Applies To:
Show VersionsBIG-IP AAM
- 14.0.1, 14.0.0
BIG-IP APM
- 14.0.1, 14.0.0
BIG-IP LTM
- 14.0.1, 14.0.0
BIG-IP AFM
- 14.0.1, 14.0.0
BIG-IP DNS
- 14.0.1, 14.0.0
BIG-IP ASM
- 14.0.1, 14.0.0
Setting Up the Thales HSM
Overview: Setting up the Thales HSM
The Thales nShield Connect is an external HSM that is available for use with BIG-IP® systems. Because it is network-based, you can use the Thales nShield Connect solution with all BIG-IP platforms, including VIPRION® Series chassis and BIG-IP Virtual Edition (VE).
The Thales nShield Connect architecture includes a component called the Remote File System (RFS) that stores and manages the encrypted key files. The RFS can be installed on the BIG-IP system or on another server on your network.
The BIG-IP system is a client of the RFS, and all BIG-IP systems that are enrolled with the RFS can access the encrypted keys from this central location.
Only RSA-based cipher suites use the network HSM.
After you install the Thales nShield Connect client on the BIG-IP system, the keys stored in the Thales HSM and the corresponding certificates are available for use with Access Policy Manager® and Application Security Manager™.
For additional information about using Thales nShield Connect, refer to the Thales website: (https://www.thales-esecurity.com).
Prerequisites for setting up Thales nShield Connect with BIG-IP systems
Before you can use Thales nShield Connect with the BIG-IP® system, you must make sure that these requirements are in place:
- The Thales nShield Connect device is installed on your network.
- The IP address of the BIG-IP client that is visible to the Thales HSM is on the allowed list of clients on the Thales nShield Connect device. If you are implementing Thales nShield Connect with a VIPRION® system, you need to add the cluster management IP addresses and the cluster member IP address for each blade installed in the chassis to the allowed list. This applies to using the management network. If you use a TMM interface with a floating IP address, only that IP address is required.
- The RFS server is installed. This could be an external server on your network or on the local BIG-IP system.
- The Thales nShield Connect device, the RFS, and the BIG-IP system can initiate connections with each other through port 9004 (default).
- You have created the Thales Security World (security architecture).
- The BIG-IP system is licensed for "External Interface and Network HSM."
Additionally, before you begin the installation process, make sure that you can locate these items on the installation DVD that ships with the Thales hardware unit:
- The Thales Security World Software for Linux 64bit
- The nShield_Connect_and_netHSM_User_Guide.pdf
Installing Thales nShield Connect components on the BIG-IP system
Before you can set up the Thales nShield Connect components on a BIG-IP system, you must obtain the Thales 64-bit Linux ISO CD and copy files from the CD to specific locations on the BIG-IP system using secure copy (SCP). F5 Networks has tested these integration steps with Thales security World Software for Linux 64bit. For questions about Thales components, consult your Thales representative.
Setting up the RFS on the BIG-IP system (optional)
Setting up the Thales nShield Connect client on the BIG-IP system
To use the Thales nShield Connect device with the BIG-IP system, you must first set up the Thales client on the BIG-IP system. For the enrollment to work properly, the IP address of the BIG-IP system must be a client of the networked HSM. In the case of the VIPRION system and connecting over the admin interfaces, each blade and the chassis IP address need to be added as a client. You set up the IP address using the front panel of the nShield Connect device, or by pushing the client configuration. For details about how to add, edit, and view clients, refer to the Thales documentation.
If you are setting up the Thales client on a VIPRION system, you run the configuration script only on the primary blade, and then the system propagates the configuration to the additional active blades.
Setting up the Thales nShield Connect client on a newly added or activated blade (optional)
Configuring the Thales nShield Connect client for multiple HSMs in an HA group
Setting options for faster recovery on a Thales HSM in an HA configuration
Thales recommends that in a production setup, unless there is a solid reason to modify these settings, it is best to use the default values.
Config settings for faster recovery on a Thales HSM in an HA configuration
These are the Thales settings that will help you limit the time where SSL connections will fail. Thales recommends that in a production setup, unless there is a solid reason to modify these settings, it is best to use the default values.
Setting Name | Description | Default | Moderate settings | Very tight settings |
---|---|---|---|---|
connect_retry | This field specifies the number of seconds to wait before retrying a remote connection to a client Network HSM. | 10 | 3 | 1 |
connect_broken | This field specifies the number of seconds of inactivity allowed before a connection to a client Network HSM is declared broken. | 90 | 10 | 1 |
connect_keepalive | This field specifies the number of seconds between keepalive packets for remote connections to a client Network HSM. | 10 | 4 | 10 |
connect_command_block | When a NetHSM has failed, this field specifies the number of seconds the hardserver should wait before failing commands directed to that netHSM with a NetworkError message. For commands to have a chance of succeeding after a netHSM has failed this value should be greater than that of connect_retry. If it is set to 0, commands to a netHSM are failed with NetworkError immediately, as soon as the NetHSM fails. | 35 | 15 | 0 |