Getting Started 2 3 PDF
Getting Started 2 3 PDF
Version 2.3
Table of Contents
Table of Contents
Legal Notices......................................................................................................................................5
Acknowledgments...............................................................................................................................7
3
Table of Contents
4
Legal Notices
Publication Date
This document was published on November 28, 2011.
Publication Number
MAN-0384-00
Copyright
Copyright © 2011, F5 Networks, Inc. All rights reserved.
F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5 assumes
no responsibility for the use of this information, nor any infringement of patents or other rights of third
parties which may result from its use. No license is granted by implication or otherwise under any patent,
copyright, or other intellectual property right of F5 except as specifically described by applicable user
licenses. F5 reserves the right to change specifications at any time without notice.
Trademarks
3DNS, Access Policy Manager, Acopia, Acopia Networks, Advanced Client Authentication, Advanced
Routing, APM, Application Security Manager, ARX, AskF5, ASM, BIG-IP, Cloud Extender, CloudFucious,
CMP, Data Manager, DevCentral, DevCentral [DESIGN], DNS Express, DSC, DSI, Edge Client, Edge
Gateway, Edge Portal, EM, Enterprise Manager, F5, F5 [DESIGN], F5 Management Pack, F5 Networks,
F5 World, Fast Application Proxy, Fast Cache, FirePass, Global Traffic Manager, GTM, IBR, Intelligent
Browser Referencing, Intelligent Compression, IPv6 Gateway, iApps, iControl, iHealth, iQuery, iRules,
iRules OnDemand, iSession, IT agility. Your way., L7 Rate Shaping, LC, Link Controller, Local Traffic
Manager, LTM, Message Security Module, MSM, Netcelera, OneConnect, Packet Velocity, Protocol
Security Module, PSM, Real Traffic Policy Builder, ScaleN, SSL Acceleration, StrongBox, SuperVIP, SYN
Check, TCP Express, TDR, TMOS, Traffic Management Operating System, TrafficShield, Transparent
Data Reduction, VIPRION, vCMP, WA, WAN Optimization Manager, WANJet, WebAccelerator, WOM,
and ZoneRunner, are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries,
and may not be used without F5's express written consent.
All other product and company names herein may be trademarks of their respective owners.
RF Interference Warning
This is a Class A product. In a domestic environment this product may cause radio interference, in which
case the user may be required to take adequate measures.
FCC Compliance
This equipment has been tested and found to comply with the limits for a Class A digital device pursuant
to Part 15 of FCC rules. These limits are designed to provide reasonable protection against harmful
interference when the equipment is operated in a commercial environment. This unit generates, uses, and
Legal Notices
can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual,
may cause harmful interference to radio communications. Operation of this equipment in a residential area
is likely to cause harmful interference, in which case the user, at his own expense, will be required to take
whatever measures may be required to correct the interference.
Any modifications to this device, unless expressly approved by the manufacturer, can void the user's authority
to operate this equipment under part 15 of the FCC rules.
Standards Compliance
This product conforms to the IEC, European Union, ANSI/UL and Canadian CSA standards applicable to
Information Technology products at the time of manufacture.
6
Acknowledgments
This product includes software developed by Niels Mueller ([email protected]), which is protected under
the GNU Public License.
In the following statement, This software refers to the Mitsumi CD-ROM driver: This software was developed
by Holger Veit and Brian Moore for use with 386BSD and similar operating systems. Similar operating
systems includes mainly non-profit oriented systems for research and education, including but not restricted
to NetBSD, FreeBSD, Mach (by CMU).
This product includes software developed by the Apache Group for use in the Apache HTTP server project
(http://www.apache.org/).
This product includes software licensed from Richard H. Porter under the GNU Library General Public
License (© 1998, Red Hat Software), www.gnu.org/copyleft/lgpl.html.
This product includes the standard version of Perl software licensed under the Perl Artistic License (© 1997,
1998 Tom Christiansen and Nathan Torkington). All rights reserved. You may find the most current standard
version of Perl at http://www.perl.com.
This product includes software developed by Jared Minch.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
(http://www.openssl.org/).
This product includes cryptographic software written by Eric Young ([email protected]).
This product contains software based on oprofile, which is protected under the GNU Public License.
This product includes RRDtool software developed by Tobi Oetiker (http://www.rrdtool.com/index.html)
and licensed under the GNU General Public License.
This product contains software licensed from Dr. Brian Gladman under the GNU General Public License
(GPL).
This product includes software developed by the Apache Software Foundation (http://www.apache.org/).
This product includes Hypersonic SQL.
This product contains software developed by the Regents of the University of California, Sun Microsystems,
Inc., Scriptics Corporation, and others.
This product includes software developed by the Internet Software Consortium.
This product includes software developed by Nominum, Inc. (http://www.nominum.com).
This product contains software developed by Broadcom Corporation, which is protected under the GNU
Public License.
This product contains software developed by MaxMind LLC, and is protected under the GNU Lesser General
Public License, as published by the Free Software Foundation.
This product includes the GeoPoint Database developed by Quova, Inc. and its contributors.
This software incorporates JFreeChart, ©2000-2007 by Object Refinery Limited and Contributors.
This product contains software developed by the Mojarra project. Source code for the Mojarra software
may be obtained at https://javaserverfaces.dev.java.net/.
8
Chapter
1
Enterprise Manager Overview
Topics:
Note: Although Enterprise Manager works with previous software releases, we recommend that you
upgrade your managed devices to the current software version to ensure optimal performance.
Document Description
Enterprise Manager™ Getting This guide provides you with the basic concepts and tasks required to
Started Guide set up your Enterprise Manager and start managing devices.
Enterprise Manager™ This guide includes more in-depth information about the basic concepts
Administrator Guide of device management and configuration options.
Enterprise Manager™ New This guide introduces you to new features included in the latest release
Features Guide of Enterprise Manager.
Enterprise Manager 3000, and These guides include Enterprise Manager system hardware platform
Platform Guide: Enterprise specifications, installation instructions, and important environmental
Manager™ 4000 warnings.
BIG-IP® Systems: Getting Started This guide contains specific information required to install and license
Guide BIG-IP systems.
TMOS® Management Guide for This guide provides you with the information you need to configure
BIG-IP® Systems VLANs, SNMP traps, redundant BIG-IP systems, BIG-IP system
logging features, and so on.
Release notes Release notes contain information about the current software release,
including a list of associated documentation, a summary of new features,
enhancements, fixes, known issues and available workarounds, as well
as installation and upgrade instructions.
10
Enterprise Manager™: Getting Started Guide
Document Description
Solutions and Tech Notes Solutions are responses and resolutions to known issues. Tech Notes
provide additional configuration instructions and how-to information.
Tiered network, BIG-IP® Local A tiered network configuration where a BIG-IP Local Traffic
Traffic Manager™ performs address Manager system (or a non-F5 device) manages load balances
translation requests for multiple devices and translates the IP addresses for
those devices through a firewall.
Tiered network, a SNAT performs A tiered network configuration where a BIG-IP Local Traffic
network translation Manager (located in front of Enterprise Manager) load balance
requests for multiple devices, and a SNAT translates the IP
addresses for those devices.
Tip: Place the Enterprise Manager system on a management subnet that is separate from traffic
management to keep device management and communication independent from traffic management
activities.
Management (MGMT) F5 devices use the management (MGMT) interface port exclusively for
interface administrative traffic and do not forward user application traffic, such as traffic
slated for load balancing, through this interface.
TMM switch interface F5 devices typically use the TMM switch interface only to send or receive
application traffic for load balancing; however, it can be used for communication
between Enterprise Manager and a managed device. If you choose to dedicate
a TMM switch interface for management communication, do not use that same
interface for managing traffic.
11
Enterprise Manager Overview
Attention: The only exception is for high availability configurations. Peer devices in a high availability
configuration must use a floating self IP address to communicate with the active device. If you have a
high availability configuration, use the TMM switch port on each device because it can support floating
self IP addresses.
12
Chapter
2
Initial Setup and Configuration
Topics:
Task summary
Activating the Enterprise Manager license
Specifying initial configuration settings
Configuring a basic network
1. From a workstation attached to the network on which you configured the management interface, type
the following URL syntax where <management_IP_address> is the address you configured for device
management:
https://<management_IP_address>
2. At the prompts, type the user name admin and the password admin.
3. Click Log in.
The Setup Utility screen opens.
4. Click Activate.
The License screen opens.
5. In the Base Registration Key field, paste your base registration key.
6. Click Next.
The End User License Agreement (EULA) displays.
7. Review the EULA.
When you click Accept, the Platform screen opens.
14
Enterprise Manager™: Getting Started Guide
15
Initial Setup and Configuration
10. For the SSH IP Allow setting, retain the default of *All Addresses, or specify a range.
11. Click Next.
The system terminates your login session.
12. Log in to the system again using the new password that you specified.
The Network screen opens.
Tip: If you need to reconfigure any of the basic configuration settings, you can click the Run the Setup
Utility link from the Configuration utility's Welcome screen.
Perform these steps to continue through the Basic Network Configuration wizard screens and specify the
settings for the internal and external VLANs. For additional information about the settings on these screens,
click the Help tab.
1. For the Self IP settings, type the IP addresses specific to the Enterprise Manager™ system in the Address
and Netmask fields.
2. For the Port Lockdown setting, retain the defaultAllow Default to ensure that the required ports are
open for communication between the Enterprise Manager and the managed devices.
3. If you are configuring a high availability system, perform these steps, which display only if you specified
a high availability system during the initial configuration.
a) In the Floating IP area, type the Enterprise Manager's floating IP address in the Address field.
b) To enable configuration synchronization between the peers in a redundant/high availability system,
leave the Port Lockdown setting at Allow Default.
If you select any other option, the configuration synchronization process will fail.
4. For the VLAN Tag ID setting, retain the default auto to allow Enterprise Manager to select one for
you, or type a value in the field between 1 and 4094.
16
Enterprise Manager™: Getting Started Guide
5. For the VLAN Interfaces settings, you can specify the interfaces you want this VLAN to use for traffic
management.
6. Click Next.
The screen refreshes to display the external VLAN options.
7. For the Self IP settings, in the Address and Netmask fields, type the IP addresses specific to the
Enterprise Manager system.
8. For the Port Lockdown setting, retain the default Allow Default to ensure that the ports that are required
for communication between managed devices and Enterprise Manager are open.
9. In the Default Gateway field, type the IP address or route of the default gateway.
10. Click Next to save the configuration.
17
Initial Setup and Configuration
18
Chapter
3
Device Discovery and Importation
Topics:
Note: For non-BIG-IP devices, such as WANJet®systems, you must import the devices before performing
the discovery task.
Important: To successfully discover devices and receive the user name and password combination,
the device must have an active SSL server listening for traffic on port 443.
20
Enterprise Manager™: Getting Started Guide
The Task Properties screen opens and discovered devices appear below the Properties area. The list
refreshes until all specified devices are discovered, or until you click Cancel Pending Items.
1. Create a .csv file on your local system that contains each non-BIG-IP device's IP address, user name,
and password on a separate line in the following format: <device IP address>, <username>,
<password>
For example:
10.10.10.1,admin,pass001
10.10.10.2,admin,pass002
10.10.10.3,admin,pass003
10.10.10.4,admin,pass004
10.10.10.5,admin,pass005
21
Device Discovery and Importation
22
Chapter
4
Optional Configuration
Topics:
Customizable features:
Note: For additional information about UCS archive features, including information specific to pinned
archives and instructions about changing the default number of archives saved, see the Enterprise
Manager™ Administrator Guide.
1. On the Main tab, click Enterprise Management > Tasks > Schedules > Archive Collection.
The Archive Collection screen opens.
2. Click the Create button.
3. In the Archive File Name field, type a name for the rotating archive schedule.
4. From the Check for Changes list, select the frequency that you want Enterprise Manager to check the
configurations of your managed devices.
24
Enterprise Manager™: Getting Started Guide
The Archive Collection list screen opens and the new rotating archive schedule appears in the list. If a
device in the Assigned list changes its configuration during the interval you specified, Enterprise Manager
creates an archive of the device's configuration and adds it to the rotating archives on the Archives Collection
screen.
Important: If you choose not to have Enterprise Manager™ store the private keys when a configuration
archive is created, you must manually restore the keys if you restore the archive.
1. From the Main tab, click Enterprise Management > Options > Certificates > SSL Private Keys.
2. From the Private Keys in Archives list, select an option:
Options Description
Include Select this option if you want the system to store private key data when it creates
a configuration archive. This is the default setting.
Exclude Select this option if you do not want the system to store private key data when
it creates a configuration archive. Note that if you select this option, you must
manually restore the keys if you restore the archive.
25
Optional Configuration
Important: Enterprise Manager collects statistics only from devices that have BIG-IP® Local Traffic
Manager™ licensed and provisioned. Starting with Enterprise Manager version 2.3, Enterprise Manager
can also collect statistics from devices licensed and provisioned for BIG-IP Global Traffic Manager™.
To start collecting statistics, you must enable the collect statistics data feature and install the Data Collection
Agent.
Note: For additional information about the health and performance monitoring feature, see the
Enterprise Manager™ Administrator Guide.
Important: Due to the processing power required to collect and store statistics data, only Enterprise
Manager™ 3000 and 4000 platforms and Enterprise Manager Virtual Edition (VE) support statistics
data collection. If you are upgrading from a version of Enterprise Manager that is earlier than 1.7,
you must re-license the system before enabling data collection.
1. On the Main tab, click Enterprise Management > Options > Statistics > Data Collection.
2. For the Collect Statistics Data setting, select Enabled.
3. Click the Save Changes button.
When you enable statistics collection, Enterprise Manager verifies that each managed device has a compatible
version of the Data Collection Agent installed.
1. On the Main tab, click Enterprise Management > Tasks > Task List.
2. Click the New Task button.
3. For the Software Installation setting, click Install Data Collection Agent, and then click Next.
The Data Collection Agent Installation screen opens.
4. For the Device Filter setting, click the Devices with data collection enabled requiring update option.
The screen refreshes to display the devices that require an update.
5. Select the check box next to each device on which you want to install the most recent version of the
Data Collection Agent, and click Next.
The Task Options screen opens.
6. From the Configuration Archive list, select an option to include or exclude private SSL keys in the
configuration archive.
7. From the Device Error Behavior list, select an option to specify how you want the system to proceed
if an error occurs during the Data Collection Agent installation task.
8. Click Next.
The Task Review screen opens.
26
Enterprise Manager™: Getting Started Guide
9. In the Task Name field, you can type a new name to customize the name that displays in the task list.
10. Click the Start Task button.
The Task Properties screen opens, displaying the progress of the task. The task progress displays as
Finished when the Data Collection Agent is installed.
Enterprise Manager starts collecting and storing health and performance monitoring statistics for the devices
on which data collection is enabled and the Data Collection Agent is installed.
27
Optional Configuration
To send SNMP traps in this manner, you provide the SNMP agent and SNMP client access to the Enterprise
Management system. As Enterprise Manager system shares the same operating system as a BIG-IP® system,
you can configure SNMP on the Enterprise Manager system in the same way that you do on a BIG-IP
system. For detailed information about how to configure SNMP traps, see the TMOS® Management Guide
for BIG-IP® Systems. The SNMP versions that the Enterprise Manager system supports are: SNMP v1,
SNMP v2c, and SNMP v3.
If you want to have a specific recipient receive an email message when an alert is triggered, you must
complete specific tasks so that Enterprise Manager™ can deliver locally generated email messages.
Attention:
To perform the specific tasks, you must have administrator privileges with root access for the
Configuration utility.
Task summary:
1. On the Main tab, click System > Configuration > Device > DNS.
2. In the DNS Lookup Server List area, in the Address field, type the IP address of your DNS server(s).
3. Click the Add button.
4. Click Update to save the changes.
28
Enterprise Manager™: Getting Started Guide
;; QUESTION SECTION:
;siterequest.com. IN MX
;; ANSWER SECTION:
siterequest.com. 86400 IN MX 10
mail.siterequest.com.
;; Query time: 65 msec
;; SERVER: 172.16.100.1#53(172.16.100.1)
;; WHEN: Mon Nov 8 14:32:07 2011
;; MSG SIZE rcvd: 51
1. On the Main tab, click Enterprise Management > Options > Alerts.
2. In the Email Recipient field, type the email address of the user, or the alias, that you want to Enterprise
Manager™ to send the alert to by default.
3. If you want to log alert events to a syslog file:
a) In the Syslog Server Address field, type the IP address of the remote server where you want to store
alert event logs.
b) In the Maximum History Entries field, type the maximum number of alerts that you want stored
in the syslog file.
If the alert history reaches the limit you set, Enterprise Manager deletes the oldest entries to create
room for newer entries.
1. Using a text editor, such as vi or pico, edit the configuration file: /etc/postfix/main.cf.
2. Find the variable mydomain, and change it to specify the domain for your site. For example, for domain
siterequest.com you would type the following command:
mydomain = siterequest.com.
3. Set the relayhost variable as in the following example.
relayhost = $mydomain
4. If you want only the local host to send email, set the inet_interfaces variable to local host by typing the
following command:
inet_interfaces = localhost
5. Save and exit the file.
29
Optional Configuration
8. Change the root alias to the email account to which you want mail to be sent.
For example: root: [email protected]
9. Save and exit the file.
10. Type the following command: newaliases
11. Send a test email by typing the following command:
t>echo test | mail <your email address>
If configured properly, the email is delivered to the address that you specified in the
/etc/postfix/aliases file.
12. Type the service postfix restart command and press Enter.
Administrator This role (non-restricted) can perform all management functions available
to Enterprise Manager, including managing other user accounts and roles.
Operator and Application By default, these roles (restricted) perform fewer management tasks than
Editor the Administrator. You can customize each role by specifying the tasks that
the role is allowed to perform.
1. On the Main tab, click Enterprise Management > Access Control > Role Permissions.
2. For each restricted user role, select or clear the check box next to the permission you want to modify.
3. Click Apply to save your changes.
30
Enterprise Manager™: Getting Started Guide
1. On the Main tab, click Enterprise Management > Options > Proxies.
2. On the menu bar, click Options.
3. In the Internet Proxy area, select the Use Proxy check box.
The screen refreshes, displaying additional options.
4. In the SSL Proxy Address field, type the address of the SSL proxy server.
5. If you want to use a separate SSL proxy for FTP connections:
a) Clear the Also use this proxy address for FTP protocol check box.
b) In the FTP Proxy Address field, type the FTP proxy server address.
6. Click Save Changes.
31
Optional Configuration
Specifying a proxy server for communication between Enterprise Manager and devices
By default, Enterprise Manager™ communicates with devices through HTTPS. You have the option to
specify a proxy server for communication between Enterprise Manager and your network devices.
1. On the Main tab, click Enterprise Management > Options > Proxies.
2. In the Device Proxy area, select the Use Proxy check box.
The screen refreshes, displaying additional options.
3. In the EM-side SSL Proxy Address field, type the SSL proxy server address that you want to use for
Enterprise Manager.
4. If you want to use the same SSL proxy address for the device side, select the Also use this proxy address
for the device-side connections check box.
5. To specify a separate device-side SSL proxy address, in the Device-side SSL Proxy Address field, type
the SSL proxy server address that you want to use for your devices.
6. Click Save Changes.
32
Index
Index
A DNS resolution (continued)
verifying 28
administrator account, configuring credentials 15 DNS zone files, and UCS archives 24
administrator-level user account, default 30 documentation, finding 10
Administrator user role, defined 30
alert history, specifying default maximum 29
alerts
E
about 27 email notifications, configuring for alerts 29
configuring email notification 29 email recipient, specifying for alert default 29
setting defaults 29 Enterprise Manager
specifying mailserver domain name 29 about 10
Application Editor user role, defined 30 customizing 24
finding documentation for 10
B external VLAN, configuring 16
C
H
communication ports, described 12
configuration archive, and private key storage options 25 health and performance monitoring database
about 25
storing statistics locally 25
D health and performance monitoring data collection
and hardware requirements 26
database, See health and performance monitoring database. and software requirements 26
Data Collection Agent, installing 26 history, for alerts 29
default settings host name, specifying 15
and communication 31 HTTPS, and communication with devices 32
for startup screen 27
device communication
and default behavior 31 I
and interfaces 11
device discovery initial setup and configuration, for Enterprise Manager 14
for non-BIG-IP devices 21 interfaces, defined 11
performing 20 internal VLAN, configuring 16
Device List screen
and discovered devices 20 L
defined 27
device performance, monitoring 25 license, activating for Enterprise Manager 14
devices
and communication with Enterprise Manager 11
discovering 20
M
Device Statistics screen, defined 27 mailserver domain name, specifying for email alerts 29
discovery, defined 20 management interface
DNS resolution defined 11
specifying DNS server 28 for device management 12
33
Index
R V
redundant system VLANs, configuring for basic network 16
and interface recommendations 12
specifying for a basic network configuration 16
release notes, finding 10
W
remote database, and port 3306 12 WANJet devices, importing 21
restricted user roles, defined 30 Welcome screen, defined 27
root account, configuring credentials 15
34