Forum Discussion

8 Replies

  • Greg_Crosby_319's avatar
    Greg_Crosby_319
    Historic F5 Account

    It is not necessary to have APM behind your firewall since BIG-IP is network firewall ICSA certified, however, some customers choose to do so and also create a network address translation for the address view clients connect. For this case their is a question in the iApp, "If external clients use a network translated address to access View, what is the public-facing IP address?", that is used so apm knows what IP address to place in the PCoIP token issued to the view client to establish their PCoIP session. Without this the PCoIP token would contain the APM VS address rather then the outside translated address (which translates to the APM VS address) used by clients.

     

  • Thanks Greg, I saw the location for the public-facing address, I just don't see a field for the NAT (DMZ) address behind the firewall.

     

    • David_M__140305's avatar
      David_M__140305
      Icon for Nimbostratus rankNimbostratus
      Unless in the field for the virtual server I'm supposed to use a virtual IP in the DMZ?
    • Greg_Crosby_319's avatar
      Greg_Crosby_319
      Historic F5 Account
      Sounds like you have the client resolving to untrusted/public ip which is nated to a DMZ address? If that is the case then you would using the untrusted address for the external nat question and a DMZ address for the virtual server question (What IP address do you want to use for the virtual server?).
  • Greg,

     

    I finally got everything squared away with setting up the F5 LTM, but it appears as though when I add a second node our ASA firewall is detecting an asymmetric route and dropping the connection. When I use either Security server in the Pool the LTM setup works. If I have both nodes in the pool, then I get disconnected directly after authentication and choosing a desktop.

     

  • Greg_Crosby_319's avatar
    Greg_Crosby_319
    Historic F5 Account

    Is your virtual server using source persistence? If not, use source persistence and see if the problem continues.

     

  • Greg,

     

    After changing the persistence profile to the source address the connections are being established correctly. I will keep the changes to see if there are any issues, but that appears to be the correct setting.

     

    Lesson learned, don't use "F5's recommended persistence profile"!!!!

     

    • Greg_Crosby_319's avatar
      Greg_Crosby_319
      Historic F5 Account
      Actually, I believe you uncovered a error within the iApp configuration. It should be adding source persistence instead of using universal persistence for your specific use case were APM is not being used (the universal persistence profile created and applied does not have any effect since it persists on APM session cookie). I have put in a request to have it fixed, thanks! -Greg -Greg -Greg