Lab 3: Working with SSL and Persistence

Profiles are a powerful configuration tool providing an easy way to define traffic policies and apply those policies across many virtual servers. Profiles allow one to change a setting for traffic across different applications. Profiles provide the following:

  • A centralized place to define specific traffic behavior
  • A centralized place to change any setting and have them applied to all applications using an existing profile

Profile Types

Profiles are grouped to make configuration clearer. In general, a virtual server would have at most one profile from a given group. There are multiple types of profiles:

  • Services
  • Content
  • Persistence
  • Protocols
  • SSL
  • Authentication
  • Message Routing
  • Other

When you configure a profile you must use an existing profile as template (the parent) make the desired changes, and save the new profile. The parent can either be one of the default templates or a custom template. If the parent is later changed, the changes may flow through to your custom profile.

Task 1 – Configure a custom Client SSL Profile

  1. From the Windows 10 Jump Host log into BIG-IP01
  2. Click on Local Traffic, then click on Profiles, SSL, and then click on the + sign next to Client to create a new Client SSL Profile
  3. Name the custom Profile LTM_ClientSSL
  4. Check the Custom box
  5. Click on the Add button within the Certificate Key Chain section
  6. Select the f5demo.crt Certificate, then select the f5demo.key and click Add
  7. Click Finished


Task 2 - Configure a custom Persistence Profile

  1. From the Navigation pane expand the Local Traffic section and select Profiles, Persistence and click the + sign to create a new Profile.
  2. Name the new Profile LTM_Cookie_Insert
  3. Select the cookie Parent Profile, then select the HTTP Cookie Insert Method.
  4. In the Cookie Name field enter HelloWorld.
  5. Click Finished


Task 3 – Configure an SSL Virtual Server

  1. From the Navigation pane, expand the Local Traffic section and select Virtual Servers.
  2. Click on Create, name the new Virtual Server LAMP_SSL
  3. Provide a destination address of
  4. Provide a service port of 443
  5. Assign the default http Profile is selected in the HTTP Profile (Client) section.
  6. Assign the LTM_ClientSSL Profile to the LAMP_SSL Virtual Server by scrolling down to the SSL Profile (Client) section and selecting the LTM_ClientSSL Profile.
  7. Change the Source Address Translation setting to Auto Map
  8. In the Resources section select the LAMP Pool as the Default Pool
  9. Select the LTM_Cookie_Insert profile as the Default Persistence Profile.
  10. Click finished when complete.
  11. You should now have an SSL Virtual Server with a Client SSL Profile, a Custom Persistence Profile, and the Virtual Server should be assigned to the LAMP Pool.

Task 4 - Verifying the new SSL configuration and Persistence

  1. From the Windows 10 Jump Host open a new tab in Google Chrome and enter
  2. Google Chrome allows a user to view attributes such as SSL certificates and cookies. In order to verify the HelloWorld cookie attribute click on the Not Secure section to the left of the URL and then click the Cookies object. We can view the cookie by clicking the IP Address and then clicking on the Cookies object.
  3. Refresh the page a couple of times and check if your persistence profile is working. You should only receive elements from a single server.

This concludes Lab 3 and a basic introduction into the different types of Profiles as well as the capabilities and actions Profiles can have on Virtual Servers. You are encouraged to become familiar with the behavior Profiles can have on Virtual Servers and Pools.