F5 Flashcards
What is a health monitor?
A health monitor is a test designed to report the status of a pool, pool member, or node on an ongoing basis, at a set interval. When a health monitor marks a pool, pool member, or node as down, the BIG-IP system stops sending traffic to the device.
What are health monitor Interval and Timeout?
Interval - number of seconds between each test (default 5)
Timeout - if there is no successful test during this time, the device is marked unavailable (default 16)
What’s the recommended Timeout for health monitors?
(3 x Interval + 1) seconds
What other type of monitor is there other than health monitor?
Performance monitor
When a server that is being monitored by a performance monitor displays a degradation in performance, the BIG-IP system redirects traffic to other resources until the performance of the server returns to normal. The monitor checks the current CPU, memory, and disk usage of a server that is running and then dynamically load balances traffic based on its performance.
What 4 types of health monitor are there?
Address Check
An address check monitor provides a simple verification of an address on a network. This type of monitor sends a request to a virtual server. When a response is received, the test is successful. If the monitor is unsuccessful in determining that a node is available, the monitor marks the node and all pool members at that IP address as Offline.
Service (Application) Check
An application check monitor interacts with servers by sending multiple commands and processing multiple responses.
An FTP monitor, for example, connects to a server, logs in by using a user ID and password, navigates to a specific directory, and then downloads a specific file to the /var/tmp directory. If the file is retrieved, the check is successful.
Content Check
A content check monitor determines whether a service is available and whether the server is serving the appropriate content. This type of monitor opens a connection to an IP address and port, and then issues a command to the server. The response is compared to the monitor’s receive rule. When a portion of the server’s response matches the receive rule, the test is successful.
Path Check
A path check monitor determines whether traffic can flow through a device to an endpoint. A path check monitor is successful when network paths through firewalls or routers are available.
What ways of assigning a monitor are there?
Monitor-to-pool association
This type of association associates a monitor with an entire load balancing pool. In this case, the monitor checks all members of the pool.
Monitor-to-pool member association
This type of association associates a monitor with an individual pool member, that is, an IP address and service. In this case, the monitor checks only that pool member and not any other members of the pool. For example, we can create an instance of the monitor http for pool member 10.10.10.10:80 of my_pool.
Important: A monitor associated with an individual pool member supersedes a monitor associated with that pool member’s parent pool.
Monitor-to-node Specific association
This type of association associates a monitor with a specific node. In this case, the monitor checks only the node itself, and not any services running on that node. For example, we can create an instance of the monitor icmp for node 10.10.10.10. In this case, the monitor checks the specific node only, and not any services running on that node.
Monitor-to-node Default association
We can designate a monitor as the default monitor that we want the BIG-IP system to associate with one or more nodes. In this case, any node to which we have not specifically assigned a monitor inherits the default monitor.
Some monitor types are designed for association with nodes only, and not pools or pool members. Other monitor types are intended for association with pools and pool members only, and not nodes. Finally, in some instances, some monitor types associated with a node are not mutually exclusive of pools or pool members, and must function in combination in some scenarios.
Node-only monitors specify a destination address in the format of an IP address with no service port (for example, 10.10.10.2). Conversely, monitors that we can associate with nodes, pools, and pool members specify a destination address in the format of an IP address and service port (for example, 10.10.10.2:80). Therefore, when we use the BIG-IP Configuration utility to associate a monitor with a pool, pool member, or node, the utility displays only those pre-configured monitors that are designed for association with that server.
For example, we cannot associate the monitor icmp with a pool or its members, since the icmp monitor is designed to check the status of a node itself and not any service running on that node.
What is a Profile?
A profile is an object or configuration tool that contains settings with values that we can use to affect the behavior of a particular type of network traffic, such as HTTP connections. Profiles also provide a way to enable connection and session persistence, and to manage client application authentication.
How do we associate profiles?
After configuring a profile, we associate the profile with a virtual server. The virtual server then processes traffic according to the values specified in the profile. Using profiles enhances your control over managing network traffic, and makes traffic-management tasks easier and more efficient.
We can associate multiple profiles with a single virtual server. For example TCP profile, SSL profile, and HTTP profile with the same virtual server.
What types of profiles are there?
Default, Custom and Parent profiles
By default, LTM provides you with a set of default profiles that contain various settings with default values that define the behavior of different types of traffic. For example the http default profile.
If we want to change those values to better suit the needs of your network environment, we can create a custom profile. A custom profile is a profile derived from a default profile and contains values that we specify.
A parent profile is a profile from which your custom profile inherits its settings and their default values.
What is a profile dependency?
Some profiles are dependent on others. For example Cookie Persistence will not run without HTTP profile and http profile will not run without TCP profile.
Some profiles can’t be combined.
What are SSL profiles nad what 2 types are there?
When we want the BIG-IP system to process application traffic over SSL, we can configure the system to perform the SSL handshake that destination servers normally perform. This ability for the BIG-IP system to offload SSL processing from a destination server is an important feature of the BIG-IP system.
The most common way to configure the BIG-IP system is to create a Client SSL profile, which makes it possible for the BIG-IP system to decrypt client requests before sending them on to a server, and encrypt server responses before sending them back to the client.
Within a Client SSL profile specifically, we can specify multiple certificate/key pairs, one per key type. This enables the system to accept all types of cipher suites that a client might support as part of creating a secure connection. The system then decrypts the client data, manipulates any headers or payload according to the way that you configured the Client SSL profile, and by default, sends the request in clear text to the target server for processing.
For those sites that require enhanced security on their internal network, you can configure a Server SSL profile. With a Server SSL profile, the BIG-IP system re-encrypts the request before sending it to the destination server. When the server returns an encrypted response, the BIG-IP system decrypts and then re-encrypts the response, before sending the response back to the client.
What is SSL acceleration?
SSL acceleration refers to off-loading processor-intensive SSL encryption and decryption from a server to a device configured to accelerate the SSL encryption/decryption routine.
The F5 BIG-IP® product family uses specialized hardware built for SSL acceleration to remove processing bottlenecks and encrypt data without having to change application code. BIG-IP cuts costs and overhead by consolidating SSL certificates, eliminating the need to purchase SSL-capable software for each server within the network.
What is SSL Termination and what are the advantages of using it?
SSL termination refers to the process of decrypting encrypted traffic before passing it along to a web server. Instead of relying upon the web server to do this computationally intensive work, we can use SSL termination to reduce the load on your servers, speed up the process, and allow the web server to focus on its core responsibility of delivering web content.
The advantages are:
BIG-IP performs SSL key exchange and bulk encryption.
It centralizes certificate management.
It offloads SSL traffic from the servers.
It allows iRules, cookie persistence, security policies and many other specific features.
What is a Session Persistence?
When we configure session persistence, the BIG-IP system tracks and stores session data, such as the specific pool member that serviced a client request. The primary reason for tracking and storing session data is to ensure that client requests are directed to the same pool member throughout the life of a session or during subsequent sessions.
In addition, session persistence can track and store other types of information, such as user preferences or a user name and password.
Why are there different types of persistence?
The BIG-IP system offers several types of session persistence, each one designed to accommodate a specific type of storage requirement for session data. The type of persistence that we implement depends on where and how we want to store client-specific information, such as items in a shopping cart or airline ticket reservations.
For example, we might store airline ticket reservation information in a back-end database that all servers can access, or on the specific server to which the client originally connected, or in a cookie on the client’s machine. When we enable persistence, returning clients can bypass load balancing and instead connect to the server to which they last connected in order to access their saved information.