This post is second part for configuring F5 BigIP LTM v11.5.3  High Availability. You can find other related posts in this blog:

1. Topology:

Logical Topology:

F5_HA_zpsuferapcp.png?resize=800%2C573&ssl=1F5_HA_zpsuferapcp.png?resize=800%2C573&ssl=1

Four Networks:

  • Management Network – Network Adapter 1 in F5 VE – 192.168.2.26/24 and 192.168.2.27/24
  • Internal Network – Network Adapter 2 in F5 VE – 10.1.1.1/24 and 10.1.1.2/24
  • External Network – Network Adapter 3 in F5 VE – 172.17.3.1/24 and 172.17.3.2/24
  • HA Network – Network Adapter 4 in F5 VE – 192.168.1.1/24 and 192.168.1.2/24

Networking Configuration in my Virtual Lab Environment:

2016-04-02_10-58-21_zpswk9yqilt.png?resize=716%2C677&ssl=12016-04-02_10-58-21_zpswk9yqilt.png?resize=716%2C677&ssl=1

2. Mgmt Interface Configuration:

Log in with username root and password default.

There are two different ways to do F5 VE management port settings. One is from part 1 using tmsh commands. Or we could use config wizard as show below.

After logged in, use config wizard to change your Mgmt Interface IP address and default route.

Last login: Sat Apr  2 10:15:55 2016
[[email protected]:NO LICENSE:Standalone] config # config

 
2016-04-02_13-30-55_zpshha9ddqh.png?resize=708%2C327&ssl=12016-04-02_13-30-55_zpshha9ddqh.png?resize=708%2C327&ssl=1



2016-04-02_13-31-52_zpsvmcwvl5g.png?resize=713%2C315&ssl=12016-04-02_13-31-52_zpsvmcwvl5g.png?resize=713%2C315&ssl=1

 



2016-04-02_13-32-14_zpsahenezjd.png?resize=659%2C186&ssl=12016-04-02_13-32-14_zpsahenezjd.png?resize=659%2C186&ssl=1



2016-04-02_13-32-37_zpsqlipb6ky.png?resize=628%2C160&ssl=12016-04-02_13-32-37_zpsqlipb6ky.png?resize=628%2C160&ssl=1

 



2016-04-02_13-32-57_zps96pc8jcj.png?resize=628%2C159&ssl=12016-04-02_13-32-57_zps96pc8jcj.png?resize=628%2C159&ssl=1

 



2016-04-02_13-33-19_zpsczihwynv.png?resize=623%2C160&ssl=12016-04-02_13-33-19_zpsczihwynv.png?resize=623%2C160&ssl=1

 


3. Activate Trial License for both VE

You can get your 90 day free trial license from https://www.f5.com/trial/big-ip-ltm-virtual-edition.php

2016-04-02_22-27-37_zpsu4h7vyph.png?resize=800%2C581&ssl=12016-04-02_22-27-37_zpsu4h7vyph.png?resize=800%2C581&ssl=1

After entered the registration key into your VE license page, you will get a dossier to generate license from F5 license activation page – https://activate.f5.com/license/dossier.jsp

admin/admin is the default Web GUI account. Here is how your VE looks like after activated license.

2016-04-03_13-41-33_zpsgil7fvub.png?resize=800%2C575&ssl=12016-04-03_13-41-33_zpsgil7fvub.png?resize=800%2C575&ssl=1

4. Create VLANs

Interface 1.1 -> Internal Vlan -> 10.1.1.1 and 10.1.1.2, floating IP is 10.1.1.3
Interface 1.2 -> External Vlan -> 172.17.3.1 and 172.17.3.2, floating IP is 172.17.3.3
Interface 1.3 -> SYNC HA Vlan -> 192.168.1.1 and 192.168.1.2

4.1 Using Wizard

2016-04-08_20-07-19_zpsy9sqonbi.png?resize=715%2C523&ssl=12016-04-08_20-07-19_zpsy9sqonbi.png?resize=715%2C523&ssl=1

 



2016-04-08_20-10-10_zpsitmkdtpn.png?resize=800%2C460&ssl=12016-04-08_20-10-10_zpsitmkdtpn.png?resize=800%2C460&ssl=1

 



2016-04-08_20-10-53_zpsokvgg29d.png?resize=570%2C528&ssl=12016-04-08_20-10-53_zpsokvgg29d.png?resize=570%2C528&ssl=1

 



2016-04-08_20-11-56_zps8wgrcn1r.png?resize=570%2C360&ssl=12016-04-08_20-11-56_zps8wgrcn1r.png?resize=570%2C360&ssl=1

 



2016-04-08_20-12-25_zpshontdhd8.png?resize=372%2C193&ssl=12016-04-08_20-12-25_zpshontdhd8.png?resize=372%2C193&ssl=1




2016-04-08_20-12-49_zpsjjco0ofj.png?resize=800%2C281&ssl=12016-04-08_20-12-49_zpsjjco0ofj.png?resize=800%2C281&ssl=1

 



2016-04-08_20-13-04_zps8lwaildv.png?resize=378%2C211&ssl=12016-04-08_20-13-04_zps8lwaildv.png?resize=378%2C211&ssl=1

 


2016-04-08_20-13-27_zpsc9tvzbio.png?resize=800%2C295&ssl=12016-04-08_20-13-27_zpsc9tvzbio.png?resize=800%2C295&ssl=1

 



2016-04-08_20-14-07_zpseqeo5uox.png?resize=800%2C587&ssl=12016-04-08_20-14-07_zpseqeo5uox.png?resize=800%2C587&ssl=1



 

4.2 Manually

2016-04-07_20-48-52_zpsy0dd0lkx.png?resize=800%2C552&ssl=12016-04-07_20-48-52_zpsy0dd0lkx.png?resize=800%2C552&ssl=1

 



 
2016-04-07_20-50-26_zpscy5spn79.png?resize=800%2C419&ssl=12016-04-07_20-50-26_zpscy5spn79.png?resize=800%2C419&ssl=1



2016-04-07_20-51-02_zpsaybnrujj.png?resize=800%2C418&ssl=12016-04-07_20-51-02_zpsaybnrujj.png?resize=800%2C418&ssl=1

 


2016-04-07_20-53-20_zps9wvjxljm.png?resize=800%2C540&ssl=12016-04-07_20-53-20_zps9wvjxljm.png?resize=800%2C540&ssl=1


 
 


You can verify self ip addresses by logging in F5 VE and pinging each other.
Last login: Sat Apr  2 20:09:33 2016
[[email protected]:Active] config # ping 10.1.1.3
PING 10.1.1.3 (10.1.1.3) 56(84) bytes of data.
64 bytes from 10.1.1.3: icmp_seq=1 ttl=255 time=2.71 ms
64 bytes from 10.1.1.3: icmp_seq=2 ttl=255 time=1.04 ms
^C
— 10.1.1.3 ping statistics —
2 packets transmitted, 2 received, 0% packet loss, time 1001ms
rtt min/avg/max/mdev = 1.047/1.883/2.719/0.836 ms

[[email protected]:Active] config # ping 172.17.3.1
PING 172.17.3.1 (172.17.3.1) 56(84) bytes of data.
64 bytes from 172.17.3.1: icmp_seq=1 ttl=64 time=0.026 ms
^C
— 172.17.3.1 ping statistics —
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.026/0.026/0.026/0.000 ms
[[email protected]:Active] config # ping 172.17.3.2
PING 172.17.3.2 (172.17.3.2) 56(84) bytes of data.
64 bytes from 172.17.3.2: icmp_seq=1 ttl=255 time=62.4 ms
^C
— 172.17.3.2 ping statistics —
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 62.459/62.459/62.459/0.000 ms
[[email protected]:Active] config # ping 192.168.1.2
PING 192.168.1.2 (192.168.1.2) 56(84) bytes of data.
64 bytes from 192.168.1.2: icmp_seq=1 ttl=255 time=35.0 ms
^C
— 192.168.1.2 ping statistics —
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 35.005/35.005/35.005/0.000 ms
[[email protected]:Active] config # 


5. Device Group

2016-04-08_21-46-45_zps6fxmqyvv.png?resize=552%2C417&ssl=12016-04-08_21-46-45_zps6fxmqyvv.png?resize=552%2C417&ssl=1



 
2016-04-08_21-45-50_zps6h48dxvz.png?resize=744%2C420&ssl=12016-04-08_21-45-50_zps6h48dxvz.png?resize=744%2C420&ssl=1

 



Disconnected.jpg?resize=400%2C147&ssl=1Disconnected.jpg?resize=400%2C147&ssl=1

2016-04-08_21-48-20_zpsgdywkqfm.png?resize=800%2C529&ssl=12016-04-08_21-48-20_zpsgdywkqfm.png?resize=800%2C529&ssl=1

 




Notes:

Fix the F5 sync state disconnected issue:

  1. Device Groups >(device group previously setup) put both boxes back to available.
  2. Delete the existing device group.
  3. Reset Device Trust. Choose Generate New Self-Signed Authority.
  4. REBOOT THE VE!!!!!!
  5. Device Trust>Peer list. Establish peering. (It is able to see peer no problem.)
  6. Create device groups. “test-sync-failover”. Put both devices in “includes”. and check Network Failover.
  7. Confirm both devices are in the Device List area.
  8. Overview>(click self device)>choose “Sync Device to Group”>Choose “Overwrite Configuration”>Sync


6. iApp
Getting Started with the iApp for HTTP applications
To begin the HTTP iApp Template, use the following procedure.
6.1. Log on to the BIG-IP system.
6.2. On the Main tab, expand iApp, and then click Application Services.
6.3. Click Create. The Template Selection page opens.
6.4. In the Name box, type a name. In our example, we use HTTP-app_.
6.5. From the Template list, select f5.http.
The HTTP template opens.

2016-04-08_21-53-15_zpsqk1hbnhj.png?resize=685%2C460&ssl=12016-04-08_21-53-15_zpsqk1hbnhj.png?resize=685%2C460&ssl=1

2016-04-08_21-54-05_zpstptah4sv.png?resize=555%2C800&ssl=12016-04-08_21-54-05_zpstptah4sv.png?resize=555%2C800&ssl=1

 

2016-04-08_21-56-04_zpscsrxvv0j.png?resize=681%2C780&ssl=12016-04-08_21-56-04_zpscsrxvv0j.png?resize=681%2C780&ssl=1

 



2016-04-08_21-56-45_zpsbfil6wzq.png?resize=800%2C409&ssl=12016-04-08_21-56-45_zpsbfil6wzq.png?resize=800%2C409&ssl=1


 
after I changed the string at ‘What HTTP request should be sent to check the health of each HTTP server?’ from default value ‘GET /r/n’ to ‘GET /HTTP/1.0/rnrn’, the virtual server’s availability becomes green.
2016-04-08_22-34-08_zpscsks5qhf.png?resize=666%2C745&ssl=12016-04-08_22-34-08_zpscsks5qhf.png?resize=666%2C745&ssl=1
2016-04-08_22-34-35_zpssexoiabr.png?resize=794%2C541&ssl=12016-04-08_22-34-35_zpssexoiabr.png?resize=794%2C541&ssl=1

 
2016-04-08_22-34-56_zpscbxhwkgh.png?resize=458%2C586&ssl=12016-04-08_22-34-56_zpscbxhwkgh.png?resize=458%2C586&ssl=1

 

Reference: