Sei sulla pagina 1di 102

BIG-IP® Systems: Getting Started Guide

version 10.1

MAN-0300-00
Product Version
This manual applies to product version 10.1 of the BIG-IP® Local Traffic Manager, BIG-IP® Global
Traffic Manager, BIG-IP® Link Controller, BIG-IP® SSL Accelerator, BIG-IP® Application Security
Manager, and the BIG-IP® WebAccelerator™ System, BIG-IP® WAN Optimization Module, and
VIPRION® systems.

Publication Date
This manual was published on February 4, 2010.

Legal Notices
Copyright
Copyright 2008-2010, F5 Networks, Inc. All rights reserved.
F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5
assumes no responsibility for the use of this information, nor any infringement of patents or other rights of
third parties which may result from its use. No license is granted by implication or otherwise under any
patent, copyright, or other intellectual property right of F5 except as specifically described by applicable
user licenses. F5 reserves the right to change specifications at any time without notice.

Trademarks
F5, F5 Networks, the F5 logo, BIG-IP, 3-DNS, Access Policy Manager, APM, Acopia, Acopia Networks,
Application Accelerator, Ask F5, Application Security Manager, ASM, ARX, Data Guard, Enterprise
Manager, EM, FirePass, FreedomFabric, Global Traffic Manager, GTM, iControl, Intelligent Browser
Referencing, Internet Control Architecture, IP Application Switch, iRules, Link Controller, LC, Local
Traffic Manager, LTM, Message Security Module, MSM, NetCelera, OneConnect, Packet Velocity,
Protocol Security Module, PSM, SSL Accelerator, SYN Check, Traffic Management Operating System,
TMOS, TrafficShield, Transparent Data Reduction, uRoam, VIPRION, WANJet, WAN Optimization
Module, WOM, WebAccelerator, and ZoneRunner, are trademarks or service marks of F5 Networks, Inc.,
in the U.S. and other countries, and may not be used without F5's express written consent.

Patents
This product protected by U.S. Patents 6,327,242; 6,374,300; 6,473,802; 6,970,933; 7,051,126; 7,102,996;
7,146,354; 7,197,661; 7,206,282; 7,287,084. Other patents pending.

Export Regulation Notice


This product may include cryptographic software. Under the Export Administration Act, the United States
government may consider it a criminal offense to export this product from the United States.

RF Interference Warning
This is a Class A product. In a domestic environment this product may cause radio interference, in which
case the user may be required to take adequate measures.

FCC Compliance
This equipment has been tested and found to comply with the limits for a Class A digital device pursuant
to Part 15 of FCC rules. These limits are designed to provide reasonable protection against harmful
interference when the equipment is operated in a commercial environment. This unit generates, uses, and
can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual,
may cause harmful interference to radio communications. Operation of this equipment in a residential area
is likely to cause harmful interference, in which case the user, at his own expense, will be required to take
whatever measures may be required to correct the interference.

BIG-IP® Systems: Getting Started Guide i


Any modifications to this device, unless expressly approved by the manufacturer, can void the user's
authority to operate this equipment under part 15 of the FCC rules.

Canadian Regulatory Compliance


This Class A digital apparatus complies with Canadian ICES-003.

Standards Compliance
This product conforms to the IEC, European Union, ANSI/UL and Canadian CSA standards applicable to
Information Technology products at the time of manufacture.

Acknowledgments
This product includes software developed by Bill Paul.
This product includes software developed by Jonathan Stone.
This product includes software developed by Manuel Bouyer.
This product includes software developed by Paul Richards.
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
This product includes software developed by the Politecnico di Torino, and its contributors.
This product includes software developed by the Swedish Institute of Computer Science and its
contributors.
This product includes software developed by the University of California, Berkeley and its contributors.
This product includes software developed by the Computer Systems Engineering Group at the Lawrence
Berkeley Laboratory.
This product includes software developed by Christopher G. Demetriou for the NetBSD Project.
This product includes software developed by Adam Glass.
This product includes software developed by Christian E. Hopps.
This product includes software developed by Dean Huxley.
This product includes software developed by John Kohl.
This product includes software developed by Paul Kranenburg.
This product includes software developed by Terrence R. Lambert.
This product includes software developed by Philip A. Nelson.
This product includes software developed by Herb Peyerl.
This product includes software developed by Jochen Pohl for the NetBSD Project.
This product includes software developed by Chris Provenzano.
This product includes software developed by Theo de Raadt.
This product includes software developed by David Muir Sharnoff.
This product includes software developed by SigmaSoft, Th. Lockert.
This product includes software developed for the NetBSD Project by Jason R. Thorpe.
This product includes software developed by Jason R. Thorpe for And Communications,
http://www.and.com.
This product includes software developed for the NetBSD Project by Frank Van der Linden.
This product includes software developed for the NetBSD Project by John M. Vinopal.
This product includes software developed by Christos Zoulas.
This product includes software developed by the University of Vermont and State Agricultural College and
Garrett A. Wollman.
This product includes software developed by Balazs Scheidler <bazsi@balabit.hu>, which is protected
under the GNU Public License.
This product includes software developed by Niels Mueller <nisse@lysator.liu.se>, which is protected
under the GNU Public License.
In the following statement, "This software" refers to the Mitsumi CD-ROM driver: This software was
developed by Holger Veit and Brian Moore for use with "386BSD" and similar operating systems.
"Similar operating systems" includes mainly non-profit oriented systems for research and education,
including but not restricted to "NetBSD," "FreeBSD," "Mach" (by CMU).
This product includes software developed by the Apache Group for use in the Apache HTTP server project
(http://www.apache.org/).

ii
This product includes software licensed from Richard H. Porter under the GNU Library General Public
License (© 1998, Red Hat Software), www.gnu.org/copyleft/lgpl.html.
This product includes the standard version of Perl software licensed under the Perl Artistic License (©
1997, 1998 Tom Christiansen and Nathan Torkington). All rights reserved. You may find the most current
standard version of Perl at http://www.perl.com.
This product includes software developed by Jared Minch.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
(http://www.openssl.org/).
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
This product contains software based on oprofile, which is protected under the GNU Public License.
This product includes RRDtool software developed by Tobi Oetiker (http://www.rrdtool.com/index.html)
and licensed under the GNU General Public License.
This product contains software licensed from Dr. Brian Gladman under the GNU General Public License
(GPL).
This product includes software developed by the Apache Software Foundation <http://www.apache.org/>.
This product includes Hypersonic SQL.
This product contains software developed by the Regents of the University of California, Sun
Microsystems, Inc., Scriptics Corporation, and others.
This product includes software developed by the Internet Software Consortium.
This product includes software developed by Nominum, Inc. (http://www.nominum.com).
This product contains software developed by Broadcom Corporation, which is protected under the GNU
Public License.
This product contains software developed by MaxMind LLC, and is protected under the GNU Lesser
General Public License, as published by the Free Software Foundation.
This product includes software developed by the Computer Systems Engineering Group at Lawrence
Berkeley Laboratory. Copyright © 1990-1994 Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgement:
This product includes software developed by the Computer Systems Engineering Group at Lawrence
Berkeley Laboratory.
4. Neither the name of the University nor of the Laboratory may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
This product includes software developed by Sony Computer Science Laboratories Inc. Copyright ©
1997-2003 Sony Computer Science Laboratories Inc. All rights reserved. Redistribution and use in source
and binary forms, with or without modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.

BIG-IP® Systems: Getting Started Guide iii


THIS SOFTWARE IS PROVIDED BY SONY CSL AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL SONY CSL OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.

iv
Table of Contents
Table of Contents

1
Introducing BIG-IP Systems
Getting started with BIG-IP systems ..........................................................................................1-1
Understanding this guide ...............................................................................................................1-2
Choosing a configuration tool ......................................................................................................1-2
Using the Configuration utility ............................................................................................1-2
Using command line utilities ................................................................................................1-4
Understanding stylistic conventions ...........................................................................................1-5
Identifying references to products .....................................................................................1-5
Identifying references to other documents .....................................................................1-5
Using the examples ................................................................................................................1-5
Identifying new terms ............................................................................................................1-5
Identifying references to objects, names, and commands ............................................1-5
Identifying command syntax ................................................................................................1-6
Finding help and technical support resources ..........................................................................1-7

2
Preparing the System for Installation
Summarizing 10.x installation and upgrade ...............................................................................2-1
Performing prerequisite tasks ......................................................................................................2-2
Configuring the management interface .............................................................................2-2
Establishing a connection to the system ...........................................................................2-4
Working with volumes .........................................................................................................2-6
Activating the software license ...........................................................................................2-8
Performing optional tasks .......................................................................................................... 2-10
Managing pre-existing configuration files ....................................................................... 2-10
Preparing units in a redundant system configuration ................................................. 2-13

3
Performing the Installation
Introducing the installation process ............................................................................................3-1
Upgrading from 9.6.x, or from earlier versions of 10.x ................................................3-1
Upgrading from version 9.3.x or 9.4.x ..............................................................................3-2
Upgrading from software versions earlier than 9.3.x ....................................................3-2
Downloading and importing the installation file ......................................................................3-3
Starting the installation ..................................................................................................................3-4
Rebooting the system ....................................................................................................................3-5

4
Completing Post-Installation Tasks
Understanding system configuration ..........................................................................................4-1
Running the Setup utility ...............................................................................................................4-2
Preventing the Setup utility from running automatically ...............................................4-2
Specifying settings in the Setup utility ...............................................................................4-3
Configuring basic management settings ............................................................................4-3
Configuring traffic management settings ..........................................................................4-6
Provisioning TMOS modules ........................................................................................................4-8
Understanding Resource Provisioning settings ...............................................................4-8
Specifying provisioning levels ..............................................................................................4-9
Understanding rolling forward and provisioning ......................................................... 4-10
Completing system configuration ............................................................................................. 4-11

BIG-IP® Systems: Getting Started Guide i


Table of Contents

A
Upgrading from Versions 9.3.x and 9.4.x
and Reformatting for 10.1.x
Introducing the upgrade process ................................................................................................A-1
Introducing the image2disk upgrade utility ..............................................................................A-2
Upgrading version 9.3.x or 9.4.x systems or reformatting for version 10.1.x ................A-3
Preparing for system upgrade ............................................................................................A-3
Performing system upgrade ................................................................................................A-3
Downloading the installation file .......................................................................................A-4
Installing the image2disk upgrade and disk formatting utility .....................................A-4
Formatting the drive with the image2disk utility ...........................................................A-5
Starting the installation ........................................................................................................A-6
Rebooting after installation .................................................................................................A-7
Completing post-installation tasks ....................................................................................A-8

B
Formatting and Recovering Disk Drives
Introducing the diskinit utility ..................................................................................................... B-1
Installing the diskinit utility ................................................................................................. B-1
Recovering blank or damaged hard drives ............................................................................... B-2
Preparing the system to run the diskinit utility ............................................................. B-2
Running the diskinit utility .................................................................................................. B-3

C
Creating a Bootable USB Thumb Drive
Introducing the mkdisk utility .....................................................................................................C-1
Creating the bootable thumb drive ...........................................................................................C-2

D
Monitoring the BIG-IP System
Introducing the dashboard ...........................................................................................................D-1
Viewing BIG-IP system information ...........................................................................................D-2
Viewing CPU statistics .........................................................................................................D-3
Viewing memory usage statistics .......................................................................................D-4
Viewing connection statistics .............................................................................................D-4
Viewing throughput statistics .............................................................................................D-5
Viewing statistics for other modules .........................................................................................D-6

Glossary

Index

ii
1
Introducing BIG-IP Systems

• Getting started with BIG-IP systems

• Understanding this guide

• Choosing a configuration tool

• Understanding stylistic conventions

• Finding help and technical support resources


Introducing BIG-IP Systems

Getting started with BIG-IP systems


The BIG-IP® system is a set of application delivery products that work
together to ensure high availability, improved performance, application
security, and access control.
The primary module in the product family, the Local Traffic Manager™,
directs different types of protocol and application traffic to an appropriate
destination server. Other modules available on the BIG-IP system provide
critical functions such as WAN Optimization Module™, which optimizes
connections across a wide-area network, the WebAccelerator™ system,
which accelerates HTTP connections, Application Security Manager™,
which applies security policies to network traffic, and Global Traffic
Manager™, which maintains responsive user access regardless of network
conditions.
All products and modules in the BIG-IP product family run on the powerful
Traffic Management Operating System®, commonly referred to as TMOS®.
For an overview of the complete BIG-IP product offering, see the
introductory chapter of the TMOS® Management Guide for BIG-IP®
Systems, which contains the information you need to configure and maintain
the network and system-related components. You can find this document in
the Ask F5SM Knowledge Base, at https://support.f5.com

BIG-IP® Systems: Getting Started Guide 1-1


Chapter 1

Understanding this guide


This guide describes all the setup tasks you must complete to install, license,
provision, and configure initial settings for any BIG-IP system.
This guide is intended to help users get their version 10.x BIG-IP systems up
and running. Before you start installing the BIG-IP system, we recommend
that you review the basic configuration tasks and collect the few pieces of
required information, such as IP addresses and host names. You can use the
BIG-IP® Local Traffic Manager Configuration Worksheet, available in
the Ask F5 Knowledge Base, at https://support.f5.com, to help you gather
the information you need.
The chapters in this guide provide step-by-step procedures for setup tasks.
Before you start configuring your system, we recommend that you review
the available documentation for the Local Traffic Manager, as well as any
other modules you plan to use. You can find a list of documentation in
Finding help and technical support resources, on page 1-7.

Choosing a configuration tool


The BIG-IP system offers both browser-based and command line
configuration tools, so that users can work in the environment where they
are most comfortable. Once you have completed the initial configuration
using the Setup utility, you can continue with more detailed configuration of
the system. To do so, you can use the browser-based Configuration utility or
the command line utilities, or a combination of the two.

Using the Configuration utility


The Configuration utility is a browser-based application that you can use to
install, configure, and monitor the BIG-IP system. Figure 1.1 shows the
Welcome screen of the Configuration utility.

1-2
Introducing BIG-IP Systems

Figure 1.1 Welcome screen in the Configuration utility

Understanding the components of the Configuration utility


The Configuration utility contains the following components:
◆ The identification and messages area
The identification and messages area of the Configuration utility is the
screen region that is above the navigation pane, the menu bar, and the
body. In this area, you find the system identification, including the host
name, management IP address, logged on user name and role, and date
and time information. Below the top area are identifiers for the unit and

BIG-IP® Systems: Getting Started Guide 1-3


Chapter 1

state of the system. This area is also where the system presents certain
system messages, for example Activation Successful, which appears
after a successful licensing process.
◆ The navigation pane
The navigation pane, on the left side of the screen, contains the Main tab,
the Help tab, and the About tab. The Main tab provides links to the major
configuration objects. The Help tab provides context-sensitive help for
each screen in the Configuration utility. The About tab presents the
content from the Welcome screen. When the Help or About tab is active,
you can open the content of the navigation pane in a new window using
the Launch button. You can also print the content of the Help or About
panes using the Print button.
◆ The menu bar
The menu bar, which is below the identification and messages area, and
above the body, provides links to the additional configuration objects
within each major object.
◆ The body
The body is the screen area where the configuration settings display.

Browser support for the Configuration utility


The BIG-IP Configuration utility works with a majority of the
commonly-available web browsers. For the most current list of the
supported browsers for the Configuration utility, refer to the current release
note, available in the Ask F5 Knowledge Base, at https://support.f5.com.

Using command line utilities


In addition to using the Configuration utility, you can also manage the
BIG-IP system using command line utilities such as the bigpipe utility and
the Traffic Management Shell (tmsh) utility. You can use the command line
utilities directly on the BIG-IP system console, or you can run commands
using a remote shell, such as the SSH client or a Telnet client. For more
information on command line utilities, see Bigpipe Utility Reference Guide,
the Traffic Management Shell (tmsh) Reference Guide, or the online man
pages.

Note

All users must use the browser-based Configuration utility to license the
system for the first time. For information about running Setup using the
Configuration utility, see Running the Setup utility, on page 4-2.

1-4
Introducing BIG-IP Systems

Understanding stylistic conventions


To help you easily identify and understand important information, all of our
documentation uses the stylistic conventions described in this section.

Identifying references to products


We refer to all products in the BIG-IP product family as BIG-IP systems.
We refer to the software modules by their name, for example, we refer to the
Local Traffic Manager module as simply the Local Traffic Manager. If
configuration information relates to a specific hardware platform, we note
the platform.

Identifying references to other documents


We use italic text to denote a reference to another document or section of a
document. We use bold, italic text to denote a reference to a book title. For
example, you can find information about local traffic virtual servers in the
Configuring Virtual Servers chapter of the Configuration Guide for
BIG-IP® Local Traffic Management™.

Using the examples


All examples in this document use only private class IP addresses. When
you set up the configurations we describe, you must use valid IP addresses
suitable to your own network in place of our sample addresses.

Identifying new terms


To help you identify sections where a term is defined, the term itself is
shown in bold italic text. For example, a virtual server is a specific
combination of a virtual address and virtual port, associated with a content
site that is managed by a BIG-IP system or other type of host server.

Identifying references to objects, names, and commands


We apply bold text to a variety of items to help you easily pick them out of a
block of text. These items include web addresses, IP addresses, utility
names, most controls in the Configuration utility, and portions of
commands, such as variables and keywords. For example, you can set the
Idle Timeout value to 5.

BIG-IP® Systems: Getting Started Guide 1-5


Chapter 1

Identifying command syntax


We show complete commands in bold Courier text. Note that we do not
include the corresponding screen prompt, unless the command is shown in a
figure that depicts an entire command line screen. For example, the
following command shows the configuration of the specified pool name:
bigpipe self <ip_address> show
or
b self <ip_address> show
Table 1.1 explains additional special conventions used in command line
syntax.

Item in text Description

\
Indicates that the command continues on the following line, and that you should type the entire
command without entering a line break.

< >
Identifies a user-defined parameter. For example, if the command has <your name>, type in your
name, but do not include the brackets.

|
Separates parts of a command.

[ ]
Indicates that syntax inside the brackets is optional.

...
Indicates that you can type a series of items.

Table 1.1 Command syntax conventions

1-6
Introducing BIG-IP Systems

Finding help and technical support resources


In addition to this guide, there are other sources of documentation for the
BIG-IP system.
◆ BIG-IP system setup instructions
All hardware from F5 Networks contains printed system setup
instructions that describe the basic configuration steps required to get the
BIG-IP system up and running in the network. This guide assumes that
you have already completed the steps in the setup instructions included in
the printed document in the box shipped with the system.
◆ Configuration Worksheet
This worksheet provides you with a place to plan the basic configuration
for the BIG-IP system. You will need some of the information from this
worksheet to complete tasks described in this guide. The worksheet is
available in the Ask F5 Knowledge Base, at https://support.f5.com
◆ Product guides
Before you begin, we recommend that you visit the Ask F5 Knowledge
Base, at https://support.f5.com, to review the following guides.
• TMOS® Management Guide for BIG-IP® Systems
This guide contains information you need to configure and maintain
the network and system-related components of the BIG-IP system.
• Configuration Guide for BIG-IP® Local Traffic Management™
This guide contains any information you need for configuring the
BIG-IP system to manage local network traffic.
• Bigpipe Utility Reference Guide
This guide contains information you need if you choose to configure
the BIG-IP system using the bigpipe command line utility.
• Traffic Management Shell (tmsh) Reference Guide
This guide contains information you need if you choose to configure
the BIG-IP system using the tmsh command line utility.
◆ Applicable module configuration guides
Each module has an associated configuration guide. You should consult
the configuration guide applicable to the modules you are running. For
example, if you are running the WAN Optimization Module, you should
review the Configuration Guide for the BIG-IP® WAN Optimization
Module™. If you are deploying several modules, you should review the
implementations guides BIG-IP® Global Traffic Manager™ and Link
Controller™: Implementations and BIG-IP® Module Interoperability:
Implementations.
◆ Online help for BIG-IP systems
The Configuration utility has online help for each screen. The online help
contains descriptions of each control and setting on the screen. Click the
Help tab in the navigation pane to view the online help for a screen.

BIG-IP® Systems: Getting Started Guide 1-7


Chapter 1

◆ Welcome screen in the Configuration utility


The Welcome screen in the Configuration utility contains links to many
useful web sites and resources, including:
• The Ask F5 Knowledge Base
• The F5 Solution Center and F5 DevCentral web site
• Plug-ins, SNMP MIBs, and SSH clients
◆ Ask F5 Knowledge Base
The Ask F5 Knowledge Base provides current and comprehensive
documentation for the product, including:
• Release notes for the BIG-IP system, current and past
• Updates for guides
• Technical notes
• Answers to frequently asked questions

To access this site, you must register at https://support.f5.com.

1-8
2
Preparing the System for Installation

• Summarizing 10.x installation and upgrade

• Performing prerequisite tasks

• Performing optional tasks


Preparing the System for Installation

Summarizing 10.x installation and upgrade


All BIG-IP® systems include the local traffic management components. You
can also obtain the following optional modules: Global Traffic Manager,
Link Controller, Application Security Manager, Protocol Security Module,
WebAccelerator™ system, and WAN Optimization Module. You can find
additional information about each of these modules in the configuration
guide associated with each module. You can install all of these products and
modules using a single, unified installation process. The license you have
determines which modules you can use.
There are two types of procedures to follow to prepare the system for
installation:
• Prerequisite tasks, described in Performing prerequisite tasks, on page
2-2
• Optional tasks, described in Performing optional tasks, on page 2-10

When you finish the pre-installation tasks described in this chapter, you then
complete the installation tasks, which differ depending on your starting
point.
• If you are starting with version 9.6.x, or from earlier 10.x versions,
proceed to Chapter 3, Performing the Installation.
• If you are upgrading from version 9.3.x or 9.4.x, proceed to Appendix A,
Upgrading from Versions 9.3.x and 9.4.x and Reformatting for 10.1.x.

Finally, you complete the post-installation tasks described in Chapter 4,


Completing Post-Installation Tasks, which are the same regardless of your
starting point.

WARNING
If the system you plan to upgrade has WAN Optimization Module™,
WebAccelerator™, or Application Security Manager™ already provisioned
or if you have a number of volumes with software installed, you might
experience an upgrade failure due to insufficient space. Before you proceed,
set the module provisioning to Minimal, or remove unneeded volumes and
reboot the system. After installation is complete, you can set the
provisioning back to its original setting.

Important
You cannot upgrade and roll forward a configuration directly to this version
from versions 9.2.x or earlier. If you have a configuration from version 9.2.x
or earlier, you must upgrade to version 9.3.x or 9.4.x, and then upgrade to
version 10.x. If you do not need to roll forward a configuration, you can
follow the upgrade instructions in Appendix A, Upgrading from Versions
9.3.x and 9.4.x and Reformatting for 10.1.x.

BIG-IP® Systems: Getting Started Guide 2-1


Chapter 2

Performing prerequisite tasks


A basic installation consists of some prerequisite tasks that prepare you for
installing the software. These prerequisite tasks are the same, regardless of
whether you are installing the software on a system that is already running
version 9.6.x, or an earlier versions of 10.x, or upgrading to version 10.x
from version 9.3.x or 9.4.x. These tasks involve:
• Configuring the management interface, as described in Configuring the
management interface, following.
• Establishing a connection to the system, as described in Establishing a
connection to the system, on page 2-4.
• Setting the active volume, as described in Working with volumes, on page
2-6.
• Making sure the license is active and updated, as described in Activating
the software license, on page 2-8.

Important
If the system on which you are installing is a member of a redundant system
configuration, you should review the information in Preparing units in a
redundant system configuration, on page 2-13.

You might also want to roll forward an archived configuration. This


optional task is described in Managing pre-existing configuration files, on
page 2-10.

Configuring the management interface


To install software upgrades and perform management tasks on the BIG-IP
system, you must use the management interface. When you initially set up
the system hardware, you probably configured an IP address, netmask, and
default route for the management interface. If you did not, you can use the
default settings, or you can use the LCD panel controls to specify settings
appropriate to your network.
To allow remote connections, the traffic management software comes with a
default root account and password and two pre-defined IP addresses. The
preferred default IP address is 192.168.1.245. The alternate IP address is
192.168.245.245. The default netmask is 255.255.255.0.

Important
Do not add a self IP address that is on the same network as the management
interface. The management interface functions separately from other system
functions and cannot share the same network.

2-2
Preparing the System for Installation

Adding an IP address, netmask, and default route using the LCD panel
You can use the LCD panel on the front of the device to specify a
management IP address, a netmask for the IP address, and a default route.

To set the management interface using the LCD panel


1. On the front of the device, press the X button on the LCD panel to
put the LCD panel into menu mode.
2. Using the arrow buttons, navigate to the System menu and press the
check mark button.
3. Again using the arrow buttons, navigate to the IP Address menu and
press the check mark button.
4. Specify the management IP address using the up and down arrow
buttons to change each digit, and the left and right arrow buttons to
navigate between numbers in the address, and then press the check
mark button.
5. Using the arrow buttons, navigate to the Netmask menu and press
the check mark button.
6. Enter the netmask for the management IP address, and press the
check mark button.
7. If you plan to manage the unit from a different subnetwork, use the
arrow buttons to navigate to the Default Route menu and press the
check mark button.
8. Using the arrow buttons, navigate to the Commit menu and press the
check mark button.
9. Enter your default route using the up and down arrow keys, and
press the check mark button. If you do not have a default route, use
0.0.0.0.
10. Using the arrow buttons, navigate to the Commit menu, and press
the check mark button.
11. When you see OK blinking, press the check mark button.

Note

If you can establish a connection from your workstation to the management


port of the BIG-IP system, you can also run the config command on the
command line to run the command line-based Configuration Utility shell to
configure an IP address, netmask, and default route for the management
interface. The utility shell guides you through the screens for configuring
the settings. For more information on establishing management
connections, see Establishing a connection to the system, following.

BIG-IP® Systems: Getting Started Guide 2-3


Chapter 2

Establishing a connection to the system


Before you can install, configure, or manage a BIG-IP system, you must
connect the unit to a management workstation or network. There are three
ways to attach a management workstation or network to the traffic
management system.
◆ Using a serial console
You can connect a null modem cable to the port marked CONSOLE on
the unit, and access the command line with a terminal emulator.
◆ Using the default network to connect to the management interface
You can connect a cable to the Ethernet interface labeled Management
(MGMT) to remotely access the command line or the browser-based
Configuration utility.
◆ Using a network IP address that you specify to connect to the
management interface
You can configure an IP address on the Ethernet interface labeled
Management (MGMT) to remotely access the command line or the
browser-based Configuration utility.

Connecting with a null modem cable to the serial console


You can use a terminal emulator (through a null modem cable attached to
the serial port labeled CONSOLE on the unit) during the installation
process, and to configure the management port. To connect through the
serial port, you must have a DB9 null modem cable, and a vt100-capable
terminal emulator available on a computer in close proximity to the unit you
want to configure.

To connect the unit to a terminal emulator


1. Connect the null modem cable to the DB9 port labeled CONSOLE
on the unit.
2. Connect the null modem cable to a serial port on the system with the
terminal emulator.
3. Start the terminal emulator.
4. Set the emulator to 19200 baud and choose the correct serial device.
5. Turn on the hardware.
It may take a moment for the terminal emulator to connect.
6. At the logon prompt, type the default user name, root, and the
default password, default.

Note

If you cannot see or read output on the serial console, check the baud rate to
make sure it is set to 19200.

2-4
Preparing the System for Installation

Connecting to the management interface using the default network


All BIG-IP systems ship with a default IP address configured on the
management interface. You can access the command line and the
browser-based Configuration utility through the management port, and
configure the unit directly using the default IP address and administrative
accounts. You can use this method if you do not need to configure the
management interface before you connect to the Configuration utility.
The preferred default management IP address is 192.168.1.245. If this IP
address is unsuitable for your network, the traffic management software
uses an alternate IP address, 192.168.245.245. For command line and serial
console access, the default root account name is root and the password is
default. The default Configuration utility logon account name is admin,
with a default password of admin.

Important
We recommend that you change these defaults to ensure system security.

Configuring a network IP alias for the remote workstation


The remote administrative workstation must be on the same IP network as
the BIG-IP system. In the case of the default IP address, that means the
administrative workstation must be on the 192.168.x.x IP network. If the
workstation is not already on the same network, you must set up an IP alias
on your network for your remote workstation.

Note

If you add this alias prior to booting up the BIG-IP system, the unit detects
the alias and uses the corresponding IP address.

The IP alias must be in the same network as the default IP address you want
the system to use. For example, on a UNIX® workstation, you might create
one of the following aliases.
• If you want the unit to use the default IP address 192.168.1.245, then add
an IP alias to the workstation you want to use to connect to the BIG-IP
system, using the following command:
ifconfig exp0 add 192.168.1.1
• If you want to use the alternate IP address 192.168.245.245, then add an
IP alias such as:
ifconfig exp0 add 192.168.245.1

WARNING

On a system running Microsoft® Windows® or Windows NT® operating


system, you must use a static IP address, not DHCP. Within the network
configuration, add an IP alias in the same network as the IP address in use
on the unit. For information about adding a static IP address on a system
running Microsoft Windows, please refer to the vendor’s documentation.

BIG-IP® Systems: Getting Started Guide 2-5


Chapter 2

Determining which default IP address is in use


After you configure an IP alias on the administrative workstation in the
same IP network as the BIG-IP system and you turn the system on, the
BIG-IP software sends Address Resolution Protocol responses (ARPs) on
the management interface to see if the preferred 192.168.1.245 IP address is
in use. If the address is appropriate for the network and is currently
available, the BIG-IP software assigns it to the management interface. You
can immediately use it to connect to the unit and start the Configuration
utility.
If the alternate network is present on the LAN, 192.168.245.0/24, or if the
node address 192.168.1.245 is in use, then the BIG-IP software assigns the
alternate IP address 192.168.245.245 to the management interface instead.

Working with volumes


This version of the BIG-IP system software uses the volumes
disk-formatting scheme. A specific section of a hard drive is called a
volume. Also called logical volume management (LVM), this feature
supports all platforms and modules available for the BIG-IP system. The
volume holds a complete version of the BIG-IP software. You can create
additional volumes to hold additional software versions, and you can delete
existing volumes you no longer need.
To install the software, you boot to a volume that you do not want to
upgrade, to serve as the source. You cannot install to the active volume.
LVM labels, disk names, partition and volume indexes, and file system
labels are used internally by the disk management system. At any given
time, only one volume may be the active partition. The active volume or
partition contains the software that runs when you start up or reboot the
system. For information on setting the active volume or partition, see Setting
the active volume, on page 2-8.

Important
The procedures described in this section assume that the system is using the
volumes disk-formatting scheme. If your system is using partitions (the
formatting scheme used in software prior to version 10.x), you cannot use
the procedures in this section. Instead, you must use 9.x procedures to
manage the partitions. Refer to the appropriate 9.x documentation for those
procedures. If the BIG-IP system is not already formatted for volumes, you
can use the image2disk utility to format the system drive as you install the
software. For information about formatting the system drives, see Starting
the installation, on page A-6.

2-6
Preparing the System for Installation

Creating and deleting volumes


You might need to create a new volume to hold a software installation. Or
you might have a software installation that you no longer need. You can use
the Software Management screens to create and delete volumes.

WARNING
Do not use the Software Management screens to create or delete partitions.
Doing so can result in an unstable condition. If you accidentally deleted
HD1.1 on a partitioned system and the system has become unusable, you
can reboot the system, or run the bigstart restart command on the command
line to return the system to an operational state. If you need to reformat a
system drive, you can use the image2disk utility. For more information, see
Formatting the drive with the image2disk utility, on page A-5.

To create a new volume


1. On the Main tab of the navigation pane, expand System, and click
Software Management.
The Software Management screen opens.
2. On the menu bar, click Volume Management.
The Volume Management screen opens.
3. Click the Create button
The Create Volume screen opens.
4. In the Volume Set box, type the name of the volume.
5. Click Finished.
The progress alert displays, letting you know that the operation
might take several minutes.
6. Click OK to create the new volume.

To delete an existing volume


1. On the Main tab of the navigation pane, expand System, and click
Software Management.
The Software Management screen opens.
2. On the menu bar, click Volume Management.
The Volume Management screen opens.
3. Check the box next to the volume to delete.
4. Click Delete.
The Confirm Delete screen opens.
5. Click Delete to delete the volume.

BIG-IP® Systems: Getting Started Guide 2-7


Chapter 2

Setting the active volume


One volume always serves as the active volume. The active volume contains
the software that runs when you start up or reboot the system. You can use
the Software Management screens to specify the active volume. When you
install, you boot into the volume to serve as the installation source.

To set the active volume


1. On the Main tab of the navigation pane, expand System, and click
Software Management.
The Software Management screen opens.
2. On the menu bar, click Boot Locations.
The Boot Locations screen opens.
3. Click the link representing the volume to make active.
The properties screen opens for that volume.
4. Click Activate.
The system presents a confirmation dialog box, letting you know
that the action will boot into that location.
5. Click OK to boot into the location you specified.

Note

If there is an active installation occurring on the volume, the system waits


until the installation operation completes before rebooting.

Activating the software license


After you configure the management interface, as described in Configuring
the management interface, on page 2-2, you can access the browser-based
Configuration utility through the management port, and activate the license.
To install new versions of BIG-IP system software, you must have an active
and updated license. An active and updated license contains a valid service
check date for the system software release you plan to install and run.
During installation and initialization, the system verifies the software release
check date in the software against the service check date in the license file
on your system.
To activate the license for the system, you must have a base registration key.
The base registration key is a 27-character string that lets the license server
know which F5 products you are entitled to license. The base registration
key is preinstalled on your system.
If the system is not yet licensed, the Configuration utility prompts you to
enter the base registration key. You enter keys for additional modules using
settings in the Add-On Registration Key List area of the License screen. If
you do not already have a base registration key, you can obtain one from the
sales group (http://www.f5.com).

2-8
Preparing the System for Installation

To activate or update a license


1. Open a web browser on a work station attached to the network on
which you configured the management port.
2. Type the following URL in the browser, where <IP address> is the
address you configured for the management port (MGMT):
https://<IP address>/

3. At the password prompt, type the default user name, admin, and the
default password, admin, and click Log in.
The Configuration utility opens. If this is the first time you have run
the Configuration utility, the system presents the Licensing screen
of the Setup utility. If this is not the first time you have run the
Configuration utility, the system presents the Welcome screen.
4. To begin the licensing process, click Activate (or Re-activate, if
you are reactivating the license).
The Activate License screen opens.
5. Follow the on-screen prompts to license the system.

For additional information during the procedure, click the Help tab of the
navigation pane.

Note

You can update the license at any time by using the options that are
available using the License options of the System section of the Main tab of
the navigation pane.

Although the license you receive from F5 Networks determines what


additional software modules the BIG-IP system can support, you must
allocate CPU, memory, and disk space to make any modules visible and to
ensure that they can function as they should in your configuration. This
process of assigning CPU, memory, and disk space is called provisioning.
For information on how to provision the software modules after you finish
installing the software, see Provisioning TMOS modules, on page 4-8.

BIG-IP® Systems: Getting Started Guide 2-9


Chapter 2

Performing optional tasks


This section describes the optional tasks that you may perform to prepare
the system for software installation. You need to perform these tasks if they
are applicable to your configuration. The optional tasks are:
• Managing pre-existing configuration files, following
• Preparing units in a redundant system configuration, on page 2-13

Managing pre-existing configuration files


If you have a BIG-IP system that is already configured with elements such
as profiles and monitors, self IP addresses, VLANs, and so on, you can
preserve that configuration when you install or upgrade. This is called
rolling forward a configuration. When you install, the system uses the
previously archived user configuration set (UCS) file in the /var/local/ucs
directory on the source installation location to update the configuration on
the installation destination. You should copy the UCS archive to a secure,
remote location as a recovery strategy in case the upgrade does not perform
as you expect.

Important
Make sure the license on the source installation location is valid before you
archive a configuration. This helps prevent accidental installation of an
invalid license over a valid one when you roll forward a UCS archive.

Note

The hostname in the UCS archive must match the host name of the system to
which you are installing for roll-forward to complete successfully.

Archiving a configuration
Before you archive the current configuration, you should make sure the
existing configuration contains no unnecessary elements, such as
nonworking virtual servers or users who should no longer have access to the
system. Once you remove all unnecessary elements, make sure to save your
configuration. The system does not roll forward unsaved configurations.
In the browser-based Configuration utility, each change of a page saves the
configuration. So to ensure that the system saves all of your configuration
settings, in the navigation pane, expand Overview, and click Welcome.
This takes you to the Welcome screen and saves the configuration.

Note

In order to roll-forward a pre-9.4.3 configuration, you must manually


create the config.ucs archive before starting the installation. To save the
configuration, run the command b config save /config.ucs at the command
line, and then remember to copy the archive to a secure, remote location.

2 - 10
Preparing the System for Installation

To archive a configuration
1. On the Main tab of the navigation pane, expand System, and click
Archives.
The Archive List screen opens.
2. On the upper right portion of the screen, click the Create button.
The New Archive screen opens.
3. For the Name setting, type a name for the archive.
The system adds a .ucs extension.
4. If you want to encrypt the archive, enable encryption, and specify
whether you want to include private keys in the archive.
5. To start the archiving operation, click the Finished button.
6. Copy the UCS archive to a secure, remote location.

You should always maintain the UCS archive remotely as a recovery


strategy in case the upgrade does not perform as you expect.

Understanding configuration file differences


BIG-IP system software has a feature called the single configuration file
(SCF). A single configuration file (SCF) is a flat, text file that contains a
series of bigpipe commands, and the attributes and values of those
commands, that reflect the entire configuration of one BIG-IP system.
Specifically, the SCF contains the local traffic management and operating
system configuration of the BIG-IP system.
An SCF is useful when you want to transfer a configuration from one
BIG-IP system to another. Typically, this involves using the bigpipe export
command to create an SCF of one system’s configuration, and then using
the bigpipe import command to install the configuration on another system.
In this way, you can propagate the exact configuration of one BIG-IP system
to other BIG-IP systems. For details on creating and using a single
configuration file, see the import and export command descriptions in the
Bigpipe Utility Reference Guide.
The SCF file is not the same as the user configuration set (UCS) archive. A
UCS archive is a compressed file that contains all the configuration files
(*.conf) that make up a single system’s configuration. You use the SCF
strictly to manually transfer configuration information to new or different
BIG-IP hardware. You create a UCS for archival purposes, and to preserve a
configuration for software upgrade. The system uses the archived UCS on
the active volume or partition to roll forward configurations during software
installation operations. You can find more information on the UCS archive
in the TMOS® Management Guide for BIG-IP® Systems.

BIG-IP® Systems: Getting Started Guide 2 - 11


Chapter 2

Upgrading the SCF


There have been many changes to configuration formats since the version
9.3.x and 9.4.x releases, and the configuration roll-forward process handles
most of those format changes to the UCS for you. However, because the
installation process rolls forward the archived UCS, not the SCF, the process
does not apply the formatting changes to the SCF.
If you have an SCF that contains older syntax formatting (that is, syntax
from version 9.3.x or 9.4.x), loading one of your existing SCF files might
raise a syntax error. In that case, you can upgrade and then create a new
SCF, or you can modify the old SCF directly before you manually transfer
the configuration to a 10.x system. Creating an upgraded SCF is the
recommended upgrade path. For more information, search for "SCF file" in
the Ask F5SM Knowledge Base, at https://support.f5.com.

To upgrade the SCF


1. Log on to the command line using an account with administrative
permissions.
2. At the command line, type the following command:
b import <saved_filename.scf>

3. Install the new software by completing the tasks described in


Chapter 3, Performing the Installation.
4. Once the installation is finished, at the command line, type the
following command:
b export <upgraded_filename.scf>

Now you can apply the upgraded SCF to other BIG-IP systems. F5
Networks also recommends that you archive the configuration to a UCS
archive, and copy the UCS archive to a secure, remote location. For
information on archiving the configuration, see Archiving a configuration,
on page 2-10.

Copying the configuration


You can use the cpcfg utility to copy the running configuration from one
installation location to another. This is a quick way to update an offline
location to the latest configuration, and is useful when applying hotfixes,
where the configuration and license are not applied to the target.
The operation replaces the configuration on the target. The destination for
the copy operation must represent an installation location that is not
currently active, and that contains a configuration older than the source.

2 - 12
Preparing the System for Installation

To copy the running configuration


1. On the source, log on to the command line using an account with
administrative permissions.
2. Type the following command:
cpcfg –source=<source> <destination>
If you do not specify a source, the operation uses the configuration from the
active installation location. For example, to copy the active configuration
from HD1.3 to HD1.1, if you are logged on to HD1.3, you run the following
command:
cpcfg HD1.1

Preparing units in a redundant system configuration


If you are working with a redundant system configuration, you should be
aware of these requirements.
• For the failover process to complete successfully, each unit in the
redundant system must be the same type of hardware, and must be
running the same software version.
• For a redundant system configuration, log on and install the software first
on the standby unit. Once the installation on the standby unit is
satisfactory, fail over and complete the upgrade on the active unit.
• Also on a redundant system, you might want to turn off connection
mirroring. During the reboot after installation finishes, the system
necessarily drops mirrored connections.
• Each unit in a redundant system configuration must have a configured
Peer Management Address. Each system uses the Peer Management
Address, the management IP address of its peer unit in a redundant
system configuration, for failover. The Peer Management Address
appears on the Network Failover screen, available from the High
Availability item on the navigation pane.

Note

For information about working with redundant system configurations,


synchronizing configurations, and mirroring connections, see the TMOS®
Management Guide for BIG-IP® Systems.

BIG-IP® Systems: Getting Started Guide 2 - 13


Chapter 2

2 - 14
3
Performing the Installation

• Introducing the installation process

• Downloading and importing the installation file

• Starting the installation

• Rebooting the system


Performing the Installation

Introducing the installation process


Once you have completed the pre-installation tasks outlined in Chapter 2,
Preparing the System for Installation, you are ready to download the
installation image, install the software, and reboot the system. The
installation tasks required depend on what software version you are starting
with on your BIG-IP® system.
For systems running software version 10.x, you accomplish installation
tasks using the Software Management screens. To access the Software
Management screens, in the navigation pane of the Configuration utility,
expand System, and click Software Management. Then you can complete
the tasks described beginning in the section Downloading and importing the
installation file, on page 3-3.

Upgrading from 9.6.x, or from earlier versions of 10.x


If the BIG-IP system is already running version 9.6.x, or an earlier versions
of 10.x that use the logical volume management (LVM) hard-disk
formatting scheme, you can use the Software Management screens in the
Configuration utility for installation and upgrading, or you can install and
upgrade the software using the command line. The following sections
describe the installation process from the Software Management screens.

Important
Beginning with version 10.1.0, you must reformat the system’s hard drive
partitions even if you plan to maintain 9.x alongside 10.x. The version
9.x-size partitions do not accommodate the 10.1.x software. You use the
image2disk utility to reformat the drive and install the 10.1.x software, and
then complete a separate operation using a version 9.x installation method
described in the version 9.x release notes. For information about using the
image2disk utility, see To format the drive for volumes and install the
software, on page A-7.

Using Software Management screens


The Software Management screens provide a browser-based method for
installing the version 10.x software. To open the Software Management
screens, in the navigation pane of the Configuration utility, expand System,
and click Software Management. Then you can complete the tasks
described beginning in the section Downloading and importing the
installation file, on page 3-3.

WARNING
Do not use the Software Management screens to add or delete partitions.
Doing so can result in an unstable condition. You should only use the
Software Management screens to add or delete volumes. If you accidentally

BIG-IP® Systems: Getting Started Guide 3-1


Chapter 3

deleted HD1.1 on a partitioned system and the system has become unusable,
you can reboot the system, or run the bigstart restart command on the
command line to return the system to an operational state.

Using b software commands


The b software commands provide a command line method for installing
the version 10.x software.

WARNING
Do not use the b software commands to add or delete partitions. Doing so
can result in an unstable condition. You should only use the b software
commands to add or delete volumes. If you accidentally deleted HD1.1 on a
partitioned system and the system has become unusable, you can reboot the
system, or run the bigstart restart command on the command line to return
the system to an operational state.

You can find information about the b software commands in the man page
for the command, available at the command line by typing man software.

Upgrading from version 9.3.x or 9.4.x


To upgrade from software version 9.3.x or 9.4.x, you must use the command
line to download and copy over the installation image, run the im command
to copy over the image2disk upgrade installation utility, and run the
image2disk utility to reformat the system’s hard drive and install the
software. For information about these tasks, see Appendix A, Upgrading
from Versions 9.3.x and 9.4.x and Reformatting for 10.1.x.

Upgrading from software versions earlier than 9.3.x


You cannot upgrade and roll forward a configuration from versions 9.2.x or
earlier directly to version 10.x. If you must retain a configuration from
version 9.2.x or earlier, first upgrade to version 9.3.x or 9.4.x, and then
upgrade to version 10.x. For information about upgrading to version 9.3.x or
9.4.x, see the release notes for the associated release. If you do not need to
roll forward a configuration, you can follow the upgrade instructions in
Appendix A, Upgrading from Versions 9.3.x and 9.4.x and Reformatting for
10.1.x.

3-2
Performing the Installation

Downloading and importing the installation file


Before you can install the software, you must download the installation file.
You can download the ISO installation image file from the F5 Networks
Downloads site, https://downloads.f5.com.
Once you have downloaded the installation file, you must import it to the
BIG-IP system. Initiating an installation operation requires that the
installation file is available to the BIG-IP system in a specific location: the
/shared/images directory. The Software Management screens take care of
importing the file to the correct location.

To import the downloaded installation file


1. On the Main tab of the navigation pane, expand System, and click
Software Management.
The Software Management screen opens.
2. In the middle-right area of the screen, click Import.
The Import Software Image screen opens.
3. Click Browse to navigate to the downloaded installation file.
4. Once the image name appears in the Software Image box, click
Import to begin the operation.
The system presents a progress indicator during the operation.
5. Wait while the system imports the software installation image.
The system presents a message when the operation is complete.

Important
If you navigate away from this screen before the operation completes, the
system might not import the image successfully. Therefore, we recommend
that you wait for the operation to complete before continuing with any other
work on the BIG-IP system.

You can also create a bootable thumb drive or DVD to use as a source for
the installation. For instructions for creating a bootable thumb drive, see
Appendix C, Creating a Bootable USB Thumb Drive. The following
procedures assume that you are using the /shared/images directory on the
BIG-IP system.

BIG-IP® Systems: Getting Started Guide 3-3


Chapter 3

Starting the installation


Once you download the software installation image and import the software
image to the /shared/images directory on the BIG-IP system, you can
initiate an installation operation. The destination you specify for installation
must represent a hard drive volume or partition on the BIG-IP system.

WARNING

You cannot install to a CompactFlash® media drive. Attempting to do so


halts the installation operation.

In order to install the software successfully, there must be at least minimal


disk formatting on the system drives. If the BIG-IP system does not meet
this requirement, you can use the diskinit utility to format the drive. For
more information, see Recovering blank or damaged hard drives, on page
B-2.

Important
You cannot install to the active volume or partition. The destination must
represent an inactive volume or partition on the disk.

To install the software


1. On the Main tab of the navigation pane, expand System, and click
Software Management.
The Software Management screen opens.
2. From the Available Images column, click the link representing the
software image you want to install.
The image properties screen opens.
3. In the Installation Targets column, check the box associated with the
location where you want to install.
4. Click Install.
The installation confirmation screen opens.
5. To begin the installation operation, click Install.
The installation status screen opens.
6. To watch the progress of the installation operation, click the
Refresh button, or specify a value for the Auto Refresh setting.

The upgrade process installs the software on the inactive installation


location that you specify. This process usually takes between three minutes
and seven minutes.

Tip
If there is a problem during installation, you can use log messages to
troubleshoot a solution. The system stores the installation log file as
/var/log/liveinstall.log.

3-4
Performing the Installation

Rebooting the system


When the installation operation is complete, the system removes the refresh
options. When that occurs, you can safely reboot into the newly installed
volume or partition.

To reboot the system


1. On the Main tab of the navigation pane, expand System, and click
Software Management.
The Software Management screen opens.
2. On the menu bar, click Boot Locations.
The Boot Locations screen opens.
3. In the Boot Partition column, click the link representing the boot
location you want to activate.
The Boot Location properties screen opens.
4. Click Activate.
A confirmation screen opens.
5. Click OK to initiate the reboot operation.
The system presents progress messages during the restart operation.

When the operation is complete, the system presents the logon screen. To
configure the system, log on using an account that has administrative
permissions.
When the system finishes rebooting, you can continue with the
post-installation tasks, as described in Chapter 4, Completing
Post-Installation Tasks.

Important
You will not have access to certain software features and functionality until
you complete the post-installation tasks.

BIG-IP® Systems: Getting Started Guide 3-5


Chapter 3

3-6
4
Completing Post-Installation Tasks

• Understanding system configuration

• Running the Setup utility

• Provisioning TMOS modules

• Completing system configuration


Completing Post-Installation Tasks

Understanding system configuration


Now that you have installed the software on the BIG-IP® system, you are
ready to configure the system. If you rolled forward a configuration from a
previous software version, you can modify settings and properties of
existing objects using the command line or the Configuration utility. If you
are starting with a new configuration, the first step after installation is
running the Setup utility, which you must run initially from the
Configuration utility.
When you access the Configuration utility, you specify the management IP
address as the application URL. If you have not yet configured your
workstation for access to the BIG-IP system through the management
interface, see Configuring the management interface, on page 2-2.

To access the Configuration utility


1. Open a web browser on a workstation connected to either:
• The same IP network as the management interface IP address
• The management interface IP address you configured in Adding
an IP address, netmask, and default route using the LCD panel,
on page 2-3
2. In the browser’s address bar, type the following URL, where
<default/alternate IP> is the IP address in use on the management
interface (as discovered in Determining which default IP address is
in use, on page 2-6).
https://<default/alternate IP>

3. At the logon prompt, type admin for the user name, and admin for
the password (or, if you changed these, use the values you
specified).
The Configuration utility opens.

BIG-IP® Systems: Getting Started Guide 4-1


Chapter 4

Running the Setup utility


Once you open a browser session to the Configuration utility, you can log on
and run the Setup utility to begin the initial configuration of the BIG-IP
system. The Setup utility covers basic networking configuration options
such as system host name and IP address, static and floating self IP
addresses, interfaces, and VLANs, time zone setting, administration
accounts for root access to the command line and admin access to the
Configuration utility, and other basic options for managing the device.
The Setup utility guides you through initial system set up, including
specifying a root password, administrative password, and the IP addresses
to be assigned to the management port.
You can run the Setup utility from the Configuration utility Welcome screen
by clicking Run the Setup Utility. The Configuration utility opens to one of
several locations, depending on where you are in the process of installation
and licensing:
• If the license on the system is updated, the system opens to the Setup
utility choices screen. For information on configuring the system using
the Setup utility, see Specifying settings in the Setup utility, on page 4-3.
• If you have not yet updated the license on the system, the system opens
to the Licensing screen. For instructions on how to activate the license,
see Activating the software license, on page 2-8.
• If you have completed installation, and you previously ran the Setup
utility, the system opens to the Welcome screen. From here, you can
provision the modules you have licensed (see Provisioning TMOS
modules, on page 4-8), or, if you have already completed provisioning,
you can continue with additional system configuration (see Completing
system configuration, on page 4-11).

Important
Even if you typically use the command line to configure, you must first run
the Setup utility from the browser-based Configuration utility before you
can begin.

Preventing the Setup utility from running automatically


You might already have an updated and active license when you install the
software or upgrade a version. If so, you can proceed to configure
everything from the command line without ever accessing the Configuration
utility. The first time you access the Configuration utility, however, the
system starts the Setup utility, even if you have already configured all of the
network settings the Setup utility needs. You can prevent the system from
starting the Setup utility by setting the setup.run db key.

4-2
Completing Post-Installation Tasks

To prevent the system from running the Setup utility


1. Log on to the command line of the system using the root account.
2. Run the following command:
b db setup.run false

Note

If you have not already activated the license, you must use the
browser-based Configuration utility to run the Setup utility to license the
system for the first time. In that case, the system starts the Setup utility when
you access the Configuration utility for the first time. For information about
activating the license, see Activating the software license, on page 2-8.

Specifying settings in the Setup utility


When you run the Setup utility, you set up some administrative accounts.
Specifically, you set up the root and admin accounts. The root and admin
accounts are for use by BIG-IP system administrators. For more information
about these administrative accounts, see the TMOS® Management Guide
for BIG-IP® Systems.
In addition to administrative accounts, the Setup utility guides you through
the process of specifying other basic networking settings, such as the
management IP address and port, the host name for the system, and settings
for redundant system configurations. You can also elect to provide default
VLAN information, or you can skip that step and configure those options on
your own.

Note

As you proceed through the Setup utility, you can click the Help tab of the
navigation pane for information about the settings on each screen.

Configuring basic management settings


After you have activated the license on the system, the Configuration utility
prompts you for the basic configuration information for managing the
system. This required information includes the following settings.
• Management interface settings such as the IP address, netmask, and
default gateway
• Host IP address
• Host name
• High availability settings
• Time zone

BIG-IP® Systems: Getting Started Guide 4-3


Chapter 4

• User administration settings, such as the Root and Admin account


passwords
• Support access and password settings
• SSH access and IP address range settings

A basic description for each setting follows, to assist you in specifying


settings on the Setup platform settings screen. You can also view the online
help for setting definitions.

Note

Depending on the hardware you have and the settings you configure, you
may see only some of the screen elements described here.

Management Port/Cluster IP Address


The management IP address, netmask, and management route that you
assign to the unit (or cluster, on a multi-bladed chassis) provide access to the
Configuration utility, and function as an identifier for the peer unit in a
redundant system configuration. The preferred default IP address is
192.168.1.245. The alternate IP address is 192.168.245.245. The default
netmask is 255.255.255.0.
If you already specified the management interface IP address (for example,
by using the procedure described in Adding an IP address, netmask, and
default route using the LCD panel, on page 2-3, or by using the config
command on the command line), you do not need to do so again.

Host name
This is the name of the system. You must enter a fully qualified domain
name (FQDN) for the system. This field allows only letters, numbers, and
the characters underscore ( _ ), dash ( - ) and period ( . ).

Host IP address
The host IP address is the IP address that you want to associate with the host
name. You can select Use Management Port IP Address to associate the
host name with the management port's IP address. This is the default setting.
Select Custom Host IP Address to type an IP address other than the
management port's IP address.

4-4
Completing Post-Installation Tasks

High availability
A high availability system, or redundant system configuration, consists of
two units or blades that share configuration information, and serve as
failover peers. If the unit you are configuring is a member of a redundant
system configuration, select Redundant Pair. If not, select Single Device.

Important
Beginning with version 10.0.0 of the software, a redundant system
configuration must contain failover peer management addresses for each
unit. If you roll forward a redundant system configuration from version
9.3.x or 9.4.x, the units start up in an offline state because each one needs a
failover peer management address. To configure the failover peer
management addresses, navigate to the Network Failover screen, available
under High Availability on the System menu in the navigation pane, and
specify the management IP address of the peer unit in the Peer
Management Address field. Then do the same on the other unit in the
redundant system. Once you specify both IP addresses, the system should
operate as expected.

Note

In a redundant system configuration that consists of two units, both units


must be the same hardware platform. We do not support redundant systems
consisting of differing hardware. For information about using VIPRION®
systems, see the Configuration Guide for the VIPRION® System.

Unit ID
This setting identifies a member in a redundant system configuration. The
default number is 1. If this is the first member in the redundant system
configuration, use the default. When you configure the second member in
the redundant system configuration, select 2. The system uses these settings
to determine which member becomes active first, should both peers come
online simultaneously.

Time zone
The time zone you select typically represents the location of the system.
However, some networks specify a time zone to accommodate a more
international aspect of the organization, such as Greenwich Mean Time
(GMT), or the time zone representing the corporate headquarters. The
system uses the time zone for the date and time of events recorded in logs.

Note

If you change the time zone, we recommend that you reboot the system to
ensure that all of the services are in sync. If you do not reboot, it does not
affect traffic or management functionality, but there is a possibility that
some timestamps might be logged or displayed incorrectly, depending on
which service has been restarted and which has not.

BIG-IP® Systems: Getting Started Guide 4-5


Chapter 4

Root account
The root account provides only console access to this system. Type the
password for the built-in account, root. In the Confirm box, retype the
password that you typed in the Password box. If you mistype the password
confirmation, the system prompts you to retype both entries.

Admin account
The admin account provides only browser access to the system. Type the
password for the built-in account, admin. In the Confirm box, retype the
password that you typed in the Password box. If you mistype the password
confirmation, the system asks you to retype both entries.

SSH access
You can use this setting to enable SSH access to the BIG-IP system.

SSH IP allow range


If you enable SSH access, you can specify the IP address or address range
for other systems that can use SSH to communicate with the system. To
grant unrestricted SSH access to all IP addresses, select *All Addresses. To
restrict SSH access to a block of IP addresses, select Specify Range, and
then type an address range in the box. For example, to restrict access to only
systems on the 192.168.0.0 network, type 192.168.*.*.

Configuring traffic management settings


Once you have an updated and active license on the system, and you have
configured the basic management settings, the configuration options screen
opens in the Configuration utility. The configuration options screen contains
two options for creating the traffic management configuration.
◆ Basic Network Configuration
This configuration method starts the basic network configuration wizard.
When you click Next, the wizard guides you through a basic network
configuration that includes an internal and external VLAN, and interface
configuration.
◆ Advanced Network Configuration
If you already know the type of configuration you want, you can click
Finished to exit the Setup utility. Use this configuration method when
you plan to create a custom VLAN configuration. If you use this method,
after you click the Finished button, open the Network section on the

4-6
Completing Post-Installation Tasks

Main tab of the navigation pane. The Network section provides access to
the objects you commonly configure for traffic management, such as
interfaces, routes, self IP addresses, VLANs, and so on.

Note

You can update the network configuration at any time by using the options
that are available under the Network section on the Main tab of the
navigation pane.

BIG-IP® Systems: Getting Started Guide 4-7


Chapter 4

Provisioning TMOS modules


The license you receive from F5 Networks determines what software
modules the BIG-IP system can support. The license ensures that you can
activate all software modules you have purchased. An F5 license is
applicable for the life of the system, or until you reactivate it, for example,
by updating the software version or purchasing additional modules. The
modules available for this version of the software include Local Traffic
Manager™, Global Traffic Manager™, Link Controller™, Application
Security Manager™, Protocol Security Module™, WebAccelerator™,
WAN Optimization Module™, and Access Policy Manager™.
When you have multiple modules on a BIG-IP system, you must apportion
CPU, memory, and disk space among the modules to make the modules
functional. This process of assigning CPU, memory, and disk space to
licensed software modules is called provisioning. Provisioning and
licensing work together to make sure that software modules are accessible
and appropriately provided with system memory and disk space.
You can determine which modules your license supports by checking the
License screen, available in the System section on the Main tab of the
navigation pane.
If you have a license for a module that you have not provisioned, the system
posts an alert in the identification and messages area of the Configuration
utility: Licensed yet unprovisioned: <modulename>, to let you know that
you do not have provisioning specified for that module.

Important
Some modules require that you provision CPU, memory, and disk space
before they are visible in the Configuration utility. If you do not see a
module that you have licensed, first check to make sure you have
provisioned CPU, memory, and disk space for it.

Understanding Resource Provisioning settings


The system provides provisioning settings on the Resource Provisioning
screen, available in the System section on the Main tab of the navigation
pane.
When you click Resource Provisioning, the system presents a screen
containing a color graph representing the current allocations for CPU cycles,
system memory, and disk space (if the system uses Logical Volume
Management (LVM) formatting), along with sections representing licensed
and unlicensed modules installed on the system. A unique color is
associated with each module, which the allocation graph uses to visually
represent the module’s CPU, memory, and disk provisioning.
Figure 4.1, following, shows a sample screen representing a system
provisioned for Local Traffic Manager and the Global Traffic Manager
module.

4-8
Completing Post-Installation Tasks

Figure 4.1 Resource Provisioning screen

Specifying provisioning levels


For each module, you can specify one of the following provision levels:
Dedicated, Nominal, Minimum, None (Disabled). Some modules, such as
WAN Optimization Module, also provide a limited mode, in this case, Lite
(no license required), which you can provision without a license. In this
mode, you can configure and operate a restricted feature set.
• The Dedicated setting specifies that this is the only active module. If you
select the Dedicated setting for one module, the system resets other
modules to the None (Disabled) setting. The Dedicated provisioning
setting is primarily applicable for Application Security Manager and
WebAccelerator systems installed in standalone configurations, that is,
when a system contains no other installed modules, including Local
Traffic Manager.
• The Nominal setting allocates CPU, memory, and disk space in a way
that is applicable for most typical configurations.
• The Minimum setting allocates the smallest amount of CPU, memory,
and disk space to the corresponding module.

BIG-IP® Systems: Getting Started Guide 4-9


Chapter 4

• The None (Disabled) setting indicates that there is no allocated CPU,


memory, or disk space. When you select the None (Disabled) setting, the
system allocates no CPU, memory, or disk space to the module. This is a
typical setting for unlicensed modules. Depending on what you select or
change, the system might require a reboot after provisioning or
deprovisioning a module.

You can provision modules for which you are not licensed. This enables you
to configure the system prior to obtaining a license. When you provision
modules you are not licensed for, the system posts an alert in the
identification and messages area of the Configuration utility: Provisioned
yet unlicensed: <modulename> to let you know that you do not have a
valid license for that module. Even though you can provision an unlicensed
module, the associated module’s features are not operable.

Important
If you provision CPU, memory, and disk space to a module whose license
later expires, the system does not automatically reallocate that CPU,
memory, and disk space. You should make sure to reprovision any CPU,
memory, and disk space from modules with expired licenses to other
modules whose licenses are currently active.

Understanding rolling forward and provisioning


If you roll forward a configuration containing a licensed module, the system
provisions the module at level Nominal. If you have more than one module
licensed, the system provisions them all at level Nominal.
If you are rolling forward a standalone configuration of Application Security
Manager (available only on a BIG-IP 4100) or the WebAccelerator system
(available only on a BIG-IP 4500), the system uses the Dedicated
provisioning level for the standalone module, and removes provisioning
from all other modules, including Local Traffic Manager.

Important
If you are installing a license, but you are not rolling forward a
configuration, the system does not provision any CPU, memory, or disk
space. In order to see and access new modules you install, you must
provision them first.

4 - 10
Completing Post-Installation Tasks

Completing system configuration


Once you finish running the Setup utility for the first time, and you
provision any modules, you can continue configuring the system. For
information about how to configure the BIG-IP system, you can reference
the online help, available on the Help tab for each screen, and the associated
guides, available in the Ask F5SM Knowledge Base, at
https://support.f5.com. You can find a description of many of the general
guides in the Finding help and technical support resources, on page 1-7. We
recommend that you start with the TMOS® Management Guide for
BIG-IP® Systems.
Each module has an associated configuration guide, which we recommend
that you review. For example, if you are running the WAN Optimization
Module, you should review the Configuration Guide for the BIG-IP® WAN
Optimization Module™.

Note

If you rolled forward a configuration, you should check to make sure that
the configuration contains all of the objects you expect. In general, the
upgrade process takes care of this for you, but you should always check to
make sure the configuration contains all objects and settings you expect.
For example, if you roll forward a configuration that contained the
WebAccelerator system, the system presents the following message after the
installation operation finishes: The WAM configuration being restored is
version 9.4.3 but the current installation is version 10.0.0. The restored
9.4.3 WAM config files may require manual merging if they had been
customised, and will NOT overwrite the 10.0.0 files. If your configuration
had not been customised no merge is required.

BIG-IP® Systems: Getting Started Guide 4 - 11


Chapter 4

4 - 12
A
Upgrading from Versions 9.3.x and 9.4.x
and Reformatting for 10.1.x

• Introducing the upgrade process

• Introducing the image2disk upgrade utility

• Upgrading version 9.3.x or 9.4.x systems or


reformatting for version 10.1.x
Upgrading from Versions 9.3.x and 9.4.x and Reformatting for 10.1.x

Introducing the upgrade process


Upgrading from version 9.3.x or 9.4.x comprises the same basic tasks as an
upgrade between differing versions of 10.x software:
• Preparation and prerequisite tasks, described in Performing prerequisite
tasks, on page 2-2, and Performing optional tasks, on page 2-10.
• Installation tasks, described in the following sections.
• Post-installation tasks, described in the sections in Chapter 4, Completing
Post-Installation Tasks.

BIG-IP® Systems: Getting Started Guide A-1


Appendix A

Introducing the image2disk upgrade utility


The image2disk utility performs software installation operations for
installing this version of the software. You use the image2disk utility in the
following situations:
• For installation of version 10.x on a system where you want to maintain a
9.3.x or 9.4.x version alongside version 10.x
• To convert version 9.3.x and 9.4.x systems to version 10.x systems
• For installation-failure operations in the event that the BIG-IP® system
configuration becomes corrupted
• To convert from one type of disk management style to another (that is,
from partitions to volumes, or vice versa)
• To format for the 10.1.x-size partitions

WARNING
Do not use the image2disk utility to install version 9.x software .im files.
Depending on the operations you perform, doing so might render the system
unusable. If you need to downgrade from version 10.x to version 9.x, use the
image2disk utility to format the system for partitions, and then use a version
9.x installation method described in the version 9.x release notes to install
the version 9.x software.

A-2
Upgrading from Versions 9.3.x and 9.4.x and Reformatting for 10.1.x

Upgrading version 9.3.x or 9.4.x systems or


reformatting for version 10.1.x
If you plan to install this version of the software onto a BIG-IP system that
is currently running version 9.3.x or 9.4.x, you must perform a one-time
upgrade procedure to make your system ready for the 10.x installation
process. During the upgrade process, you can decide to use partitions to
maintain the version 9.3.x or 9.4.x software alongside version 10.x, or use
volumes completely maintain an all-10.x system.

Important
Beginning with version 10.1.0, you must reformat the system’s hard drive
partitions even if you plan to maintain 9.x alongside 10.x. Partitions created
using version 9.x or 10.0.x software do not accommodate the 10.1.x
software. To maintain both versions, you use the image2disk utility to
reformat the drive and install the 10.1.x software, and then complete a
separate operation using a version 9.x installation method described in the
version 9.x release notes. For more information, see To format the drive for
volumes and install the software, on page A-7.

Preparing for system upgrade


Most of the preparatory installation tasks for upgrading from version 9.3.x
or 9.4.x are the same as those for using the Software Management screens to
upgrade from version 9.6.x or earlier versions of 10.x. Before you start the
system installation, ensure that the system meets the requirements listed in
the information in Performing prerequisite tasks, on page 2-2, and then
continue with Performing system upgrade, following.

Performing system upgrade


Once you complete the prerequisite tasks described in Performing
prerequisite tasks, on page 2-2, you can continue with this process to
upgrade the software, or to reformat to the 10.1.x-size partition and install
the software.
• Downloading the installation file, following.
• Installing the image2disk upgrade and disk formatting utility, on page
A-4.
• Formatting the drive with the image2disk utility, on page A-5.
• Starting the installation, on page A-6.

BIG-IP® Systems: Getting Started Guide A-3


Appendix A

• Rebooting after installation, on page A-7.

Important
You cannot use the image2disk utility to install to BIG-IP systems running
version 9.2.x or earlier. You must first upgrade to version 9.3.x or 9.4.x. For
information on upgrading, see the release notes for the associated software.

Downloading the installation file


Before you can install the software, you must download the installation file.
You can download the ISO installation image file from the F5 Networks
Downloads site, at https://downloads.f5.com.
Once you have downloaded the file, use a copy utility applicable to your
operating system to copy the ISO image to the /shared/images directory on
the BIG-IP system.
If your system does not already have this directory, you must create it. If
you create the directory, make sure to use the exact name /shared/images.

Note

You can also run the installation operation from /mnt/thumb/ on a thumb
drive that contains the downloaded ISO image. For information on creating
a thumb drive, see Appendix C, Creating a Bootable USB Thumb Drive.

Installing the image2disk upgrade and disk formatting utility


To complete an upgrade from version 9.3.x or 9.4.x, you must have the
upgrade and disk formatting utility on your system. The ISO installation file
that you downloaded in the previous task, Downloading the installation file,
contains the image2disk upgrade and disk formatting utility. You can copy
the utility to your system from the command line by typing the following
command:
im <downloaded_filename.iso>
The process copies over the image2disk utility, and then presents a status
message, which lets you know that the im command is no longer supported,
and tells you how to proceed.

A-4
Upgrading from Versions 9.3.x and 9.4.x and Reformatting for 10.1.x

Formatting the drive with the image2disk utility


When you prepare to install the 10.x software, you must decide whether you
want to format the system’s hard drive as volumes or partitions. If you plan
a configuration that consists solely of 10.x software, we recommend that
you use the volume disk-formatting scheme. If you plan to retain a 9.x
version of the software on the BIG-IP system, however, you must use the
partitions formatting scheme.
One advantage of using volumes is that you can create multiple volumes to
maintain several versions of 10.x software. Another advantage to having
multiple volumes is that a module might utilize a volume for caching or
another purpose, as described in the module’s configuration guide.

Important
Beginning with version 10.1, the software no longer fits in partitions created
using the 9.x or 10.0.x formatting options. Although you can still use
partitions to maintain version 9.x alongside 10.x, you must reformat the
drive for the larger partition size.

You use the --format option of the imge2disk utility to format for partitions
or volumes, and to convert from one type of disk management style to
another (that is, from partitions to volumes, or vice versa), as you install the
software. Also called logical volume management (LVM), volumes are
supported on all platforms and modules that version 10.x supports. If you
plan a configuration that consists solely of 10.x software, we recommend
that you use the volume disk-formatting scheme.
The image2disk utility cannot run if the system hard drive contains
low-level formatting errors. To recover a corrupted or damaged disk, you
can use the diskinit utility, and then use the image2disk utility to install the
software after formatting is complete. For information about the hard-drive
recovery process, see Recovering blank or damaged hard drives, on page
B-2.

Important
Some platforms, such as the BIG-IP 6900 and BIG-IP 8900, have multiple
drives. For these platforms, formatting creates drives with designators
MDn.n instead of HDn.n. The examples used throughout this chapter use
HDn.n when specifying installation locations. When applicable, you should
substitute MDn.n for installation.

BIG-IP® Systems: Getting Started Guide A-5


Appendix A

Starting the installation


To install the 10.x software and upgrade from version 9.3.x or 9.4.x, you
specify the designator representing the installation location to upgrade to,
the style of disk formatting, and the name of the downloaded .iso file. The
basic syntax of the command is:
image2disk --instslot=HD<slot_number> --format=<style> <downloaded_filename.iso>
When you start an installation operation, the installer copies the currently
active configuration and license into memory. If the operation migrates a
configuration, as it does in the default case, the installer applies the license
from the active location at the very end of the operation, using the
configuration and license in memory.
You can find descriptions of each image2disk option in the man page for
the utility, available at the command line by typing man image2disk.

Note

Once you have run the image2disk utility, the system prevents you from
running it again unless you are also formatting the drive using the --format
option. This is to prevent potential issues that might arise with a second
installation operation. To repeat an installation operation without
formatting, you can use the Software Management screens in the
browser-based Configuration utility, or the b software commands on the
command line. For information about using the Software Management
screens, see Using Software Management screens, on page 3-1. For
information about using the b software commands, review the man page,
available by typing the command man software at the system command line.

Formatting for volumes and installing the software


The examples in the following procedures show the commands to run to
install the software and format the drive for volumes.

WARNING
The reformatting operation erases all data on the disk. Before starting the
reformatting operation, make sure to back up your configuration and store
it in a secure, remote location.

WARNING
Do not use the --nomoveconfig option described in the following procedure
on systems with existing, running installations of Application Security
Manager™. Doing so removes all content from the associated database.
Instead, ensure that the configuration on the source installation location
matches the one on the destination. To do so, save the UCS configuration on
the location you want to preserve, and apply that configuration to the
destination before or after the installation operation.

A-6
Upgrading from Versions 9.3.x and 9.4.x and Reformatting for 10.1.x

To format the drive for volumes and install the software


1. Log on to the command line of the system using the root account.
2. Specify the command that matches the action you want:
• To migrate the configuration from the source to the destination,
run a command similar to the following:
image2disk --instslot=HD1.2 --format=volumes BIGIP-10.1.0.123.0.iso

• To preserve the configuration on the destination, run a command


similar to the following:
image2disk --instslot=HD1.2 --nomoveconfig --format=volumes BIGIP-10.1.0.123.0.iso

The upgrade process installs the software on the inactive installation


location (--instslot) that you specify. This process usually takes between
three minutes and seven minutes.

Formatting for partitions and installing the software


The procedures for formatting the drive for partitions and installing the
software are the same as those for volumes, except you substitute
partitions for volumes.
For example, to migrate the configuration from the source to the destination,
run a command similar to the following:
image2disk --instslot=HD1.2 --format=partitions BIGIP-10.1.0.123.0.iso

WARNING
If you are upgrading to BIG-IP version 10.1 or later and you plan to
maintain a mixed 9.x and 10.x environment, you must reformat the drive for
the larger, version 10.1.x partition size. You cannot simply upgrade to
version 10.1.x if you are using partitions. The 10.1.x versions of the software
do not fit in partitions created with version 9.x or 10.0.x disk formatting.

Rebooting after installation


Once the installation process completes, reboot the system to complete the
upgrade or installation operation. To do so, run the switchboot utility to
boot to the installation location you upgraded. Once there, you can check
that your configuration appears as you expect. The following example
shows the commands to run.
switchboot -b <installation_location>
reboot

The system reboots to the installation location you specify.

BIG-IP® Systems: Getting Started Guide A-7


Appendix A

Completing post-installation tasks


Once the reboot operation is complete, continue with following
post-installation tasks:
• Run the Setup utility
• Provision TMOS® modules
• Complete the system configuration

You can find procedures for each of these tasks, starting with Running the
Setup utility, on page 4-2.

A-8
B
Formatting and Recovering Disk Drives

• Introducing the diskinit utility

• Recovering blank or damaged hard drives


Formatting and Recovering Disk Drives

Introducing the diskinit utility


The diskinit utility performs low-level hard-drive formatting. You use the
diskinit utility to first format the system’s physical hard drives before you
run the image2disk utility to install the software. You use the diskinit
utility in the following situations:
• To repair low-level hard-drive formatting errors
• To convert from version 9.3.x and 9.4.x partitioning to version 10.x
volumes hard-drive formatting, without also installing the software
• To format for 10.1.x-style partitions, and install the software later

Installing the diskinit utility


To complete a low-level disk-formatting operation on a version 9.3.x or
9.4.x system, you must first install the diskinit utility. To copy the utility to
your system from the command line type the following command:
im <downloaded_filename.iso>
The process copies over the diskinit disk-formatting utility, and then
presents a status message, which lets you know that the im command is no
longer supported, and tells you how to proceed.

BIG-IP® Systems: Getting Started Guide B-1


Appendix B

Recovering blank or damaged hard drives


If the hard disk is not damaged, you can format and install the software
using the image2disk utility. For information, see To format the drive for
volumes and install the software, on page A-7.
For the installation and formatting utility image2disk to install the software
and format the drive properly, there must be at least minimal partitioning on
the system hard drives. The image2disk utility is not designed to repair
low-level hard drive formatting issues, which might occur for one of the
following reasons:
• The hard drive might be completely blank, as occurs when a system is
returned from F5 Networks after Return Merchandise Authorization
(RMA).
• The hard drive might be unreadable and need formatting.
• A failed re-partitioning, installation, or upgrade action might have left
the hard drive in an unreadable state.
• The configuration might have become corrupted or unusable, and you
can no longer access the Configuration utility or run the b software
commands for installation or upgrade operations.

For these types of low-level hard-drive formatting, you use the diskinit
utility to first format the system’s physical hard drives before you run the
image2disk utility to install the software.

Preparing the system to run the diskinit utility


In order to run the diskinit utility, the system drives cannot be active. That
means that you must boot the system into the Maintenance Operating
System (MOS). When you initially run the im command or image2disk
utility to install the 10.x software, the installation process places an updated
MOS on the system.

WARNING
To run the diskinit utility, you must have console access to the system, either
through a console server or directly through the serial connection. Once
you boot into the MOS, you lose connection with the system.

Important
Rebooting to the MOS requires that the internal drives still have a
significant portion of their current software intact and operational. If this is
not the case, you must boot from removable media, such as a USB CD/DVD
drive or a USB thumb drive. You can find information about creating a
bootable USB thumb drive in Creating the bootable thumb drive, on page
C-2.

B-2
Formatting and Recovering Disk Drives

To boot into the MOS using mosreboot


1. Log on to the command line of the system using the root account.
2. Run the following command:
mosreboot

The system reboots to the MOS, which runs in RAM. You can then run the
diskinit utility to format the system drives.

Running the diskinit utility


Once you boot into the MOS, you are ready to run the diskinit utility to
completely erase the contents of the system hard drive and reformat using
the disk formatting method you specify. If you plan to use 10.x versions of
the software exclusively, F5 Networks recommends that you use the
volumes style of disk formatting. If you plan to maintain version 9.x
software, you must use the partitions style of disk formatting. For more
information about which disk formatting style to specify for the diskinit
command, review information in Formatting the drive with the image2disk
utility, on page A-5.

WARNING
Running the diskinit utility removes all information on the system hard
drive. If that is not what you intended, do not proceed with the operation.

WARNING
If you omit the -style option in the following procedure, the disk
reformatting operation removes all file systems and volumes from all hard
drives and does not create any new ones, which can result in a
nonoperational system. This is not a typical or supported operation, and F5
Networks does not recommend it.

To run the diskinit utility


1. From the MOS command line, run a command similar to the
following:
diskinit –style [partitions|volumes]

2. The system posts the following warning:


***
*** WARNING:
*** All software and data on this system is about to be
destroyed!
***
Ready to reformat. Continue? (y|n) [n] -->

3. To continue, type y and press Enter. Otherwise, type n, and press


Enter.

BIG-IP® Systems: Getting Started Guide B-3


Appendix B

After formatting is complete, you can run the image2disk utility to install
the version 10.x software. In this case, the installation source must be a
bootable thumb drive, or another external source, since there is no directory
structure on the disk. You can then apply a previously archived
configuration file, or you can apply the default configuration.

Note

For a list of command options available for the diskinit utility, see the
command line help, available by running the command diskinit -h on the
command line.

To run image2disk after running diskinit


1. Boot from the thumb drive or external installation source.
2. Type the command that represents the operation you want.
• To format for volumes and install the version 10.x software, run a
command similar to the following:
image2disk --instslot=HD1.2 --nosaveconfig --format=volumes /mnt/thumb/

• To format for volumes and install the version 10.x software, run a
command similar to the following:
image2disk --instslot=HD1.2 --nosaveconfig --format=partitions /mnt/thumb/

3. After the system reboots, complete the installation on all other


volumes or partitions.
4. On each installation location, apply the previously archived
configuration file. For information about restoring a configuration
file, see Managing pre-existing configuration files, on page 2-10.

B-4
C
Creating a Bootable USB Thumb Drive

• Introducing the mkdisk utility

• Creating the bootable thumb drive


Creating a Bootable USB Thumb Drive

Introducing the mkdisk utility


You can use the mkdisk utility to create a bootable USB thumb drive
containing a software installation image. You can then use that thumb drive
as the installation source to install the software and recover the system.
You use the mkdisk utility to create a bootable thumb drive in the following
situations:
• You want to upgrade to version 10.x from version 9.3.x or 9.4.x, and you
do not have the installation image on the system hard drive.
• You already have a version 10.x installation, but you cannot access the
system hard drives.

Note

You can find the mkdisk utility in the full release software ISO installation
image, but not in a hotfix ISO installation image.

BIG-IP® Systems: Getting Started Guide C-1


Appendix C

Creating the bootable thumb drive


When you create a bootable thumb drive, you can use a BIG-IP® system, or
you can use a Linux workstation.
The system you use to create a bootable thumb drive must contain a number
of non-TMOS® system software components and third-party utilities. For
information about non-TMOS software components and third-party utilities,
see the associated documentation. The system you use to create the bootable
thumb drive must contain these software components and third-party
utilities:
◆ A system running Linux running the 2.6.x kernel
◆ Perl version 5.8 or later
◆ The Library for WWW in Perl (LWP) package
For downloading and other information about the LWP Perl module
collection, search the Comprehensive Perl Archive Network (CPAN)
programming library, available at http://www.cpan.org/, or use another
source, such as a Red Hat Package Manager (RPM) file
(http://rpm.org/), the Advanced Packaging Tool apt-get program
(http://linux.die.net/man/8/apt-get), or another reliable source.
◆ Utilities for disk and image manipulation
The required utilities depend on the BIG-IP platform that you plan to use
the thumb drive to install.
• For BIG-IP platforms 1600, 3600, 3900, 6900, and 8900, the
workstation must have the following utilities:
• sfdisk: changes disk partitioning.
• mke2fs: creates a Linux (ext2) file system.
• extlinux: represents a lightweight bootloader that starts up
computers with the Linux kernel.

• For BIG-IP platforms 1500, 3400, 3410, 6400, 6800, 8400, and 8800,
the workstation must have the following utilities:
• sfdisk: changes disk partitioning.
• mformat: creates a FAT32 file system.
• syslinux: represents a lightweight bootloader that starts up
computers with the Linux kernel.
• mkisofs: creates an ISO9660 file system image.
• implantisomd5: implants an MD5 checksum in an ISO9660
image.

C-2
Creating a Bootable USB Thumb Drive

• For 10.x VIPRION® platforms, the workstation must have the


following utilities:
• sfdisk: changes disk partitioning.
• mke2fs: creates a Linux (ext2) file system.
• mkelfImage: makes an Executable and Linkable Format (ELF)
boot image for Linux kernel images.

Important
You cannot create a bootable thumb drive on a version 9.6.x VIPRION
system. You must use a version 10.x VIPRION system.

To create the bootable thumb drive


1. Log on to the Linux workstation or BIG-IP system as root, since
you need block-level access to the thumb drive.
2. Mount the BIG-IP .iso file as a loopback device, or insert a BIG-IP
DVD (not a CD-ROM) into the DVD drive. Either way, this process
assumes that the .iso file or DVD drive is mounted at /mnt/cd. (If
you do not have this directory, you must create it. If you create it,
use the exact name /mnt/cd.) To mount the .iso file, run the
command:
mount -o loop BIGIP-10.1.0.5399.0.iso /mnt/cd

3. Insert a 1 GB or larger thumb drive in a USB port on the Linux


workstation or BIG-IP system.
4. To change to the root directory of the mounted device, run the
command:
cd /mnt/cd

5. To start the mkdisk script from that directory, run the command:
./mkdisk

6. Answer the questions the operation asks:


a) Specify the BIG-IP system you plan to use as the target for
thumb-drive installation operations.
b) Specify the device to be used in the mkdisk operation (that is, the
thumb drive you are creating).
c) To confirm that you want to continue, type y.
d) Specify the product (for example, BIG-IP 10.1.0) to transfer, or
if there is only one product, type y to transfer that software.
The operation checks for the required tools, and creates the thumb
drive, which takes approximately two or three minutes on a BIG-IP®
1600 system. The interval on other systems varies.
7. To unmount the loopback device, run the command:
umount /mnt/cd

BIG-IP® Systems: Getting Started Guide C-3


Appendix C

Once the process completes, you can use the thumb drive to boot to the
Maintenance OS (MOS) of the target device.

Important
Before you boot to the MOS, make sure you have console access to the
system, either through a console server or directly through the serial
connection. Once you boot into the MOS, you lose connection with the
system.

To reboot systems other than VIPRION systems


1. Place the thumb drive in the USB port of the target device.
2. Reboot the target device.
3. The device automatically boots to the MOS on the attached thumb
drive.

To reboot VIPRION systems


1. Place the thumb drive in the USB port of the target device.
2. Reboot the target device.
3. When the boot process begins, select boot device sda from the
kboot grub menu to boot to the MOS on the attached thumb drive.

Note

On VIPRION systems, if you attach a USB DVD drive containing a bootable


CD or DVD you create by copying the ISO image to the disc, when you
reboot, the menu item to select is sr0.

C-4
D
Monitoring the BIG-IP System

• Introducing the dashboard

• Viewing BIG-IP system information

• Viewing statistics for other modules


Monitoring the BIG-IP System

Introducing the dashboard


The BIG-IP® system provides a dashboard that you can use to monitor
overall system performance and performance of specific modules. The
dashboard displays system statistics graphically, showing gauges and
graphs, and you can view the same statistics in a table view. Information is
updated every three seconds.
You can display the dashboard from the menu bar of the Performance
screen.

Important
To run the dashboard, the computer on which you are working must have
Adobe® Flash Player (version 9 or later) installed on it.

This chapter describes how to display the dashboard screens. The dashboard
includes online help for information about how to interpret the statistics on
each of the panels that appear on the screens. Click the ? in the upper right
corner of any panel to display the online help.

BIG-IP® Systems: Getting Started Guide D-1


Appendix D

Viewing BIG-IP system information


You can view CPU usage, memory usage, connection types, and throughput
statistics for the BIG-IP system on the dashboard.

To view BIG-IP system statistics on the dashboard


1. On the Main tab of the navigation pane, expand Overview and click
Performance.
The Performance screen opens.
2. On the menu bar, click Dashboard.
The Performance Overview screen of the dashboard opens in a
separate window. It may take a few seconds for the system to
transfer data to the dashboard.

Figure D.1 shows a typical Performance overview screen in the dashboard.

Figure D.1 BIG-IP Dashboard, Performance Overview screen

D-2
Monitoring the BIG-IP System

Viewing CPU statistics


The CPU panel of the Performance Overview screen displays CPU statistics
in a gauge, showing the busiest CPU; a chart, showing the busiest CPU,
average CPU usage, and the least busiest CPU; and a table view that shows
details for each CPU including fan speed, temperature, and usage.
Figure D.2 shows the graphic view of the CPU panel. The busiest CPU is
using 89.1% of its CPU capacity on all system management and application
tasks.

Figure D.2 CPU panel of the Dashboard, Performance Overview screen

By clicking the grid icon in the upper left corner, you can display more
details in a table format. Figure D.3 shows the CPU panel, table view.

Figure D.3 CPU panel, table view

In the table view, you can see that one of the CPUs, cpu1, is doing most of
the work.

BIG-IP® Systems: Getting Started Guide D-3


Appendix D

Viewing memory usage statistics


The Memory panel of the Performance Overview screen displays the
amount of total system memory is currently in use. A chart breaks down
memory usage into how much the Traffic Management Microkernel (TMM)
is using for traffic management, and how much is being used for all other
processes, such as those for system configuration and monitoring.
Figure D.4 shows the graphic view of the Memory panel. In this example,
the Memory Usage gauge shows that 77.5% of the total system memory is
currently in use.

Figure D.4 Memory panel of the Dashboard, Performance Overview


screen

The Breakdown chart in the figure shows that of the 4.1 GB of memory
allocated on this BIG-IP system, processes other than TMM are using most
of the memory. The Usage % chart shows that memory usage over the last
five minutes has been steady at about 77%.

Viewing connection statistics


The Statistics panel of the Performance Overview screen displays the total
open TCP connections on the system, and separately lists new connections,
SSL connections, and all active connections for the time specified.
Figure D.5, on page D-5, shows the graphic view of the Statistics panel with
the Open tab selected. It shows that during the last 5 minutes the system has
had up to 32,000 open connections, and now it has 16,702 connections.

D-4
Monitoring the BIG-IP System

Figure D.5 Statistics panel of the Dashboard, Performance Overview


screen

Viewing throughput statistics


The Throughput panel of the Performance Overview screen summarizes the
amount of traffic in bits per second that the system has handled during the
time specified in the timeframe menu. It also separately shows SSL
throughput, compression throughput, and all throughput.
Figure D.6 shows the graphic view of the Throughout panel with the Total
tab selected. The total throughput on the system for the last 5 minutes ranges
between about 510 Mbps and 900 Mbps.

Figure D.6 Throughput panel of the Dashboard, Performance Overview


screen

BIG-IP® Systems: Getting Started Guide D-5


Appendix D

Viewing statistics for other modules


If you have licensed and provisioned other modules on the BIG-IP system
that support the dashboard, you can view statistics specific to the module
(for example, the WAN Optimization Module).

To view statistics for other modules on the dashboard


1. On the Main tab of the navigation pane, expand Overview and click
Performance.
The Performance screen opens.
2. On the menu bar, click Dashboard.
The Performance Overview screen of the dashboard opens.
3. In the upper right corner, click Overview and choose the module for
which you want to view statistics.
The module screen of the dashboard opens.

D-6
Glossary
Glossary

active unit
In a redundant system, the active unit is the system that currently load
balances connections. If the active unit in the redundant system fails, the
standby unit assumes control and begins to load balance connections. See
also redundant system configuration.

administrative partition
An administrative partition is a logical container that you create, containing
a defined set of BIG-IP system objects. You use administrative partitions to
control user access to the BIG-IP system. See also user role.

archive
An archive is a backup copy of the BIG-IP system configuration data. This
archive is in the form of a user configuration set, or UCS. See also user
configuration set (UCS).

configuration synchronization
Configuration synchronization, or ConfigSync, is the task of duplicating a
BIG-IP system’s configuration data onto its peer unit in a redundant system.

Configuration utility
The Configuration utility is the browser-based application that you use to
configure the BIG-IP system.

connection mirroring
Connection mirroring is a feature that causes all connections coming
through the active unit of a redundant system to be replicated on the standby
unit. This prevents any interruption in service when failover occurs.

default route
A default route is the route that the system uses when no other route
specified in the routing table matches the destination address or network of
the packet to be routed.

default VLAN
The BIG-IP system is configured with two default VLANs, one for each
interface. One default VLAN is named internal and one is named external.
See also VLAN (virtual local area network).

default wildcard virtual server


A default wildcard virtual server has an IP address and port number of
0.0.0.0:0. or *:* or "any":"any". This virtual server accepts all traffic that
does not match any other virtual server defined in the configuration.

BIG-IP® Systems: Getting Started Guide Glossary - 1


Glossary

disk partition
A disk partition is a portion of a hard drive that contains a version of the
software and a system configuration. A system drive may be formatted as a
partition or a volume. See also volume.

domain name
A domain name is a unique name that is associated with one or more IP
addresses. Domain names are used in URLs to identify particular Web
pages. For example, in the URL http://www.siterequest.com/index.html,
the domain name is siterequest.com.

external VLAN
The external VLAN is a default VLAN on the BIG-IP system. In a basic
configuration, this VLAN has the administration ports locked down. In a
normal configuration, this is typically a VLAN on which external clients
request connections to internal servers.

failover
Failover is the process whereby a standby unit in a redundant system takes
over when a software failure or a hardware failure is detected on the active
unit. See also redundant system configuration.

floating self IP address


A floating self IP address is an additional self IP address for a VLAN that
serves as a shared address by both units of a BIG-IP redundant system.

gateway
A gateway provides communication between two networks, through
software, hardware, or a combination of software and hardware.

interface
A physical port on a BIG-IP system is called an interface.

internal VLAN
The internal VLAN is a default VLAN on the BIG-IP system. In a basic
configuration, this VLAN has the administration ports open. In a normal
configuration, this is a network interface that handles connections from
internal servers.

local traffic management


Local traffic management is the process of managing network traffic that
comes into or goes out of a local area network (LAN), including an intranet.

logical volume management (LVM)


Logical volume management is the version 10.x scheme used for formatting
the system disk drive into volumes. See also volume.

Glossary - 2
Glossary

management interface
The management interface is a special port on the BIG-IP system, used for
managing administrative traffic. Named MGMT, the management interface
does not forward user application traffic, such as traffic slated for load
balancing.

management route
A management route is a route that forwards traffic through the special
management (MGMT) interface.

monitor
The BIG-IP system uses monitors to determine whether nodes are up or
down. There are several different types of monitors and they use various
methods to determine the status of a server or service. See also node
address, pool.

name resolution
Name resolution is the process by which a name server matches a domain
name request to an IP address, and sends the information to the client
requesting the resolution.

node address
A node address is the IP address associated with one or more nodes. This IP
address can be the real IP address of a network server, or it can be an alias IP
address on a network server. See also monitor.

partition
See administrative partition or disk partition.

pool
A pool is composed of a group of network devices (called members). The
BIG-IP system load balances requests to the nodes within a pool based on
the load balancing method and persistence method you choose when you
create the pool or edit its properties.

port
A port can be represented by a number that is associated with a specific
service supported by a host.

profile
A profile is a configuration tool containing settings for defining the behavior
of network traffic. The BIG-IP system contains profiles for managing
Fast L4, HTTP, FTP, UDP, and SSL traffic, as well as for implementing
session persistence, server-side connection pooling, and remote application
authentication.

BIG-IP® Systems: Getting Started Guide Glossary - 3


Glossary

provisioning
Provisioning is the process of assigning CPU, memory, and disk space to
licensed software modules. Provisioning and licensing work together to
make sure that software modules are accessible and appropriately provided
with CPU cycles, system memory, and disk space.

redundant system configuration


Redundant system configuration refers to a pair of units that are configured
for failover. In a redundant system configuration, there are two units, one
running as the active unit and one running as the standby unit. If the active
unit fails, the standby unit takes over and manages connection requests.

remote administrative workstation


A remote administrative workstation is a system that uses as Telnet or SSH
to connect though an IP address to a BIG-IP system allows shell
connections.

roll forward
Roll forward is a function of the installation process that preserves the
existing configuration. When you install the software or upgrade, the system
uses the previously archived user configuration set (UCS) file in the
/var/local/ucs directory on the source installation location to update the
configuration on the installation destination.

self IP address
Self IP addresses are the IP addresses owned by the BIG-IP system that you
use to access devices in VLANs. You assign self IP addresses to VLANs.

service
Service refers to services such as TCP and HTTP.

Setup utility
The Setup utility walks you through the initial system configuration process.
You can run the Setup utility from the Configuration utility start page. See
also Configuration utility.

single configuration file (SCF)


A single configuration file, or SCF, is a file that you create using the
bigpipe utility. The purpose of this file is to store an entire BIG-IP system
configuration that you can then easily replicate on another BIG-IP system.
See also user configuration set (UCS).

SSH
SSH is a protocol for secure remote logon and other secure network services
over a non-secure network.

Glossary - 4
Glossary

SSL (Secure Sockets Layer)


SSL is a network communications protocol that uses public-key technology
as a way to transmit data in a secure manner.

standby unit
A standby unit in a redundant system is a unit that is always prepared to
become the active unit if the active unit fails. See also redundant system
configuration.

static self IP address


A static self IP address is a self IP address that is not shared between two
units of a redundant system.

TMM (Traffic Management Microkernel) service


The TMM service is the process running on the BIG-IP system that
performs most traffic management for the product.

TMOS® (Traffic Management Operation System)


The Traffic Management Operating System® is the internal mechanism
within the BIG-IP system that is responsible for all traffic-management
functions.

user configuration set (UCS)


A user configuration set is a backup file that you create for the BIG-IP
system configuration data. When you create a UCS, the BIG-IP system
assigns a .ucs extension to the file name. See also archive, single
configuration file (SCF), and roll forward.

user role
A user role is a type and level of access that you assign to a BIG-IP system
user account. By assigning user roles, you can control the extent to which
BIG-IP system administrators can view or modify the BIG-IP system
configuration. See also administrative partition.

virtual address
A virtual address is an IP address associated with one or more virtual servers
managed by the BIG-IP system. See also virtual server.

virtual server
Virtual servers are a specific combination of virtual address and virtual port,
associated with a content site that is managed by a BIG-IP system or other
type of host server.

BIG-IP® Systems: Getting Started Guide Glossary - 5


Glossary

VLAN (virtual local area network)


A VLAN is a logical grouping of interfaces connected to network devices.
You can use a VLAN to logically group devices that are on different
network segments. Devices within a VLAN use Layer 2 networking to
communicate and define a broadcast domain.

volume
A volume is a portion of a hard drive that contains a version of the software
and a system configuration. A system drive may be formatted as volumes or
partitions. See also disk partition and logical volume management (LVM).

Glossary - 6
Index
Index

described 1-3
10.x software installation 3-4 configuration upgrade 2-12
10.x volumes 2-6 Configuration utility
9.3.x or 9.4.x software accessing 2-8
installing with version 10.x A-2 described 1-3
9.6.x or earlier 10.x version upgrade 3-1 licensing at initial setup 1-4
9.x partitions 2-6 reviewing browser support 1-4
using 1-2
connections statistics D-4
A console configuration 2-4
About tab 1-4 conventions, stylistic 1-5
active volume, setting 2-8 cpcfg utility 2-12
additional information 1-7 CPU panel, Performance Overview screen D-3
add-on registration key 2-8 CPU statistics, viewing D-3
address range, setting for SSH access 4-6
admin account
configuring 4-6 D
described 4-3 dashboard
using default 2-5 described D-1
after installation reboot viewing system information D-2
upgrading from version 9.3.x or 9.4.x A-7 default admin password 2-5
upgrading in version 10.x 3-5 default network configuration 2-5
archive file 2-10 default root password 2-5
defined 2-11
difference in SCF and UCS 2-11
B disaster recovery A-2, B-1, C-1
b software commands 3-2 disk format types B-2
base registration key 2-8 disk formatting 2-6
basic configuration setup 4-2 disk space and memory allocation 4-8
basic installation, defined 2-2 diskinit commands B-3
basic management settings screen in Setup utility 4-3 diskinit utility
basic setup instructions 1-7 described B-1
BIG-IP system information, viewing in dashboard D-2 recovering the system B-1
bigpipe utility using B-2
described 1-4 documentation, finding additional 1-7
using to export configuration 2-11 downloads 3-3, A-4
using to import configuration 2-11
bootable thumb drive C-1, C-2
E
existing configuration 2-10
C
cable, null modem 2-4
check date in license 2-8 F
clients failover and installation 2-13
using for SSH access 1-4 fully qualified domain name 4-4
using for Telnet access 1-4
command line installation 3-2 G
command line utilities 1-4
gauge
command syntax, conventions 1-6
viewing BIG-IP system statistics D-2
commands to create SCF 2-11
viewing Busiest CPU D-3
compression throughput D-5
viewing Memory Usage D-4
configuration archive 2-10
gauges, in Dashboard D-1
configuration file 2-11
guides, finding additional 1-7
configuration options screen in Setup utility 4-6
configuration roll-forward 2-10
configuration tool H
choosing 1-2 hardware setup instructions 1-7

BIG-IP® Systems: Getting Started Guide Index - 1


Index

Help tab 1-4 using previously specified 2-2


help, online 1-7 management interface configuration 2-2
high availability system 4-5 management IP address
Host IP address setting 4-4 adding 2-2
Host name setting 4-4 setting from LCD 2-3
Management Operating System B-2
management port 2-4
I management workstation 2-4
identification area in Configuration utility 1-3 manuals, finding additional 1-7
im utility A-4, B-1 member, redundant system 4-5
image2disk commands A-5, A-6 memory and disk allocation 4-8
image2disk utility Memory panel, Performance Overview screen D-4
described A-2 memory statistics D-4
preparing to use B-2 memory usage statistics D-4
recovering the system A-2 menu bar in Configuration utility 1-4
using for installation A-3 messages area in Configuration utility 1-3
installation mkdisk commands C-3
archiving configuration 2-10 mkdisk utility
defined 2-2 described C-1
downloading image file 3-3, A-4 preparing system for C-2
prerequisites 2-2 using C-3
rebooting after 3-5, A-7 modules
summarizing tasks 2-2 described 1-1
upgrading from version 9.2.x or earlier A-4 licensing 2-8
using from version 9.3.x or 9.4.x A-4, B-1 provisioning 4-8
using in version 10.x 3-4 MOS B-2
using on redundant systems 2-13 mosreboot command B-2
using the command line 3-2
using the image2disk utility A-4, B-1
installation image, creating C-2 N
installation task summary 2-2 navigation pane in Configuration utility 1-4
instructions for hardware setup, printed 1-7 new license activation 2-9
interface for management connection 2-2 null modem cable 2-4
IP addresses, defining 4-2
IP alias
adding to UNIX system 2-5 O
creating 2-5 online help 1-7
IP usage on Windows 2-5 optional installation tasks 2-10

L P
LCD panel partitions
defined 2-2 deciding on A-5
using to add management IP address 2-2 recovering system B-2
using to set management IP address 2-3 password
license using default admin 2-5
activating 2-8 using default root 2-5
installing new 2-8 Performance Overview screen D-2
license check date 2-8 preliminary version 9.3.x or 9.4.x to 10.x tasks A-3
LVM disk format scheme 2-6 prerequisites for installation 2-2
printed setup instructions 1-7
process for installation 2-2
M product documentation, finding additional 1-7
Main tab 1-4 product modules 1-1
Maintenance Operating System B-2 provision tasks 4-8
management interface
defined 2-4

Index - 2
Index

R using image2disk A-4, B-1


reboot after installation 3-5, A-7 using tmsh 1-4
recovery of hard drives B-2 using to configure system 4-6
redundant system SSH access 4-6
configuring unit ID 4-5 SSH client 1-4
defined 4-5 SSL connection statistics D-4
installing on 2-13 static IP requirement 2-5
redundant system member 4-5 Statistics panel, Performance Overview screen D-4
remote shell 1-4 statistics, viewing D-1
retaining configuration 2-10 stylistic conventions 1-5
roll-forward process 2-10 summary of installation tasks 2-2
root account support account
configuring 4-6 described 4-3
described 4-3 system
root default account 2-5 licensing 2-9
root password setting unit ID 4-5
described 4-2 system configuration
finding default 2-5 copying 2-12
exporting 2-11
importing 2-11
S retaining 2-10
SCF system connection 2-2
archiving 2-10 system hardware setup instructions 1-7
defined 2-11 system messages, viewing 1-4
understanding differences from UCS 2-12 system performance, monitoring D-1
upgrading 2-12 system recovery A-2, C-1
serial console 2-2, 2-4 system statistics, viewing D-1
service check date 2-8
setup instructions for hardware, printed 1-7
Setup utility T
preventing from running 4-2 tasks for installation 2-2
running and rerunning 4-2 technical support 1-7
using configuration options screen 4-6 Telnet client 1-4
using management settings screen 4-3 terminal emulator 2-4
setup.run db key 4-2 Throughput panel, Performance Overview screen D-5
single configuration file. See SCF. throughput statistics D-5
software installation thumb drive, using for installation C-1
specifying source installation directory 3-4 Time zone setting 4-5
using b software commands 3-2 TMOS module provision tasks 4-8
using for version 10.x 3-1 tmsh utility 1-4
using for version 9.3.x or 9.4.x upgrade A-6 Traffic Management Operating System (TMOS) 1-1
using image2disk commands A-6 traffic management software
using Software Management screens 3-1 activating 2-8
software license 2-8 configuring network settings 4-6
Software Management screen licensing 2-8
creating volumes 2-7
deleting volumes 2-7 U
downloading software 3-3
UCS
importing software 3-3
archiving 2-11
rebooting from 3-5
defined 2-11
using for installation 3-4
introducing 2-10
software provisioning 4-8
understanding differences from SCF 2-12
software utilities
upgrading 2-12
using bigpipe 1-4
unit ID setting 4-5
using cpcfg 2-12
unlicensed systems 2-8
using diskinit B-2
upgrade configuration 2-10

BIG-IP® Systems: Getting Started Guide Index - 3


Index

upgrade process
using for one-time upgrade from 9.3.x or 9.4.x A-3
using for SCF or UCS 2-12
using for version 10.x 3-1
using from pre-9.3.x version upgrade 3-2
using from version 9.3.x or 9.4.x A-3, A-4, B-1
using from version 9.6.x or earlier 10.x 3-1
using from versions earlier than 9.3.x 3-2
USB thumb drive. See bootable thumb drive.
user configuration set. See UCS.
utilities
using command line configuration 1-4
using cpcfg 2-12
using diskinit B-2
using for advanced network configuration 4-6
using for basic network configuration 4-6
using image2disk A-4, B-1
using mkdisk C-3
using Setup 4-2

V
valid license 2-8
version upgrade
using from pre-9.3.x versions 3-2
using from version 9.3.x or 9.4.x A-3
using from version 9.6.x or earlier 10.x 3-1
volumes
creating and deleting 2-7
deciding on drive formatting A-5
defined 2-6
recovering system B-2
working with 2-6

W
Windows IP requirement 2-5

Index - 4

Potrebbero piacerti anche