F5 Lab 1.20: Configuring Forwarding Virtual Server

F5 Lab 1.20: Configuring Forwarding Virtual Server

F5 by default is an device which block all traffic until the administrator explicitly allow it. Based on the lab, I have created two virtual servers and it reside between different route-domain. I created PAYMENT_WEB_VS and MARKETING_WEB_VS and then the user can access the service by it's virtual IP on the browser. But what if the server administrator wants to access directly to the backend server for maintenance on IP address 192.0.2.1 using SSH, how we can accomplish that?

Figure 1. Direct Traffic to Backend Server

To accomplish this type of traffic, forwarding virtual server is comes into play. The forwarding virtual server is different than the standard virtual server which doesn't have resource pool assigned. The forwarding virtual server is simply forward the defined traffic from the source to the destination, there's no load balancing process.

Let's prove that the F5 block the traffic:

Figure 2. Test SSH Traffic

I tried connect to the server on IP address 192.0.2.1 using SSH it shows an error connection refused. It proves that the connection is failed. Let's do tracert verification do figure out where the traffic is blocked.

Figure 3. Trace the Problem

When tracert command is executed, the last hop is 192.168.100.2 and then the IP address 10.10.102.1 sends ICMP message Destination net unreachable. Based on the topology, the IP address 192.168.100.2 is the active HSRP device for the gateway on N9K-CORE-1 and the IP address 10.10.102.1 is the IP address of the self IP of the F5 for OSPF route domain 2. From the trace result, it shows that the F5 reject the traffic and sends the ICMP message.

Let's create the forwarding virtual server on the F5 for allowing the traffic.

1. Same as standard virtual server, navigate to Local Traffic => Virtual Servers. Then click "Create"

Figure 4. Virtual Server Configuration

On the new virtual server general properties configuration, configure some parameters:

  • Name: The name of forwarding virtual server.
  • Type: Virtual server type, choose Forwarding (IP) for this case.
  • Source Address: Source address of the traffic, I make it all address.
  • Destination Address/Mask: IP address of the virtual server. In this case, I add all IP address on the route domain ID 2.
  • Service Port: The listening port for the forwarding virtual server. In this case, it will test for allowing SSH traffic only.
  • State: Status of the virtual server. Make sure it on enabled state.

Figure 5. Virtual Server Configuration Protocol

  • Protocol: Choose the protocol. SSH is run based on TCP so I choose TCP.
  • VLAN and Tunnels: On which VLAN the virtual server will be enabled. In this case it should be enabled on external VLAN and the internal VLAN.

2. Test the SSH traffic from the server admin PC to the backend server on IP address 192.0.2.1 again.

Figure 6. SSH Traffic Test Again

The test result shows that we can login to the backend server on IP address 192.0.2.1 using SSH protocol but how about the ICMP traffic. Let's test by pinging the IP address 192.0.2.1.

Figure 7. ICMP Traffic Test Failed

The ping result shows request timed out, it means the ICMP traffic is blocked. This result is expected because remember, the protocol configured on the forwarding virtual server is TCP. Let's modify the protocol to All protocol and listening port set to all port then test again.

Figure 8. Change Service Port Configuration
Figure 9. Change Protocol Configuration

The test result for pinging the backend server 192.0.2.1 below is success after changing the service port and the protocol.

Figure 10. ICMP Test Again

The tracert also allowed.

With the new configuration, it will allow all incoming traffic to all segment which reside in route domain ID 2. If you need more granular only some service it can be done by modifying the service port, protocol and the destination IP to the specific address of the virtual server.

Take away:

1. Forwarding virtual server doesn't have pool assigned and no load balancing process.

2. Forwarding virtual server can be used for allowing traffic to the backend server.


要查看或添加评论,请登录

Deni Ramdani的更多文章

  • Cisco Nexus Lab 1: OSPF Authentication

    Cisco Nexus Lab 1: OSPF Authentication

    Using the same topology as my last lab by integrating Cisco Nexus device and F5 using OSPF routing protocol, I try to…

    2 条评论
  • F5 Lab 1.22 MAC Masquerading

    F5 Lab 1.22 MAC Masquerading

    After configuring HA Group for my F5 HA on my last article here, the next thing is how to optimize the failover in the…

    11 条评论
  • F5 Lab 1.21: HA Group

    F5 Lab 1.21: HA Group

    I have configured HA for my F5 based on this article, but with that configuration F5 will failover only when the active…

  • F5 Lab 1.19: Configuring Route-Domain

    F5 Lab 1.19: Configuring Route-Domain

    After I make an update to my lab topology on my last article here, I start to configure route domain in F5 for…

    2 条评论
  • F5 Lab 1.18: Lab Topology Update

    F5 Lab 1.18: Lab Topology Update

    After creating simple lab created which focusing to F5 basic, I have updated my topology to integrate the F5 with…

    1 条评论
  • F5 Lab 1.17: Pool Member/Node Manual Resume

    F5 Lab 1.17: Pool Member/Node Manual Resume

    When deploying a service to F5 by creating virtual server as listener for the traffic, we also define which group of…

  • F5 Lab 1.16: Virtual Server Order of Precedence

    F5 Lab 1.16: Virtual Server Order of Precedence

    There are always many virtual server configured on the F5, it can be configured as very specific source and destination…

  • F5 Lab 1.15: Persistence Profile- Cookie Persistence

    F5 Lab 1.15: Persistence Profile- Cookie Persistence

    On the last lab, I have done lab for persistence based on source and destination address. While on this article I will…

    1 条评论
  • F5 Lab 1.14: Persistence Profile-Source and Destination Address

    F5 Lab 1.14: Persistence Profile-Source and Destination Address

    Beside fallback host feature which I have tried on my last lab and article here, there is also other feature to stick…

  • F5 Lab 1.13: Fallback Host

    F5 Lab 1.13: Fallback Host

    As I mentioned on my last article here about configuring priority group activation, there is also an option to redirect…

社区洞察

其他会员也浏览了