with Quality of Service mode 7-12 Dynamic Ratio option, enabling for pools 7-13

E
EAV monitors 11-2 ECV monitors 11-2 event declarations 15-4 event execution, terminating 15-5 event-based traffic management 15-4 External health monitor 11-14

F
failover enabling network-based 3-3 for hardware-based 1-4, 3-4 for network-based 1-4, 3-4 Fallback IP load balancing mode 7-4 fallback load balancing and load balancing mode usage 7-2 configuring 7-16 introducing 7-16 selecting 7-2 features of Global Traffic Manager 1-1 FirePass health monitors 11-15 firewalls and iQuery A-6 forward zone files creating 16-6 defined 16-2 FTP health monitors 11-16

G
Gateway ICMP health monitor 11-8 generations modifying for DNSSEC keys 10-7 geolocation data, reloading default data 9-13 GeoPoint database and whereis iRule command 15-7 Global Availability load balancing mode 7-4 Global Traffic Manager and components 2-1 and DNSSEC keys and zones 10-1 and operation modes 4-1 defining current 3-2, 5-6 selecting for probe requests B-3 graphs for performance data 14-1 GTM Performance graph 14-1 GTM Request Breakdown graph 14-1 gtm_add script and setup tasks 3-6 running 3-6 gtmd 3-5

H
hardware-based failover 1-4, 3-4 health monitor settings 11-1 health monitor types 11-38 health monitors

Index - 2

Index

and alias addresses 11-35 and default settings 11-1 and disabled resources 3-17 and extended content verification 11-10 and external application verification 11-12 and health monitor types 11-2 and links 5-22, 5-23 and number of queries 3-17 and reverse mode 11-35 and simple monitors 11-8 and transparent mode 11-35 assigning heartbeat intervals 3-16 assigning servers to 5-13 associating resources to 11-38 configuring 11-8 creating 11-7 creating custom health monitors 11-5 defined 11-2 deleting 11-40 determining availability with 8-4 disabling 11-40 displaying 11-40 enabling 11-40 introducing 11-1 managing 11-40 using BIG-IP Link monitor 11-14 using BIG-IP monitor 11-13 using External 11-14 using FirePass 11-15 using FTP 11-16 using Gateway ICMP 11-8 using HTTP 11-10 using HTTPS 11-11 using IMAP 11-16 using LDAP 11-17 using MSSQL 11-18 using NNTP 11-19 using Oracle 11-20 using POP3 11-21 using pre-configured 11-5 using RADIUS 11-21 using Real Server 11-22 using Scripted 11-24 using SIP 11-25 using SMTP 11-26 using SNMP 11-26 using SNMP Link 11-28 using SOAP 11-28 using TCP 11-12 using TCP Half Open 11-9 using UDP 11-29 using WAP 11-30 using WMI 11-31 heartbeat interval 3-16

HINFO record creating 16-17 defined 16-13 HINT zone files creating 16-6 defined 16-2 Hops load balancing mode 7-7 host 5-10 host servers defined 5-10 using Generic Host option 5-12 HTTP health monitor 11-10 HTTPS health monitor 11-11

I
ID hacking, preventing 10-1 if statement and syntax 15-6 nesting 15-6 ignore path TTL option 7-17 IMAP health monitor 11-16 internet protocols 1-3 IP geolocation database downloading and installing updates 9-10 iqdump command, using B-2 iQuery and firewalls A-6 and probes B-1 and VLANs B-2 defined A-5 using with system communications 3-4 iRule evaluation, controlling 15-4 iRule event types 15-4 iRule functions 15-8 iRule statement syntax using IP commands 15-10 using statement commands 15-6 using TCP commands 15-10 using UDP commands 15-10 using utility commands 15-8, 15-9 using wide IP commands 15-7 iRules adding to wide IPs 6-16 and statement commands 15-6 and wide IPs 6-15 assigning 15-5 creating 15-2 introducing 15-1 organizing within wide IPs 6-17 removing from wide IPs 6-16

Configuration Guide for BIG-IP Global Traffic ManagerTM

Index - 3

Index

K
key expiration 10-2 key generations rolling over DNSSEC 10-8 understanding DNSSEC keys 10-1 keys, DNSSEC 10-4 key-signing keys about 10-5 managing 10-4 Kilobytes/Second load balancing mode 7-7

L
last resort pool 8-13 LDAP health monitor 11-17 LDNS probes B-8 Least Connections load balancing mode 7-8 limit setting defined 8-3 establishing 8-3 using Kilobytes 8-3 using Packets 8-3 limit settings See limit thresholds. limit thresholds and BIG-IP systems 8-3 and pool members 5-16 and pools 5-15 and servers 5-14 and virtual servers 5-15 introducing 5-13 using Total Connections 8-3 Link Controller, defined 5-8 link statistics 12-10 links adding 5-21, 5-22 and defining physical network components 5-1 and monitors 5-22, 5-23 billing 5-23 defined 2-3 determining availability 8-6 managing 5-21 removing 5-22 weighting 5-23 listeners deleting 4-6 introducing 4-1 modifying 4-5 load balancing and dynamic modes 7-6 and pools 7-1, 7-15 and static modes 7-3 and wide IPs 7-1, 7-14 configuring 7-14 enabling ignore path TTL option 7-17 introducing 7-1

using alternate methods 7-1 using dynamic load balancing modes 7-1 using fallback method 7-16 using pool-level 7-1 using static load balancing modes 7-1 using tiered 7-1 using Topology mode 9-12 using wide IP-level 7-1 verifying virtual server availability 7-17 load balancing methods defined 7-1 using fallback load balancing 7-2 load balancing mode usage 7-2 load balancing modes and name resolution requests 7-1 defined 7-2 using Completion Rate 7-7 using CPU 7-7 using Drop Packet 7-3 using Fallback IP 7-4 using Global Availability 7-4 using Hops 7-7 using Kilobytes/Second 7-7 using Least Connections 7-8 using None 7-3, 7-4 using Packet Rate 7-8 using Quality of Service 7-10 using Ratio 7-5 using Return to DNS 7-3, 7-5 using Round Robin 7-5 using Round Trip Times 7-9 using static 7-3 using Static Persist 7-5 using Topology 7-6 using Virtual Server Score 7-9 using VS Capacity 7-9 load balancing servers defined 5-9 using generic load balancing server option 5-10 local DNS excluding from probes 13-6 removing from probes 13-7 local DNS statistics 12-15 Local Traffic Manager and resources 1-2 defined 5-7 log statements 15-6 logical network components and distributed applications 2-5 and listeners 2-4 and pools 2-4 and wide IPs 2-5 defined 2-4, 5-1 introducing 6-1 reviewing 2-4

Index - 4

Index

M
manual resume 8-10 master zone files See primary zone files. metrics defined 13-2 introducing 13-1 metrics collection and big3d agent A-2 and probes 13-6 and TTL and timers 13-5 excluding local DNS from probes 13-6 removing local DNS from probes 13-7 sequence A-3 setting TTL and timer values 13-5 monitors checking virtual servers associated with servers 8-5 configuring global 3-15 defined 8-4 determining availability of links 8-6 determining availability of pools 8-6 determining availability of virtual servers 8-4 See also health monitors. summary of types 11-2 using custom 11-5 MSSQL health monitor troubleshooting 11-19 using to perform service checks 11-18 mx record creating 16-18 defined 16-13

O
Oracle health monitor 11-20

P
Packet Rate load balancing mode 7-8 parent domains, about providing DS records 10-3 paths statistics 12-13 performance data, viewing 14-1 performance monitors 11-8 persistence records 12-16 persistent connections and distributed applications 6-24 and persistent records 12-16 draining 8-12 introducing 8-11 physical network components and virtual servers 2-3 configuring data centers 5-2 introducing 5-1 using data centers 2-2 using links 2-3 using servers 2-2 pool members, using with limit thresholds 5-16 pool statistics 12-8 pool-level load balancing 7-1 pools adding to wide IPs 6-11 and configuring topologies 9-7, 9-8 and limit thresholds 5-15 and load balancing 7-15 and topology load balancing 9-12 and virtual servers 6-3 defined 6-3, 6-8 determining availability 8-6 disabling 6-7 enabling 6-7 organizing virtual servers 6-4 organizing within wide IPs 6-12 removing from wide IPs 6-12 removing virtual servers 6-4 weighting virtual servers 6-5 weighting within wide IPs 6-13 POP3 health monitor 11-21 preconfigured health monitors 11-5 preferred load balancing method 7-2 primary zone files creating 16-3 defining 16-2 probes and information in log file B-10 and LDNS B-8 defined B-1 designating servers B-7 determining responsibility for B-3 enabling logging B-10

N
named.conf file 16-25 network management tools 1-3 network traffic flows, graphs 14-1 network-based failover and redundant system configurations 1-4, 3-4 enabling 3-3 NIST, and standards for DNSSEC zone-signing keys 10-5 NNTP health monitor 11-19 Node mode and listeners 4-1, 4-3 defined 4-1 NoError response, implementing 6-18 None load balancing mode using 7-4 using to skip load balancing 7-3 NS record creating 16-18 defined 16-13 NTP defining 3-10 synchronizing systems 3-10

Configuration Guide for BIG-IP Global Traffic ManagerTM

Index - 5

Index

selecting big3d agents B-5 selecting Global Traffic Manager systems B-3 using log entries to tune B-10 PTR record creating 16-19 defined 16-13

Q
QoS See Quality of Service load balancing mode. Quality of Service coefficients 7-10 Quality of Service load balancing mode and default settings 7-10 and values of coefficients 7-10 customizing 7-8, 7-12 introducing 7-10 using dynamic ratio 7-9, 7-12

reverse mode 11-35 Round Robin load balancing mode 7-5 Round Trip Times load balancing mode 7-9 Router mode and listeners 4-1 configuring listeners for traffic forwarding 4-4 defined 4-1 rule statement syntax using IP commands 15-10 using statement commands 15-6 using TCP commands 15-10 using UDP commands 15-10 using utility commands 15-8, 15-9 using wide IP commands 15-7

S
Scripted health monitor 11-24 search feature locating components 2-6 using to find servers 5-12 using to find wide IPs 6-10 using to find zones 16-10 secondary zone files creating 16-4 defined 16-2 security features 1-2 server statistics 12-11 server weight, and topologies 9-1 servers about 2-2 and BIG-IP systems defined 5-5 and defining physical network components 5-1 and limit thresholds 5-14 defining current Global Traffic Manager 5-6 defining host servers 5-10 defining Link Controller systems 5-8 defining load balancing servers 5-9 defining Local Traffic Managers 5-7 defining NTP 3-10 introducing 5-5 service checks, troubleshooting 11-19 setup tasks 1-2 Setup Utility, using 3-1 simple monitors 11-2 SIP health monitor 11-25 slave zone files See secondary zone files. SMTP 1-3 SMTP health monitor 11-26 SNMP health monitor 11-26 SNMP Link health monitor 11-28 SNMP MIB 1-5 SNMP, using for system communications 3-5 SOA record, defined 16-12 SOAP health monitor 11-28

R
RADIUS health monitor 11-21 Ratio load balancing mode 7-5 Real Server health monitor 11-22 regions 9-4 request source statements 9-1 requests draining 8-12 on performance graph 14-1 resolutions, on performance graph 14-1 resource availability and limit settings 8-3 and monitor availability requirements 8-3 and monitors 11-2 and virtual server dependencies 8-3 defined 8-3 resource health, determining 8-2 resource records about DNSSEC and BIND 10-14 adding to zone files 16-22 and CNAME records 16-15 and HINFO records 16-17 and MX records 16-18 and NS records 16-13 and PTR records 16-13 and SOA records 16-12 and SRV records 16-20 and TXT records 16-21 and types of records 16-12 modifying 16-21 viewing DNSSEC 10-14 resources discovering automatically 5-17 monitoring disabled 3-17 Return to DNS load balancing mode using 7-5 using to skip load balancing 7-3 Index - 6

Index

spoofing, preventing 10-1 SQL Enterprise Manager 11-19 SQL Server-based services 11-18 SRV record creating 16-20 defined 16-13 SSL 1-2 statement commands, specifying 15-6 static load balancing modes and alternate load balancing methods 7-1 and fallback load balancing method 7-2 defined 7-1 described 7-3 using 7-3 using Drop Packet 7-3 using Fallback IP 7-4 using Global Availability 7-4 using None 7-3, 7-4 using Ratio 7-5 using Return to DNS 7-3, 7-5 using Round Robin 7-5 using Static Persist 7-5 using Topology 7-6 Static Persist load balancing mode 7-5 statistics accessing 12-2 and data centers 12-9 and distributed applications 12-5 and links 12-10 and local DNS servers 12-15 and paths 12-13 and pools 12-8 and servers 12-11 and status summary 12-3 and virtual servers 12-12 and wide IPs 12-6 described 12-4 introducing 12-1 status code, defined 8-2 status summary 12-3 strings, returning 15-8 stub zone files creating 16-5 defined 16-2 synchronization activating 3-10 and DNS zone files 3-13 and NTP 3-10 and time 3-10 configuring 3-9 controlling 3-11 creating groups 3-13 deactivating 3-12 defined 3-10 described 3-9 using other synchronization options 1-3

synchronization groups 3-10, 3-13 syntax for iRule statements using IP commands 15-10 using statement commands 15-6 using TCP commands 15-10 using UDP commands 15-10 using utility commands 15-8, 15-9 using wide IP commands 15-7 system communications 3-4 system resources and dependencies 8-7 associating health monitors to 11-38 determining availability 8-3 resuming connections to 8-10 systems availability 8-3 defining BIG-IP 3-6 discovering automatically 5-17

T
tasks, setup 1-2 Tcl syntax 15-2 TCP Half Open health monitor 11-9 TCP health monitor 11-12 test accounts 11-19 tiered load balancing 7-1 timer values and metrics collection 13-5 introducing 13-5 Tools Command Language syntax 15-2 topologies and destination statements 9-1 and pools 9-12 and regions 9-4 and request source statements 9-1 and server weight 9-1 and wide IPs 9-12 configuring for pools 9-7 configuring for wide IPs 9-5 configuring for wide IPs and pools 9-8 implementing 9-10 introducing 9-1 Topology load balancing mode using 7-6 topology records creating 9-11 removing 9-14 topology score, and topology records transparent mode 11-35 TTL values and metrics collection 13-5 introducing 13-5 TTL, setting for DNSSEC keys 10-2

Configuration Guide for BIG-IP Global Traffic ManagerTM

Index - 7

Index

TXT record creating 16-21 defined 16-13

U
UDP health monitor 11-29 use pool statement syntax 15-6

V
validation, domain 3-18 Verify Virtual Server Availability option 7-17 views adding 16-23 adding zones to 16-24 and BIND 9 16-22 deleting 16-24 modifying 16-23 Virtual Server Score load balancing mode 7-9 virtual server statistics 12-12 virtual servers about 2-3 adding 5-19 adding to pools 6-3 and defining physical network components 5-1 and iRules 15-5 and limit thresholds 5-15 creating dependencies 8-7 determining availability 8-4 editing 5-20 managing 5-19 organizing dependencies 8-9 organizing within pools 6-4 removing 5-20 removing dependencies 8-8 removing from pools 6-4 setting dependencies 8-7 weighting within pools 6-5 VS Capacity load balancing mode 7-9

and iRules 6-15 and load balancing 7-14 and persistent connections 8-11 and topology load balancing 9-12 creating 6-9 disabling 6-15 enabling 6-15 maintaining 6-10 organizing iRules 6-17 organizing pools 6-12 removing from distributed applications 6-21 removing iRules from 6-16 removing pools from 6-12 setting up 1-2 weighting pools 6-13 wildcard characters and wide IPs 6-10 examples 6-10 wildcard listener, defined 4-5 Wireless Application Protocol monitor See WAP health monitor. WMI health monitor 11-31

Z
zone files adding to views 16-24 synchronizing 3-13 zones creating 16-3 creating DNSSEC 10-11 deleting DNSSEC 10-13 managing DNSSEC 10-11 modifying DNSSEC 10-12 zone-signing keys about 10-5 managing 10-4

W
WAP health monitor 11-30 weight See topology score, and topology records. weighting, using with links 5-23 when keyword, using with iRules 15-5 whereis iRule command 15-7 wide IP load balancing, and load balancing modes 7-2 wide IP statistics 12-6 wide IP-level load balancing 7-1 wide IPs adding iRules to 6-16 adding pools to 6-11 adding to distributed applications 6-20 and configuring topologies 9-5, 9-8

Index - 8

You might also like