AFM
336 TopicsRedirect Proxy CONNECT Request at LB level based on URL
Hi, I would like to ask for experts advice on the following design issue. I currently use a Standard Virtual Server for load balancing requests to a pool of Proxy Squids. HTTP CONNECTs are sent to the VIP of the Virtual Servers; per SNAT translated and sent to the SQUID Proxys. The config of the Virtual Server is pretty much standard; there's no "HTTP Proxy Connect Profile" set; client requests are SNATted and sent to the Squids proxyies (so that the CONNECT requests are de facto landing on the SQUIDs via the LB). A "http_proxy" http client profile is also set at Virtual Server level (proxy mode: reverse). I would like to know if it is technically possible to intercept a CONNECT requests to a given URL directly at the LB and have it immerdiately redirected to the destination rather then sent to the pool of proxy servers. In other words, the LB should intercept CONNECT requests towards specific URLs and have the request sent directly to the target URL without send it first to the SQUID proxys within the LB Pool. One additional info: the URL that I would like to "control" under this LB target config should be accessed via SSL / TLS. Is this scenario technically feasible with F5 BIG IP ? If so, please describe how could this be implemented (which modules should be licensed? would the LTM module with iRules alone be capable to achieve this ? and how would the Virtual Server config need to be adapted in this case, since the CONNECT request from the client would need to be intercepted directly on the LB front end, so modifications to the Virtual Server configuration would be needed.) I researched a little bit on this and found this F5 technical document covering more of less the same setup. https://techdocs.f5.com/en-us/bigip-14-0-0/big-ip-local-traffic-manager-implementations-14-0-0/configuring-an-explicit-http-proxy-chain.html However it is not 100% clear to me if the "HTTP Proxy Connect profile" also requires APM Configuration to work. Moreover, how would I need to configure the APM to achieve this technical requirement ? An end to end example / technical note covering this scenario (or a very close scenario) would be great. Thank you in advance for your feedback and your help.3.4KViews0likes0CommentsDuring ike rekey in a s2s IPsec config some tunnels won't reestablish
Hi, I would like some help regarding an IPsec problem we are experiencing in our DC. We have a few different route domains in our F5. Two different RDs are configured for IPSec to two different remote sites. The only thing common between the two connections is that both remote device is a Cisco ASA. One is an ASA5520 on 7.2(4) and the other one is an ASA5585 on 9.2(4)14. Here are the details of the IPsec configuration: PHASE1 Version:IKE v1 Authentication algorithm:SHA-1 Encryption algorithm:AES256 Perfect forward secrecy/dh-group:MODP1536 Lifetime:1440 Authentication method:PSK Mode:Main NAT Traversal:ON DPD Delay:30 sec Replay window size:64 packets PHASE2 IPsec protocol:ESP Mode:Tunnel Authentication algorithm:SHA-1 Encryption algorithm:AES256 Perfect forward secrecy:MODP1536 Lifetime:1440 It has been verified by both sides multiple times that the configuration is exactly the same. Also, we are the ones using NAT-T. We have an external router where the public ip address is NATed to the F5. The problem is that during ike rekeying some tunnels won't reestablish. Only some will, but not all. For example in one ipsec there are 3 traffic selectors. Traffic is flowing through in all 3 of them when everything is fine. After the rekeying only one will work and we have to clear the whole ipsec to make it work again. What we found so far that the ASAs will start rekeying at 75% of the lifetime (so in our case around 18 hours) https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/81824-common-ipsec-trouble.htmlvpndisc According this document it's not a problem. However, almost always the tunnels won't come up. (There have been a few occasions when for some magical reason they came up but it's pretty rare..) Log from the ASA when rekeying starts at 18 hours. Mar 7 02:50:51 asa %ASA-4-113019: Group = 1.2.3.4, Username = 1.2.3.4, IP = 1.2.3.4, Session disconnected. Session Type: IPSecLAN2LANOverNatT, Duration: 18h:00m:29s, Bytes xmt: 4133553397, Bytes rcv: 2396963220, Reason: IKE Delete Here are the logs from the racoonctl log, as it is too long to paste it here: https://pastebin.com/H39ZbYLS So the conclusion so far is that there is traffic between the peer IPs, even when the problem occurs. The traffic in the IPsec SAs goes back and forth continuously. When the IKE rekey happens the old IKE SA closes and a new one is created and the IPsec SAs are renewed. For a second the traffic in the IPsec SAs breaks but then continues to flow once again. But when the error happens not every IPsec SA reestablishes and we can only see timeouts in the logs. I hope you can help. The clients are a "bit" mad about this issue. Thanks.Solved2.8KViews0likes1CommentISAKMP packets dropped
Hi, I'm trying to move a site-to-site IPsec tunnel from a Cisco ASA 5505 and a BIG-IP LTM+AFM version 12.1.0. The tunnel was up and traffic flowed properly when the tunnel was terminated on ASA but not any longer. I have configured IKE phase 1 and IPsec phase 2 and traffic selectors with same parameters that were configured on the ASA and I have also configured a forwardning virtual server but my BIG-IP seems to drop ISAKMP traffic, it answers back to the peer with ICMP port 500 unreachable. What can be wrong? Am I missing something in Network Firewall? I have added ESP and ISAKMP to the Global rule and I can see Count increasing. But phase 1 doesn't work anyway. I have followed https://support.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/bigip-tmos-tunnels-ipsec-12-1-0/10.html Best regards, AndreasSolved1.8KViews0likes7CommentsF5 Sending syslogs with two hostname to remote syslog server
HI All, we have F5 Device (LTM + AFM), we configured syslog sever splunk via linux syslog server as forwarder. in Linux server each F5 creating two syslog files, only with just host name and another one is FQDN name. Both are different logs , not duplicate . I am not sure, where to merge it or make it single, any one guide me please!Solved1.6KViews0likes2CommentsCan F5 be in Bridge Mode or a L2 DDOS to protect from L3-L4 DDOS attack
Hi F5 community, We just want to consult if F5 rSeries models ( Active-Standby HA setup ) with AFM license is capable to do bridge mode to cater L3-L4 DDOS protection before it goes to Internet Perimeter FW. We ask this so thatthere will be no re-architecture or change of config about the Public IP defined in the Internet Perimeter FW. If you have any document experience or KB article pertaining to this it will be a great help to us. Thank you in advance.Solved1.2KViews0likes6Comments