Forum Discussion
F5 LTM as Reverse Proxy
Thanks--Chenna
- Hamish
Cirrocumulus
Just treat it as normal really... Think of the reverse proxy as really just load balancing over one backend... Since the number of backends is pretty much irrelevant (Assuming you can do persistence, and since you say web servers you can do active cookies), you can forget that bit. - wowchens
Nimbostratus
Thanks for the response. Actual requirement is something like this: - Hamish
Cirrocumulus
Yes it's feasable, but why are you NAT'ing so many times*? Is there a problem with your network numbering? Supporting legacy addresses where people haven't configured things correctly? - Yong_Yuen_Chong
Nimbostratus
I used to work in a telco and my setup is something like hamish mentioned. I placed a pair of Apache Reverse Proxy servers in the DMZ who will then direct traffic to App tier servers (in the backend). I guess this is the best and cleanest. - Shain_Singh_846Historic F5 AccountHi,
- L4L7_53191
Nimbostratus
This will work. Just remember that if you want to do anything intelligent with the traffic you'll need to have a NAT for each pool member so the BigIP can do traffic management. Another idea is to have another BigIP pair downstream (behind the internal FW) that will do your heavy lifting with traffic management. You'd point to these Virtual Servers from your "proxy" BigIP. While you'd need another pair, it would give you the maximum flexibility. I have similar requirement. Source= Internet --> Ext Firewall --> F5 LB doing Proxy --> Int Firewall --> F5 LB --> Pool Member
Both F5 LB are same physical device. but different route domain means different VLAN and so between VLAN firewall required.
is it feasible solution and what else needs to take care.
- nitass
Employee
is it feasible solution
why not? :)
- Kevin_Stewart
Employee
One could argue that you wouldn't necessarily need the internal firewall layer here. The BIG-IP appliance is a default deny device and can itself perform firewall functions. What you're asking for can absolutely be done, but you could reduce complexity by removing the inner firewall layer.
Kevin, Agree with you. but firewall should be there as per customer. and outside traffic should not hit directly to F5-LB, that is why F5-PROXY-LB placed before that.
I have configured the same however pool is down and so virtual server is down.
ports and traffic is open.. Checked SSL dump traffic via command line at LB and found that handshake is being done between both LB instances (PROXY-LB and int-LB) but final RST packet seen,, why ?
Regards, Neeraj
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com