Forum Discussion
BIG-IP LTM - do i need to purchase AFM to make the LTM VE into a decent corporate firewall?
Hi Guys
First post, I'm new to f5 and an SA at my company has proposed using a pair of LTM VEs as the primary firewall in an enterprise network... However, he's been informed that we don't need to purchase the AFM features and can do this with the normal LTM license and the ARM for OSPF.
I need to implement the design and migrate the config (policies, NATs, routing etc) from a Checkpoint to the BIG-IP LTM... Reckon I need the AFM or is it possible without? I'm currently doing the essentials training and have purchased a book on iRules...
Many Thanks
It's mainly about management (although I believe that AFM moves some of the ACL functions into TMM core which is more efficient than doing it in an iRule, however unless you are running a very low-end device this may not be a consideration).
If you had a very simple setup with no forwarding virtual servers you could get away with a simple iRule attached to each virtual to which you wanted to control access;
when CLIENT_ACCEPTED { Naming standard for virtuals is vs_myvirtual.com_http - for matching address datagroup listing allowed IPs;- dg_myvirtual.com_http set dg_allowed_ip_list "dg_[substr [virtual] 3]" if {[class exists $dg_allowed_ip_list]} { if {![class match [IP::remote_addr] equals $dg_allowed_ip_list]} { Datgroup exists and source IP not in allowed list - drop discard return } } }
If however you need forwarding virtual servers to have iRules mimicking your checkpoint (with 5-tuple policies), have a read of this http://www.f5.com/pdf/deployment-guides/data-center-firewall-dg.pdf. It contains a datacentre firewall iRule which is designed to be deployed via iApp but can easily be manually deployed. Read it and decide if you would be happy converting your Checkpoint policy into the datagroups described.
Just a personal note - if you were converting an internet-facing datacentre firewall policy onto an F5 I would have no hesitation in using the iRule in the doc above. However with an enterprise firewall - I would be thinking seriously about using AFM. It all depends on the complexity of your rules, your budget, and your appetite for supporting firewall polices in text-based datagroups (as opposed to the GUI interface the AFM will give you).
- HamishCirrocumulus
Mmm... I'd say 'Depends', but it's not going to be like your checkpoint management, even with AFM..
The BigIP is a firewall OOTB. But it's the management side of things that will get you. Especially if you're migrating a large policy. The migration will be possibly tedious, but on-going management and maintenance will be a test of the admin skills available
Sounds like fun though. I'd probably look to this as an opportunity to standardise as much as possible. You can write scripts (Either direct in tmsh or via perl/whatever to add them via tmsh or iControl) to drop the required rules into the bigip configs as well...
Definitely the drag and drop features of checkpoint management are not going to be there though...
H
- IheartF5_45022Nacreous
It's mainly about management (although I believe that AFM moves some of the ACL functions into TMM core which is more efficient than doing it in an iRule, however unless you are running a very low-end device this may not be a consideration).
If you had a very simple setup with no forwarding virtual servers you could get away with a simple iRule attached to each virtual to which you wanted to control access;
when CLIENT_ACCEPTED { Naming standard for virtuals is vs_myvirtual.com_http - for matching address datagroup listing allowed IPs;- dg_myvirtual.com_http set dg_allowed_ip_list "dg_[substr [virtual] 3]" if {[class exists $dg_allowed_ip_list]} { if {![class match [IP::remote_addr] equals $dg_allowed_ip_list]} { Datgroup exists and source IP not in allowed list - drop discard return } } }
If however you need forwarding virtual servers to have iRules mimicking your checkpoint (with 5-tuple policies), have a read of this http://www.f5.com/pdf/deployment-guides/data-center-firewall-dg.pdf. It contains a datacentre firewall iRule which is designed to be deployed via iApp but can easily be manually deployed. Read it and decide if you would be happy converting your Checkpoint policy into the datagroups described.
Just a personal note - if you were converting an internet-facing datacentre firewall policy onto an F5 I would have no hesitation in using the iRule in the doc above. However with an enterprise firewall - I would be thinking seriously about using AFM. It all depends on the complexity of your rules, your budget, and your appetite for supporting firewall polices in text-based datagroups (as opposed to the GUI interface the AFM will give you).
- Norris_141656Nimbostratus
Hi Guys
Thanks for the responses. My skills are mainly in Networking, especially Cisco (Recently completed CCNP) and Juniper, but also in Microsoft and VMware. I have administered Juniper and Cisco firewalls for the last 5 years or so.
I have little to no experience with F5, tmsh, Tcl or Linux, so it will certainly be a challenge, but it is one I am looking forward to. Having seen what F5 is about and some of the things it can do, I am very excited about working with it and definately want to incorporate it into the solution.
Unfortunately, I dont think we can include the AFM due to budget constraints, so I'll have to learn how to administer iRules pretty quickly.
IheartF5, that link is fantastic and is pretty much exactly what I am looking for traffic coming into the Enterprise from the Internet.
If you dont mind I have a couple of additional questions surrounding traffic in the other directions - From inside of the Enterprise out to the Web.
- Does the LTM have any ALG-like functionality for protocols like SIP and FTP?
- Say I wanted to allow a certain group of internal computers access outbound to any server over HTTP, HTTPs and FTP, with a dynamic source NAT of the F5s outside interface IP address, is that sort of thing easy to set up and configure?
Many Thanks for all of the replies and tips so far.
- IheartF5_45022Nacreous
◾Does the LTM have any ALG-like functionality for protocols like SIP and FTP?
SIP - Yes - http://www.f5.com/pdf/deployment-guides/load-balancing-sip-dg.pdf
◾Say I wanted to allow a certain group of internal computers access outbound to any server over HTTP, HTTPs and FTP, with a dynamic source NAT of the F5s outside interface IP address, is that sort of thing easy to set up and configure?
Yes just use "SNAT automap" setting http://support.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/ltm_implementations_guide_10_1/sol_ftp_passive.html.
- Norris_141656Nimbostratus
Thanks for the info - Really appreciate it :-)
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com