Professional Documents
Culture Documents
version 10.0.0
MAN-0291-00
Product Version
This manual applies to product version 10.0.0 of the BIG-IP Local Traffic Manager, BIG-IP Global Traffic Manager, BIG-IP Link Controller, BIG-IP SSL Accelerator, BIG-IP Application Security Manager, and the BIG-IP WebAccelerator System, BIG-IP WAN Optimization Module, and VIPRION systems.
Publication Date
This manual was published on September 22, 2009.
Legal Notices
Copyright
Copyright 2008-2009, F5 Networks, Inc. All rights reserved. F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5 assumes no responsibility for the use of this information, nor any infringement of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent, copyright, or other intellectual property right of F5 except as specifically described by applicable user licenses. F5 reserves the right to change specifications at any time without notice.
Trademarks
F5, F5 Networks, the F5 logo, BIG-IP, 3-DNS, Acopia, Acopia Networks, Application Accelerator, Ask F5, Application Security Manager, ASM, ARX, Data Guard, Enterprise Manager, EM, FirePass, FreedomFabric, Global Traffic Manager, GTM, iControl, Intelligent Browser Referencing, Internet Control Architecture, IP Application Switch, iRules, Link Controller, LC, Local Traffic Manager, LTM, Message Security Module, MSM, NetCelera, OneConnect, Packet Velocity, SSL Accelerator, SYN Check, Traffic Management Operating System, TMOS, TrafficShield, Transparent Data Reduction, uRoam, VIPRION, WANJet, WebAccelerator, and ZoneRunner are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries, and may not be used without F5's express written consent.
Patents
This product protected by U.S. Patents 6,327,242; 6,374,300; 6,473,802; 6,970,933; 7,051,126; 7,102,996; 7,146,354; 7,197,661; 7,206,282; 7,287,084. Other patents pending.
RF Interference Warning
This is a Class A product. In a domestic environment this product may cause radio interference, in which case the user may be required to take adequate measures.
FCC Compliance
This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This unit generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user, at his own expense, will be required to take whatever measures may be required to correct the interference. Any modifications to this device, unless expressly approved by the manufacturer, can void the user's authority to operate this equipment under part 15 of the FCC rules.
Standards Compliance
This product conforms to the IEC, European Union, ANSI/UL and Canadian CSA standards applicable to Information Technology products at the time of manufacture.
Acknowledgments
This product includes software developed by Bill Paul. This product includes software developed by Jonathan Stone. This product includes software developed by Manuel Bouyer. This product includes software developed by Paul Richards. This product includes software developed by the NetBSD Foundation, Inc. and its contributors. This product includes software developed by the Politecnico di Torino, and its contributors. This product includes software developed by the Swedish Institute of Computer Science and its contributors. This product includes software developed by the University of California, Berkeley and its contributors. This product includes software developed by the Computer Systems Engineering Group at the Lawrence Berkeley Laboratory. This product includes software developed by Christopher G. Demetriou for the NetBSD Project. This product includes software developed by Adam Glass. This product includes software developed by Christian E. Hopps. This product includes software developed by Dean Huxley. This product includes software developed by John Kohl. This product includes software developed by Paul Kranenburg. This product includes software developed by Terrence R. Lambert. This product includes software developed by Philip A. Nelson. This product includes software developed by Herb Peyerl. This product includes software developed by Jochen Pohl for the NetBSD Project. This product includes software developed by Chris Provenzano. This product includes software developed by Theo de Raadt. This product includes software developed by David Muir Sharnoff. This product includes software developed by SigmaSoft, Th. Lockert. This product includes software developed for the NetBSD Project by Jason R. Thorpe. This product includes software developed by Jason R. Thorpe for And Communications, http://www.and.com. This product includes software developed for the NetBSD Project by Frank Van der Linden. This product includes software developed for the NetBSD Project by John M. Vinopal. This product includes software developed by Christos Zoulas. This product includes software developed by the University of Vermont and State Agricultural College and Garrett A. Wollman. This product includes software developed by Balazs Scheidler <bazsi@balabit.hu>, which is protected under the GNU Public License. This product includes software developed by Niels Mueller <nisse@lysator.liu.se>, which is protected under the GNU Public License. In the following statement, "This software" refers to the Mitsumi CD-ROM driver: This software was developed by Holger Veit and Brian Moore for use with "386BSD" and similar operating systems. "Similar operating systems" includes mainly non-profit oriented systems for research and education, including but not restricted to "NetBSD," "FreeBSD," "Mach" (by CMU). This product includes software developed by the Apache Group for use in the Apache HTTP server project (http://www.apache.org/). This product includes software licensed from Richard H. Porter under the GNU Library General Public License ( 1998, Red Hat Software), www.gnu.org/copyleft/lgpl.html.
ii
This product includes the standard version of Perl software licensed under the Perl Artistic License ( 1997, 1998 Tom Christiansen and Nathan Torkington). All rights reserved. You may find the most current standard version of Perl at http://www.perl.com. This product includes software developed by Jared Minch. This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product contains software based on oprofile, which is protected under the GNU Public License. This product includes RRDtool software developed by Tobi Oetiker (http://www.rrdtool.com/index.html) and licensed under the GNU General Public License. This product contains software licensed from Dr. Brian Gladman under the GNU General Public License (GPL). This product includes software developed by the Apache Software Foundation <http://www.apache.org/>. This product includes Hypersonic SQL. This product contains software developed by the Regents of the University of California, Sun Microsystems, Inc., Scriptics Corporation, and others. This product includes software developed by the Internet Software Consortium. This product includes software developed by Nominum, Inc. (http://www.nominum.com). This product contains software developed by Broadcom Corporation, which is protected under the GNU Public License. This product includes software developed by the Computer Systems Engineering Group at Lawrence Berkeley Laboratory. Copyright 1990-1994 Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the Computer Systems Engineering Group at Lawrence Berkeley Laboratory. 4. Neither the name of the University nor of the Laboratory may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product includes software developed by Sony Computer Science Laboratories Inc. Copyright 1997-2003 Sony Computer Science Laboratories Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY SONY CSL AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL SONY CSL OR CONTRIBUTORS BE LIABLE FOR ANY
iii
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
iv
Table of Contents
Table of Contents
1
Introducing BIG-IP Systems
Getting started with BIG-IP systems ..........................................................................................1-1 Understanding this guide ...............................................................................................................1-2 Choosing a configuration tool ......................................................................................................1-2 Using the Configuration utility ............................................................................................1-2 Using command line utilities ................................................................................................1-4 Understanding stylistic conventions ...........................................................................................1-5 Identifying references to products .....................................................................................1-5 Identifying references to other documents .....................................................................1-5 Using the examples ................................................................................................................1-5 Identifying new terms ............................................................................................................1-5 Identifying references to objects, names, and commands ............................................1-5 Identifying command syntax ................................................................................................1-6 Finding help and technical support resources ..........................................................................1-7
2
Preparing the System for Installation
Summarizing 10.x installation and upgrade ...............................................................................2-1 Performing prerequisite tasks ......................................................................................................2-2 Configuring the management interface .............................................................................2-2 Establishing a connection to the system ...........................................................................2-4 Working with volumes .........................................................................................................2-6 Activating the software license ...........................................................................................2-8 Performing optional tasks .......................................................................................................... 2-10 Managing pre-existing configuration files ....................................................................... 2-10 Preparing units in a redundant system configuration ................................................. 2-13
3
Performing the Installation
Introducing the installation process ............................................................................................3-1 Upgrading from 9.6.x or earlier versions of 10.x ...........................................................3-1 Upgrading from version 9.3.x or 9.4.x ..............................................................................3-2 Upgrading from software versions earlier than 9.3.x ....................................................3-2 Downloading and importing the installation file ......................................................................3-3 Starting the installation ..................................................................................................................3-4 Rebooting the system ....................................................................................................................3-5
4
Completing Post-Installation Tasks
Understanding system configuration ..........................................................................................4-1 Running the Setup utility ...............................................................................................................4-2 Preventing the Setup utility from running automatically ...............................................4-2 Specifying settings in the Setup utility ...............................................................................4-3 Configuring basic management settings ............................................................................4-3 Configuring traffic management settings ..........................................................................4-6 Provisioning TMOS modules ........................................................................................................4-8 Understanding Resource Provisioning settings ...............................................................4-8 Specifying provisioning levels ..............................................................................................4-9 Understanding rolling forward and provisioning ......................................................... 4-10 Completing system configuration ............................................................................................. 4-11
Table of Contents
A
Using the image2disk and diskinit Utilities
Introducing the image2disk and diskinit utilities .....................................................................A-1 Upgrading version 9.3.x or 9.4.x systems ................................................................................A-2 Preparing for system upgrade ............................................................................................A-2 Performing system upgrade ................................................................................................A-2 Downloading the installation file .......................................................................................A-2 Installing the image2disk upgrade utility ..........................................................................A-3 Starting the installation ........................................................................................................A-3 Formatting for volumes .......................................................................................................A-4 Rebooting after installation .................................................................................................A-5 Completing post-installation tasks ....................................................................................A-5 Recovering the system using image2disk ..................................................................................A-6 Recovering blank or damaged hard drives ...............................................................................A-7 Preparing the system to run the diskinit utility .............................................................A-7 Running the diskinit utility ..................................................................................................A-8
B
Creating a Bootable USB Thumb Drive
Introducing the mkdisk utility ..................................................................................................... B-1 Creating the bootable thumb drive ........................................................................................... B-2
C
Monitoring the BIG-IP System
Introducing the dashboard ...........................................................................................................C-1 Viewing BIG-IP system information ...........................................................................................C-2 Viewing CPU statistics .........................................................................................................C-3 Viewing memory usage statistics .......................................................................................C-4 Viewing connection statistics .............................................................................................C-4 Viewing throughput statistics .............................................................................................C-5 Viewing statistics for other modules .........................................................................................C-6
Glossary Index
ii
1
Introducing BIG-IP Systems
Getting started with BIG-IP systems Understanding this guide Choosing a configuration tool Understanding stylistic conventions Finding help and technical support resources
1-1
Chapter 1
1-2
The identification and messages area The identification and messages area of the Configuration utility is the screen region that is above the navigation pane, the menu bar, and the body. In this area, you find the system identification, including the host name, management IP address, logged on user name and role, and date and time information. Below the top area are identifiers for the unit and
1-3
Chapter 1
state of the system. This area is also where the system presents certain system messages, for example Activation Successful, which appears after a successful licensing process.
The navigation pane The navigation pane, on the left side of the screen, contains the Main tab, the Help tab, and the About tab. The Main tab provides links to the major configuration objects. The Help tab provides context-sensitive help for each screen in the Configuration utility. The About tab presents the content from the Welcome screen. When the Help or About tab is active, you can open the content of the navigation pane in a new window using the Launch button. You can also print the content of the Help or About panes using the Print button. The menu bar The menu bar, which is below the identification and messages area, and above the body, provides links to the additional configuration objects within each major object. The body The body is the screen area where the configuration settings display.
All users must use the browser-based Configuration utility to license the system for the first time. For information about running Setup using the Configuration utility, see Running the Setup utility, on page 4-2.
1-4
1-5
Chapter 1
or
b self <ip_address> show
Table 1.1 explains additional special conventions used in command line syntax.
Item in text
\
Description Indicates that the command continues on the following line, and that you should type the entire command without entering a line break.
<
>
Identifies a user-defined parameter. For example, if the command has <your name>, type in your name, but do not include the brackets. Separates parts of a command.
| [ ]
Indicates that syntax inside the brackets is optional. Indicates that you can type a series of items.
...
1-6
BIG-IP system setup instructions All hardware from F5 Networks contains printed system setup instructions that describe the basic configuration steps required to get the BIG-IP system up and running in the network. This guide assumes that you have already completed the steps in the setup instructions included in the printed document in the box shipped with the system. Configuration Worksheet This worksheet provides you with a place to plan the basic configuration for the BIG-IP system. You will need some of the information from this worksheet to complete tasks described in this guide. The worksheet is available in the Ask F5 Knowledge Base, at https://support.f5.com Product guides Before you begin, we recommend that you visit the Ask F5 Knowledge Base, at https://support.f5.com, to review the following guides. TMOS Management Guide for BIG-IP Systems This guide contains information you need to configure and maintain the network and system-related components of the BIG-IP system. Configuration Guide for BIG-IP Local Traffic Management This guide contains any information you need for configuring the BIG-IP system to manage local network traffic. Bigpipe Utility Reference Guide This guide contains information you need if you choose to configure the BIG-IP system using the bigpipe command line utility. Traffic Management Shell (tmsh) Reference Guide This guide contains information you need if you choose to configure the BIG-IP system using the tmsh command line utility.
Applicable module configuration guides Each module has an associated configuration guide. You should consult the configuration guide applicable to the modules you are running. For example, if you are running the WAN Optimization Module, you should review the Configuration Guide for the BIG-IP WAN Optimization Module. Online help for BIG-IP systems The Configuration utility has online help for each screen. The online help contains descriptions of each control and setting on the screen. Click the Help tab in the navigation pane to view the online help for a screen. Welcome screen in the Configuration utility The Welcome screen in the Configuration utility contains links to many useful web sites and resources, including: The Ask F5 Knowledge Base The F5 Solution Center and F5 DevCentral web site Plug-ins, SNMP MIBs, and SSH clients
1-7
Chapter 1
Ask F5 Knowledge Base The Ask F5 Knowledge Base provides current and comprehensive documentation for the product, including: Release notes for the BIG-IP system, current and past Updates for guides Technical notes Answers to frequently asked questions To access this site, you must register at https://support.f5.com.
1-8
2
Preparing the System for Installation
Summarizing 10.x installation and upgrade Performing prerequisite tasks Performing optional tasks
2-1
Chapter 2
If the system on which you are installing is a member of a redundant system configuration, you should review the information in Preparing units in a redundant system configuration, on page 2-13. You might also want to roll forward an archived configuration. This optional task is described in Managing pre-existing configuration files, on page 2-10.
Do not add a self IP address that is on the same network as the management interface. The management interface functions separately from other system functions and cannot share the same network.
2-2
Adding an IP address, netmask, and default route using the LCD panel
You can use the LCD panel on the front of the device to specify a management IP address, a netmask for the IP address, and a default route.
Note
If you can establish a connection from your workstation to the management port of the BIG-IP system, you can also run the config command on the command line to run the command line-based Configuration Utility shell to configure an IP address, netmask, and default route for the management interface. The utility shell guides you through the screens for configuring the settings. For more information on establishing management connections, see Establishing a connection to the system, following.
2-3
Chapter 2
Use a serial console You can connect a null modem cable to the port marked CONSOLE on the unit, and access the command line with a terminal emulator. Use the default network to connect to the management interface You can connect a cable to the Ethernet interface labeled Management (MGMT) to remotely access the command line or the browser-based Configuration utility. Use a network IP address that you specify to connect to the management interface You can configure an IP address on the Ethernet interface labeled Management (MGMT) to remotely access the command line or the browser-based Configuration utility.
2-4
If you add this alias prior to booting up the BIG-IP system, the unit detects the alias and uses the corresponding IP address. The IP alias must be in the same network as the default IP address you want the system to use. For example, on a UNIX workstation, you might create one of the following aliases. If you want the unit to use the default IP address 192.168.1.245, then add an IP alias to the workstation you want to use to connect to the BIG-IP system, using the following command:
ifconfig exp0 add 192.168.1.1
If you want to use the alternate IP address 192.168.245.245, then add an IP alias such as:
ifconfig exp0 add 192.168.245.1
WARNING
On a system running Microsoft Windows or Windows NT operating system, you must use a static IP address, not DHCP. Within the network configuration, add an IP alias in the same network as the IP address in use on the unit. For information about adding a static IP address on a system running Microsoft Windows, please refer to the vendors documentation.
BIG-IP Systems: Getting Started Guide 2-5
Chapter 2
The procedures described in this section assume that the system is using the volumes disk-formatting scheme. If your system is using partitions (the formatting scheme used in previous versions), you cannot use the procedures in this section. Instead, you must use 9.x procedures to manage the partitions. Refer to the appropriate 9.x documentation for those procedures. If the BIG-IP system is not already formatted for volumes, you can use the image2disk utility to format the system drive as you install the software. For information about formatting the system drives, see Formatting for volumes, on page A-4.
2-6
Do not use the Software Management screens to create or delete partitions. Doing so can result in an unstable condition. If you accidentally deleted HD1.1 on a partitioned system and the system has become unusable, you can reboot the system, or run the bigstart restart command on the command line to return the system to an operational state. If you need to reformat a system drive, you can use the image2disk utility. For more information, see Formatting for volumes, on page A-4.
2-7
Chapter 2
Note
If there is an active installation occurring on the volume, the system waits until the installation operation completes before rebooting.
Always make sure you have activated or reactivated your software license before beginning any upgrade. Otherwise, installation may not complete as you expect. To activate the license for the system, you must have a base registration key. The base registration key is a 27-character string that lets the license server know which F5 products you are entitled to license. The base registration key is preinstalled on your system.
2-8
If the system is not yet licensed, the Configuration utility prompts you to enter the base registration key. You enter keys for additional modules using settings in the Add-On Registration Key List area of the License screen. If you do not already have a base registration key, you can obtain one from the sales group (http://www.f5.com).
3. At the password prompt, type the default user name, admin, and the default password, admin, and click Log in. The Configuration utility opens. If this is the first time you have run the Configuration utility, the system presents the Licensing screen of the Setup utility. If this is not the first time you have run the Configuration utility, the system presents the Welcome screen. 4. To begin the licensing process, click Activate (or Re-activate, if you are reactivating the license). The Activate License screen opens. 5. Follow the on-screen prompts to license the system.
For additional information during the procedure, click the Help tab of the navigation pane.
Note
You can update the license at any time by using the options that are available using the License options of the System section of the Main tab of the navigation pane. Although the license you receive from F5 Networks determines what additional software modules the BIG-IP system can support, you must allocate CPU, memory, and disk space to make any modules visible and to ensure that they can function as they should in your configuration. This process of assigning CPU, memory, and disk space is called provisioning. For information on how to provision the software modules after you finish installing the software, see Provisioning TMOS modules, on page 4-8.
2-9
Chapter 2
Make sure the license on the source installation location is valid before you archive a configuration. This helps prevent accidental installation of an invalid license over a valid one when you roll forward a UCS archive.
Note
The hostname in the UCS archive must match the host name of the system to which you are installing for roll-forward to complete successfully.
Archiving a configuration
Before you archive the current configuration, you should make sure the existing configuration contains no unnecessary elements, such as nonworking virtual servers or users who should no longer have access to the system. Once you remove all unnecessary elements, make sure to save your configuration. The system does not roll forward unsaved portions of configurations. In the browser-based Configuration utility, each change of a page saves the configuration. So to ensure that the system saves all of your configuration settings, in the navigation pane, expand Overview, and click Welcome. This takes you to the Welcome screen and saves the configuration.
Note
In order to roll-forward a pre-9.4.3 configuration, you must manually create the config.ucs archive before starting the installation. To save the configuration, run the command b config save /config.ucs at the command line, and then remember to copy the archive to a secure, remote location.
2 - 10
To archive a configuration
1. On the Main tab of the navigation pane, expand System, and click Archives. The Archive List screen opens. 2. On the upper right portion of the screen, click the Create button. The New Archive screen opens. 3. For the Name setting, type a name for the archive. The system adds a .ucs extension. 4. If you want to encrypt the archive, enable encryption, and specify whether you want to include private keys in the archive. 5. To start the archiving operation, click the Finished button. 6. Copy the UCS archive to a secure, remote location.
You should always maintain the UCS archive remotely as a recovery strategy in case the upgrade does not perform as you expect.
2 - 11
Chapter 2
3. Install the new software by completing the tasks described in Chapter 3, Performing the Installation. 4. Once the installation is finished, at the command line, type the following command:
b export <upgraded_filename.scf>
Now you can apply the upgraded SCF to other BIG-IP systems. F5 Networks also recommends that you archive the configuration to a UCS archive, and copy the UCS archive to a secure, remote location. For information on archiving the configuration, see Archiving a configuration, on page 2-10.
2 - 12
If you do not specify a source, the operation uses the configuration from the active installation location. For example, to copy the active configuration from HD1.3 to HD1.1, if you are logged on to HD1.3, you run the following command:
cpcfg HD1.1
For information about working with redundant system configurations, synchronizing configurations, and mirroring connections, see the TMOS Management Guide for BIG-IP Systems.
2 - 13
Chapter 2
2 - 14
3
Performing the Installation
Introducing the installation process Downloading and importing the installation file Starting the installation Rebooting the system
Do not use the Software Management screens to add or delete partitions. Doing so can result in an unstable condition. You should only use the Software Management screens to add or delete volumes. If you accidentally deleted HD1.1 on a partitioned system and the system has become unusable, you can reboot the system, or run the bigstart restart command on the command line to return the system to an operational state.
3-1
Chapter 3
Do not use the b software commands to add or delete partitions. Doing so can result in an unstable condition. You should only use the b software commands to add or delete volumes. If you accidentally deleted HD1.1 on a partitioned system and the system has become unusable, you can reboot the system, or run the bigstart restart command on the command line to return the system to an operational state. You can find information about the b software commands in the man page for the command, available at the command line by typing man software.
F5 Networks recommends using the image2disk utility for all installation operations on systems formatted using the hard-drive partition scheme.
3-2
Important
If you navigate away from this screen before the operation completes, the system might not import the image successfully. Therefore, we recommend that you wait for the operation to complete before continuing with any other work on the BIG-IP system.
3-3
Chapter 3
You cannot install to a CompactFlash media drive. Attempting to do so halts the installation operation.
Important
In order to install the software successfully, there must be at least minimal disk formatting on the system drives. If the BIG-IP system does not meet this requirement, you can use the diskinit utility to format the drive. For more information, see Recovering blank or damaged hard drives, on page A-7.
The upgrade process installs the software on the inactive installation location that you specify. This process usually takes between three minutes and seven minutes.
Tip
If there is a problem during installation, you can use log messages to troubleshoot a solution. The system stores the installation log file as /var/log/liveinstall.log.
3-4
When the operation is complete, the system presents the logon screen. To configure the system, log on using an account that has administrative permissions. When the system finishes rebooting, you can continue with the post-installation tasks, as described in Chapter 4, Completing Post-Installation Tasks.
Important
You will not have access to certain software features and functionality until you complete the post-installation tasks.
3-5
Chapter 3
3-6
4
Completing Post-Installation Tasks
Understanding system configuration Running the Setup utility Provisioning TMOS modules Completing system configuration
3. At the logon prompt, type admin for the user name, and admin for the password (or, if you changed these, use the values you specified). The Configuration utility opens.
4-1
Chapter 4
Even if you typically use the command line to configure, you must first run the Setup utility from the browser-based Configuration utility before you can begin.
4-2
Note
If you have not already activated the license, you must use the browser-based Configuration utility to run the Setup utility to license the system for the first time. In that case, the system starts the Setup utility when you access the Configuration utility for the first time. For information about activating the license, see Activating the software license, on page 2-8.
As you proceed through the Setup utility, you can click the Help tab of the navigation pane for information about the settings on each screen.
Chapter 4
User administration settings, such as the Root and Admin account passwords Support access and password settings SSH access and IP address range settings A basic description for each setting follows, to assist you in specifying settings on the Setup platform settings screen. You can also view the online help for setting definitions.
Note
Depending on the hardware you have and the settings you configure, you may see only some of the screen elements described here.
Host name
This is the name of the system. You must enter a fully qualified domain name (FQDN) for the system. This field allows only letters, numbers, and the characters underscore ( _ ), dash ( - ) and period ( . ).
Host IP address
The host IP address is the IP address that you want to associate with the host name. You can select Use Management Port IP Address to associate the host name with the management port's IP address. This is the default setting. Select Custom Host IP Address to type an IP address other than the management port's IP address.
4-4
High availability
A high availability system, or redundant system, consists of two units or blades that share configuration information, and serve as failover peers. If the system you are configuring is not a member of a redundant system, select Single Device. If the system is a member of a redundant system, select Redundant Pair.
Important
Beginning with version 10.0.0 of the software, a redundant system configuration must contain failover peer management addresses for each unit. If you roll forward a redundant system configuration from version 9.3.x or 9.4.x, the units start up in an offline state because each one needs a failover peer management address. To configure the failover peer management addresses, navigate to the Network Failover screen, available under High Availability on the System menu in the navigation pane, and specify the management IP address of the peer unit in the Peer Management Address field. Then do the same on the other unit in the redundant system. Once you specify both IP addresses, the system should operate as expected.
Note
In a redundant system that consists of two units, both units must be the same hardware platform. We do not support redundant systems consisting of differing hardware. For information about using VIPRION systems, see the Configuration Guide for the VIPRION System.
Unit ID
This setting identifies a member in a redundant system. The default number is 1. If this is the first member in the redundant system, use the default. When you configure the second member in the redundant system, select 2. The system uses these settings to determine which member becomes active first, should both peers come online simultaneously.
Time zone
The time zone you select typically represents the location of the system. However, some networks specify a time zone to accommodate a more international aspect of the organization, such as Greenwich Mean Time (GMT), or the time zone representing the corporate headquarters. The system uses the time zone for the date and time of events recorded in logs.
Note
If you change the time zone, we recommend that you reboot the system to ensure that all of the services are in sync. If you do not reboot, it does not affect traffic or management functionality, but there is a possibility that some timestamps might be logged or displayed incorrectly, depending on which service has been restarted and which has not.
BIG-IP Systems: Getting Started Guide
4-5
Chapter 4
Root account
The root account provides only console access to this system. Type the password for the built-in account, root. In the Confirm box, retype the password that you typed in the Password box. If you mistype the password confirmation, the system prompts you to retype both entries.
Admin account
The admin account provides only browser access to the system. Type the password for the built-in account, admin. In the Confirm box, retype the password that you typed in the Password box. If you mistype the password confirmation, the system asks you to retype both entries.
Support account
This setting enables the built-in account, support, for access to the system's command line and browser interface. If you activate the account, you must also supply a password and password confirmation. The technical support staff uses the support account to analyze the system if you need assistance with troubleshooting issues.
SSH access
You can use this setting to enable SSH access to the BIG-IP system.
Basic Network Configuration This configuration method starts the basic network configuration wizard. When you click the Next button, the wizard guides you through a basic network configuration that includes an internal and external VLAN, and interface configuration.
4-6
Advanced Network Configuration If you already know the types of configurations you want to create, you can click the Finished button to exit the Setup utility. Use this configuration method when you want to create a custom VLAN configuration. If you use this method, after you click the Finished button, open the Network section on the Main tab of the navigation pane. The Network section provides access to the objects you commonly configure for traffic management, such as interfaces, routes, self IP addresses, VLANs, and so on.
Note
You can update the network configuration at any time by using the options that are available under the Network section on the Main tab of the navigation pane.
4-7
Chapter 4
Some modules require that you provision CPU, memory, and disk space before they are visible in the Configuration utility. If you do not see a module that you have licensed, first check to make sure you have provisioned CPU, memory, and disk space for it.
4-8
Figure 4.1, following, shows a sample screen representing a system provisioned for Local Traffic Manager, Application Security Manager, and the WebAccelerator system.
4-9
Chapter 4
The Nominal setting allocates CPU, memory, and disk space in a way that is applicable for most typical configurations. The Minimum setting allocates the smallest amount of CPU, memory, and disk space to the corresponding module. The None (Disabled) setting indicates that there is no allocated CPU, memory, or disk space. When you select the None (Disabled) setting, the system allocates no CPU, memory, or disk space to the module. This is a typical setting for unlicensed modules. Depending on what you select or change, the system might require a reboot after provisioning or deprovisioning a module. You can provision modules for which you are not licensed. This enables you to configure the system prior to obtaining a license. When you provision modules you are not licensed for, the system posts an alert in the identification and messages area of the Configuration utility: Provisioned yet unlicensed: <modulename> to let you know that you do not have a valid license for that module.
Important
If you provision CPU, memory, and disk space to a module whose license later expires, the system does not automatically reallocate that CPU, memory, and disk space. You should make sure to reprovision any CPU, memory, and disk space from modules with expired licenses to other modules whose licenses are currently active.
WARNING
When provisioning multiple modules, you must provision the WAN Optimization Module last. WAN Optimization Module uses all of the free disk space remaining on the system, so provision all other modules first.
If you are installing a license, but you are not rolling forward a configuration, the system does not provision any CPU, memory, or disk space. In order to see and access new modules you install, you must provision them first.
4 - 10
If you rolled forward a configuration, you should check to make sure that the configuration contains all of the objects you expect. In general, the upgrade process takes care of this for you, but you should always check to make sure the configuration contains all objects and settings you expect. For example, if you roll forward a configuration that contained the WebAccelerator system, the system presents the following message after the installation operation finishes: The WAM configuration being restored is version 9.4.3 but the current installation is version 10.0.0. The restored 9.4.3 WAM config files may require manual merging if they had been customised, and will NOT overwrite the 10.0.0 files. If your configuration had not been customised no merge is required.
4 - 11
Chapter 4
4 - 12
A
Using the image2disk and diskinit Utilities
Introducing the image2disk and diskinit utilities Upgrading version 9.3.x or 9.4.x systems Recovering the system using image2disk Recovering blank or damaged hard drives
The image2disk utility also formats the hard drive unless there are formatting errors on the disk, in which case you must first run the diskinit utility.
A-1
Appendix A
You cannot use the image2disk utility to install verion 10.x to BIG-IP systems running version 9.2.x or earlier. You must first upgrade to version 9.3.x or 9.4.x. For information on upgrading, see the release notes for the associated software.
A-2
Once you have downloaded the file, use a copy utility applicable to your operating system to copy the ISO image to the /shared/images directory on the BIG-IP system.
Important
If your system does not already have this directory, you must create it. If you create the directory, make sure to use the exact name /shared/images.
The process copies over the image2disk installation utility, and then presents a status message, which lets you know that the im command is no longer supported, and tells you how to proceed.
The upgrade process installs the software on the inactive installation location (--instslot) that you specify. This process usually takes between three minutes and seven minutes. You can find more information about image2disk commands in the man page for the utility, available at the command line by typing man image2disk. You can also run the command image2disk -h on the system command line to get command line help for the image2disk utility.
A-3
Appendix A
When you run the image2disk utility with the --format command to convert partitions to volumes, the operation removes all partitions or volumes, along with all data on the system.
Important
If you plan to retain a 9.x version of the software on the BIG-IP system you must use the existing partitions formatting scheme.
To format for volumes and preserve the configuration of the installation destination, run the following command:
image2disk --instslot=HD1.2 --nomoveconfig --format=volumes BIGIP-10.0.0.123.0.iso
A-4
A-5
Appendix A
The image2disk utility cannot run if the system hard drive contains low-level formatting errors. For information about the hard-drive recovery process, see Recovering blank or damaged hard drives, following.
A-6
If you have not yet installed the version 10.x software, you can boot from a bootable thumb drive. For information about creating a bootable thumb drive, see Appendix B, Creating a Bootable USB Thumb Drive. You can also boot from a bootable CD-ROM that you have created.
The system reboots to the MOS, which runs in RAM. You can then run the diskinit utility to format the system drives.
A-7
Appendix A
Running the diskinit command removes all information on the system hard drive. If that is not what you intended, do not proceed with the operation.
WARNING
If you omit the -style option in the following procedure, the disk reformatting operation removes all file systems and volumes from all hard drives and does not create any new ones, This is not a typical operation, and F5 Networks does not recommend it.
4. To continue, type y and press Enter. Otherwise, type n and press enter. If you answer y, the system repartitions and reformats all system hard drives in the style you specify.
After formatting is finished, you can run image2disk to install the 10.x software. For information about the image2disk utility, see Introducing the image2disk and diskinit utilities, on page A-1. For more information about the diskinit utility, see the command line help, available by running the command diskinit -h on the command line.
A-8
B
Creating a Bootable USB Thumb Drive
You can find the mkdisk utility in the full release software ISO installation image, but not in a hotfix ISO installation image.
B-1
Appendix B
A system running Linux running the 2.6.x kernel Perl version 5.8 or later The Library for WWW in Perl (LWP) package For downloading and other information about the LWP Perl module collection, search the Comprehensive Perl Archive Network (CPAN) programming library, available at http://www.cpan.org/, or use another source, such as a Red Hat Package Manager (RPM) file (http://rpm.org/), the Advanced Packaging Tool apt-get program (http://linux.die.net/man/8/apt-get), or another reliable source. Utilities for disk and image manipulation The required utilities depend on the BIG-IP platform you plan to use to create the bootable thumb drive. For BIG-IP platforms 1600, 3600, 6900, and 8900, the workstation must have the following utilities: sfdisk: changes disk partitioning. mformat: creates a FAT32 file system. syslinux: represents a lightweight bootloader that starts up computers with the Linux kernel. mkisofs: creates an ISO9660 file system image. implantisomd5: implants an MD5 checksum in an ISO9660 image. For BIG-IP platforms 1500, 3400, 3410, 6400, 6800, 8400, and 8800, the workstation must have the following utilities: sfdisk: changes disk partitioning. mke2fs: creates a Linux (ext2) file system. extlinux: represents a lightweight bootloader that starts up computers with the Linux kernel.
B-2
For VIPRION platforms, the workstation must have the following utilities: sfdisk: changes disk partitioning. mke2fs: creates a Linux (ext2) file system. mkelfImage: makes an Executable and Linkable Format (ELF) boot image for Linux kernel images.
3. Insert a 1 GB or larger thumb drive in a USB port on the Linux workstation or BIG-IP system. 4. To change to the root directory of the mounted device, run the command:
cd /mnt/cd
5. To start the mkdisk script from that directory, run the command:
./mkdisk
6. Answer the questions the operation asks: a) Specify the BIG-IP system you plan to use as the target for thumb-drive installation operations. b) Specify the device to be used in the mkdisk operation (that is, the thumb drive you are creating). c) To confirm that you want to continue, type y. d) Specify the product (for example, BIG-IP 10.0.0) that you want to transfer, or if there is only one product, type y to transfer the BIG-IP 10.0.0 version of the software. The operation checks for the required tools, and creates the thumb drive, which takes approximately two or three minutes on a BIG-IP 1600 system. The interval on other systems varies. 7. To unmount the loopback device, run the command:
umount /mnt/cd
You can use the thumb drive to boot the target device. Place the thumb drive in the USB port of the target device, and reboot the target device. For all systems except VIPRION systems, the device automatically boots to the Maintenance OS on the thumb drive. For VIPRION systems, when the boot process begins, choose boot device sda1 from the kboot grub menu to boot to the Maintenance OS on the thumb drive.
B-3
Appendix B
B-4
C
Monitoring the BIG-IP System
Introducing the dashboard Viewing BIG-IP system information Viewing statistics for other modules
To run the dashboard, the computer on which you are working must have Adobe Flash Player (version 9 or later) installed on it. This chapter describes how to display the dashboard screens. The dashboard includes online help for information about how to interpret the statistics on each of the panels that appear on the screens. Click the ? in the upper right corner of any panel to display the online help.
C-1
Appendix C
C-2
By clicking the grid icon in the upper left corner, you can display more details in a table format. Figure C.3 shows the CPU panel, table view.
In the table view, you can see that one of the CPUs, cpu1, is doing most of the work.
C-3
Appendix C
The Breakdown chart in the figure shows that of the 4.1 GB of memory allocated on this BIG-IP system, processes other than TMM are using most of the memory. The Usage % chart shows that memory usage over the last five minutes has been steady at about 77%.
C-4
C-5
Appendix C
C-6
Glossary
Glossary
active unit In a redundant system, the active unit is the system that currently load balances connections. If the active unit in the redundant system fails, the standby unit assumes control and begins to load balance connections. See also redundant system configuration. administrative partition An administrative partition is a logical container that you create, containing a defined set of BIG-IP system objects. You use administrative partitions to control user access to the BIG-IP system. See also user role. archive An archive is a backup copy of the BIG-IP system configuration data. This archive is in the form of a user configuration set, or UCS. See also user configuration set (UCS). configuration synchronization Configuration synchronization, or ConfigSync, is the task of duplicating a BIG-IP systems configuration data onto its peer unit in a redundant system. Configuration utility The Configuration utility is the browser-based application that you use to configure the BIG-IP system. connection mirroring Connection mirroring is a feature that causes all connections coming through the active unit of a redundant system to be replicated on the standby unit. This prevents any interruption in service when failover occurs. default route A default route is the route that the system uses when no other route specified in the routing table matches the destination address or network of the packet to be routed. default VLAN The BIG-IP system is configured with two default VLANs, one for each interface. One default VLAN is named internal and one is named external. See also VLAN (virtual local area network). default wildcard virtual server A default wildcard virtual server has an IP address and port number of 0.0.0.0:0. or *:* or "any":"any". This virtual server accepts all traffic that does not match any other virtual server defined in the configuration.
Glossary - 1
Glossary
disk partition A disk partition is a portion of a hard drive that contains a version of the software and a system configuration. A system drive may be formatted as a partition or a volume. See also volume. domain name A domain name is a unique name that is associated with one or more IP addresses. Domain names are used in URLs to identify particular Web pages. For example, in the URL http://www.siterequest.com/index.html, the domain name is siterequest.com. external VLAN The external VLAN is a default VLAN on the BIG-IP system. In a basic configuration, this VLAN has the administration ports locked down. In a normal configuration, this is typically a VLAN on which external clients request connections to internal servers. failover Failover is the process whereby a standby unit in a redundant system takes over when a software failure or a hardware failure is detected on the active unit. See also redundant system configuration. floating self IP address A floating self IP address is an additional self IP address for a VLAN that serves as a shared address by both units of a BIG-IP redundant system. gateway A gateway provides communication between two networks, through software, hardware, or a combination of software and hardware. interface A physical port on a BIG-IP system is called an interface. internal VLAN The internal VLAN is a default VLAN on the BIG-IP system. In a basic configuration, this VLAN has the administration ports open. In a normal configuration, this is a network interface that handles connections from internal servers. local traffic management Local traffic management is the process of managing network traffic that comes into or goes out of a local area network (LAN), including an intranet. logical volume management (LVM) Logical volume management is the version 10.x scheme used for formatting the system disk drive into volumes. See also volume.
Glossary - 2
Glossary
management interface The management interface is a special port on the BIG-IP system, used for managing administrative traffic. Named MGMT, the management interface does not forward user application traffic, such as traffic slated for load balancing. management route A management route is a route that forwards traffic through the special management (MGMT) interface. monitor The BIG-IP system uses monitors to determine whether nodes are up or down. There are several different types of monitors and they use various methods to determine the status of a server or service. See also node address, pool. name resolution Name resolution is the process by which a name server matches a domain name request to an IP address, and sends the information to the client requesting the resolution. node address A node address is the IP address associated with one or more nodes. This IP address can be the real IP address of a network server, or it can be an alias IP address on a network server. See also monitor. partition See administrative partition or disk partition. pool A pool is composed of a group of network devices (called members). The BIG-IP system load balances requests to the nodes within a pool based on the load balancing method and persistence method you choose when you create the pool or edit its properties. port A port can be represented by a number that is associated with a specific service supported by a host. profile A profile is a configuration tool containing settings for defining the behavior of network traffic. The BIG-IP system contains profiles for managing Fast L4, HTTP, FTP, UDP, and SSL traffic, as well as for implementing session persistence, server-side connection pooling, and remote application authentication.
Glossary - 3
Glossary
provisioning Provisioning is the process of assigning CPU, memory, and disk space to licensed software modules. Provisioning and licensing work together to make sure that software modules are accessible and appropriately provided with CPU cycles, system memory, and disk space. redundant system configuration Redundant system configuration refers to a pair of units that are configured for failover. In a redundant system configuration, there are two units, one running as the active unit and one running as the standby unit. If the active unit fails, the standby unit takes over and manages connection requests. remote administrative workstation A remote administrative workstation is a system that uses as Telnet or SSH to connect though an IP address to a BIG-IP system allows shell connections. roll forward Roll forward is a function of the installation process that preserves the existing configuration. When you install the software or upgrade, the system uses the previously archived user configuration set (UCS) file in the /var/local/ucs directory on the source installation location to update the configuration on the installation destination. self IP address Self IP addresses are the IP addresses owned by the BIG-IP system that you use to access devices in VLANs. You assign self IP addresses to VLANs. service Service refers to services such as TCP and HTTP. Setup utility The Setup utility walks you through the initial system configuration process. You can run the Setup utility from the Configuration utility start page. See also Configuration utility. single configuration file (SCF) A single configuration file, or SCF, is a file that you create using the bigpipe utility. The purpose of this file is to store an entire BIG-IP system configuration that you can then easily replicate on another BIG-IP system. See also user configuration set (UCS). SSH SSH is a protocol for secure remote logon and other secure network services over a non-secure network.
Glossary - 4
Glossary
SSL (Secure Sockets Layer) SSL is a network communications protocol that uses public-key technology as a way to transmit data in a secure manner. standby unit A standby unit in a redundant system is a unit that is always prepared to become the active unit if the active unit fails. See also redundant system configuration. static self IP address A static self IP address is a self IP address that is not shared between two units of a redundant system. TMM (Traffic Management Microkernel) service The TMM service is the process running on the BIG-IP system that performs most traffic management for the product. TMOS (Traffic Management Operation System) The Traffic Management Operating System is the internal mechanism within the BIG-IP system that is responsible for all traffic-management functions. user configuration set (UCS) A user configuration set is a backup file that you create for the BIG-IP system configuration data. When you create a UCS, the BIG-IP system assigns a .ucs extension to the file name. See also archive, single configuration file (SCF), and roll forward. user role A user role is a type and level of access that you assign to a BIG-IP system user account. By assigning user roles, you can control the extent to which BIG-IP system administrators can view or modify the BIG-IP system configuration. See also administrative partition. virtual address A virtual address is an IP address associated with one or more virtual servers managed by the BIG-IP system. See also virtual server. virtual server Virtual servers are a specific combination of virtual address and virtual port, associated with a content site that is managed by a BIG-IP system or other type of host server.
Glossary - 5
Glossary
VLAN (virtual local area network) A VLAN is a logical grouping of interfaces connected to network devices. You can use a VLAN to logically group devices that are on different network segments. Devices within a VLAN use Layer 2 networking to communicate and define a broadcast domain. volume A volume is a portion of a hard drive that contains a version of the software and a system configuration. A system drive may be formatted as volumes or partitions. See also disk partition and logical volume management (LVM).
Glossary - 6
Index
Index
10.x software installation 3-4 10.x volumes 2-6 9.3.x or 9.4.x software installing with version 10.x A-1 upgrading from A-2 9.6.x or earlier 10.x version upgrade 3-1 9.x partitions 2-6
A
About tab 1-4 active volume, setting 2-8 additional information 1-7 add-on registration key 2-8 address range, setting for SSH access 4-6 admin account configuring 4-6 described 4-3 using default 2-5 after installation reboot upgrading from version 9.3.x or 9.4.x A-5 upgrading in version 10.x 3-5 archive file 2-10
configuration tool choosing 1-2 described 1-3 configuration upgrade 2-12 Configuration utility accessing 2-8 described 1-3 licensing at initial setup 1-4 reviewing browser support 1-4 using 1-2 connections statistics C-4 console configuration 2-4 conventions, stylistic 1-5 cpcfg utility 2-12 CPU panel, Performance Overview screen C-3 CPU statistics, viewing C-3
D
dashboard described C-1 viewing system information C-2 default admin password 2-5 default network configuration 2-5 default root password 2-5 defined 2-11 difference in SCF and UCS 2-11 disaster recovery A-1, B-1 disk format types A-7 disk formatting 2-6 disk space and memory allocation 4-8 diskinit commands A-8 diskinit utility described A-1 recovering the system A-1 using A-7 documentation, finding additional 1-7 downloads 3-3, A-2
B
b software commands 3-2 base registration key 2-8 basic configuration setup 4-2 basic installation, defined 2-2 basic management settings screen in Setup utility 4-3 basic setup instructions 1-7 BIG-IP system information, viewing in dashboard C-2 bigpipe utility described 1-4 using to export configuration 2-11 using to import configuration 2-11 bootable thumb drive B-1, B-2
E C
cable, null modem 2-4 check date in license 2-8 clients using for SSH access 1-4 using for Telnet access 1-4 command line installation 3-2 command line utilities 1-4 command syntax, conventions 1-6 commands to create SCF 2-11 compression throughput C-5 configuration archive 2-10 configuration file 2-11 configuration options screen in Setup utility 4-6 configuration roll-forward 2-10 existing configuration 2-10
F
failover and installation 2-13 fully qualified domain name 4-4
G
gauge viewing BIG-IP system statistics C-2 viewing Busiest CPU C-3 viewing Memory Usage C-4 gauges, in Dashboard C-1 guides, finding additional 1-7
Index - 1
Index
H
hardware setup instructions 1-7 Help tab 1-4 help, online 1-7 high availability system 4-5 Host IP address setting 4-4 Host name setting 4-4
M
Main tab 1-4 Maintenance Operating System A-7 management interface defined 2-4 using previously specified 2-2 management interface configuration 2-2 management IP address adding 2-2 setting from LCD 2-3 Management Operating System A-7 management port 2-4 management workstation 2-4 manuals, finding additional 1-7 member, redundant system 4-5 memory and disk allocation 4-8 Memory panel, Performance Overview screen C-4 memory statistics C-4 memory usage statistics C-4 menu bar in Configuration utility 1-4 messages area in Configuration utility 1-3 mkdisk commands B-3 mkdisk utility described B-1 preparing system for B-2 using B-3 modules described 1-1 licensing 2-8 provisioning 4-8 MOS A-7 mosreboot command A-7
I
identification area in Configuration utility 1-3 im utility A-3 image2disk commands A-3, A-4 image2disk utility described A-1 preparing to use A-7 recovering the system A-1 using for installation A-2 installation archiving configuration 2-10 defined 2-2 downloading image file 3-3, A-2 prerequisites 2-2 rebooting after 3-5, A-5 summarizing tasks 2-2 upgrading from version 9.2.x or earlier A-2 upgrading from version 9.3.x or 9.4.x A-2 using from version 9.3.x or 9.4.x A-3 using in version 10.x 3-4 using on redundant systems 2-13 using the command line 3-2 using the image2disk utility A-3 installation image, creating B-2 installation task summary 2-2 instructions for hardware setup, printed 1-7 interface for management connection 2-2 IP addresses, defining 4-2 IP alias adding to UNIX system 2-5 creating 2-5 IP usage on Windows 2-5
N
navigation pane in Configuration utility 1-4 new license activation 2-9 null modem cable 2-4
O
online help 1-7 optional installation tasks 2-10
L
LCD panel defined 2-2 using to add management IP address 2-2 using to set management IP address 2-3 license activating 2-8 installing new 2-8 license check date 2-8 LVM disk format scheme 2-6
P
partitions deciding on A-4 recovering system A-7 password using default admin 2-5 using default root 2-5 Performance Overview screen C-2
Index - 2
Index
preliminary version 9.3.x or 9.4.x to 10.x tasks A-2 prerequisites for installation 2-2 printed setup instructions 1-7 process for installation 2-2 product documentation, finding additional 1-7 product modules 1-1 provision tasks 4-8
R
reboot after installation 3-5, A-5 recovery of hard drives A-7 redundant system configuring unit ID 4-5 defined 4-5 installing on 2-13 redundant system member 4-5 remote shell 1-4 retaining configuration 2-10 roll-forward process 2-10 root account configuring 4-6 described 4-3 root default account 2-5 root password described 4-2 finding default 2-5
S
SCF archiving 2-10 defined 2-11 understanding differences from UCS 2-12 upgrading 2-12 serial console 2-2, 2-4 service check date 2-8 setup instructions for hardware, printed 1-7 Setup utility preventing from running 4-2 running and rerunning 4-2 using configuration options screen 4-6 using management settings screen 4-3 setup.run db key 4-2 single configuration file. See SCF. software installation specifying source installation directory 3-4 using b software commands 3-2 using for version 10.x 3-1 using for version 9.3.x or 9.4.x upgrade A-3 using image2disk commands A-3 using Software Management screens 3-1 software license 2-8
Software Management screen creating volumes 2-7 deleting volumes 2-7 downloading software 3-3 importing software 3-3 rebooting from 3-5 using for installation 3-4 software provisioning 4-8 software utilities using bigpipe 1-4 using cpcfg 2-12 using diskinit A-7 using image2disk A-3 using tmsh 1-4 using to configure system 4-6 SSH access 4-6 SSH client 1-4 SSL connection statistics C-4 static IP requirement 2-5 Statistics panel, Performance Overview screen C-4 statistics, viewing C-1 stylistic conventions 1-5 summary of installation tasks 2-2 support account configuring 4-6 described 4-3 system licensing 2-9 setting unit ID 4-5 system configuration copying 2-12 exporting 2-11 importing 2-11 retaining 2-10 system connection 2-2 system hardware setup instructions 1-7 system messages, viewing 1-4 system performance, monitoring C-1 system recovery A-1, B-1 system statistics, viewing C-1
T
tasks for installation 2-2 technical support 1-7 Telnet client 1-4 terminal emulator 2-4 Throughput panel, Performance Overview screen C-5 throughput statistics C-5 thumb drive, using for installation B-1 Time zone setting 4-5 TMOS module provision tasks 4-8
Index - 3
Index
tmsh utility 1-4 Traffic Management Operating System (TMOS) 1-1 traffic management software activating 2-8 configuring network settings 4-6 licensing 2-8
U
UCS archiving 2-11 defined 2-11 introducing 2-10 understanding differences from SCF 2-12 upgrading 2-12 unit ID setting 4-5 unlicensed systems 2-8 upgrade configuration 2-10 upgrade process using for one-time upgrade from 9.3.x or 9.4.x A-2 using for SCF or UCS 2-12 using for version 10.x 3-1 using from pre-9.3.x version upgrade 3-2 using from version 9.3.x or 9.4.x A-2, A-3 using from version 9.6.x or earlier 10.x 3-1 using from versions earlier than 9.3.x 3-2 USB thumb drive. See bootable thumb drive.
user configuration set. See UCS. utilities using command line configuration 1-4 using cpcfg 2-12 using diskinit A-7 using for advanced network configuration 4-6 using for basic network configuration 4-6 using image2disk A-3 using mkdisk B-3 using Setup 4-2
V
valid license 2-8 version upgrade using from pre-9.3.x versions 3-2 using from version 9.3.x or 9.4.x A-2 using from version 9.6.x or earlier 10.x 3-1 volumes creating and deleting 2-7 deciding on drive formatting A-4 defined 2-6 recovering system A-7 working with 2-6
W
Windows IP requirement 2-5
Index - 4