Applies To:Show Versions
- 13.1.1, 13.1.0
Overview: How do I deploy BIG-IP DNS on a network with multiple route domains?
You can deploy BIG-IP® DNS (formerly GTM) on a network where BIG-IP Local Traffic Manager™ (LTM®) systems are configured with multiple route domains and overlapping IP addresses.
The following figure shows BIG-IP DNS deployed in a network with multiple BIG-IP Local Traffic Manager™ (LTM®) systems, one configured with the default route domain (zero), and one configured with two additional route domains. BIG-IP DNS can monitor the Application1 and Application2 servers that have overlapping IP addresses and reside in different route domains. The firewalls perform the required address translation between the BIG-IP DNS and BIG-IP LTM addresses; you must configure the firewalls to segment traffic and avoid improperly routing packets between route domain 1 and route domain 2.
BIG-IP DNS deployed on a network with multiple route domains
Before BIG-IP® DNS can gather status and statistics for the virtual servers hosted on BIG-IP LTM® systems that are configured with route domains, you must configure the following on each BIG-IP LTM that handles traffic for route domains:
- VLANs through which traffic for your route domains passes
- Route domains that represent each network segment
- Self IP addresses that represent the address spaces of the route domains
Additionally, configure a BIG-IP DNS server object on BIG-IP DNS to represent each LTM system device.
Perform the following tasks to configure BIG-IP DNS to monitor BIG-IP LTM systems with route domains.
Creating VLANs for a route domain on BIG-IP LTM
On the Main tab, click
.The VLAN List screen opens.
The New VLAN screen opens.
- In the Name field, type external.
In the Tag field, type a numeric tag, between 1-4094,
for the VLAN, or leave the field blank if you want the BIG-IP system to
automatically assign a VLAN tag.
The VLAN tag identifies the traffic from hosts in the associated VLAN.
If you want to use Q-in-Q (double) tagging, use the Customer
Tag setting to perform the following two steps. If you do not
see the Customer Tag setting, your hardware platform does
not support Q-in-Q tagging and you can skip this step.
The customer tag specifies the inner tag of any frame passing through the VLAN.
- From the Customer Tag list, select Specify.
- Type a numeric tag, from 1-4094, for the VLAN.
For the Interfaces setting:
- From the Interface list, select an interface number or trunk name.
From the Tagging list, select
Select Tagged when you want traffic for that interface to be tagged with a VLAN ID.
- If you specified a numeric value for the Customer Tag setting and from the Tagging list you selected Tagged, then from the Tag Mode list, select a value.
- Click Add.
- Repeat these steps for each interface or trunk that you want to assign to the VLAN.
- If you want the system to verify that the return route to an initial packet is the same VLAN from which the packet originated, select the Source Check check box.
For the Hardware SYN Cookie setting, select or clear the check
When you enable this setting, the BIG-IP system triggers hardware SYN cookie protection for this VLAN.Enabling this setting causes additional settings to appear. These settings appear on specific BIG-IP platforms only.
For the Syncache Threshold setting, retain the default value or
change it to suit your needs.
The Syncache Threshold value represents the number of outstanding SYN flood packets on the VLAN that will trigger the hardware SYN cookie protection feature.
When the Hardware SYN Cookie setting is enabled, the BIG-IP system triggers SYN cookie protection in either of these cases, whichever occurs first:
- The number of TCP half-open connections defined in the LTM® setting Global SYN Check Threshold is reached.
- The number of SYN flood packets defined in this Syncache Threshold setting is reached.
For the SYN Flood Rate Limit setting, retain the default value or
change it to suit your needs.
The SYN Flood Rate Limit value represents the maximum number of SYN flood packets per second received on this VLAN before the BIG-IP system triggers hardware SYN cookie protection for the VLAN.
The screen refreshes, and displays the new VLAN in the list.
Creating a route domain on BIG-IP LTM
On the Main tab, click
.The Route Domain List screen opens.
The New Route Domain screen opens.
In the ID field, type an ID number for the route
This ID must be unique on the BIG-IP system; that is, no other route domain on the system can have this ID.An example of a route domain ID is 1.
In the Description field, type a description of the
For example: This route domain applies to application traffic for Customer A.
- For the Strict Isolation setting, select the Enabled check box to restrict traffic in this route domain from crossing into another route domain.
- For the Parent Name setting, retain the default value.
For the VLANs setting, move the
external and internal VLANs
from the Available list, to the
Configuring this setting ensures that the BIG-IP system immediately associates any self IP addresses pertaining to the selected VLANs with this route domain.
The system displays a list of route domains on the BIG-IP system.
Creating a self IP address for a route domain on BIG-IP LTM
- On the Main tab, click .
The New Self IP screen opens.
- In the Name field, type a unique name for the self IP address.
In the IP Address field, type an IP address.
This IP address must represent a self IP address in a route domain. Use the format x.x.x.x%n, where n is the route domain ID, for example, 10.1.1.1%1.The system accepts IPv4 and IPv6 addresses.
In the Netmask field, type the network mask for the
specified IP address.
For example, you can type 255.255.255.0.
- From the VLAN/Tunnel list, select the VLAN that you assigned to the route domain that contains this self IP address.
- From the Port Lockdown list, select Allow Default.
The screen refreshes, and displays the new self IP address.
Defining a server for a route domain on BIG-IP DNS
On the Main tab, click
.The Server List screen opens.
The New Server screen opens.
In the Name field, type a name for the server.
Important: Server names are limited to 63 characters.
- From the Product list, select BIG-IP System.
- From the Data Center list, select the data center where the server resides.
From the Prober Preference list, select one of the
Option Description Inside the Data Center By default, a server selects the Prober pool from within the existing data center. Outside the Data Center A server selects the Prober pool from outside the existing data center. Inherit from Data Center A server inherits the Prober pool assigned to the data center in which the server resides.Note: The selected Prober pool must reside in the same route domain as the servers you want the pool members to probe.
From the Prober Fallback list, select one of the
Option Description Any available By default, selects any available Prober pool. Inside the Data Center A server selects the Prober pool from within the existing data center. Outside the Data Center A server selects the Prober pool from outside the existing data center. Inherit from Data Center A server inherits the Prober pool assigned to the data center in which the server resides. None No Prober pool is used. Prober Fallback is disabled.
- From the State list, select Enabled.
In the BIG-IP System devices area, add the self IP address that you assigned to the VLAN
that you assigned to the route domain.
Important: Do not include the route domain ID in this IP address. Use the format x.x.x.x, for example, 10.10.10.1.
- In the Health Monitors area, assign the bigip monitor to the server by moving it from the Available list to the Selected list.
From the Availability Requirements list, select one of
the following and enter any required values.
Option Description All Health Monitors By default, specifies that all of the selected health monitors must be successful before the server is considered up (available). At Least The minimum number of selected health monitors that must be successful before the server is considered up. Require The minimum number of successful probes required from the total number of probers requested.
- From the Virtual Server Discovery list, select Enabled.
The Server List screen opens displaying the new server in the list.
In the server list, click the name of the LTM system that you just
The Server Properties screen opens.
On the menu bar, click Virtual Servers.
A list of the virtual servers configured on the server displays.
From the Resources list, select
Additional settings display.
- Select the Expose Route Domains check box.
- Click Update.
Running the big3d_install script
- Log in as root to the BIG-IP DNS system you are adding to your network.
Run this command to access tmsh:
Run this command to run the big3d_install script:
run gtm big3d_install <IP_addresses_of_target BIG-IP_systems>The script instructs BIG-IP DNS to connect to each specified BIG-IP system.
- If prompted, enter the root password for each system.
Running the bigip_add script
- Log in as root to the BIG-IP DNS system you are installing on your network.
Run this command to access tmsh.
Run this command to run the bigip_add utility:
run gtm bigip_add <IP_addresses_of_BIG-IP_LTM_systems>The utility exchanges SSL certificates so that each system is authorized to communicate with the other.
You now have an implementation in which BIG-IP DNS monitors BIG-IP LTM virtual servers on the various route domains in your network.