f5 ltm lcd panel manufacturer
The liquid crystal display, or LCD panel, provides the ability to control theunit without attaching a serial or network cable. The following menus are available on the LCD panel.
Normally, the screens cycle on the LCD panel at a constant rate. However,press the Check button to toggle the LCD panel between Hold and Rotate modes. In Hold mode, a single screen is displayed. The Rotate mode changes the screen displayed on the LCD panel every four seconds.
Pressing theX button puts the LCD panel in Menu mode. The buttons Left Arrow, Right Arrow, Up Arrow, and Down Arrow are functional only when the LCD panel is in Menu mode.
After you put the LCD panel in menu mode, use the Left Arrow, RightArrow, Up Arrow, and Down Arrow buttons to select menu options. There are four menu options:
You can use the Information menu to access help pages about using theLCD panel functionality. You can also find more information on what different LED activity means, and on the failover state of the unit in a redundant system. Table 3.1 shows the options available on the Information menu.
Use the Check button to turn on (checked) or off(cleared) the heartbeat displayed on the LCD screen. This heartbeat displays if the SCCP is running on the system. This heartbeat does not affect the failover mechanism of the system.
This setting controls the brightness of the LCD panelwhen the backlight is off. Use the Left and Right arrow keys to set the brightness of the LCD panel.
Important: You must have the serial number or the last seven digits of the registration key to open a service case with F5 Support. If you cannot provide either, your technician may be able to locate your system in the support entitlement database.
The serial number format is F5-XXXX-XXXX. The serial number begins with F5, followed by a dash character ( - ), followed by four alphanumeric characters, followed by a dash, followed by four alphanumeric characters.
A BIG-IP Virtual Edition (VE) system does not have a similar serial number format to the previously mentioned hardware platforms. If you encounter any issue that requires F5 Support assistance, you cannot use the BIG-IP VE serial number to open a support case. You must use the last seven digits of the BIG-IP VE registration key.
You can get the serial number of a BIG-IP platform or BIG-IP VE by polling the F5 BIG-IP-system management information base (MIB) object identifier (OID):sysGeneralChassisSerialNum or its numeric equivalent, .1.3.6.1.4.1.3375.2.1.3.3.3.0.
If the license has not yet been activated on your BIG-IP LTM, BIG-IP DNS, BIG-IP APM, BIG-IP ASM, BIG-IP PSM, or WebAccelerator system, you can find the registration key in the /config/RegKey.license file. This file is present only on factory-installed systems.
Note: F5 sends registration keys for Return Materials Authorization (RMA) devices in an email. For more information about the F5"s RMA process, refer to K12882: Overview of the F5 RMA process.
You can obtain additional license information, including whether your devices are covered under an active support contract, from the F5 Licensing Tools page. To do so perform the following procedure:
I currently have an F5 Big-IP 1600 series device. It is running 11.6.0 HF6. I was in the middle of configuring it and setting up users when I experienced an issue. All of the credentials for the admin accounts I have set up including the changed root and admin accounts are now not working. I can connect to the F5 login screen and I can SSH to it using Putty, but no password works for me. I even tried using caps in certain areas in case I inadvertently used caps for the login names. How can I just reset the F5 back to factory settings?
Note: To determine whether a specific BIG-IP platform has a Switch Card Control Processor (SCCP) subsystem or an Always-On Management (AOM) subsystem, refer to K9476: The F5 hardware/software compatibility matrix.
Using a USB CD/DVD-ROM drive and using a USB thumb drive are the most common installation methods to perform a clean installation of BIG-IP 10.x. Both installation methods require downloading a BIG-IP version product ISO image file from the F5 Downloads site:If using a USB CD/DVD-ROM drive, you must burn the ISO image to a CD/DVD recordable.
Platform diagnostics are introduced in BIG-IP 11.4.0 and run a series of hardware diagnostics to quickly identify hardware failures on an F5 BIG-IP platform.
If you discover problems with your hardware, contact F5 Technical Support. F5 Technical Support may ask you to run EUD as part of diagnostics, so you should be prepared to take the system offline.
There are different EUD software packages available depending on your platform. For information about the latest EUD packages, refer to Ask F5 article: K7172: Overview of the End User Diagnostics software.
F5 recommends that you download and install the latest version of the EUD software for your platform prior to running system diagnostics. EUD software is updated regularly for the relevant platform types and contains fixes and up-to-date changes for supported hardware platforms. Older versions may not contain updates pertaining to platform changes such as those for Restriction of Hazardous Substances (RoHS) compliance systems.
Do not run EUD software on a system that is in production. EUD software prevents traffic from passing during testing. Run EUD on a production system only if F5 Technical Support instructs you to do so.
You can complete this task after you download update files and their corresponding .md5 files from F5 Downloads. Verify the MD5 checksum on each file you download using the md5sum command. Use the output to verify the integrity of the downloaded file.
Users already familiar with the BIG-IP system can use the manual configuration tables to configure the BIG-IP system for the HTTP implementation. These configuration tables only show the configuration objects and any non-default settings recommended by F5, and do not contain procedures on specifically how to configure those options in the Configuration utility. See Appendix A: Manual configuration table.
In the iApp, you can configure the system for your HTTP application with F5 recommended settings (Basic mode) which are a result of extensive testing and tuning with a wide variety of HTTP applications. Advanced mode allows configuring the BIG-IP system on a much more granular level, configuring specific options, or using your own pre-built profiles or iRules. Basic/Advanced "configuration mode" is independent from the Basic/Advanced list at the very top of the template which only toggles the Device and Traffic Group options
The iApp template can create profiles using the F5 recommended settings, or you can choose Do not use many of these profiles). F5 recommends using the profiles created by the iApp; however you also have the option of creating your own custom profile outside the iApp and selecting it from the list. The iApp gives the option of selecting the following profiles (some only in Advanced mode). Any profiles must be present on the system before you can select them in the iApp.
You can optionally use the BIG-IP Application Acceleration Manager (AAM) module to help accelerate your HTTP traffic. To use BIG-IP AAM, it must be fully licensed and provisioned on your BIG-IP system. Consult your F5 sales representative for details. If you are using BIG-IP AAM, and want to use a custom Web Acceleration policy, it must have an Acceleration policy attached.
In Advanced mode, you have the option of attaching iRules you create to the virtual server created by the iApp. For more information on iRules, see https://devcentral.f5.com/irules. Any iRules you want to attach must be present on the system at the time you are running the iApp.
If you configured your BIG-IP system using a previous version of the f5.http iApp template, we strongly recommend you upgrade the iApp template to the most recent version.
In Basic configuration mode, options like load balancing method and parent profiles are all set automatically. The F5 recommended settings come as a result of extensive testing with web applications, so if you are unsure, choose Basic.
Select this option if client traffic is coming to this BIG-IP system from a remote BIG-IP system across a WAN. As mentioned in the introduction to this question, the iApp creates an iSession tunnel between this BIG-IP system and the BIG-IP system you will configure (or already have configured) on the other side of the WAN. If you select this option, you must have already initially configured the BIG-IP AAM for Symmetric Optimization. See the BIG-IP AAM documentation available on Ask F5 for specific instructions on configuring BIG-IP AAM for Symmetric Optimization.
Select this option if servers are across a WAN behind another BIG-IP system. As mentioned in the introduction to this question, the iApp creates an iSession tunnel between this BIG-IP system and the BIG-IP system you will configure (or already have configured) on the other side of the WAN. If you select this option, you must have already initially configured the BIG-IP AAM for Symmetric Optimization. See the BIG-IP AAM documentation available on Ask F5 for specific instructions on configuring BIG-IP AAM for Symmetric Optimization.
For information on SSL certificates on the BIG-IP system, see the online help or theManaging SSL Certificates for Local Trafficchapter in theConfiguration Guide for BIG-IP Local Traffic Manager available athttp://support.f5.com/kb/en-us.html.
Select whether you want the iApp to create the F5 recommended Server SSL profile, or if you want to choose a Server SSL profile you already created. In this scenario, the BIG-IP system is acting as an SSL client and by default, we assume the servers do not expect the BIG-IP system to present its client certificate on behalf of clients traversing the virtual server. If your servers expect the BIG-IP system to present a client certificate, you must create a custom Server SSL profile with the appropriate certificate and key. The default, F5 recommended Server SSL profile uses the serverssl parent profile. For information about the ciphers used in the Server SSL profile, see http://support.f5.com/kb/en-us/solutions/public/8000/800/sol8802.html.
Choose this method if you want the BIG-IP system to accept plain text from the clients and then encrypt it before sending it to the servers. Unless you have requirements for configuring specific Server SSL settings, we recommend allowing the iApp to create a new profile. To select a profile from the list, it must already be present on the BIG-IP system. Creating a custom profile is not a part of this template; see Local Traffic > Profiles > SSL > Server to create a Server SSL profile. To select any new profiles you create, you need to restart or reconfigure this template. The default, F5 recommended Server SSL profile uses the serversslparent profile. For information about the ciphers used in the Server SSL profile, see http://support.f5.com/kb/en-us/solutions/public/8000/800/sol8802.html.
This section gathers information about BIG-IP Application Security Manager if you want to use it to help protect your deployment. This section only appears if you have fully licensed and provisioned BIG-IP ASM. Contact your F5 sales representative for details.
Important If you are using an iApp version prior to v1.2.0rc4 only: In order to use BIG-IP ASM, you must have manually created a BIG-IP LTM Policy that includes ASM and applicable Rules. Creating an LTM policy is outside the scope of this guide. For specific information, see the Help tab or BIG-IP documentation.
Choose whether you want to use BIG-IP ASM to help secure this HTTP deployment. If you choose to use BIG-IP ASM, you must have a BIG-IP LTM policy with ASM enabled.
If you already created a BIG-IP ASM policy with ASM enabled for this implementation, select it from the list. Only LTM Policy objects with ASM enabled appear in the list. Continue with substep "b" following create a new ASM policy.
This section gathers information about BIG-IP Advanced Firewall Manager if you want to use it to protect the HTTP deployment. This section only appears if you have fully licensed and provisioned BIG-IP AFM. Contact your F5 sales representative for details. For information specific on BIG-IP AFM, see http://support.f5.com/kb/en-us/products/big-ip-afm.html, and then select your version.
Choose whether you want to use BIG-IP AFM, F5"s network firewall, to secure this HTTP deployment. If you choose to use BIG-IP AFM, you can restrict access to the HTTP virtual server to a specific network or IP address. See the BIG-IP AFM documentation for specific details on configuring AFM.
The BIG-IP AFM uses an IP intelligence database to categorize IP addresses coming into the system. Choose what you want the system to do for sources that are attempting to access the HTTP virtual server with a low reputation score. For more information, see the BIG-IP AFM documentation. Important You must have an active IP Intelligence license for this feature to function. See https://f5.com/products/modules/ip-intelligence-services for information. See Troubleshooting for a mandatory modification to the configuration if you are using AFM and the IP Intelligence feature to restrict or log traffic with low reputation scores.
Select this option if you do not want to insert the X-WA-Info header. Typically F5 recommends not inserting the header unless instructed to do so by an F5 Technical Support Engineer.
Select this option if you want to insert the Standard header. For detailed information on the numeric codes used by the header, see http://support.f5.com/kb/en-us/solutions/public/13000/700/sol13798.html
OneConnect (connection pooling or multiplexing) improves server scalability by reducing load associated with concurrent connections and connection rate to HTTP servers. When enabled, the BIG-IP system maintains one connection to each HTTP server which is used to send requests from multiple clients. Unless you have requirements for configuring specific settings, we recommend allowing the iApp to create a new profile. F5 recommends the default profile which is optimized for most HTTP servers. Creating a custom profile is not a part of this template; see Local Traffic >> Profiles : Other : OneConnect to create a OneConnect profile. To select any new profiles you create, you need to restart or reconfigure this template.
Select whether you want the BIG-IP system to queue TCP requests. TCP request queuing provides the ability to queue connection requests that exceed the capacity of connections for a pool, as determined by the connection limit. Consequently, instead of dropping connection requests that exceed the capacity of a pool, TCP request queuing enables those connection requests to reside within a queue according to defined conditions until capacity becomes available. For more information on TCP Request Queuing, see the Preventing TCP Connection Requests From Being Dropped chapter in the BIG-IP Local Traffic Manager: Implementationsguide, available on AskF5.
In this section, you can add custom Local Traffic Policies to the HTTP deployment. BIG-IP local traffic policies comprise a prioritized list of rules that match conditions you define and run specific actions which direct traffic accordingly. For example, you might create a policy that determines whether a client is using a mobile device, and then redirects its requests to the applicable mobile web site"s URL. This template does not create any local traffic policies, you can only select policies you have already created outside the iApp template. For more information, see BIG-IP Local Traffic Management: Getting Started with Policiesavailable on AskF5.
Warning You cannot apply multiple policy rules referencing the same controls. Before applying one or more policies, ensure there are no policy rules with conflicting controls assigned. Note that improper use or misconfiguration of LTM policies can cause undesired results. We recommend verifying the impact of an LTM policy prior to deployment in a production environment. See the BIG-IP LTM documentation for complete details.
If you do not want to add any policies to the configuration, continue with the following section. If you have LTM policies you want to attach to the virtual server the iApp creates for your HTTP servers, from the Options box, click the name of the applicable policy(s) and then click the Add (<<) button to move them to the Selected box.