LTM is shiped with OS, you dont need to install it. It has also preconfigured IP address. However you need to active license. License reactivation must be done also after upgrades. LTM does not have pre configured default route. Initial setup consist of couple of steps depending what I need to setup. Basically it is: Full Article…
LTM Essentials – LAB
Most important stuff from the LAB are as follows: floating IP address is the shared IP between F5 cluster tried that setup utility but dont know if I gonna use it ever again backups are easy to handle Tmos seems to be very good. From root you can execute tmos commands via „tmsh list /net Full Article…
Processing the traffic
Basic terminology NODE = Real IP address of server Pool Member = Real IP address + Port Pool = Grouping of pool members Pool members do not have to listen on the same port. They can be on same IP address and diferent port number. Virtual Server = IP adress + port often called a Full Article…
Load Balancing
BIG-IP LTM offers a many load balancing methods to choose from: Static – these methods do no take into consideration the server performance Round robin Ratio Dynamic – take into consideration server performance Least connections Fastest Observed Predictive Dynamic ratio It is important to note that LB distributes the request on available servers only. Server Full Article…
Monitors
BIG-IP LTM can check status and health of the members and nodes to assure it doesn’t send the client request to non operational server. Monitor is a test BIG-IP performs on a node or member. The monitor can be as simple as ping or more advanced like sending L7 requests with appropriate responses. A monitor Full Article…
TMOS Shell
TMOS Shell or TMSH is very nice CLI. It is easy to configure and navigate. Below you can find some basic info how to work with tmsh. Tmos works in modular fashion. You can check list of modules by command show /? Yes „?“ works like in Cisco. The „/“ is the root and modules Full Article…
Profiles
What are profiles? The BIG-IP® local traffic management system can manage application-specific network traffic in a variety of ways, depending on the protocols and services being used. For example, you can configure the BIG-IP system to compress HTTP response data, or you can configure the system to authenticate SSL client certificates before passing requests on Full Article…
Persistence introduction
Session is a virtual channel created between client and server via which these two communicates. One session can be made of many connections. And some application servers maintain a client state in its memory and thus are session sensitive. For example e-shops app. servers can stores shopping card info in its memory and if we Full Article…
Cookie persistence
Cookie persistence uses an HTTP cookie stored on a clients computer to allow the client to reconnect to the same pool member previously visited at a web site. There are 3 methods of cookie persistence available: HTTP Cookie Insert method HTTP Cookie Rewrite method HTTP Cookie Passive method HTTP Cookie Insert method If you specify Full Article…
Destination address affinity persistence
You can optimize your server array with destination address affinity persistence. Destination address affinity persistence, also known as sticky persistence, directs requests for a certain destination IP address to the same server, regardless of which client made the request. This type of persistence provides the most benefits when load balancing caching servers. A caching server Full Article…