F5 Load Balancers

Young Grasshopper

Golden Member
Nov 9, 2007
1,032
380
136
Does anyone have a 'how to' guide or tutorial with best practices/settings on setting up F5 BIG-IP load balancers? Our client have 5 web servers + 2 load balancers which need to be set up in failover mode. I tried looking on the F5 site but the site is too complicated, and I couldnt find anything on Google. I only have experiance with software load balancing(WLBS) but not hardware devices. This would be for servers running Windows 2003 server 32 bit with dual NIC servers.


Thanks
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Yes, but it's been a while. You would probably be better off reading the entire documentation set for them. I know it's not the answer you wanted, but that's what you need to do.
 

Jamsan

Senior member
Sep 21, 2003
795
0
76
This guide covers configuring IIS 7 with an F5 LTM and also goes into setting up a redundant unit. I checked with our local F5 rep yesterday for a guide dealing iwth IIS6, but they said nothing has changed on their part, so their guide applies to II6/7 the same.
 

Zstream

Diamond Member
Oct 24, 2005
3,395
277
136
Originally posted by: Young Grasshopper
Does anyone have a 'how to' guide or tutorial with best practices/settings on setting up F5 BIG-IP load balancers? Our client have 5 web servers + 2 load balancers which need to be set up in failover mode. I tried looking on the F5 site but the site is too complicated, and I couldnt find anything on Google. I only have experiance with software load balancing(WLBS) but not hardware devices. This would be for servers running Windows 2003 server 32 bit with dual NIC servers.


Thanks

Google will not show anything go to www.f5.com

Everything you need is there. Are you going to use these as a GTM or LTM? Are you going to use the ASM module?

What model hardware did you purchase? 4100/4300 or the new 4800?
 

Pheran

Diamond Member
Apr 26, 2001
5,740
35
91
I run F5s so if you have specific questions feel free to ask, but your post is far too vague to respond to, as I cannot tell you the entire process of setting up a load balancer (plus it depends on your environment and other needs).
 

Young Grasshopper

Golden Member
Nov 9, 2007
1,032
380
136
Originally posted by: Zstream
Originally posted by: Young Grasshopper
Does anyone have a 'how to' guide or tutorial with best practices/settings on setting up F5 BIG-IP load balancers? Our client have 5 web servers + 2 load balancers which need to be set up in failover mode. I tried looking on the F5 site but the site is too complicated, and I couldnt find anything on Google. I only have experiance with software load balancing(WLBS) but not hardware devices. This would be for servers running Windows 2003 server 32 bit with dual NIC servers.


Thanks

Google will not show anything go to www.f5.com

Everything you need is there. Are you going to use these as a GTM or LTM? Are you going to use the ASM module?

What model hardware did you purchase? 4100/4300 or the new 4800?



I believe it is an F5 BIG-IP 1500 unit. We didnt purchase it the client did, they want us to set it up for them though. All this thing is going to be doing is load balancing servers, thats pretty much it not much else.
 

rathsach

Member
Sep 29, 2008
41
0
0
It's not that difficult actually.. You create the webservers as nodes, assign the nodes to a pool, and tells the F5 how to loadbalance (round robin etc)..

When you get on the webinterface, and you list your resource (nodes, pools, etc), just start from the bottom one and work upwards.. It'll make sense..
 

Pheran

Diamond Member
Apr 26, 2001
5,740
35
91
For what it's worth, the F5 is a fantastic product. Their user interface is second to none, so I encourage you to spend some time with it. However, if you don't have a firm grasp of networking fundamentals, you won't have a good understanding of them regardless of what you read. Unfortunately, I also have to deal with some Cisco CSS load balancers, and the F5s absolutely blow them out of the water in both functionality and manageability.
 

Young Grasshopper

Golden Member
Nov 9, 2007
1,032
380
136
ok, i followed the guide and set up the load balancer for iis. i need some help with creating vlans and self ips. our network is pretty simple:

2811 t1 router with large block of public ips for each server. a /26 i think.

5510 cisco asa

dell 6248 switch(no config on it)

25 servers(including the 5 webservers)



all the servers are on a 10.1.100.x/24 network, with the gateway being the firewall at .1. the web servers are part of the internal network and cannot be isolated on thier own. i sent an email to f5 tech support but its too damn complicated. here was his response:


A run-down of the simplest setup I can imagine; Given the scenario you describe, I would:

create vlans and self IPs on the first LTM, the documentation is pretty clear on how to go about this. If you need to look things up, the knowledge base has lots: https://support.f5.com/kb/en-us.html I notice you list the version as 9.1.2, this is an OK version but very old, when you get this configured I strongly suggest you look into version 9.3.1, and whatever HF is current at that time.

For a simple network, an 'external' vlan and an 'internal' vlan will suffice- be perfect, actually. You will want two self-IPs for each vlan, a floating and a non-floating. The floating self IP will be the same on both LTMs - whups, forgot to say, we usually refer to the BigIPs as 'LTMs', Local Traffic Manager is the name of the load balancer product.

OK, floating self IP is same on active and standby LTMs, in a fail-over the standby will assume traffic for the active on the floating IPs.
Non-floating self IPs are where monitors and other traffic specific to each unit will go, needs to be unique to each unit.

You will assign the 'external' vlan to the self IPs you create, appropriate to where traffic is arriving and leaving. This external self IP needs to be useful on your ingress network, - where you will receive traffic for the web servers. Let's say, your real world web server address is 192.193.194.195, you would want a self IP on that network to 'listen' for traffic on that address, port 80, so 192.193.194.10 for instance would work for the floating self IP.

The 'internal' vlan can have a completely different IP network, that doesn't need to relate to anything outside, as the LTM will load balance to the addresses it has in the pool of web servers. These can all have private space IPs, give the LTM floating IP on the internal network an address on that network - what ever it is. I would ensure that the web servers are set to the LTM as their default gateway, and that the webservers / internal network not route to the outside except through the LTM. Routing around the LTM causes all kinds of entertainment we don't need today.

As far as the Dell switch is concerned, as you are not doing tagged vlans you don't need to tag - just assign an interface on the LTM, say 1.1, untagged to the external vlan, plug it into the switch if the switch has gateway access, into the firewall/gateway router if not.

Now assign, lets say 1.2 to the internal vlan, untagged. Plug 1.2 into the switch, along with the web servers, and if you have connected your ingress network - the client side, right?- to the external vlan/iface 1.1, and the web servers and LTM can see each other over on 1.2 , then -

1) Incoming traffic (client requests) will go to the LTM (it will receive on it's floating external self IP)
2) LTM will make a load balancing decision based upon how you tell it to do that, and send the traffic to one of the web servers via the internal self IP. 3) Web server will reply, the LTM will collect that reply and
4) send it back out the external vlan /self IP the way it came in.

Make sense?

One thing to keep in mind, the OS does not allow traffic on the mgmt port - the physical port itself. Common setup is to either allocate a separate IP network for mgmt traffic only, or use one of the traffic networks to ssh and GUI into the LTM for management.

When you get all this configured and tested, then configure the second LTM as far as naming, licensing and setting up vlans and self IPs. Then you can pull the configuration over from it's 'peer' with a config sync, and you will have an HA pair.

I hope this gives you a solid base to work from, check back with me via email if I can clarify -

thank you for using F5!


any help would be appreciated. thanks



 

Pheran

Diamond Member
Apr 26, 2001
5,740
35
91
So I'm confused, you posted a long email from F5 with a bunch of reasonable config suggestions, but what is your question?

If all of the load-balanced services are public-facing, I'd set it up such that the F5 is attached to a DMZ segment that hangs off the 5510, then just route a small registered IP block toward the F5 for your load balanced services. Here's an attempt at ASCII art (shows layer 3):

Internet
|
|
2811
|
|
ASA5510----F5----Load Balanced Servers
|
|
Internal
Subnet

Of course there are other ways to do this (and it might not even be the best way for your specific scenario), that's just a suggestion.

Layer 2 should look something like this:

T1
|
|
2811
|
|
Outside
ASA5510
Inside DMZ
|..........|
|..........|
VLAN2 VLAN3
Switch
VLAN3 VLAN4
|..........|
|..........|
Outside Inside
F5 Load Balancers

Internal servers on VLAN 2, load balanced servers on VLAN 4. VLAN 3 is a small interconnect network to support the ASA-F5 connections. I'm assuming that you only have one 5510 (no failover), otherwise you need another VLAN for the outside firewall interfaces.

Ignore the dots, they are only there for spacing.
 

Young Grasshopper

Golden Member
Nov 9, 2007
1,032
380
136
We actually do have 2 5510s. The web servers are not going to be public. They're just referred to as web servers because the Apps on the servers run off IIS. So to give you a breakdown:

User has shortcut on desktop to launch Program

User launches program and web browser opens up going to 10.1.100.70(load balancing address)

This connection goes thru a VPN tunnel betweeen the client site and the ASA

F5 load balances to servers 1-5 and connects user to server with least connections



These server will never sit on the internet so I dont see a need for a DMZ here. And thanks for the help btw. Here is how I would like it to look like:


Incoming connection from remote site(lets say 192.168.17.0/24 network)
|
|
|
Hits ASA thru VPN tunnel on outside interface(FE0)
|
|
|
Outgoing connection from ASA to inside interface(FE1). Connection goes thru a 6248 Dell switch with no config(thru FE1 on the switch), which then goes to virtual IP on F5(the F5 is connected to FE24 on the switch thru management port for now). Inside interface is 10.1.100.0/24. This subnet includes both production servers and the webservers. All servers are on this switch on Vlan1(main vlan).
|
|
|
|
F5 picks out a server for load balancing, lets say EHRWEB4. User at remote site is connected to this server.

I really just need help with figuring out what self ips to use, and what vlans to create on the F5 and assign those vlans out to the switchports on the F5(1.1, 1.2, 1.3 etc...)