F5® Herculon™ SSL Orchestrator™ provides an all-in-one appliance solution designed specifically to
optimize the SSL infrastructure, provide security devices with visibility of SSL/TLS encrypted traffic,
and maximize the efficient use of that existing security investment. This solution centralizes and
consolidates SSL inspection across complex security architectures, allowing you flexible deployment
options to decrypt and re-encrypt user traffic across the Internet and web-based applications. It supports
policy-based management and steering of traffic flows to third-party security devices such as firewalls,
intrusion prevention systems (IPS), anti-malware, data loss prevention (DLP), and forensics tools. It
provides a wide range of SSL orchestration analytics that you can easily customize across multiple
dimensions based on specified ranges of time.
The Herculon SSL Orchestrator single platform for unified inspection allows for the greatest flexibly
without architectural changes to prevent new blind spots from emerging.
Some of the key functions include:
•Dynamic security service chaining that leverages context-based policies to efficiently deploy security,
reduce administrative overhead, and effectively utilize security resources
•Centralized management of the SSL decrypt and re-encrypt function
•Inspection of all traffic for malware and data exfiltration with a multi-layered approach
•Flexible deployment modes to easily integrate the latest encryption technologies across your entire
security infrastructure
•High availability with best-in-class load-balancing, health monitoring, and SSL offload capabilities
Figure 1: Herculon SSL Orchestrator solution
Page 6
What is F5 Herculon SSL Orchestrator?
6
Page 7
Terminology for Herculon SSL Orchestrator
Terminology for Herculon SSL Orchestrator
This section defines some of the terms used in this document.
•Certificate Authority (CA) certificate
This implementation requires a Certificate Authority PKI (public key infrastructure) certificate and
matching private key for SSL Forward Proxy. Your TLS clients must trust this CA certificate to sign
server certificates.
•Decrypt zone
A decrypt zone refers to the network region between separate ingress and egress BIG-IP® devices
where cleartex data is available for inspection. Basically an extra inline service can be placed at the
end of every service chain for additional inspection. You cannot configure a decrypt zone in the
scenario where a single BIG-IP system handles both ingress and egress traffic because the decrypt
zone does not exist.
•Egress device
The egress BIG-IP system is the device (or Sync-Failover device group) that receives the traffic after
a connection traverses the chosen service chain and then routes it to its final destination. In the
scenario where both ingress and egress traffic are handled by the same BIG-IP system, egress refers to
the VLAN(s) where traffic leaves the BIG-IP system to the Internet.
•ICAP services
Each ICAP service uses the ICAP protocol (https://tools.ietf.org/html/rfc3507) to refer HTTP traffic
to one or more Content Adaptation device(s) for inspection and possible modification. You can add an
ICAP service to any TCP service chain, but only HTTP traffic is sent to it, as we do not support ICAP
for other protocols. You can configure up to ten ICAP services using F5® Herculon™ SSL
Orchestrator™. For more information on ICAP services, refer to the Creating ICAP services section.
•Ingress device
The ingress BIG-IP system is the device (or Sync-Failover device group) to which each client sends
traffic. In the scenario where both ingress and egress traffic are handled by the same BIG-IP system,
ingress refers to the VLAN(s) where the client sends traffic. The ingress BIG-IP system (or ingress
VLAN(s)) decrypts the traffic and then based on protocol, source, destination, and so on, classifies it
and passes each connection for inspection based on service chains you will configure (or allows
certain connections to bypass service-chain processing based on your selections).
•Inline services
Inline services pass traffic through one or more service (inspection) devices at Layer2 (MAC)/Bumpin-the-wire or Layer3 (IP). Each service device communicates with the ingress BIG-IP device over
two VLANs called Inward and Outwardwhich carry traffic toward the intranet and the Internet
respectively. You can configure up to ten inline services, each with multiple defined devices, using
Herculon SSL Orchestrator.
•Receive-only services
Receive-only services refer to services that only receive traffic for inspection, and do not send it back
to the BIG-IP system. Each receive-only service provides a packet-by-packet copy of the traffic (e.g.
plaintext) passing through it to an inspection device. You can configure up to ten receive-only
services using Herculon SSL Orchestrator. For more information on receive-only services, refer to the
Creating receive-only services for traffic inspection section.
•Service chain classifier rules
Page 8
Terminology for Herculon SSL Orchestrator
Each service chain classifier rule chooses ingress connections to be processed by a service chain you
configure (different classifier rules may send connections to the same chain). Each classifier rule has
four filters.The filters match source (client) IP address, destination (which can be IP address, IP
Intelligence category, IP geolocation, domain name, domain URL Filtering category, or server port),
and application protocol (based on port or protocol detection). Filters can overlap so the
implementation chooses the classifier rule with the most specifc matches for each connection.
For more information on service chain classifier rules, refer to the Creating TCP service chainclassifier rules section and/or the Creating UDP service chain classifier rules section.
•Service chains
Herculon SSL Orchestrator service chains process specific connections based on classifier rules
which look at protocol, source and destination addresses, and so on. These service chains can include
four types of services (Layer 2 inline services, Layer 3 inline services, receive-only services, and
ICAP services) you define, as well as any decrypt zone between separate ingress and egress devices).
For more information on service chains, refer to the Creating service chains to link services section.
•SNAT
A SNAT (Secure Network Address Translation) is a feature that defines routable alias IP addresses
that the BIG-IP system substitutes for client IP source addresses when making connections to hosts on
the external network. A SNAT pool is a pool of translation addresses that you can map to one or more
original IP addresses. Translation addresses in a SNAT pool should not be self IP addresses.
•Sync-Failover device group
A Sync-Failover device group (part of the Device Service Clustering (DSC®) functionality) contains
BIG-IP devices that synchronize their configuration data and failover to one another when a device
becomes unavailable. In this configuration, a Sync-Failover device group supports a maximum of two
devices.
•Transparent/Explicit Proxy
You can operate in transparent and/or explicit proxy mode. A transparent proxy intercepts normal
communication without requiring any special client configuration; clients are unaware of the proxy in
the network. In this implementation, the transparent proxy scheme can intercept all types of TLS and
TCP traffic. It can also process UDP and forward other types of IP traffic. The explicit proxy scheme
supports only HTTP(S) per RFC2616. In addition, transparent proxy supports direct routing for
policy-based routing (PBR) and Web Cache Communication Protocol (WCCP) that are dependent on
networking services to support both protocols, while explicit proxy supports manual browser settings
for proxy auto-config (PAC) and Web Proxy Autodiscovery Protocol (WPAD) that require additional
iRule configurations (not included) to provide the PAC/WPAD script content.
8
Page 9
Configuring the System for F5 Herculon SSL Orchestrator
Overview: Configuring the system for F5 Herculon SSL Orchestrator
To set up your system for decrypting and encrypting outbound SSL/TLS traffic, you need to use the F5
Herculon™ SSL Orchestrator™ Setup Wizard which initially guides you through basic minimal setup
configuration. When you have completed the basic setup using the Setup Wizard, the Herculon SSL
Orchestrator configuration utility assists you with the rest of your configuration.
Note: If you are implementing a high availability environment for Herculon SSL Orchestrator, review the
Setting up Herculon SSL Orchestrator in a High Availability Environment section for more detailed
information.
Using the Herculon SSL Orchestrator setup wizard
Before you start this task:
Make sure you set up a management IP address, netmask, and default routing on your system.
Note: If at any time during your configuration you need to return to the F5® Herculon™ SSL
Orchestrator™ Setup Wizard, simply click the F5 logo in the upper-left corner of the configuration utility,
and on the Welcome screen, click the Run the Setup Utility link.
®
The Herculon SSL Orchestrator Setup Wizard guides you through the basic, minimal setup configuration
for Herculon SSL Orchestrator.
1. On the Welcome screen, click Next.
2. On the License screen, click Activate.
3. On the EULA screen, click Accept.
The license activates and the system reboots for the configuration changes to take effect.
4. After the system reboots, click Continue.
5. On the Device Certificates screen, click Next.
6. On the Platform screen, for the Management Port Configuration setting, click Manual.
The Management Port setting should include the management interface details that were previously
created.
7. In the Host Name field, type the name of this system.
The Host Name must be a fully qualified domain name.
For example, www.siterequest.com.
8. In the User Administration area, type and confirm the Root Account and Admin Account passwords,
and click Next.
The Root Account provides access to the command line, while the Admin Account accesses the user
interface.
The system notifies you to log out and then log back in with your username and new password.
9. Click OK.
The system reboots.
10. (Optional) On the Network Time Protocol (NTP) screen, in the Address field, type the IP address of
the NTP server to synchronize the system clock with an NTP server, and click Add.
Page 10
Configuring the System for F5 Herculon SSL Orchestrator
11. Click Next.
The Domain Name Server (DNS) screen opens.
12. (Optional) To resolve host names on the system, set up the DNS and associated servers:
a) For the DNS Lookup Server List, in the Address field, type the IP address of the DNS server
and click Add.
b) If you use BIND servers, add them in the BIND Forwarder Server List.
c) For local domain lookups to resolve local host names, add them in the DNS Search Domain List.
d) Click Next.
The Internal VLAN screen opens.
Note: If you plan to later use the DNSSEC option in the configuration utility, you must set up DNS
using the Herculon SSL Orchestrator Setup Wizard. Otherwise, this step is optional.
13. Specify the Self IP settings for the internal network:
a) In the Address field, type a self IP address.
b) In the Netmask field, type a network mask for the self IP address.
c) For the Port Lockdown setting, retain the default value.
14. For the VLAN Tag ID setting, retain the recommended default value, auto.
15. For the Interfaces setting:
a) From the VLAN Interfaces list, select an interface number.
b) From the Tagging list, select Tagged or Untagged.
Select Tagged when you want traffic for that interface to be tagged with a VLAN ID.
c) Click Add.
16. Click Next.
This completes the configuration of the internal self IP addresses and VLAN, and the External VLAN
screen opens.
17. Specify the Self IP setting for the external network:
a) In the Address field, type a self IP address.
b) In the Netmask field, type a network mask for the self IP address.
c) For the Port Lockdown setting, retain the default value.
18. In the Default Gateway field, type the IP address that you want to use as the default gateway to the
external VLAN.
19. For the VLAN Tag ID setting, retain the recommended default value, auto.
20. Click Next.
This completes the configuration of the external self IP addresses and VLAN.
21. On the Forward Proxy Certificate screen, do the following:
a) In the Certificate Name field, select Create New and type a certificate name.
b) In the Certificate Source field, select either Upload File and click Choose File, or select Paste
Text and copy and paste your certificate source.
c) In the Key Source field, select either Upload File and click Choose File, or select Paste Text and
copy and paste your key source.
d) From the Security Type list, select either Normal or Password.
22. Click Next.
23. On the Logging screen, under Publisher Type, select either local or splunk.
10
•If you select local as your Publisher Type, specify the Destination as either local-db or local-
syslog and click Next.
Page 11
Note: This determines the destination of your logs as being either a local database or a local
syslog server.
•If you select splunk as your Publisher Type:
a) For Protocol, select either TCP or UDP.
b) Type the IP address and the Port of the splunk server.
c) Click Next.
You are now ready to proceed to the second part of the configuration where you follow additional
instructions to finalize your system for Herculon SSL Orchestrator.
Backing up your BIG-IP configuration
Before beginning the Herculon SSL Orchestrator configuration, or before you make substantial changes,
we strongly recommend you back up the BIG-IP configuration using the following steps. This allows you
to restore the previous configuration in case of any issues.
1. On your system, click System > Archives.
2. To initiate the process of creating a new UCS archive (back up), click Create.
3. In the File Name box, type a name for the file. This name must be a unique name.
4. Click Finished.
5. To restore the configuration from a UCS archive, go to System > Archives.
6. Select the name of the UCS file you want to restore and click Restore.
F5 Herculon SSL Orchestrator: Setup
Your BIG-IP configuration is now safely restored.
Modifying your Herculon SSL Orchestrator configuration
We recommend that you back up your BIG-IP® configuration prior to making any changes to your F5
Herculon™ SSL Orchestrator™ configuration. Refer to the Backing up the BIG-IP Configuration section
of this document for more information.
You can modify your existing Herculon SSL Orchestrator configuration if you need to make changes.
1. On the Main tab, click SSL Orchestrator > Configuration.
The General Properties screen opens.
2. Modify your configuration and then click Deploy.
See the Diagnosing your Herculon SSL Orchestrator deployment section for more detailed information
on how to monitor the success or failure of your configuration modification. If successful, your existing
configuration is now updated.
Undeploying your Herculon SSL Orchestrator configuration
We recommend that you back up your BIG-IP® configuration prior to making any modifications to your
F5® Herculon™ SSL Orchestrator™ configuration. Refer to the Backing up the BIG-IP configuration
section of this document for more information.
®
1. On the Main tab, click SSL Orchestrator > Configuration.
The General Properties screen opens.
2. Click Undeploy.
11
Page 12
Configuring the System for F5 Herculon SSL Orchestrator
See the Diagnosing your Herculon SSL Orchestrator deployment section for more detailed information
on how to monitor the success or failure of your device undeployment. If successful, your entire
configuration is now removed from your system.
Diagnosing your Herculon SSL Orchestrator deployment
You can diagnostically monitor each deployment and undeployment for a device configuration whether
you are deploying a single device or multiple boxes in a high availability (HA) device group. The system
displays an application status message above the network diagram indicating whether your device or
device group has successfully Deployed or suffered an Error.
When there are multiple devices in a device group in an HA scenario, the application status message
displays the state of the deployment as one system. For example, if two out of four devices in a device
group deploy with errors, the application status message displays 2 Error, indicating two devices
suffered an error during deployment.
If you click View Details next to the application status message when you have multiple devices in a
sync group, the Application Status dialog box opens. The Application Status table lists each BIG-IP
device with individual links to the Diagnostic screen. The Diagnostic screen displays the current device's
deployment information and assists in further diagnosing any issues.
After completing a F5® Herculon™ SSL Orchestrator™ configuration deployment, or if you are
performing an undeployment, you can diagnose your deployment status.
1. On the Main tab, click SSL Orchestrator > Configuration.
The General Properties screen opens.
2. On the General Properties screen, click either Deploy or Undeploy.
Above the network diagram, the application status displays a spinning wheel with the message
Currently being deployed or Currently being undeployed.
Once the process is complete, the application status message displays Deployed, Undeployed, or
Error.
3. If you have multiple devices in a device group, click View Details. If you are deploying or
undeploying a single device, proceed to step 4.
If your deployment or undeployment is successful, the Diagnostic screen opens.
If your deployment or undeployment is not successful, the Application Status dialog popup opens
showing each BIG-IP device with individual links to the Diagnostic screen.
4. Click OK to close the Application Status dialog popup table, or click the link in the Details column
for a particular device to open the Diagnostic screen.
The Application Diagnostic area shows details for the current device that you selected. This is
information you can use to further diagnose your application status.
5. On the Main tab, click SSL Orchestrator > Configuration, and on the menu bar, click Diagnostic to
view diagnostic information on your current device.
®
12
The Diagnostic screen opens.
Page 13
Setting Up a Basic Configuration
Overview: Setting up a basic configuration
This section contains general information that the system needs before you can configure services and
service chains. The F5® Herculon™ SSL Orchestrator™ configuration utility will assist you with
configuring logging settings, setting up ingress and egress devices as one system or separate systems, and
configuring the system for transparent proxy and explicit proxy.
Configuring general properties
You must provide general information that the system needs so that you can then set up ingress and
egress devices, create services and service chains, and create classifier rules using the Herculon SSL
Orchestrator configuration utility.
Note: By default, during the Herculon SSL Orchestrator deployment process, the system database value
for Traffic Management Microkernel (TMM) fast forward is automatically disabled (set to “false”). To
ensure your Herculon SSL Orchestrator deployment works properly, make sure the system database value
for TMM fast forward remains disabled throughout the deployment. If you are not using Herculon SSL
Orchestrator and need the system database value for TMM fast forward enabled, it must be manually
changed.
1. On the Main tab, click SSL Orchestrator > Configuration.
The General Properties screen opens.
2. For the Application Service Name field, ssloApp is the default name for this configuration.
3. From the Do you want to setup separate ingress and egress devices with a cleartext zone between
them? list, select one of the options:
•If the same BIG-IP system receives both ingress and egress traffic on different networks, use No,
use one BIG-IP device for ingress and egress.
•If you are configuring separate devices for ingress and egress traffic, use Yes, configure separate
ingress and egress BIG-IP devices.
4. From the Which IP address families do you want to support? list, select whether you want this
configuration to Support IPv4 only, Support IPv6 only, or Both IPv4 and IPv6.
If you do not choose to support both address families, you must configure IP addresses in the family
you select for all IP address fields in this application. If you choose Both IPv4 and IPv6, you can
send intercepted IPv6 traffic through an IPv4 Layer 3 service device.
5. From the Which proxy schemes do you want to implement? list, select whether the system operates
in transparent proxy mode, explicit proxy mode, or both.
•Use Implement transparent proxy only for the system to operate in transparent proxy mode.
The transparent proxy scheme can intercept all types of TLS and TCP traffic. It also processes
UDP traffic and forwards all other types of traffic. The transparent proxy requires no client
configuration modifications.
•Use Implement both transparent and explicit proxies for the system to operate in explicit and
transparent proxy modes simultaneously.
•Use Implement explicit proxy only for the system to operate in explicit proxy mode. The explicit
proxy scheme supports only HTTP(S) per RFC2616. If you choose to configure an explicit proxy,
assign a specific IP address and TCP port where the HTTP explicit-proxy clients connect.
Page 14
Setting Up a Basic Configuration
Note: When configuring a single device Herculon SSL Orchestrator transparent proxy in front of an
explicit proxy, Herculon SSL Orchestrator can transparently intercept SSL traffic tunneled through an
explicit proxy and selectively forward the decrypted user traffic through the security service chain for
proper inspections. Afterwards, the user traffic is sent back to the BIG-IP, which re-encrypts the
traffic and sends to the explicit proxy. User traffic of certain categories may also be rejected by the
BIG-IP or bypass the security inspections.
Note: When transparently decrypting traffic to upstream explicit proxies in a two device Herculon
SSL Orchestrator deployment, the SSL forward proxy interception only occurs on the ingress device
(decryption, service chaining, and re-encryption occur on the ingress device, while the encrypted
plaintext traffic will pass through the egress device). In addition, all classifier rules apply to traffic
inside HTTP CONNECT tunnels except for rules bypassing SSL during the TLS handshake phase.
Rules bypassing SSL during the TLS handshake phase do not apply because SSL forward proxy
cannot reuse the same HTTP CONNECT tunnel to the explicit proxy for the bypassed flow.
6. From the Do you want to pass UDP traffic through the transparent proxy unexamined? list,
select one of the options:
•Use Yes, pass all UDP traffic unexamined to pass UDP traffic through without inspecting it.
•Use No, manage UDP traffic by classification to configure specific service chain classifier rules
for UDP traffic.
This option is available only if you select Implement transparent proxy only.
7. From the Do you want to pass non-TCP, non-UDP traffic through the transparent proxy? list,
select one of the options:
•Use Yes, pass non-TCP, non-UDP traffic (such as IPsec, SCTP, OSPF, and so on) if you want
the system to pass all traffic that is not TCP or UDP through the transparent proxy. If you choose
this option, this traffic will not be classified or processed by any service chain.
•Use No, block all non-TCP, non-UDP traffic (such as IPsec, SCTP, OSPF, and so on.) for the
system to block all non-TCP and non-UDP traffic.
This option is available only if you select Implement transparent proxy only.
8. From the Which is the SSL Forward Proxy CA certificate? list, select the Certificate Authority
(CA) certificate that your clients will trust to authenticate intercepted TLS connections.
9. From the Which is the SSL Forward Proxy CA private key? list, select the corresponding private
key.
You import the CA certificate and private key while configuring the Setup Wizard. If you did not use
the Setup Wizard, you must import a CA certificate before you can use this functionality.
10. In the What is the private-key passphrase (if any)? field, type the private-key passphrase.
If the key does not have a passphrase, leave the field empty.
11. From the Which CA bundle is used to validate remote server certificates? list, select the CA
bundle that validates the remote server certificates.
The CA bundle is the collection of root and intermediate certificates for the CA you trust to
authenticate servers where your clients might connect. The CA bundle is also known as the local trust
store.
12. From the Should connections to servers with expired certificates be allowed? list, select one of the
two options to determine what happens with connections to servers with expired certificates:
14
•Use Yes, allow connections to servers with expired certificates to allow connections to the
servers that have expired certificates.
•Use No, forbid connections to servers with expired certificates to prevent connections to
servers that have expired certificates.
Page 15
F5 Herculon SSL Orchestrator: Setup
Remote servers can present expired certificates. Allowing connections to servers with expired
certificates can cause a security risk.
13. From the Should connections to servers with untrusted certificates be allowed? list, select one of
the two options to determine what happens with connections to servers with untrusted certificates:
•Use Yes, allow connections to servers with untrusted certificates to allow connections to the
servers that have untrusted certificates.
•Use No, forbid connections to servers with untrusted certificates to prevent connections to
servers that have untrusted certificates.
Remote servers can present untrusted certificates. Allowing connections to servers with untrusted
certificates can cause a security risk.
14. If strict updates should protect the configuration, select the check box for Should strict updates be
enforced for this application?.
If you select this option, you cannot manually modify any settings produced by the application. Once
you disable this option, you can manually change your configuration. You should enable this setting
to avoid misconfigurations that can cause an unusable application.
F5 recommends you enable this setting to avoid misconfigurations that could result in an unusable
application and F5's ability to support your product.
15. Click Save.
You have provided the basic configuration the system requires for Herculon SSL Orchestrator.
You can now set up ingress and egress devices, configure transparent or explicit proxies for the system,
and create services, service chains, and classifier rules.
Configuring logging
Before configuring logging for F5® Herculon™ SSL Orchestrator™, complete all areas in General
Properties. Refer to the Configuring general properties section of this document for more information.
You can generate log messages to help you monitor (and optionally debug) system activity. And you can
choose the level of logging you want the system to perform. Log messages may be sent to one or more
external log servers (preferred) and/or stored on the BIG-IP® device (less desirable because BIG-IP
devices have limited log storage capacity).
1. On the Main tab, click SSL Orchestrator > Configuration.
The General Properties screen opens.
2. Scroll down to the Logging Confguration area to the What SSL Intercept logging level do you want
to enable? list, and select the level of logging you want the system to perform.
•Use Errors. Log only functional errors to log errors related to how Herculon SSL Orchestrator
functions.
•Use Normal. Log connection data as well as errors to log per-connection data in addition to
functional errors.
•Use Debug. Log debug data as well as normal level data to log debug data as well as
connection data and functional errors. Because this logging level consumes more resources on the
BIG-IP system, use this mode only during setup or troubleshooting.
3. From the Which Log Publisher will process the log messages? list, select whether an existing log
publisher object processes the log messages or does not process the log messages and sends the
messages to syslog-ng.
•Use None (Send log messages to syslog-ng) to send log messages to the system management
plane syslog-ng subsystem. This option is not recommended for use in production systems.
15
Page 16
Setting Up a Basic Configuration
•Otherwise, from the list, select the Log Publisher you created. A Log Publisher delivers log
messages to one or more Log Destinations. Log Destinations may include Syslog, ArcSight,
Splunk, and other log servers.
We strongly recommend that you use a Log Publisher for good system performance. The syslog-ng
service is useful for Errors-only logging but is too slow for Normal or Debug logging when the
system is used in production. A Log Publisher delivers log messages to one or more Log Destinations.
Log Destinations may include Syslog, ArcSight, Splunk, and other log servers as well as the BIG-IP
system's local log database. To use a Log Publisher, it must already be present on the system.
4. From the What kind of statistics do you want to record? list, select the type of statistic the system
records. This implementation can collect usage data for connections, service chains, services, and so
on. The implementation can also record remote domain names and TLS cipher suites for TLS
connections if you wish, but gathering such data consumes more system resources.
Domain names are taken from remote server PKI certificates (or client SNI in the case of Dynamic
Domain Bypass) and may include a wild card. TLS cipher suites may not be recorded when a
connection bypasses interception.
If you choose to collect any statistics, the BIG-IP system starts saving extra data in memory for the
use of integration with performance reporting systems like Splunk or BIG-IP iStats integration.
•Use None if you do not want the system to record statistics.
•Use Usage counters only (No remote-domain+cipher records) to record usage counters only
and not statistics on remote-domain and cipher records.
•Use Usage counters and remote-domain+cipher records (may slow system) to record both
usage counters and remote-domain and cipher records. This option can slow performance on your
system.
5. Click Save.
You have configured logging options and completed the basic Herculon SSL Orchestrator configuration.
Configuring an ingress and egress device on one system
The ingress device is either a device or a Sync-Failover device group where each client sends traffic. The
egress device is either a device or a Sync-Failover device group that receives traffic after a connection
travels through the specified service chain and directs the traffic to the final destination.
If both the ingress and egress traffic are used by the same BIG-IP® system, the ingress device is one or
more ingress VLANs where the clients send traffic. The ingress device decrypts the traffic and then,
based on protocol, source, and destination, classifies the traffic and passes each connection for inspection.
If both the ingress and egress traffic are used by the same BIG-IP system, the egress device is one or
more egress VLANs where the clients receive traffic.
1. On the Main tab, click SSL Orchestrator > Configuration.
The General Properties screen opens.
2. If you have only one BIG-IP system, from the Do you want to setup separate ingress and egress
devices with a cleartext zone between them? list, select No, use one BIG-IP device for ingress
and egress.
3. From the Which IP address families do you want to support? list, select whether you want this
configuration to Support IPv4 only, Support IPv6 only, or Both IPv4 and IPv6.
If you do not choose to support both address families, you must configure IP addresses in the family
you select for all IP address fields in this application. If you choose Both IPv4 and IPv6, you can
send intercepted IPv6 traffic through an IPv4 Layer 3 service device.
4. From the Which is the SSL Forward Proxy CA certificate? list, select the Certificate Authority
(CA) certificate that your clients will trust to authenticate intercepted TLS connections.
16
Page 17
F5 Herculon SSL Orchestrator: Setup
5. From the Which is the SSL Forward Proxy CA private key? list, select the corresponding private
key.
You import the CA certificate and private key while configuring the Setup Wizard. If you did not use
the Setup Wizard, you must import a CA certificate before you can use this functionality.
6. In the What is the private-key passphrase (if any)? field, type the private-key passphrase.
If the key does not have a passphrase, leave the field empty.
7. From the Ingress Device Configuration area, for the Which VLAN(s) will bring client traffic to the
transparent proxy? setting, select one or more VLANs where transparent-proxy ingress traffic will
arrive.
8. From the How should a server TLS handshake failure be handled? list, select whether you want
the connection to fail or bypass the connection.
9. From the DNS query resolution list, select whether to permit the system to send DNS queries
directly out to the Internet, or specify one or more local forwarding nameservers to process all DNS
queries from Herculon SSL Orchestrator.
•If you select Send DNS queries directly to nameservers across the internet, proceed to step 10.
•If you select Send DNS queries to forwarding nameservers on the local network, proceed to
step 11.
10. From the Do you want to configure local/private DNS zones? list, select whether you do, or do not,
want to configure local or private DNS zones.
•If you select No, do not configure any local/private DNS zones, proceed to step 13.
•If you select Yes, configure local/private DNS zones, proceed to step 12.
11. In the Which local forwarding nameserver(s) will resolve DNS queries from this solution? field,
type the IP address of local nameservers that will resolve all DNS queries from this implementation
and click Add. Once you have added the necessary nameserver IP addresses, proceed to step 13.
12. In the List local/private Forward Zones setting, click Add and type the IP address of one or more
nameservers.
13. From the Do you want to use DNSSEC to validate DNS information? list, select whether you do,
or do not, want to use DNSSEC to validate the DNS information.
14. In the Egress Device Configuration area, from the Do you want to SNAT client IP addresses? list,
select whether you do, or do not, want to define SNAT addresses.
•If you select No, pass client addresses unaltered, proceed to step 17.
•If you select Yes, SNAT (replace) client addresses, proceed to step 15.
15. From the Do you want to use a SNAT Pool? list, select whether you want to use a SNAT pool or
SNAT auto map to translate addresses.
•If you select Yes, define SNAT Pool addresses for good performance, proceed to step 16.
•If you select No, use SNAT Auto Map (not recommended), proceed to step 17.
16. Options to provide SNAT addresses will vary, whether you selected Support IPv4 only, Support
IPv6 only, or Both IPv4 and IPv6. Enter at least as many IP host addresses as the number of TMM
instances on the ingress device. Type address must be uniquely assigned and routed to the ingress
device. It is best to assign addresses which are adjacent and grouped under a CIDR mask, for
example, 203.0.113.8 up through 203.0.113.15 which fill 203.0.113.8/29.
•In the IPv4 SNAT addresses field, type the IPv4 SNAT address.
•In the IPv6 SNAT addresses field, type the IPv6 SNAT address.
•In both the IPv4 SNAT addresses and IPv6 SNAT addresses fields, type both the IPv4 and IPv6
SNAT addresses.
17. From the Should traffic go to the Internet via specific gateways? list, select whether or not you
want the system to let all SSL traffic use the default route, or if you want to specify Internet gateways
(routers). If you chose to use specific gateways, you can also define the ratio of traffic sent to each
device in the next step.
17
Page 18
Setting Up a Basic Configuration
•If you want outbound/Internet traffic out using the default route on the BIG-IP system, select No,
send outbound/Internet traffic via the default route and proceed to step 19 to save.
•If you want to define a list of gateways (routers) to handle outbound SSL traffic (and control the
share of traffic each is given), use Yes, send outbound/Internet traffic via specific gateways and
proceed to step 18.
18. Options to provide the outbound gateway addresses will vary, whether you selected Support IPv4
only, Support IPv6 only, or Both IPv4 and IPv6. Specify one or more Internet gateway addresses
(routers) to handle outbound SSL traffic so to control the share of traffic each is given.
•In the What are the IPv4 outbound gateway addresses? field, type the IPv4 gateway addresses.
Proceed to step 20 to save.
•In the What are the IPv6 outbound gateway addresses? field, type the IPv6 gateway addresses.
Proceed to step 19.
•In both the What are the IPv4 outbound gateway addresses? and What are the IPv6
outbound gateway addresses? fields, type both the IPv4 and IPv6 gateway addresses. Proceed to
step 19.
Click the + button to add additional addresses.
You can enter multiple gateways if you have multiple systems and wish to load balance across them.
If you do enter multiple addresses, you can also use the ratio value to control the load balancing. For
example, if you have two devices, and one handles twice as much traffic as the other, you can set the
ratio to 1 on the smaller device, and 2 on the larger one.
19. In the Non-public IPv6 networks via IPv6 gateways field, type the requested IPv6 address if you
want to route connections to any non-public IPv6 networks via the IPv6 gateways above. Enter the
prefix/mask-length (CIDR) of each network. Non-public IPv6 networks are those outside the 2000::/3
block, such as ULA networks in the fc00::/7 block.
20. Click Save.
You have now configured an ingress device and an egress device located on one system.
This describes only the fields, lists, and areas needed to configure an ingress and egress device on one
system. You should complete the other areas in General Properties before moving on to create services
and service chains.
Configuring an ingress device (for separate ingress and egress devices)
The ingress device is either a device or a Sync-Failover device group where each client sends traffic. The
ingress device is one or more ingress VLANs where the clients send traffic. The ingress device decrypts
the traffic and then, based on protocol, source, and destination, classifies the traffic and passes each
connection for inspection.
1. On the Main tab, click SSL Orchestrator > Configuration.
The General Properties screen opens.
2. From the Do you want to setup separate ingress and egress devices with a cleartext zone between
them? list, select Yes, configure separate ingress and egress BIG-IP devices.
3. From the Is this device the ingress or egress device? list, select This is the INGRESS device to
which clients connect.
4. In the What is the EGRESS device Application Service name? field, type the name of the device
service.
5. In the What is the IP address of the EGRESS device control-channel virtual server? field, type
the IP address of the service chain control channel virtual server over on the egress device.
6. In the What IP address should THIS (ingress) device's control-channel virtual server use? field,
type the IP address of the virtual server for the service chain control channel on a VLAN.
18
Page 19
F5 Herculon SSL Orchestrator: Setup
7. In the What is the control-channel pre-shared key? field, type a pre-shared key (PSK) value to
enable cryptographic protection of the service chain control channel between the ingress and egress
devices.
8. From the Which IP address families do you want to support? list, select whether you want this
configuration to Support IPv4 only, Support IPv6 only, or Both IPv4 and IPv6.
If you do not choose to support both address families, you must configure IP addresses in the family
you select for all IP address fields in this application. If you choose Both IPv4 and IPv6, you can
send intercepted IPv6 traffic through an IPv4 Layer 3 service device.
9. From the Which is the SSL Forward Proxy CA certificate? list, select the Certificate Authority
(CA) certificate that your clients will trust to authenticate intercepted TLS connections.
10. From the Which is the SSL Forward Proxy CA private key? list, select the corresponding private
key.
You import the CA certificate and private key while configuring the Setup Wizard. If you did not use
the Setup Wizard, you must import a CA certificate before you can use this functionality.
11. In the What is the private-key passphrase (if any)? field, type the private-key passphrase.
If the key does not have a passphrase, leave the field empty.
12. From the Ingress Device Configuration area, for the Which VLAN(s) will bring client traffic to the
transparent proxy? setting, select one or more VLANs where transparent-proxy ingress traffic will
arrive.
13. From the How should a server TLS handshake failure be handled? list, select whether you want
the connection to fail or bypass the connection.
14. From the DNS query resolution list, select whether to permit the system to send DNS queries
directly out to the Internet, or specify one or more local forwarding nameservers to process all DNS
queries from Herculon SSL Orchestrator.
•If you select Send DNS queries directly to nameservers across the internet, proceed to step 15.
•If you select Send DNS queries to forwarding nameservers on the local network, proceed to
step 16.
15. From the Do you want to configure local/private DNS zones? list, select whether you do, or do not,
want to configure local or private DNS zones.
•If you select No, do not configure any local/private DNS zones, proceed to step 18.
•If you select Yes, configure local/private DNS zones, proceed to step 17.
16. In the Which local forwarding nameserver(s) will resolve DNS queries from this solution? field,
type the IP address of local nameservers that will resolve all DNS queries from this implementation
and click Add. Once you have added the necessary nameserver IP addresses, proceed to step 18.
17. In the List local/private Forward Zones setting, click Add and type the IP address of one or more
nameservers.
18. From the Do you want to use DNSSEC to validate DNS information? list, select whether you do,
or do not, want to use DNSSEC to validate the DNS information.
19. In the Decrypt Zone to Egress Device Configuration area, for Are there parallel service devices in
the decrypt zone?, select whether you want to send outbound traffic using the BIG-IP® system
default route(s) or send outbound traffic through one or more service devices.
•If the system will send the traffic through its default route to the internet, which must be
configured to point to the egress BIG-IP® system, use No, send outbound traffic via the BIG-IPdefault route(s) and proceed to step 22 to save.
•If your configuration includes any Layer 3 systems in the decrypt zone that must receive the
traffic, use Yes, send outbound traffic via one or more service device(s) and proceed to step 17.
20. Options to provide the outbound gateway addresses will vary, whether you selected Support IPv4
only, Support IPv6 only, or Both IPv4 and IPv6. Type the IP addresses of the inward interface of
the first Layer 3 device in the decrypt zone or the decrypt zone gateway.
19
Page 20
Setting Up a Basic Configuration
•In the What are the IPv4 decrypt zone gateway addresses? field, type the IPv4 gateway
addresses. Proceed to step 22 to save.
•In the What are the IPv6 decrypt zone gateway addresses? field, type the IPv6 gateway
addresses. Proceed to step 21.
•In both the What are the IPv4 decrypt zone gateway addresses? and What are the IPv6
outbound gateway addresses? fields, type both the IPv4 and IPv6 gateway addresses. Proceed to
step 21.
Click the + button to add additional addresses.
You can enter multiple gateways if you have multiple systems and wish to load balance across them.
If you do enter multiple addresses, you can also use the ratio value to control the load balancing. For
example, if you have two devices, and one handles twice as much traffic as the other, you can set the
ratio to 1 on the smaller device, and 2 on the larger one.
21. In the What are the Non-public IPv6 networks via IPv6 gateways? field, type the requested IPv6
address if you want to route connections to any non-public IPv6 networks via the IPv6 gateways
above. Enter the prefix/mask-length (CIDR) of each network. Non-public IPv6 networks are those
outside the 2000::/3 block, such as ULA networks in the fc00::/7 block.
22. Click Save.
You have now configured an ingress device for a system configured for separate ingress and egress
devices.
This describes only the fields, lists, and areas needed to configure an ingress device. You should complete
the other areas in General Properties before moving on to create services and service chains.
Configuring an egress device (for separate ingress and egress devices)
The egress device is either a device or a Sync-Failover device group that receives traffic after a
connection travels through the specified service chain and directs the traffic to the final destination. When
users set up separate ingress and egress devices, they send each other control messages. These can go
through the decrypt zone, or around it if you configure a different path through the network. In either
case, the messages are sent through TCP connections to port 245, at an IP address users specify, on each
BIG-IP® system.
1. On the Main tab, click SSL Orchestrator > Configuration.
The General Properties screen opens.
2. From the Do you want to setup separate ingress and egress devices with a cleartext zone between
them? list, select Yes, configure separate ingress and egress BIG-IP devices.
3. From the Is this device the ingress or egress device? list, select This is the EGRESS device to
which connects to server.
4. In the What is the INGRESS device Application Service name? field, type the name of the device
service.
5. In the What is the IP address of the INGRESS device control-channel virtual server? field, type
the IP address of the service chain control channel virtual server over on the egress device.
6. In the What IP address should THIS (egress) device's control-channel virtual server use? field,
type the IP address of the virtual server for the service chain control channel on a VLAN.
7. In the What is the control-channel pre-shared key? field, type a pre-shared key (PSK) value to
enable cryptographic protection of the service chain control channel between the ingress and egress
devices.
8. From the Which IP address families do you want to support? list, select whether you want this
configuration to Support IPv4 only, Support IPv6 only, or Both IPv4 and IPv6.
20
Page 21
F5 Herculon SSL Orchestrator: Setup
If you do not choose to support both address families, you must configure IP addresses in the family
you select for all IP address fields in this application. If you choose Both IPv4 and IPv6, you can
send intercepted IPv6 traffic through an IPv4 Layer 3 service device.
9. From the Which is the SSL Forward Proxy CA certificate? list, select the Certificate Authority
(CA) certificate that your clients will trust to authenticate intercepted TLS connections.
10. From the Which is the SSL Forward Proxy CA private key? list, select the corresponding private
key.
You import the CA certificate and private key while configuring the Setup Wizard. If you did not use
the Setup Wizard, you must import a CA certificate before you can use this functionality.
11. In the What is the private-key passphrase (if any)? field, type the private-key passphrase.
If the key does not have a passphrase, leave the field empty.
12. From the Egress Device Configuration area, in the Which VLAN(s) are part of the decrypt zone?
(These bring traffic from the ingress device) setting, select one or more VLANs where transparent-
proxy egress traffic will arrive.
13. From the Do you want to SNAT client IP addresses? list, select whether you do, or do not, want to
define SNAT addresses.
•If you select No, pass client addresses unaltered, proceed to step 16.
•If you select Yes, SNAT (replace) client addresses, proceed to step 14.
14. From the Do you want to use a SNAT Pool? list, select whether you want to use a SNAT pool or
SNAT auto map to translate addresses.
•If you select Yes, define SNAT Pool addresses for good performance, proceed to step 15.
•If you select No, use SNAT Auto Map (not recommended), proceed to step 16.
15. Options to provide SNAT addresses will vary, whether you selected Support IPv4 only, Support
IPv6 only, or Both IPv4 and IPv6. Type at least as many IP host addresses as the number of TMM
instances on the ingress device. Each address must be uniquely assigned and routed to the ingress
device. It is best to assign addresses which are adjacent and grouped under a CIDR mask, for
example, 203.0.113.8 up through 203.0.113.15 which fill 203.0.113.8/29.
•In the IPv4 SNAT addresses field, type the IPv4 SNAT address.
•In the IPv6 SNAT addresses field, type the IPv6 SNAT address.
•In both the IPv4 SNAT addresses and IPv6 SNAT addresses fields, type both the IPv4 and IPv6
SNAT addresses.
16. From the Should traffic go to the Internet via specific gateways? list, select whether you want the
system to let all SSL traffic use the default route, or if you want to specify Internet gateways (routers).
If you chose to use specific gateways, you can also define the ratio of traffic sent to each device in the
next step.
•If you want outbound/Internet traffic out using the default route on the BIG-IP system, use No,
send outbound/Internet traffic via the default route and proceed to step 19.
•If you want to define a list of gateways (routers) to handle outbound SSL traffic (and control the
share of traffic each is given) use Yes, send outbound/Internet traffic via specific gateways,
proceed to step 17.
17. Options to provide the outbound gateway addresses will vary, whether you selected Support IPv4
only, Support IPv6 only, or Both IPv4 and IPv6. Type the IP addresses of the inward interface of
the first Layer 3 device in the decrypt zone or the decrypt zone gateway.
•In the What are the IPv4 outbound gateway addresses? field, type the IPv4 gateway addresses.
Proceed to step 22 to save.
•In the What are the IPv6 outbound gateway addresses? field, type the IPv6 gateway addresses.
Proceed to step 18.
21
Page 22
Setting Up a Basic Configuration
•In both the What are the IPv4 outbound gateway addresses? and What are the IPv6
outbound gateway addresses? fields, type both the IPv4 and IPv6 gateway addresses. Proceed to
step 18.
Click the + button to add additional addresses.
You can enter multiple gateways if you have multiple systems and wish to load balance across them.
If you do enter multiple addresses, you can also use the ratio value to control the load balancing. For
example, if you have two devices, and one handles twice as much traffic as the other, you can set the
ratio to 1 on the smaller device, and 2 on the larger one.
18. In the Non-public IPv6 networks via IPv6 gateways field, type the requested IPv6 address if you
want to route connections to any non-public IPv6 networks via the IPv6 gateways above. Enter the
prefix/mask-length (CIDR) of each network. Non-public IPv6 networks are those outside the 2000::/3
block, such as ULA networks in the fc00::/7 block.
19. In the Decrypt Zone to Ingress Device Configuration area, for Are there parallel service devices in
the decrypt zone?, select whether you want to send outbound traffic using the BIG-IP system default
route(s) or send outbound traffic through one or more service devices.
•If the system will send the traffic through its default route, which must be configured to point to
the ingress BIG-IP system, use No, send outbound traffic via the BIG-IP default route(s) and
proceed to step 22 to save.
•If your configuration includes any Layer 3 systems in the decrypt zone that must receive the
responses to traffic, use Yes, send outbound traffic via one or more service device(s) and
proceed to step 20.
20. Options to provide the outbound gateway addresses will vary, whether you selected Support IPv4
only, Support IPv6 only, or Both IPv4 and IPv6. Type the IP addresses of the inward interface of
the first Layer 3 device in the decrypt zone or the decrypt zone gateway.
•In the What are the IPv4 decrypt zone gateway addresses? field, type the IPv4 gateway
addresses. Proceed to step 22 to save.
•In the What are the IPv6 decrypt zone gateway addresses? field, type the IPv6 gateway
addresses. Proceed to step 21.
•In both the What are the IPv4 decrypt zone gateway addresses? and What are the IPv6
outbound gateway addresses? fields, type both the IPv4 and IPv6 gateway addresses. Proceed to
step 21.
Click the + button to add additional addresses.
You can enter multiple gateways if you have multiple systems and want to load balance across them.
If you do enter multiple addresses, you can also use the ratio value to control the load balancing. For
example, if you have two devices, and one handles twice as much traffic as the other, you can set the
ratio to 1 on the smaller device, and 2 on the larger one.
21. In the What are the intranet networks (subnets)? field, type the IP address and mask-length in
CIDR format for intranet submasks.
Click the + button to add additional addresses. Typical IPv4 entries include 10.0.0.0/8,
172.16.0.0/12, and 192.168.0.0/16.
22. Click Save.
You have now configured an egress device for a system configured for separate ingress and egress
devices.
This describes only the fields, lists, and areas needed to configure an egress device. You should complete
the other areas in General Properties before moving on to create services and service chains.
22
Page 23
Configuring the system for transparent proxy
You can configure Herculon SSL Orchestrator to operate in transparent proxy mode only. A transparent
proxy intercepts normal communication without requiring any special client configuration, so clients are
unaware of the proxy in the network.
1. On the Main tab, click SSL Orchestrator > Configuration.
The General Properties screen opens.
2. From the Which IP address families do you want to support? list, select whether you want this
configuration to Support IPv4 only, Support IPv6 only, or Both IPv4 and IPv6.
If you do not choose to support both address families, you must configure IP addresses in the family
you select for all IP address fields in this application. If you choose Both IPv4 and IPv6, you can
send intercepted IPv6 traffic through an IPv4 Layer 3 service device.
3. From the Which proxy schemes do you want to implement? list, select Implement transparent
proxy only.
4. From the Do you want to pass UDP traffic through the transparent proxy unexamined? list,
select one of the options:
F5 Herculon SSL Orchestrator: Setup
•Use Yes, pass all UDP traffic unexamined to pass UDP traffic through without inspecting it.
•Use No, manage UDP traffic by classification to configure specific service chain classifier rules
for UDP traffic.
5. From the Do you want to pass non-TCP, non-UDP traffic through the transparent proxy? list,
select one of the options:
•Use Yes, pass non-TCP, non-UDP traffic (such as IPsec, SCTP, OSPF, and so on) if you want
the system to pass all traffic that is not TCP or UDP through the transparent proxy. If you choose
this option, this traffic will not be classified or processed by any service chain.
•Use No, block all non-TCP, non-UDP traffic (such as IPsec, SCTP, OSPF, and so on) for the
system to block all non-TCP and non-UDP traffic.
6. Click Save.
You have now configured Herculon SSL Orchestrator to work in transparent proxy mode.
This describes only the fields, lists, and areas needed to configure Herculon SSL Orchestrator to work in
transparent proxy mode. You should also complete the other areas in General Properties before moving
on to create services and service chains.
Configuring the system for explicit proxy
You can configure Herculon SSL Orchestrator to operate in explicit proxy mode only. Explicit proxy in
Herculon SSL Orchestrator requires manual configuration of the client and supports only HTTP(S) based
on RFC2616.
1. On the Main tab, click SSL Orchestrator > Configuration.
The General Properties screen opens.
2. From the Which IP address families do you want to support? list, select whether you want this
configuration to Support IPv4 only, Support IPv6 only, or Both IPv4 and IPv6.
If you do not choose to support both address families, you must configure IP addresses in the family
you select for all IP address fields in this application. If you choose Both IPv4 and IPv6, you can
send intercepted IPv6 traffic through an IPv4 Layer 3 service device.
3. From the Which proxy schemes do you want to implement? list, select Implement explicit proxy
only.
23
Page 24
Setting Up a Basic Configuration
4. In the Explicit Proxy Configuration area, from the On which VLAN(s) should the explicit proxy
listen? field, select one or more BIG-IP® VLANs where the explicit proxy listens.
5. Options to provide the outbound gateway addresses will vary, whether you selected Support IPv4
only, Support IPv6 only, or Both IPv4 and IPv6. Type the IP address and port that the BIG-IP
system should use for the explicit proxy virtual server using one of these options.
•In the What IPv4 address and port should the explicit proxy use? field, type the IPv4 address
and port.
•In the What IPv6 address and port should the explicit proxy use? field, type the IPv6 address
and port.
•In both the What IPv4 address and port should the explicit proxy use? and What IPv6
address and port should the explicit proxy use? fields, type both the IPv4 and IPv6 address and
port information.
6. Click Save.
You have now configured Herculon SSL Orchestrator to work in explicit proxy mode.
This describes only the fields, lists, and areas needed to configure Herculon SSL Orchestrator to work in
explicit proxy mode. You should also complete the other areas in General Properties before moving on to
create services and service chains.
Configuring the system for both transparent and explicit proxies
Explicit proxy in Herculon™ SSL Orchestrator requires manual configuration of the client and supports
only HTTP(S) based on RFC2616.
You can configure Herculon SSL Orchestrator to operate in transparent and explicit proxy mode. A
transparent proxy intercepts normal communication without requiring any special client configuration, so
clients are unaware of the proxy in the network.
1. On the Main tab, click SSL Orchestrator > Configuration.
The General Properties screen opens.
2. Scroll down to the Which IP address families do you want to support? list, and select whether you
want this configuration to Support IPv4 only, Support IPv6 only, or Both IPv4 and IPv6.
If you do not choose to support both address families, you must configure IP addresses in the family
you select for all IP address fields in this application. If you choose Both IPv4 and IPv6, you can
send intercepted IPv6 traffic through an IPv4 Layer 3 service device.
3. From the Which proxy schemes do you want to implement? list, select Implement both
transparent and explicit proxies.
4. From the Do you want to pass UDP traffic through the transparent proxy unexamined? list,
select one of the options:
•Use Yes, pass all UDP traffic unexamined to pass UDP traffic through without inspecting it.
•Use No, manage UDP traffic by classification to configure specific service chain classifier rules
for UDP traffic.
5. From the Do you want to pass non-TCP, non-UDP traffic through the transparent proxy? list,
select one of the options:
24
•Use Yes, pass non-TCP, non-UDP traffic (such as IPsec, SCTP, OSPF, and so on) if you want
the system to pass all traffic that is not TCP or UDP through the transparent proxy. If you choose
this option, this traffic will not be classified or processed by any service chain.
•Use No, block all non-TCP, non-UDP traffic (such as IPsec, SCTP, OSPF, and so on) for the
system to block all non-TCP and non-UDP traffic.
6. In the Explicit Proxy Configuration area, from the On which VLAN(s) should the explicit proxy
listen? field, select one or more BIG-IP® VLANs where the explicit proxy listens.
Page 25
F5 Herculon SSL Orchestrator: Setup
7. Options to provide the outbound gateway addresses vary, whether you selected Support IPv4 only,
Support IPv6 only, or Both IPv4 and IPv6. Type the IP address and port that the BIG-IP system
should use for the explicit proxy virtual server, using one of these options.
•In the What IPv4 address and port should the explicit proxy use? field, type the IPv4 address
and port.
•In the What IPv6 address and port should the explicit proxy use? field, type the IPv6 address
and port.
•In both the What IPv4 address and port should the explicit proxy use? and What IPv6
address and port should the explicit proxy use? fields, type both the IPv4 and IPv6 address and
port information.
You have now configured Herculon SSL Orchestrator to work in both transparent and explicit proxy
modes.
This describes only the fields, lists, and areas needed to configure Herculon SSL Orchestrator to work in
both transparent and explicit proxy modes. You should also complete the other areas in General
Properties before moving on to create services and service chains.
25
Page 26
Setting Up a Basic Configuration
26
Page 27
Creating Services, Service Chains, and Classifier Rules
Overview: Creating services, service chains, and classifier rules
This section decribes how to create inline services, ICAP services, receive-only services, service chains,
and classifier rules.
Creating inline services for service chains
Before creating inline services, complete all areas in General Properties. Refer to the Configuring general
properties section of this document for more information.
Inline services pass traffic through one or more service devices at Layer 2 or Layer 3. You use inline
services in service chains, where each service device communicates with the BIG-IP® device, on the
ingress side and over two VLANs. These VLANs route traffic toward the intranet and Internet,
respectively.
Layer 3 inline services requires you to provide the IP address of the service devices from the present
choices in the Herculon SSL Orchestrator configuration. If you are using Layer 3 inline services, this
configuration sends and receives information from the services using a pre-defined set of addresses.
1. On the Main tab, click SSL Orchestrator > Configuration, and on the menu bar, click Services >
Inline Services to view inline services settings.
The Inline Services screen opens.
2. Options to provide the IPv4 (CIDR/19) subnet-block base address, the IPv6 /48 subnet-block prefix,
or both, will vary, whether you selected Support IPv4 only, Support IPv6 only, or Both IPv4 andIPv6.
•In the What is the IPv4 (CIDR/19) subnet-block base address? field, type the address block. F5
recommends the default block 198.19.0.0/19 to minimize the likelihood of address collisions.
Note: When using Layer 3 inline services, you must address your systems to match the required
ranges. Even though you can change the base address of each address block (IPv4) from which
subnets and addresses are assigned, changing an address block has several implications, must be
done with caution, and is not recommended or supported by F5.
•In the What is the IPv6 /48 subnet-block prefix? field, type the address block.
Note: Each inline service goes through one or more services at Layer 2 (LAN) or Layer 3 (IP).
Each service device communicates with the BIG-IP device on the ingress side over two VLANs
(from BIG-IP and to BIG-IP) that carry traffic toward the intranet and the internet, respectively.
•In both the What is the IPv4 (CIDR/19) subnet-block base address? and What is the IPv6 /48
subnet-block prefix? fields, type the necessary address block information.
3. Click Add.
4. In the Name field, type a name for your configuration.
Use a short, unique name for this service. This name can contain 1 -15 alphanumeric or underscore
characters, but must start with a letter. Letters are not case-sensitive.
5. From the Service Type list, select Layer 2 or Layer 3.
6. In the Interfaces area, select the BIG-IP system interface and VLAN tag for each VLAN pair.
Page 28
Creating Services, Service Chains, and Classifier Rules
Each Inward VLAN must be connected to the same Layer 2 virtual network from every device in the
Sync-Failover Device Group, and each Outward VLAN likewise, but to a distinct Layer 2 virtual
network.
If you choose to use the Ratio field, the BIG-IP system distributes connections among pool members
in a static rotation according to ratio weights that you define. In this case, the number of connections
that each system receives over time is proportionate to the ratio weight you defined for each pool
member or node. This number must be between 1-100.
For example, if you have five devices and you assign a ratio of 1 to the first three devices, and a ratio
of 2 to the fourth device, and a ratio of 3 to the fifth device; the first three devices with a ratio of 1
each receive 1/8 of the traffic. The fourth device receives 1/4 of the traffic, and the fifth device
receives 3/8 of the traffic.
7. Under Available Devices, from the IP Address list, select the IP address pairs of the Layer 3 devices
and click Add to add them to the IP Address field.
8. From the Translate Port for HTTP Traffic list, select one of the options.
•Use No if the connections should use their original destination ports.
•Use Yes to Port 80 to send all HTTP traffic through port 80.
•Use Yes to Port 8080 to send all HTTP traffic through port 8080.
•Use Yes to Port 8443 to send all HTTP traffic through port 8443.
9. From the Connection Handling On Outage list, select one of the following:
•Use Skip Service to allow connections to skip the service you are configuring if all the devices in
the service are unavailable.
•Use Reject Connection for the system to reject every connection reaching the service when the
service is down.
10. Click Finished.
11. Click Save.
Note:
Layer 3 devices need to follow a specific fixed addressing scheme. For each of the 10 possible Layer
3 inline services, you need to use the following configuration (with x being 0-9 representing the inline
service):
Inward Interface:
•IPv4 Address: 198.19.x.61 through 68 (for each of the load balanced Layer 3 devices)
•IPv4 Netmask: 255.255.255.128
•IPv6 Address: fd06:4d61:x::41 through 48 (for each of the load balanced Layer 3 devices)
While the base address can be changed if needed, F5 recommends leaving it set to the default:
198.19.0.0.
You have now configured an inline service for Herculon SSL Orchestrator.
Page 29
After creating more than one service, you can now create a service chain.
Creating ICAP services
Before creating ICAP services, complete all areas in General Properties. Refer to the Configuring general
properties section of this document for more information.
ICAP services use the RFC3507 ICAP protocol to refer HTTP traffic to one or more content adaptation
devices to inspect or modify. You can add an ICAP to any TCP service chain, but only HTTP traffic is
sent to the chain. Additionally, you can configure up to ten ICAP services using the Herculon SSL
Orchestrator configuration utility to load balance across them.
1. On the Main tab, click SSL Orchestrator > Configuration, and on the menu bar, click Services >
ICAP Services to view ICAP services settings.
The ICAP Services screen opens.
2. Click Add.
3. In the Name field, type a name for your configuration.
4. In the ICAP Devices field, type an IP address and port number and click Add.
5. For Headers, from the Mode list, select either Default or Custom.
To edit the headers, use Custom.
6. From the TCP Connections list, select F5®OneConnect™ or Separate.
Use OneConnect to reuse the TCP connections to ICAP servers, which processes multiple
transactions. If your ICAP servers do not support multiple ICAP transactions per TCP connection,
select Separate. OneConnect will then be disabled.
7. From the Type list, select either Load Balanced or Custom.
F5 Herculon SSL Orchestrator: Setup
•If you select Load Balanced, the Request and Response fields are prepopulated with keywords
that will be automatically replaced by the configured active ICAP server and port at the time of
the request. The specific page name for the request and response must be manually entered to
complete the URI. For example, if the request URI for the ICAP servers will be “icap://
10.1.2.3:1344/REQ”, you enter “REQ” in the request field.
•If you select Custom, the Request and Response fields are empty and the entire URI content
must be manually entered. In this case, Herculon SSL Orchestrator will not load balance traffic
across the configured ICAP servers. For example, if the request URI for the ICAP server will be
“icap://icap.example.com/request”, you enter the entire URI into the request field.
8. In the Request and Response fields, type the ICAP request and response URI, defined by RFC3507,
that are related to the ICAP server and based on whether you selected Load Balanced or Custom in
the previous step.
9. In the Preview Max. Length (bytes) field, type the number of bytes that are in the maximum length
for the ICAP preview.
Bytes of content, up to the specified number, are sent to the ICAP server as a preview of each HTTP
request or response. If you set the maximum preview length to zero (0), then requests and responses
are streamed through the ICAP server. The largest value currently supported is 51200 (50KB).
10. From the Server Failure Handling list, select Reset Connection or Next Service Chain.
•Use Reset Connection for the system to reset the connection to the client, discarding the request
and response.
•Use Next Service Chain for the system to let the request or response continue to the next service
in the service chain.
11. From the Send HTTP/1.0 Requests to ICAP list, select how to send requests to the ICAP service.
•Use HTTP/1.0 & HTTP/1.1 to send both HTTP/1.0 and HTTP/1.1 requests to the ICAP service.
29
Page 30
Creating Services, Service Chains, and Classifier Rules
•Use HTTP/1.1 only to send only HTTP/1.1 requests to the ICAP service. Any HTTP/1.0 requests
are not inspected.
12. Click Finished.
13. Click Save.
You have now configured an ICAP service.
After creating more than one service, you can now create a service chain.
Creating receive-only services for traffic inspection
Before configuring receive-only services, complete all areas in General Properties. Refer to the
Configuring general properties section of this document for more information.
Receive-only services only receive traffic for inspection and do not send the traffic back to the BIG-IP
system. Each receive-only service provides a packet-by-packet copy of the traffic passing through the
service to an inspection device. You can configure up to ten receive-only services using the F5
Herculon™ SSL Orchestrator™ configuration utility.
1. On the Main tab, click SSL Orchestrator > Configuration, and on the menu bar, click Services >
Receive Only Services to view receive-only services settings.
The Receive Only Services screen opens.
2. Click Add.
3. In the Name field, type a name for your configuration.
4. In the MAC Address field, type the MAC address of the receive-only device.
5. In the IP Address field, type the nominal IP address for this device.
Each receive-only device requires a nominal IP host address to identify the device in the BIG-IP
system.
6. From the VLAN list, select the VLAN where the receive-only device resides.
7. From the Interface list, select the associated BIG-IP system interface.
8. Click Finished.
9. Click Save.
®
®
You have now created a receive-only service for Herculon SSL Orchestrator.
After creating more than one service, you can now create a service chain.
Creating service chains to link services
Before you can set up service chains, you must configure multiple services such as inline, ICAP, or
receive-only.
You can create service chains using previously-created services. A service chain is a list of services
linked to service chain classifier rules. Service chains process specific connections based on classifier
rules that look at protocol, source, and destination addresses. Additionally, service chains can include the
following types of services, as well as any decrypt zones between separate ingress and egress devices:
•Layer 2 inline services
•Layer 3 inline services
•Receive-only services
•ICAP services
30
Page 31
F5 Herculon SSL Orchestrator: Setup
1. On the Main tab, click SSL Orchestrator > Configuration, and on the menu bar, click Policies to
view service chain settings.
The Service Chain information on the Policies screen opens.
2. Click Add.
3. In the Name field, type a name for your service chain.
Create a short name for this service chain. A service chain name may contain 1-15 alphanumeric or
underscore characters and must start with a letter (not case-sensitive). Use spaces or commas to
separate service names.
Note: You cannot use any of the keywords "all", "bypass", "reject", or "drop", nor the name of any
(inspection) service you previously configured as a service chain name.
4. In the Services area, select a Type and Name and then click Add.
5. Click Finished.
6. Click Save.
You have now configured a service chain.
After you create a service chain, configure either TCP or UDP classifier rules.
Creating TCP service chain classifier rules
Before you create a TCP service chain classifier rule, you must create one or more service chains.
Service chain classifier rules determine which service chains receive traffic. Each service chain classifier
rule you choose selects the specific chain to process ingress connections. Different classifier rules can
send connections to the same chain. Each classifier has three filters that match the source IP address, the
destination, and the application protocol. Filters can also overlap, so the best matching classifier
determines the service chain for a specific connection, and classifiers can reject a connection or allow it
to bypass the service chain. In addition, you can also choose to send decrypted or non-decrypted traffic to
the inspection devices.
Note: When configuring a single device Herculon SSL Orchestrator transparent proxy in front of an
explicit proxy, Herculon SSL Orchestrator can transparently intercept SSL traffic tunneled through an
explicit proxy and selectively forward the decrypted user traffic through the security service chain for
proper inspections. Afterwards, the user traffic is sent back to the BIG-IP, which re-encrypts the traffic
and sends to the explicit proxy. User traffic of certain categories may also be rejected by the BIG-IP or
bypass the security inspections.
Note: When transparently decrypting traffic to upstream explicit proxies in a two device Herculon SSL
Orchestrator deployment, the SSL forward proxy interception only occurs on the ingress device
(decryption, service chaining, and re-encryption occur on the ingress device, while the encrypted
plaintext traffic will pass through the egress device). In addition, all classifier rules apply to traffic inside
HTTP CONNECT tunnels except for rules bypassing SSL during the TLS handshake phase. Rules
bypassing SSL during the TLS handshake phase do not apply because SSL forward proxy cannot reuse
the same HTTP CONNECT tunnel to the explicit proxy for the bypassed flow.
1. On the Main tab, click SSL Orchestrator > Configuration, and on the menu bar, click Policies to
view TCP service chain classifiers settings.
The TCP Service Chain Classifiers information on the Policies screen opens.
2. In the TCP Service Chain Classifiers area, click Add.
3. In the Name field, type a name for this rule.
4. From the Phase list, select a phase for this classifier.
31
Page 32
Creating Services, Service Chains, and Classifier Rules
•Use Normal if the rule may match TLS connections at TLS handshake time and possibly again,
more specifically, after Herculon SSL Orchestrator exposes the plaintext of the TLS connection
(so you can manage HTTPS on nonstandard ports, for example). Normal rules may also match
non-TLS traffic (so, for example, a single rule can handle both HTTPS and HTTP).
•Use No TLS if the rules match only non-TLS traffic.
•Use Pre Handshake to have the rules match before any TLS handshake. This means the rules can
allow a connection to bypass SSL inspection completely,without even trying to learn the real name
of the remote server. All Dynamic Domain Bypass (DDB) rules must have Phase set to PreHandshake.
•Use TLS Handshake rules to have the rules match only at TLS handshake time: they will never
match non-TLS traffic, and they are not checked again after the plaintext of a TLS connection
becomes available.
5. From the Protocol list, select the protocol of the connection based on the port number or protocol
recognition.
6. In the Source area, select a Type and a Value.
This option specifies the name of the Service Chain you configured that you want to use for this
classifier rule. From the Type list, select one of the following and then click Add.
•For IP Address, type the required IP address in the Value field.
•For Data Group, select the name of your data group from the Value list.
7. In the Destination setting, select a Mode, Type, and Value.
This option specifies the destination of the connection. The value of this field is based on the selection
you made for the mode.
•From the Mode list, select the mode you want to use for this classifier rule. The mode you choose
determines the value you will use for the destination. You can choose one of the modes for each
classifier rule:
•For Address, the Destination filter you configure consists of one or more IP subnet or host
addresses just like the Source filter.
•For Geolocation, the Destination you configure contains 2-letter country and 3-letter
continent codes against which the IP Geolocation of the destination server is compared. The
continent codes are: CAF=Africa, CAN=Antarctica, CAS=Asia, CEU=Europe, CNA=North
America, COC=Oceania, CSA=South. The country codes are those of ISO 3166 alpha-2.
•For IPI (IP Inspection), the Destination you configure contains one or more IP Intelligence
categories against which the destination IP address's reputation is matched. You must replace
SPACE characters in names of IP Intelligence categories with underscores (_) before adding
them to Destination.
•For Port, the Protocol value must be All. The Destination contains one or more TCP port
numbers or ranges like 5557-5559 (use 0 or * to match all) against which the destination port
number is matched. The main use of this mode is to control non-TLS traffic such as SSH.
•For URLF (URL Filtering), the Destination you configure is one or more URL Filtering
categories against which the URL categorization of the destination server is compared. You
must replace SPACE characters in names of URL Filtering categories with underscores (_)
before adding them to Destination.
•For DDB (Dynamic Domain Bypass), the Destination you configure contains one or more
DNS domain names (unique or wildcard) against which the destination hostname indicated by
the client in TLS SNI is matched. This mode is special because it classifies traffic before the
Herculon SSL Orchestrator implementation attempts any TLS handshake with the remote
server (that is, in Match Phase Pre-handshake). You may use DDB to whitelist and bypass
traffic to servers which cause TLS handshake problems or that require TLS mutual (clientcertificate/smart-card) authentication. For DDB, the Service Chain value you select must be
Bypass or Reject.
32
Page 33
F5 Herculon SSL Orchestrator: Setup
For security, the DDB facility ensures the destination IP address for each bypassed connection
corresponds to the allowed domain. DDB may replace the destination IP address supplied by
the client with one freshly obtained from DNS.
•For Name (domain name), the Destination you will configure contains one or more DNS
domain names (unique or wildcard) against which the connection's destination host name is
matched.
•From the Type list, depending on which Mode you selected, choose either IP Address, DataGroup, Category, or Domain Name (or there will be no selection required).
•From the Value list or field, depending on which Type and Mode you selected, choose a value
from the list or type in the required information (hover your mouse over the field for tips on
required information).
8. Click Add.
9. From the Service Chain list, select the name of the service chain you configured that you want to use
for this classifier rule. This must be the name you gave a service chain or a special keyword:
•All means a chain including all services: first receive-only services, then ICAP services, then inline services.
•Reject terminates the connection.
•Bypass lets the connection go to its destination without traversing any service chain.
By specifying service chain classifier rules, if more than one classifier matches a connection, the bestmatching classifier determines the service chain for that connection (so the order of classifier rules in
the list is not important). Classifiers can also reject a connection or let it bypass the service chain
(bypass TLS interception). The default action applies to connections which do not match any
classifier.
This classifier is the element of the Herculon SSL Orchestrator implementation which selects the
proper service chain to handle each connection. A connection" is a particular packet flow between
client (source) and server (destination), identified by the 5-tuple of IP protocol (TCP or UDP), plus
client (source) and server (destination) IP addresses and port numbers. The classifier has a set of rules
for TCP connections, and another set of rules for UDP when UDP service chains are enabled. The
classifier matches information describing each connection, such as its client and server IP addresses,
against criteria specified in the classifier rules. For example, a classifier rule might match all
connections from clients homed on a certain IP subnet. Another classifier rule might match all
connections going to servers in a certain country (using IP Geolocation).
10. To bypass decryption and send encrypted traffic to inspection devices, deselect the Decrypt check
box. By default, the Decrypt check box is turned on and cannot be changed unless you have set the
Phase field to Pre Handshake and the Service Chain classifier to All.
Note: If you have upgraded to a new Herculon SSL Orchestrator version, or are using a previous
configuration, the Decrypt check box is selected by default.
11. Click Finished.
12. From the What should happen to unmatched connections? list, select how the system should
handle unmatched connections.
13. Click Save.
You have now created a TCP service chain classifier rule.
Creating UDP service chain classifier rules
Before you create a UDP service chain classifier rule, you must create one or more service chains.
Service chain classifier rules determine which service chains receive traffic. Each service chain classifier
rule selects the specific chain to process ingress connections. Different classifier rules may send
connections to the same chain. Each classifier has three filters that match the source IP address, the
33
Page 34
Creating Services, Service Chains, and Classifier Rules
destination, and the application protocol. Filters can also overlap, so the best matching classifer
determines the service chain for a specific connection. Finally, classifiers can reject a connection or allow
it to bypass the service chain.
1. On the Main tab, click SSL Orchestrator > Configuration, and on the menu bar, click Policies to
view UDP service chain classifiers settings.
The UDP Service Chain Classifiers information on the Policies screen opens.
2. In the UDP Service Chain Classifiers area, click Add.
3. In the Name field, type a name for this rule.
4. From the Protocol list, select the protocol of the connection based on the port number or protocol
recognition.
5. In the Source area, select a Type and type a Value.
This option specifies the name of the Service Chain you configured that you want to use for this
classifier rule.
6. In the Destination area, select a Mode and Type, and type a Value.
This option specifies the destination of the connection. The value of this field is based on the selection
you made for the mode.
7. From the Service Chain list, select All.
8. Click Finished.
9. From the What should happen to unmatched connections? list, select how the system should
handle unmatched connections.
10. Click Save.
You have created a UDP Service Chain Classifier rule.
34
Page 35
Importing and Exporting Configurations for Deployment
Overview: Importing and exporting configurations for deployment
You can use F5® Herculon™ SSL Orchestrator™ to both import and export previously successful
configurations to resolve specific configuration deployment issues or deploy into any Herculon SSL
Orchestrator environment. By importing new configurations, you can use external configuration JSON
(JavaScript®Object Notation) files to reset your Herculon SSL Orchestrator settings. When importing
past configurations, you can use the roll back capability by selecting a previously saved or imported file
from a list that also contains user-specified comments. By rolling back to a previously successful
deployment configuration, you can quickly resolve specific configuration issues in a current deployment,
or fix a corrupted environment.
You can also export previously successful deployment configurations as JSON files to use in any
Herculon SSL Orchestrator environment. These exported configurations can be used to address other
specific configuration issues.
Importing new configurations for deployment
Before you import new configurations for deployment, complete all areas in General Properties. Refer to
the Configuring general properties section of this document for more information.
You can import previously successful configuration JSON files, and examine any differences between the
current configuration and the imported configuration prior to deployment.
1. On the Main tab, click SSL Orchestrator > Configuration, and on the menu bar, click Settings >
Import Configs to view import configuration settings.
The Import Configurations screen opens.
2. From the Import Configurations From list, select File.
3. Click Choose File and select the location of the configuration JSON file saved on your local system
that you want to import.
4. Select the JSON file and click Open.
The JSON file you selected opens next to the Choose File button. If the file contains the correct
structure, the Update button is enabled.
5. Click Update.
If the file's configuration has been altered, a dialog box opens asking if you want to continue
importing the file.
6. Specify what you want to do.
•To examine the differences between the current configuration and the imported configuration,
click OK.
•To stop the import process, click Cancel.
If you clicked OK, an automatically generated JSON dialog box opens asking Do you wish toimport these SSL Orchestrator configuration settings?. The current
configuration and the imported configuration display next to each other, and show any configuration
differences that might be found between the two files. Make sure to review all of the differences
between the two files to verify that this is the configuration you want to import.
7. To import the contents of the configuration file, click OK, or click Cancel to stop the import process.
8. Click Deploy to deploy the imported configuration into Herculon SSL Orchestrator.
9. Click Finished.
Page 36
Importing and Exporting Configurations for Deployment
You have now imported a new configuration into Herculon SSL Orchestrator.
Importing past configurations for deployment
Before you import past configurations for deployment, complete all areas in General Properties. Refer to
the Configuring general properties section of this document for more information.
Before deploying a configuration, you can roll back to previously successful deployment configurations
and examine any differences between the current configuration and the past configuration.
1. On the Main tab, click SSL Orchestrator > Configuration, and on the menu bar, click Settings >
Import Configs to view import configuration settings.
The Import Configurations screen opens.
2. From the Import Configurations From list, select Past Deployment.
The screen lists previously saved deployments.
3. Select a previously saved configuration to import.
4. Click Update.
An automatically generated JSON dialog box opens, asking Do you wish to rollback your
SSL Orchestrator configuration settings?. The current configuration and the past
configuration display next to each other, and show any configuration differences that might be found
between the two files. Make sure to review all of the differences between the two files to verify that
this is the configuration you want to import.
5. To import the contents of the past deployment, click OK, or click Cancel to stop the import process.
6. Click Deploy to deploy the past configuration into Herculon SSL Orchestrator.
A Deploy Comments popup dialog box opens where you can enter information specific to the
successfully deployed past configuration.
You have now deployed a past configuration into Herculon SSL Orchestrator.
Exporting configurations for deployment
Before you export configurations for deployment, complete all areas in General Properties. Refer to the
Configuring general properties section of this document for more information.
You can export previously successful deployment configurations as JSON files and examine
configuration settings prior to exporting it to your local system. Exported JSON files can later be
imported and used to deploy configurations in other Herculon™ SSL Orchestrator environments.
1. On the Main tab, click SSL Orchestrator > Configuration, and on the menu bar, click Settings >
Export Configs to view export configuration settings.
The Export Configurations screen opens.
Note: If you do not have any previously saved deployments, no information displays.
2. From the Export Configurations table, select a previously deployed configuration.
3. Click Export.
A dialog box popup opens showing the JSON configuration information to be exported, and asks Do
you wish to export the current SSL Orchestrator Configuration
settings to a .json file?.
4. To export the current Herculon SSL Orchestrator settings into a JSON export file, click OK, or click
Cancel to stop the export process.
5. Type the filename of the JSON file to export.
6. Click OK.
36
Page 37
F5 Herculon SSL Orchestrator: Setup
The configuration information you selected to export is downloaded to your local system as a JSON file,
and can be imported and used to deploy configurations in other Herculon SSL Orchestrator
environments.
37
Page 38
Importing and Exporting Configurations for Deployment
38
Page 39
Setting up Herculon SSL Orchestrator in a High
Availability Environment
Overview: Setting up Herculon SSL Orchestrator in a high availability
environment
This section describes how to deploy F5® Herculon™ SSL Orchestrator™ high availability (HA). Herculon
SSL Orchestrator HA configuration and deployment ensures a decrease in downtime and eliminates
single points of failure. The deployment of Herculon SSL Orchestrator’s HA works with the BIGIP®device groups support to sync the Herculon SSL Orchestrator specific configuration items, and is
transparent to the user.
The deployment occurs after completing a configuration change and selecting Deploy. The deployment
request is first routed to one of the devices in the HA device group. This first device configures the
device where the request is received. After successful deployment on that device, the request is repeated
on other BIG-IP devices.
With Herculon SSL Orchestrator installed onto a dedicated system with failover, it automatically takes
over in case of system failure. Data is synchronized between the two systems, ensuring high availability
and consistent protection.
Note: Herculon SSL Orchestrator high availability deployment is supported for use only with the
Herculon SSL Orchestrator configuration utility versions 2.1 and later.
Assumptions and dependencies
To ensure that your Herculon SSL Orchestrator HA deployment succeeds, it is critical that you closely
review and follow all assumptions and dependencies.
•HA Setup: BIG-IP HA (CMI) must be set to Active-Standby mode with network failover. See the
BIG-IP Device Service Clustering: Administration document for detailed information on ActiveStandby HA mode.
•HA Setup: If the deployed device group is not properly synced or RPM packages are not properly
syncing, make sure your HA self IP (for example, ha_self) Port Lockdown setting is not set to
Allow None. On the Main tab, click Network > Self IPs and click your ha_self. If Port Lockdown
is set to Allow Custom, check that the HA network port 443 is open on self IP.
•BIG-IP HA Devices: Only manual sync is supported.
•BIG-IP HA Devices: Devices in each BIG-IP HA pair must be the same model and run the same
version of TMOS® (including any hotfixes). Except for the management interface, you must configure
both devices to use the same arrangement of network interfaces, trunks, VLANs, self IPs (address and
subnet mask), and routes. For example, if one BIG-IP device is connected to a specific VLAN/subnet
using interface 1.1, the other BIG-IP device must also be connected to that VLAN/subnet using
interface 1.1. If the BIG-IP device configurations do not match, this implementation will not deploy
correctly, and HA failover will not work.
•User Experience: Deployment must be initiated from the active HA BIG-IP device.
•User Experience: If the environment is changed from non-HA to HA, or from HA to non-HA, the
application must be redeployed.
•User Experience: You can refresh the SSL Configuration screen (SSL Orchestrator >
Configuration) for each peer device in order to see all modified changes.
Page 40
Setting up Herculon SSL Orchestrator in a High Availability Environment
Task summary for deploying in a high availability environment
To ensure that your F5® Herculon™ SSL Orchestrator™ high availability (HA) deployment succeeds, it is
critical that you closely follow each deployment step, as well as the assumptions and dependencies, for
both devices in the device group. In addition, you should adhere to all prerequisites. If the systems in the
device group are not configured consistently, the deployment synchronization process might suffer errors
or fail.
Use the following tasks to ensure your HA deployment succeeds:
•Installing an updated RPM file
•Configuring the network for high availability
•Configuring the ConfigSync and Failover IP address
•Adding a device to the local trust domain
•Creating a Sync-Failover device group
•Synchronizing the device group
•Setting up a basic configuration for deployment
Note: See the Diagnosing your Herculon SSL Orchestrator deployment section for more detailed
information on how to monitor the success or failure of your configuration modification.
Prerequisites
Before configuring the network for high availability, make sure these prerequisites are in place:
•The information used to configure your devices is identical on both devices. Without identical
information on both devices, the HA deployment process can suffer from errors or fail.
•The most current RPM file is successfully installed on the first device (the Active device). See the
section Installing an updated RPM file to ensure that this prerequisite has been properly completed.
•Successfully set up an HA ConfigSync device group prior to starting the configuration. See the
section Configuring the network for high availability and its subsections to ensure that this
prerequisite has been properly completed. For additional information, refer to the BIG-IP DeviceService Clustering: Administration document, section Managing Configuration Synchronization.
•Herculon SSL Orchestrator is installed with the appropriate license information using the Herculon
SSL Orchestrator Setup Wizard (or the CLI) and made sure your device setup information is identical
on both devices:
•While using the Herculon SSL Orchestrator Setup Wizard, you have noted the details used for
NTP and DNS setup and made sure they will be identical on both devices. To verify duplication,
on the Main tab, click System > Configuration > Device and select NTP or DNS.
•Ensure that any certificates used in the configuration are copied to all devices.
•Ensure that information is identical on all devices. This information should include any of the
following that are needed:
40
•Client network
•External network
•Decrypt zone network
•Decrypt zone control network
•Networks providing access to ICAP devices and Receive-only devices
•Ensure that the log publishers are configured and named the same.
•Ensure that all systems use the same interfaces for any services. (If interface 1.1 is used to send
traffic to an inline Layer 2 device on system A, then interface 1.1 must also be used on systems B,
C, and D.)
Page 41
Note: Do not attempt to duplicate the configuration by saving and restoring a user configuration set
(UCS) file from one machine to the other, or any other cloning approach. There are several IDs that
must be unique that will also be duplicated, causing additional problems.
Note: For more detailed information on using the Herculon SSL Orchestrator Setup Wizard, see the
Using the Herculon SSL Orchestrator setup wizard section.
Installing an updated RPM file
Create a backup of your current configuration to ensure your settings are not lost if the update fails.
Having the latest version of F5® Herculon™ SSL Orchestrator™ establishes the version that later appears
on your other BIG-IP® HA peer device. After downloading the latest version of the Herculon SSL
Orchestrator zip file from downloads.F5.com, return to your Herculon SSL Orchestrator configuration
utility.
1. On the Main tab, click SSL Orchestrator > Updates.
The Updates screen opens.
2. For the File Name setting, click Browse and navigate to the file you saved onto your system.
3. Click Open to select it.
4. Click Install.
F5 Herculon SSL Orchestrator: Setup
Note: Install the Herculon SSL Orchestrator configuration utility package (the *.rpg file) on the
active system only. That system will copy it to the other systems in the ConfigSync group.
Later, after a successful Herculon SSL Orchestrator HA deployment, you should verify that the same
version appears on the BIG-IP HA peer device. See the section Updating the Herculon SSL Orchestratorversion for more detailed installation instructions.
Configuring the network for high availability
You can specify the settings for VLAN HA and self IP addresses on the active device to configure your
network for high availability. If needed, you can configure all devices involved in the high availability
group for HA.
Note: This network connects the various devices and must be a common Layer-2 network between all
devices.
1. On the Main tab, click Network > VLANs.
The VLAN List screen opens.
2. Click Create.
A New VLAN screen opens where you can configure your new VLAN.
3. In the Name field, type the name (for example, ha_vlan).
4. For the Interfaces setting:
a) From the Interface list, select an interface number.
b) From the Tagging list, select Tagged for traffic for that interface to be tagged with a VLAN ID.
c) Click Add.
The interface you selected appears in the Interfaces list as a tagged service.
5. Click Finished.
Next to the F5 logo, your device status appears showing ONLINE (ACTIVE) and Standalone
with green indicators showing their status as up and running.
6. On the Main tab, click Network > Self IPs .
41
Page 42
Setting up Herculon SSL Orchestrator in a High Availability Environment
The Self IP List screen opens.
7. Click Create.
A New Self IP screen opens where you can configure your new self IP.
8. In the Name field, type the self IP name (for example, ha_self).
9. In the IP Address field, type the IP address for the device.
10. In the Netmask field, type the netmask for the device.
11. From the VLAN/Tunnel list, select the VLAN name (ha_vlan).
12. Click Finished.
Configuring ConfigSync and failover IP addresses
Before creating the device group, you should configure the configuration synchronization (ConfigSync)
and Failover IP addresses for each BIG-IP® system in the device group. The ConfigSync address is the IP
address that the system uses when synchronizing configuration with peer devices, and the failover
address is the IP address that the system uses for network failover.
1. On the Main tab, click Device Management > Devices.
The Devices List screen opens.
2. Click your device in the device list.
The properties screen for the device opens.
3. Click ConfigSync.
The screen shows the ConfigSync Configuration area, with the local address of the device.
4. From the Local Address list, select the VLAN address (ha_vlan).
5. Click Update.
6. Click Failover Network, and then click Add.
The New Failover Unicast Address screen opens.
7. In the Address field, make sure that the VLAN address (ha_vlan) is present.
8. Click Repeat.
9. After the screen refreshes, from the Address list, select the Management Address.
Note: Connection Mirroring is not supported.
10. Click Finished.
The Failover Unicast Configuration area lists both the VLAN HA (ha_vlan) and Management
Address devices.
Adding a device to local trust domain
Any BIG-IP® devices that you intend to add to a device group must first be members of the same local
trust domain. When a BIG-IP device joins the local trust domain, it establishes a trust relationship with
peer BIG-IP devices that are members of the same trust domain. For example, if you are creating a device
group with two members, you must log in to one of the devices and join the other device to that system's
local trust domain. The devices can then exchange their device properties and device connectivity
information.
1. On the Main tab, click Device Management > Device Trust.
The Device Trust screen opens.
2. On the menu bar, click Device Trust Members to view peer and subordinate device settings.
The Device Trust Members screen opens.
3. Click Add.
The Device Trust screen opens, showing Retrieve Device Credentials (Step 1 of 3).
4. From the Device Type list, select Peer.
5. In the Device IP Address field, type the IP address of your device.
42
Page 43
6. Click Retrieve Device Information.
The screen shows Verify Device Certificates (Step 2 of 3).
7. Click Device Certificate Matches.
The screen shows Add Device (Step 3 of 3).
8. In the Name field, type the name of the device you are adding.
9. Click Add Device.
At the upper right, next to the F5 logo, the status of your device should show ONLINE (ACTIVE)
and Connected, with a green indicator next to them showing its active and connected status.
Creating a sync-failover device group
For an HA configuration, you need to establish failover capability between two or more BIG-IP® devices.
Then, if an active device in a sync-failover device group becomes unavailable, the configuration objects
fail over to another member of the device group, and traffic processing is unaffected. You perform this
task on any one of the authority devices within the local trust domain.
1. On the Main tab, click Device Management > Device Groups.
The Device Group List screen opens.
2. Click Create.
The New Device Group screen opens.
3. In the General Properties area, name your new device group and select the group type.
a) In the Name field, type the name of your device group.
b) From the Group Type list, select Sync-Failover.
4. For the Configuration setting, retain the Basic configuration type, and then select members and
define the sync type.
a) In the Members setting, select available devices from the Available list and add them to the
Includes list.
b) From the Sync Type list, select Manual with Incremental Sync.
F5 Herculon SSL Orchestrator: Setup
Note: You must do a manual sync. If you select Automatic with Incremental Sync, your HA
deployment will fail.
5. Click Finished.
The Device Groups list screen opens, listing your new device group. The ConfigSync Status column will
indicate waiting Initial Sync.
Synchronizing the device group
For an HA configuration, you need to synchronize the BIG-IP® configuration data from the local device
to the devices in the device group. This synchronization ensures that devices in the device group operate
properly. When synchronizing self IP addresses, the BIG-IP system synchronizes floating self IP
addresses only.
1. Next to the F5 logo, click Awaiting Initial Sync.
On the Main tab, you can also click Device Management > Overview.
The Device Management Overview screen opens, showing your Device Groups.
2. In the Sync Issues area, select ha to expand the Devices and Sync Options areas of the screen.
3. In the Devices area, select the device showing Changes Pending.
4. In the Sync Options area, select Push the selected device configuration to the group.
5. Click Sync.
You have now completed your F5® Herculon™ SSL Orchestrator™ HA deployment. Next, set up a basic
configuration for deployment on your active device.
43
Page 44
Setting up Herculon SSL Orchestrator in a High Availability Environment
Setting up a basic configuration for deployment
You must create identical information on each device before deploying the configuration.
You can now setup a basic configuration for deployment on your active device.
1. On the Main tab, click SSL Orchestrator > Configuration.
The General Properties screen opens.
2. Refer to the Configuring general properties section for complete instructions.
After you deploy your configuration on the active device, the system automatically synchronizes the
configuration with all of the other devices in the device group. Since some errors may not be
apparent, it is critical that you thoroughly test and diagnose the success or failure of the deployment.
Refer to Task summary for diagnosing and fixing high availability deployment for steps to test and
verify your HA deployment.
Task summary for diagnosing and fixing high availability deployment
Before using the methods available in this section, first refer to the Diagnosing your Herculon SSL
Orchestrator deployment section for detailed information on how to monitor the success or failure of
your configuration deployment.
For additional methods that help diagnose, verify, and fix a failed HA deployment, use the following
tasks:
•Verifying deployment and viewing logs
•Verifying the RPM file version on both devices
•Configuring general properties and redeploying
•Reviewing error logs and performing recovery steps
Verifying deployment and viewing logs
You can verify your deployment by verifying that the required virtuals, profiles, and BIG-IP® LTM® and
network objects have been created, checking that the RPM files are in sync, and reviewing logs for
failures, for example.
Note: Because the initial device in the HA device group repeats the configuration requests and
propagates the configuration to other BIG-IP devices, make sure you verify the initial configured device
first, followed by each device in the HA device group. If the initial device deployment configuration fails,
all other device configuration deployments will not successfully be configured.
1. Verify that all expected and required virtuals, profiles, and BIG-IP LTM and network objects (routedomains, VLANs, self IPs) have been created on each device in the HA device group.
These will be items beginning with the name given to the application (for example, if the application
was named SSLO, verify that all of the items named | Summary SSL Orchestrator 13.0.0 | 9 SSLO_*
are the same on all devices).
2. Ensure that all RPM file versions are identical.
3. Verify your deployment with, or without, services.
4. Review the following logs for failures:
44
•/var/log/restnoded/restnoded.log
•/var/log/restjavad.0.log
Page 45
Verifying the RPM file version on both devices
After a successful F5® Herculon™ SSL Orchestrator™ HA deployment, verify that the latest version of the
Herculon SSL Orchestrator zip file is installed on both devices.
1. On the Main tab, click SSL Orchestrator > Updates.
The Updates screen opens.
2. Check the RPM versions in the Version field.
If the versions are not identical, you must install an updated RPM file and verify that both devices are
identically configured.
Configuring general properties and redeploying
If your configured deployment continues to fail, you can remove and reconfigure all general property
settings, or restore a previously successful backup file per device.
1. Remove all configurations present on all devices.
Note: You may want to restore a backup file instead, per device, to remove all current configurations.
2. For all devices, individually configure each section in the F5® Herculon™ SSL Orchestrator
configuration utility and select Deploy. Verify that all new objects are properly synced and deployed.
F5 Herculon SSL Orchestrator: Setup
™
Note: If synchronization or deployment issues persist after deploying after each section, attempt to
deploy after updating each item (instead of after each section) in the Herculon SSL Orchestrator
configuration utility and verify that all new objects are properly synced and deployed.
Note: See the Configuring general properties section for more detailed information.
Reviewing error logs and performing recovery steps
You can review log messages to help you debug system activity and perform recovery steps. Refer to the
Configuring logging section of this document for more information on generating logs and setting the
level of logging you want the system to perform.
1. Verify that all BIG-IP® LTM®and network objects are present on each of the devices in the HA device
group.
2. If the configuration deployment fails on each device, review the logs:
•/var/log/restnoded/restnoded.log
•/var/log/restjavad.0.log
3. Use the following REST GET command to determine the state of the deployed device block in the
REST storage:
4. Since failure scenarios can vary, after reviewing the logs, attempt the following recovery steps:
a) Redeploy Herculon SSL Orchestrator.
If this succeeds, you have recovered from the failure situation.
b) Undeploy Herculon SSL Orchestrator.
By undeploying, a cleanup of MCP objects on each of the devices occurs while also cleaning up
required data properties within the block stored in REST storage. If this succeeds, attempt to
redeploy again.
45
Page 46
Setting up Herculon SSL Orchestrator in a High Availability Environment
c) If redeploy or undeploy fails, do the following:
1. From command line (back door), run > touch /var/config/rest/iapps/enable.
2. Refresh the Herculon SSL Orchestrator menu UI.
3. Select the deployed application from the list and delete the application.
4. Redeploy and undeploy again.
5. Once done, remove the file rm -f /var/config/rest/iapps/enable.
d) If these recovery steps do not work, you may need to clean up the REST storage.
Note: For more detailed information on setting up HA, see the BIG-IP Device Service Clustering:
Administration document.
46
Page 47
Using Herculon SSL Orchestrator Analytics
Overview: About Herculon SSL Orchestrator analytics
Herculon SSL Orchestrator analytics provide a customizable view into your Herculon SSL Orchestrator
statistics, and enable you to flexibly choose the information you want to view based on specified ranges
of time that you can select and easily adjust. By leveraging the multiple options available, you can
analyze dimensions individually, compare groups of dimensions and their statistics, and sort the charts
and tables as you diagnose the performance and health of your system’s SSL orchestration.
When you initially launch the analytics dashboard by clicking SSL Orchestrator > Analytics >Statistics, data that has been collected over the last hour is displayed in five line charts:
•Hit Count
•Client Bytes In
•Server Bytes In
•Client Bytes Out
•Server Bytes Out
This initial display of data is unfiltered and includes statistics generated for the following dimensions in
tables:
•Client Cipher Names
•Client Cipher Versions
•Server Cipher Names
•Server Cipher Versions
•Virtual Servers
•Servers (the final destination)
•Actions
You can also use the Herculon SSL Orchestrator analytics Scheduled Reports to set up an automatic
reporting schedule and later view any stored scheduled statistical records.
About analytics dashboard capabilities
The F5® Herculon™ SSL Orchestrator™ analytics dashboard has customizable options so that you can
view statistics for your orchestration’s top virtual servers, top sites bypassed, top sites decrypted, the
most used client ciphers and protocols, and determine where the top server ciphers and protocols are
used.
By customizing the timeline, charts, and tables, you can also:
•Adjust the timeline for the statistics displayed in the charts and tables to customize statics captured
across a wide range of time, spanning between just a minute up to an entire year.
•Create comparison charts for two or more members of a dimension.
•Filter data across one or more dimensions.
•Sort table-based statistics for any dimension.
Page 48
Using Herculon SSL Orchestrator Analytics
Timeline capabilities
The customizable timeline capabilities give you the ability to produce a statistical analysis based on a
specified range of time. When you first open the analytics dashboard, the default refresh time is set at 5
minutes. You can change the refresh rate to several different settings by selecting from the 5 min. list at
the top of the screen.
•1 min., 5 min., or 10 min. options reset the refresh time in minutes.
•Off freezes the data refresh collection.
You can also update the statistics on demand by selecting Refresh above the timeline.
Customizing timeline capabilities
You can customize the range of time in which you would like to view data, in both the charts and tables.
When you first launch the analytics dashboard, the default range of time is set at the Last hour. You can
change the range of time that appears on the timeline to several different settings.
1. On the Main tab, click SSL Orchestrator > Analytics > Statistics to view the default charts, on the
left, and dimensions, such as Client Cipher Names, Virtual Servers, and Actions, on the right. The
default time for collecting data is set to show statistics gathered over the last hour.
The Statistics screen opens.
2. Above the timeline, from the Last hour list, select the range of time you would like to view statistics
across.
•Last hour
•Last 4 hours
•Last day
•Last week
•Last month
•Last year
•Year to date
•All
The range of time you specified appears above the timeline bar.
3. Use the timeline sliders at each end of the timeline, to manually scroll back and forth, further
narrowing in on ranges of time that are critical to the ongoing performance and health of your
system's SSL orchestration.
Once the sliders have been manipulated, you can also click and drag the bar above the timeline based
on the newly specified timeline.
Chart capabilities
You can reorder the customizable line charts by dragging them up or down to a different place in the
chart stack. You can also minimize them so to hide their information.
48
Page 49
Customizing chart capabilities
Within each line chart, you can identify a specific day and time within the time range selected. You can
also select a block of time to be further analyzed. By leveraging the multiple options available, you can
analyze dimensions individually, compare groups of dimensions and their statistics, and sort the charts as
you diagnose the performance and health of your system’s SSL orchestration.
1. On the Main tab, click SSL Orchestrator > Analytics > Statistics to view the default charts, on the
left, and dimensions, such as Client Cipher Names, Virtual Servers, and Actions, on the right. The
default time for collecting data is set to show statistics gathered over the last hour.
The Statistics screen opens.
2. On the title bar of the line chart, place your cursor anywhere, click and hold to drag the chart up or
down the chart stack.
3. On the right side of the title bar, select the minus sign (-) to minimize the chart.
4. Select the plus sign (+) to again maximize the chart.
F5 Herculon SSL Orchestrator: Setup
Table capabilities
The customizable dimension tables can be reordered and expanded and minimized just like the line
charts. By using the menu at the top of the table on the dashboard, you can expand the tables toward the
center of the dashboard so that you can view all the table columns collecting statistics.
Customizing table capabilities
You can select each column within a table individually, and sort it to view the data in ascending or
descending order.
1. On the Main tab, click SSL Orchestrator > Analytics > Statistics to view the default charts, on the
left, and dimensions, such as Client Cipher Names, Virtual Servers, and Actions, on the right. The
default time for collecting data is set to show statistics gathered over the last hour.
The Statistics screen opens.
2. On the title bar of the table, place your cursor at the beginning of the table's title and click the three
lines.
3. Select Sort By.
4. Choose one of the table columns to highlight:
•Hit Count Per Second
•Client Bytes Out Per Second
•Duration
•Server Bytes In
•Server Bytes In Per Second
•Hit Count
•Server Bytes Out Per Second
•Client Bytes In
•Client Bytes In Per Second
•Client Bytes Out
•Server Bytes Out
49
Page 50
Using Herculon SSL Orchestrator Analytics
You can also individually select each row within a table to update the statistics within each available
chart. You can also launch a comparison chart based on the table and the column of data that you
selected to sort by.
5. To highlight a table member, within the table, select that row.
6. Right-click the highlighted row and select Sort By.
7. Choose one of the table columns you would like to create a chart from, and right-click the highlighted
row.
8. Select Add Comparison Chart.
A comparison chart opens displaying the dimension, row member, and statistical column that you
chose.
Note: You can add more comparison charts as needed, reorder new charts added to the chart stack,
and minimize them as necessary.
9. To remove the comparison chart, click the X in the far-right corner of the chart's title bar.
10. To reset the table without any member of the table highlighted, right-click the highlighted row withinthe table and select Clear Selection.
Charting bytes in, bytes out, and hit count over time
You can use F5® Herculon™ SSL Orchestrator™ statistics to view and analyze bytes in and bytes out for
your clients and servers, as well as view the hit count over a determined range of time.
1. On the Main tab, click SSL Orchestrator > Analytics > Statistics to view the default charts, on the
left, and dimensions, such as Client Cipher Names, Virtual Servers, and Actions, on the right. The
default time for collecting data is set to show statistics gathered over the last hour.
The Statistics screen opens.
2. To decrease the time range that is being analyzed, adjust the sliders on the timeline at the top of the
screen.
The data found in the charts and tables will adjust based on the new time range specified.
3. To increase the time range that is being analyzed, click Last Hour list and select a time range from
the list.
4. To focus on specific members of a dimension, click the name of a dimension, on the right, to expand
its details and select the members that interest you.
For example, you might click Servers and select one or more servers from the table that displays.
Comparing statistics on the top virtual servers
You can use F5® Herculon™ SSL Orchestrator™ statistics to compare hit count, duration, and hit count per
second information across your virtual servers in customized charts that graphically display the results.
50
1. On the Main tab, click SSL Orchestrator > Analytics > Statistics to view the default charts, on the
left, and dimensions, such as Client Cipher Names, Virtual Servers, and Actions, on the right. The
default time for collecting data is set to show statistics gathered over the last hour.
The Statistics screen opens.
2. On the right, expand the Virtual Servers dimension.
By default, the virtual servers are sorted with the busiest at the top.
3. Select two or more virtual servers, then right-click and select Add Comparison Chart.
A new chart displays above the default charts. By default, Hit Count is charted for the selected
virtual servers.
Page 51
4. To compare another statistic, in the chart legend click Hit Count and select a statistic.
For example, select Duration or Hit Count Per Second.
A line graph displays for the statistic you selected. The comparison chart remains available on your
screen as long as you keep your browser open.
5. To remove the comparison chart from the screen, click the X in the upper right corner of the chart.
Viewing the top sites bypassed
You can use F5® Herculon™ SSL Orchestrator™ statistics to view and analyze which servers bypass the
most SSL requests and perform no decryption.
1. On the Main tab, click SSL Orchestrator > Analytics > Statistics to view the default charts, on the
left, and dimensions, such as Client Cipher Names, Virtual Servers, and Actions, on the right. The
default time for collecting data is set to show statistics gathered over the last hour.
The Statistics screen opens.
2. On the right, expand the Actions and Servers dimensions.
Data for the dimensions display in tables. By default, those with the greatest hit count display at the
top.
3. Rearrange the screen to display more columns of data in the tables:
F5 Herculon SSL Orchestrator: Setup
•
To switch to a table-only view, click the icon.
•
To change the widths of the tables and the charts across the display, drag and drop the
4. In Actions, select Bypassed.
5. In Servers, the servers on which SSL bypass has occurred the most frequently are at the top of the
list.
Viewing the top sites decrypted
You can use F5® Herculon™ SSL Orchestrator™ statistics to view and anaylze which servers decrypted
the most SSL requests.
1. On the Main tab, click SSL Orchestrator > Analytics > Statistics to view the default charts, on the
left, and dimensions, such as Client Cipher Names, Virtual Servers, and Actions, on the right. The
default time for collecting data is set to show statistics gathered over the last hour.
The Statistics screen opens.
2. On the right, expand the Actions and Servers dimensions.
Data for the dimensions display in tables. By default, those with the greatest hit count display at the
top.
3. Rearrange the screen to display more columns of date in the tables:
•
To switch to a table-only view, click the icon.
•To change the widths of the tables and the charts across the display, drag and drop the icon as
necessary.
4. In Actions, select Intercepted.
5. In Servers, the servers on which decryption has occurred the most frequently are at the top of the
table.
icon.
51
Page 52
Using Herculon SSL Orchestrator Analytics
Viewing the most used client ciphers and protocols
You can use F5® Herculon™ SSL Orchestrator™ statistics to view and analyze which client ciphers and
protocols are used the most. The customizable charts, which graphically display the results, enable you to
flexibly choose the information you want to view based on specified ranges of time that you select and
can easily adjust.
1. On the Main tab, click SSL Orchestrator > Analytics > Statistics to view the default charts, on the
left, and dimensions, such as Client Cipher Names, Virtual Servers, and Actions, on the right. The
default time for collecting data is set to show statistics gathered over the last hour.
The Statistics screen opens.
2. On the right, expand Client Cipher Names and Client Cipher Versions.
Data for the dimensions display in tables. By default, those with the greatest hit count display at the
top.
3. To view data for the top cipher, from Client Cipher Names, select the top record.
Charts update to display data for the selected cipher only. Client Cipher Versions displays only the
protocols used by the selected cipher.
4. To view data for the top ten ciphers, from Client Cipher Names select the top ten records.
Finding where the top server ciphers and protocols are used
You can use F5® Herculon™ SSL Orchestrator™ statistics to view and analyze which server ciphers and
protocols are used the most and locate where they are used. The customizable charts, which graphically
display the results, enable you to flexibly choose the information you want to view based on specified
ranges of time that you select and can easily adjust.
1. On the Main tab, click SSL Orchestrator > Analytics > Statistics to view the default charts, on the
left, and dimensions, such as Client Cipher Names, Virtual Servers, and Actions, on the right. The
default time for collecting data is set to show statistics gathered over the last hour.
The Statistics screen opens.
2. On the right, expand the Server Cipher Names and Server Cipher Versions dimensions.
Data for the dimensions display in tables. By default, those with the greatest hit count display at the
top.
3. To view data for the top cipher, from Server Cipher Names, select the top record.
Charts update to display data for the selected cipher only. Server Cipher Versions displays only the
protocols used by the selected cipher.
4. To view data for the top ten ciphers, from Server Cipher Names select the top ten records.
5. To view the servers and virtual servers involved in the transactions, on the right expand Servers and
Virtual Servers.
The tables display only the servers and virtual servers where the cipher and protocol were used.
Scheduling reports to be sent
52
Before you can schedule reports to be sent, you need to configure SMTP on the system, and have the
email addresses of the people to whom you want to send the reports.
You can schedule specific Analytics reports to be sent to one of more email addresses periodically. The
reports that are available depend on the modules installed on your system, and how the system is
configured. In the schedule, you specify the information to include in the report. For example, if you are
a network administrator, you could schedule reports about DNS packets. Resource administrators can
Page 53
F5 Herculon SSL Orchestrator: Setup
send reports so they can track CPU, disk, and memory utilization, and other system statistics. Many other
reports are available that you can schedule to be sent regularly.
Select the information to include in the report.
1. On the Main tab, click SSL Orchestrator > Analytics > Scheduled Reports.
The Scheduled Reports screen opens.
Note: If SMTP is not configured, you receive a message with a link. Click the link to set up SMTP
before proceeding.
2. On the far right, click Create.
The New Reporting Schedule screen opens.
3. In the Name field, type a name for the report schedule.
4. In the Send To (E-Mails) setting, type an email address where you want to send the report, and click
Add.
Add as many email addresses as you need to.
5. From the SMTP Configuration list, select the configuration that you want to use.
If no configurations are available, click Create to add one.
6. From the Reporting Module list, select the type of report you want to send.
The types of reports listed depend on which modules you have provisioned on your system.
7. In the Chart setting, specify what you want to include in the report. Criteria and measures that you
can specify vary for the different types of reports.
a) In the Filter setting, from the lists, select the time period and number of results to show.
b) In the Chart Path, select the top reporting criteria, then select the measures to include in the
report.
The criteria and measures differ depending on which Reporting Module you select.
c) From the Available measures, select the ones to include in the report and move them to Selected
measures.
d) To drill down and include more specific report criteria, click +, then from the Use top result list,
select another option.
e) To include an average of all the statistics and the specific ones, select the Include Overall check
box below the measures.
8. For Mail Frequency, select how often, the date to start, and the time to send the reports.
9. Click Finished.
The report schedule is added to the list. The specified report is sent by email to the addresses as
scheduled. Or, select the schedule and click Send Now to test sending it right away. The report is
attached to the email as a PDF. You can check the status in the list to see if the report was sent
successfully.
F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5
assumes no responsibility for the use of this information, nor any infringement of patents or other rights
of third parties which may result from its use. No license is granted by implication or otherwise under
any patent, copyright, or other intellectual property right of F5 except as specifically described by
applicable user licenses. F5 reserves the right to change specifications at any time without notice.
Trademarks
For a current list of F5 trademarks and service marks, see http://www.f5.com/about/guidelines-policies/
trademarks.
All other product and company names herein may be trademarks of their respective owners.
Patents
This product may be protected by one or more patents indicated at: https://f5.com/about-us/policies/
patents.
Link Controller Availability
This product is not currently available in the U.S.
Export Regulation Notice
This product may include cryptographic software. Under the Export Administration Act, the United
States government may consider it a criminal offense to export this product from the United States.
RF Interference Warning
This is a Class A product. In a domestic environment this product may cause radio interference, in which
case the user may be required to take adequate measures.
FCC Compliance
This equipment has been tested and found to comply with the limits for a Class A digital device pursuant
to Part 15 of FCC rules. These limits are designed to provide reasonable protection against harmful
interference when the equipment is operated in a commercial environment. This unit generates, uses, and
can radiate radio frequency energy and, if not installed and used in accordance with the instruction
manual, may cause harmful interference to radio communications. Operation of this equipment in a
Page 56
Legal Notices
residential area is likely to cause harmful interference, in which case the user, at his own expense, will be
required to take whatever measures may be required to correct the interference.
Any modifications to this device, unless expressly approved by the manufacturer, can void the user's
authority to operate this equipment under part 15 of the FCC rules.
Canadian Regulatory Compliance
This Class A digital apparatus complies with Canadian ICES-003.
Standards Compliance
This product conforms to the IEC, European Union, ANSI/UL and Canadian CSA standards applicable to
Information Technology products at the time of manufacture.
56
Page 57
Index
Index
A
analytics
about Herculon SSL Orchestrator 47
analytics charts
about 48
customizing 49
analytics scheduled reports
about 52
analytics tables
about 49
customizing 49
analytics timeline
about 48
application status
deployed 12
error 12
B
basic configuration
about 13
bytes in
charting 50
bytes out
charting 50
C
charts
customizing in analytics 49
in analytics 48
classifier rules
about 27
configurations
exporting 36
importing new 35
importing past 36
D
dashboard
for analytics 47
for Herculon SSL Orchestrator 47
for statistical analysis 47
dashboard capabilities
for analytics 47
deployment
exporting configurations 36
importing new configurations 35
importing past configurations 36
setting up a basic configuration for 44
deployment errors
diagnosing 12
viewing details 12
device group
creating for sync-failover 43
device group (continued)
synchronizing 43
device trust
implementing 42
diagnostics 12
E
egress device
configuring 16, 20
configuring on system with ingress device 16
on one system 16
error logs
high availability 45
explicit proxies
configuring 24
explicit proxy
configuring 23
exporting
configurations for deployment 35
exporting configurations
about 35
G
general properties
configuring 13
H
Herculon SSL Orchestrator
deleting 11
modifying 11
overview 5
overview of configuring 9
using for initial setup 9
high availability
about 39
and deployment verification 44
and device management 42
and device trust 42
and local trust domain 42
configuration utility version 39
configuring ConfigSync 42
configuring failover IP address 42
creating a device group 43
creating sync-failover 43
doing manual sync 43
fixing deployment 44
for deployment 44
overview 39
prerequisites 40
recovery steps 45
redeploying 45
RPM file version 45
self IPs 41
setting up a basic configuration 44
57
Page 58
Index
high availability (continued)
synchronizing the device group 43
task summary for deploying 40
viewing logs for failures 44
VLANs 41
hit count over time
charting 50
I
ICAP services
creating 29
importing
new configurations for deployment 35
past configurations for deployment 35
importing configurations
about 35
ingress device
configuring 16, 18
configuring on system with egress device 16
on one system 16
initial setup
of SSL Orchestrator 9
inline services
creating 27
L
local trust domain
adding a device 42
logging
configuring 15
service chain classifier (continued)
rule 33
UDP 33
service chains
about 27
configuring 30
services
about 27
sites bypassed
viewing 51
sites decrypted
viewing 51
SSL Orchestrator
overview 5
sync-failover
creating a device group 43
system configuration
overview 9
T
tables
customizing in analytics 49
in analytics 49
timeline capabilities
about 48
customizing 48
timeline sliders 48
transparent and explicit proxies
configuring 24
transparent proxy
configuring 23
M
most used client ciphers
viewing 52
most used client protocols
viewing 52
R
receive-only services
configuring 30
RPM file
installing update 41
rules
creating for TCP 31
S
scheduled reports
in analytics 52
server ciphers used
finding 52
server protocols used
finding 52
service chain classifier
creating 33
creating for TCP 31
creating rules 31
U
updated RPM file
installing 41
V
virtual servers statistics
comparing 50
58
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.