Applies To:
Show VersionsBIG-IP AFM
- 14.1.2, 14.1.0
Default Traffic Processing
Overview: Default traffic processing
BIG-IP AFM is an add-on module that integrates with BIG-IP Local Traffic Manager (LTM). When the AFM and LTM modules are provisioned, it is important to understand how the baseline or default configuration affects traffic processing.
LTM is considered to be default deny. This means that when no traffic processing objects are configured, for example a virtual server and a pool, the BIG-IP system will not process any network traffic. You need to configure at least one traffic processing object on the BIG-IP system to begin processing traffic.
AFM Network Firewall is considered to be default allow, also known as Application Delivery Controller (ADC) mode. This mode allows access to all traffic processing objects and requires one or more firewall rules to block access.
- ADC (Accept)
- Allow all traffic. Firewall rules must be applied to restrict access.
- Firewall (Reject / Drop)
- Allow no traffic. Firewall rules must be applied to allow access.
- Accept
- Allow packets that do not match a restrictive firewall rule. This is the default mode.
- Reject
- Reject packets that do not match an acceptance firewall rule. This mode sends an ICMP destination unreachable packet to the remote client.
- Drop
- Drop packets that do not match an acceptance firewall rule. This mode will cause the remote client to continue the connection attempt until the retry period has expired.
Configure AFM to use ADC mode
- On the Main tab, click .
- From the Virtual Server & Self IP Contexts list, select the default action Accept for the self IP and virtual server contexts.
-
From the Global Context list, select the default action for the global rule context.
- Select Drop to silently drop all traffic. Dropping causes the connection to be retried until the retry threshold is reached.
- Select Reject to reject all traffic. Rejecting sends a destination unreachable message to the sender.
- Click Update.
Configure AFM to use firewall mode
- On the Main tab, click .
-
From the Virtual Server & Self IP
Contexts list, select the default action for the self IP and
virtual server contexts.
- Select Drop to silently drop all traffic. Dropping causes the connection to be retried until the retry threshold is reached.
- Select Reject to reject all traffic. Rejecting sends a destination unreachable message to the sender.
-
From the Global Context list, select the default action for the global rule context.
- Select Drop to silently drop all traffic. Dropping causes the connection to be retried until the retry threshold is reached.
- Select Reject to reject all traffic. Rejecting sends a destination unreachable message to the sender.
- Click Update.