Web example: Configuring the HA group in active/standby mode in collaboration with a routing protocol

Network configuration

As shown in Figure 1, set up a hot backup system at the border between the Internet and the internal network of an enterprise to ensure service continuity.

Figure 1 Network diagram

 

Software versions used

This configuration example was created and verified on E8371 of the F5000-AI160 device.

Restrictions and guidelines

Verify that the devices to be assigned to a hot backup system meet the hardware and software environment consistency requirements in this section.

Hardware environment consistency

Before you configure a hot backup system, verify that the following hardware settings are the same on the devices to be assigned to the hot backup system:

Software environment consistency

Before you configure a hot backup system, verify that the following software settings are the same on the devices to be assigned to the hot backup system:

Feature compatibility restrictions

Compatibility with NAT

If you configure both VRRP and NAT on a hot backup system, you must associate NAT configuration with VRRP groups, such as NAT rules, source translation methods, and NAT server mappings. If you fail to do so, NAT cannot operate correctly.

Compatibility with SSL VPN

For SSL VPN to operate correctly on a hot backup system, you must configure the port used for transmitting user data for the hot backup system on the global setting configuration page of SSL VPN.

You can use SSL VPN only when the hot backup system is operating in active/standby mode and collaborating with VRRP. You cannot use SSL VPN in any other scenario.

Compatibility with application security

If asymmetric-path traffic exists on the transparent in-path hot backup operating in dual-active mode, enable DPI services to support the hot backup feature on the advanced setting configuration page of application security. If you fail to do so, application security services cannot identify or process traffic correctly.

Procedure

Configuring Router A

# Assign 2.1.1.2/24 to GigabitEthernet 1/0/7.

# Assign 2.1.10.2/24 to GigabitEthernet 1/0/8.

# Configure OSPF for Router A to have Layer 3 reachability to other devices.

Configuring Router B

# Assign 10.1.1.2/24 to GigabitEthernet 1/0/7.

# Assign 10.1.10.2/24 to GigabitEthernet 1/0/8.

# Configure OSPF for Router B to have Layer 3 reachability to other devices.

Configuring Device A

Configuring basic network settings

  1. Assign IP addresses to interfaces:

# On the top navigation bar, click Network.

# From the navigation pane, select Interface Configuration > Interfaces.

# Click the Edit icon for GE 1/0/1.

# In the dialog box that opens, configure the interface:

  1. On the Basic Configuration tab, select the Untrust security zone.

  1. On the IPv4 Address tab, enter the IP address and mask of the interface. In this example, enter 2.1.1.1/24.

  1. Use the default settings for other parameters.

  1. Click OK.

# Add GE 1/0/2 to the Trust security zone and assign 10.1.1.1/24 to it in the same way you configure GE 1/0/1.

# Assign 10.2.1.1/24 to GE 1/0/3 in the same way you configure GE 1/0/1.

  1. Configure routing:

This step uses OSPF as an example. You can configure another dynamic routing protocol as needed.

# On the top navigation bar, click Network.

# From the navigation pane, select Routing > OSPF.

# Click Create.

# In the dialog box that opens, configure an OSPF instance:

  1. Select version OSPFv2.

  1. Enter instance name 1.

  1. Enter router ID 2.1.1.1.

  1. Use the default settings for other parameters.

  1. Click OK.

# Click 0 in the Number of OSPF areas column for the created OSPF instance.

# On the OSPF area configuration page that opens, click Create.

# In the dialog box that opens, configure an area:

  1. Enter area ID 0.0.0.0.

  1. Add subnets 2.1.1.0/24 and 10.1.1.0/24.

  1. Use the default settings for other parameters.

  1. Click OK.

  1. Configure a security policy to permit service traffic:

Perform this task only on the primary device. The secondary device will synchronize security policy configuration with the primary device after the hot backup system is set up.

# On the top navigation bar, click Policies.

# From the navigation pane, select Security Policies > Security Policies.

# Select Create > Create a policy.

# In the dialog box that opens, configure a security policy to permit traffic from zone Trust to zone Untrust:

  1. Enter security policy name Trust-Untrust.

  1. Select source zone Trust.

  1. Select destination zone Untrust.

  1. Select IP version IPv4.

  1. Set the action to Permit.

  1. Enter source IP address 20.1.1.0/24.

  1. Use the default settings for other parameters.

  1. Click OK.

  1. Configure security policies to permit OSPF protocol packets:

Perform this task only on the primary device. The secondary device will synchronize security policy configuration with the primary device after the hot backup system is set up.

# On the top navigation bar, click Policies.

# From the navigation pane, select Security Policies > Security Policies.

# Select Create > Create a policy.

# In the dialog box that opens, configure a security policy to permit traffic from zone Trust to zone Local:

  1. Enter security policy name ospf1.

  1. Select source zone Trust.

  1. Select destination zone Local.

  1. Select IP version IPv4.

  1. Set the action to Permit.

  1. Select policy group ospf.

  1. Use the default settings for other parameters.

  1. Click OK.

# Configure a security policy to permit traffic from zone Local to zone Trust:

  1. Enter security policy name ospf2.

  1. Select source zone Local.

  1. Select destination zone Trust.

  1. Select IP version IPv4.

  1. Set the action to Permit.

  1. Select policy group ospf.

  1. Use the default settings for other parameters.

  1. Click OK.

# Configure a security policy to permit traffic from zone Untrust to zone Local:

  1. Enter security policy name ospf3.

  1. Select source zone Untrust.

  1. Select destination zone Local.

  1. Select IP version IPv4.

  1. Set the action to Permit.

  1. Select policy group ospf.

  1. Use the default settings for other parameters.

  1. Click OK.

# Configure a security policy to permit traffic from zone Local to zone Untrust:

  1. Enter security policy name ospf4.

  1. Select source zone Local.

  1. Select destination zone Untrust.

  1. Select IP version IPv4.

  1. Set the action to Permit.

  1. Select policy group ospf.

  1. Use the default settings for other parameters.

  1. Click OK.

Configuring hot backup settings

# On the top navigation bar, click System.

# From the navigation pane, select High Availability > Track.

# Click Add.

# Configure a track entry:

  1. Enter track entry ID 1.

  1. Select the interface module.

  1. Select GE 1/0/1 as the monitored interface.

  1. Use the default settings for other parameters.

# Configure track entry 2 to monitor the state of GE 1/0/2. (Details not shown.)

# On the top navigation bar, click System.

# From the navigation pane, select High Availability > Hot Backup.

# Click Configure.

# Configure the hot backup parameters as shown in Figure 2.

Figure 2 Configuring hot backup parameters

 

# Click OK.

Configuring security services

# Configure security devices on the hot backup member devices. If the hot backup system can back up configuration for a module, configure the module only on the primary device (Device A).

Configuring Device B

Configuring basic network settings

  1. Assign IP addresses to interfaces:

# On the top navigation bar, click Network.

# From the navigation pane, select Interface Configuration > Interfaces.

# Click the Edit icon for GE 1/0/1.

# In the dialog box that opens, configure the interface:

  1. On the Basic Configuration tab, select the Untrust security zone.

  1. On the IPv4 Address tab, enter the IP address and mask of the interface. In this example, enter 2.1.10.1/24.

  1. Use the default settings for other parameters.

  1. Click OK.

# Add GE 1/0/2 to the Trust security zone and assign 10.1.10.1/24 to it in the same way you configure GE 1/0/1.

# Assign 10.2.1.2/24 to GE 1/0/3 in the same way you configure GE 1/0/1.

  1. Configure routing:

This step uses OSPF as an example. You can configure another dynamic routing protocol as needed.

# On the top navigation bar, click Network.

# From the navigation pane, select Routing > OSPF.

# Click Create.

# In the dialog box that opens, configure an OSPF instance:

  1. Select version OSPFv2.

  1. Enter instance name 1.

  1. Enter router ID 2.1.10.1.

  1. Use the default settings for other parameters.

  1. Click OK.

# Click 0 in the Number of OSPF areas column for the created OSPF instance.

# On the OSPF area configuration page that opens, click Create.

# In the dialog box that opens, configure an area:

  1. Enter area ID 0.0.0.0.

  1. Add subnets 2.1.10.0/24 and 10.1.10.0/24.

  1. Use the default settings for other parameters.

  1. Click OK.

Configuring hot backup settings

# On the top navigation bar, click System.

# From the navigation pane, select High Availability > Track.

# Click Add.

# Configure a track entry:

  1. Enter track entry ID 1.

  1. Select the interface module.

  1. Select GE 1/0/1 as the monitored interface.

  1. Use the default settings for other parameters.

# Configure track entry 2 to monitor the state of GE 1/0/2. (Details not shown.)

# On the top navigation bar, click System.

# From the navigation pane, select High Availability > Hot Backup.

# Click Configure.

# Configure the hot backup parameters as shown in Figure 3.

Figure 3 Configuring hot backup parameters

 

# Click OK.

Configuring the host

# On the host, specify 20.1.1.1 as the default gateway.

Verifying the configuration

# Enable logging for the interzone policy that permits communication between security zones Trust and Untrust. Verity that only Device A generates log messages when the host communicates with the Internet.