Technical Articles
F5 SMEs share good practice.
cancel
Showing results for 
Search instead for 
Did you mean: 
JRahm
Community Manager
Community Manager

In this episode of Lightboard Lessons, Jason updates an earlier Whiteboard Wednesday with a slight change in flow introduced in TMOS version 12.1. Some of the features in this flow are only applicable if you have hardware or if you have security licenses applied. If that is not the case, just assume a PASS for those blocks.

Source Diagram

0151T000003d6xAQAQ.png

Comments
epaalx
Cirrus
Cirrus

Is there a nicely formatted downloadable picture of the final diagram?

 

Also, it would be great if F5 supplies closed-captions or a transcript (since YouTube's auto-CC isn't accurate.)

 

JRahm
Community Manager
Community Manager

Hi @epaalx, I updated the article above with the drawing I used in prep for the video. Thanks for the feedback on cc/transcript, we'll look into that.

 

sachin_80710
Nimbostratus
Nimbostratus

Thanks Jason, Very informative.

 

epaalx
Cirrus
Cirrus

Both this and previous video refers to "HUD Chain" but I am unable to find precise definition. Can you define or provide reference?

 

JRahm
Community Manager
Community Manager

The HUD chain is the just the protocol filters that trigger on both sides of the proxy. So for example, if you have an https application, you will for sure have tcp, ssl, http filters trigger on the client side of the proxy, then http, ssl, tcp in reverse on the server side of the proxy. HUD is a tribal knowledge name for the proxy from the movie Hudsucker Proxy. 🙂

 

epaalx
Cirrus
Cirrus

Thanks Jason. Am I able to get a printout of "filters triggers", such as those associated with a VS, for instance?

 

JRahm
Community Manager
Community Manager
Thomas_Schockae
Nimbostratus
Nimbostratus

Jason, you could have, at the very least, used a blue colour for the HUD Chain block's background. 😄 😉

 

JRahm
Community Manager
Community Manager

Sorry man!

 

Lucien_55928
Nimbostratus
Nimbostratus

Great chart Jason. 2 Questions: 1: Which path would traffic take If you have a NAT? 2: Which path would traffic with port lockdown on self/floating IP?

 

JRahm
Community Manager
Community Manager

Hi @Lucien...it is possible to reuse a self-ip on a virtual, so that implies that the virtual server lookups have to occur first. The object precedence is:

 

  1. Virtual Server (and all the specific precedences here, see K14800 below)
  2. NAT
  3. SNAT
  4. Self-IP

You can piece that together in these support articles on AskF5

 

Lucien_55928
Nimbostratus
Nimbostratus

Great. Makes sense now. Thanks for sharing the references. And so, since these are listening objects, decision is made at the "Listener Lookup" phase (in your chart above).

 

Really nice video! In the HUD chain, if you run all of the modules on the same BIG-IP, in which order will they handle the traffic? Is it the same as in the drawing? Because I'm pretty sure that when you are running APM and ASM, you cannot protect an APM webtop with ASM when they are provisioned on the same box because APM triggers before ASM. Please correct me if I'm wrong 🙂

 

JRahm
Community Manager
Community Manager

If you have a listener with multiple modules policies applied, the order of operations is as follows:

 

Clientside: LTM, AAM, ASM, APM, PROXY

 

ServerSide: PROXY, LTM, ASM, AAM, APM, LTM

 

For your particular scenario, APM login triggers before ASM parsing, so the login page is not protected by ASM in a single-VIP deployment, but if you deploy a layered VIP, that's possible as well on a single BIG-IP.

 

Hey Jason.

 

A bit beyond the scope of the video but, when using a layered VS for APM, some resources won't work right? Like for instance a Network Access Resources.

 

Tried setting up a layered VS for this purpose where the resource assignments were Full Webtop, Network Access and some other stuff. Only spent a short period of time on it but never got it to work. Then I stumbled across (if I remember correctly) a devcentral post stating it was not possible (at least for a network access resource). So I dropped it til I had some more time to research it.

 

Thanks again!

 

I have a layered VS setup with APM, What network resources do you have that don't work ?

Richard_Shuford
Legacy Employee
Legacy Employee

[responding to "epaalx"] As Jason wrote in an earlier comment, the term "HUD" was inspired by the motion picture "The Hudsucker Proxy". The "HUD chain" is essentially a logical stack of filter layers stacked up on either side of the dual-proxy processing paradigm used by the TMM (the Traffic Management Microkernel process). An input packet comes in and goes up the HUD chain on one side (potentially undergoing processing at each layer of the stack), and then from the pinnacle goes down the chain on the other side and then (typically) out to something outside BIG-IP.

 

Version history
Last update:
‎01-Feb-2017 14:25
Updated by:
Contributors