Manual Chapter :
Recovery Options
Applies To:
Show Versions
BIG-IP AAM
- 13.0.1, 13.0.0
BIG-IP APM
- 13.0.1, 13.0.0
BIG-IP LTM
- 13.0.1, 13.0.0
BIG-IP AFM
- 13.0.1, 13.0.0
BIG-IP DNS
- 13.0.1, 13.0.0
BIG-IP ASM
- 13.0.1, 13.0.0
FIPS system recovery options
This table describes configuration options for FIPS system recovery.
Option | Description |
---|---|
Configure a device group | Configure the F5® devices in a device group with the FIPS HSMs synchronized. In the event of a system failure, the standby unit becomes active and handles incoming traffic. Contact F5 to arrange a Return Material Authorization (RMA) for the failed F5 device and then follow the steps for implementing a replacement unit to recover the failed device. |
Configure an additional unit for recovery | Fully configure a third unit, add it to the security domain, and synchronize the configurations. Remove the unit from the network and store it in a secure location. If the F5 system in production is damaged or destroyed, you can use the backup unit to reconstitute the security domain. |
Save the keys on a disk | Generate the private keys outside of the FIPS HSM. Copy the non-FIPS protected keys to
a secure external location as a backup. Then convert the non-FIPS into
FIPS keys on the F5 system. The keys on the F5 system are now protected
by the FIPS HSM. If there is a catastrophic system failure, use the
non-FIPS protected backup keys to repopulate the FIPS HSM. CAUTION:
This
method for backup is not FIPS-compliant.
|
Implementing a replacement unit in a device group after a system failure
Before you recover hardware
security module (HSM) information, ensure that the F5® software is
configured and then install your saved UCS file on the new replacement system.
For information about backup and recovery of a BIG-IP®
system UCS file, see BIG-IP® System:
Essentials.
If one unit of a device group fails, the failover unit becomes active and
maintains the HSM information. After you replace the failed unit in a device
group, you need to restore the HSM information on the replacement
unit.
The replacement unit is now ready to function as the failover unit in a
device group.
Implementing a replacement standalone device after a system failure
You must have a backup of your non-FIPS protected keys before you can
restore the hardware security module (HSM) information on a standalone
replacement device.
After you replace a failed standalone unit, you need to restore the
HSM information on the replacement unit.