Copyright 2005-5/13/13, F5 Networks, Inc. All rights reserved.
F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5
assumes no responsibility for the use of this information, nor any infringement of patents or other rights of
third parties which may result from its use. No license is granted by implication or otherwise under any
patent, copyright, or other intellectual property right of F5 except as specifically described by applicable
user licenses. F5 reserves the right to change specifications at any time without notice.
Trademarks
Access Policy Manager, Advanced Client Authentication, Advanced Routing, APM, Application Security
Manager, ARX, AskF5, ASM, BIG-IP, BIG-IQ, Cloud Extender, CloudFucious, Cloud Manager,
Clustered Multiprocessing, CMP, COHESION, Data Manager, DevCentral, DevCentral [DESIGN], DNS
Express, DSC, DSI, Edge Client, Edge Gateway, Edge Portal, ELEVATE, EM, Enterprise Manager,
ENGAGE, F5, F5 [DESIGN], F5 Management Pack, F5 Networks, F5 World, Fast Application Proxy,
Fast Cache, FirePass, Global Traffic Manager, GTM, GUARDIAN, IBR, Intelligent Browser Referencing,
Intelligent Compression, IPv6 Gateway, iApps, iControl, iHealth, iQuery, iRules, iRules OnDemand,
iSession, L7 Rate Shaping, LC, Link Controller, Local Traffic Manager, LTM, Message Security
Manager, MSM, OneConnect, OpenBloX, OpenBloX [DESIGN], Packet Velocity, Policy Enforcement
Manager, PEM, Protocol Security Manager, PSM, Real Traffic Policy Builder, Rosetta Diameter Gateway,
ScaleN, Signaling Delivery Controller, SDC, SSL Acceleration, StrongBox, SuperVIP, SYN Check, TCP
Express, TDR, TMOS, Traffic Management Operating System, Traffix Diameter Load Balancer, Traffix
Systems, Traffix Systems (DESIGN), Transparent Data Reduction, UNITY, VAULT, VIPRION, vCMP,
virtual Clustered Multiprocessing, WA, WAN Optimization Manager, WebAccelerator, WOM, and
ZoneRunner, are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries, and
may not be used without F5's express written consent.
All other product and company names herein may be trademarks of their respective owners.
Patents
This product may be protected by U.S. Patents 7,877,511; 7,958,347. This list is believed to be current as
of May 13, 2013.
Export Regulation Notice
This product may include cryptographic software. Under the Export Administration Act, the United States
government may consider it a criminal offense to export this product from the United States.
RF Interference Warning
This is a Class A product. In a domestic environment this product may cause radio interference, in which
case the user may be required to take adequate measures.
FCC Compliance
This equipment has been tested and found to comply with the limits for a Class A digital device pursuant
to Part 15 of FCC rules. These limits are designed to provide reasonable protection against harmful
interference when the equipment is operated in a commercial environment. This unit generates, uses, and
can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual,
may cause harmful interference to radio communications. Operation of this equipment in a residential area
is likely to cause harmful interference, in which case the user, at his own expense, will be required to take
whatever measures may be required to correct the interference.
Any modifications to this device, unless expressly approved by the manufacturer, can void the user's
authority to operate this equipment under part 15 of the FCC rules.
ARX Site Planning Guideiii
Canadian Regulatory Compliance
This Class A digital apparatus complies with Canadian ICES-003.
Standards Compliance
This product conforms to the IEC, European Union, ANSI/UL and Canadian CSA standards applicable to
Information Technology products at the time of manufacture.
Acknowledgments
This product includes software from several third-party vendors. Each vendor is listed below with the
applicable copyright.
Copyright (c) 1990, 1993, 1994, 1995 The Regents of the University of California. All rights reserved.
Copyright 2000 by the Massachusetts Institute of Technology. All Rights Reserved.
Export of this software from the United States of America may require a specific license from the United
States Government. It is the responsibility of any person or organization contemplating export to obtain
such a license before exporting.
Copyright 1993 by OpenVision Technologies, Inc.
Copyright (C) 1998 by the FundsXpress, INC.
All rights reserved.
Export of this software from the United States of America may require a specific license from the United
States Government. It is the responsibility of any person or organization contemplating export to obtain
such a license before exporting.
Copyright (c) 1995-2001 International Business Machines Corporation and others
All rights reserved.
Copyright (c) 1990-2003 Sleepycat Software. All rights reserved.
Copyright (c) 1995, 1996 The President and Fellows of Harvard University. All rights reserved.
Copyright (c) 1998-2004 The OpenSSL Project. All rights reserved.
Unless otherwise noted, the companies, organizations, products, domain names, email addresses, logos,
people, places, and events depicted in examples herein are fictitious. No association with any real
company, organization, product, domain name, email address, logo, person, place, or event is intended or
should be inferred.
Revision History
October 2005 - Rev A
November 2005 - Rev B - hardware correction
March 2006 - Rev C - Software Release 2.3
August 2006 - Rev D, updates for Software Release 2.4
September 2006 - Rev E, added more configuration limits
September 2006 - Rev F, updates for Software Release 2.4.2
March 2007 - Rev G, added best practices for more filer types; updates for Release 2.5
May 2007 - Rev H, updates for Release 2.5.1
December 2007 - Rev J, clarification of Metadata-share best practices
February 2008 - Rev K, clarification of Console-cable pinouts for Release 2.7.1
March 2008 - Rev L, conversion to F5 format for Release 3.1.0
June 2008 - Rev M, more namespace/volume limits for Release 3.2.0
®
June 2008 - Rev N, updates for the ARX
October 2008 - Rev P, re-brand the OS and revise power specifications for ARX4000
June 2009 - Rev Q, update filer/server instructions
November 2009 - Rev R, add ARX
January 2010 - Rev S, more updates for Release 5.01.000
March 2010 - Rev T, updates for Software Release 5.01.005
September 2010 - Rev U, add updates for Release 5.02.000
iv
4000 chassis, and for Release 4.0.0
®
2000 and other updates for Release 5.01.000
January 2011 - Rev V, add updates for Release 5.03.000
June 2011 - Rev W, add updates for Release 6.00.000
September 2011 - Rev X, add updates for Release 6.01.000
October 2011 – Rev Y, refer to licensed limits
July 2012 - Rev Z, add updates for Release 6.02.000
October 2012 - Rev AA, add updates for Release 6.03.000
June 2013 - Rev AB, add updates for Release 6.04.000
ARX Site Planning Guidev
vi
1
Site Planning
This manual describes network and environmental considerations for
installing an Adaptive Resource Switch (ARX
prepare for adding an ARX to your network.
®
). Use this document to
Concepts and Terminology
clients
servers
back end
front end
ARX (proxy)
The ARX acts as a resource proxy between the current clients and servers
on your network. The switch terminates client requests, determines the
correct server to process the request, and then originates a new request to the
server. Messages in the reverse direction, from servers to clients, also
terminate and restart at the ARX. The clients are said to be at the front end
of the ARX, and the servers are said to be at the back end. As you plan to
add a switch to your network, it is helpful to remember the sharp division
between the switch’s front-end and back-end processing.
The following figure illustrates this sharp division.
Figure 1.1 ARX architecture showing front end versus backend
Concepts and Terminology
Platforms and Modules
ARX Site Planning Guide1 - 3
You can purchase any of the following ARX platforms:
• Single-port ARX-VE (a virtual appliance)
• Single-port ARX-500
• 8-port ARX-1500
• 12-port ARX-2000
• 4-port ARX-2500, with 2 additional 10-Gigabit ports
• 12-port ARX-4000, with 2 additional 10-Gigabit ports
This document is relevant to all of the above platforms.
Chapter 1
Site Planning
Namespaces
You can configure one or more namespaces for your front-end clients. Each
namespace is a collection of virtual file systems, called volumes, under a
single authentication domain. A volume is a collection of shares (or exports)
hosted on the back-end file servers.
Selecting a Network Topology
You can deploy the ARX in one of the following network topologies:
• One-armed proxy. The ARX uses a single logical connection to reach all
clients and servers.
• Multiple subnet. The ARX terminates one or more client subnets and a
separate server subnet.
The following subsections describe each of these topologies.
One-Armed Proxy Topology
In a one-armed proxy topology, the ARX connects to a single IP subnet on a
single VLAN. All of the switch’s connectivity to clients and servers goes
through this single subnet/VLAN. The connection is typically through a
link-aggregation channel.
One-Armed Proxy: Before Installing an ARX
Figure 1.2 shows clients and servers on the same VLAN and subnet before
the introduction of the ARX. The router connects the LAN to additional
client and server subnets, perhaps on other campuses.
1 - 4
Selecting a Network Topology
servers
.x
Figure 1.2 Clients and servers on the same VLAN before using the ARX.
VLAN 25, IP subnet 192.168.25
DASclientsNAS
One-Armed Proxy: After Installing an ARX
The ARX has a single physical connection to the client/server subnet. On
the switch, you configure the same subnet and VLAN for both front-end
clients and back-end servers. You can also add static routes to additional
client and/or server subnets.
Figure 1.3 shows clients and servers after cutting in an ARX.
ARX Site Planning Guide1 - 5
Chapter 1
DASclientsNAS
servers
VLAN 25, IP subnet 192.168.25.x
Site Planning
Figure 1.3 Clients and servers on a VLAN after cutting in an ARX.
Multiple Subnet Topology
A multiple subnet deployment divides clients and servers into multiple IP
subnets. You can define multiple subnets, static routes, and default routes on
the ARX to reach any number of subnets at the front end or back end.
Multiple Subnet: Before Installing an ARX
Figure 1.4 shows clients and servers on separate VLANs and subnets, with a
router connecting the two subnets.
1 - 6
Selecting a Network Topology
Figure 1.4 Clients and servers on separate VLANs and subnets
servers
192.168.25.x
172.100.90.x
clients
Multiple Subnet: After Installing an ARX
As shown in Figure 1.5, the ARX has a separate connection to the client
subnet and the server subnet in a multiple subnet topology. The switch
serves as a proxy for CIFS and/or NFS transactions between the clients and
servers.
As a proxy, the ARX has separate transactions with clients on its front end
and servers on its back end. In this topology, the ARX does not cause
looping.
ARX Site Planning Guide1 - 7
Chapter 1
Note
d
d
y)
Site Planning
Figure 1.5 ARX as proxy for CIFS and/or NFS transactions
servers
192.168.25.x
back en
front en
ARX (prox
172.100.90.x
clients
Allocating IP Addresses
As a resource proxy with distributed processors, the ARX requires several
IP addresses to communicate with front-end clients and its back-end servers.
Every network processor on the switch requires its own address to terminate
and originate transactions with back-end servers. These IP addresses are
called proxy IP addresses.
Communication to client subnets is less distributed: a minimum of one IP
address is required per namespace to handle client requests. The client-side
IP addresses are called virtual IPs, or VIPs.
The ARX also requires one or more management IP addresses to load new
software images. The switch has one out-of-band management interface,
and you can configure one in-band interface for each VLAN. The in-band
interfaces can also be used to connect one ARX to another in a Resilient
Overlay Network (RON).
At least one in-band management interface is required for any redundant
switch pair.
The Server Subnet and Proxy IP Addresses
The proxy IP addresses must reside on a single server subnet. If you have
multiple server subnets in your current network, you can configure static
routes to the remote subnets (through a router on a local server subnet). The
1 - 8
Allocating IP Addresses
chosen server subnet must have enough address space for one proxy IP
address per network processor. The number of network processors varies for
each platform type. The following table shows the number of proxy IP
addresses for each platform type.
Table 1.1 Required number of proxy IP addresses and platform types
Number of Proxy IPs RequiredPlatform Type
12ARX-4000
3ARX-2500
4ARX-2000
2ARX-1500
1ARX-500 or ARX-VE
In any chassis type, the CLI issues a warning if insufficient proxy IP
addresses have been defined.
Adding Proxy IP Addresses to Domain Name Servers
During an NFS mount, some back-end servers perform domain name server
(DNS) reverse-lookups against remote NFS clients. This is designed as an
authentication mechanism. To prevent such file servers from denying access
to the proxy IP addresses, add the proxy IP addresses to your DNS
configuration.
Adding Virtual IP Addresses
Clients access ARX storage through a unique virtual IP address (VIP) or
VIPs. All VIPs can reside on a single client subnet or they can be divided
among several client subnets. Any client must be able to reach its respective
VIP. The ARX can send responses back to clients through a client subnet, a
static route, or a default route.
ARX Site Planning Guide1 - 9
Chapter 1
Note
Site Planning
Configuring Management IP Addresses
You can configure in-band management interfaces, one per configured
VLAN. At least one such interface is required for many installations – and
adding at least one in-band management interface is strongly recommended
in any case.
◆ A switch in a Resilient Overlay Network (RON) of switches requires at
least one in-band management address. A RON is a network of IP
tunnels that connects multiple ARXes together. Each tunnel requires an
in-band IP address as an endpoint. You can re-use the same in-band
management IP for multiple RON tunnels, but at least one is required.
◆ Redundant switches also require at least one in-band management
interface to communicate with shared, external resources (the quorum
disk).
The ARX also has an interface for out-of-band management (typically
labeled MGMT) on its front panel. This interface is designed for installations
with discrete management networks. It must have an IP address outside of
the server subnet or any of the client subnets.
ARX-VE does not offer out-of-band management.
Ports Required by the ARX
The ARX is assumed to operate in a three-tiered network in a large data
center. The first tier is core routers that provide connectivity to a campus or
WAN. The second tier has redundant distribution switches that distribute all
data center traffic between the access switches; the access switches
constitute the third tier of the network. All LAN clients and back-end file
servers connect to the access switches. Through the access switches and
distribution switches, LAN clients connect to all back-end servers/storage,
to one another, and to the WAN. Figure 1.6 shows a sample network.
1 - 10
Figure 1.6 Sample Network
L2 switch
WAN/campus
core routers
access switches
clients
back-end filers and servers
distribution switches
L2 switch
Allocating IP Addresses
The sample network has redundant ARX devices connected at each of the
distribution switches. Physically, this is a one-armed connection;
conceptually, the ARX has clients in front and file servers in back.
The network file servers are the storage behind the (front-end) services of
the ARX. The servers can be heterogeneous: NAS devices and file servers
need only support CIFS or NFS.
Table 1.2 lists the ports required by the ARX to communicate with its
authentication services, back-end storage, and front-end client services. If
you plan to operate in a secure environment, these ports must be opened on
fire walls in order for the ARX to function properly.
All client/server data is on the inband network. The inband network enables
clients and servers to talk to the ARX. The higher layer protocols use the
inband network. If traps and email home are configured, they also use the
inband network.
The out-of-band network is used to connect to the CLI or the GUI for
purposes of querying or configuring the ARX.
There is a third network (heartbeat) between the two ARX devices in a
high-availability configuration that is used to pass redundancy information
between the switches.
ARX Site Planning Guide1 - 11
Chapter 1
Site Planning
Table 1.2 Ports Required by the ARX
Inbound
PortService/Protocol
ARX Management
161SNMP agent for
polling UDP
162SNMP traps TCP/UDP
22SSH TCP
23TELNET TCP
443HTTPS TCP
80HTTP TCP
514SYSLOG UDPIf External Syslog is used.
25SMTP TCP
139MMC TCP
VIP | XIP | MGMT
✓
✓✓
✓✓
✓
✓✓
✓✓
Outbound
VIP | XIP | MGMT
✓
Comment
Disabled by default.
Disabled by default. The port is
configurable.
Enabled by default.
Disabled by default.
GUI enabled by default.
GUI disabled by default.
For Email Home.
49803RON UDP
20/21FTP TCP
SCP
123NTP TCP/UDP
1812RADIUS
NFS Proxy
111rpcbind TCP/UDP
2049server V2 UDP/TCP
2049server V3 UDP
2049locked TCP/UDP
635mountd TCP/UDP
✓✓
✓
✓
✓
✓
Inband only.
Passive mode client only, no
server.
Client, no server.
Disabled by default.
Disabled by default.
✓✓
✓✓
✓✓
✓✓
✓✓
1 - 12
Table 1.2 Ports Required by the ARX (Continued)
Allocating IP Addresses
PortService/Protocol
637nlockmgr TCPUDP
638status TCP/UDP
CIFS Proxy/SMB
445CIFS (SMB) Server
TCP
139CIFS (SMB) Server
TCP
CIFS (SMB) over
NETBIOS
CIFS Authentication/Other
53DNS TCP/UDP
389LDAP TCP/UDP
25805NTLM agent default
TCP
Inbound
VIP | XIP | MGMT
Outbound
VIP | XIP | MGMT
Comment
✓✓
✓✓
✓✓
Preferred port.
✓✓
✓✓
Queries.
✓✓
✓✓
Default, port is configurable.
464lc passwd
137/138WINS UDP
88Kerberos TCP/UDP
137, 138NetBIOS TCP/UDP
445Microsoft Directory
Services TCP
NFS Authentication (NIS)
NIS UDP/TCP
DNS UDP/TCP
Snapshot Management to File Servers
514RSH (remote shell)
TCP
22SSH TCP
✓✓
✓✓✓
UDP and TCP
Name service
✓✓
✓✓
✓✓
✓✓
✓✓
Client, no server. Outbound
only.
Client, no server. Outbound
only.
✓
✓
Enabled by default.
ARX Site Planning Guide1 - 13
Chapter 1
Site Planning
Table 1.2 Ports Required by the ARX (Continued)
PortService/Protocol
598,
5986
High-Availability (HA)
49800“rendezvous”
API (new in 5.2.0)
83HTTP-API
843HTTPS-API
WINRM (Windows
Remote Management)
TCP
Using NTP
Inbound
VIP | XIP | MGMT
✓
✓
Outbound
VIP | XIP | MGMT
✓
Comment
To support time-based policies, the clock on the ARX must be consistent
with the clock in its back-end servers. For example, an accurate clock is
needed to determine when to trigger age-based file migration or replication.
Accurate time is also important because the ARX keeps track of time-based
file attributes, such as last-modified time and create time.
In a redundant pair of ARX devices, time consistency between the
redundant peers is vital. A redundant peer may trigger a failover if an
improper clock setting makes a heartbeat appear to be out-of-date.
For these reasons and others, we strongly recommend using two or more
NTP servers for the servers, clients, and the ARX devices.
Automatically Discovering Your File Servers
Prior to installing an ARX, best practices recommend using
F5 Data Manager, a web-based application that can give you a detailed
understanding of your unique file storage configuration, contents, structure,
and usage. With this understanding, you can identify and apply data
management policies to create an efficient and cost-effective storage
environment.
Data Manager can give you a snapshot of your current environment as it
exists today, starting with file server discovery.
1 - 14
Loading...
+ 44 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.