Forum Discussion

Sonny's avatar
Sonny
Icon for Cirrus rankCirrus
Oct 01, 2015

Configuring VS to access LTM

I have 2 management interfaces, x.x.10.1 and x.x.20.1. I normally access the device through 20.1. So I created a vs to access 10.1. However, looking at the tcpdump, I don't see any response back from 10.1 when I access it through the vs. Thus, I get page cannot display. IF I access 10.1, without going through the vs, it works fine. Just wondering if anyone knows what the issue may be off the top of their heads.

 

The reason I created a vs to access the device was so I can apply an access policy I created to use 2FA. The policy authn the user against the LDAP and then if successful will prompt for your CAC and then does a check for validity and if successful, allows the user to the pool member. In this case, 10.1. From the tcpdump, I see this happening. Again, I just don't see and response from 10.1.

 

  • Kevin, this relates to the above. What is is best way to require 2FA when admins access the self-IP directly instead using my VS?

     

  • I used the self-IP as the VS IP. When I started this 5 days ago, this option didn't work. I found a quirky fix. I created another self-IP on the same VLAN. I then tested the VS config using the original self-IP. It now works. I then deleted the new self-IP and tested. It still works. Yes, cleared my cache and used a different browser, too. Kind of weird, BUT it works.

     

  • What is is best way to require 2FA when admins access the self-IP directly instead using my VS?

     

    In this case you have to rely on the management plane's authentication capabilities, which only supports "ClientCert LDAP" for two-factor authentication. Another option might be to set the self-IP's Port Lockdown setting to "Allow None". This would restrict direct access but still allow the VIP-iRule access to work.

     

  • It's always been my understanding that OpenSSH doesn't natively support PKI x.509-style authentication without some modifications/patches. You could certainly get BIG-IP's SSH to do it, but it wouldn't be "supported" and would likely not survive an upgrade. Your best bet is to open a support case and request this functionality.

     

  • Thanks again Kevin. Management will have to live with the "not supported" answer.