5.5. Creating an Inbound Gateway Deployment

You have created an SSL Orchestrator Inspection Service, a Service Chain, and a Traffic Policy. The next step is to apply this to an application.

5.5.1. Create an Inbound Gateway Application with SSL Orchestrator Policy

  1. In the BIG-IP Central Manager GUI, click on the Workspace icon to show the Workspace Menu.

  2. Click on Applications to navigate to the Applications workspace. You should see the applications that you created in the previous lab module.

    ../../_images/igm-app-0.png
  3. Click on + Add Application to open the Add Application panel.

  4. Enter my-sslo-lab3-app in the Application Service Name field.

  5. Click the From Template button.

    ../../_images/igm-app-1.png
  6. Click on Select Template and then select sslo-inbound-gateway-topology.

    ../../_images/igm-app-2.png
  7. Click on the Start Creating button to open the Application Service Properties panel.

  8. Enter My SSLO inbound gateway application in the Description field.

  9. Click Start Creating to reveal the Virtual Server configuration options.

  10. In the Virtual Servers box, enter my-inbound-gw for the name of your new application and leave the Virtual Port set to 0.

    ../../_images/igm-app-3.png

    Important

    No Pool is configurable for an Inbound Gateway Mode deployment.

  11. In the Protocols & Profiles field, click on the edit icon to open the settings panel.

  12. Enable (toggle on) the Enable HTTPS (Client-Side TLS) option to show additional settings.

    • Click on the Add button to open the configuration panel.
    • In the Add Client-Side TLS panel, enter wildcard.f5labs.com as the name
    • Select wildcard.f5labs.com in the RSA certificate dropdown list box. This certificate was pre-installed in your lab environment.
    • Click on the Save button to close the panel.
  13. Scroll down to see the other Protocol & Profiles options.

  14. Enable (toggle on) the Enable Server-side TLS option.

  15. Ensure that the Enable SNAT and Enable Auto SNAT options are enabled (default).

  16. Click on the Save button to the close the Protocols & Profiles panel.

    Notice that the TLS and HTTPS labels were added.

    ../../_images/igm-app-4.png
  17. In the Security Policies column, click the edit icon to open the Security Profiles panel.

  18. Enable (toggle on) the Use an SSL Orchestrator Policy option and then select your SSL Orchestrator traffic policy.

    ../../_images/igm-app-5.png
  19. Click Save to close the panel.

    Notice that the SSLO label now shows in the Security Policies column.

    ../../_images/igm-app-6.png
  20. At the bottom right corner, click on the Review & Deploy button to open the Deploy panel.

    • Click on the Start Adding button.
    • Select the instance named bigip-next.f5labs.com.
    • Click on the + Add to List button.
  21. In the Virtual Address field, enter 0.0.0.0/0.

    Important

    This will create a listener for all incoming addresses.

    Also note that the Pool field is empty.

    ../../_images/igm-app-7.png
  22. In the Configure column, click the edit icon to open a panel with additional settings.

    • Enable (toggle on) the Enable VLANs to listen on option
    • Select clientside.
    ../../_images/igm-app-8.png
  23. Click on the Save button to return to the Deploy screen.

  24. Click on the Validate All button to validate the pending configuration changes.

  25. If validation is successful, you will see Validated.

  26. [Optional] Click on the View Results link to view the configuration and then click Exit to close the results panel.

    ../../_images/igm-app-9.png
  27. Click on the Deploy Changes button. Then, click on the Yes, Deploy button to send the application configuration to the BIG-IP Next instance.

When the deployment has completed, the Application Services dashboard will show the status of the new application.

../../_images/igm-app-10.png