ADC Labs
  • Build your F5 Lab
  • F5 Certifications
    • F5CAB1 (F5 101) Exam Guide & Blueprint – F5 Certified Administrator
  • Courses
  • Labs
  • Who am I ?
No Result
View All Result
ADC Labs
  • Build your F5 Lab
  • F5 Certifications
    • F5CAB1 (F5 101) Exam Guide & Blueprint – F5 Certified Administrator
  • Courses
  • Labs
  • Who am I ?
No Result
View All Result
ADC Labs
No Result
View All Result

F5 Port Lockdown Explained

ADC Labs Port Lockdown thumbnail

ADC Labs Port Lockdown thumbnail

Exam Topics

  • F5CAB1
    • F5CAB1.01
      • Port lockdown
    • F5CAB1.02
      • Interpret port lockdown settings to Self-IP
  • F5CAB2
    • F5CAB4.02
      • Interpret port lockdown settings to Self-IP

Introduction

On F5 BIG-IP, the Port Lockdown feature is used to define which protocols and ports are allowed for incoming connections to a Self-IP address. If a protocol or port is not included in the Port Lockdown list, any connection attempt to the Self-IP on that port will be rejected. Outbound connections are not restricted by Port Lockdown, so services like health monitors or connections to backend servers do not need to be explicitly allowed in the Port Lockdown list.

 

ADC-Labs - F5 - Port-Lockdown Outbound connection

While outbound connections are always allowed, inbound connections can be blocked by Port Lockdown. By default, when a Self-IP is created, the Port Lockdown mode is set to Allow None, which means all inbound connections are rejected. As a result, an administrator cannot access the BIG-IP via the Self-IP until the Port Lockdown settings are modified to permit the required protocols or ports.

 

ADC-Labs - F5 - Port-Lockdown Inbound connection

Port Lockdown Modes on a Self-IP

On a Self-IP, you can configure the following Port Lockdown modes:

  • Allow-None
    • This is the default setting when creating a Self-IP. It denies all inbound traffic, except exceptions.
  • Allow Default
      • Allows a predefined set of ports and services commonly used for BIG-IP management and control traffic.
    Protocol Port/Service Description
    IGMP Not applicable Multicast group management
    OSPF Not applicable Routing protocol
    PIM Not applicable Multicast routing
    TCP 4353 iQuery
    UDP 4353 iQuery
    TCP 443 HTTPS (Configuration Utility)
    TCP 161 SNMP
    UDP 161 SNMP
    TCP 22 SSH
    TCP 53 DNS
    UDP 53 DNS
    UDP 520 RIP
    UDP 1026 Network Failover
  • Allow Custom
    • Allows you to manually define the protocols and ports for which inbound connections are permitted on the Self-IP.
  • Allow Custom (Include Default)
    • Allows the default list of services (from Allow Default) plus any additional services you configure.
  • Allow All
    • Allows all incoming connections to the Self-IP on all ports.

Why restrict access to Self-IP using Port-Lockdown ?

From a security perspective, it is important to allow only the services that are strictly necessary on a Self-IP. Consider the following architecture: a BIG-IP device with both external and internal Self-IPs.

  • External Self-IP: Users connect to virtual servers through this address.

  • Internal Self-IP: Used for connections initiated by the BIG-IP itself, such as backend server communication.

If the external Self-IP is configured with a permissive Port Lockdown setting, such as Allow Default, it could pose a security risk. For example, administrative services like SSH or the configuration utility could inadvertently be exposed to the internet, creating potential attack vectors.

ADC-Labs - F5 - Port-Lockdown allow-default

 

For improved security, it is recommended to set Port Lockdown to Allow None on external Self-IPs. This ensures that no unnecessary services are exposed to external networks. For internal Self-IPs, use the Custom option to allow only the specific services that are required (such as SSH or HTTPS for management). Avoid relying on Allow Default, as it permits a broad range of services that may not all be needed in your environment.

Port-Lockdown exceptions

Some traffic is always allowed on a Self-IP, regardless of the Port Lockdown mode—even if it’s set to Allow None. These exceptions include:

Service Protocol / Port Range Applies To Description
TCP Mirroring TCP / 1029–1155 Self-IP where TCP Mirroring is enabled Used by the connection mirroring feature to replicate state information between BIG-IP devices in a cluster.
Centralized Management Infrastructure (CMI) TCP / 4353 Self-IP where CMI is enabled Used for device-to-device communication when BIG-IP devices are part of a synchronization group.
ICMP ICMP All Self-IPs Internet Control Message Protocol is always enabled and is not affected by the Port Lockdown configuration.
Virtual Server Protocol/Port of the Virtual Server Self-IP where the Virtual Server is configured When a Virtual Server is configured on a Self-IP, it overrides the Port Lockdown setting for that specific protocol and port.

For example, if an HTTP Virtual Server is configured to listen on Self-IP A, that Self-IP will automatically allow inbound connections on port 80. Without this exception, you would need to manually add every protocol and port used by virtual servers to the Port Lockdown list.

 

Although TCP Mirroring and CMI (Centralized Management Infrastructure) are automatically permitted as exceptions, network failover (TCP port 1026) is not. This means that if HA traffic is running over a Self-IP configured with Port Lockdown = Allow None, the cluster will fail. To maintain HA functionality, you must explicitly allow TCP port 1026 on that Self-IP when using a restrictive Port Lockdown configuration.

Configuring port-lockdown using the Configuration Utility

Access the Self-IP configuration using Network->Self-IPs.
In the self-IP configuration menu, you can select the Port-Lockdown setting needed (Allow-None, Allow-Default, Allow-Custom, Allow-All)

Configuring port-lock using tmsh

You can modify the Port Lockdown setting of a Self-IP using the following syntax:

modify /net self  allow-service

Summary

  • Port Lockdown limits access to a Self-IP, securing inbound connections.

  • The default Port Lockdown setting is Allow None, which denies all inbound connections.

  • The Port Lockdown modes are:

    • Allow None

    • Allow Default

    • Allow Custom

    • Allow Custom (Include Default)

    • Allow All

  • Certain traffic always bypasses Port Lockdown, including virtual server service ports, ICMP, TCP Mirroring, and CMI.

  • Port Lockdown is configured in the Network → Self-IP configuration menu.

Now that you’ve learned about Port Lockdown, explore the other topics in the F5CAB1 blueprint to continue your BIG-IP journey.”

Tags: CourseF5CAB1F5CAB4Security
Previous Post

Managing an APM Policy

Nicolas Dupin

Nicolas Dupin

My name is Nicolas DUPIN, a 30-year-old F5 Specialist from France. I've been working with F5 technologies since 2016 and hold the 401 Security Solution Expert certification. My passion is helping others learn F5 BIG-IP solutions. After facing challenges in finding lab resources when I started, I created this website to offer practical exercises and insights to help others gain hands-on experience with F5 technologies.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Tags

Course F5CAB1 F5CAB4 lab Security
  • Build your F5 Lab
  • F5 Certifications
  • Courses
  • Labs
  • Who am I ?

© 2025 ADC Labs. Independent website — not affiliated with, sponsored by, or endorsed by F5 Networks, Inc. Privacy Policy | Disclaimer | Terms | Copyright

No Result
View All Result
  • Build your F5 Lab
  • F5 Certifications
    • F5CAB1 (F5 101) Exam Guide & Blueprint – F5 Certified Administrator
  • Courses
  • Labs
  • Who am I ?

© 2025 ADC Labs. Independent website — not affiliated with, sponsored by, or endorsed by F5 Networks, Inc. Privacy Policy | Disclaimer | Terms | Copyright