Migration Tool. Migration Tool (Beta) Technical Note

Similar documents
RSA Two Factor Authentication

Moodle. Moodle. Deployment Guide

VMware vcenter Log Insight Manager. Deployment Guide

Packet Trace Guide. Packet Trace Guide. Technical Note

NTLM NTLM. Feature Description

LoadMaster VMware Horizon (with View) 6. Deployment Guide

Hyper-V - Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide

KEMP Driver for Red Hat OpenStack. KEMP LBaaS Red Hat OpenStack Driver. Installation Guide

LoadMaster Clustering

Adobe Connect. Adobe Connect. Deployment Guide

Splunk. Splunk. Deployment Guide

Epic. Epic Systems. Deployment Guide

LoadMaster for Azure (Marketplace Classic Interface)

LoadMaster Clustering (Beta)

Edge Security Pack (ESP)

Configuring Real Servers for DSR

SDN Adaptive Load Balancing. Feature Description

LoadMaster VMware Horizon Access Point Gateway

Web Application Firewall (WAF) Feature Description

MS Lync MS Lync Deployment Guide

MS Skype for Business. Microsoft Skype for Business Deployment Guide

Condor for Cisco UCS B-Series Blade Servers

SSL Accelerated Services. SSL Accelerated Services for the LM FIPS. Feature Description

VMware Horizon Workspace. VMware Horizon Workspace 1.5. Deployment Guide

Health Checking. Health Checking. Feature Description

Virtual LoadMaster for Xen (Para Virtualized)

Kerberos Constrained Delegation. Kerberos Constrained Delegation. Feature Description

Content Switching with Exchange and Lync-related Workloads

GEO. Feature Description GEO VERSION: 1.4 UPDATED: MARCH Feature Description

Virtual LoadMaster for KVM (Para Virtualized)

DirectAccess. Windows Server 2012 R2 DirectAccess. Deployment Guide

Bar Code Discovery. Administrator's Guide

Open Source Used In Cisco Configuration Professional for Catalyst 1.0

Web User Interface (WUI) LM5305 FIPS

iwrite technical manual iwrite authors and contributors Revision: 0.00 (Draft/WIP)

Tenable Hardware Appliance Upgrade Guide

Documentation Roadmap for Cisco Prime LAN Management Solution 4.2

Enterprise Payment Solutions. Scanner Installation April EPS Scanner Installation: Quick Start for Remote Deposit Complete TM

Simba Cassandra ODBC Driver with SQL Connector

RADIUS Authentication and Authorization Technical Note

Cover Page. Video Manager User Guide 10g Release 3 ( )

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program )

Exchange 2016 Deployment Guide. Exchange Deployment Guide

Open Source Used In TSP

Cover Page. Site Studio Tutorial Setup Guide 10g Release 3 ( )

Installing the Shrew Soft VPN Client

Command Line Interface (CLI)

US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

IETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Enterprise Edition ( Program )

Ecma International Policy on Submission, Inclusion and Licensing of Software

Juniper Networks Steel-Belted Radius Carrier

Ecma International Policy on Submission, Inclusion and Licensing of Software

IETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009

Fujitsu ScandAll PRO V2.1.5 README

Additional License Authorizations for HPE OneView for Microsoft Azure Log Analytics

User Guide. Calibrated Software, Inc.

Primavera. Contract Manager Installation Guide

Copyright PFU LIMITED

Sophos Endpoint Security and Control standalone startup guide

Panasonic Audio Player 2 User Guide

ColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions

Technics Audio Player User Guide

User Manual. Date Aug 30, Enertrax DAS Download Client

Web User Interface (WUI) LM FIPS

LoadMaster Deployment Guide

SDLC INTELLECTUAL PROPERTY POLICY

Microsoft Hyper-V Installation Guide

Data Deduplication Metadata Extension

Web User Interface (WUI)

Intel Stress Bitstreams and Encoder (Intel SBE) 2017 AVS2 Release Notes (Version 2.3)

HALCoGen TMS570LS31x Help: example_sci_uart_9600.c

Open Source and Standards: A Proposal for Collaboration

Open Source Used In c1101 and c1109 Cisco IOS XE Fuji

JD Edwards EnterpriseOne 8.12 Standalone Client Installation Guide. for the Oracle Application Server

CA File Master Plus. Release Notes. Version

Trimble. ecognition. Release Notes

Conettix Universal Dual Path Communicator B465

Installing Enterprise Switch Manager

MQ Port Scan Installation and Operation Manual

SkyPilot OS Installation: Fedora Core 5

Management Software Web Browser User s Guide

ServerStatus Installation and Operation Manual

NetApp Cloud Volumes Service for AWS

Bar Code Discovery. Administrator's Guide

Use in High-Safety Applications

This file includes important notes on this product and also the additional information not included in the manuals.

End User License Agreement

Preface. Audience. Cisco IOS Software Documentation. Organization

HIS document 2 Loading Observations Data with the ODDataLoader (version 1.0)

TL Aggro may contain libpng, zlib, and FreeType. The license for libpng, zlib, and FreeType, respectively, follow.

Quick Start Guide. BlackBerry Workspaces app for Android. Version 5.0

MCAFEE THREAT INTELLIGENCE EXCHANGE RESILIENT THREAT SERVICE INTEGRATION GUIDE V1.0

Copyright PFU LIMITED 2016

Control4/HomeKit Appliance User Manual. User Manual. June Version Varietas Software, LLC.

SonicWALL CDP 2.1 Agent Tool User's Guide

Distributed Intelligent Capture. Integration Guide

Table of Contents Overview...2 Selecting Post-Processing: ColorMap...3 Overview of Options Copyright, license, warranty/disclaimer...

PageScope Box Operator Ver. 3.2 User s Guide

Microsoft Exchange Microsoft Exchange Deployment Guide

Transcription:

Migration Tool (Beta) Technical Note VERSION: 6.0 UPDATED: MARCH 2016

Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks of KEMP Technologies, Inc.. KEMP Technologies, Inc. reserves all ownership rights for the LoadMaster product line including software and documentation. The use of the LoadMaster Exchange appliance is subject to the license agreement. Information in this guide may be modified at any time without prior notice. Microsoft Windows is a registered trademarks of Microsoft Corporation in the United States and other countries. All other trademarks and service marks are the property of their respective owners. Limitations: This document and all of its contents are provided as-is. KEMP Technologies has made efforts to ensure that the information presented herein are correct, but makes no warranty, express or implied, about the accuracy of this information. If any material errors or inaccuracies should occur in this document, KEMP Technologies will, if feasible, furnish appropriate correctional notices which Users will accept as the sole and exclusive remedy at law or in equity. Users of the information in this document acknowledge that KEMP Technologies cannot be held liable for any loss, injury or damage of any kind, present or prospective, including without limitation any direct, special, incidental or consequential damages (including without limitation lost profits and loss of damage to goodwill) whether suffered by recipient or third party or from any action or inaction whether or not negligent, in the compiling or in delivering or communicating or publishing this document. Any Internet Protocol (IP) addresses, phone numbers or other data that may resemble actual contact information used in this document are not intended to be actual addresses, phone numbers or contact information. Any examples, command display output, network topology diagrams, and other figures included in this document are shown for illustrative purposes only. Any use of actual addressing or contact information in illustrative content is unintentional and coincidental. Portions of this software are; copyright (c) 2004-2006 Frank Denis. All rights reserved; copyright (c) 2002 Michael Shalayeff. All rights reserved; copyright (c) 2003 Ryan McBride. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE ABOVE COPYRIGHT HOLDERS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE ABOVE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The views and conclusions contained in the software and documentation are those of the authors and should not be interpreted as representing official policies, either expressed or implied, of the above copyright holders.. Portions of the LoadMaster software are copyright (C) 1989, 1991 Free Software Foundation, Inc. -51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA- and KEMP Technologies Inc. is in full compliance of the GNU license requirements, Version 2, June 1991. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 2

Portions of this software are Copyright (C) 1988, Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Portions of this software are Copyright (C) 1998, Massachusetts Institute of Technology Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Portions of this software are Copyright (C) 1995-2004, Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Portions of this software are Copyright (C) 2003, Internet Systems Consortium Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 3

Apache Tomcat Copyright 1999-2015 The Apache Software Foundation This product includes software developed by the Apache Software Foundation (http://www.apache.org/). Apache software is licensed under http://www.apache.org/licenses/license-2.0 Please see the LICENSE file in the root/tomcat directory Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 4

Table of Contents 1 Introduction... 6 1.1 Document Purpose... 6 1.2 Intended Audience... 6 1.3 Prerequisites... 6 2 LoadMaster Migration Tool... 7 2.1 Migrated Settings... 7 2.2 Download and Install the Migration Tool... 7 2.3 Convert the Backup... 8 2.4 Logging... 9 2.5 Apply the Settings to a LoadMaster... 9 2.5.1 Restore the Settings using the LoadMaster Backup File... 9 2.5.2 Apply the Settings using the API Commands... 10 References... 12 Document History... 13 Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 5

Introduction 1 Introduction KEMP Technologies have developed a Migration Tool which allows Cisco ACE and F5 customers to easily migrate to the KEMP LoadMaster, keeping their Cisco ACE/F5 Virtual Service and Real Server configuration settings. This tool is currently in beta. 1.1 Document Purpose The purpose of this document is to explain how to install and use migration tool. 1.2 Intended Audience This document is intended to be used by anyone who is interested in finding out further information and step-by-step instructions on how to use the LoadMaster migration tool. 1.3 Prerequisites Before running the LoadMaster migration tool, the following prerequisites must be in place: A working and licensed LoadMaster. This can be a Free Virtual LoadMaster, a 30 Day Trial or a purchased product. A backup of the ACE/F5 configuration. Refer to the Cisco ACE/F5 documentation for instructions on how to back up the existing configuration. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 6

LoadMaster Migration Tool 2 LoadMaster Migration Tool Refer to the sections below for information and instructions on using the LoadMaster Migration Tool. 2.1 Migrated Settings The LoadMaster Migration Tool is currently in beta and will only migrate the following settings: Virtual Services: Virtual Address Port Protocol Real Server health check (either ICMP or HTTP) Real Servers: Real Server Address Port Care must be taken to ensure that any additional modifications to the environment are understood and completed. For further assistance, please contact KEMP Support: https://kemptechnologies.com/support 2.2 Download and Install the Migration Tool Download the LoadMaster beta migration tool from the KEMP Technologies website: http://kemptechnologies.com. The tool comes in the form of an OVF file. To install the tool, simply deploy the OVF file in your chosen hypervisor. Apache Tomcat and the application.war file are pre-installed on the OVF file. When the OVF file finishes deploying, power on the Virtual Machine. An IP address will be automatically obtained if a DHCP server is set up. There is no browser on the Virtual Machine, so the tool needs to be accessed from outside of the Virtual Machine. To access the tool, go to the following link (on a machine that has access to the network): http://<tomcatserveripaddress>/migrationtool The Tomcat Server IP address is the IP address of the Virtual Machine. The IP address will be automatically obtained when the Virtual Machine is installed. To later retrieve the IP address, run the ifconfig command. If prompted, to log in to the Virtual Machine, the default credentials are: Username: root Password: root This password can be changed as needed. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 7

LoadMaster Migration Tool 2.3 Convert the Backup Before using the tool, take a backup of the ACE/F5 configuration. A number of files are contained in the ACE backup. The one that needs to be uploaded to the migration tool is called Admin_startup. For F5, the.ucs backup file can be used. The Migration Tool does not currently support encrypted backups. This is something KEMP plan to add support for in the future. When creating a backup from an F5 machine there is an option to encrypt it (using a passphrase). In order to use the LoadMaster Migration Tool, an unencrypted backup file must be used. When you have the required backup file, follow the steps below: 1. Go to the LoadMaster Migration Tool. Figure 2-1: Choose File 2. Click Choose File. 3. Browse to and select the backup file. 4. Click Convert File. 5. The tool will save a zip file containing three separate files: A LoadMaster backup file that can be used to restore the ACE/F5 settings onto a LoadMaster Two files containing API commands (one for PowerShell and one for RESTful API) which can be run to configure the relevant settings on the LoadMaster to make it consistent with the ACE/F5 setup 6. Unzip the file: If using Linux, in the terminal - go to the folder which contains the downloaded file and run the following command: unzip <Filename.zip> If using Windows, unzip the file normally using a tool such as 7-Zip. Refer to the sections below to find out how to apply the configuration settings to the LoadMaster from these files. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 8

LoadMaster Migration Tool 2.4 Logging Logs are recorded during the conversion process. Various items are logged, such as: An activity log itemizing what the tool is doing at each stage of the process A list of items that are eligible for conversion A list of items which are detectable by the tool but are not eligible for conversion Any errors or issues that occur with processing eligible items To access these logs, navigate to the following file in the Virtual Machine: /root/tomcat/bin/log/logging.log For assistance with transferring any settings that were not converted, please contact KEMP Support: https://kemptechnologies.com/support 2.5 Apply the Settings to a LoadMaster The three different files (contained in a zip file) which are output from the LoadMaster migration tool provides three different options for applying the settings to the LoadMaster. Refer to the relevant section below to find out how to apply the settings. 2.5.1 Restore the Settings using the LoadMaster Backup File One of the files output from the LoadMaster migration tool is a LoadMaster backup file. This backup file can be restored on the LoadMaster. The steps below outline how to restore the backup file on the LoadMaster: 1. In the main menu of the LoadMaster Web User Interface (WUI), go to System Configuration > System Administration > Backup/Restore. 2. Click Choose File. 3. Browse to and select the backup file. Figure 2-2: Restore Configuration The backup file must be stored on the machine that you are using to access the LoadMaster migration tool interface. 4. Select the VS Configuration check box. 5. Click Restore Configuration. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 9

LoadMaster Migration Tool 6. Click OK. 2.5.2 Apply the Settings using the API Commands Two files containing API commands are output from the migration tool one containing RESTful API commands, and one containing PowerShell commands. Before either type of command can be run, the API interface must be enabled on the LoadMaster. To enable the API interface on the LoadMaster, follow the steps below: 1. In the main menu of the LoadMaster WUI, go to Certificates & Security > Remote Access. Figure 2-3: Enable API Interface 2. Select the Enable API Interface check box. Now that the API interface has been enabled on the LoadMaster, both PowerShell and RESTful API commands can be run. Depending on which method you would like to use, refer to the sections below for instructions on how to run the commands. 2.5.2.1 Run the RESTful API Commands Figure 2-4: Example RESTful API Command Output File A screenshot of an example RESTful API output file is above. In order for this to work with the LoadMaster, some items in the commands need to be replaced: 1fourall will need to be changed to the bal password The IP address (that appears before /access) needs to be replaced with the relevant LoadMaster IP address These commands can be run by entering them in a web browser address bar or via a curl command. The commands should be run individually in the same order they appear in the file. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 10

LoadMaster Migration Tool In the file, all commands appear on the same line. In order to execute the commands successfully, the commands need to be run individually. Each command starts with https://. For more information on the RESTful API interface, refer to the RESTful API, Interface Description document. 2.5.2.2 Run the PowerShell API Commands Figure 2-5: Example PowerShell API Command Output File A screenshot of an example PowerShell API output file is above. Before running the PowerShell commands to set up the Virtual Services, the customer will need to run the Initialize-LoadBalancer command: Initialize-LoadBalancer Address <LoadMasterIPAddress> -Credential bal When this command is run, a pop-up window appears asking to enter the Password for the bal account. Enter the password and click OK. After the Initialize-LoadBalancer command has been successfully run, the customer can run the PowerShell commands which are in the LoadMaster tool output file. In the file, all commands appear on the same line. In order to execute the commands successfully, the commands must be run individually, in the same order as they appear in the file. For more information on the PowerShell API interface, refer to the PowerShell API, Interface Description document. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 11

References References Unless otherwise specified, the following documents can be found at http://kemptechnologies.com/documentation. RESTful API, Interface Description PowerShell API, Interface Description Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 12

Document History Document History Date Change Reason for Change Version Resp. Nov 2014 Initial draft First draft of document 1.0 LB Feb 2015 Minor changes Minor updates made 1.1 LB May 2015 Minor changes Enhancements made 1.2 LB June 2015 Minor changes Enhancements made 1.3 LB June 2015 Minor changes Enhancements made 1.4 LB June 2015 Minor changes Updates to copyright notices 1.5 LB Oct 2015 Release updates Updated for 7.1-30 3.0 LB Dec 2015 Release updates Updated for 7.1-32 4.0 LB Jan 2016 Minor changes Updated Copyright Notices 5.0 LB Mar 2016 Release updates Updated for 7.1-34 6.0 LB Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 13