2.2. Lab Environment Details

Note

This lab guide and corresponding UDF lab blueprint are prepared for BIG-IP Next SSL Orchestrator, using a consolidated services lab architecture. All security services are consolidated into to a single Ubuntu server instance using a Docker Compose environment.


2.2.1. Network Diagram

Here is a visual representation of the virtual lab environment. The numbers inside the right edge of the SSL Orchestrator box indicate the port numbers and VLAN tags (if applicable). The colored boxes to the right of the services respresent some product examples for each respective service type.

The first interface is connected to the client-facing VLAN. The last interface is connected to the Internet-facing VLAN. One of the tagged interfaces connects to the application server VLAN. The remaining interfaces are connected to various types of security services: L2, L3, HTTP, ICAP, and passive Tap. The SSL Orchestrator management interface is not shown.

../../_images/labinfo-14.png

2.2.2. Virtual Lab Infrastructure Details (and Credentials)

The lab environment for this guide includes some prerequisite configuration settings that you should be aware of. These are provided to simplify this course. If you wish to use this lab guide with your own environment, please ensure that you create these objects in advance.

  • Client side VLAN and subnet are pre-defined - This is the VLAN that a client connects to for traffic flows. SSL Orchestrator does not define the client-side VLAN(s) and self-IP(s).

  • Server side VLAN and subnet are pre-defined - This is the VLAN that traffic egresses from the F5 BIG-IP to the web servers. SSL Orchestrator does not define the server-side VLAN(s) and self-IP(s). Consequently, the consolidated architecture will use the same interface on separate tagged VLANs to establish connectivity to the L3, HTTP, and ICAP inspection services.

  • TAP service VLAN is pre-defined - This is the VLAN that traffic egresses from the F5 BIG-IP to the TAP inspection service.

  • CA certificate and private key are installed - This is the CA certificate and private key that are used to re-issue (forge) remote server certificates to internal clients for outbound traffic flows.

  • Server certificate and private key are installed - For the inbound (reverse proxy) traffic flow use case, SSL traffic is terminated at the F5, and re-encrypted on the way to the internal application environment. A wildcard server certificate is installed to facilitate using any name under the "f5labs.com" sub-domain.

Note

It is a security best practice to isolate security devices within the protected network enclaves provided by SSL Orchestrator. Administrators will often desire NOT to move or change existing security services. However, while possible, passing this decrypted traffic to points on an existing network architecture could create multiple points of data exposure. Usernames, passwords, credit card numbers and other personally identifiable information (PII) could be exposed to other devices on that network. It is thus recommended that security devices exist in a "private enclave" local to the BIG-IP Next instance(s). Please keep this in mind when defining the network settings for the inspection services.*


Note

Special note about BIG-IP Next and Central Manager: The F5 Central Manager (CM) employs a "fleet management" configuration paradigm for BIG-IP Next and is the "source-of-truth" for all configuration state. In most cases, objects created in CM (like iRules) are only deployed to a Next instance when they are associated to an application. With respect to SSL Orchestrator, this also applies to service chains and traffic policies. The exemption to this is inspection services. While inspection services can be saved to CM and deployed later, they are generally deployed direct to an instance on creation, irrespective of applications, as they have network attributes that are typically specific to a BIG-IP Next instance. This will be made evident in the upcoming labs.

The following tables provide device/service network configuration details. Login credentials are also provided for use as directed in the lab exercises.

F5 BIG-IP Next Central Manager

Username

Password

Description

admin

Welcome123!

Admin account


Interface/Resource

IP

Notes

Management IP

10.1.1.6/24

Management VLAN

System DNS

10.1.1.1

Gateway IP/DNS

10.1.1.1


F5 BIG-IP Next SSL Orchestrator

Username

Password

Description

admin

Welcome123!

Admin account (pre-onboarding)


Interface

IP

Description

Management

10.1.1.7/24

Management VLAN

1.1

10.1.10.7/24

Client-Side VLAN (Ubuntu-Client)

1.2 (Tag 30)

198.19.96.7/25

Inline HTTP service - Inbound

1.2 (Tag 40)

198.19.96.245/25

Inline HTTP service - Outbound

1.2 (Tag 50)

198.19.97.7/25

ICAP Service - Inbound/Outbound

1.2 (Tag 60)

198.19.64.7/25

Inline L3 service - Inbound

1.2 (Tag 70)

198.19.64.245/25

Inline L3 service - Outbound

1.2 (Tag 80)

192.168.100.7/24

Server-side (lab webservers)

1.3

10.1.30.7/24

TAP service - Inbound

1.4

Future (10.1.40.0/24)

Inline L2 service - Inbound

1.5

Future (10.1.50.0/24)

Inline L2 service - Outbound

1.6

Future (10.1.60.0/24)

Internet


Client (inbound/outbound)

Interfaces

IP Address

VLAN

eth1

10.1.10.50

Client-Side VLAN


Access

Username

Password

WEB SHELL

N/A

N/A

RDP (XRDP)

user

user


Ubuntu Server (Consolidated Services)

Interfaces

IP Address

VLAN

eth1

10.1.20.50

Inline L3 services

eth2

10.1.30.50

TAP service

eth3

10.1.40.50

Inline L2 service - Inbound

eth4

10.1.50.50

Inline L2 service - Outbound


Access

Username

Password

WEB SHELL

N/A

N/A

WEBRDP (Client Desktop Access)

user

user

The WebRDP service leverages an instance of Guacamole running on the Ubuntu Server. This acts as a web-based RDP client that connects to the Client VM.


Inline Layer 2 Service

Description

Ubuntu server host -- ens8 and ens9

br0 (bridge) tied to ens8 and ens9 interfaces on host

Services

Suricata


Traffic Flow

BIG-IP Interface

Inbound

Future

Outbound

Future


Inline Layer 3 Service

Description

Ubuntu server host -- ens6.60 and ens6.70

Services

Firewall

Access

$ docker exec -it layer3 /bin/bash


Traffic Flow

BIG-IP Interface

Service IP Address

Inbound

1.2 tag 60

198.19.64.30/25

Outbound

1.2 tag 70

198.19.64.130/25


HTTP Explicit Proxy Service

Description

Ubuntu server host -- ens6.30 and ens6.40

Services

Squid - Port 3128

Access

$ docker exec -it explicit-proxy /bin/bash


Traffic Flow

BIG-IP Interface

Service IP Address

Inbound

1.2 tag 30

198.19.96.30/25

Outbound

1.2 tag 40

198.19.96.130/25


TAP Service

Description

Ubuntu server host -- ens7

ens7 interface tied to tap service on host

Services

Passive TAP


Traffic Flow

BIG-IP Interface

MAC Address

In/Out

1.3

12:12:12:12:12:12 (arbitrary if directly connected)


ICAP Service

Description

Ubuntu server host -- ens6.50

Services

ICAP Clamav

Access

$ docker exec -it icap /bin/bash


Traffic Flow

BIG-IP Interface

Service IP Address

In/Out

1.2 (Tag 50)

198.19.97.50

REQ/RES URLs

/avscan

Port 1344


Internal Web Server

Description

Ubuntu server host -- ens6.80

Services

Apache web server

*.f5labs.com

Access

$ docker exec -it apache /bin/bash


Traffic Flow

BIG-IP Interface

Service IP Address

In/Out

1.2 (Tag 80)

192.168.100.11 : Ports 80 & 443

192.168.100.12 : Ports 80 & 443

192.168.100.13 : Ports 80 & 443


Juiceshop

Description

Ubuntu server host -- ens6.80

Services

NGINX app

Access

$ docker exec -it nginx /bin/sh


Traffic Flow

BIG-IP Interface

Service IP Address

In/Out

1.2 (Tag 80)

192.168.100.20 : Ports 80 & 8443


Warning

Simple passwords were used in this lab environment in order to make it easier for students to access the infrastructure. This does not follow recommended security practices of using strong passwords.

This lab environment is only accessible via an authenticated student login.