Forum Discussion

EL's avatar
EL
Icon for Nimbostratus rankNimbostratus
May 19, 2015

One arm deployment with multiple vlan server segement

Hi All

 

Good day to you! I would like to ask regarding one arm f5 deployment. the requirement is as below we have trunk port from F5 to core switch and cater of a few of vlan server segment, let say vlanA (serverA), vlanB (ServerB) and vlanC (Server C) because we want to load balance different application on different segment but don't want to change the existing network so the VS and the server IP has the same subnet and from my understanding we need to use SNAT in order the pool member to route back the traffic to F5 as per F5 requirement in full proxy architecture. but seems we have 3 different segment and the users may can from different vlan, so what is the default route i should configure on the F5 to route back the traffic to the client.

 

from some posting seems like we don't need to configure default route because the F5 will use auto last hop for the return traffic back to the client. from my understanding we can configure routing domain for each segment but We don`t want to use route-domains due to the complexity.

 

Kindly advice what is the design best practise for this kind of deployment

 

Thanks

 

El

 

5 Replies

  • I think you have hit upon the answer. As long as auto last hop is enabled and all of the back end servers are on one of the three VLANs then you may not need any routes (for the production traffic) as auto last hop should take care of all of the incoming connections.

     

    You may need specific routes if you are referencing things like a syslog, ntp, or AD/LDAP server that is not on one of those three VLANs.

     

    • EL's avatar
      EL
      Icon for Nimbostratus rankNimbostratus
      btw is it possible to create another vlan, let say vlantransit and I create the default gateway point to this vlantransit. so if the auto lash hop not working then if will look for the routing table. if let say client access VS serverA then the core switch will forward the traffic to vlan ServerA then the return traffic to the client will use vlantransit if auto last hop not working Thanks
    • Max_Q_factor's avatar
      Max_Q_factor
      Icon for Cirrocumulus rankCirrocumulus
      That should work as well. Auto last hop should work as long as the initiating mac address is still valid.
    • Torti's avatar
      Torti
      Icon for Cirrus rankCirrus
      hi, what is with healthcheck requests? auto last hop doesn't work for that, because the system itself is the client. If there isn't a configured route, the systeme takes management interface and management IP for the requests.