Manual Chapter :
BIG-IP Edge Client for Windows
Applies To:
Show VersionsBIG-IP APM
- 17.1.0, 17.0.0, 16.1.5, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0, 16.0.1, 16.0.0, 15.1.10, 15.1.9, 15.1.8, 15.1.7, 15.1.6, 15.1.5, 15.1.4, 15.1.3, 15.1.2, 15.1.1, 15.1.0, 15.0.1, 15.0.0, 14.1.5, 14.1.4, 14.1.3, 14.1.2, 14.1.0, 14.0.1, 14.0.0, 13.1.5, 13.1.4, 13.1.3, 13.1.1, 13.1.0
BIG-IP Edge Client for Windows
About Component
Installer
The Component Installer service enables you to install and upgrade
client-side Access Policy Manager (APM) components on Windows-based clients for all kinds of user
accounts, regardless of the rights under which the user is working. This component is especially
useful for installing and upgrading client-side components when the user has insufficient rights
to install or upgrade the components directly.
After you install the Component Installer, it automatically installs and
upgrades client-side APM components. It can also update itself. The Component Installer requires
that installation or upgrade packages be signed using the F5 Networks certificate or another trusted certificate. By default, F5 Networks signs all
components using the F5 Networks certificate.
Downloading and installing the Component Installer
You can pre-install client components for your users who do not have administrative
privileges on Windows-based systems.
- On the Main screen, click the F5 logo to display the Welcome page.
- Scroll to the Downloads area.
- In the links for BIG-IP Edge Client Components, clickComponent Installer Package for Windows.The MSI installer downloads to your local folder.
- On Windows-based clients, install the Component Installer with elevated privileges so that it can install, upgrade, and run APM components that require elevated privileges.For information about configuring the MSI installer to run with elevated privileges, see the documentation for your operating system.
Overview: Configuring and installing Edge Client for Windows
Users of BIG-IP Edge Client for Windows can connect securely and automatically
to your network while roaming using the automatic reconnect, password caching, and location
awareness features of Edge Client. You can also enforce Always Connected mode, and
configure the list of trusted sites to which to allow access. You can customize the client
package and you must download it and make it available to users as hosted content on the
BIG-IP system or through another delivery mechanism. Users must install the package, or
Component Installer, if available on the client, can install it for them.
About Machine Cert
Auth and user privilege
A Machine Cert Auth check requires administrative privilege. The Windows
client package associated with a connectivity profile can be configured to include a Machine
Certificate Checker Service component. The service can check the machine certificate on a client
endpoint even when the user does not have admin privilege. The option to include this component
in the package is disabled by default.
About Edge Client
location awareness
The BIG-IP Edge Client provides a location-awareness feature. Using
location awareness, the client connects automatically only when it is not on a specified
network. The administrator specifies the networks that are considered in-network, by adding
DNS suffixes to the connectivity profile. With a location-aware client enabled, a user with
a corporate laptop can go from a corporate office, with a secured wireless or wired network
connection, to an offsite location with a public wireless network connection, and maintain
a seamless connection to allowed corporate resources. Network location-awareness can be
triggered to run because of various reasons, such as IP changes and network interfaces
starting up or shutting down. In reconnect mode, Edge Client might briefly establish a VPN
tunnel before the network location-awareness feature can disconnect it. The Edge Client
matches DNS suffixes reported by the system API to detect network location.
During a network
switch, such as changing Wifi connections, Edge Client with network location-awareness must
detect whether the new connection is local or remote. During this detection timeframe,
there is a brief amount of time that Edge Client does not block certain external websites
and can be reachable during the network switch.
About Edge Client
automatic reconnection
BIG-IP Edge Client provides an automatic reconnection feature.
This feature attempts to automatically reconnect the client system to corporate network
resources whenever the client connection drops or ends prematurely.
About Always Connected
mode
BIG-IP®Edge Client® provides Always Connected mode. This feature allows
you to specify that the client is always connected to the VPN, and allows you to configure the
behavior when the client is not connected. You can specify whether the client is connected
automatically after Windows logon, and configure exclusion addresses.
Configuring a
connectivity profile for Edge Client for Windows
Update the connectivity profile in your Network
Access configuration to configure security settings, servers, and location-awareness for
BIG-IP Edge Client for Windows.
- On the Main tab, click.A list of connectivity profiles displays.
- Select the connectivity profile that you want to update and clickEdit Profile.The Edit Connectivity Profile popup screen opens and displays General Settings.
- From the left pane of the popup screen, selectWin/Mac Edge Client.Edge Client settings for Mac and Windows-based systems display in the right pane.
- Set Edge Client action settings:
- Retain the default (selected) or clear theSave Servers Upon Exitcheck box.Specifies whether Edge Client maintains a list of recently used user-entered APM servers. Edge Client always lists the servers that are defined in the connectivity profile, and sorts them by most recent access, whether this option is selected or not.
- To enable the client to try to use the Windows logon session for an APM session also, select theReuse Windows Logon Sessioncheck box.This is cleared by default.
- To enable the client to try to use the credentials that they typed for Windows logon in an APM session also, select theReuse Windows Logon Credentialscheck box.This is cleared by default.To support this option, you must also include theUser Logon Credentials Access Servicein the Windows client package for this connectivity profile and you must ensure that the access policy includes an uncustomizedLogon Pageaction.
- To enable the client to launch an administrator-defined script on session termination, select theRun session log off scriptcheck box. The administrator specifies parameters which are passed by Edge Client to the script file. These parameters are defined by the session variablesession.edgeclient.scripting.logoff.params. The client retrieves parameters from BIG-IP after session establishment. The administrator has the flexibility to set up variable values according to policy branching. Each time the Edge Client closes an APM session, the configured script is invoked. On Windows, the script is located atC:\Program Files\F5 VPN\scripts\onSessionTermination.bat.TheRun session log off scriptcheck box is cleared by default.
- To enable the client to display a warning before launching the pre-defined script on session termination, selectShow warning to user before launching scriptcheck box.This is selected by default.
- To support automatic reconnection without the need to provide credentials again, allow password caching.
- Select theAllow Password Cachingcheck box.This check box is cleared by default.The remaining settings on the screen become available.
- To require device authentication to unlock the saved password, selectRequire Device Authentication.This option links the option to use a saved password to a device authentication method. Supported device authentication methods include PIN, passphrase, and biometric (fingerprint) authentication on iOS and Android. Android devices also support pattern unlocking.
- From theSave Password Methodlist, selectdiskormemory.If you selectdisk, Edge Client caches the user's password (in encrypted form) securely on the disk where it is persisted even after the system is restarted or Edge Client is restarted.If you selectmemory, Edge Client caches the user's password within the BIG-IP Edge Client application for automatic reconnection purposes.If you selectmemory, thePassword Cache Expiration (minutes)field displays with a default value of 240.
- If thePassword Cache Expiration (minutes)field displays, retain the default value or type the number of minutes to save the password in memory.
- To enable automatic download and update of client packages, from theComponent Updatelist, selectyes(default).If you selectyes, APM updates Edge Client software automatically on the client system when newer versions are available. This option applies to updates for theses components only: BIG-IP Edge Client, component installer service, DNS relay proxy service, and user logon credentials access service.
- Specify DNS suffixes that are considered to be in the local network.Providing a list of DNS suffixes for the download package enables Edge Client to support the autoconnect option. WithAuto-Connectselected, Edge Client uses the DNS suffixes to automatically connect when a client is not on the local network (not on the list) and automatically disconnect when the client is on the local network.
- From the left pane of the popup screen, selectLocation DNS List.Location DNS list information is displayed in the right pane.
- ClickAdd.An update row becomes available.
- Type a name and clickUpdate.Type a DNS suffix that conforms to the rules specified for the local network.The new row displays at the top of the table.
- Continue to add DNS names and when you are done, clickOK.
- ClickOK.The popup screen closes, and the Connectivity Profile List displays.
Configuring Always
Connected mode for the Windows Edge Client
Update the connectivity profile in your Network
Access configuration to configure Always Connected mode.
- On the Main tab, click.
- Select the connectivity profile that you want to update and clickEdit Profile.The Edit Connectivity Profile popup screen opens and displays General Settings.
- From the left pane of the popup screen, selectWin/Mac Edge Client.Edge Client settings for Mac and Windows-based systems display in the right pane.
- Set Edge Client action settings:
- Retain the default (selected) or clear theSave Servers Upon Exitcheck box.Specifies whether Edge Client maintains a list of recently used user-entered APM servers. Edge Client always lists the servers that are defined in the connectivity profile, and sorts them by most recent access, whether this option is selected or not.
- To enable the client to try to use the Windows logon session for an APM session also, select theReuse Windows Logon Sessioncheck box.This is cleared by default.
- To enable the client to try to use the credentials that they typed for Windows logon in an APM session also, select theReuse Windows Logon Credentialscheck box.This is cleared by default.To support this option, you must also include theUser Logon Credentials Access Servicein the Windows client package for this connectivity profile and you must ensure that the access policy includes an uncustomizedLogon Pageaction.
- To support automatic reconnection without the need to provide credentials again, allow password caching.
- Select theAllow Password Cachingcheck box.This check box is cleared by default.The remaining settings on the screen become available.
- To require device authentication to unlock the saved password, selectRequire Device Authentication.This option links the option to use a saved password to a device authentication method. Supported device authentication methods include PIN, passphrase, and biometric (fingerprint) authentication on iOS and Android. Android devices also support pattern unlocking.
- From theSave Password Methodlist, selectdiskormemory.If you selectdisk, Edge Client caches the user's password (in encrypted form) securely on the disk where it is persisted even after the system is restarted or Edge Client is restarted.If you selectmemory, Edge Client caches the user's password within the BIG-IP Edge Client application for automatic reconnection purposes.If you selectmemory, thePassword Cache Expiration (minutes)field displays with a default value of 240.
- If thePassword Cache Expiration (minutes)field displays, retain the default value or type the number of minutes to save the password in memory.
- To enable automatic download and update of client packages, from theComponent Updatelist, selectyes(default).If you selectyes, APM updates Edge Client software automatically on the client system when newer versions are available. This option applies to updates for theses components only: BIG-IP Edge Client, component installer service, DNS relay proxy service, and user logon credentials access service.
- Specify DNS suffixes that are considered to be in the local network.Providing a list of DNS suffixes for the download package enables Edge Client to support the autoconnect option. WithAuto-Connectselected, Edge Client uses the DNS suffixes to automatically connect when a client is not on the local network (not on the list) and automatically disconnect when the client is on the local network.
- From the left pane of the popup screen, selectLocation DNS List.Location DNS list information is displayed in the right pane.
- ClickAdd.An update row becomes available.
- Type a name and clickUpdate.Type a DNS suffix that conforms to the rules specified for the local network.The new row displays at the top of the table.
- Continue to add DNS names and when you are done, clickOK.
- ClickOK.The popup screen closes, and the Connectivity Profile List displays.
Customizing a downloadable client package for Windows
Customize a Windows client package to specify the
client components to install, and to customize settings for BIG-IP Edge Client and
Dialup Settings components if you include them.
- On the Main tab, click.A list of connectivity profiles displays.
- Select a connectivity profile.
- Click theCustomize Packagebutton.The Customize Windows Client Package popup screen displays with Available Components displayed.
- Make sure that only the components that you want to include in the package are selected.
- To include the software service that allows the client to store encrypted Windows logon credentials and use those credentials to log on to APM, select theUser Logon Credentials Access Servicecheck box.For clients to use the service, you must also select theReuse Windows Logon Credentialscheck box in the connectivity profile.
- To include a service that can check the machine certificate on a client endpoint even when the user does not have admin privilege, select theMachine Certificate Checker Servicecheck box.Without this service, a user running without admin privilege cannot pass the Machine Cert Auth endpoint security check.
- If theBIG-IP Edge Clientcheck box is selected, from the left pane selectBIG-IP Edge Client.BIG-IP Edge Client settings display in the right pane.
- To enable the Edge Client to try to connect to VPN right after the user logs on to Windows and to prohibit the user from disconnecting VPN, select theEnable always connected modecheck box. This setting is cleared by default.
- Specify the traffic flow for this feature when the VPN is disconnected.
- SelectAllowto allow all traffic when the VPN is disconnected.
- SelectAllow-Only-In-Enterprise-LANto allow LAN traffic only when the VPN is disconnected.
- SelectBlockto deny all traffic when the VPN is disconnected.
- To add the virtual servers that are defined in the Windows/Mac Edge Client settings of the connectivity profile to the Windows Trusted sites list the first time the client starts, retain selection of theAdd virtual server to trusted sites listcheck box. Otherwise, clear it.Virtual servers added to the Trusted sites list with this option remain on the trusted sites list indefinitely. This works with theUser Logon Credentials Access Servicesetting (available on the Available Components screen) to provide seamless logon with Edge Client if APM accepts the same credentials that users use to log on to Windows.
- To automatically start the Edge Client after the user logs on to Windows, retain selection of theAuto launch after Windows Logoncheck box. Otherwise, clear it.
- To add sites to the Exclusions list to be excluded from the traffic flow options action, clickAdd, and add the IP address or FQDN. You can add a total of 10 values to the whitelist. However this list can be extended on client side using the registry editor or group policy.When you specify the port after the host name (for both IPv4 or DNS names), then access will be granted only to specified ports for both TCP and UDP protocols as well as for ICMP. When the port is not specified, then full access is granted to a remote host.
- To customize Dialup Settings (if selected on the Available Components screen), from the left pane selectDialup Settings.Dialup Entry / Windows Logon Integration settings display in the right pane.
- WithDialup Settingsselected, you can specify how you want the user to authenticate to APM.Users must always type a user name and password to log on to Windows. Subsequently, clients authenticate to APM.
- If you want the access policy to run and display a screen where the user must clickLogon, select theEnforce Access Policy in Custom Dialercheck box and clear thePrompt Username and Passwordcheck box. (With these settings, username and password fields are prefilled and the access policy runs.)
- If you want the user to view a logon prompt and clickConnect, clear theEnforce Access Policy in Custom Dialercheck box and select thePrompt Username and Passwordcheck box. (With these settings, username and password fields are prefilled and the access policy does not run.)
- If you do not want the user to do anything to authenticate to APM, clear theEnforce Access Policy in Custom DialerandPrompt Username and Passwordcheck boxes. (With these settings, the access policy does not run and the logon prompt is suppressed.)
- ClickDownload.The screen closes and the package,BIGIPEdgeClient.exe, downloads.
The customized package,
BIGIPEdgeClient.exe
, is downloaded to your client. It is available for
you to distribute. About exclusion list modification
The exclusion addresses are stored as registry keys, and not values in the
registry in
HKLM\SOFTWARE\WOW6432Node\F5
Networks\RemoteAccess\AlwaysConnected\Exclusions
key. Any values in the key are
ignored. You may manually add, edit or remove values under this key using the registry editor or
group policy mechanisms. The always-connected service reads those values on start, restart and on
network events.The traffic to the exclusion list is never blocked until the VPN is
established, so you can whitelist known identity providers (IdPs) and other sites that are deemed
harmless, which improves the usability of locked client mode. After VPN establishment, the client
behaves according to the Network Access resource configuration.
Downloading the client package for Windows
You can download a Windows client package and distribute it to clients.
- On the Main tab, click.A list of connectivity profiles displays.
- Select a connectivity profile.
- Click theCustomize Packagebutton.The Customize Windows Client Package popup screen displays with Available Components displayed.
- ClickDownload.The screen closes and the package,BIGIPEdgeClient.exe, downloads.
The customized package,
BIGIPEdgeClient.exe
, is downloaded to
your client. It is available for you to distribute. Users must install the package, or,
if Component Installer is available on the client, it can install the package for the
user. About Network Access
features for Windows-based clients
Access Policy Manager® (APM®) supports all Network Access features with BIG-IP®
Edge Client® for Windows. For a complete list of
Network Access features, refer to
BIG-IP®
Access Policy Manager®: Network Access
on
AskF5™ at http://support.f5.com/
. For notes about
endpoint security features, refer to BIG-IP®
APM® Client Compatibility Matrix
on AskF5™ at http://support.f5.com/
. About connection
options on Edge Client for Windows
BIG-IP®
Edge Client® for Windows user interface displays these
connection options.
- Auto-Connect
- Starts a secure access connection as it is needed. This option uses the DNS suffix information defined in the connectivity profile to determine when the computer is on a defined local network. When the computer is not on a defined local network, the secure access connection starts. When the computer is on a local network, the client disconnects, but remains active in the system tray. This option does not display if DNS suffixes were not defined.
- Connect
- Starts and maintains a secure access connection at all times, regardless of the network location.
- Disconnect
- Stops an active secure access connection, and prevents the client from connecting again until a user clicksConnectorAuto-Connect.
About browser-based connections from Linux, Mac, and Windows clients
For Linux, Mac OS X, and Windows-based systems, the Network Access client component is
available for automatic download from the BIG-IP® system.
The client component supports secure remote web-based access to the network. It
is not the same as the customizable client package that is associated with the connectivity
profile.
The first time a remote user starts Network Access, APM® downloads a
client component. This client component is designed to be self-installing and self-configuring.
If the browser does not meet certain requirements, APM prompts the user to download the client
component and install it manually.
About machine tunnels for Windows
Machine Tunnels are a new Desktop Client feature for Windows only. When installed on
client machines as a Windows Service, a machine tunnel starts during the machine boot
sequence, and establishes a VPN connection to the specified APM servers in background.
No user interaction or interactive Windows session is required. This can be used for
several different scenarios.
- Off-premise or remote initial provisioning: Machine tunnels can provide connectivity to the corporate datacenter when the user logs in to a corporate laptop for the very first time.
- Remote computer maintenance: IT staff can manage the machine and update software when the user is not logged in, but the device is on and idle.
- Remote troubleshooting: Support Staff are able to log into a user machine via a secure tunnel.
- Remote self-service: When users forget their passwords, IT staff can use machine tunnels to reset the user passwords.
About machine tunnels and proxy servers
Machine Tunnel works as a privileged, non-interactive process under
the LocalSystem account and does not support BIG-IP proxy configuration. Machine Tunnels
ignore proxy settings configured in APM network access resource and do not use Local
Area Network (LAN) proxy settings on the client, instead, the machine tunnel leaves its
per-VPN connection proxy settings empty.
If the network access resource has a network route to 0.0.0.0 and the
VPN is connected, Windows tries to apply proxy settings from this connection. Because
the connection does not have proxy settings, Windows applies empty proxy settings. If
the network access resource does not have a route to 0.0.0.0, Windows does not override
the system's proxy settings.
Windows has separate proxy settings for the LAN adapter and each
Dial-Up/VPN connection. It uses the proxy settings from the active internet connection
which can be either LAN or a Dial-Up/VPN type. When Machine Tunnels are connected with
the default full tunnel (0.0.0.0) routing, it is the Active Internet Connection, and
Windows uses its empty proxy settings. This results in an effective configuration
without proxy regardless of the current LAN settings.
To resolve this issue, split the VPN tunnel resource into multiple
subnets. As a result, the machine tunnel VPN client does not create any 0.0.0.0 route.
For example:
1.0.0.0/255.0.0.0
2.0.0.0/254.0.0.0
4.0.0.0/252.0.0.0
8.0.0.0/248.0.0.0
16.0.0.0/240.0.0.0
32.0.0.0/224.0.0.0
64.0.0.0/192.0.0.0
128.0.0.0/128.0.0.0
After this routing change, Windows does not consider the machine
tunnel VPN as the primary internet connection and uses the LAN proxy settings regardless
of the VPN connection status.
About desktop client interactions with machine tunnels
The service establishes a machine tunnel connection on system boot. Once a user logs in to her machine, the user can establish a new VPN connection with the desktop client.
A manual client VPN connection overrides the machine tunnel, effectively putting the machine tunnel connection "on hold".
The machine tunnel VPN connection pauses, until one of the following events occurs:
- The user explicitly disconnects from the user-initiated VPN session.
- The user logs out of Windows.
- The user-initiated VPN session times out.
- The user's VPN client is stopped, or the client crashes.
Once one of the interactions above occurs, the machine tunnel connection is resumed.
About creating the machine tunnel installer package
Edge Client 7.1.7 and later supports the ability
to create a VPN based on machine credentials with BIG-IP versions 13.1 and above.
However, the ability to create a Machine Tunnel installer package through the
utility is available for BIG-IP 14.x and above. For BIG-IP 13.x and
earlier versions, you must set up the installer package manually and use the Powershell
script to build the machine tunnel package. PowerShell script to create the machine tunnel installer
This script can be used to create the machine tunnel
installer on Windows.
PowerShell script createMachineTunnelsPkg.ps1
param([Parameter(Mandatory=$true)][string] $client_iso) $MountResult = Mount-DiskImage -ImagePath $client_iso -PassThru $mountdrive = ($MountResult | Get-Volume).DriveLetter $tempDirectoryBase = [System.IO.Path]::GetTempPath(); Do { $newTempDirPath = [String]::Empty; [string] $name = [System.Guid]::NewGuid(); $newTempDirPath = (Join-Path $tempDirectoryBase $name); } While (Test-Path $newTempDirPath); New-Item -ItemType Directory -Path $newTempDirPath; $setupConfig = @" <?xml version="1.0" encoding="UTF-8"?> <CLIENT_CONFIGURATOR> <SETUP_CONFIGURATION> <PRODUCTNAME>BIG-IP Edge Client (TM) package</PRODUCTNAME> <DATABASE>f5fpclients.msi</DATABASE> <MINIMUM_MSI>150</MINIMUM_MSI> <PROPERTIES>STARTAPPWITHWINDOWS=1</PROPERTIES> <OPERATION>INSTALLUPD</OPERATION> </SETUP_CONFIGURATION> <FEATURES> <FEATURE>MachineTunnelService</FEATURE> <FEATURE>PortRedirector</FEATURE> </FEATURES> <STONEWALL_EXCLUSIONS> </STONEWALL_EXCLUSIONS> </CLIENT_CONFIGURATOR> "@ $setupConfig | Add-Content (-join ($newTempDirPath, "\_setup_configuration_.f5c")); Copy-Item -Path (-join ($mountdrive, ":\sam\www\webtop\public\download\f5fpclients.msi")) -Destination (-join ($newTempDirPath, "\f5fpclients.msi")); $F5_VPNPath = (Join-Path $newTempDirPath "F5 VPN"); $amd64Path = (Join-Path $F5_VPNPath "amd64"); $F5_TMPPath = (Join-Path $F5_VPNPath "F5_TMP"); New-Item -ItemType Directory -Path $F5_VPNPath; New-Item -ItemType Directory -Path $amd64Path; New-Item -ItemType Directory -Path $F5_TMPPath; Copy-Item -Path (-join ($mountdrive, ":\sam\www\webtop\public\download\F5MachineTunnelService.exe")) -Destination (-join ($F5_VPNPath, "\F5MachineTunnelService.exe")); Copy-Item -Path (-join ($mountdrive, ":\sam\www\webtop\public\download\scew_uls.dll")) -Destination (-join ($F5_VPNPath, "\scew_uls.dll")); Copy-Item -Path (-join ($mountdrive, ":\sam\www\webtop\public\download\F5MachineTunnelInfo.exe")) -Destination (-join ($F5_VPNPath, "\F5MachineTunnelInfo.exe")); Copy-Item -Path (-join ($mountdrive, ":\sam\www\webtop\public\download\F5FltSrv.exe")) -Destination (-join ($F5_VPNPath, "\F5FltSrv.exe")); Copy-Item -Path (-join ($mountdrive, ":\sam\www\webtop\public\download\F5FltDrv.sys")) -Destination (-join ($F5_VPNPath, "\F5FltDrv.sys")); Copy-Item -Path (-join ($mountdrive, ":\sam\www\webtop\public\download\F5FltSrvAMD64.exe")) -Destination (-join ($amd64Path, "\F5FltSrv.exe")); Copy-Item -Path (-join ($mountdrive, ":\sam\www\webtop\public\download\F5FltDrvAMD64.sys")) -Destination (-join ($amd64Path, "\F5FltDrv.sys")); Copy-Item -Path (-join ($mountdrive, ":\sam\www\webtop\public\download\urxvpn.cab")) -Destination (-join ($F5_TMPPath, "\urxvpn.cab")); Set-Location $newTempDirPath; $pkgPath = (Join-Path $tempDirectoryBase "MachineTunnelsSetup.exe") zip -r (-join ($newTempDirPath, ".zip")) "F5 VPN" _setup_configuration_.f5c f5fpclients.msi gc (-join ($mountdrive, ":\sam\www\webtop\public\download\setupstub.exe")),(-join ($newTempDirPath, ".zip")) -Enc Byte -Read 512 | sc $pkgPath -Enc Byte
Create the machine tunnel install package
Following are the prerequisites for creating
an installer package on BIG-IP versions that do not include the machine tunnel
installer:
Use these steps to manually create the installer package.
- Desktop APM Clients ISO 7.1.7 or later, available from downloads.f5.com.
- GNU win32 zip package, installed and available in the path. Get this package from http://gnuwin32.sourceforge.net/downlinks/zip.php.
- A PowerShell script,createMachineTunnelsPgk.ps1, used to create machine tunnels. This script is included for reference. Download or create the PowerShell script to a user temp directory.
- Administrator privileges on a Windows 10 machine.
- Windows PowerShell with an unrestricted execution policy. If not already configured, you can set the unrestricted execution policy for PowerShell by starting power shell as an administrator, and executing the following command at the PowerShell prompt:set-executionpolicy unrestricted
- Open a PowerShell window.
- Run the PowerShell scriptcreateMachineTunnelsPkg.ps1, with the path to the APM Desktop client 7.1.7 ISO as the parameter.C:\users\example_user\temp\createMachineTunnelsPkg.ps1 c:\Users\example_user\Downloads\apmclients-7166.2018.307.1909-2552.0.isoThe installer package is created and made available under the temp directory, asMachineTunnelsSetup.exe.
You can use
MachineTunnelsSetup.exe
to install the
Machine Tunnels service on Windows 10 client machines.Apps installed for machine tunnel support
These apps are installed to support machine tunnels on
Windows.
App |
Location |
Description |
---|---|---|
f5MachineTunnelService.exe |
%WINDIR%\SysWOW64
(64-bit), %WINDIR%\System32 (32-bit) |
The machine tunnel srevice runs on the machine to provide machine tunnel
functionality. |
f5MachineTunnelInfo.exe |
%WINDIR%\SysWOW64 (64-bit), %WINDIR%\System32 (32-bit) |
The console application for the machine tunnel, which provides configuration
support and allows the user to get additional information about the
service. |
Registry keys for machine tunnel configuration
These registry keys control configuration for machine
tunnels on Windows.
VPN Servers (Required Parameter)
This key should be created in
HKLM\SYSTEM\CurrentControlSet\services\F5MachineTunnelService\Parameters\VPNServers
.Name |
Registry Type |
Type |
Description |
Default |
---|---|---|---|---|
Server0 |
REG_SZ |
URL |
The URL to which the VPN connects. Only one
VPN server URL is supported. For example, https://vpn.company.com/ . |
Connection Parameters (Optional)
These keys should be created in
HKLM\SYSTEM\CurrentControlSet\services\F5MachineTunnelService\Parameters
.
If the keys are not created, then the default values will be used for these
parameters.Name |
Registry Type |
Type |
Description |
Default |
---|---|---|---|---|
LogonAttemptsInterval |
REG_DWORD |
DWORD |
Maximum delay between logon attempts in seconds. |
30 |
IgnoreSSLErrors |
REG_DWORD |
DWORD |
Allows access to a virtual server without a valid certificate. You can add
this value for testing or debugging purposes. 1 - Ignore SSL errors and allow access to insecure
servers.0 , or any other
value - SSL errors are not ignored, and connections to insecure servers
fail. |
N/A |
Credential Parameters (Optional)
These keys should be created in
HKEY_USERS\<Service_account_SID>\Software\F5
Networks\MachineTunnelService
.Name |
Registry Type |
Type |
Description |
Default |
---|---|---|---|---|
username |
REG_SZ |
Base64 encoded binary data |
Base64 encoded encrypted user name for authentication (optional).
|
N/A |
password |
REG_SZ |
Base64 encoded binary data |
Base64 encoded encrypted password (optional)
|
N/A |
Configuring an access policy for machine tunnel support
Configure an access policy to detect the
machine tunnel client type.
- On the Main tab, click.The Access Profiles (Per-Session Policies) screen opens.
- Click the name of the access profile you want to edit.
- On the menu bar, clickAccess Policy.
- For theVisual Policy Editorsetting, click theEdit access policy for Profilelink.policy_nameThe visual policy editor opens the access policy in a separate window or tab.
- Click the(+)icon anywhere in the access policy to add a new item.Only an applicable subset of access policy items is available for selection in the visual policy editor for any access profile type.A popup screen opens, listing predefined actions on tabs such as General Purpose, Authentication, and so on.
- On the Endpoint Security (Server-Side) tab, selectClient Type, and then clickAdd Item.The Client Type action identifies clients and enables branching based on the client type.A properties screen opens.
- On the Machine Tunnel client branch, change the ending toAllowed.
- ClickSave.The Access Policy screen reopens.
- Set up the appropriate authentication and client-side checks required for application access at your company, and clickAdd Item.
- Change the Successful rule branch fromDenytoAllowand click theSavebutton.
- If needed, configure further actions on the successful and fallback rule branches of this access policy item, and save the changes.
- At the top of the screen, click theApply Access Policylink to apply and activate your changes to this access policy.
- Click theClosebutton to close the visual policy editor.
To apply this access policy to network
traffic, add the access profile to a virtual server.
To ensure that logging is configured to meet your
requirements, verify the log settings for the access profile.
Configuring a username and password for the machine tunnel
This task requires that the f5MachineTunnelInfo.exe is
installed on the client system on which you are configuring the machine tunnel.
Configure a username and password for the machine
tunnel connection. This is recommended only for testing purposes.You must run
f5MachineTunnelInfo.exe as an administrator.
- From a DOS command prompt in Windows, typef5MachineTunnelInfo -s -u <.username> -p <password>
The machine tunnel username and password is
set.
Defining the VPN server for the machine tunnel
This task requires that f5MachineTunnelInfo.exe is
installed on the client system on which you are configuring the machine tunnel. This
task requires admin access and the ability to edit the Windows Registry.
- Start the registry editor ().
- Navigate toHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\F5MachineTunnelService\Parameters\VPNServers.
- In the right pane, right-click and select.
- In theNamefield, typeServer0.
- Right-click the value and selectModify.The Edit String dialog opens.
- Type the VPN server FQDN or IP address and clickOK.
- Exit the Registry Editor.
The VPN server for the machine tunnel is now
defined.
Configuring client certificates for machine tunnel
authentication
This task requires that the f5MachineTunnelService is
installed on the client system on which you are configuring certificates.
Configure a client certificate for the f5 Machine
Tunnel Service.
- On a Windows client or administrative system, clickand typemmc, then clickOK.
- Clickand then clickAdd.
- UnderSnap-in, double-clickCertificates, clickService account, then clickNext.
- Do one of the following.
- To manage certificates for services on your local computer, clickLocal computer, and then clickNext.
- To manage certificates for a remote computer, clickAnother computerand type the name of the computer, or clickBrowseto select the computer name, and then clickNext.
- Click the service for which you are managing certificates. In this case this is the F5MachineTunnelService Personal store.
- ClickFinish, and then clickClose.Certificates - Service (f5MachineTunnelService) onappears on the list of selected snap-ins for the new console.Computer Name
- ClickOK.
- Click.
The machine tunnel service is associated with the certificate.
Generating a troubleshooting report from Edge Client for Windows
A troubleshooting report provides numerous details about the client and its
functioning, such as log files and their contents, components and versions, and so on.
- Open the BIG-IP Edge Client user interface.On a client with aStartbutton, you can typeBIG-IPin the search field and, in the results, clickBIG-IP Edge Client.
- Click theView Detailsbutton.The Details popup screen displays.
- Click theDiagnostics Reportbutton.A Save As popup screen opens.
- Select a location, specify a file name, and clickSave.A Collecting data popup screen remains open until the report completes.
- Navigate to the location with the downloaded file, extract the files to a folder, and click the HTML file in the folder.The F5 Report displays in a browser screen.
- Open the BIG-IP Edge Client user interface.On a client with aStartbutton, you can typeBIG-IPin the search field and, in the results, clickBIG-IP Edge Client.
- Click theView Detailsbutton.The Details popup screen displays.
- Click theDiagnostics Reportbutton.A Save As popup screen opens.
- Select a location, specify a file name, and clickSave.A Collecting data popup screen remains open until the report completes.
- Navigate to the location with the downloaded file, unzip it to a folder, and click the HTML file in the folder.The report displays.
Overview: Installing and using the client troubleshooting utility
Access Policy Manager® provides a client troubleshooting utility for
Windows-based systems. Users can access the utility to check the availability and version
information for Windows client components, and run Network Access diagnostic tests. The utility
is integrated into BIG-IP®
Edge Client® for Windows. To run Network Access diagnostics and
troubleshooting reports on clients that have only the browser-based Network Access client
component, you can download and install the client troubleshooting utility.
Task summary
Downloading the client troubleshooting utility
To run the client troubleshooting utility from the command line on a Windows-based
system, you must first download the utility from the BIG-IP
system.
- On the Main screen, click the F5 logo to display the Welcome page.
- Scroll to the Downloads area.
- In the links for BIG-IP Edge Client Components, clickClient Troubleshooting Utility for Windows.
The file
f5wininfo.exe
is saved to your local disk.Viewing client components in the client troubleshooting utility
You can use the client troubleshooting utility to view client components on
Windows-based systems.
- Double-clickf5wininfo.exeto start the client troubleshooting utility.The F5 BIG-IP Edge Components Troubleshooting screen opens.
- Use the navigation panel on the left to explore the component categories.
Generating a client troubleshooting report
You can generate a client troubleshooting report on Windows-based systems and
include several types of data, a Network Access diagnostic test and so on, in the
report.
- Double-clickf5wininfo.exeto start the client troubleshooting utility.The F5 BIG-IP Edge Components Troubleshooting screen opens.
- Click.The Report screen opens.
- UnderType, select the types of reports that you want to run.
- UnderFormat, selecthtmlortextfor the type of report.
- To generate a compressed report, select thecompressedoption.
- To view the report without saving the report, clickView.While the report runs, a Collecting Data popup screen opens and a System Information popup screen opens if the system information report type runs; the popup screens close. If you selectedhtmlformat, the report opens in a browser screen.
Running a Network Access diagnostic test
You can use the client troubleshooting utility to run a Network Access diagnostic
test on Windows-based systems.
If BIG-IP
Edge Client for Windows is installed, you can run a Network
Diagnostics test from the user interface.
- Double-clickf5wininfo.exeto start the client troubleshooting utility.The F5 BIG-IP Edge Components Troubleshooting screen opens.
- Click.The Network Access Diagnostic popup screen opens.
Overview: Reusing Windows logon credentials for Edge Client
If you want users of BIG-IP®
Edge Client® for Windows to start a Network Access session with the
credentials that they typed to log on to a Windows-based system, you must configure the
connectivity profile, the client download package, and the access policy to support this.
A client must be joined to a domain to reuse Windows logon credentials. This
will not work if the client is standalone, and not joined to a domain.
Task summary
Configuring a
connectivity profile to reuse Windows logon credentials
For users to reuse Windows credentials to start a
Network Access session, you must select the
Reuse Windows Logon Credentials
check
box in the connectivity profile. A client must
be joined to a domain to reuse Windows logon credentials. This will not work if the
client is standalone, and not joined to a domain.
- On the Main tab, click.A list of connectivity profiles displays.
- Select the connectivity profile that you want to update and clickEdit Profile.The Edit Connectivity Profile popup screen opens and displays General Settings.
- From the left pane of the popup screen, selectWin/Mac Edge Client.Edge Client settings for Mac and Windows-based systems display in the right pane.
- Select theReuse Windows Logon Credentialscheck box.
- ClickOK.The popup screen closes, and the Connectivity Profile List displays.
Customizing the Edge Client package for Windows logon credentials reuse
For users to reuse their Windows
credentials to start a Network Access session, the Edge Client
package must contain the user logon credentials access service.
A
client must be joined to a domain to reuse Windows logon credentials. This will not
work if the client is standalone, and not joined to a domain.
- On the Main tab, click.A list of connectivity profiles displays.
- Select the connectivity profile for which you want to customize the client package.
- Click theCustomize Packagebutton.The Customize Windows Client Package popup screen displays with Available Components displayed.
- Select theUser Logon Credentials Access Servicecheck box.This software service allows the client to store encrypted Windows logon credentials and use those credentials to log on to Access Policy Manager.
- ClickDownload.The screen closes and the package,BIGIPEdgeClient.exe, downloads.
You must make the downloaded package available to your users, as hosted content or
through some other delivery mechanism. Users must install the package or, Component
Installer, if present on user systems, can install it for them.
Configuring an
access policy for Windows logon credentials reuse
For users to reuse Windows credentials to start a
Network Access session, you must ensure that the access policy includes a Logon Page
action that has not been customized.
A client must
be joined to a domain to reuse Windows logon credentials. This will not work if the
client is standalone, and not joined to a domain.
- On the Main tab, click.The Access Profiles (Per-Session Policies) screen opens.
- In the Per-Session Policy column, click theEditlink for the access profile you want to configure.The visual policy editor opens the access policy in a separate screen.
- Make any adjustments needed to the access policy to ensure that it includes a Logon Page action that has not been customized. (Other logon page actions do not support the reuse Windows logon credentials option.)The Logon Page action must contain only the default fields and the JavaScript cannot be removed or otherwise changed as can be done through Access Policy Manager Customization. If necessary, you can delete a Logon Page action and add it to the policy again to ensure that it is not customized.
- ClickFinished.The popup screen closes.
- Click theApply Access Policylink to apply and activate the changes to the policy.