background image

Timeline capabilities

The customizable timeline capabilities give you the ability to produce a statistical analysis based on a
specified range of time. When you first open the analytics dashboard, the default refresh time is set at 5
minutes. You can change the refresh rate to several different settings by selecting from the 

5 min.

 list at

the top of the screen.

1 min.

5 min.

, or 

10 min.

 options reset the refresh time in minutes.

Off

 freezes the data refresh collection.

You can also update the statistics on demand by selecting 

Refresh

 above the timeline.

Customizing timeline capabilities

You can customize the range of time in which you would like to view data, in both the charts and tables.
When you first launch the analytics dashboard, the default range of time is set at the 

Last hour

. You can

change the range of time that appears on the timeline to several different settings.

1.

On the Main tab, click 

SSL Orchestrator

 > 

Analytics

 > 

Statistics

 to view the default charts, on the

left, and dimensions, such as Client Cipher Names, Virtual Servers, and Actions, on the right. The
default time for collecting data is set to show statistics gathered over the last hour.
The Statistics screen opens.

2.

Above the timeline, from the 

Last hour

 list, select the range of time you would like to view statistics

across.

Last hour

Last 4 hours

Last day

Last week

Last month

Last year

Year to date

All

The range of time you specified appears above the timeline bar.

3.

Use the timeline sliders at each end of the timeline, to manually scroll back and forth, further
narrowing in on ranges of time that are critical to the ongoing performance and health of your
system's SSL orchestration.
Once the sliders have been manipulated, you can also click and drag the bar above the timeline based
on the newly specified timeline.

Chart capabilities

You can reorder the customizable line charts by dragging them up or down to a different place in the
chart stack. You can also minimize them so to hide their information.

Using Herculon SSL Orchestrator Analytics

48

Содержание Herculon SSL Orchestrator

Страница 1: ...F5 Herculon SSL Orchestrator Setup Version 13 1 3 0 ...

Страница 2: ......

Страница 3: ...ransparent proxy 23 Configuring the system for explicit proxy 23 Configuring the system for both transparent and explicit proxies 24 Creating Services Service Chains and Classifier Rules 27 Overview Creating services service chains and classifier rules 27 Creating inline services for service chains 27 Creating ICAP services 29 Creating receive only services for traffic inspection 30 Creating servi...

Страница 4: ...nalytics 47 About analytics dashboard capabilities 47 Timeline capabilities 48 Customizing timeline capabilities 48 Chart capabilities 48 Customizing chart capabilities 49 Table capabilities 49 Customizing table capabilities 49 Charting bytes in bytes out and hit count over time 50 Comparing statistics on the top virtual servers 50 Viewing the top sites bypassed 51 Viewing the top sites decrypted ...

Страница 5: ...cs tools It provides a wide range of SSL orchestration analytics that you can easily customize across multiple dimensions based on specified ranges of time The Herculon SSL Orchestrator single platform for unified inspection allows for the greatest flexibly without architectural changes to prevent new blind spots from emerging Some of the key functions include Dynamic security service chaining tha...

Страница 6: ...What is F5 Herculon SSL Orchestrator 6 ...

Страница 7: ...upport ICAP for other protocols You can configure up to ten ICAP services using F5 Herculon SSL Orchestrator For more information on ICAP services refer to the Creating ICAP services section Ingress device The ingress BIG IP system is the device or Sync Failover device group to which each client sends traffic In the scenario where both ingress and egress traffic are handled by the same BIG IP syst...

Страница 8: ...ias IP addresses that the BIG IP system substitutes for client IP source addresses when making connections to hosts on the external network A SNAT pool is a pool of translation addresses that you can map to one or more original IP addresses Translation addresses in a SNAT pool should not be self IP addresses Sync Failover device group A Sync Failover device group part of the Device Service Cluster...

Страница 9: ...ck the Run the Setup Utility link The Herculon SSL Orchestrator Setup Wizard guides you through the basic minimal setup configuration for Herculon SSL Orchestrator 1 On the Welcome screen click Next 2 On the License screen click Activate 3 On the EULA screen click Accept The license activates and the system reboots for the configuration changes to take effect 4 After the system reboots click Conti...

Страница 10: ...Click Next This completes the configuration of the internal self IP addresses and VLAN and the External VLAN screen opens 17 Specify the Self IP setting for the external network a In the Address field type a self IP address b In the Netmask field type a network mask for the self IP address c For the Port Lockdown setting retain the default value 18 In the Default Gateway field type the IP address ...

Страница 11: ...e and click Restore Your BIG IP configuration is now safely restored Modifying your Herculon SSL Orchestrator configuration We recommend that you back up your BIG IP configuration prior to making any changes to your F5 Herculon SSL Orchestrator configuration Refer to the Backing up the BIG IP Configuration section of this document for more information You can modify your existing Herculon SSL Orch...

Страница 12: ... in further diagnosing any issues After completing a F5 Herculon SSL Orchestrator configuration deployment or if you are performing an undeployment you can diagnose your deployment status 1 On the Main tab click SSL Orchestrator Configuration The General Properties screen opens 2 On the General Properties screen click either Deploy or Undeploy Above the network diagram the application status displ...

Страница 13: ...evices with a cleartext zone between them list select one of the options If the same BIG IP system receives both ingress and egress traffic on different networks use No use one BIG IP device for ingress and egress If you are configuring separate devices for ingress and egress traffic use Yes configure separate ingress and egress BIG IP devices 4 From the Which IP address families do you want to su...

Страница 14: ...s pass non TCP non UDP traffic such as IPsec SCTP OSPF and so on if you want the system to pass all traffic that is not TCP or UDP through the transparent proxy If you choose this option this traffic will not be classified or processed by any service chain Use No block all non TCP non UDP traffic such as IPsec SCTP OSPF and so on for the system to block all non TCP and non UDP traffic This option ...

Страница 15: ...ains and classifier rules Configuring logging Before configuring logging for F5 Herculon SSL Orchestrator complete all areas in General Properties Refer to the Configuring general properties section of this document for more information You can generate log messages to help you monitor and optionally debug system activity And you can choose the level of logging you want the system to perform Log m...

Страница 16: ...nd remote domain and cipher records This option can slow performance on your system 5 Click Save You have configured logging options and completed the basic Herculon SSL Orchestrator configuration Configuring an ingress and egress device on one system The ingress device is either a device or a Sync Failover device group where each client sends traffic The egress device is either a device or a Sync...

Страница 17: ...cessary nameserver IP addresses proceed to step 13 12 In the List local private Forward Zones setting click Add and type the IP address of one or more nameservers 13 From the Do you want to use DNSSEC to validate DNS information list select whether you do or do not want to use DNSSEC to validate the DNS information 14 In the Egress Device Configuration area from the Do you want to SNAT client IP a...

Страница 18: ...ic IPv6 networks via the IPv6 gateways above Enter the prefix mask length CIDR of each network Non public IPv6 networks are those outside the 2000 3 block such as ULA networks in the fc00 7 block 20 Click Save You have now configured an ingress device and an egress device located on one system This describes only the fields lists and areas needed to configure an ingress and egress device on one sy...

Страница 19: ...rator If you select Send DNS queries directly to nameservers across the internet proceed to step 15 If you select Send DNS queries to forwarding nameservers on the local network proceed to step 16 15 From the Do you want to configure local private DNS zones list select whether you do or do not want to configure local or private DNS zones If you select No do not configure any local private DNS zone...

Страница 20: ...is either a device or a Sync Failover device group that receives traffic after a connection travels through the specified service chain and directs the traffic to the final destination When users set up separate ingress and egress devices they send each other control messages These can go through the decrypt zone or around it if you configure a different path through the network In either case the...

Страница 21: ...SNAT addresses will vary whether you selected Support IPv4 only Support IPv6 only or Both IPv4 and IPv6 Type at least as many IP host addresses as the number of TMM instances on the ingress device Each address must be uniquely assigned and routed to the ingress device It is best to assign addresses which are adjacent and grouped under a CIDR mask for example 203 0 113 8 up through 203 0 113 15 whi...

Страница 22: ...affic via one or more service device s and proceed to step 20 20 Options to provide the outbound gateway addresses will vary whether you selected Support IPv4 only Support IPv6 only or Both IPv4 and IPv6 Type the IP addresses of the inward interface of the first Layer 3 device in the decrypt zone or the decrypt zone gateway In the What are the IPv4 decrypt zone gateway addresses field type the IPv...

Страница 23: ...CTP OSPF and so on if you want the system to pass all traffic that is not TCP or UDP through the transparent proxy If you choose this option this traffic will not be classified or processed by any service chain Use No block all non TCP non UDP traffic such as IPsec SCTP OSPF and so on for the system to block all non TCP and non UDP traffic 6 Click Save You have now configured Herculon SSL Orchestr...

Страница 24: ...nfiguration so clients are unaware of the proxy in the network 1 On the Main tab click SSL Orchestrator Configuration The General Properties screen opens 2 Scroll down to the Which IP address families do you want to support list and select whether you want this configuration to Support IPv4 only Support IPv6 only or Both IPv4 and IPv6 If you do not choose to support both address families you must ...

Страница 25: ...eld type the IPv6 address and port In both the What IPv4 address and port should the explicit proxy use and What IPv6 address and port should the explicit proxy use fields type both the IPv4 and IPv6 address and port information You have now configured Herculon SSL Orchestrator to work in both transparent and explicit proxy modes This describes only the fields lists and areas needed to configure H...

Страница 26: ...Setting Up a Basic Configuration 26 ...

Страница 27: ...ock prefix or both will vary whether you selected Support IPv4 only Support IPv6 only or Both IPv4 and IPv6 In the What is the IPv4 CIDR 19 subnet block base address field type the address block F5 recommends the default block 198 19 0 0 19 to minimize the likelihood of address collisions Note When using Layer 3 inline services you must address your systems to match the required ranges Even though...

Страница 28: ...fic through port 8080 Use Yes to Port 8443 to send all HTTP traffic through port 8443 9 From the Connection Handling On Outage list select one of the following Use Skip Service to allow connections to skip the service you are configuring if all the devices in the service are unavailable Use Reject Connection for the system to reject every connection reaching the service when the service is down 10...

Страница 29: ...t at the time of the request The specific page name for the request and response must be manually entered to complete the URI For example if the request URI for the ICAP servers will be icap 10 1 2 3 1344 REQ you enter REQ in the request field If you select Custom the Request and Response fields are empty and the entire URI content must be manually entered In this case Herculon SSL Orchestrator wi...

Страница 30: ...ation 4 In the MAC Address field type the MAC address of the receive only device 5 In the IP Address field type the nominal IP address for this device Each receive only device requires a nominal IP host address to identify the device in the BIG IP system 6 From the VLAN list select the VLAN where the receive only device resides 7 From the Interface list select the associated BIG IP system interfac...

Страница 31: ... chain In addition you can also choose to send decrypted or non decrypted traffic to the inspection devices Note When configuring a single device Herculon SSL Orchestrator transparent proxy in front of an explicit proxy Herculon SSL Orchestrator can transparently intercept SSL traffic tunneled through an explicit proxy and selectively forward the decrypted user traffic through the security service...

Страница 32: ...tination filter you configure consists of one or more IP subnet or host addresses just like the Source filter For Geolocation the Destination you configure contains 2 letter country and 3 letter continent codes against which the IP Geolocation of the destination server is compared The continent codes are CAF Africa CAN Antarctica CAS Asia CEU Europe CNA North America COC Oceania CSA South The coun...

Страница 33: ...entation which selects the proper service chain to handle each connection A connection is a particular packet flow between client source and server destination identified by the 5 tuple of IP protocol TCP or UDP plus client source and server destination IP addresses and port numbers The classifier has a set of rules for TCP connections and another set of rules for UDP when UDP service chains are e...

Страница 34: ... Protocol list select the protocol of the connection based on the port number or protocol recognition 5 In the Source area select a Type and type a Value This option specifies the name of the Service Chain you configured that you want to use for this classifier rule 6 In the Destination area select a Mode and Type and type a Value This option specifies the destination of the connection The value o...

Страница 35: ...ifferences between the current configuration and the imported configuration prior to deployment 1 On the Main tab click SSL Orchestrator Configuration and on the menu bar click Settings Import Configs to view import configuration settings The Import Configurations screen opens 2 From the Import Configurations From list select File 3 Click Choose File and select the location of the configuration JS...

Страница 36: ...Click Deploy to deploy the past configuration into Herculon SSL Orchestrator A Deploy Comments popup dialog box opens where you can enter information specific to the successfully deployed past configuration You have now deployed a past configuration into Herculon SSL Orchestrator Exporting configurations for deployment Before you export configurations for deployment complete all areas in General P...

Страница 37: ...formation you selected to export is downloaded to your local system as a JSON file and can be imported and used to deploy configurations in other Herculon SSL Orchestrator environments F5 Herculon SSL Orchestrator Setup 37 ...

Страница 38: ...Importing and Exporting Configurations for Deployment 38 ...

Страница 39: ...closely review and follow all assumptions and dependencies HA Setup BIG IP HA CMI must be set to Active Standby mode with network failover See the BIG IP Device Service Clustering Administration document for detailed information on Active Standby HA mode HA Setup If the deployed device group is not properly synced or RPM packages are not properly syncing make sure your HA self IP for example ha_se...

Страница 40: ...n updated RPM file to ensure that this prerequisite has been properly completed Successfully set up an HA ConfigSync device group prior to starting the configuration See the section Configuring the network for high availability and its subsections to ensure that this prerequisite has been properly completed For additional information refer to the BIG IP Device Service Clustering Administration doc...

Страница 41: ...tem will copy it to the other systems in the ConfigSync group Later after a successful Herculon SSL Orchestrator HA deployment you should verify that the same version appears on the BIG IP HA peer device See the section Updating the Herculon SSL Orchestrator version for more detailed installation instructions Configuring the network for high availability You can specify the settings for VLAN HA an...

Страница 42: ... Address screen opens 7 In the Address field make sure that the VLAN address ha_vlan is present 8 Click Repeat 9 After the screen refreshes from the Address list select the Management Address Note Connection Mirroring is not supported 10 Click Finished The Failover Unicast Configuration area lists both the VLAN HA ha_vlan and Management Address devices Adding a device to local trust domain Any BIG...

Страница 43: ...pe and then select members and define the sync type a In the Members setting select available devices from the Available list and add them to the Includes list b From the Sync Type list select Manual with Incremental Sync Note You must do a manual sync If you select Automatic with Incremental Sync your HA deployment will fail 5 Click Finished The Device Groups list screen opens listing your new de...

Страница 44: ...rifying the RPM file version on both devices Configuring general properties and redeploying Reviewing error logs and performing recovery steps Verifying deployment and viewing logs You can verify your deployment by verifying that the required virtuals profiles and BIG IP LTM and network objects have been created checking that the RPM files are in sync and reviewing logs for failures for example No...

Страница 45: ...rculon SSL Orchestrator configuration utility and verify that all new objects are properly synced and deployed Note See the Configuring general properties section for more detailed information Reviewing error logs and performing recovery steps You can review log messages to help you debug system activity and perform recovery steps Refer to the Configuring logging section of this document for more ...

Страница 46: ...rom the list and delete the application 4 Redeploy and undeploy again 5 Once done remove the file rm f var config rest iapps enable d If these recovery steps do not work you may need to clean up the REST storage Note For more detailed information on setting up HA see the BIG IP Device Service Clustering Administration document Setting up Herculon SSL Orchestrator in a High Availability Environment...

Страница 47: ...istics generated for the following dimensions in tables Client Cipher Names Client Cipher Versions Server Cipher Names Server Cipher Versions Virtual Servers Servers the final destination Actions You can also use the Herculon SSL Orchestrator analytics Scheduled Reports to set up an automatic reporting schedule and later view any stored scheduled statistical records About analytics dashboard capab...

Страница 48: ...strator Analytics Statistics to view the default charts on the left and dimensions such as Client Cipher Names Virtual Servers and Actions on the right The default time for collecting data is set to show statistics gathered over the last hour The Statistics screen opens 2 Above the timeline from the Last hour list select the range of time you would like to view statistics across Last hour Last 4 h...

Страница 49: ...capabilities The customizable dimension tables can be reordered and expanded and minimized just like the line charts By using the menu at the top of the table on the dashboard you can expand the tables toward the center of the dashboard so that you can view all the table columns collecting statistics Customizing table capabilities You can select each column within a table individually and sort it ...

Страница 50: ...collecting data is set to show statistics gathered over the last hour The Statistics screen opens 2 To decrease the time range that is being analyzed adjust the sliders on the timeline at the top of the screen The data found in the charts and tables will adjust based on the new time range specified 3 To increase the time range that is being analyzed click Last Hour list and select a time range fro...

Страница 51: ...ables To switch to a table only view click the icon To change the widths of the tables and the charts across the display drag and drop the icon 4 In Actions select Bypassed 5 In Servers the servers on which SSL bypass has occurred the most frequently are at the top of the list Viewing the top sites decrypted You can use F5 Herculon SSL Orchestrator statistics to view and anaylze which servers decr...

Страница 52: ...cified ranges of time that you select and can easily adjust 1 On the Main tab click SSL Orchestrator Analytics Statistics to view the default charts on the left and dimensions such as Client Cipher Names Virtual Servers and Actions on the right The default time for collecting data is set to show statistics gathered over the last hour The Statistics screen opens 2 On the right expand the Server Cip...

Страница 53: ... Chart setting specify what you want to include in the report Criteria and measures that you can specify vary for the different types of reports a In the Filter setting from the lists select the time period and number of results to show b In the Chart Path select the top reporting criteria then select the measures to include in the report The criteria and measures differ depending on which Reporti...

Страница 54: ...Using Herculon SSL Orchestrator Analytics 54 ...

Страница 55: ...nts This product may be protected by one or more patents indicated at https f5 com about us policies patents Link Controller Availability This product is not currently available in the U S Export Regulation Notice This product may include cryptographic software Under the Export Administration Act the United States government may consider it a criminal offense to export this product from the United...

Страница 56: ...unless expressly approved by the manufacturer can void the user s authority to operate this equipment under part 15 of the FCC rules Canadian Regulatory Compliance This Class A digital apparatus complies with Canadian ICES 003 Standards Compliance This product conforms to the IEC European Union ANSI UL and Canadian CSA standards applicable to Information Technology products at the time of manufact...

Страница 57: ...ng for sync failover 43 device group continued synchronizing 43 device trust implementing 42 diagnostics 12 E egress device configuring 16 20 configuring on system with ingress device 16 on one system 16 error logs high availability 45 explicit proxies configuring 24 explicit proxy configuring 23 exporting configurations for deployment 35 exporting configurations about 35 G general properties conf...

Страница 58: ...eceive only services configuring 30 RPM file installing update 41 rules creating for TCP 31 S scheduled reports in analytics 52 server ciphers used finding 52 server protocols used finding 52 service chain classifier creating 33 creating for TCP 31 creating rules 31 service chain classifier continued rule 33 UDP 33 service chains about 27 configuring 30 services about 27 sites bypassed viewing 51 ...

Отзывы: