CISCO-LOGOCISCO vooluandur ja koormuse tasakaalustaja

CISCO-Flow-Sensor-and-Load-Balancer-PRODUCT

Sissejuhatus

If a load balancer is installed in front of a resource on the network, it obscures visibility and may reduce the detection of threats in the Secure Network Analytics system. Use the instructions in this guide to configure the load balancer and Flow Sensor. This configuration stitches the client side and server side flows together, so the outside host connects to the inside host, providing visibility and enhanced security on the Flow Sensor and the Secure Network Analytics system.

Publik
The primary audience for this guide includes administrators responsible for configuring the Secure Network Analytics system.

Enne alustamist

Before starting the procedures in this guide, you should do the following:

  • Confirm that your Secure Network Analytics system is communicating. Go to the Desktop Client. Check the Alarm Table to make sure there are no active Management Channel Down or Failover Channel Down alarms.
  • Confirm that your Secure Network Analytics system appliance licenses are active.

Configuring the Load Balancer

Use the following instructions to configure the load balancer. You will disable the X-Forwarded-For (XFF) option for HTTP, create an iRule, and enable a virtual server resource. If you prefer to use an existing iRule, you can modify it using the information provided here. For successful integration, apply the instructions in this section to all load balancers in the network. The instructions in this guide show the configuration on an F5 Load Balancer as an example, but we believe this configuration can be used on all types of load balancers.

Disabling the XFF Option for HTTP
Use the following procedure to disable the XFF option for HTTP.
The built-in functionality to insert data in an XFF HTTP header must be disabled in the F5 Load Balancer as follows:

  1. Log in to the F5 Load Balancer configuration utility.
  2. Under the Main tab, click Local Traffic.
  3. Klõpsake nuppu Profiles > Services > HTTP.
    If HTTP is not shown in the Services menu, skip to step 8.
  4. CISCO-Flow-Sensor-and-Load-Balancer- (1)Click http.
  5. Under Settings, locate Insert X-Forwarded-For.
  6. Select Disabled from the drop-down list (or uncheck the Enabled check box to clear it). CISCO-Flow-Sensor-and-Load-Balancer- (2)
  7. Klõpsake nuppu Värskenda.
  8. From the Services menu, click Fast HTTP.
    If Fast HTTP is not available in the Services menu, skip the rest of this section. Proceed to Creating the iRule.
  9. Locate Insert X-Forwarded-For.
  10. Select Disabled from the drop-down list (or uncheck the Enabled check box to clear it).
  11. Click the Update button to save and exit.
  12. Continue to Creating the iRule.

Creating the iRule
Use the following instructions to add an iRule for the XFF header. This procedure is used to map the Load Balancer IP and ensure that accurate port and protocol information are reported to the Flow Sensor. If you prefer to use an existing iRule, you can modify it using the information provided here.

To create an iRule for the XFF header in the F5 Load Balancer, complete the following steps:

  1. In the Main tab, click Local Traffic.
  2. Click iRules.
  3. Klõpsake nuppu Loo.CISCO-Flow-Sensor-and-Load-Balancer- (3)
  4. In the Name field, enter xff. CISCO-Flow-Sensor-and-Load-Balancer- (4)
  5. Copy and paste the following text into the Definition field:
    when CLIENT_ACCEPTED {
    if { [PROFILE::exists clientssl] } then {
    set client_protocol “https”
    set local_port 443
    } muu {
    set client_protocol “http”
    set local_port 80
    }
    }
    when HTTP_REQUEST {
    if { [HTTP::header exists “X-Forwarded-For”] } {
    HTTP::header replace X-Forwarded-For “[HTTP::header X-Forwarded-For], [IP::client_addr]”
    } muu {
    HTTP::header insert “X-Forwarded-For” [IP::client_addr] }
    if { [HTTP::header exists “X-Forwarded-Proto”] } {
    HTTP::header replace X-Forwarded-Proto “[HTTP::header X-Forwarded-Proto], $client_protocol”
    } muu {
    HTTP::header insert “X-Forwarded-Proto” $client_protocol
    }
    if { [HTTP::header exists “X-Forwarded-Port”] } {
    HTTP::header replace X-Forwarded-Port “[HTTP::header X-Forwarded-Port], [TCP::client_port]”
    } muu {
    HTTP::header insert “X-Forwarded-Port” [TCP::client_port] }
    if { [HTTP::header exists “X-Forwarded-Host”] } {
    HTTP::header replace X-Forwarded-Host “[HTTP::header X-Forwarded-Host], [IP::local_addr]:$local_port”
    } muu {
    HTTP::header insert “X-Forwarded-Host” [IP::local_addr]:$local_port
    }
    }
  6. Click the Finished button to save and exit.
  7. Continue to Adding the iRule as a Virtual Server Resource.

Adding the iRule as a Virtual Server Resource
To enable a virtual server, the new XFF iRule must be added as a resource in the F5 Load Balancer. This step enables the load balancer to report the XFF Header.

  1. Under the Main tab, click Local Traffic.
  2. Click Virtual Servers.
  3. Locate the Service Port column and find Service Port 80 (HTTP) or 443 (HTTPS) that is handling the traffic handled by the device. Click the Virtual Server name.CISCO-Flow-Sensor-and-Load-Balancer- (5)
  4. Klõpsake vahekaarti Ressursid.
  5. In the iRules section, click the Manage button. CISCO-Flow-Sensor-and-Load-Balancer- (6)
  6. Scroll through the Available iRules to find the new XFF iRule. Click the XFF iRule to select it.
  7. Click on the << button to add the XFF iRule to the Enabled box. CISCO-Flow-Sensor-and-Load-Balancer- (7)
  8. Click the Finished button to save and exit.

Configuring All Load Balancers in the Network
If there are multiple load balancers chained on the network, apply the preceding instructions in this Configuring the Load Balancer section on each load balancer before proceeding to Enabling XFF Processing on the Flow Sensor.
Configuring each load balancer preserves the XFF information and appends it. In this configuration, the Flow Sensor will report only the original load balancer IP in the translated host.

Configuring the Load Balancer instructions include the following:

  • Disabling the XFF Option for HTTP
  • Creating the iRule
  • Adding the iRule as a Virtual Server Resource

Enabling XFF Processing on the Flow Sensor

To process the XFF header field on the Flow Sensor, complete the following steps:

  1. Logi sisse oma haldurisse.
  2. Click Configure > Global > Central Management.
  3. Click the (Ellipsis) icon for your Flow Sensor, then click View Appliance Statistics. The Flow Sensor Admin interface opens.
  4. Click Configuration > Advanced Settings.
  5. Check the Enable X-Forwarded-For Processing check box.CISCO-Flow-Sensor-and-Load-Balancer- (8)
  6. Klõpsake nuppu Rakenda.
  7. Repeat these instructions on all Flow Sensors in the network that are receiving load balancer support.
  8. Continue to Verifying the Configuration.

Konfiguratsiooni kontrollimine

To verify the load balancer configuration, log in to the Desktop Client or the Web App. The Desktop Client provides the load balancer IP address and port, and the Web Client provides the load balancer IP address.

Verifying the Configuration in the Manager Desktop Client
Use the following instructions to review the load balancer IP address and port in the Desktop Client.

  1. To generate X-Forwarded-For traffic on a client in front of the F5 Load Balancer, use a browser on a web server located behind the load balancer to log in to the Desktop Client.
  2. Locate the Flow Sensor in the Enterprise Tree. Right-click the Flow Sensor name (or IP address).
  3. Click Flows > Flow Table.
  4. Review the Translated Host and Translated Port columns to confirm the F5 Load Balancer IP address and port are shown.
    • Translated Host (load balancer IP address)
    • Translated Port (load balancer port)

CISCO-Flow-Sensor-and-Load-Balancer- (9)

Adding Columns to the Flow Table (Desktop Client)
If the Translated Host and Translated Port columns are not shown in the Desktop Client Flow Table, complete the following steps:

  1. Right-click any column.
  2. Scroll through the list. Select More until you reach the T’s.
  3. Click Translated Host and Translated Port to add them to the Flow Table.

Verifying the Configuration in the Web Rakendus
Use the following instructions to review the load balancer IP address in the Web App. The translated port is not available in the Web App. See Verifying the Configuration in the Manager Desktop Client to verify the port.

  1. Avage a web page on the server (behind the F5 Load Balancer).
  2. Logige haldurisse sisse.
  3. Click Investigate > Flow Search.
  4. Klõpsake nuppu Otsi.
  5. When the Flow search results display flows, click Manage Columns.
  6. Click the check box to add a check mark to Peer NAT and Subject NAT.
  7. Klõpsake nuppu Määra.
  8. Confirm the load balancer IP address is shown in the Peer NAT column or the Subject NAT column.
    The column is determined by the direction of the flow.

CISCO-Flow-Sensor-and-Load-Balancer- (1)

Toega ühenduse võtmine
Kui vajate tehnilist tuge, tehke ühte järgmistest.

  1. Võtke ühendust kohaliku Cisco partneriga
  2. Võtke ühendust Cisco toega
  3. Juhtumi avamiseks web: http://www.cisco.com/c/en/us/support/index.html
  4. Telefonitoe jaoks: 1-800-553-2447 (USA)
  5. Ülemaailmsed tuginumbrid: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

Muudatuste ajalugu

Dokumendi versioon Avaldamise kuupäev Kirjeldus
1_0 11. august 2025 Esialgne versioon.

Autoriõiguse teave
Cisco ja Cisco logo on Cisco ja/või tema sidusettevõtete kaubamärgid või registreeritud kaubamärgid USA-s ja teistes riikides. To view Cisco kaubamärkide loend, avage see URL: https://www.cisco.com/go/trademarks. Mainitud kolmandate isikute kaubamärgid on nende vastavate omanike omand. Sõna partner kasutamine ei tähenda partnerlussuhet Cisco ja ühegi teise ettevõtte vahel. (1721R)

© 2025 Cisco Systems, Inc. ja/või selle sidusettevõtted. Kõik õigused kaitstud.

KKK

Mis on selle juhendi eesmärk?

This guide provides instructions for configuring the load balancer and Flow Sensor to enhance security and visibility in the Secure Network Analytics system.

Who is the intended audience for this guide?

The guide is intended for administrators responsible for configuring the Secure Network Analytics system.

What should I do before starting the procedures in this guide?

Ensure your Secure Network Analytics system is communicating and that appliance licenses are active.

How do I contact Cisco Support?

You can contact Cisco Support via their website, phone, or by reaching out to your local Cisco Partner.

Dokumendid / Ressursid

CISCO vooluandur ja koormuse tasakaalustaja [pdfKasutusjuhend
Vooluandur ja koormuse tasakaalustaja, andur ja koormuse tasakaalustaja, koormuse tasakaalustaja, tasakaalustaja

Viited

Jäta kommentaar

Teie e-posti aadressi ei avaldata. Kohustuslikud väljad on märgitud *