Lab 2.2: Configure an L3 inbound SSLO deployment through Guided ConfigurationΒΆ

In this scenario, an SSLO L3 inbound listener is configured as a gateway service. It will listen on a wildcard VIP (0.0.0.0/0), or otherwise specific subnet (vs. a dedicated single IP), and terminate inbound TLS traffic flows via wildcard or subject alternative name (SAN) certificate. Follow the L3 Inbound topology workflow to build this solution. In the SSL Orchestrator dashboard view, select the Topologies tab (bottom) and click Add.

  • Configuration review and prerequisites - take a moment to review the topology options and workflow configuration, then click Next.

  • Topology Properties

    • Name: provide some name (ex. "lab2_inbound")
    • Protocol: TCP
    • IP Family: IPv4
    • Topology: select L3 Inbound
    • Click Save & Next
  • SSL Configuration - an inbound topology requires different SSL settings.

    • Click Show Advanced Setting

    • Client-side SSL

      • Cipher Type: Cipher String

      • Cipher: DEFAULT

      • Certificate Key Chain - the certificate key chain represents the certificate and private key of an endpoint server instance (the target of a remote client's request). In a gateway-mode configuration, this would typically be a wildcard of Subject Alternative Name (SAN) certificate in the event the SSLO inbound listener was intended to service multiple sites. In this lab a wildcard certificate has been provided. Select the pencil icon to Edit, then select the wildcard.f5labs.com certificate and private key and click Done.

        Note

        SSL Settings minimally require RSA-based template and CA certificates but can also support Elliptic Curve (ECDSA) certificates.

    • Server-side SSL

      • Cipher Type: Cipher String
      • Ciphera: DEFAULT
      • Trusted Certificate Authority - as an inbound solution, the server-side SSL would be pointing to internal servers. While definitely possible to perform validation against internal server certificates, it is likely less important to do so. Leave this setting as is.
      • Expire Certificate Response - Assuming no internal certificate validation is needed, the default drop setting will cause the connection to fail, so set this to Ignore.
      • Untrusted Certificate Authority - Assuming no internal certificate validation is needed, the default drop setting will cause the connection to fail, so set this to Ignore.
      • [Advanced] OCSP - Assuming no internal certificate validation is needed, any OCSP configuration will cause the connection to fail, so leave this as is.
      • [Advanced] CRL - Assuming no internal certificate validation is needed, any CRL configuration will cause the connection to fail, so leave this as is.
    • Click Save & Next.

  • Services List - the same services can be leveraged here, so simply click Save & Next.

  • Service Chain List - the same service chains can be leveraged here, so simply click Save & Next.

  • Security Policy - the security policy requirements are specific to each organization, though an inbound security policy would likely be less complex than an outbound policy.

    Note

    SSL Orchestrator sends all traffic through an inline layer 3 or HTTP device in the same direction - entering through the service's "inbound" interface. It is likely, therefore, that the layer 3 device may not be able to correctlyroute both outbound (forward proxy) and inbound (reverse proxy) traffic at the same time. Please see the appendix, "Routing considerations for layer 3 devices" for more details.

    • Remove the built-in "Pinners_Rule" rule.
    • Edit the "All Traffic" policy to add the sub_service_chain with the FireEye and TAP services (only), and click OK.
    • Click Save & Next
  • Interception Rule - Here is where the gateway-mode topology and the existing application topology generally differ. Where an explicit application topology "bolts onto" an existing application that performs its own SSL management (SSL offload), traffic management (pools) and traffic intelligence (iRules, profiles), the gateway-mode SSLO topology provides a single, generic entry point for potentially multiple applications, and would sit in front of another ADC or routing device. This is mostly useful when an SSL visibility device must sit closer to the outer edge of an environment, and/or when the SSL visibility product "owner" does not otherwise own the applications or ADC(s).

    It is possible to configure an L3 Inbound topology configuration with a single target IP address and port and destination pool (targeted mode). However, an L3 Inbound topology must re-encrypt the inbound traffic. Therefore, there are two options for this lab (choose one):

    1. Gateway mode - interception rule listening on a wildcard IP, port 443, with a wildcard or SAN certificate. Clients route through SSLO.
      • Hide Advanced Setting
      • Source Address: 0.0.0.0/0
      • Destination Address/Mask: 0.0.0.0/0
      • Port: 443
      • VLANs: outbound (this is the server-side VLAN)
      • [Protocol Settings] L7 Profile Type - this setting enables or disables HTTP processing.
      • [Protocol Settings] L7 Profile - if the above option is set to HTTP, this option selects a specific HTTP profile. Set both to None, or both to HTTP and /Common/http.
    2. Targeted mode - interception rule listening on a dedicated IP, port 443, with any server certificate. Clients route to SSLO.
      • Show Advanced Setting
      • Source Address: 0.0.0.0/0
      • Destination Address/Mask: 10.30.0.200/32
      • Port: 443
      • VLANs: outbound (this is the server-side VLAN)
      • [Protocol Settings] Client TCP Profile - allows setting a custom client-side TCP profile.
      • [Protocol Settings] Server TCP Profile - allows setting a custom server-side TCP profile.
      • [Protocol Settings] SSL Configuration - allows setting a custom SSL setting.
      • [Protocol Settings] L7 Profile Type - this setting enables or disables HTTP processing.
      • [Protocol Settings] L7 Profile - if the above option is set to HTTP, this option selects a specific HTTP profile.
      • Pool - webserver-pool (pre-created server pool)

    Click Save & Next

  • Egress Settings - traffic egress settings are now defined per-topology and manage both the gateway route and outbound SNAT settings.

    • Manage SNAT Settings - enables per-topology instance SNAT settings. For this lab, select Auto Map.
    • Gateways - enables per-topology instance gateway routing. Options are to use the system default route, to use an existing gateway pool, or to create a new gateway. For this lab, select Default Route.
    • Click Save & Next
  • Summary - the summary page presents an expandable list of all of the workflow-configured objects. To expand the details for any given setting, click the corresponding arrow icon on the far right. To edit any given setting, click the corresponding pencil icon. Clicking the pencil icon will send the workflow back to the selected settings page.

  • When satisfied with the defined settings, click Deploy.