Applies To:
Show Versions
F5 DDoS Hybrid Defender
- 14.0.0
Installing a Stand-alone DDoS Hybrid Defender
Overview: Installing a Stand-alone DDoS Hybrid Defender
You can install DDoS Hybrid Defender™ onto a dedicated system approved for the software. You can deploy the system inline or out-of-band. For out-of-band deployments, you can set up the system in one of two ways: as a span port or using NetFlow. A span port analyzes mirrored packets, and NetFlow listens for and reviews metadata.
Before you start, you must have assigned the management IP address on the LCD panel of the device, or with a hypervisor if using the Virtual Edition. This procedure is for installing a single, stand-alone DDoS Hybrid Defender system to protect against DDoS attacks. If you have two systems and want to install them for high availability, follow the steps described in Installing DDoS Hybrid Defender for High Availability.
Make sure you have this information available:
- Base registration key
- Management IP address, network mask, and management route IP address
- Passwords for the root and admin accounts
- NTP server IP address (optional)
- Remote DNS lookup server IP address (required for F5 Silverline® integration or if resolving host names)
Performing initial setup
Manually licensing DDoS Hybrid Defender
Configuring the network for out-of-band deployment
Mirroring traffic with SPAN ports
Examining traffic metadata using Netflow messages
Creating a Netflow protected server
DDoS Hybrid Defender receives out-of-band Netflow metadata and uses traffic matching criteria to focus on traffic with specific characteristics.
Creating a profile to scrub traffic
Creating a publisher to blacklist traffic
Advertising with BGP Flowspec
Configuring the network for an inline stand-alone device
- Use the VLAN Group setup (L2 bridge mode), for example, if you use switch topology
- Use Virtual Wire (L2Wire) to set up the system as an inline L2 transparent mode device
- Define VLANs, if the system uses routed technology
- Define routes as needed to direct traffic.
Configuring the network using routed mode
Deploying inline using virtual wire
Deploying inline using VLAN groups
Connecting with F5 Silverline
DDoS Hybrid Defender is now integrated with the Silverline Cloud Platform.
Setting up remote logging
When configuring remote high-speed logging of system events, it is helpful to understand the objects you need to create and why, as described here:
What to create | Why |
---|---|
Pool | Create a pool of remote log servers to which the BIG-IP system can send log messages. |
Destination | Create a log destination of Remote High-Speed Log type that specifies a pool of remote log servers. If your remote log servers are the ArcSight, Splunk, IPFIX, or Remote Syslog type, create an additional log destination to format the logs in the required format and forward the logs to a remote high-speed log destination. |
Publisher | Create a log publisher to send logs to a set of specified log destinations. |
Logging profile | Create a logging profile to enable logging of user-specified data at a user-specified level, and associate a log publisher with the profile. |
Protected object | Associate a logging profile with a protected object to define how the system logs security events on the traffic that the protected object processes. |
Following are the general steps to set up remote logging:
- Create a pool of remote servers to which the system can send log messages: on the Main tab, click , create, then add the log servers and ports.
- Create a remote high-speed log destination: on the Main tab, click , create, specify the type, and any other settings for the remote log destination.
- Create a publisher for the system to send log messages: on the Main tab, click , create, and select the log destinations for the publisher.
-
Create a logging profile: on the Main tab, click
, create, select the types of logs, and complete the associated
settings.
- Network Firewall provides logs for IP intelligence and traffic statistics.
- DoS Protection provides logs for DNS, SIP, and Network DoS events.
- Bot Defense provides logs for HTTP DoS protection for application security.
- Associate the logging profile with the appropriate protected object: on the Main tab, click , click the name of the protected object. In the properties pane on the right, select the logging profile to use.
Event logs from DDoS Hybrid Defender are sent to the remote logging server in the format you specified.