Você está na página 1de 129

BIG-IP Advanced Firewall Manager

Operations Guide

Unsurpassed Network Defense


Bringing together security and deep application
fluency, BIG-IP Advanced Firewall Manager
(AFM) delivers the most effective network-level
security for enterprises and service providers
alike.
A message from Julian Eames,
Chief Operations Officer and Executive Vice President,
F5 Business Operations
Welcome to the F5 Operations Guide series.

Our series of operations guides address real-world scenarios and challenges. The content
was written by the engineers who design, build, and support our products, as well as other
F5 professionalssome former customers worked in the field and have firsthand experience.

While no document can anticipate every question or situation, F5 endeavors to provide a


better understanding of your BIG-IP system and offer tools needed to address common
issues and conditions.

In this guide youll find recommendations, practices, and troubleshooting tips to keep your F5
products running at peak efficiency and elements that may be incorporated into your own run
books.

F5 is pleased to offer industry-leading products and services, including world-class support,


and welcomes your suggestions and feedback. Let us know how we can better serve you.

Julian Eames

ii
Contents

Acknowledgements 1

About this guide 2


Before using this guide 2

Common terms and concepts 2

Limits of this guide 2

Glossary 3

Customization 3

Issue escalation 4

Feedback and notifications 4

Document conventions 4

Change list 6

Introduction 7
BIG-IP AFM features 7

Packet flow 9
Packet flow in BIG-IP hardware 9

Packet flow in BIG-IP AFM software 10

Post-L4 processing 12

Firewall Rules 14
Network firewall 14

IP intelligence 16

Protocol security 18

BIG-IP AFM rules 20

BIG-IP AFM policies 22

BIG-IP AFM iRules 26

Rules and policies troubleshooting 28

Rules and policies troubleshooting 29

Network Address Translation (NAT) 33


SNAT 35

NAT iRules 40

iii
Denial of Service 42
BIG-IP AFM DoS mitigations 43

Packet processing (SYN cookie protection) 50

Device DoS 53

BIG-IP AFM DoS vectors 54

DoS policy development 62

DoS reporting and visibility 63

Signaling and intelligence 66

External Tools 70
BIG-IQ Centralized Management 70

SNMP polling and alerting 73

Syslog 74

IPFIX 74

sFlow 75

Change and configuration management 75

Monitoring and Logging BIG-IP AFM 78


BIG-IP AFM monitoring 78

BIG-IP AFM logging 79

Troubleshooting 84
BIG-IP AFM network firewall modes 86

Rule actions 91

Policy compilation 91

Logging 92

Statistics 94

Common troubleshooting tasks 96

Troubleshooting using BIG-IQ 100

Stateful failover using connection mirroring 102

DoS statistics output 102

IP intelligence 103

Optimize the support experience 106


F5 technical support commitment 106

F5 certification 107
iv
Review self-help options 108

F5 global training services 111

Engage support 112

Send information to Support 118

Legal Notices 123


Publication date 123

Copyright 123

Trademarks 123

Patents 123

Notice 124

v
ACKNOWLEDGEMENTS

Acknowledgements
Executive sponsor: Julian Eames, Executive Vice President and Chief Operations Officer

Publisher and project manager: Jeanne Lewis

Content and production editor: Andy Koopmans

Project team, writers, editors, and testers: James Affeld, Steve Brown, Chris Christian, Michael Earnhart, Brandon Frelich,
Brian Lawrence, Tikka Nagi, Nilesh Mistry, Dawn Moullet, Ryan Nelson, Brian Van Lieu, and Fred Wittenberg

BookSprints facilitator, designer, editor, and support team:Mark Brokering, Henrik van Leeuwen, Katerina Michailidi, Laia
Ros, and Raewyn Whyte. For information about the BookSprints process, see the BookSprints web site. (This link takes you to
an outside resource.)

Content, support, and assistance: Don Martin, Vice President, Global Services Strategic Programs; the Global Services New
Product Introduction Team, Bryan Gomes, Ilana Trager, Andy Franklin, Phillip Esparza, Derek Smithwick, Beth Naczkowski, Joe
Taylor, Mark Kramer, Andrew Pemble, Dave Bowman, Jim Williams, David Katz; and the rest of the Global Services management
team

1
ABOUT THIS GUIDE
Limits of this guide

About this guide


This guide includes recommended maintenance, tuning, and monitoring procedures related to F5 BIG-IP Advanced Firewall
Manager (AFM) 12.0.

The goal of this guide is to assist customers with keeping their BIG-IP system healthy, optimized, and performing as designed. It
was written by F5 engineers who assist customers with solving complex problems every day. Some of these engineers were
customers before joining F5. Their unique perspective and hands-on experience has been used to serve the operational and
maintenance guides F5 customers have requested.

This guide describes common information technology procedures and some that are exclusive to BIG-IP systems. There may be
procedures particular to your industry or business that are not identified. While F5 recommends the procedures outlined in this
guide, they are intended to supplement your existing operations requirements and industry standards. F5 suggests that you read
and consider the information provided to find the procedures to suit your implementation, change-management process, and
business-operations requirements. Doing so can result in higher productivity and fewer unscheduled interruptions.

For information on how to help improve future versions of this guide, see Feedback and notifications.

Before using this guide


You will get the most out in this guide if you have already completed the following items, as appropriate to your implementation:

Installed your F5 platform according to its requirements and recommendations. Search the AskF5 Knowledge Base for
platform guide to find a selection of platform guides.

Followed the general environmental guidelines in the hardware platform guide to make sure of proper placement, airflow,
and cooling.

Set recommended operating s for your industry, accounting for predictable changes in load. For assistance, you can
contact F5 Professional Services.

Familiarized yourself with F5 technology concepts and reviewed and applied appropriate recommendations from the F5
BIG-IP TMOS: Operations Guide.

Common terms and concepts


This guide also assumes that you have some familiarity with various layer-7 HTTP concepts, such as URI/URL, method, header,
cookie, status code, request, response, and parameters.

Note Distributed denial-of-service (DDoS) is referred to generically as


denial-of-service (DoS) in the BIG-IP Configuration utility.

Limits of this guide


This guide does not address installation, setup, or configuration of your BIG-IP system or modules.

2
ABOUT THIS GUIDE
Customization

There is a wealth of documentation covering these areas in the AskF5 Knowledge Base. The F5 self-help community,
DevCentral, is also a good place to find answers about initial deployment and configuration. You can find additional resources
detailed in Acknowledgments. The following figure shows where this guide can best be applied in the product life cycle.

Figure 0.1 F5 documentation coverage

Glossary
A glossary is not included in this guide. Instead, F5 Glossary and Terms offers an up-to-date and complete listing and
explanation of common industry and F5-specific terms.

Customization
Customization may benefit your implementation. You can get help with customization from a subject matter expert, such as a
professional services consultant from F5 Professional Services.

3
ABOUT THIS GUIDE
Document conventions

Issue escalation
See Optimize the support experience for issue escalation information.

If you have an F5 WebSupport contract, you can open a support case by clicking Open a support case on the AskF5
Knowledge Base home page.

Feedback and notifications


F5 welcomes feedback and requests. You are invited to fill out and submit the surveys at the end of each chapter in the
interactive PDF version of this guide.

F5 operations guides are updated frequently, and new guides are being written. If you would like to be notified when new content
is available, email opsguide@f5.com and your name will be added to our distribution list for updates and new releases.

Document conventions
To help you easily identify and understand important information, the document in this guide uses the stylistic conventions
described here.

Examples
All examples in this document use only private IP addresses. When you set up the configurations described, use valid IP
addresses suitable to your own network in place of our sample addresses.

References to objects, names, and commands


We apply boldface to a variety of items to help you easily pick them out of a block of text. These items include utility names,
interface labels, file names, specific web addresses, directories, and IP addresses.

Configuration utility
The BIG-IP Configuration utility is the name of the graphic user interface (GUI) of the BIG-IP system and its modules. It is a
browser-based application you can use to install, configure, and monitor your BIG-IP system.

Configuration utility menus, sub-menus, links, and buttons are formatted in bold text. For more information about the
Configuration utility, see Introducing BIG-IP Systems in BIG-IP Systems: Getting Started Guide.

Command-line syntax
We show command line input and output in Courier font.

The corresponding # prompt is not included. For example, the following command shows the configuration of the specified pool
name:
tmsh show /ltm pool my _ pool

4
ABOUT THIS GUIDE
Document conventions

The following table explains additional special conventions used in command line syntax:

Table 0.1: Command-line syntax conventions

Character Description
<> Identifies a user-defined variable parameter. For example,
if the command has <your name>, type in your name but
do not include the brackets.
[] Indicates that syntax inside the brackets is optional.
Indicates that you can type a series of items.

Traffic Management Shell syntax


The BIG-IP system includes a tool known as the Traffic Management Shell (TMSH) that you can use to configure and manage the
system from the command line. Using TMSH, you can configure system features and set up network elements. You can also
configure the BIG- IP system to manage local and global traffic that is passing through the system, and view statistics and system
performance data.

You can run TMSH and issue commands in the following ways:

You can issue a single TMSH command at the BIG-IP system prompt using the following syntax:
tmsh [command] [module . . . module] [component] (options)

You can open the TMSH utility by typing tmsh at the BIG-IP system prompt:
#tmsh
(tmos)#

Once at the (tmos) prompt, you can issue the same command syntax, leaving off tmsh at the beginning.

For the sake of brevity, all TMSH commands provided in this guide appear in the first previous example.

You can use the command line utilities directly on the BIG-IP system console, or you can run commands using a remote shell,
such as the SSH client or a Telnet client. For more information about command line utilities, see Bigpipe Utility Reference Guide
or the Traffic Management Shell (tmsh) Reference Guide.

5
ABOUT THIS GUIDE
Change list

Change list
Date Chapter/Section Change Reason

Packet Flow
July 2016 Updates for BIG-IP 12.1 BIG-IP 12.1 release
Denial of Service

6
INTRODUCTION
BIG-IP AFM features

Introduction
BIG-IP AFM delivers the most effective network-level security for enterprises and service providers. Whether on-premises or in a
software-defined data center, BIG-IP AFM tracks the state of network sessions, maintains application awareness, and mitigates
threats based on more attack details than traditional network firewalls. BIG-IP AFM also protects your organization from
aggressive distributed denial-of-service (DDoS) attacks before they can reach your data center.

Uninterrupted data center services


BIG-IP AFM ensures traffic isnt interrupted even under the most intense attacks, protecting the data center and the applications
behind it. BIG-IP AFM scales to support millions of concurrent connections per second and provides more hardware-based
vectors than other network firewalls.

Deep attack visibility


BIG-IP AFM helps operators respond to threats quickly and with a full understanding of their security status. It provides
summaries of current attack events, customizable reports, in-depth logging of attack details, and integration with Security
Information and Event Management (SIEM) tools.

Comprehensive DDoS defense


DDoS attacks can enter the network on a variety of protocolsincluding known bad actors, malformed packets, slow-and-low,
and flood attack types. BIG-IP AFM uses the flexibility of the iRules scripting language, sophisticated filtering, immediate
blacklisting, and over a hundred built-in threat vectors to identify and mitigate DDoS attacks.

Note Distributed denial-of-service (DDoS) is referred to generically as


denial-of-service (DoS) in the BIG-IP Configuration utility.

The majority of DDoS attacks exploit the transport and network layers. Layer
7 DDoS attacks are a more sophisticated form of DDoS attack which mimic
human behavior as they interact with the user interface at the application
level.

Consolidated and strong security


BIG-IP AFM combines with other BIG-IP solutions to enhance security capabilities. It eliminates the need for single-point
products that support application delivery, application security, client-side protections, user access, and DNS security. That
means increased efficiency and lower total cost of ownership.

BIG-IP AFM features


The following are the main features offered by BIG-IP AFM:

App-centric policy enforcement unifies the application configuration with security parameters for tighter policy

7
INTRODUCTION
BIG-IP AFM features

enforcement.

Intelligent control automatically guards against known bad actors at the earliest traffic flow point. In BIG-IP AFM 12.1
and higher, bad actor treatment is expanded to cover most DoS vectors to help select and disable individual sources of
malicious traffic. Each bad actor is handed off to IP intelligence and dropped for a configurable period of time

Layer-3 and layer-4 attack protection terminates all connections and runs checks to identify and mitigate network-
level threats before they reach the data center.

Centralized management enables efficient deployment and management for a consistent and effective security
posture across an expanding set of firewall devices.

High-volume logging controls log DDoS events, provide controls that prevent log servers from becoming
overwhelmed, and support SNMP, SIP, DNS, and IPFIX collectors.

ScaleN Virtual Clustered Multiprocessing (vCMP) consolidates multiple firewalls onto a single device for more
flexible and isolated allocation of resources.

8
PACKET FLOW
Packet flow in BIG-IP hardware

Packet flow
Unlike a firewall, which filters traffic based on internal versus external interfaces, BIG-IP AFM processes traffic through any
non-management interface using the same ingress to egress packet flow method. This means the packet processing is handled
the same way, regardless of the BIG-IP AFM interface being traversed.

The following figure provides an overview of the packet processing path as it traverses BIG-IP AFM.

Figure 1.1 BIG-IP AFM packet processing

Packet flow in BIG-IP hardware


When a packet arrives at the ingress interface on a BIG-IP system, it is first processed by enhanced Packet Velocity Accelerator
(ePVA). The ePVA chip is a hardware acceleration Field Programmable Gate Array (FPGA) that delivers high-performance layer-4
IP throughput. The use of an FPGA allows the ePVA firmware to be updated, as required, for future upgrades and hotfixes.

For more detailed information on platforms which include the ePVA chips, see AskF5 article: SOL12837: Overview of the ePVA
feature.

Flow lookup
The system has two flow tables:

Hardware flow table, which is maintained in the ePVA.

9
PACKET FLOW
Packet flow in BIG-IP AFM software

Software flow table, maintained by F5TMOS.

When a new packet is received, the BIG-IP system performs flow lookup by querying the hardware flow table.

The packet process flows in the following sequence:

1. If the BIG-IP platform uses ePVA hardware acceleration and the flow matches the hardware flow table, then the packet is
processed and sent directly to egress.

2. If there is a match on the hardware flow table, the packet is passed on to flow input for post L4 processing, in the direction
of egress.

3. If there is not match to an existing flow, the packet is processed for IP intelligence and L2-L7 DoS protection before being
passed on to TMOS flow lookup.

IP intelligence hardware
The ePVA is also used to process and implement IP intelligence rules to block malicious actors. If DoS sweep protection detects
a bad actor or group of actors, it can set an auto-blacklist. It can also signal the ePVA to drop the offending IP addresses in
hardware on some BIG-IP platforms so that they are not sent to software for further processing.

DoS protection hardware


DoS attacks can also be mitigated in hardware. Many attack vectors such as bad headers, floods, and fragmented packets are
processed in hardware and mitigated using the ePVA chip. Mitigating these attacks using hardware rather than software
improves performance of the BIG-IP device.

For more detailed information on hardware-processed attack vectors, see BIG-IP Systems: DoS Protection and Protocol Firewall
Implementations Manual.

Packet flow in BIG-IP AFM software


Packets that are not handled by BIG-IP hardware are examined by BIG-IP AFM software in a series of contexts. A context is the
category of object to which a rule applies. Rules can be global and apply to all addresses on the BIG-IP system that match the
rule, or they can be specific, applying only to a specific virtual server, self IP address, route domain, or the management port.

Flow lookup
At packet ingress, TMOS checks to see if the packet is associated with an already established flow. During software flow lookup,
BIG-IP AFM tries to match the packet to an entry in the software connection flow table. There are two possible results:

If the packet does not match an existing flow, it is considered a new connection. TMOS then tests the packet against
L2-L4 DoS protection, listener lookup, IP intelligence, and the network firewall contexts.

If the packet does match a software flow connection table entry, TMOS sends it to flow input, bypassing the flow lookup
tests.

10
PACKET FLOW
Packet flow in BIG-IP AFM software

L2-L4 DoS protection


If an incoming packet exceeds the detection limit for that type of packet during L2-L4 DoS protection, an attack message is
logged.

If an incoming packet exceeds the rate limit for that type of packet, it is dropped.

DoS protection device configuration and DoS profiles provide different vector protections; however, applying DoS protection
device configuration is essentially the same as applying a DoS protection profile at the global context.

Auto-blacklisting option
Only theSingle Endpoint Sweepvector supports theauto-blacklistconfiguration option. If auto-blacklist is configured and
packets exceed the rate limit for Single Endpoint Sweep, DoS protection triggers IP Intelligence to block the source whether a
packet is legitimate or part of an attack.

Listener lookup
Listener lookup checks to see if the packets destination is valid.

If there is no listener at the packet destination address, the packet is dropped or rejected, depending on your configuration.

Reject Unmatched Packets setting


By default, the BIG-IP system is set to reject unmatched packets.

To change the setting to drop unmatched packets using the Configuration utility

1. Go to System >> Configuration : Local Traffic : General.

2. Under Properties go to Reject Unmatched Packets and clear the Enabled checkbox.

IP intelligence
IP address intelligence blocking can block requests from IP addresses that have questionable reputations.

IP intelligence is applied to packets in the global, route domain, and virtual server contexts. A set of IP intelligence policies can be
configured so that they might allow a packet to pass through at the global context and the route domain context, but drop it in a
virtual server context.

Network firewall
The BIG-IP AFM network firewall provides policy-based access control to and from address and port pairs, inside and outside of
your network.

The Network Firewall uses the same three context settings as IP intelligence: global, route domain, and virtual server. In each
context, the IP intelligence packet handling occurs first, followed by the network firewall handling:

11
PACKET FLOW
Post-L4 processing

IP intelligence global context, then network firewall global context.

IP intelligence route domain context, then network firewall route domain context.

IP intelligence virtual server context, then network firewall virtual server context.

For more information on the network firewall, see Firewall Rules.

Post-L4 processing
Packets are routed to post-L4 processing. Packets arrive through flow input after passing through hardware processing or
through flow accept after passing through both hardware and software processing.

Flow accept
Once a flow is accepted decisively or simply accepted at the virtual server/self-IP context, it reaches flow accept, where it is
recorded in the flow table and passed to the proxy for higher-level protocol processing.

Layer 7 DoS protection


Once the flow is accepted, BIG-IP AFM evaluates any L7 DoS protection profiles applied to the virtual server.

BIG-IP AFM includes L7 DoS profiles for DNS and SIP.

BIG-IP AFM 12.1 and higher allows you to specify the L7 protocol you would like to use. HTTP traffic allowed through a firewall
typically uses port 80, and malicious traffic often tunnels through this port. The L7 protocol option allows you to specify the port
you would like to use and it does not need to be the customary application port. You can then restrict traffic only suited to that
application. This ensures that holes in the firewall are being used for the intended applications.

For more detailed information on profiles, see DoS Protection and Protocol Firewall Implementations Detecting and Preventing
DNS DoS Attacks and DoS Protection and Protocol Firewall Implementations Detecting SIP DoS Attacks.

Protocol security
After L7 DoS protection profile processing, L7 protocol protection profiles are applied. These are available for HTTP and DNS
profiles.

The protocol security profile for DNS determines which DNS queries are permitted.

The protocol security profile for HTTP performs protocol checks, length checks, checks request types (for example GET and
POST), and file types. The profile can also send a custom response page to any requests that are blocked by the policy.

TMOS proxy
Traffic is passed to the proxy, where normal traffic processing by BIG-IP modules occurs. This may include BIG-IP ASM DoS
vectors to enhance the other layers of DoS protection covered by BIG-IP AFM.

12
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.

(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)

Did this chapter answer all of your questions about the subject matter? Yes No

If not, what information should be included that is not? 

Did you find any errors pertaining to subject matter in this chapter? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Send
FIREWALL RULES
Network firewall

Firewall Rules
The BIG-IPnetwork firewall uses rules to specify traffic handling actions. Rules are collected in policies, which are applied at the
global context, to a route domain, to a virtual server, or to a self IP address. Rules for the management port do not require a
policy, but are defined directly in the management port context.

The BIG-IP system itself provides some access control measures: packets that do not match a listener are dropped or rejected.
Additionally, application profiles, such as SIP, add more limits regarding the type of traffic that is permitted.

BIG-IP AFM provides the following control features:

Network Firewall provides full featured access control lists (ACLs).

IP Intelligence provides host-based controls paired with automation.

Protocol Security provides fine-grained controls for the DNS and HTTP protocols.

Network firewall

Figure 2.1 BIG-IP AFM network firewall processing flow

14
FIREWALL RULES
Network firewall

As shown in the previous figure, packet flow arrives at the BIG-IP network firewall. The network firewall uses a collection of
network ACLs to process it.

BIG-IP AFM applies the global, route domain, virtual server, and self IP contexts to the packets in order, each context looking for
an ACL match.

If no match is found, the Global Default Firewall Action or the Virtual Server & Self IP Default Firewall Action is
triggered.

If the flow matches a configured virtual server but no ACLs match within this context, the Virtual Server & Self IP Default
Firewall Action is triggered.

Network firewall components


Network firewall ACLs are grouped into polices and those policies contain rules or rule lists.

Rules may include protocol, source address and port, source VLAN, destination address and port, schedule, action, and
logging. BIG-IP AFM can also assign an iRule and a service policy to an individual firewall rule, allowing additional functionality to
be added to the network firewall.

You can apply a service policy, such as an idle timeout, to an ACL match rather than to a listener. Doing this enables you to
customize a policy at a granular level without requiring a large number of configuration objects.

You can use iRules within a firewall rule to allow scripting to be applied when an ACL-match occurs. Used with the FLOW_INIT
event, you can change ACL actions or other early flow items. iRules can also be triggered for higher-level events such as
HTTP_REQUEST.

In order to make all of the firewall objects reusable, BIG-IP AFM includes a number of lists that can be used in the policies.

Port list
The port list groups port numbers and port ranges. It contains a list of numbers that are not specific to any protocol. For
example, a list containing port 53 could be used to both TCP and UDP based DNS rules.

Address list
The address list contains IP addresses of a variety of types, including the following:

Single host IP address

Network CIDR block

Geolocation match

Nested address list

FQDN (requires DNS resolver)

15
FIREWALL RULES
IP intelligence

Rule list
The rule list is a grouping of individual rules.

F5 recommends using these lists for all aspects of rule creation. That is, all rules should be made up of address and port lists and
should only be created within a rule list. This practice simplifies administration in the long-term by allowing groups of components
to be used within rule lists or policies.

For more detailed information on rule lists, see BIG-IP Network Firewall: Policies and Implementations: Firewall Rules and Rule
Lists and BIG-IP Network Firewall: Policies and Implementations: Setting Timers with Service Policies.

IP intelligence
IP Intelligence is a firewall protection, separate from the network firewall, which examines only the source address of a packet. It is
possible to create network firewall rules and policies to block on source and destination address, but using IP intelligence makes
automation easier.

IP reputation subscription
An IP reputation database feed, provided by a third-party security vendor, serves as the first input source for IP intelligence.

F5 offers a built-in subscription that can be added to any existing BIG-IP AFM deployment.

Dynamic whitelist/blacklist
A dynamic whitelist/blacklist feed provides is another IP intelligence input source. It allows BIG-IP AFM to consume a custom
feed of IP addresses to be enforced.

The dynamic whitelist/blacklist feed may come from external sources, including firewall logs, IPS alerts, or other sources of
known bad actors.

The format of the feed must contain an IP address and may contain several optional fields.

For more information see IP Intelligence in Network Firewall in BIG-IP Network Firewall: Policies and Implementations.

Single endpoint Sweep attack


BIG-IP AFM single endpoint Sweep vector protection can identify and rate-limit bad actors. IP addresses identified and
categorized may be blocked automatically by IP intelligence if the policy action is set to block.

There is a limit of 100 bad actors on all platforms other than the VIPRION 2250 blade because this is the maximum that the single
endpoint Sweep can handle. The 2250 blade implements IP intelligence in hardware, so it can drop traffic from bad actors before
DoS Protection sees it. This allows the single endpoint Sweep vector to move on to another set of 100 bad actors on that
platform. On all other platforms, IP intelligence acts after software DoS Protection. In these cases DoS Protection continues to
see traffic from the bad actors.

16
FIREWALL RULES
IP intelligence

Manual blacklist entries


If you need to manually block an address, you can create a blacklist category to configure policy-based responses to specific
types of addresses. You can then assign a blacklist category to an IP address. This allows you to filter addresses by category
and to configure responses on a per-category basis.

To create a blacklist category

1. Go to Security >>Network Firewall:IP Intelligence:Blacklist Categories.

The Blacklist Categories screen opens.

2. ClickCreateto create a new IP Intelligence blacklist category.

3. In theNamefield, type a name for the blacklist category.

4. In theDescriptionfield, type a description for the blacklist category.

5. ClickFinished.

IP intelligence whitelist
IP intelligence uses a comprehensive whitelist feature. F5 recommends including critical infrastructure on it.

You can add whitelist IP addresses to your configuration automatically by setting up feeds and capturing them with a feed list.

To create a feed list

1. Go to Security:Network Firewall:IP Intelligence:Feed Lists.

The Feed Lists screen opens.

2. ClickCreateto create a new IP Intelligence feed list.

3. In theNamefield, type a name for the feed list.

4. Configure Feed URLs with an HTTP, HTTPS, or FTP URL, the list type, the blacklist class, and the polling
interval. Specify a username and password, if required to access the feed list.

A feed URL includes the actual URL to the text file, and information about the defaults for that file. Within the feed
file, however, any URL can be configured to be a whitelist or blacklist entry, and assigned to a blacklist class.

5. Click theAddbutton to add a feed URL to the feed list.

6. ClickFinished.

17
FIREWALL RULES
Protocol security

Note The IP intelligence whitelist only prevents IP intelligence from dropping


traffic from hosts included on it: DoS and the network firewall do not honor
the IP intelligence whitelist and will drop traffic from those entries if their
conditions to do so are met.

Classification for tracking


Use a custom category for classification by auto-blacklist to track the mechanism that classified the host. One possible
classification name is auto-blacklist. If several IP intelligence policies are used, it may be useful to identify those policies by
unique classification names.

Classification for performance


Applying BIG-IP classification categories forces an iprepd lookup in the IP reputation database. This can significantly slow
performance. F5 recommends using custom categories for feed lists and auto-blacklist to avoid performance degradation.

For information on configuring IP intelligence, see Enabling IP Intelligence in BIG-IP Local Traffic Manager: Implementations.

Protocol security
Protocol security allows restrict of application behavior for the DNS and HTTP protocols. Protocol Security profiles are applied to
application profiles which are applied to virtual servers.

DNS protocol security profile


A DNS protocol security profile provides a filter for DNS queries. Use the profile to specify the types of DNS record queries which
will be allowed (or inversely, disallowed).

A DoS protocol security profile is applied to a Local Traffic DNS profile. It is a prerequisite for using DoS Protection profiles for
DNS.

HTTP protocol security profile


The HTTP Protocol Security profile offers protocol checks, request checks, and a blocking page to respond to denied requests.

HTTP protocol checks


The following HTTP protocol checks are disabled by default. F5 recommends enabling them:

18
FIREWALL RULES
Protocol security

Table 2.1: HTTP Protocol Checks Disabled By Default

HTTP Protocol Check Details

POST request with Content-Length: 0 A POST should always have non-zero length.

Body in GET or HEAD requests A GET or HEAD request should not have body.

Some HTTP protocol checks are only appropriate for particular web applications which may have clients that exhibit unusual
behavior.

To decide whether or not the HTTP protocol checks are suitable for your application, F5 recommends using the guidelines in the
following table:

Table 2.2: HTTP Protocol Checks Guidelines

HTTP Protocol Check Details

Null in request body When an application handles text, a null character


generally indicates the end of the string. Data coming
after the null may represent an injection attack or
other misbehavior. However, a client request to upload
binary data (for example, an image file) will trigger a
false positive alert for this check if it is enabled.

High ASCII characters in headers High ASCII may hide injected code which the
application might eventually map to regular ASCII. It is
highly unusual for a client to have a legitimate need to
do this. Unless such a client is used, enable this check.

Host header contains IP address Most web applications (such as web browsers) use
a domain name in the Host header. IP addresses
are valid, but are commonly used by bots. Some
mobile applications use IP addresses. If the expected
application traffic is entirely from normal web
browsers, enable this check.

By default, an HTTP protocol security profile triggers alarms but does not block traffic.

F5 recommends that you enable Block after a period of tuning your policy to avoid false positives.

Evasion techniques checks


Evasion techniques checks detect suspicious requests for URLs that are in complex formats. Such formats often indicate an
attempt to conceal the request from scrutiny by application firewalls and intrusion prevention.

For example:
/webroot/legit-directory/../../../etc/shadow

Other examples include the use of obscure encodings (multiple encoding, UNICODE, ASCII, and others). The web server

19
FIREWALL RULES
BIG-IP AFM rules

decodes these and may be ignored or misunderstood by security devices.

Some legitimate clients may present behavior that appears evasive. F5 recommends reviewing alarms to determine a false
positive rate and enabling blocking if that rate is acceptable.

Request checks
Requests checks options inspect requests. By default, the checks are set to trigger an alarm, not to block traffic.

Request Checks can be set to Alarm or Block, based on configuration.

Length Checks: You can configure settings for URL length, Query String length, Request length, and POST Data length.
F5 recommends alarming on these checks and enabling Blocking if the false positive rate is acceptable.

Methods: You can select HTTP methods to accept (for example GET, HEAD, and POST).
F5 recommends blocking undesired request methods.

File Types: You can select the file types to accept.


F5 recommends blocking requests for undesired file types.

Mandatory Headers: You can select or create custom headers.


F5 recommends blocking requests that do not include mandatory headers.

Blocking page
The profile can return a blocking page in response to a blocked request. You can use the default response, create a custom
response, redirect to a URL, or use a Simple Object Access Protocol (SOAP) error message.

BIG-IP AFM rules


Rule tracking and commenting
F5 recommends the description fields to track rules. These fields include the name, identity, and login of the person who created
the rule, the date and time of rule creation, and change ticket or other system ID information, if it exists.

Tracking can help determine change details, which is useful when a change generates an outage or needs to be justified to an
auditor, or simply as documentation for future operators.

For consistency and ease of use, F5 recommends using a predetermined, standardized format when entering this data.

Rule efficiency
BIG-IP AFM 12.0 introduces performance optimizations for the rules compiler that can produce smaller, faster compiled policies
from previous versions of BIG-IP AFM. Complex rules with multiple lists and ports can now be compiled more efficiently than
previous versions.

20
FIREWALL RULES
BIG-IP AFM rules

Rule expiration
When creating standardized descriptions for firewall rules, consider adding an expiration date in the description section, when
applicable.

Expiration dates can assist during firewall audits and help to avoid leaving a temporary troubleshooting rule in place that was
intended to be used for only a short time period.

Note Rule expiration is not meant to be used as a function of the BIG-IP AFM
expiration scheduling feature. The expiration scheduling feature is a separate
function, available within a firewall rule.

Redundant and conflicting rules


When creating firewall rules, it is possible a new rule can either overlap or conflict with an existing rule.

Redundant rule: A rule which has address, user, region, or port information that completely overlaps with another rule
with the same action. Redundant rules should be removed to simplify policy management.

Conflicting rule: A conflicting rule is a special case of a redundant rule, in which address, user, region or port
information overlaps with another rule, but the rules have different actions, and thus conflict.

Note A rule may be identified as conflicting with another rule, even if the
result of applying the two is the same. For example, two rules designed to
accept packets and applied to the same IP address can be identified as in
conflict if one is configured to Accept and the other is configured to Accept
Decisively. Accept and Accept Decisively can lead to different behaviors
based on the context and design of the firewall rule set.

To view redundant and conflicting rules in the Configuration Utility

1. Go to Security >> Network Firewall : Rules List.

2. Redundant or conflicting rules are indicated in the State column.

To view redundant and conflicting rules using TMSH at the command line

Type the following command:


tmsh show security firewall policy POLICY _ NAME rules overlapping-status

Rule hit count


You can use Rule Hit Count to analyze rule usage as part of firewall maintenance. It can help diagnose stale rules based on low
or even zero usage, or the timestamp of the last hit time. You may consider resetting Rule Hit Count for a targeted rule to zero
and then waiting for a period of time to assist with determining if a rule has indeed become stale.

21
FIREWALL RULES
BIG-IP AFM policies

To reset the stats of an individual global rule using TMSH at the command line

Type the following command


tmsh reset-stats security firewall global-rules {enforced-policy-rules {
rule-5 }}

BIG-IP AFM policies


BIG-IP AFM policies are collections of rules or rule lists, applied in context.

Contexts
With the BIG-IPnetwork firewall, you use a context to configure the level of specificity of a firewall rule or policy. Firewall policies
can be applied at the global, route domain, virtual server/self IP contexts.

Depending on your organizations needs, you may prefer to put all active rules in a single policy applied at the global context or
apply firewall policies for specific virtual servers. The latter allows for application-specific policies to be developed and applied
only where required. When processing policies and rules on a virtual server, only those specific to the application are processed.

Staging
Policies can be enforced or staged within a context. A staged policy logs rule matches and increment statistics but does not take
any enforcement actions.

A staged policy previews a policys effect if enforced. A staged policy can easily be promoted to enforced policy once youve
validated the policys effects.

Logged messages can be filtered by the keywords Staged and Enforced.

Compile and deploy policy changes


BIG-IP AFM allows multiple edits to a policys rules before you commit all the changes. By default, the changes start compiling as
soon as they are committed. However, you can set Firewall Compilation Mode to manual.

To change Firewall Compilation Mode to manual

1. Go to Security >> Options : Network Firewall.

The Firewall Options screen opens.

2. In the Firewall Policy Management section, for Firewall Compilation Mode, select Manual.

3. Click Update.

When Firewall Compilation Mode is set to Manual, changes to a firewall policy cause the policy to enter Pending Rules
Compilation status. This status line displays in the upper left-hand corner in the Configuration utility (see the following figure):

22
FIREWALL RULES
BIG-IP AFM policies

Figure 2.2 Firewall: Pending Rules Compilation in the Configuration utility

To commit manual changes to a firewall policy

1. Click Firewall: Pending Rules Compilation.

2. Security, Event Logs, Network, Policy Status opens.

3. Click Compile.

4. Status line changes to Firewall: Pending Rules Deployment (see the following figure):

Figure 2.3 Firewall: Pending Rules Deployment in the Configuration utility

To deploy manual changes to a firewall policy

1. Click Deploy.

The following policy information displays:

Firewall Policy Status: Consistent.

Compilation Start Time: <start time>.

Compilation End Time: <end time>.

Last Successful Compilation Time: <time of deployment>.

23
FIREWALL RULES
BIG-IP AFM policies

The status line changes to Firewall: Consistent.

Figure 2.4 Firewall: Consistent in the Configuration utility

If the Network Firewall Options for Firewall Policy Management is configured so that Log Configuration Changes is set
on and either Firewall Compilation Mode or Firewall Deployment Mode is set to Manual, the following entries display as
compilation and deployment progresses:

Compilation Start

Compile Success

Deploy Start

Deploy Success

Firewall compilation and deployment modes


Set the compilation and deployment mode to Manual to collect several rule changes, and then compile and deploy them all at
one time. F5 recommends turning the logging to On so that all policy changes are logged. This assists with version control and
roll back.

Warning: Large policy changes that are being compiled and deployed may
put load on logging.

To set Firewall Compilation and Deployment modes

1. Go to Security >> Options : Network Firewall. The Firewall Options screen opens.

2. From the Firewall Compilation Mode list, select the compilation mode for the firewall rule set.

Select Automatic to compile the firewall rule set whenever a change is made to any firewall item that is used
in the firewall rule set.

Select Manual to delay compilation of the firewall rule set, collect all firewall rule changes, and apply the entire

24
FIREWALL RULES
BIG-IP AFM policies

set of changes manually at another time.

3. From the Firewall Deployment Mode list, select the deployment mode for firewall rule set changes.

Select Automatic to deploy the firewall rule set whenever a change is compiled, either manually or
automatically.

Select Manual to delay deployment of the firewall rule set, collect all compiled firewall rule set changes, and
deploy the entire set of changes manually at another time.

4. From the Log Configuration Changes list specify the logging option for firewall rule set compilation and
deployment configuration changes.

Select Automatic to specify that configuration changes are logged only if Firewall Compilation Mode or
Firewall Deployment Mode is set to Manual.

Select On to specify that policy configuration changes are always logged.

Select Off to specify that policy configuration changes are not logged.

Validate rule sets


Requests to validate rules or policies occur frequently. Maintaining optimized firewall rule sets is a requirement for an efficiently
performing firewall.

As part of firewall maintenance, regularly validate expired rules, unused rules, conflicting rules, and rules not ordered correctly.

Review redundant, conflicting, and stale policy rules


View and remove redundant or conflicting rules to simplify the configuration and ensure that the system takes the correct actions
on packets.

To view and remove redundant and/or conflicting policy rules

1. Go to Security >> Network Firewall : Active Rules.

The Active Rules screen opens.

2. From the Type list, select Enforced or Staged policies, as appropriate.

3. View the firewall rule states in the State column.

Each rule is listed as Enabled, Disabled, or Scheduled. In addition, a rule can have one of the states listed
below. View and adjust rules with these states, if necessary.

Redundant The rule is enabled, disabled, or scheduled, and redundant. All the functionality of this rule is
provided by a previous rule or rules. Hover over the State column to see why the rule is considered redundant,

25
FIREWALL RULES
BIG-IP AFM iRules

and possible solutions.

Conflicting The rule is enabled, disabled, or scheduled, and conflicting. All the match criteria of this rule is
covered by another rule or rules, but this rule has a different action. Hover over the State column to see why
the rule is considered conflicting, and possible solutions.

Conflicting & Redundant The rule is enabled, disabled, or scheduled, and conflicting or redundant with the
actions of more than one other rule.

4. Resolve conflicting or redundant rules by editing, deleting, or disabling them. To edit, delete, or disable a rule,
click the name and complete the required action.

View and remove unused or infrequently used rules


The system must have staged or enforced rules configured on it, and the system must be processing traffic, to determine
whether rules are hit.

View unused rules to reduce firewall processing and simplify the rules, rule lists, and policies.

The BIG-IP AFM records the ACL hit count and the last hit time in the Configuration utility and TMSH for ease of identifying
unused or infrequently used rules.

BIG-IP AFM iRules


BIG-IP AFM provides support for iRules as another way to intercept and modify network traffic passing through BIG-IP. BIG-IP
AFM-specific iRules can be defined either inside a BIG-IP AFM firewall rule or by attaching these to a virtual server.

If an iRule is defined within a firewall rule, it is called when the firewall rule is processed.

If the iRule is attached to a virtual server, the iRule is called after BIG-IP AFM firewall rules have been processed.

To create a new iRule using the Configuration utility

1. Go Local Traffic >> iRules : iRules List : Create.

2. Enter a name for your iRule.

3. Enter your iRule in the Definition area.

4. Click Finished.

26
FIREWALL RULES
BIG-IP AFM iRules

BIG-IP AFM iRules commands


FLOW_INIT supports the following commands:

Table 2.3: FLOW_INT Supported Commands

Command Action

Log Generates and logs specified messages.

Drop Drop packets (silently).

Reject Rejects packets (with RST packet).

Node Redirects to specified remote host, which could be another virtual server or pool
member.

Virtual Redirects to the specified virtual server.

Pool Directs the connection to the specified pool.

TCP::[close | respond] Closes a TCP connection or sends the specified data directly to the peer.

IP::[client_addr|local_ Obtain the client IP address or the IP of the virtual server.


addr|tos|ttl|version]

FLOW_INIT
BIG-IP AFM iRules can perform the same actions as firewall rules. You can use the FLOW_INIT event in BIG-IP iRules to override
an ACL action, to control bandwidth on client and server flows, and to route to another VIP.

FLOW_INIT is triggered once for TCP and unique UDP/IP flows.

For more information on iRule events see Master List of iRule Events.

FLOW_INIT supports the following actions:

Table 2.4: FLOW_INT Actions

Action Description

Default Uses the default action on the ACL rule

Drop Drops the connection

Reset Resets the connection

27
FIREWALL RULES
Rules and policies troubleshooting

Action Description

Allow Allows the connection and proceed to the next ACL

Allow-final Allows the connection and bypass any further ACL. Allow-final is equivalent to
Accept-Decisively.

BIG-IP AFM iRules logging


BIG-IP AFM event logs do not log iRules actions. Network firewall event logs and reporting screens only show the actions of
firewall rules in which iRules are nested.

If a firewall rule is configured to accept traffic but an iRule rejects the traffic, the event logs show the traffic as Accepted.

To log iRules actions, you need to use statements:

For local logging (var/log/ltm) use log local0.

For remote HSL use the HSL iRule facilities HSL::open and HSL::send.

BIG-IP AFM iRules Sample


The following sample BIG-IP AFM bypass iRule allows a single IP address to bypass the BIG-IP AFM firewall and log the
occurring event to a remote syslog location.
when FLOW _ INIT {
set hsl [HSL::open -publisher /Common/hsl _ syslog _ pub]
set log _ format Client IP address [IP::remote _ addr], Destination Port:
[TCP::local _ port]
if { [IP::remote _ addr] equals 10.10.10.20 } {
HSL::send $hsl [info hostname]|$log _ format| MSG: Pen Tester bypassing
AFM rules
ACL::action allow-final
}
}

Rules and policies troubleshooting


There are daemons and commands available to help troubleshoot your firewall rules and policies:

The iprepd daemon retrieves IP reputation databases using third-party subscriptions.

The dwbld daemon retrieves feed lists configured and managed by the user. It logs to /var/log/dwbl/dwbld.log. A db key
governs the log level, but for this daemon debug logging does not add much detail to the output.

28
FIREWALL RULES
Rules and policies troubleshooting

To force a feedlist load using TMSH at the command line

Type the following command syntax:


tmsh load /security ip feed <FEEDLIST NAME| ALL>

To see view the classification of an IP address using TMSH at the command line

Type the following command syntax:


tmsh show /security ip info address <IP ADDRESS>

To add a host to a classification using the Configuration utility

Go to Security >> Network Firewall : IP Intelligence : Black List Categories

To add a host to a classification using TMSH at the command line

Type the following command syntax:


tmsh run /security ip category name <CATEGORY> ip-ttl add { <IP ADDRESS>
}

To delete a host from a classification, using TMSH at the command line

Type the following command syntax:


tmsh run /security ip category name <CATEGORY> ip-ttl delete { <IP
ADDRESS> }

Rules and policies troubleshooting


There are daemons and commands available to help troubleshoot your firewall rules and policies:

The iprepd daemon retrieves IP reputation databases using third-party subscriptions.

The dwbld daemon retrieves feed lists configured and managed by the user. It logs to /var/log/dwbl/dwbld.log. A db
key governs the log level, but for this daemon debug logging does not add much detail to the output.

To force a feedlist load using TMSH at the command line

Type the following command syntax:


tmsh load /security ip feed <FEEDLIST NAME| ALL>

To see view the classification of an IP address using TMSH at the command line

Type the following command syntax:


tmsh show /security ip info address <IP ADDRESS>

To add a host to a classification using the Configuration utility

Go to Security >> Network Firewall : IP Intelligence : Black List Categories

29
FIREWALL RULES
Rules and policies troubleshooting

To add a host to a classification using TMSH at the command line

Type the following command syntax:


tmsh run /security ip category name <CATEGORY> ip-ttl add { <IP ADDRESS>
}

To delete a host from a classification, using TMSH at the command line


tmsh run /security ip category name <CATEGORY> ip-ttl delete { <IP
ADDRESS> }

Note If a host is listed under several classifications, you need to delete the
host from every classification that has an undesired policy action defined.
Example: 10.10.10.10 is classified under botnets and spam_sources, and
both are dropped by the relevant IP intelligence policy. Deleting it from
botnets will not affect its membership in spam_sources, and its traffic will be
dropped by IP intelligence.

You can also check /var/dwbl/.cache/* to see if the system is healthy. The
cache is refreshed every cycle, which should be every five minutes.

Feed List
If the BIG-IP system connects to the Internet using a forward proxy server, use the following commands to set these system
database variables.

To specify the host name of the proxy server using TMSH at the command line

Type the following command syntax:


tmsh modify sys db proxy.host valuehostname

To specify the port number of the proxy server using TMSH at the command line

Type the following command syntax:


tmsh modify sys db proxy.port valueport _ number

To specify the user name to log in to the proxy server using TMSH at the command line

Type the following command syntax:


tmsh modify sys db proxy.username valueusername

30
FIREWALL RULES
Rules and policies troubleshooting

To specify the password to log in to the proxy server using TMSH at the command line

Type the following command syntax:


tmsh modify sys db proxy.password valuepassword

To check the BIG-IP DNS client configuration using the Configuration utility

Go to System >> Configuration : Device : DNS.

31
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.

(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)

Did this chapter answer all of your questions about the subject matter? Yes No

If not, what information should be included that is not? 

Did you find any errors pertaining to subject matter in this chapter? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Send
NETWORK ADDRESS TRANSLATION (NAT)
Rules and policies troubleshooting

Network Address Translation (NAT)


A Network Address Translation (NAT) is a mapping of one IP address to another IP address. This mapping can be a translation of
source, destination, or both. A NAT can be outbound or inbound.

Outbound NAT
Outbound NAT translates an internal source address to a public address. A NAT can also be used to translate an internal nodes
IP address to an Internet routable IP address.

Figure 3.1 Outbound NAT

Inbound NAT
Inbound NAT translates a public destination address to an internal address. When an external client sends traffic to the public IP
address defined in a NAT, BIG-IP translates that destination address to the internal node IP address.

33
NETWORK ADDRESS TRANSLATION (NAT)
Rules and policies troubleshooting

Figure 3.2 Inbound NAT

To create NAT to allow translation of one IP address to another using the Configuration utility

1. Go to Local Traffic >> Address Translation >> NAT List.

A list of NATs on the system displays.

2. Click the Create button.

3. In the Name field, type a name for the NAT.

4. In the NAT Address field, type the IP address to use as the translation address, that is, the address to which
the origin address will be translated.

5. In the Origin Address field, type the IP address of the node to which the translation will be applied.

6. Configure the remaining settings or retain the default values.

Note A virtual server cannot be the origin address.

34
NETWORK ADDRESS TRANSLATION (NAT)
SNAT

To create a new NAT using TMSH at the command line

Type the following command syntax:


tmsh create /ltm nat <NAME> originating-address <IP ADDRESS>
translation-address <IP ADDRESS>

At the end of this task, the NAT appears in the list of NATs on the system.

To view pre-existing NAT configuration using the Configuration utility

Go to Local Traffic >> Address Translation : NAT List.

A list of NATs on the system displays.

To view a new NAT using TMSH at the command line

Type the following command


tmsh show /ltm nat all

NAT can leverage IPv6, IPv4 or translate between the two for either the client or server side of the connection.

For more detailed information NATs and SNATs, see NATs and SNATs in BIG-IP TMOS: Routing Administration.

SNAT
NAT, by design, is a one-to-one operation, while Secure Network Address Translation (SNAT) can be used to map many IP
addresses to one IP in order to hide the source IP network(s).

Inbound SNAT
In the most common client-server network configuration, the BIG-IP address translation mechanism ensures that server
responses return to the client through the BIG-IP system.

Clients and servers on the same subnet


To load balance requests to server nodes that are on the same subnet as the client nodes, create a SNAT so that server
responses are sent back through the BIG-IP rather than directly from the server node to the client node. Otherwise, problems
can occur such as the client (172.16.1.30) rejecting the response because the source of the response (172.16.20.1) does not
match the destination of the request (172.16.1.100).

35
NETWORK ADDRESS TRANSLATION (NAT)
SNAT

Figure 3.3 SNAT On Same Network Using 172.16.0.0/16

BIG-IP system is not server node default gateway


Sometimes a servers default route cannot be defined to be a route through the BIG-IP system. This can cause problems such
as the client rejecting the response because the source of the response does not match the destination of the request.

The solution is to create a SNAT. The BIG-IP system then translates the client nodes source IP address in the request to the
SNAT address, causing the server node to use that SNAT address as its destination address when sending the response. This,
in turn, forces the response to return to the client node through the BIG-IP system rather than through the server default
gateway.

36
NETWORK ADDRESS TRANSLATION (NAT)
SNAT

Figure 3.4 SNAT used when BIG-IP is not the default route

Outbound SNAT
When an internal server initiates a connection to an external host, a SNAT can translate the internal source IP addresses of one
or more servers within the outgoing connection to a single, publicly routable address. The external destination host can then use
this public address as a destination address when sending the response. In this way, the internal source IP addresses of the
internal nodes remain hidden from the external host.

1. BIG-IP receives a packet from an internal server with an internal IP address and checks to see if that source address is
defined in a SNAT.

2. If the internal IP address is defined as the origin IP in SNAT, BIG-IP changes that source IP address to the translation
address defined in the configured SNAT.

3. BIG-IP then sends the packet, with the SNAT translation address as the source address, to the destination host.

SNAT types

Standard SNAT
A standard SNAT is an object created using the BIG-IP Configuration utility that specifies the mapping of one or more IP
addresses to a translation address. For this type of SNAT, the criteria that the BIG-IP system uses to decide when to apply the
translation address is based strictly on the IP address. If a packet arrives from the IP address configured in the SNAT, then the

37
NETWORK ADDRESS TRANSLATION (NAT)
SNAT

BIG-IP system translates that address to the configured translation address. There are three types of standard SNATs:

A SNAT with configured translation address.

A SNAT that uses the automap feature.

A SNAT configured to select an address from the SNAT pool as the translation address.

SNAT pool assigned as a virtual server source


This type of SNAT consists of just a SNAT pool directly assigned as a resource to a virtual server. This type of SNAT can be
implemented by creating a SNAT pool. Neither a SNAT object nor an iRule is required.

Intelligent SNAT
Like a standard SNAT, an intelligent SNAT is the mapping of one or more IP addresses to a translation address. This type of SNAT
mapping is implemented within an iRule instead of creating a SNAT object. For this type of SNAT, the criteria that BIG-IP uses to
decide when to apply a translation address is based on the logic of the iRule.

Port exhaustion
Each SNAT address has only 65,535 ports available. This is a limit of the TCP and User Datagram Protocol (UDP) protocols,
which use a 16-bit unsigned integer for source ports.

Port exhaustion or collisions may occur under heavy usage or unusually distributed client traffic patterns. For performance
reasons, the BIG-IP will not search exhaustively for an available source port. Port exhaustion may occur well before all 65,535
ports are used. As a result, connections that cannot be translated due to lack of available ports on a given translation address
may be dropped.

To determine when SNAT port exhaustion is occurring by reviewing the system log files. When port exhaustion occurs, BIG-IP
logs messages to the /var/log/ltm file.

The following is an example of a port exhaustion log message:


01010201:2: Inet port exhaustion on 100.10.20.21 to 4.4.4.2:53 (proto 17)
01010201:2: Inet port exhaustion on 100.10.20.21 to 23.73.217.114:80 (proto
6)

Mitigating port exhaustion

To mitigate port exhaustion, use a SNAT Pool. If already using a SNAT Pool, add more IP addresses to the pool.

Port mapping

When a SNAT is configured on the BIG-IP system (independently or in conjunction with a virtual server), the source address of
each connection is translated to a configured SNAT address, and the source port is mapped to a port currently available for that

38
NETWORK ADDRESS TRANSLATION (NAT)
Rules and policies troubleshooting

SNAT address. By default, the BIG-IP system attempts to preserve the source port, but if the port is already in use on the
selected translation address, the system translates the source port.

Figure 3.5 SNAT Port Translation Example

For more detailed information on SNAT, see AskF5 article: SOL7336: The SNAT Automap and self IP address selection.

SNAT statistics
To monitor the number of concurrent connections going through the SNAT using the Configuration utility

Go to Statistics >> Module Statistics : Local Traffic : Statistics Type.

To monitor the number of concurrent connections going through the SNAT using TMSH at the command
line

Type the following command:


tmsh show /ltm snat

39
NETWORK ADDRESS TRANSLATION (NAT)
NAT iRules

NAT iRules
iRules can be used to create intelligent SNAT or to apply NAT to IP addresses that traverse a BIG-IP system.

The following is a sample iRule to apply NAT based on entries in a data group.
when CLIENT _ ACCEPTED {
set ip _ split [split [IP::local _ addr] %]
#log local0. split $ip _ split
set remote _ ip [lindex $ip _ split 0]
#log local0. split remote is $remote _ ip
set snat _ addr [class match -value $remote _ ip equals /All _ Firewalls]
#log local0. IP: $remote _ ip SNAT: $snat _ addr
if { $snat _ addr ne } {
#log local0. IP: $remote _ ip SNAT: $snat _ addr
snat $snat _ addr
}
}

For more detailed information and examples for iRules, go to DevCentral.

40
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.

(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)

Did this chapter answer all of your questions about the subject matter? Yes No

If not, what information should be included that is not? 

Did you find any errors pertaining to subject matter in this chapter? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Send
DENIAL OF SERVICE
NAT iRules

Denial of Service
The BIG-IP AFM system provides mitigation techniques against DoS/DDoS attacks.

Denial of Service (DoS) attacks are attempts to render a machine or network resource unavailable to its intended users. Most
network DoS attacks are carried out at OSI Layers 3, 4, or 7.

The attacks work by overwhelming the server resources by directing traffic at a particular IP address and/or port with an
inordinate amount of either legal traffic or malformed requests that exhaust available resources. For example, targeting of the
number of concurrent layer 4 connections or available bandwidth are just a couple of common DoS attacks. The end result of
these attacks is the service is denied to legitimate users.

Distributed denial-of-service attacks


Originally, a DoS attack might have been made by a lone attacker on a single computer targeting another computer. Now an
attacker can command hundreds of compromised computers, or zombies, in an array, called a botnet, to launch a distributed
denial-of-service (DDoS) attack. These DDoS attacks often simultaneously target the victims firewall, DNS and other resources
as well. Worse still, these blended attacks may not be conducted by an individual attacker. Online, loosely-organized
communities work together to multiply the scope and complexity of a DDoS attack.

Note Distributed denial-of-service (DDoS) is referred to generically as


denial-of-service (DoS) in the BIG-IP Configuration utility.

Symptoms of DoS/DDoS attacks


Symptoms of denial of service attacks may include:

Unusually slow network performance (opening files or accessing web sites).

Inability to access a web site or group of sites.

Long-term denial of access to the web or any internet services.

Types of DoS/DDoS attacks


While the DoS threat landscape is constantly evolving, attacks fall within four attack types:

Volumetric Flood-based attacks against layer 2, 3, 4, 5, or 7.

Computational Asymmetric Attacks designed to consume CPU cycles.

Stateful Asymmetric Attacks designed to abuse memory by invoking timeouts of session-state changes.

Vulnerability-based Attacks that exploit software vulnerabilities at any layer.

42
DENIAL OF SERVICE
BIG-IP AFM DoS mitigations

Attacks can be launched as a single attack or a combination of any of the listed typed.

BIG-IP AFM DoS mitigations


There are many possible strategies and architectures for mitigating DoS attacks. Some attacks are designed to overwhelm the
on-premises network pipe to affect the availability of all services residing at the location. Since the volume of the attack is greater
than the available network bandwidth to the location, these attacks are best defended using offsite, cloud-based solutions such
as F5 Silverline: Cloud Based DDoS Protection or large scale globally distributed architectures.

On-premises equipment is the second tier of DoS mitigation. While the volume of the attack may not be enough to consume all
available network resources, the attackers strategy is to consume enough resources to disrupt an application or group of
applications. The mitigation strategy here is to provide capacity to absorb the DoS while maintaining targeted service delivery
goals.

Detecting and mitigating attacks


Using a combination of a robust, scalable operating system and the ability to offload many attack mitigations to dedicated
hardware, the BIG-IP system with BIG-IP AFM is capable of detecting and mitigating a wide range of network-layer attacks to
reduce the likelihood of downtime.

BIG-IP AFM detects attacks based on thresholds in packets per second (PPS) or by percentage deviations from the previous
hours baseline observed values. To mitigate attacks detected by these vectors, rate limiting can be applied to devices violating
the thresholds.

In BIG-IP AFM 12.1 and higher, auto-thresholds can be used to make an educated estimate for you if you do not have the time or
ability to research baseline levels.

Attack vectors
The BIG-IP system classifies common types of DoS attacks into attack vectors. There are many different types of attack vectors
which have been designed to exploit different system vulnerabilities. The specific number and type of attack vectors that BIG-IP
AFM protects against depends on the BIG-IP TMOS version being used. New releases of TMOS incorporate additional attack
vectors and configuration options as attack types evolve.

Each DoS attack vector contains three different settings to customize when BIG-IP AFM detects an attack has started, and
when BIG-IP AFM begins mitigating the attack by rate limiting attack packets.

Attack detection
Each BIG-IP AFM attack vector contains two configuration settings that can be used to recognize when a possible attack has
started against the device: Detection Threshold Packet Per Second (PPS) and Detection Threshold Percentage.

Detection threshold packets per second (PPS)

Detection Threshold Packets Per Second is used as an early warning indicator that an attack may be occurring. When the

43
DENIAL OF SERVICE
BIG-IP AFM DoS mitigations

detection threshold is exceeded, BIG-IP AFM generates a log message of this event to notify you of the condition. This setting is
for attack detection only and is not used to mitigate attacks.

When an attack vector is enabled, BIG-IP AFM tracks statistics on how many packets arrive at the device related to that vector.
Packets are sampled once every second. This configured value is per Traffic Management Microkernel (TMM) instance, not a
system total. Set this value based on your preference and the traffic-handling ability of the application.

For more detailed information on TMM, see Ask F5 article SOL 14358: Overview of Clustered Multiprocessing (11.3.0 and later).

Figure 4.1 Detection Threshold Packets Per Second detects when configured threshold is exceeded

Detection threshold percentage

Detection Threshold Percentage is also used as an early warning indicator that an attack may be occurring. When the
detection threshold is exceeded, BIG-IP AFM generates a log message of this event to notify you of the condition. This setting is
for attack detection only and is not used to mitigate attacks.

When an attack vector is enabled, BIG-IP AFM compares the average rate of traffic related to that vector over the last hour to the
average rate of traffic over the last minute.

When the quotient between the average rate of traffic over the last hour and the average rate of traffic over the last minute
exceeds the threshold setting, BIG-IP AFM creates a log message and reports the PPS every second until the traffic recedes
below the threshold.

Note BIG-IP AFM must first collect three hours worth of traffic in order to
create a value for the average rate of traffic over the last hour. In addition the
average rate must be above 100 PPS for this threshold to be triggered.

This configured value is per TMM instance, not a system total. Set this value based on your preference and the traffic handling
ability of the application.

For more information on threshold limits for each TMM see Ask F5 article SOL 15023: The BIG-IP AFM system enforces
configured thresholds and limits for each TMM.

44
DENIAL OF SERVICE
BIG-IP AFM DoS mitigations

Figure 4.2 Detection Threshold Percentage compares the average rate of traffic related to that vector over the last hour to the average rate of traffic
over the last minute

Attack mitigation
Each BIG-IP AFM attack vector can be configured to rate-limit traffic based on a specified PPS value.

Internal rate limit

Internal Rate Limit is used to specify an absolute PPS value which cannot be exceeded for traffic related to the vector. Once
the limit is reached, BIG-IP AFM begins dropping traffic which exceeds it. All packets exceeding the threshold are dropped and
continue to be dropped until the PPS rate falls below the configured rate limit.

The Internal Rate Limit configured value applies to each TMM instance, not to a combined system total. Set this value based
on your preference and the traffic handling ability of the application.

Figure 4.3 Packets exceeding the Internal Rate Limit are dropped. In this example, the Internal Rate Limit is set to 10000

45
DENIAL OF SERVICE
BIG-IP AFM DoS mitigations

Attack phases
There are four phases to a BIG-IP AFM DoS attack mitigation:

DoS vector is enabled but no attack is present.

Attack begins and BIG-IP AFM detects it.

Attack is ongoing and BIG-IP AFM takes configured action.

Attack is stopped by BIG-IP AFM and traffic returns to normal.

Figure 4.4 Attack phase example

46
DENIAL OF SERVICE
BIG-IP AFM DoS mitigations

BIG-IP AFM mitigation examples

Figure 4.5 BIG-IP AFM DoS attack phases (Fast ramp)

The previous figure models BIG-IP AFM detects a rapid increase (fast ramp) in packets using the Default Threshold Percent
to detect attacks and the Default Internal Rate Limit to mitigate. Detection Threshold set to Infinite.

Phase 1 Vector mitigation is enabled and the rate of packets for the vector maintains an average of 500
PPS. No attack present.

Phase 2 Event threshold begins with a flood of packets arriving that match the vector. Attack is detected
once the volume of packets crosses the Detection Threshold Percentage.

Phase 3 BIG-IP AFM logs the packet rate for the detected DoS vector once every second per TMM. The
packet rate continues to increase very quickly (within a few minutes) until it has exceeded the
Default Internal Rate Limit. At this point, BIG-IP AFM begins to rate limit all packets for this
DoS vector above the 10000 PPS threshold. BIG-IP AFM rate limits packets until the rate drops
below the Default Internal Rate Limit. Once the rate drops below the Default Internal
Rate Limit, BIG-IP AFM stops dropping packets, but logging continues every second the PPS
rate for the detected vector.

Phase 4 PPS drops below the Detection Threshold Percentage. BIG-IP AFM stops logging packets
and changes the attack state to none.

47
DENIAL OF SERVICE
BIG-IP AFM DoS mitigations

Figure 4.6 BIG-IP AFM DoS attack phases (Slow ramp)

The previous figure models BIG-IP AFM detects a slow increase (slow ramp) in packets.

Phase 1 Vector mitigation is enabled. No attack present.

Phase 2 Over several hours the number of packets steadily increases, which in turn increases the
Average Rate Over Last Hour statistic. BIG-IP AFM observes and updates. Phase 2 begins
when the packet rate crosses the Detection Threshold PPS.

Phase 3 BIG-IP AFM checks the PPS every second and logs the DoS attack vector event messages.
The rate continues to steadily increase over several hours. This increases the Average Rate
Over Last Hour. The slow rise in PPS prevents the Detection Threshold Percentage
increase from triggering. Eventually the packet rate exceeds the default internal rate limit and
BIG-IP AFM begins to rate limit all packets above that level until the packet rate drops below
the rate limit threshold.

Phase 4 When the attack PPS drops below the rate limit threshold, BIG-IP AFM stops rate-limiting
packets. If the attack is still ongoing BIG-IP AFM continues to log event information every
second until the rate drops below the Detection Threshold PPS.

For more information on using BIG-IP AFM to reduce the impact of DoS attacks, see The F5 DDoS Protection Reference

48
DENIAL OF SERVICE
BIG-IP AFM DoS mitigations

Architecture.

Architecture
DoS configuration occurs either at the device level or the virtual server level. Device DoS configuration is designed to detect and
mitigate network layer DoS attacks across all services protected by the BIG-IP AFM.

DoS profiles configured and applied to the virtual server level usually are applied to detect and mitigate attacks to a particular
application or group of application servers.

Both virtual server and device DoS protection statistics are processed and counted. Global DoS configuration is applied first then
virtual server detection and mitigation thresholds. Attacks dropped at the virtual server are still counted against the device
threshold count.

DoS profiles designated to be applied at the virtual server level offer a subset of the overall DoS attack vectors. Some DoS
vectors can only be configured at the device level. Counters can count against both when determining thresholds for detection
and mitigation.

Note DoS Profiles thresholds values are enforced for the device as a whole
not per TMM. For more information see Ask F5 article SOL15023 The BIG-IP
AFM system enforces configured thresholds and limits for each TMM.

DoS profiles for SIP require that a SIP protocol profile be applied on the virtual server. Likewise, DoS profiles for DNS require a
DNS protocol profile and a DNS protocol protection profile be applied on the virtual server.

To reduce the requirements of the operating system (TMOS) processing attacks and maximize system resources, many DoS
vectors are offloaded into programmable FPGA hardware.

For more information on which vectors are processed in hardware see Detecting and Preventing System DoS and DDoS Attacks
in BIG-IP Systems: DoS Protection.

Whitelisting
DoS whitelists provide a mechanism to configure trusted networks, protocols, and VLANs to bypass DoS checks and mitigations.

In BIG-IP TMOS 12.0 and higher, the DoS whitelist is limited to eight (8) entries. They can be based on source and/or destination
of hosts, networks, or VLANs. They include network protocols with or without specific ports, or combinations of these settings.
Use of super nets and larger masks to white list traffic or ingress VLANs is typically more efficient due to the limit on entries.

To configure a white list entry using the Configuration utility

1. Go to Security >> DoS Protection : White List.

2. Click Create.

49
DENIAL OF SERVICE
Packet processing (SYN cookie protection)

The New Configuration screen displays.

3. Fill in the white list entry as appropriate.

4. Click Finished.

Figure 4.7 DoS protection white list example in Configuration utility

To configure a white list entry using TMSH at the command line

Type the following command:


tmsh modify /security dos network-whitelist dos-network-whitelist entries
add { ha-whitelist { source { vlans 2000 } } }

Packet processing (SYN cookie protection)


The BIG-IP AFM SYN cookie feature protects the system against SYN flood attacks by allowing the BIG-IP system to continue to
establish connections when the SYN queue begins to fill up during an attack.

When the SYN Check Activation Threshold value is reached, the BIG-IP system responds to SYN requests by sending back

50
DENIAL OF SERVICE
Packet processing (SYN cookie protection)

to the client the SYN+ACK response containing an encoded secret. The system then discards the SYN queue entry and waits
for a correctly constructed ACK from the client before establishing an entry in the connection table.

The SYN cookie secret can be calculated in hardware or software depending on the platform. This behavior can be modified by
adjusting the value for the SYN cookie algorithm database key.

For more detailed information on connection SYN Cookies, see AskF5 article: SOL 16500: Overview of the connection.
syncookies.algorithm database key.

When the SYN cookie authentication method is active for a virtual server or self IP address, established connection/packet
handling and high-availability features such as mirroring should perform normally.

SYN cookie operation

Figure 4.8 SYN cookie packet flow

When SYN cookie protection is enabled for the protocol profile, the feature operates as follows:

1. A client sends a TCP SYN request to the BIG-IP virtual server or self IP address.

2. The receiving TMM instance determines whether to enable hardware or software SYN cookie protection as follows:

If the platform contains the high speed bus (HSBe2) chip, and hardware SYN cookie protection is enabled in the profile,
the TMM notifies the HSB chip and other TMM instances in the cluster to enable hardware SYN cookie protection. The
HSB chip and receiving TMM instance will then program HSB hardware for hardware SYN cookie generation and

51
DENIAL OF SERVICE
Packet processing (SYN cookie protection)

validation for the virtual server or self IP address, and synchronize the status to all TMM instances in the cluster.

For TCP and FastHTTP profiles, if the platform does not contain the HSB chip, or hardware SYN cookie protection is
disabled in the profile, the TMM notifies other TMM instances in the cluster to enable software SYN cookie protection.

For FastL4 profiles, if the platform does not contain the HSB chip, or hardware SYN cookie protection is disabled, SYN
cookie protection is not available for the virtual server unless the software SYN cookie protection option is specifically
enabled.

3. The BIG-IP system sends the SYN+ACK response back to the client, but discards the SYN queue entry. The BIG-IP
system does not maintain the SYN-RECEIVED state that is normally stored in the connection table for the initiated session.
Because the system does not maintain the SYN-RECEIVED state for the connection, the SYN queue is not exhausted, and
normal TCP communication continues.

4. If the BIG-IP system then receives a subsequent ACK response from the client, the system reconstructs the SYN queue
entry by decoding data in the TCP sequence number.

5. After the BIG-IP system validates the clients ACK, the system adds the session to the connection table and initiates a
connection to the pool member.

For more detailed information on SYN cookie protection see AskF5 article: SOL 14779: Overview of BIG-IP SYN cookie protection
(11.3.x - 12.x) .

To validate SYN Cookie performance in hardware or software issue using TMSH at the command line

Type the following command syntax:


tmsh show /ltm virtual <VIRTUAL>
tmsh show /ltm virtual vip1

Output appears similar to the following example:


SYN Cookies
Status full-hardware
Hardware SYN Cookie Instances 1030
Software SYN Cookie Instances 0
Current SYN Cache 0
SYN Cache Overflow 5
Total Software 6
Total Software Accepted 0
Total Software Rejected 16
Total Hardware 19.1K
Total Hardware Accepted 1030

52
DENIAL OF SERVICE
Device DoS

Device DoS
Device-level DoS protection allows BIG-IP AFM to detect and automatically mitigate DoS attacks.

Various detection options are available, including a packets per second threshold, rate increase, rate limit, and other parameters
for DoS attack types.

For more detailed information on each attack type, see Detecting and Preventing System DoS and DDoS Attacks chapter in
BIG-IP Systems: DoS Protection and Protocol Firewall Implementations.

Detect and rate limits thresholds


There are three categories of vectors, based on the confidence with which packets can be regarded as useless or malicious:

Invalid packets (bad header*, fragmentation, IP unknown protocol, land attack, and others.)

Probably invalid packets (TCP RST, TCP SYN-ACK, and TCP Push)

Presumably valid packets (TCP SYN, TCP ACK, and UDP)

The detection and rate limit properties of these categories and vectors can be set with the following ranges:

Invalid Packets: MINIMUM (1-100pps)

Probably Invalid Packets: LOW (100-500pps)

Presumably Valid Packets: HIGH (1000+pps)

The values vary depending on BIG-IP platform and environment, as well as whether the vector type is configured through DoS
device configuration or a DoS profile:

DoS Device Configuration settings should be set at the level required to protect the stability of the BIG-IP system. Packets that
are presumed to be valid should only drop in an emergency since this action affects every virtual server on the BIG-IP system.

DoS Profiles are applied to virtual servers. This configuration places the mitigation with the target, so rate limiting may drop
legitimate traffic, it limits the mitigation effects to the virtual server under DoS attack. It is also likely that the server pool members
associated can tolerate less overall stress than the BIG-IP system.

F5 recommends setting a lower detect and rate limit for DoS profiles to protect pool members.

53
DENIAL OF SERVICE
BIG-IP AFM DoS vectors

Invalid packets
Invalid packets are those which violate protocol specifications. This includes bad header vectors.

While standard TMOS packet handling silently drops invalid packets, it can be more efficient to allow BIG-IP AFM DoS to handle
them earlier to reduce TMOS workload.

DoS also allows you to configure alerts to your preference. You can configure DoS detection and rate limiting depending on
whether you want to be alerted to all invalid packets or only at higher traffic levels.

Additionally, DoS reporting provides visibility into invalid packets.

Probably invalid packets


Legitimate TCP Push, TCP SYN-ACK, and TCP RST packets will match during the flow table lookup, so any of these packets
received by DoS protection are probably be invalid. However, since they are at least valid packets as far as protocol compliance,
you cant be sure they are invalid.

This traffic should be restricted.

Presumably valid packets


TCP SYN, TCP ACK, and UDP flood vectors all represent potentially legitimate traffic. These packets should not be restricted
unless resource availability is threatened.

TCP ACKs are presumably valid because they may be seen when SYN Cookies are active. If they fail a hardware SYN Cookie
check, presumably valid packets are dropped or rejected before they reach DoS protection.

If SYN Cookies are not active, any unsolicited, bare ACKs are dropped by TMOS.

BIG-IP AFM DoS vectors


This section lists examples of attack vectors and mitigations.

Device configuration
You can configure many BIG-IP AFM DoS vectors using Device Configuration steps. Unless otherwise noted, the following
configuration steps apply to each DoS vector in this section.

To select an appropriate DoS protection using the Configuration utility

1. Go to Security >> DoS Protection : Device Configuration.

2. Select the appropriate protection.

3. Click Update.

54
DENIAL OF SERVICE
BIG-IP AFM DoS vectors

To select an appropriate DoS protection using TMSH at the command line

Type the following command syntax:


tmsh modify /security dos device-config dos-device-config dos-device-
vector { <VALUE> { <VALUE> <INTEGER VALUE>}}

For example:
tmsh modify /security dos device-config dos-device-config dos-device-
vector { ip-err-chksum { detection-threshold-pps 1 default-internal-rate-
limit 1 } }

Bad header
The various bad header vectors all check for packets violating their respective protocol specifications.

Because packets matching a bad header vector are dropped later by TMOS, there are no desirable bad header packets. There is
no reason to keep them around. F5 recommends setting Detection and Rate Limiting thresholds to MINIMUM for these vectors.

To modify a specific Bad Header attack, see Device configuration.

DNS
Domain Name System (DNS) attacks allow an attacker to attack use malformed packets and protocol errors in an attempt to
cause disruption of name resolution.

To modify a specific DNS attack, see Device configuration.

Flood
Flood attacks attempt to overwhelm a resource. While flood vector packets are Probably Invalid, because they follow protocol
specification, it is possible that they are valid. If the packets are valid, they match on a flow lookup table and are handled without
DoS protection seeing them.

F5 recommends setting Detection and Rate Limiting to LOW for the following vectors:

TCP BadAck Flood

TCP RST Flood

TCP SYN-ACK

TCP SYN Oversize

TCP Window Size

Some of the flood vectors are presumably valid. These are valid packets, indistinguishable from legitimate connection requests.

55
DENIAL OF SERVICE
BIG-IP AFM DoS vectors

F5 recommends setting Detection and Rate Limiting to HIGH for the following vectors:

TCP SYN Flood

TCP ACK (when SYN Cookies are active the ACK will not match a Flow Table Lookup)

UDP

The recommended settings for the remaining flood vectors depend on the environment. F5 recommends setting Detection and
Rate Limiting to HIGH for the remaining vectors in the flood group, pending an assessment of traffic patterns. This assessment
may indicate LOW or MINIMUM settings are appropriate for specific vectors.

To modify a specific Flood attack see Device configuration.

Fragmentation
Fragmentation is the process of breaking a single IP datagram into multiple packets of smaller size.

Fragmentation attacks allow an attacker to use this method as an attack vector. The vectors in the Fragmentation section all
represent invalid packets that will be dropped by TMOS. They are not legitimate IP fragments so there is no reason to keep them
around.

The legitimate IP and IPv6 fragment traffic is tracked in the IP Flood and IPv6 Flood vectors. F5 recommends setting Detection
and Rate Limiting thresholds of MINIMUM for these vectors.

To modify a specific Fragmentation attack see Device configuration.

Single endpoint
Single endpoint vectors allow for detection and rate limit packets-per-second involving a single device.

The single endpoint sweep vector tracks the 100 source addresses sending the most of the selected packet types. The single
endpoint flood vector tracks the 100 destination addresses receiving the most of the selected packet types. These two vectors
are especially useful because their mitigation efforts are directed only at the 100 involved hosts. The other vectors drop traffic
without regard to its legitimacy.

Bad actor detection was introduced with single endpoint sweep with the auto-blacklist feature. This feature works with IP
Intelligence to classify hosts sending too much traffic as malicious, and drop traffic from them.

To modify a specific Single Endpoint from the Configuration utility

1. Go to Security >> DoS Protection : Device Configuration : Single Endpoint : <sweep|flood >.

2. Select the Detection Threshold and Rate Limit.

3. If using Sweep, optionally link the Sweep vector to IP Intelligence and select IP intelligence to use to

56
DENIAL OF SERVICE
BIG-IP AFM DoS vectors

classify identified bad actors, how long they must sustain an attack to be blacklisted, and how long to blacklist
them for.

4. Click Update.

To modify a specific Single Endpoint Vector using TMSH at the command line

Type the following command syntax:


tmsh modify /security dos device-config dos-device-config { dos-device-
vector { sweep { detection-threshold-pps 250 default-internal-rate-limit
500 packet-types add { udp } auto-blacklisting enabled blacklist-category
phishing blacklist-detection-seconds 10 blacklist-duration 65535 }}}

Session Initiation Protocol


Session Intiation Protocol (SIP)is anIPtelephony standard developed by theIETFto manage the creation and destruction of
voice-related IP networking sessions. Session Initiation Protocol (SIP) is a typically used for voice and video calls over IP. SIP
protections within BIG-IP AFM allow for detection and mitigation of malformed packets containing errors intended to intentionally
or unintentionally to disrupt this connectivity.

To modify a SIP vector see Device configuration.

Other
The Other vector allows for detection and mitigation against other attack types.

The IP Unknown Protocol and Land Attack vectors are invalid packet types. There is no reason to keep them around. F5
recommends setting Detection and Rate Limiting thresholds of MINIMUM for these vectors.

To modify an Other protection see Device configuration.

DoS profiles
DoS Profiles allow a BIG-IP provisioned with BIG-IP AFM the ability to detect and automatically mitigate DoS on an individual
virtual server.

Similar to device DoS, various detection and mitigation thresholds can be specified for DoS attack types to more accurately
detect, track, and rate limit attacks.

For more detailed information on each attack type, see Detecting and Preventing System DoS and DDoS Attacks chapter in
BIG-IP Systems: DoS Protection and Protocol Firewall Implementations.

DoS profiles provide the ability to mitigate attacks at a granular level, contrary to global settings in Device DoS, while also giving
the operator the ability to further tune many DoS attack vector thresholds on the virtual server level.

57
DENIAL OF SERVICE
BIG-IP AFM DoS vectors

DoS Profiles contain three features:

Protocol DNS

Protocol SIP

Network

Protocol DNS
Protocol DNS DoS profiles allow attack mitigation of both malformed protocol packets as well as volumetric attacks with valid
packets.

Protocol error attack detection


Protocol Error Attack Detections allows BIG-IP AFM to detect and mitigate against malformed DNS queries at a specified rate of
increase.

To modify DNS Error Attack Detection within a DoS profile using the Configuration utility

1. Go to Security >> DoS Protection: DoS Profile and select the DoS profile.

2. Click Protocol DNS: General Settings.

3. Click the checkbox next to Protocol DNS Protection to enable.

4. Specify the specific rate of increase, rate threshold and rate limit for the protection.

5. Click Update.

To modify the protocol DNS from using TMSH at the command line

Type the following command syntax:


tmsh modify /security dos profile <PROFILE NAME> protocol-dns modify {all
{<VALUE> <INTEGER VALUE>}}

DNS query attack detection


This feature allows for protection against malformed packets and protocol errors in an attempt to cause disruption of name query
resolution.

To modify DNS query attack detection within a DoS profile

1. Go to Security >> DoS Protection: DoS Profile and select the DoS profile.

2. Click Protocol DNS: General Settings.

58
DENIAL OF SERVICE
BIG-IP AFM DoS vectors

3. Click the checkbox next to Protocol DNS Protection to enable.

4. Within DNS Query Attack Detection, click the checkbox next to the query attacks that are being configured

5. Specify the specific rate of increase, rate threshold and rate limit for the protection.

6. Click Update.

To modify the DNS Query Attack Detection using TMSH at the command line

Type the following command syntax:


tmsh modify /security dos profile <PROFILE NAME> protocol-dns modify {
all { dns-query-vector modify { all { <VALUE> <INTEGER VALUE>} } } }

For more detailed information on DNS DoS attacks, see Detecting and Preventing DNS DoS Attacks chapter in BIG-IP Systems:
DoS Protection and Protocol Firewall Implementations.

Protocol SIP
Protocol SIP DoS profiles allow attack mitigation of both malformed protocol specific packets and volumetric attacks with valid
packets. This mechanism can also be useful to detect unusual increases in protocol traffic.

Protocol error detection


This protection allows detection and mitigation against malformed SIP protocol errors at a specified rate of increase.

To modify SIP Protocol Error Detection within a DoS profile using the Configuration utility

1. Go to Security >> DoS Protection: DoS Profile and select the DoS profile.

2. Click Protocol SIP: General Settings.

3. Click the checkbox next to Protocol SIP Protection to enable.

4. Within Protocol Errors Attack Detection, click the checkbox next to enable.

5. Specify the specific rate of increase, rate threshold and rate limit for the protection.

6. Click Update.

To modify the protocol SIP using TMSH at the command line

Type the following command syntax:


tmsh modify /security dos profile <PROFILE NAME> protocol-sip modify {all
{ <VALUE> <INTEGER VALUE> } }

59
DENIAL OF SERVICE
BIG-IP AFM DoS vectors

SIP method attack detection


SIP Method Attack Detection allows for granular protections for common SIP methods.

To modify SIP Attack Method Detection within a DoS profile using the Configuration utility

1. Go to Security >> DOS Protection: DOS Profile and select the DOS profile.

2. Click Protocol SIP: General Settings.

3. Click the checkbox next to Protocol SIP Protection to enable.

4. Within SIP Method Attack Detection click the checkbox next to a method type to enable.

5. Specify the specific rate of increase, rate threshold and rate limit for the method.

6. Click Update.

To modify the SIP Attack Method using TMSH at the command line

Type the following command syntax:


tmsh modify /security dos profile <PROFILE NAME> protocol-sip modify { all
{ <VALUE> <INTEGER _ VALUE> } }

Network
Network DoS protection allows mitigation from a number of attack vectors at a VIP level. This includes both individual attacks as
well as behavioral analysis.

For more detailed information on which vectors are accelerated in hardware, see Detecting and Preventing Network DoS Attacks
in BIG-IP Systems: DoS Protection and Protocol Firewall Implementations.

Network DoS protection contains two features: Behavioral Analysis and Attack Types.

Behavioral analysis
Behavioral Analysis allows the DoS profile to inspect and report on sampled data that may indicate an attack.

Make sure to allow time for BIG-IP AFM to sample data from multiple sources. If traffic volume is low and from only one source,
you may see false positives.

Important Behavioral Analysis is still in development and F5 recommends


against using it in a production environment.

60
DENIAL OF SERVICE
BIG-IP AFM DoS vectors

To modify Network DoS Behavioral Analysis within a DoS profile using the Configuration utility

1. Go to Security >> DoS Protection: DoS Profile and select the DoS profile.

2. Click Network: General Settings.

3. Click the checkbox next to Network Protection to enable.

4. Within Behavioral Analysis, enable the detection status.

5. Click Update.

To enable or disable Behavioral Analysis using TMSH at the command line

Type the following command syntax:


tmsh modify /security dos profile <PROFILE NAME> dos-network modify {all {
behavioral-analysis <VALUE> } }

Attack types
Configure Attack Types to have the DoS profile inspect and protect against layer-3 and layer-4 attack vectors at a specified
threshold and/or percentage of increase.

To modify Network DoS Attack Types within a DoS profile using the Configuration utility

1. Go to Security >> DOS Protection: DoS Profile and select the DoS profile.

2. Click Network: General Settings.

3. Click the checkbox next to Network Protection to enable.

4. Under Attack Types, expand the appropriate attack type.

5. Enable the Detection Status.

6. Modify the threshold, rate increase and rate limit as appropriate.

7. Click Update.

To modify the Attack Types using TMSH at the command line

Type the following command syntax:


tmsh modify /security dos profile <PROFILE NAME> dos-network modify {all {
<VALUE> modify { <VALUE> { <VALUE> <INTEGER VALUE> } } } }

61
DENIAL OF SERVICE
DoS policy development

Virtual server configuration


Once youve configured a DoS profile, you need to enable it on one or more virtual servers.

To enable a DoS profile on the virtual server using the Configuration Utility

1. Go to the virtual server properties Local Traffic >> Virtual Servers : Virtual Server List.

2. Select the virtual server to configure.

3. Click the Security tab and select Policies.

4. Set to DoS Protection Profile.

5. Select Enable and then use the drop-down menu to select a log profile.

6. Click Update.

To add a DoS profile to a virtual server using TMSH at the command line

Type the following command syntax:


tmsh modify /ltm virtual <VIRTUAL> profiles add { <DOS PROFILE> }

DoS policy development


A BIG-IP AFM DoS policy consists of multiple components working together to protect an infrastructure from DoS attacks. Some
elements of a BIG-IP AFM policy protect the application from protocol-specific attacks, while others protect more broadly.

Depending on the use case, you may require a simple DoS policy or one requiring more extensive development and tuning. F5
recommends that you clearly identify your use case--what your policy must protect--before you create it. Having this information
should make development and enforcement easier.

Policy life cycle


The DoS security policy life cycle has three phases:

Create and deploy policy

Tune policy

Maintain policy

Create and deploy policy


Create a new policy using the network and protocol protections specific to the infrastructure that is being protected.

Tune policy
False positive violations are identified and policy settings are adjusted to allow legitimate traffic to pass through to the protected

62
DENIAL OF SERVICE
DoS reporting and visibility

applications and infrastructure. This is necessary as some legitimate traffic may not pass the configured policy rules and may
wrongly be identified as an attack.

Maintain policy
The DoS policy allows for adaption to application and infrastructure changes, new security requirements, and activities, based on
the review of logs, reports and statistics of attacks mitigated by the BIG-IP AFM system.

Policy tuning details


Depending on the policys initial settings, the BIG-IP AFM DoS policy may need to be disabled or thresholds may need to be
adjusted if legitimate traffic is blocked. At the end of the tuning process, the policy should contain all the relevant protections and
thresholds.

Tips and guidelines


F5 recommends the following tips and guidelines for policy development:

Consider a cloud-based solution such as F5 Silverline: Cloud Based DDoS Protection to augment on-premises DoS
mitigation and especially for volumetric attacks that may exceed on-premises bandwidth.

Start with a policy that allows a higher percentage of traffic nonconformity to allow all legitimate behavior and disallow
malicious requests.

Remember that Global DoS traffic settings are applied across the entire BIG-IP system, meaning all ingress traffic is
counted.

Use DoS profiles associated with individual virtual servers for specific attack remediation on a more granular basis.

Set a lower detection and rate limiting thresholds for attack vectors where there is no level of desirable traffic.

Add critical infrastructure to the DoS White List.

DoS reporting and visibility


After a DoS protection is configured on the BIG-IP system, charts, reports, statistics, and event logs related to DoS attacks and
mitigations are available on the system. For example, a DoS Overview screen shows at-a-glance whether or not the system is
under attack. It also indicates the impact of DoS attacks on the BIG-IP system performance.

Other reports show transaction outcomes and correlate the impact of system detection with the mitigation of DoS attacks. The
reports and event logs can show whether or not DoS protection is functioning properly or whether tuning is necessary. They can
also help identify and track DoS attacks. Analyzing attack and trend data can provide insight into DoS threats.

63
DENIAL OF SERVICE
DoS reporting and visibility

Note To allow DoS data to populate DoS reports on a virtual server basis,
you must associate a DoS profile with one or more virtual servers.

DoS Overview The DoS Overview displays real-time information about all DoS attacks on the system. The system displays
recent attacks.

To view the DoS Overview in the Configuration utility

Go to Security >> Reporting : DoS : Overview.

Logged Attacks shows a flag for an attack in progress. The log includes the 100 most recent events per protocol for
application and network attacks. Up to 200 attacks may be shown in the charts. If the information desired is not shown, try
increasing the time period selected in the filter.

You can filter your view by attack impact (High Impact, Medium Impact, Low Impact). To focus in on the specific details in
the charts, hover on the chart for the time period of interest. The system displays in a tooltip the details about what was
happening at that time.

To learn more about attacks that have occurred, click the Attack ID number in the Historical & Recent Attacks Log.

The system displays events associated with the attack. If there are more than 100 events, there will be a link to the event log,
which you can click to see more events.

The Overview screen includes information on throughput, RAM and CPU usage. Because the statistics vary from system to
system, it is a good idea to become familiar with typical memory and CPU usage and throughput on your system in association
with recent attacks.

For more detailed information on DoS reporting, see the Help tab in the Configuration utility.

Logging
BIG-IP AFM logs when an attack started, when an attack is mitigated, and when an attack has stopped.

Note F5 recommends remote high-speed logging to log DoS events.

logs show different fields, depending on the feature for which logs are being displayed. The default fields are listed in the
following table:

64
DENIAL OF SERVICE
DoS reporting and visibility

Table 4.1 DoS Logging Fields [format= Table {chapter #}.{table number}]

Field Description

Time Time of the event

Virtual Server For DoS profile events, the virtual server on which the profile is enabled.

Event BIG-IP AFM DoS vectors have the following events:


Attack Started: Indicates at least one of the detection thresholds have been reached.
Attack Sampled: Indicates number of vector-related packets sampled once an attack has started.
Attack Stopped: Indicates traffic has fallen below the detection thresholds and the attack has
ended.

Type Attack vector type

Action Action will display one of two options:


None: Indicates that the internal rate limit has not been reached and no packets have been dropped.
Drop: Indicates that the internal rate limit has been reached and packets have been dropped.

Attack ID Identification number associated with the attack

Packets in / sec Packets related to the vector type that BIG-IP AFM has sampled in the last second.

Dropped Packets Packets related to the vector type that BIG-IP AFM has dropped in the last second

For more detailed information on event log messages, see Event Messages and Attack Types in External Monitoring of BIG-IP
Systems: Implementations.

Device DoS logging

1. Go to Security >> DoS Protection: Device Configuration.

2. From the Log Publisher menu, select your publisher.

Note Device DoS does not need a logging profile configured to log events.
The system supplied global-network logging profile logs the results to
the configured publisher.

DoS profile logging


Requirements to log DoS Profile events include:

Enabled DoS logging within the log profile.

65
DENIAL OF SERVICE
Signaling and intelligence

Assign the logging profile within the virtual server that the DoS Profile is being used.

For more information on configuring a logging profile, see Monitoring and Logging BIG-IP AFM.

To configure DoS logging with a log profile using the Configuration utility

1. Go to Security >> Event Logs: Logging Profile and select logging profile.

2. Click the checkbox next to DoS Protection to enable it.

3. Under network DoS Protection, use the drop-down menu to select publisher.

4. Click Update.

To enable a logging profile on the virtual server using the Configuration utility

1. Go to the virtual server properties Local Traffic >> Virtual Servers: Virtual Server List.

2. Select the virtual server.

3. Click the Security tab and select Policies.

4. Get to Log Profile, use the drop-down menu to select the log profile.

5. Click Update.

Signaling and intelligence


The BIG-IP AFM can block bad actors based on external sources of data or other processes within the BIG-IP platform. This
allows the BIG-IP to dynamically react to DoS attacks based on numerous sources of intelligence.

Within BIG-IP AFM, the virtual server DoS profile sweep detection feature can provide intelligence to allow bad actors to be
blocked automatically for a pre-defined period of time based on the detection threshold. This blocking configuration is mapped to
an IP Intelligence category.

66
DENIAL OF SERVICE
Signaling and intelligence

Figure 4.10 Sweep configuration utility

Additionally, blacklists can be created from external intelligence sources. F5 offers a subscription IP-intelligence service for
categorization of discovered bad actors and allows the implementation of custom IP Intelligence policies.

In order to get a feed list for IP Intelligence, the configuration requires an external host to provide via either a website or FTP
server a list of offending IP addresses.

The update interval is configured to specify the timeframe in which BIG-IP AFM will regularly poll the server for updates. If an
update poll fails, BIG-IP AFM will continue to use the last known good list. The feed list is a simple CSV file.

To configure the external feed list using TMSH at the command line

Type the following command syntax:


tmsh create /security ip-intelligence feed-list extBlacklist feeds add {
<NAME> { default-blacklist-category <CATEGORY> default-list-type
<BLACKLIST/WHITELIST> poll { url <URL> interval <INTERVAL> } } }

For more detailed information on Signaling and Intelligence, see About IP Address Intelligence in the Network Firewall section of
BIG-IP Network Firewall: Policies and Implementations.

67
DENIAL OF SERVICE
Signaling and intelligence

For more information on DoS, see the following resources:

F5 DDoS Protection Volume 2

SOL15368:The BIG-IP AFM system logs network firewall events using the logging profile associated with the network
firewall rule

SOL14813:Detecting and mitigating DoS/DDoS attacks (11.4.x - 12.x)

The DDoS Threat Spectrum

The Application Delivery Firewall Paradigm

Protect Against Evolving DDoS Threats: The Case for Hybrid Mitigation

68
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.

(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)

Did this chapter answer all of your questions about the subject matter? Yes No

If not, what information should be included that is not? 

Did you find any errors pertaining to subject matter in this chapter? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Send
EXTERNAL TOOLS
BIG-IQ Centralized Management

External Tools
Several external tools can be used to assist with management of one or multiple BIG-IP AFM systems, logging, and transfer of
information. The following are covered in this chapter:

BIG-IQ Centralized Management

Simple Network Management Protocol (SNMP) Polling and Alerting

Syslog

Internet Protocol Flow Information Export (IPFIX)

sFlow

BIG-IQ Centralized Management


BIG-IQ Network Security is a platform designed for the central management of one or more BIG-IP systems, where BIG-IP AFM
is installed and provisioned.

The BIG-IQ Network Security system provides:

Device discovery with import of firewalls referenced by discovered devices.

Management of shared objects (address lists, port lists, rule lists, policies, and schedules).

L3 and L4 firewall policy support, including staged and enforced policies.

Firewall audit log used to record every firewall policy change and event.

Role-based access control.

Deployment of configurations from snapshots and the ability to preview differences between snapshots.

Multi-user editing through a locking mechanism.

Monitoring of rules.

Reports on security.

This section describes common operational tasks that can be performed when leveraging BIG-IQ for BIG-IP AFM management.

Manage policies
When using BIG-IQ for policy management, BIG-IQ acts as a centralized database and a backup source for BIG-IP AFM firewall
policies. By design, BIG-IP AFM devices are discovered by BIG-IQ and the management authority for firewall policies and shared

70
EXTERNAL TOOLS
BIG-IQ Centralized Management

security is given to BIG-IQ.

When using BIG-IQ to manage BIG-IP AFM devices, F5 recommends making all changes to the systems in BIG-IQ. If changes
are made directly to the BIG-IP, they will be lost when BIG-IQ deploys a new change set unless BIG-IQ is made aware of the
changes using one of two of the following methods:

BIG-IQ re-discovers BIG-IP AFM and changes discovered are designated as Use BIG-IP.

Note This practice can affect shared objects used by other BIG-IP AFM
devices such as address lists, ports lists, policies, and rule lists.).

Changes performed locally to the BIG-IP AFM device are replicated in BIG-IQ prior to deploying other changes from
BIG-IQ.

Compare policies
As the central manager, BIG-IQ is has authority over all policy objects.

To manage revisions and changes to policy and shared objects, BIG-IQ keeps snapshots of the entire policy set as it relates to
all firewalls. Because snapshots are kept, no individual firewall backups are maintained. From a policy standpoint, a central
shared data set exists with point in time copies of policy state.

Full BIG-IP system backups can be initiated through the device module in BIG-IQ; however doing this is not required to maintain
policy backups.

When a deployment task executes, a snapshot is automatically created that contains all BIG-IQ data at that specific point in time.
A deployment task can contain multiple device deployments. The policy point is used to compare an existing policy on the
BIG-IP AFM with the working configuration stored in BIG-IQ. Differences in the two are recognized as changes.

You can compare changes on a BIG-IP AFM by creating an evaluation task and selecting Working Config or selecting a
specific snapshot to compare with the firewall. If you choose an earlier snapshot, it is possible to view the differences in policy
changes that have been deployed to the firewall since that point.

For small-to-medium environments with infrequent changes, F5 recommends that you generate a snapshot of the configuration
prior to making modifications to the policy.

In larger environments with frequent changes, you may want to consider creating a snapshot at least once a day. Frequent
snapshots provide a consistent set to compare against older policies, and this makes rollback of policy changes easier if a quick
restore is required after deploying firewall policy changes.

Restore a policy
When you restore a policy using BIG-IQ, you can evaluate policies against historical snapshots so that only change sets are
restored.

The following steps provide a high-level overview of policy rollback:

71
EXTERNAL TOOLS
BIG-IQ Centralized Management

1. Identify the timestamp of the previous policy deployment by searching the deployment tasks for the firewall name. If the
deployment task isnt available through the BIG-IQ configuration manager, search BIG-IP LTM logs for previous pccd
compile times.

2. Create a new deployment task by selecting the snapshot from the previous deployment. If it is unavailable, select the next
most-recent snapshot.

BIG-IQ provides a change set between the current deployment and the deployment snapshot you selected.

3. Review the change set.

4. Deploy the changes to restore the BIG-IP AFM policy to the earlier configuration.

While the previous steps restore the policy to the BIG-IP AFM, BIG-IQ retains a working configuration of the previously made
changes. To reapply that configuration, BIG-IQ must first re-discover BIG-IP AFM or you have to edit the BIG-IQ policy objects.

Note To restore a BIG-IP AFM policy without using BIG-IQ, you must back
out of the changes youve made to the policy or restore a previous version of
the configuration using a SCF or UCS file.

Use BIG-IQ audit logs


BIG-IQ provides an audit log of all security policy configuration changes. You can view them in the BIG-IQ configuration manager
or through an archived text file, if one exists. By default, BIG-IQ keeps 30 days of audit log entries within the BIG-IQ data store
and archives older log events to the file system. You can update the number of days in the Audit Logs Settings.

For more information, see BIG-IQ Centralized Management: Security Managing Audit Logs in BIG-IQ Network Security.

Reporting
BIG-IP AFM creates several reports for displaying DoS device information and firewall rule statistics. You can view these reports
through the Configuration utility for an individual BIG-IP AFM system or through the BIG-IQ Security Reporting interface, where
you can view the results for one or more BIG-IP AFM systems.

Note Bi-directional HTTPS access between the BIG-IQ and BIG-IP AFM is
required to generate reports for centralized viewing in BIG-IQ.

Manage software

BIG-IQ supports automation and scheduling of the collection of BIG-IP backup files, as well as management of TMOS software
images. With the BIG-IQ Device it is possible to stage and deploy TMOS upgrades directly from BIG-IQ, eliminating the need to
log into individual BIG-IP AFM devices to import, install, and reboot devices.

72
EXTERNAL TOOLS
SNMP polling and alerting

SNMP polling and alerting


BIG-IP AFM supports SNMP and is capable of sending SNMP traps and being polled by a third party SNMP management
system.

BIG-IP AFM supports version 1, 2c, and 3 of SNMP for manager access and trap destinations.

For more detailed information on the initial configuration of SNMP, see BIG-IP TMOS: Concepts SNMP.

Use SNMP polling


SNMP polling is an inbound query submitted against a BIG-IP device. You can download enterprise management information
base files (MIBs) specific to BIG-IP AFM using the Configuration utility.

You can find events specific to BIG-IP AFM in the F5-BIGIP-LOCAL-MIB.txt file.

Using an SNMP manager, you can collect information for firewall rules, contexts, and rule hits for BIG-IP AFM. You can use the
following SNMP command syntax to pull rule statistics:
snmpwalk -c public <HOSTNAME> ltmFwRuleStat

In addition to firewall rules, you can query BIG-IP AFM DoS statistics and attack information using an SNMP manager. You can
use the following SNMP command syntax to pull DoS statistics:
snmpwalk -c public <HOSTNAME> ltmDosAttackDataStat

Use SNMP traps


SNMP traps are outbound alerts which can be sent to an external management system for processing. The following table
outlines relevant BIG-IP AFM related notifications that can be sent to an SNMP trap receiver.

Table 5.1: Relevant BIG-IP AFM Notifications to Send to SNMP Trap Receiver

Trap Name Description Recommended Action

BIGIP_TMM_TMMERR_ The start of a possible DoS attack Determine your response to this type
DOS_ATTACK_START was registered. of DoS attack, if required.
(.1.3.6.1.4.1.3375.2.4.0.133)

BIGIP_TMM_TMMERR_ The end of a possible DoS attack was None, informational.


DOS_ATTACK_STOP detected.
(.1.3.6.1.4.1.3375.2.4.0.134)

BIGIP_DOSPROTECT_ The flow sweeper started or stopped. None, informational.


DOSPROTECT_AGGRREAPEROID
(.1.3.6.1.4.1.3375.2.4.0.22)

73
EXTERNAL TOOLS
IPFIX

Syslog
Syslog is a widely used standard for message logging. Each message is labeled with a facility code and assigned a severity. The
facility code indicates the software type of the application that generated the message. The syslog messages may be directed to
various destinations, tuned by facility and severity, including console, files, remote syslog servers, or relays.

The default information sent to a syslog destination may contain more detailed log information than required for firewall rule event
logging. F5 recommends modifying the output with logging filters to reduce the size of the messages, as well as to make the
messages more easily understood. F5 also recommends controlling access to the logs to a select group of administrators and
operators on a need-to-know basis. Log collectors are designed to prevent or notify, based on log modification attempts.

BIG-IP AFM also contains logging formats for commercial log aggregation and security information and event management
(SIEM) solutions such as Splunk and Arcsight. These log destinations are preconfigured for ease of deployment.

For more detailed information see Monitoring and Logging BIG-IP AFM.

External logging
The BIG-IP system uses a high-speed logging (HSL) mechanism, which allows it to efficiently generate and transmit log
messages to one or more log collectors.

F5 recommends sending logs of system and firewall messages to a remote server for event collection and indexing. Doing so
allows you to view messages without impacting the performance of the system generating them, and in the event of a system
failure, remote logs can help troubleshoot the cause of the failure.

You can configure remote logging destinations for long-term storage of data to use for trend analysis and auditing. Many
third-party logging collectors can display time-series events to help with troubleshooting.

For more detailed information on external logging configurations, see External Monitoring of BIG-IP Systems: Implementation
guide.

IPFIX
IPFIX is a universal standard of export for IP flow information from devices that are used by mediation systems, accounting/billing
systems, and network management systems to facilitate services such as measurement, accounting, and billing.

IPFIX provides a means for standardizing IP flow information to be formatted and transferred to an external collector. The details
of the protocol are defined by RFC 5103, and RFCs 7011 through 7015. The BIG-IP system can be configured to send IPFIX data
to a collector for consumption.

Using IPFIX for traffic analysis provides guidance on traffic patterns and system usage for capacity planning and charge back
based on consumption, troubleshooting network and application issues, identifying volumetric DoS attacks, and evaluating the
effectiveness of security policies.

For more detailed on IPFIX configuration and options, see Logging Network Firewall Events to IPFIX Collectors in BIG-IP Network
Firewall: Policies and Implementations.

74
EXTERNAL TOOLS
Change and configuration management

The IPFIX entities IANA definitions of the supported Information Elements (IEs) within the BIG-IP software release can be found in
the Downloads section of the Welcome screen of the Configuration utility.

Figure 5.1 Downloads section of the Configuration utility welcome screen

sFlow
Sampled flow (sFlow) is an industry standard for packet export. sFlow provides a means for exporting truncated packets,
together with interface counters. The BIG-IP system can be configured to poll internal data sources and send data samples to an
sFlow receiver. The collected data can be used to analyze the traffic that traverses the BIG-IP system.

Using sFlow for traffic analysis can provide guidance on traffic patterns and system usage for capacity planning and charge back
based on consumption, troubleshoot network and application issues, identify volumetric DoS attacks, and evaluate the
effectiveness of security policies.

For more detailed sFlow configuration and options, see Implementations Monitoring BIG-IP System Traffic with sFlow in External
Monitoring of BIG-IP Systems.

Change and configuration management


F5 recommends that you establish, follow, and document a change and configuration management process appropriate to your
organization. At a minimum, the process should detail methods for requesting changes, evaluating the risk of the change, and all
responsible parties involved in the changes. Documentation and recorded change results should be archived for historical and
auditing purposes.

In smaller environments, the BIG-IP AFM policy rule description field may be used to track change requests. The description field
is limited to 255 characters.

75
EXTERNAL TOOLS
Change and configuration management

In larger environments, F5 recommends using an external tracking system in combination with in-policy documentation. There
are many third-party external configuration management databases (CMDB) for facilitating and documenting larger use cases.
F5 recommends selecting a system that follows the Information Technology Infrastructure Library (ITIL) or similar methodologies.

76
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.

(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)

Did this chapter answer all of your questions about the subject matter? Yes No

If not, what information should be included that is not? 

Did you find any errors pertaining to subject matter in this chapter? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Send
MONITORING AND LOGGING BIG-IP AFM
BIG-IP AFM monitoring

Monitoring and Logging BIG-IP AFM


Monitoring and logging processes ensure that systems are running smoothly and provide important insight into what is
happening in an environment. Because BIG-IP AFM is a critical component of a security infrastructure, F5 recommends periodic
review of BIG-IP AFM deployment logs to actively monitor the device and baseline performance.

F5 also highly recommends establishing, documenting, and following a log maintenance plan so that any security incidents can
be reviewed during the defined log retention period.

Note This chapter covers only monitoring and logging elements and
processes relevant to BIG-IP AFM. For information about logging the BIG-IP
system or other modules, see x-ref to TMOS.

BIG-IP AFM monitoring


Establish a baseline
Establishing a baseline for your system is necessary to understand what is normal for your environment so that deviation from
expected values can be recognized. It can also help you with capacity planning and scaling of infrastructure.

SNMP
F5 supports the industry-standard SNMP protocol to manage BIG-IP devices on a network. The SNMP agent on the BIG-IP
system must be configured. The primary tasks in configuring the SNMP agent are configuring client access to the SNMP agent,
and controlling access to SNMP data.

The following are some SNMP management information base (MIB) files to look at for alerting and monitoring of your BIG-IP AFM
system:

BIG-IP AFM statistics


BIG-IP AFM OIDS are defined in /usr/share/snmp/mibs/F5-BIGIP-LOCAL-MIB.txt. The data is gathered under the following
sections:

ltmFw*

ltmFwIpint*

ltmDos*

For example:
snmpwalk -c public localhost F5-BIGIP-LOCAL-MIB::ltmFwRuleStatCounter
F5-BIGIP-LOCAL-MIB::ltmFwRuleStatCounter.global./Common/global-firewall-
rules.rd-fw-rule1../Common/rd-fw-policy.staged = Counter64: 4220
F5-BIGIP-LOCAL-MIB::ltmFwRuleStatCounter.global./Common/global-firewall-

78
MONITORING AND LOGGING BIG-IP AFM
BIG-IP AFM logging

rules.allow-udp-53../Common/global-fw-policy.enforced = Counter64: 0
F5-BIGIP-LOCAL-MIB::ltmFwRuleStatCounter.global./Common/global-firewall-
rules.port-2002-global../Common/global-fw-policy.enforced =
Counter64: 4220
F5-BIGIP-LOCAL-MIB::ltmFwRuleStatCounter.global./Common/global-firewall-
rules.disallow-source-10.12.27.214../Common/global-fw-policy.enforced
= Counter64: 0
F5-BIGIP-LOCAL-MIB::ltmFwRuleStatCounter.virtual./Common/http _ vs.rd-
rule1../Common/fw-policy-vs.enforced = Counter64: 0
F5-BIGIP-LOCAL-MIB::ltmFwRuleStatCounter.virtual./Common/http _
vs.http-rule../Common/fw-policy-vs.enforced = Counter64: 0

Overall health statistics


In addition to the BIG-IP AFM statistics, it is important to monitor the overall health of the BIG-IP. SNMP can provide information
on:

CPU

RAM

DISK

TMOS Connection table

For more detailed information on this SNMP traps, see SNMP Trap Configuration in BIG-IP Systems: DoS Protection and
Protocol Firewall Implementations.

For more detailed information on SNMP MIBs, see AskF5 article: SOL13322: Overview of BIG-IP MIB files (10.x - 12.x).

BIG-IP AFM logging


The BIG-IP system uses several logging systems depending on the source and the repository storing the log message. Host side
processes (daemons running outside TMM) use the standard UNIX logging utility, syslog-ng, to deliver system messages to log
files, often called local syslog. The level of information that syslog-ng delivers to log files is configurable. For more information,
see AskF5 article: SOL13317: Configuring the level of information that syslog-ng sends to log files.

Additionally, local syslog can be configured to log to remote destinations.

To configure local.syslog

Go to System > Logs > Configuration > Remote Logging.

The core BIG-IP AFM functions are part of TMM and use a separate logging system. Messages from this logging system can be
forwarded to: local syslog by using the logging destination local-syslog-publisher, the native BIG-IP AFM database. You can
use the logging destination local-db-publisher, a remote logging server that uses syslog, the IPFIX protocol, Splunk, or
Arcsight

79
MONITORING AND LOGGING BIG-IP AFM
BIG-IP AFM logging

Logging guidelines
F5 recommends enabling logging on each drop|reject rule applied to the Network Firewall and IP Intelligence. Configure this
logging for every object that the firewall applies to. Configure an Aggregate Rate Limit in logging profiles used with the
Network Firewall and IP Intelligence.

F5 also highly recommends external logging to ensure optimal performance of your BIG-IP AFM system.

Some regulatory environments require logging all firewall events, including those whose action is Accept.

Profile settings
Logging profiles are used to define how firewall and DoS logs are sent to the log publisher. In logging profiles you can configure or
modify log components such as the fields to send in a log message.

The Network Firewall profile also allows aggregate rate-limiting of log messages. This rate-limiting controls how many messages/
second BIG-IP AFM sends to the destination.

This setting is useful for extremely high throughput firewalls or firewalls being flooded with bad traffic. After the rate limit is
reached, additional messages are not logged. Log message volume is sampled from that point, as well as summary messages
detailing how many log messages have been dropped. Log throttling is an important tool to keep the log destination functional.

For more information on logging profiles, see AskF5 article: SOL17398: Configuring the High Speed Logging traffic distribution
method.

Logging daemons
BIG-IP AFM uses two daemons to display and populate log data:

Mgmt_acld = mgmt_acld is primarily responsible for maintaining statistics, logging, and reporting of Management Port
BIG-IP AFM Rules. In addition, it also periodically updates the statistics counters for management port rules.

Mysqld is the database server storing data for reporting/charts and event logs reports.

For more detailed information on BIG-IP AFM daemons, see AskF5 article: SOL14387: Overview of BIG-IP AFM daemons

Logging destinations
BIG-IP AFM messages can be logged directly on the BIG-IP system or to an external system. In making the decision, consider
performance impact factors such as disk space use, log retention policy, number of logs being sent, logging while under attack,
and log throttling.

F5 recommends using the IPFIX logging format for external logging for the fastest performance.

BIG-IPsystems can be configured to log messages locally or to remote high-speed log servers.

80
MONITORING AND LOGGING BIG-IP AFM
BIG-IP AFM logging

For more detailed information on configuring log destination, see Configuring Remote High-Speed Logging in External Monitoring
of BIG-IP Systems: Implementations.

Local logging
If logging locally, events are logged to local-db-publisher if using the Security >> Event Logs viewer and local-syslog-
publisher for local syslog.

Local logging of BIG-IP AFM and DoS events are useful for initial setup and testing but the recommended practice is to use only
remote logging for production level traffic. This is because there is a performance cost associated with local log destinations due
to I/O constraints and other factors. Turning on local logging as a troubleshooting step may also be useful.

If using local-db-publisher, be aware that the number of messages stored is capped at 1.25 million. This may not be adequate
for some environments.

Tip Firewall rules can be created from a log entry when using the Security
Event Logs viewer for network firewall events. Check the log entry and click
create rule. This will open the New Rule editing page. This is useful in
situations where there is a need to quickly resolve an issue or create a
temporary rule in place for traffic being blocked or allowed.

Remote logging
In order to log remotely, a pool of servers must be created and added to an unformatted destination which can in turn be added
to a formatted destination. The first consideration is the pool. This is a standard LTM pool that contains all of the remote servers
that should receive logs. By default, messages will go to the first pool member selected until either the rate of the HSL traffic
exceeds what the remote log server is capable of accepting or the HSL connection to the remote log server is lost.

Tip When troubleshooting, remember pool stats can be used to determine


where logs are being sent. When using the pool in a high speed log
destination, traffic can be distributed in an adaptive, balanced or replicated
manner.

For more detailed information on remote logging, see AskF5 article: SOL17398: Configuring the High Speed Logging traffic
distribution method.

Another consideration with log destinations, is the format to send the logs in. Firewall and DoS logs can both be forwarded in
ArcSight, Splunk, Syslog or IPFIX formats. If logs do not appear as expected on the remote device, it may be that the formatted
destination does not match the remote server.

IPFIX has been observed to have the fastest performance. Its a binary format and so is not directly human readable.

81
MONITORING AND LOGGING BIG-IP AFM
BIG-IP AFM logging

Syslog destinations on the BIG-IP come in three varieties:

BSD: provides field names at the cost of larger log messages.

Syslog: provides just the field data which is harder to read but leaner. Most log consoles can provide the fields for human
readability.

Legacy BIG-IP: deprecated.

The following are a few third-party tools available to use:

Splunk

ArcSight

IPFIX
The BIG-IP system may be configured to log BIG-IP AFM events over the IPFIX protocol. These are binary-encoded strings that
are defined by IPFIX templates. These strings are then sent off-box to an external IPFIX collector.

For more detailed information on configuring IPFIX, see Logging Network Firewall Events to IPFIX Collectors in External
Monitoring of BIG-IP Systems: Implementations.

Debug logging
The BIG-IP systems default logging levels are set to capture useful information about BIG-IP system events while maintaining
minimal impact on system resources.

If the default logging level does not provide enough detail, and you can enable debug logging to gather more detailed diagnostic
information. The greater logging detail the debug level logs places added demand on BIG-IP system processor and hard disk
space.

With the BIG-IP system, you can configure the level of information that the system logs for events related to traffic management.

For more detailed information on levels of logging, see AskF5 article: SOL5532: Configuring the level of information logged for
TMM-specific events.

Disk space
Disk space use can increase significantly with local logging, debug log level, and a runaway tcpdump process.

For more detailed information on disk space maintenance on a BIG-IP system, see AskF5 article: SOL14403: Maintaining disk
space on the BIG-IP system (11.x - 12.x).

82
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.

(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)

Did this chapter answer all of your questions about the subject matter? Yes No

If not, what information should be included that is not? 

Did you find any errors pertaining to subject matter in this chapter? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Send
TROUBLESHOOTING
BIG-IP AFM logging

Troubleshooting
In order to troubleshoot issues related to BIG-IP AFM, a solid understanding is needed of the traffic flow process and the internal
structure of BIG-IP. This chapter will give an introduction to the packet flow process and the tools needed for troubleshooting.

Traffic flow
BIG-IP uses traffic flows to efficiently pass traffic from a client to internal resources. BIG-IP AFM works with TMOS to manage the
access control process which includes flow management. When a packet arrives at BIG-IP, TMOS first examines whether the
packet received belongs to an already existing flow or the first packet is a new flow.

Figure 7.1 BIG-IP AFM packet flow

For a detailed understanding of the packet processing flow, see Packet flow.

L4 mirroring
While F5 recommends enabling connection mirroring only for essential connections, a BIG-IP system can be configured to mirror

84
TROUBLESHOOTING
BIG-IP AFM logging

some, all, or no connection flows in a high availability environment.

The Connection Mirroring checkbox is apparent when creating a virtual server and is only functional when a high availability
group is properly configured and has at least two members in it.

When configuring mirroring, F5 recommends using a dedicated VLAN and physical interface for all session mirroring traffic.

Environments requiring a significant amount of connection mirroring may impact BIG-IP performance. F5 recommends using the
following settings for optimal performance:

Set tm.fastl4_ack_mirror db setting to Disable to increase overall system performance when mirroring traffic for fastL4 virtual
servers.

To disable tm.fastl4_ack_mirror using TMSH at the command line

Type the following command:


tmsh modify /sys db tm.fastl4 _ ack _ mirror value disable

If you do not disable this setting, you may experience HA Table disconnects under heavy load.

To view HA Table disconnects in iHealth

1. Log in to iHealth.

2. Click the name of the qkview file you want to view.

3. Go to Commands >> UNIX >> TMOS >> tmctl a (cluster).

4. Click ha_stat.

5. Look at the overflows, expires, and aborts.

Hits in these fields indicate that the buffer setting for statemirror.queuelen may be set too low for the volume of mirroring
required (min:1048576, max:268435456, default: 8388608). To fix this problem, raise the queue length value until the
overflows reported are near zero.

To modify the statemirror.queuelen value using TMSH from the command line

Type the following command:


tmsh modify /sys db statemirror.queuelen value <new value>

To check the statemirror.queuelen value using tmctl from the command line

Type the following command:


tmctl -w 250 -i -d /var/tmstat/blade ha _ stat

85
TROUBLESHOOTING
BIG-IP AFM network firewall modes

Another optimization for mirroring performance requires setting Nagle in the mirroring connection key.

To set Nagle in the mirroring connection key using TMSH from the command line

Type the following command:


tmsh modify /sys db tm.fastl4 _ mirroring _ taciturn { value enable }

BIG-IP AFM network firewall modes


You can configure BIG-IP AFM network firewall to operate in ADC mode or firewall mode. You can also configure it to globally
drop or reject traffic.

ADC mode
By default, the network firewall is configured in ADC mode. In ADC mode all traffic destined for a virtual server is allowed unless
an ACL specifically denies it. In this mode, all traffic is allowed to virtual servers and self IPs on the system, and any traffic you
want to block must be explicitly specified. This applies only to the virtual server and self IP contexts on the system.

To configure the network firewall in ADC mode using the Configuration utility

If you have changed the firewall setting to Firewall mode, you can configure the BIG-IPnetwork firewall back to ADC mode.

1. Go toSecurity>>Options:Network Firewall.

The Firewall Options screen opens.

2. From theVirtual Server & Self IP Contextslist, select the default actionAcceptfor the self IP and virtual
server contexts.

3. ClickUpdate.

Firewall mode
You can configure the BIG-IPnetwork firewall to drop or reject all traffic not explicitly allowed. Firewall mode applies a default
deny policy to all self IPs and virtual servers.

To configure the Network Firewall in Firewall mode using the Configuration utility

1. Go to Security>>Options:Network Firewall.

The Firewall Options screen opens.

2. From theVirtual Server & Self IP Contextslist, select the default action for the self IP and virtual server
contexts.

86
TROUBLESHOOTING
BIG-IP AFM network firewall modes

3. SelectDropto silently drop all traffic to virtual servers and self IPs unless specifically allowed.

4. SelectRejectto drop all traffic to virtual servers and self IPs unless specifically allowed, and to send the
appropriate reject message for the protocol.

5. ClickUpdate.

Globally drop or reject traffic


If traffic to or from the BIG-IPnetwork firewall does not match a rule, the global rule handles the traffic. You can set the global rule
to drop traffic or to reject traffic. The global rule rejects unmatched traffic by default.

Note Management port traffic is not handled by the global rule. Management
port rules must be explicitly defined for the management port context.

To configure the Network Firewall to globally drop or reject traffic

1. Go toSecurity>>Options:Network Firewall.

The Firewall Options screen opens.

2. From theGlobal Contextlist, select the default action for the global rule, when the traffic matches no other
rule.

3. SelectDropto drop traffic silently.

4. SelectRejectto drop traffic, and send the appropriate reject message for the protocol.

5. ClickUpdate.

To configure the Network Firewall using TMSH at the command line

Type the following command syntax:


tmsh modify /sys db tm.fw.defaultaction value <value>

87
TROUBLESHOOTING
BIG-IP AFM network firewall modes

Note If you are using ConfigSync to synchronize two or more BIG-IPs in a


Device Group and if the BIG-IP AFM is operating in firewall mode, traffic
between the BIG-IPs must be explicitly allowed by policy. This is because
traffic destined to a self IP or virtual server in this mode has an implicit deny
rule, which prevents BIG-IP systems from establishing connectivity between
self IP addresses for services such as network failover, connection mirroring,
or configSync.

To explicitly allow this traffic, you can use the built-in firewall rules_sys_self_
allow_defaults or _sys_self_allow_management, applied to the specific
self IPs used for connectivity between the device group.

BIG-IP device rules


A subset of traffic is sourced from or destined to the BIG-IP AFM as part of normal management and operations. This traffic
should be managed and secured with policies.

Management and troubleshooting varies, depending on the type of traffic as well as the interface processing the traffic.

Traffic sourced from a BIG-IP self IP is allowed outbound of the BIG-IP AFM and does not require any ACL policy to correctly
operate for cases such as outbound log traffic or network high availability. Inbound self IP traffic must be allowed through a
firewall context, to be accepted and processed by the self IP and TMOS.

The BIG-IP management port is out of band, accessed from the control plane and is not affected by global firewall rules. This
port can be secured through a management port firewall policy that explicitly allows or denies traffic to and from the
management port. Unlike self IPs, outbound traffic allowed by the management port policy does not create a stateful flow.
Therefore, return traffic must be allowed into the management port when appropriate.

For example, a policy may allow traffic from remote authentication servers into the BIG-IP system using a management policy
rule in response to the outbound authentication request.

Flow eviction
As part of BIG-IP device security, TMOS manages the memory used by the system, including the connection table resources. If
a BIG-IP system becomes memory-constrained due to network events such as a DDoS attack or other high traffic condition,
TMOS evicts older idle flows in order to protect the BIG-IP from memory exhaustion using adaptive connection reaping.

Eviction policies for adaptive reaping can be configured at the global, route domain, and virtual server contexts. This allows
granular control over how resources are preserved during these memory-constrained conditions.

If BIG-IP AFM is experiencing memory constraint, idle flows can be removed, forcing connections to be re-established when they
are no longer idle. This might interrupt client traffic.

88
TROUBLESHOOTING
BIG-IP AFM network firewall modes

There are four eviction strategies which can influence the reapers selection of connections to remove from the connection table:

Bias Idle specifies that the system biases flow removal toward the existing flows that have been idle, with no payload
bytes, for the longest.

Bias Oldest specifies that the system biases flow removal toward the oldest existing flows.

Bias Bytes evicts traffic flows that show less data being transferred. Configure the grace period to allow new
connections to be spun up.

Low Priority specifies objects identified as lower priority by the flow removal strategy:

Route-domains

Virtual servers

Specified ports and protocols

Countries

To create an eviction policy at the global context using TMSH at the command line

Type the following command:


tmsh create /ltm eviction-policy my-dos-eviction-policy slow-flow {enabled
true } strategies { bias-bytes { enabled true delay 10 } low-priority-
geographies { countries add { US } enabled true } }

To apply the eviction policy to the virtual server context (based on connection counts) using TMSH at the
command line

Type the following command:


tmsh modify /ltm virtual vs _ web flow-eviction-policy my-evict-policy
tmsh modify /net route-domain 0 connection-limit 100000

To apply the eviction policy to the route domain context (based on connection counts) using TMSH at the
command line

Type the following command:


tmsh modify /net route-domain 1 flow-eviction-policy my-evict-policy
tmsh modify /ltm virtual vs _ web connection-limit 100000

To apply the eviction policy to the global context (based on connection counts) using TMSH at the com-
mand line

Type the following command:


tmsh modify /ltm global-settings connection global-flow-eviction-policy
my-evict-policy

89
TROUBLESHOOTING
BIG-IP AFM network firewall modes

To validate the eviction policy performance in any context using TMSH at the command line

Type the following command:


watch tmctl flow _ eviction _ policy _ stat

The output will appear similar to the following:


policy _ name swept _ context context _ name evicted
/Common/default-eviction-policy route domain /Common/0 0
/Common/default-eviction-policy virtual server /Common/vs _ web 0
/Common/my-dos-eviction-policy route domain /Common/0
701
/Common/my-dos-eviction-policy virtual server /Common/vs _ web 501
/Common/my-dos-eviction-policy virtual server /Common/vs _ web2
200
/Common/sweeper route domain /Common/0 5460
/Common/sweeper virtual server /Common/vs _ web 5460
/Common/sweeper virtual server /Common/vs _ web2 0

For more detailed information on flow eviction, see AskF5 article: SOL15740: Overview of adaptive connection reaping (11.6.0
and later).

Slow flow eviction


The Slowloris attack is a denial of service attack which allows an attacker to take down a web server with minimal bandwidth
and side effects on unrelated services and ports. Slowloris initiates an HTTP request but never completes it. This keeps
connections to the target web server open and holds them open as long as possible by opening connections to the target web
server and sending a partial request.

BIG-IP AFM uses slow flow monitoring to mitigate this class of attack. Slow flow monitoring directs the sweeper to detect and
optionally delete connections that are not moving data below the defined threshold rate. The sweeper routinely goes through the
connection table and evicts expired connections, so this additional task does not have a significant performance impact.

The slow flow monitoring settings allow some flexibility to allow applications that require slow connections. These settings
include the following:

Grace Period provides connections with time to ramp up before they are required to move data above the threshold
rate.

Slow Flow Throttling Percent permits a configured percentage of slow connections to remain.

Slow Flow Throttling Absolute permits the configured number of slow connections to remain.

For more detailed information on eviction policies eviction, see AskF5 article: SOL15821: Overview of eviction policies.

90
TROUBLESHOOTING
Policy compilation

Rule actions
During troubleshooting, you may find that rule actions adversely affect the behavior of BIG-IP AFM.

For example, if a rule is set at a global context with an action of Accept but when troubleshooting the connection flow traffic
does not flow from source to destination, it may be that rule actions are at issue. If so, you can troubleshoot by finding the
answers to the following questions:

Is there a route domain policy in place that could be dropping the traffic?

Is there a virtual server policy in place that could be dropping the traffic?

If running in Firewall mode (and not ADC mode) is the virtual server default action dropping the traffic?

If the firewall rules expected behavior is to accept and create a new flow rather than continue evaluating the connection in
another firewall context, use Accept Decisively as the rule action.

If the firewall rules expected behavior is to accept but continue evaluating other contexts, make sure there are appropriate accept
rules to match all contexts to allow the traffic to pass.

One way to resolve the issue described in the example is to use a staged policy and track ACL matches there.

For more detailed information on firewall rule actions, see AskF5 article: Network Firewall Implementation Guide.

Policy compilation
BIG-IP AFM contains control plane processes that compile and instantiate firewall policies to TMOS. When a configuration
change is made, the following processes implement the new firewall policy:

1. mcpd validates the configuration changes and signals the compiler.

2. pccd compiles the new policy into a binary format.

The policy compiles.

3. pccd signals tmm to use the new policy (serialization).

For detailed information of BIG-IP AFM processes, see AskF5 article: SOL14387: Overview of BIG-IP AFM daemons.

Firewall compiler
Depending on the size of the policy, pccd can take up to a couple minutes to compile and serialize a new policy.

To view existing policy statistics in the Configuration utility

1. Go to Security Network Firewall:Active Rules.

2. Select the context you want to view (in this case, Global, Route Domain, or Virtual Server).

91
TROUBLESHOOTING
Logging

To view existing policy statistics using TMSH at the command line

Type the following command:


tmsh show /security firewall container-stat field-fmt

Output of the command appears similar to the following example:


security firewall security {
activation-time-fmt Mar 29 2016 00:47:14-0400
compile-duration-fmt 0:0:0
container-size 12.2K
context-name global-firewall-rules
context-type global
ovrlpck-duration-fmt 0:0:0
policy-name my _ global _ policy
policy-type Enforced
process-mem 3.3M
rule-count 2
}

activation-time-fmt is the timestamp the policy was serialized and activated.

compile-duration-fmt is time required to build the policy.

container-size is size of the compiled policy.

process-mem is amount of transient memory required to build the policy: pccd uses control plane memory to compile
policies

rule-count is the number of rules in the compiled policy.Each change in firewall policy (including scheduled rules) results
in a compilation and serialization of the policy. For historical data, see /var/log/ltm for local syslog entries of the pccd
daemon or remote syslog storage of these messages.

Logging
Default rule logging
By default, implicit default firewall actions are not logged unless configured to do so. For example, when troubleshooting a flow
that is dropped by the default rule, no drop log messages are generated.

To turn on logging for implicit firewall actions using TMSH at the command line

Type the following commands:


tmsh modify /sys db tm.fw.defaultrule.log
tmsh modify /sys db tm.fw.globaldefaultrule.log
tmsh modify /sys db tm.fw.stageddefaultrule.log
tmsh modify /sys db tm.fw.stagedglobaldefaultrule.log

92
TROUBLESHOOTING
Logging

Turning on logging for these actions may be helpful when troubleshooting dropped traffic; however, having these actions logged
during normal operation may create an unnecessary amount of logging.

Another method to troubleshoot the dropped traffic is to add an explicit Default Deny rule at the end of the applied policy in
BIG-IP AFM and configure the log attribute in the rule to avoid modifying the system db variables listed above.

Audit
By default, BIG-IP is configured to log audit information of the BIG-IP system configuration to /var/log/audit. Audit logging
information includes configuration changes and the users that made them.

When audit logging is disabled, BIG-IP does not log configuration changes.

Note In BIG-IP TMOS 11.6 and earlier, audit logging is disabled by default. If
you upgrade to a newer version, this setting may be retained.

For more detailed information, see AskF5 article: SOL16304: Audit logging for BIG-IP configuration changes is now enabled by
default.

Tip BIG-IQ Security offers more comprehensive Firewall Policy auditing and
may be used to centrally manage Firewall Policies, allowing auditing of
multiple BIG-IP firewalls.

TCP reset troubleshooting


The BIG-IP system can be configured to issue TCP resets under various situations, both during flow creation as well as after flow
creation as part of idle flow eviction enforcement.

When the Default Firewall Action under Security >> Options : Network Firewall is set to Reject, BIG-IP AFM
generates a TCP reset message.

When a flow connection idles out, by default the BIG-IP system sends a TCP reset to both the client and server side of the
connection flow. (This behavior can be enabled or disabled as a function of the relevant FastL4 profile).

The BIG-IP system supports logging TCP reset causes within the packet, logging the TCP reset reason through Syslog, or both.
Depending on system load, local logging may not capture all resets due to rate limiting.

Enabling packet-level TCP reset provides a mechanism to view the TCP reset cause from a packet capture by using tcpdump
and the F5 Wireshark dissector.

For more detailed information on BIG-IP TCP reset logging and configuration settings, see AskF5 article: SOL13223: Configuring

93
TROUBLESHOOTING
Statistics

the BIG-IP system to log TCP RST packets.

Logging troubleshooting
To view local log files in the /var/log/ directory from the command line

Type the following command:


tail f /var/local/ltm

If logging is not apparent locally or on your remote logging destination, verify that the log publisher has been
assigned.

To view DoS logging for the current configuration using TMSH at the command line

Type the following command:


tmsh list /security dos device-security log-publisher

To view the current firewall logging settings using TMSH at the command line

Type the following command:


tmsh list /security log profile global-network

If no profile is assigned it may be necessary to assign one.

To assign a DoS logging profile using TMSH at the command line

Type the following command syntax:


tmsh modify /security dos device-config dos-device-config log-publisher
<NAME>

To view DoS logging or to apply a log-publisher for BIG-IP AFM logging using TMSH at the command line

Type the following command syntax:


tmsh modify /security log profile global-network { network modify {
global-network publisher <NAME> } } }

For additional information of creating or modifying logging configuration see: Configuring Remote High-Speed Logging.

Statistics
Statistics are an important aspect of maintaining and troubleshooting BIG-IP AFM. When trying to identify whether or not a
firewall rule is working or how a DOS attack was detected and mitigated, it is helpful to know where to look.

Statistics are available in the Configuration utility on the Security >> Overview tab and the Reporting tab.

Overview provides a high-level view of what is going on with the system. It is divided into the following sections:

94
TROUBLESHOOTING
Statistics

Summary displays a mix of network and DoS information.

Protocol displays HTTPS and DNS protocol security statistics (if configured for HTTPS and DNS security).

Network displays network firewall statistics for BIG-IP AFM.

DoS displays statistics related to global device DoS.

Reporting provides detailed views of statistics for protocol, network, and DoS.

For more detailed information on BIG-IP AFM Security >> Overview : Summary screen, see SOL16703: The BIG-IP AFM
Overview Summary screen has two Add Widget links that offer different sets of display methods

Rules
To view statistics for firewall rules using the Configuration utility

1. Go to Security >> Network Firewall : Active Rules.

This screen displays important details on active rules, including rule hit counters and time stamps for the last time
the rule was hit.

2. The statistics for firewall rules only updates counters for active rules and not accumulated counters for a rule
list.

To view statistics for firewall rules using TMSH at the command line

Type the following command:


tmsh show /security firewall rule-stat

Troubleshooting with TMSH at the command line


Several tools to with troubleshooting and analysis of BIG-IP AFM are available only using TMSH at the command line.

You can use TMSH to show security firewall matching-rule matches, tuples/arguments with the existing rule base, and outputs
rules that can match the arguments.

In the following example, the TMSH command requires all filters for match criteria. Wildcards are not supported for VLAN or
protocol.
tmsh show /security firewall matching-rule source-addr 10.1.1.245 source-
port any dest-addr 192.168.1.245 dest-port 80 vlan /Common/internal-vlab
protocol tcp
Firewall Matching Rule:
-------------------------------------------------------------------
Context Type Context Name Policy Name Rule Name Action

95
TROUBLESHOOTING
Common troubleshooting tasks

-------------------------------------------------------------------
Route Domain /Common/0 /Common/rd _ policy accept _ defer Accept
Total records returned: 1

When viewing Device DoS statistics, the TMSH command show security dos displays statistics of all global attack vectors. This
information can then be analyzed and is useful for additional tuning of DoS settings.

For each DoS attack type, the detection threshold signifies the packet rate at which BIG-IP DoS logs attack-detected messages,
based on the one-minute average, which is a value displayed in the security DoS output.

By watching the averages of typical system traffic, you can determine a baseline of expected packet rates and use that baseline
to set the detection thresholds and optionally the rate limit for DoS attack types.

The output of the command appears similar to the following example:


--------------------------------
Security::DoS Config: UDP flood
--------------------------------
Statistics Type Count
Attack Detected 0
Attack Count 0
Stats 1h Samples 46050652
Stats 185847228337
Stats Rate 137065
Stats 1m 136901
Stats 1h 158933
Drops 0
Drops Rate 0
Drops 1m 0
Drops 1h 0
Int Drops 4171
Int Drops Rate 0
Int Drops 1m 0
Int Drops 1h 0
WhiteList Hits 537102135052

Common troubleshooting tasks


Connection table management
The BIG-IP system contains a connection table for all flows. You can view the connection table and alter it to remove existing

96
TROUBLESHOOTING
Common troubleshooting tasks

flows prior to normal flow closure or idle timeout enforcement.

The interface to the connection table is provided by TMSH. You can use the connection table to see if a flow exists.

The following are best practices when working with the connection table:

Always use IP address/Port/Protocol filters to narrow the return set of a show /sys connection command.

Do not show all connection flows on a heavily loaded production system.

Use the all-properties option to view detailed statistics of a flow including idle time, bits in/out.

The following shows a sample filter used to search for connection table entries:
tmsh show /sys conn cs-client-addr <IP ADDRESS> cs-server-port 4353
tmsh show /sys conn cs-client-addr 192.168.142.248 cs-server-port 4353
Sys::Connections
192.168.142.248:50241 10.10.20.245:4353 192.168.142.248:50241 10.10.20.245:4353
tcp 1 (tmm: 0) none
Total records returned: 1

The following shows a more granular filter example with detailed output:
tmsh show /sys connection cs-client-addr <IP ADDRESS> cs-server-port 4353
all-properties
tmsh show /sys connection cs-client-addr 192.168.142.248 cs-server-port
4353 all-properties
Sys::Connections
192.168.142.248:50241 - 10.10.20.245:4353 - 192.168.142.248:50241 -
10.10.20.245:4353
---------------------------------------------------------------------------
----------
TMM 0
Type self
Acceleration none
Protocol tcp
Idle Time 1
Idle Timeout 5
Unit ID 0
Lasthop /Common/internal 00:0c:29:e5:eb:6c
Virtual Path 10.10.20.245:4353
Conn Id 0

97
TROUBLESHOOTING
Common troubleshooting tasks

ClientSide ServerSide
Client Addr 192.168.142.248:50241 192.168.142.248:50241
Server Addr 10.10.20.245:4353 10.10.20.245:4353
Bits In 1.9K 0
Bits Out 0 1.9K
Packets In 4 0
Packets Out 0 4
Total records returned: 1

tcpdump
The tcpdump utility is a command-line packet sniffer with many features and options. Use tcpdump to capture (to a file) or view
(to the console) packets for a tagged VLAN on the BIG-IP system. The syntax, flags, and options specified when performing a
packet capture using tcpdump determine what information is included in the packet capture file and/or displayed to the console.
F5 recommends filtering to limit the capture packet count and filter what is being captured since running tcpdump can impact
system performance.

Common flags for use with tcpdump


-i specify an interface or VLAN name to capture data on

:n low noise details

:nn low and medium noise details

:nnn low medium and high details

-n disables name resolution

-nn used to disable both nameand service port resolution

-c number of packets to capture

-s snaplen used to specify the amount of each packet to capture.

-w used to save to a file for review later requires <filename> to save data

-r used to view a binary capture file requires <filename> to read capture file

Filtering is possible by host with the following options:

port <port#>displays packets are either sourced from or destined to a port.

src port <port#> displays packets that are sourced from a port.

98
TROUBLESHOOTING
Common troubleshooting tasks

dst port <port#> displays packets that are destined to a port.

Filters can be combined with the expressions and example:


tcpdump -s0 src host <HOSTNAME> and dst port <PORT NUMBER>
tcpdump -s0 src host 192.168.1.1 and dst port 80

When using tcpdump with BIG-IP AFM, the directional flags of traffic can show traffic passing ACL evaluation or potentially not
passing ACL evaluation.

Consider the two following examples (remember to set the snaplen=0 to capture the full packet to see the f5 trailers).
tcpdump -nni 0.0 -s0 -c100 port 80 and host 10.1.1.245
16:26:38.726579 IP 192.168.245.245.1268 > 10.1.1.245.80: S
1614628366:1614628366(0) win 5792 <mss 1460,nop,nop,timestamp 1079282556 0>
in tmm0 lis=
16:26:38.727625 IP 192.168.245.245.6017 > 10.1.1.245.80: S
3728806033:3728806033(0) win 5792 <mss 1460,nop,nop,timestamp 1079290603 0>
in tmm1 lis=
16:26:37.217835 IP 192.168.245.245.58367 > 10.1.1.245.80: S
2430396241:2430396241(0) win 5792 <mss 1460,nop,nop,timestamp 1079290927 0>
in tmm4 lis=

This second example illustrates the flow ingress and egress the BIG-IP.
tcpdump -nni 0.0 -s0 -c100 and host 10.1.1.245
16:13:56.946046 IP 192.168.245.245.6422 > 10.1.1.245.80: S
2181731049:2181731049(0) win 5792 <mss 1460,nop,nop,timestamp 3586289132 0>
in tmm8 lis=
16:13:56.946079 IP 192.168.245.245.6422 > 10.1.1.245.80: S
2181731049:2181731049(0) win 5792 <mss 1460,nop,nop,timestamp 3586289132 0>
out tmm8 lis=/Common/Forwarding _ TCP _ VS

In the first example, TCP SYNs are received and show coming in to the BIG-IP AFM, but there is no egress packet. This may
indicate that an ACL is blocking this traffic. If logging drops, this can be validated through syslog analysis.

In the second example, the TCP SYN shows out of the BIG-IP AFM as well as matching a listener Forwarding_TCP_VS. For this
to occur, the initial connection must pass ACL evaluation.

For detailed information on tcpdump utility, see AskF5 article: SOL411: Overview of packet tracing with the tcpdump utility.

ePVA Acceleration
When using BIG-IP platforms that support ePVA, tcpdump does not show all packets using the default configuration.

If a packet capture is required on the BIG-IP, modify the fastl4 profile to change the offload state or fully disable ePVA as
required. Disabling ePVA acceleration may cause a performance impact, so F5 recommends careful consideration before
making these changes.

99
TROUBLESHOOTING
Troubleshooting using BIG-IQ

To minimize the effect of disabling acceleration when using network listeners, or on heavily utilized network traffic virtual servers,
create a host or network specific listener to apply the changes to for the troubleshooting session.

For detailed information on the ePVA feature, see AskF5 article: SOL12837: Overview of the ePVA feature and AskF5 article:
SOL6546: Recommended methods and limitations for running tcpdump on a BIG-IP system.

Troubleshooting using BIG-IQ


When using BIG-IQ to centrally manage BIG-IP AFM, there are some additional communication requirements and processes that
may affect security and device management operations.

BIG-IQ requires TCP 443 and 22 ports bi-directionally to ensure all functionality. When troubleshooting BIG-IQ connectivity
issues on the BIG-IP system, make sure that these ports are open using tools such as SSH, telnet, and curl.

Perform these tests from the BIG-IQ to the BIG-IP system:

SSH command:
ssh -l root <IP ADDRESS>

SSH example:
ssh l root 192.168.3.158
The authenticity of host 192.168.3.158 (192.168.3.158) cant be
established.
RSA key fingerprint is 6e:35:a8:8c:39:3f:24:90:c1:91:97:a9:3e:ed:23:99.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 192.168.3.158 (RSA) to the list of known
hosts.
Password:
Last login: Wed Mar 30 21:29:54 2016 from 192.168.3.1
[root@big-ip:Active:Standalone] config

Curl command:
curl Ik <IP ADDRESS> | grep HTTP/1.1

Curl from BIG-IQ example:


curl -Ikhttps://10.192.165.76| grep HTTP/1.1
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed

0 173 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0
HTTP/1.1 301 Moved Permanently

100
TROUBLESHOOTING
Troubleshooting using BIG-IQ

Curl from BIG-IP:


curl -Ik https://192.168.255.130 | grep HTTP/1.1
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 3991 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0
HTTP/1.1 200 OK

REST version
BIG-IQ maintains REST packages on all managed BIG-IPs through an update process that deploys the requisite RPM files from
BIG-IP system to BIG-IP system.

To check the version installed on the BIG-IP using the advanced shell

Type the following command:


rpm -qa | grep rest
f5-rest-java-libs-access-bigip-12.0.0-0.0.3800.i686
TS-asm-config-rest-12.0.0-0.0.606.i686
f5-rest-node-libs-12.0.0-0.0.3800.i686
f5-rest-presentation-adc-12.0.0-0.0.3800.i686
f5-rest-java-libs-adc-bigip-12.0.0-0.0.3800.i686
f5-rest-java-libs-adc-12.0.0-0.0.3800.i686
f5-rest-java-libs-mam-12.0.0-0.0.3800.i686
f5-rest-node-0.12.7-0.0.3800.x86 _ 64
f5-rest-rpmbuild-4.11.1-0.0.3800.i686
f5-rest-node-bigstart-12.0.0-0.0.3800.i686
f5-rest-java-host-12.0.0-0.0.3800.i686
f5-rest-presentation-libs-12.0.0-0.0.3800.i686
f5-rest-java-libs-indexing-12.0.0-0.0.3800.i686
f5-rest-mcp-schema-12.0.0-0.0.3800.i686
f5-rest-presentation-blocks-12.0.0-0.0.3800.i686
f5-rest-auth-lib-12.0.0-0.0.606.i686
f5-rest-java-libs-12.0.0-0.0.3800.i686

If the version is not correct, or some packages are incorrect, consider re-deploying the REST framework from BIG-IQ to the
managed BIG-IP system.

For more detailed information on troubleshooting BIG-IQ, refer to the following resource see AskF5 article: SOL16307:
Troubleshooting BIG-IQ device discovery failures.

101
TROUBLESHOOTING
DoS statistics output

REST processes
The BIG-IP REST interface contains several control plane daemons to provide API framework to manage and control the BIG-IP
system. Occasionally the processes may require troubleshooting or restarting to resolve REST communication issues.

For more detailed information on how to restart processes via the advanced shell, see AskF5 article: SOL14736: BIG-IQ
daemons.

Device certificate
BIG-IQ uses the device certificate to communicate to BIG-IP systems. If the BIG-IP device certificate has expired or there is a
problem with the certificate contributing to an authentication issue, a possible solution is to generate a new device certificate on
the BIG-IP, followed by re-discovering the BIG-IP into BIG-IQ.

For more detailed information device certificates, see AskF5 article: SOL15664: Overview of BIG-IP device certificates.

Stateful failover using connection mirroring


BIG-IP TMOS is stateful for TCP flows by design. This security feature causes an existing TCP flow, which is not configured for
mirroring to other devices in the cluster, to be rejected after a firewall failover. UDP flows are not affected.

If the network design requires stateful failover of long-lived connections, connection mirroring must be used to maintain the
default stateful inspection behavior of BIG-IP. When failover from an active to standby BIG-IP occurs, mirrored connection table
entries are available for flow lookup and do not require an additional ACL match to be re-applied.

To determine whether or not this process will effect an existing flow, perform a filtered show sys connection command on both
the active and standby BIG-IP. If the connection flow exists on both, the flow is mirrored and failover will be stateful.

For more detailed information on stateful failover using connection mirroring, see AskF5 article: SOL13478: Overview of
connection and persistence mirroring (11.x - 12.x).

DoS statistics output


The following fields appear in the DoS statistics output for an attack type:

Attack Detected toggles from 0 to 1 when a potential attack is detected. This will be reset back to 0 once the attack is
stopped.

Attack Count represents the total number of times the attack was detected for this BIG-IP AFM DoS vector since the
last boot.

The stats_1h_samples counter tracks the number of samples that BIG-IP AFM received in the previous hour. BIG-IP AFM
sampling rate is once per second. Each second it increases by one until an attack is detected.

Once the stats_1h_samples reaches 3600, BIG-IP AFM uses a detection threshold percent value for that DoS vector for attack
detection.

102
TROUBLESHOOTING
IP intelligence

BIG-IP AFM uses the lower value between detection threshold pps and detection threshold percent value for attack
detection when it has an enough number of samples.

Stats: Total number of packets that BIG-IP/AFM-DoS vector received since the last boot.

Stats Rate: Packets that BIG-IP AFM-DoS vector saw in last second.

Stats 1m: Packets that BIG-IP AFM-DoS vector saw in last minute.

Stats 1h: Packets that BIG-IP AFM-DoS vector saw in last hour until attack detected.

Drops: Total number of packets dropped by BIG-IP AFM-DoS vector since the last boot.

Drops Rate: Total number of packets dropped by BIG-IP AFM-DoS vector in the last second.

Drops 1m: Total number of packets dropped by BIG-IP AFM-DoS vector in last minute.

Drops 1h: Total number of packets dropped by BIG-IP AFM-DoS vector in last hour until attack detected.

Int Drops: Total number of packets dropped in hardware since the last boot.

Int Drops Rate: Total number of packets dropped by BIG-IP AFM-DoS vector in hardware in last second.

Int Drops 1m: Total number of packets dropped by BIG-IP AFM-DoS vector in hardware in last minute.

Int Drops 1h: Total number of packets dropped by BIG-IP AFM-DoS vector in hardware in last hour.

Whitelist Hits: Total number of packets that hit the Whitelist for a particular BIG-IP AFM-DoS vector since the last boot.
This includes total packet count that match the Whitelist for that vector both in software and hardware.

IP intelligence
IP intelligence statistics can be viewed from TMSH. TMSH commands show the current status of the IP reputation feed as well as
IP intelligence information.

IP reputation status shows the current timestamp of the IP intelligence update and the address count from the most recent
update.
tmsh show /sys iprep-status
-----------------------------------------------------------------------
Sys::IP Reputation Database Status
-----------------------------------------------------------------------
Last time the server was contacted for updates 03/14/2016 17:41:10
Last time an update was received 03/14/2016 16:50:34
Total number of IP Addresses in the database 8243809
Number of IP Addresses received in the last update 34766

103
TROUBLESHOOTING
IP intelligence

If Last time an update was received returns a value of failed or none verify a BIG-IP DNS resolver is configured.

To show an IP address in the IP Intelligence database using TMSH at the command line

Type the following command syntax:


tmsh show /security ip info address 1.1.1.1

The output of the command appears similar to the following example:


Security::IP Intelligence Address : 1.1.1.1
Global context
IP Intelligence Sources : User-defined
Whitelisted (Source) : no
Whitelisted (Destination) : no
Policy Action (Source) : drop
Policy Action (Destination) : allow
Match Type : Source
Categories (Source) (1) : auto-blacklist
Categories (Destination) (0)
Total records returned: 1

104
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.

(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)

Did this chapter answer all of your questions about the subject matter? Yes No

If not, what information should be included that is not? 

Did you find any errors pertaining to subject matter in this chapter? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Send
OPTIMIZE THE SUPPORT EXPERIENCE
F5 technical support commitment

Optimize the support experience


F5 technical support commitment
F5 strives to continuously improve its support service and create closer customer relationships. Designed to provide assistance
with specific break-fix issues and ongoing maintenance of F5 products, F5 professional support services are consistently
high-quality. This means:

F5 network support engineers conduct themselves professionally at all times.

F5 is committed to providing the best customer experience possible.

Customers are treated with respect and given every consideration possible.

F5 aims to provide resolutions the first time, every time.

Manager escalation is always available for unresolved or site down issues.

Some technical support issues arise from configuration errors, either within the BIG-IP system or with other devices in the
network. In other cases, a misunderstanding of BIG-IP capabilities can lead to support questions and issues. Although F5 does
everything possible to prevent defects in BIG-IP hardware and software, these issues may still arise periodically. Regardless of
the root cause of a problem, the goal is to resolve any issues quickly.

F5 technical support offerings


A variety of technical support offerings are available to provide the right level of support for any organization.

The F5 Standard and Premium support offerings include remote assistance from F5 network support engineers, both online and
over the phone.

Premium Plus customers receive priority status at F5, with fast, easy access to a dedicated team of senior-level, F5-certified
network support engineers and a service delivery manager.

To learn more, see F5 Technical Support Services or send an email to services@f5.com.

Professional services
Take advantage of the full range of F5 consulting services to help you design, customize, and implement a solution that is right for
your IT infrastructure and supports your business goals.

Consulting Services (f5.com/support/professional-services) provides information about a wide range of F5 Professional Services
offerings and Professional Services Partners. You can use our online forms to request Consulting On Demand for custom, shorter
scope consulting engagements, or iRules OnDemand to get fast access to iRules scripts tailored to your specific needs.

106
OPTIMIZE THE SUPPORT EXPERIENCE
F5 certification

You can request specific support services by using either of the following forms:

Consulting Request Form (http://f5.com/support/professional-services/consulting-request-form).

iRules Consulting Request Form (f5.com/support/professional-services/irules-consulting-request-form).

GUARDIAN professional services partners


F5 GUARDIAN Professional Services Partners are authorized as installation providers and are available to assist you. F5
GUARDIAN partners are selected because they have the skills and experience required to ensure successful implementations of
F5 BIG- IP Local Traffic Manager (LTM) and BIG-IP DNS.

See F5 GUARDIAN Professional Service Partners (http://f5.com/support/professional-services - guardian) for a complete list of
partners.

F5 certification
F5 Certified exams test the skills and knowledge necessary to be successful when working with todays application delivery
challenges. Our technically relevant and appropriate exams deliver consistently reproducible results that guarantee excellence in
those that achieve certification.

Certification levels
The F5 certification program is progressive with the four levelsAdministrator, Specialist, Expert, and Professionalbuilding on
the skills and knowledge demonstrated on previous exams.

C1 F5 Certified BIG-IP Administrator (F5-CA)

The starting point for all certifications; a certified BIG-IP Administrator has basic network and application knowledge to be
successful in application delivery.

C2 F5 Certified Technology Specialists (F5-CTS)

The Technology Specialist certification assures employers that candidates are fully qualified to design, implement, and maintain a
specific product and its advanced features.

C3 F5 Certified Solution Expert (F5-CSE)

The Solution Expert certification focuses on how F5 technologies combine with industry technology to create real-world business
solutions.

C4 F5 Certified Application Delivery Engineer (F5-CADE)

The Application Delivery Engineer certification exam and requirements are still under development.

C5 F5 Certified Application Delivery Architect (F5-CADA)

107
OPTIMIZE THE SUPPORT EXPERIENCE
Review self-help options

The Application Delivery Architect certification exam and requirements are still under development.

Certificate expiration
F5 certifications are valid for two (2) years. Three months before the expiration date, the certificate holder becomes eligible for
recertification and can register for the necessary exam. Only the last exam in the highest level certification achieved needs to be
retaken.

Certification beta program


F5 uses beta exams to maintain the relevancy and accuracy of all exams after production. Beta exams are open to all and
provide candidates an opportunity to have an impact on the F5 Certified program. While beta exams are twice as long, they cost
less than regular exams and give candidates the chance to leave feedback. Beta exams are critical to our exam development
process and improve the F5 Certified program.

Get involved
There are a several ways to get involved with the F5 certification beta program:

Beta participation. Interested in taking our beta exams? Send an email to us at F5Certification@f5.com to learn more.

Exam development. Contact us at F5Certification@f5.com if youre interested in helping us create our F5 Certified exams.

LinkedIn community. Join us on LinkedIn (this link sends you to an external site) for answers to frequently asked questions,
community developed resources, and more.

Visit the F5 Credential Management System (certification.f5.com) for information or to register.

Review self-help options


Before you open a support case, F5 recommends you review self-help materials. For BIG-IP AFM, this includes this operations
guide, BIG-IP Advanced Firewall Manager: Implementation Guide, and the following resources:

AskF5 Knowledge Base

Downloads

Security Updates

BIG-IP iHealth

TechNews

RSS Feeds

DevCentral

108
OPTIMIZE THE SUPPORT EXPERIENCE
Review self-help options

F5 Global Training Services

AskF5
AskF5 (support.f5.com) provides thousands of articles to help you manage your F5 products more effectively, and should be the
first resource you choose when you need support. Step-by-step instructions, downloads, and links to additional resources give
you the means to solve known issues quickly and without delay, and to address potential issues before they become reality.

Whether you want to search the knowledge base to research an issue, or you need the most recent news on your F5 products,
AskF5 is your source for:

Product manuals, operations guides, and release notes


F5 announcements

General articles

Known issues

Security advisories

Recommended practices

Troubleshooting tips

How-to documents

Changes in behavior

Diagnostic and firmware upgrades

Hotfix information

Product life cycle information

Downloads
Downloads are available from the F5 website. It is highly recommended that your F5 software is kept up-to-date, including
hotfixes, security updates, OPSWAT updates, and geolocation database updates. All software downloads are available from F5
Downloads (downloads.f5.com).

Security updates
You can receive timely security updates from F5. When remote vulnerabilities are discovered, F5 implements, tests, and releases
security hotfixes for any vulnerable supported version, and sends an email alert to the F5 Security mailing list. F5 encourages
customers with an active support account to subscribe to this list.

109
OPTIMIZE THE SUPPORT EXPERIENCE
Review self-help options

For more detailed information, see AskF5 article: SOL4602: Overview of the F5 security vulnerability response policy.

BIG-IP iHealth
BIG-IP iHealth (iHealth.f5.com) is among the most important preventative tools to verify the proper operation of your BIG-IP
system. This diagnostic viewer ensures that hardware and software are functioning at peak efficiency, and helps detect and
address issues that may potentially affect F5 systems. iHealth is not integrated within the BIG-IP system. This tool is hosted by F5
at iHealth.f5.com and can be accessed with any web browser.

F5 recommends you generate an iHealth qkview file on the BIG-IP system and upload it to iHealth on a weekly basis in order to
benefit from the many regularly occurring diagnostic updates. Uploading qkview files to iHealth also provides F5 technical
support with access to your qkview files if you open a support case.

By reviewing iHealth output, many of the issues commonly experienced by customers can be resolved without the need for
opening a support case with F5.

For more detailed information on running iHealth diagnostics, see BIG-IP iHealth in the TMOS Operations Guide.

TechNews
AskF5 provides two TechNews email publications to help keep administrators up-to-date on various F5 updates and other
offerings:

TechNews Weekly eNewsletters include timely information about known issues, product releases, hotfix releases,
updated and new articles, and new feature notices.

TechNews Notifications are sent any time a product or hotfix is released. This information is also included in the next
weekly TechNews email.

To sign up for the TechNews mailing lists, go to AskF5 Publications Preference Center and select Subscribe: Mailing Lists from
the Self-Help menu. Provide your contact information and select TechNews Weekly Newsletter and/or TechNews
Notifications.

AskF5 recent additions and updates


You can subscribe to F5 RSS feeds to stay informed about new documents pertaining to your installed products or products of
interest. The AskF5 Recent Additions and Updates page provides an overview of all the documents recently added to the
knowledge base.

The Recent Additions and Updates list is also published over RSS. You can configure feeds that pertain to specific products,
product versions, and/or document sets. You can also aggregate multiple feeds into your RSS Reader to display one unified list
of all selected documents.

110
OPTIMIZE THE SUPPORT EXPERIENCE
F5 global training services

To generate an RSS feed

Go to AskF5 Knowledge Base and select Subscribe: RSS from the Self-Help menu.

For more detailed information, see AskF5 article: SOL9957: Creating a custom RSS feed to view new and updated
documents.

DevCentral
DevCentral (devcentral.f5.com) is an online forum of F5 employees and customers that provides technical documentation,
discussion forums, blogs, and media, related to application delivery networking. DevCentral is a resource for education and
advice on F5 technologies, and is especially helpful for iRules and iApps developers. Access to DevCentral is free, but
registration is required.

As a DevCentral member, you can:

Ask forum questions.

Rate and comment on content.

Contribute to wikis.

Download lab projects.

Join community interest groups.

Solve problems and search for information.

Attend online community events.

View educational videos.

F5 global training services


F5 Global Training Services provides traditional classroom learning opportunities, live-online training, and free, self-paced online
courses to help you get the most out of your investment.

In-person courses
F5 courses are available in multiple training facilities across five continents. Each course combines instructor presentations,
classroom discussions, and interactive labs. The hands-on learning environment helps provide a fast track to accomplishing your
goals.

Virtual instructor-led training


Remote online courses mirror classroom training. Participants watch the remote instructors live lecture online, participate in

111
OPTIMIZE THE SUPPORT EXPERIENCE
Engage support

discussions, and perform lab exercises using remote desktop control.

Free online training


You can use the self-paced Getting Started series of free, web-based courses to learn how to deploy F5 solutions to address
your most common application delivery problems.

For more detailed information on F5 education opportunities, see f5.com/education.

F5 Training Programs and Education (f5.com/education/training) provides links to course schedules, pricing, and registration
details. This page also has information about alternative training solutions such as virtual and web-based training for those who
cannot attend training in person. Links to more information are provided in F5 Professional Certification or a non-accredited
Application Delivery Networking Certificate through F5.

Engage support
F5 Technical Support is designed to provide support for specific break-fix issues for customers with active support contracts. For
more information about F5 scope of support, see Support Policies on F5.com.

Options for assistance


You can contact F5 Support in two ways:

Online: You can open a support case at the F5 WebSupport Portal. Click Register for an Account to access to the
WebSupport Portal.

By phone: Phone numbers are provided in the General contact numbers section below. It is strongly recommended that
you contact F5 by phone if you have a Sev1 or Sev2 case, as defined in F5 Networks - Support Quick Reference Guide.

F5 technical support resources


F5 support resources are available 24 hours a day, seven days a week, and are distributed around the globe in multiple support
centers. Live technical support is provided by our professional network support engineers. Hours of availability may vary
depending on the service contract with F5.

Contact numbers
Standard, Premium, and Premium Plus Support customers can open and manage cases by calling one of the contact numbers
listed below.

North America

North America: 1-888-882-7535 or (206) 272-6500

Traffix Support Only: 1-855-849-5673 or (206) 272-5774

112
OPTIMIZE THE SUPPORT EXPERIENCE
Engage support

Outside North America

Outside North America, Universal Toll-Free: +800 11 ASK 4 F5 or (800 11275 435)

Additional contact numbers by country

Australia: 1800 784 977

China: 010 5923 4123

Egypt: 0800-000-0537

Greece: 00-800-11275435

Hong Kong: 001-800-11275435

India: 000-800-650-1448; 000-800-650-0356 (Bharti Air users)

Indonesia: 001-803-657-904

Israel: 972-37630516

Japan: 81-3-5114-3260 or 0066-33-812670

Malaysia: 1-800-814994

New Zealand: 0800-44-9151

Philippines: 1-800-1-114-2564

Saudi Arabia: 800-844-7835

Singapore: 6411-1800

South Africa: 080-09-88889

South Korea: 002-800-11275435

Taiwan: 00-800-11275435

Thailand: 001-800-12-0666763

United Arab Emirates: 8000-3570-2437 United Kingdom: 44-(0)8707-744-655

Vietnam: 120-11585

Open a support case


F5 provides several resources to help find solutions to problems. Before opening a support case with F5 technical support,

113
OPTIMIZE THE SUPPORT EXPERIENCE
Engage support

check to see if the issue you are encountering is already documented.

Before opening a support case with F5, you should consult the following resources:

Deployment guides and white papers provide information about specific deployment configurations.

AskF5 Knowledge Base provides many articles including known issues, how-to guides, security advisories, release notes,
and general information about products. Many of the issues customers encounter are already documented on AskF5.

BIG-IP iHealth enables customers to upload qkview configuration snapshots in order to verify operation of any BIG-IP
system. Gather information to open a support case.

If your issue cannot be solved using the resources listed, and you need to open a support case, you must first gather several
pieces of important information about your issue. Providing full and accurate information helps speed the path to resolution. The
required information for the majority of situations is summarized below:

The serial number or base registration key of the specific BIG-IP system requiring support.

For more detailed information on finding the serial number, see AskF5 article: SOL917: Finding the serial number or
registration key of your F5 device.

A full description of the issue: A clear problem statement is the best tool in helping to troubleshoot issues. Your description
should include as much of the following information as you can provide.

Occurrences and changes: The date and times of initial and subsequent recurrences. Did this issue arise at
implementation or later? Were there any changes or updates made to the BIG-IP system prior to the issue arising? If so,
what were they?

Symptoms: Ensuring your list of symptoms is as detailed as possible will give more information for support personnel to
correlate with.

Scope of the problem: Note whether the problem is system-wide or limited to a particular configuration feature, service, or
element (such as VLAN, interface, application service, virtual server, pool, and others).

BIG-IP component: The feature, configuration element, or service being used when the problem occurred (such as portal
access, network access, authentication services, VDI, Exchange).

Steps to reproduce: The steps to reproduce the problem as accurately and in as much detail as possible. Include
expected behavior (what should happen) as well as actual behavior (what does happen).

Errors: Complete text of any error messages produced.

Environment: Current usage of the system. (Is this unit in production? If so, is there currently a workaround in place?)

Browsers: Types and versions, if applicable.

114
OPTIMIZE THE SUPPORT EXPERIENCE
Engage support

Changes: System changes made immediately prior to the problems first occurrence. This may include upgrades,
hardware changes, network maintenance, and other upgrades. Have any changes been made to resolve the problem? If
so, what were they?

Issue Severity: A description of the impact the issue is having on your site or Case severity

Severity 1: Software or hardware conditions on your F5 device are preventing the execution of critical business
activities. The device will not power up or is not passing traffic.

Severity 2: Software or hardware conditions on your F5 device are preventing or significantly impairing high-level
commerce or business activities.

Severity 3: Software or hardware conditions on your F5 device are creating degradation of service or functionality in
normal business or commerce activities.

Severity 4: Questions regarding configurations (how to), troubleshooting non-critical issues, or requests for product
functionality that are not part of the current product feature set.

Contact and availability information including alternate contacts authorized to work on the problem with F5 Technical
Support. When there are more personnel available to work with F5 Technical Support, the resolution of your issue may be
expedited.

Remote access information, if possible.

A qkview file obtained while problem symptoms are manifesting. A qkview file of the system before the occurrence is also
useful. F5 recommends archiving qkview files regularly. For more information, see BIG-IP iHealth in the TMOS Operations
Guide.

Product-specific information: Software versions and types of equipment in use.

Platform and system. Version and provisioned software modules of the affected system.

To locate platform and system information using tmsh from the command line

Type the following command:


tmsh show /sys hardware

Output will appear similar to the following example:


<SNIP some of the output>
Platform
NameBIG-IP 3900
BIOS Revision F5 Platform: C106 OBJ-0314-03 BIOS (build: 010)
Date: 01/10/16

115
OPTIMIZE THE SUPPORT EXPERIENCE
Engage support

Base MAC 00:01:d7:be:bf:80


System Information
TypeC106
Chassis Serialf5-jspv-lzxw
Level 200/400Part 200-0322-02 REV C
Switchboard Serial
Switchboard Part Revision
Host Board Serial
Host Board Part RevisionTo copy software version and build number information from the
command line

Type the following command:


cat /VERSION

Output will appear similar to the following example:


Product: BIG-IP
Version: 11.6.0
Build: 0.0.401
Sequence: 11.6.0.0.0.401.0
BaseBuild: 0.0.401
Edition: Final
Date: Mon Jan 12 21:08:03 PDT 2016
Built: 140811210803
Changelist:1255500
JobID:386543

Highlight and copy the output information and include it with your support case.

To copy provisioned module information from the command line

Type the following command:


tmsh list /sys provision

116
OPTIMIZE THE SUPPORT EXPERIENCE
Engage support

Output will appear similar to the following example:


sys provision afm { }
sys provision am { }
sys provision apm {
level nominal
}
sys provision asm { }
sys provision avr { }
sys provision fps { }
sys provision gtm { }
sys provision lc { }
sys provision ltm {
level minimum
}
sys provision pem { }
sys provision swg { }

Highlight and copy the output information and include it with your support case.

Open a case using WebSupport Portal


If you cannot find the answer to your problem using the resources listed above, you can open a support case online, using the F5
WebSupport Portal (websupport.f5.com).

Use of the WebSupport Portal requires a current support contract and registration on the F5 website (login.f5.com).

Once registered, you will receive an email within 24 hours letting you know your account has been enabled with WebSupport
Portal access.

To register for WebSupport Portal access

1. Go to F5 WebSupport Portal.

2. Click Register for an Account.

3. Enter your email address.

4. Complete the Contact information portion of the page and then select I have a support contract and
need access to WebSupport.

5. Enter your serial number or registration key (optional).

117
OPTIMIZE THE SUPPORT EXPERIENCE
Send information to Support

6. After logging you can open a support case.

Send information to Support


Once the information is assembled and appropriate documentation gathered, transfer it to F5 technical support following the
steps.

Share diagnostic files with F5 technical support


F5 technical support may require diagnostic files to help resolve technical support issues. Upload files to F5 using one of the
following two methods:

Upload qkview diagnostic files to BIG-IP iHealth (ihealth.f5.com).

Upload/download files using F5 dropbox (dropbox.f5.com).

Upload qkview diagnostic files to BIG-IP iHealth


The preferred method for providing a qkview diagnostic file to F5 Support is to upload the file to the BIG-IP iHealth website.
BIG-IP iHealth allows you to quickly diagnose the health and proper operation of your BIG-IP system. For more information about
using BIG-IP iHealth, see BIG-IP iHealth in the TMOS Operations Guide.

Upload/download files using dropbox.f5.com


The dropbox.f5.com site is a widely available file repository for exchanging incoming and outgoing diagnostic files with the F5
Technical Support team. The dropbox.f5.com site supports HTTP, FTP, and SFTP for transferring files to F5, and FTP and SFTP
for retrieving files from F5.

User name and password


Access to the dropbox.f5.com site is associated with an open support ticket number with syntax CXXXXXX or 1-########. The
user name provided to the dropbox.f5.com site is the ticket number, and the password provided is an email address of a user
associated with the ticket.

For example, if joeuser@example.com has opened ticket C123456, he would log in to the dropbox.f5.com site using the following
information:
Username: C123456
Password: joeuser@example.com

If joeuser@example.com has opened ticket 1-12345678, he would log in to the dropbox.f5.com site using the following
information:
Username: 1-12345678
Password: joeuser@example.com

118
OPTIMIZE THE SUPPORT EXPERIENCE
Send information to Support

For more detailed information regarding uploading and downloading files using dropbox.f5.com, see AskF5 article: SOL2486:
Providing files to F5 Technical Support.

Capture HTTP request/response


You may be asked to provide an overview of the HTTP request/response from the client side. This can help F5 Technical Support
understand the problem and provide a baseline for reproduction of the issue in the lab.

F5 recommends using one of the following tools to collect the data:

HttpWatch (save as HWL)

Fiddler (save as SAZ)

Chrome (save as cURL)

Important HttpWatch and Fiddler are commercial software and a license


is required.

Example
In the following example, a Google Chrome browser is used to save a single HTTP request into a cURL command and the entire
transaction into an HAR archive file.

1. Go to View >> Developer > Developer tools > Network tab.

2. Refresh the page.

3. Locate the HTTP request in question.

4. Copy as cURL.

5. Send the content in clipboard to F5.

6. Save as HAR file.

7. Go to View > Developer > Developer tools > Network tab

8. Refresh the page

9. Save with HAR with content

10. Send the output to F5 Technical Support.

119
OPTIMIZE THE SUPPORT EXPERIENCE
Send information to Support

Important Information leakage may occur when capturing sensitive


application transactions on production traffic.

Use tcpdump utility


You can use tcpdump to capture client-side and server-side traffic of HTTP request/response to help F5 reproduce and
troubleshoot your issue.

To capture traffic using tcpdump

Use the following command syntax:


tcpdump -i 0.0:nnn -s0 -w /var/tmp/AFM _ traffic _ capture.cap host
<Virtual server IP address> or host <Pool member IP address or Host more
pool member IP address> -vvv

Important Information leakage may occur when capturing sensitive


application transactions on production traffic.

SOL411: Overview of packet tracing with the tcpdump utility

SOL6546: Recommended methods and limitations for running tcpdump on a BIG-IP system

SOL7227: Considerations when using the tcpdump utility with tagged VLAN traffic

SOL13637: Capturing internal TMM information with tcpdump

SOL2289: Using advanced tcpdump filters

Save UCS file


You may be asked to supply a user configuration set (UCS) file so that F5 Technical Support can load your configuration to
reproduce your issue in the lab.

To save a UCS file using tmsh from the command line

Type the following command:


tmsh save /sys ucs afmsupport

Output is logged to the /var/local/ucs/afm_support.ucs file.

For more detailed information on UCS archives, see AskF5 article: SOL4423: Overview of UCS archives.

120
OPTIMIZE THE SUPPORT EXPERIENCE
Send information to Support

Important A typical UCS archive contains user accounts, passwords,


critical system files, and SSL private keys. However, you can explicitly
exclude SSL private keys from a UCS archive during the backup process. If
your UCS archive contains SSL private keys, you must store backup UCS
archives in an environment that is as secure as where you store your private
keys.

121
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.

(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)

Did this chapter answer all of your questions about the subject matter? Yes No

If not, what information should be included that is not? 

Did you find any errors pertaining to subject matter in this chapter? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No

If yes, please describe the error: 

If yes, please copy and paste the paragraph containing the error here: 

Send
LEGAL NOTICES
Send information to Support

Legal Notices
Publication date
This document was published on July 2016.

Publication Number: BIG-IP AFMOps 01_1.

Copyright
Copyright 2013-2016, F5 Networks, Inc. All rights reserved.

F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5 assumes no responsibility for
the use of this information, nor any infringement of patents or other rights of third parties which may result from its use. No
license is granted by implication or otherwise under any patent, copyright, or other intellectual property right of F5 except as
specifically described by applicable user licenses. F5 reserves the right to change specifications at any time without notice.

Trademarks
AAM, Access Policy Manager, Advanced Client Authentication, Advanced Firewall Manager, Advanced Routing, AFM, APM,
Application Acceleration Manager, Application Security Manager, ARX, AskF5, ASM, BIG-IP, BIG-IQ, Cloud Extender,
CloudFucious, Cloud Manager, Clustered Multiprocessing, CMP, COHESION, Data Manager, DevCentral, DevCentral [DESIGN],
DNS Express, DSC, DSI, Edge Client, Edge Gateway, EdgePortal, ELEVATE, EM, Enterprise Manager, ENGAGE, F5, F5[DESIGN],
F5 Certified [DESIGN], F5 Networks, F5SalesXchange [DESIGN], F5Synthesis, f5Synthesis, F5Synthesis[DESIGN], F5
TechXchange [DESIGN], Fast Application Proxy, Fast Cache, FirePass, Global Traffic Manager, GTM, GUARDIAN, iApps, IBR,
Intelligent Browser Referencing, Intelligent Compression, IPv6 Gateway, iControl, iHealth, iQuery, iRules, iRules OnDemand,
iSession, L7 RateShaping, LC, Link Controller, Local Traffic Manager, LTM, LineRate, LineRate Systems [DESIGN], LROS, LTM,
Message Security Manager, MSM, OneConnect, Packet Velocity, PEM, Policy Enforcement Manager, Protocol Security Manager,
PSM, Real Traffic Policy Builder, SalesXchange, ScaleN, Signalling Delivery Controller, SDC, SSL Acceleration, software designed
applications services, SDAC (except in Japan), StrongBox, SuperVIP, SYN Check, TCP Express, TDR, TechXchange, TMOS,
TotALL, Traffic Management Operating System, Traffix Systems, Traffix Systems (DESIGN), Transparent Data Reduction, UNITY,
VAULT, vCMP, VE F5 [DESIGN], Versafe, Versafe [DESIGN], VIPRION, Virtual Clustered Multiprocessing, WebSafe, and
ZoneRunner, are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries, and may not be used without
express written consent.

All other product and company names herein may be trademarks of their respective owners.

Patents
This product may be protected by one or more patents. See the F5 Patents page (http://www.f5.com/about/guidelines-policies/
patents).

123
LEGAL NOTICES
Notice

Notice
THE SOFTWARE, SCRIPTING, AND COMMAND EXAMPLES ARE PROVIDED "AS IS," WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
LIABLE FOR ANY CLAIM, DAMAGES, OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE, SCRIPTING AND COMMAND EXAMPLES, OR THE
USE OR OTHER DEALINGS WITH THE SOFTWARE, SCRIPTING, AND COMMAND EXAMPLES.

124

Você também pode gostar