big ip reference

504
Bigpipe Utility Reference Guide version 10.0.0 MAN-0287-00

Upload: anh00

Post on 13-Apr-2015

95 views

Category:

Documents


4 download

DESCRIPTION

BIG-IP Utility Reference

TRANSCRIPT

Page 1: BIG IP Reference

Bigpipe Utility Reference Guide

version 10.0.0

MAN-0287-00

Page 2: BIG IP Reference
Page 3: BIG IP Reference

Product VersionThis manual applies to version 10.0.0 of the BIG-IP® product family.

Publication DateThis guide was published on August 19, 2009.

Legal Notices

CopyrightCopyright © 2008-2009, F5 Networks, Inc. All rights reserved.

F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5 assumes no responsibility for the use of this information, nor any infringement of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent, copyright, or other intellectual property right of F5 except as specifically described by applicable iControl user licenses. F5 reserves the right to change specifications at any time without notice.

TrademarksF5, F5 Networks, the F5 logo, BIG-IP, 3-DNS, Acopia, Acopia Networks, Application Accelerator, Ask F5, Application Security Manager, ASM, ARX, Data Guard, Enterprise Manager, EM, FirePass, FreedomFabric, Global Traffic Manager, GTM, iControl, Intelligent Browser Referencing, Internet Control Architecture, IP Application Switch, iRules, Link Controller, LC, Local Traffic Manager, LTM, Message Security Module, MSM, NetCelera, OneConnect, Packet Velocity, Secure Access Manager, SAM, SSL Accelerator, SYN Check, Traffic Management Operating System, TMOS, TrafficShield, Transparent Data Reduction, uRoam, VIPRION, WANJet, WebAccelerator, and ZoneRunner, are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries, and may not be used without F5's express written consent.

PatentsThis product protected by U.S. Patents 6,374,300; 6,473,802; 6,970,933; 7,287,084. Other patents pending.

Export Regulation NoticeThis product may include cryptographic software. Under the Export Administration Act, the United States government may consider it a criminal offense to export this product from the United States.

RF Interference WarningThis is a Class A product. In a domestic environment this product may cause radio interference, in which case the user may be required to take adequate measures.

FCC ComplianceThis equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This unit generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user, at his own expense, will be required to take whatever measures may be required to correct the interference.

Any modifications to this device, unless expressly approved by the manufacturer, can void the user's authority to operate this equipment under part 15 of the FCC rules.

Canadian Regulatory ComplianceThis class A digital apparatus complies with Canadian I CES-003.

Bigpipe Utility Reference Guide i

Page 4: BIG IP Reference

Standards ComplianceThis product conforms to the IEC, European Union, ANSI/UL and Canadian CSA standards applicable to Information Technology products at the time of manufacture.

AcknowledgmentsThis product includes software developed by the University of California, Berkeley and its contributors.

This product includes software developed by the Computer Systems Engineering Group at the Lawrence Berkeley Laboratory.

This product includes software developed by the NetBSD Foundation, Inc. and its contributors.

This product includes software developed by Christopher G. Demetriou for the NetBSD Project.

This product includes software developed by Adam Glass.

This product includes software developed by Christian E. Hopps.

This product includes software developed by Dean Huxley.

This product includes software developed by John Kohl.

This product includes software developed by Paul Kranenburg.

This product includes software developed by Terrence R. Lambert.

This product includes software developed by Philip A. Nelson.

This product includes software developed by Herb Peyerl.

This product includes software developed by Jochen Pohl for the NetBSD Project.

This product includes software developed by Chris Provenzano.

This product includes software developed by Theo de Raadt.

This product includes software developed by David Muir Sharnoff.

This product includes software developed by SigmaSoft, Th. Lockert.

This product includes software developed for the NetBSD Project by Jason R. Thorpe.

This product includes software developed by Jason R. Thorpe for And Communications, http://www.and.com.

This product includes software developed for the NetBSD Project by Frank Van der Linden.

This product includes software developed for the NetBSD Project by John M. Vinopal.

This product includes software developed by Christos Zoulas.

This product includes software developed by Charles Hannum.

This product includes software developed by Charles Hannum, by the University of Vermont and State Agricultural College and Garrett A. Wollman, by William F. Jolitz, and by the University of California, Berkeley, Lawrence Berkeley Laboratory, and its contributors.

This product includes software developed by the University of Vermont and State Agricultural College and Garrett A. Wollman.

In the following statement, "This software" refers to the Mitsumi CD-ROM driver: This software was developed by Holger Veit and Brian Moore for use with "386BSD" and similar operating systems. "Similar operating systems" includes mainly non-profit oriented systems for research and education, including but not restricted to "NetBSD," "FreeBSD," "Mach" (by CMU).

In the following statement, "This software" refers to the parallel port driver: This software is a component of "386BSD" developed by William F. Jolitz, TeleMuse.

This product includes software developed by the Apache Group for use in the Apache HTTP server project (http://www.apache.org/).

This product includes software developed by Darren Reed. (© 1993-1998 by Darren Reed).

This product includes software licensed from Richard H. Porter under the GNU Library General Public License (© 1998, Red Hat Software), www.gnu.org/copyleft/lgpl.html.

This product includes the standard version of Perl software licensed under the Perl Artistic License (© 1997, 1998 Tom Christiansen and Nathan Torkington). All rights reserved. You may find the most current standard version of Perl at http://www.perl.com.

ii

Page 5: BIG IP Reference

Table of Contents

Page 6: BIG IP Reference
Page 7: BIG IP Reference

Table of Contents

1Introducing the BIG-IP System

About the bigpipe utility ................................................................................................................1-1About this guide ..............................................................................................................................1-3

Stylistic conventions ..............................................................................................................1-4Finding help and technical support resources ..........................................................................1-6

2Understanding the Bigpipe Utility

Using the bigpipe shell ...................................................................................................................2-1Controlling the bigpipe shell ...............................................................................................2-1Using the bigpipe shell command history feature ..........................................................2-2Using the bigpipe shell audit feature ..................................................................................2-2Using the bigpipe shell command completion feature ..................................................2-3Using the bigpipe shell command continuation feature ................................................2-3Using grep functionality in the bigpipe shell ....................................................................2-4Customizing the bigpipe shell ..............................................................................................2-4Using the bigpipe shell escape feature ..............................................................................2-5

bigpipe command summary ..........................................................................................................2-6VIPRION system command summary ..................................................................................... 2-12WAN optimization command summary ................................................................................ 2-13

3Bigpipe Utility Command Reference

Introduction to command syntax ................................................................................................3-1Using the keyword, all ..........................................................................................................3-1Identifying command types ..................................................................................................3-1Basic definitions ......................................................................................................................3-2

Alphabetical list of commands ......................................................................................................3-2arp .......................................................................................................................................................3-3auth crldp ..........................................................................................................................................3-5auth krbdelegate ..............................................................................................................................3-7auth ldap ............................................................................................................................................3-9auth radius ..................................................................................................................................... 3-14auth ssl cc ldap .............................................................................................................................. 3-17auth ssl ocsp .................................................................................................................................. 3-22auth tacacs ..................................................................................................................................... 3-24bigpipe shell ................................................................................................................................... 3-27class ................................................................................................................................................. 3-29cli ...................................................................................................................................................... 3-33config ............................................................................................................................................... 3-36configsync ....................................................................................................................................... 3-39conn ................................................................................................................................................. 3-42crldp server ................................................................................................................................... 3-44daemon ........................................................................................................................................... 3-46daemon mcpd ............................................................................................................................... 3-49daemon tmm ................................................................................................................................. 3-51db ..................................................................................................................................................... 3-54dns ................................................................................................................................................... 3-56exit ................................................................................................................................................... 3-58export ............................................................................................................................................. 3-59f5adduser ........................................................................................................................................ 3-61failover ............................................................................................................................................ 3-63fasthttp ............................................................................................................................................ 3-67

Bigpipe Utility Reference Guide v

Page 8: BIG IP Reference

Table of Contents

fastL4 ............................................................................................................................................... 3-68fipscardsync ................................................................................................................................... 3-69fipsutil .............................................................................................................................................. 3-70ftp ..................................................................................................................................................... 3-73global ............................................................................................................................................... 3-74ha table ........................................................................................................................................... 3-75hardware ........................................................................................................................................ 3-77help .................................................................................................................................................. 3-78http .................................................................................................................................................. 3-79httpd ................................................................................................................................................ 3-80icmp ................................................................................................................................................. 3-84import ............................................................................................................................................. 3-85interface .......................................................................................................................................... 3-87ip ...................................................................................................................................................... 3-91ip addr ............................................................................................................................................. 3-92list .................................................................................................................................................... 3-94load .................................................................................................................................................. 3-95logrotate ......................................................................................................................................... 3-98ltm .................................................................................................................................................. 3-100mac addr ...................................................................................................................................... 3-104mcp ................................................................................................................................................ 3-105memory ........................................................................................................................................ 3-106merge ............................................................................................................................................ 3-107mgmt ............................................................................................................................................. 3-109mgmt route .................................................................................................................................. 3-111mirror ........................................................................................................................................... 3-113monitor ........................................................................................................................................ 3-115nat .................................................................................................................................................. 3-130ndp ................................................................................................................................................. 3-133node .............................................................................................................................................. 3-135ntp .................................................................................................................................................. 3-138ocsp responder ........................................................................................................................... 3-140oneconnect .................................................................................................................................. 3-145packet filter .................................................................................................................................. 3-146partition ........................................................................................................................................ 3-152password policy .......................................................................................................................... 3-154persist ........................................................................................................................................... 3-157platform ........................................................................................................................................ 3-161pool ............................................................................................................................................... 3-163profile ............................................................................................................................................ 3-169profile auth .................................................................................................................................. 3-170profile clientssl ............................................................................................................................ 3-175profile dns .................................................................................................................................... 3-183profile fasthttp ............................................................................................................................ 3-185profile fastl4 ................................................................................................................................. 3-190profile ftp ..................................................................................................................................... 3-195profile http ................................................................................................................................... 3-197profile httpclass .......................................................................................................................... 3-208profile oneconnect ..................................................................................................................... 3-211profile persist .............................................................................................................................. 3-214profile rtsp ................................................................................................................................... 3-221profile sctp ................................................................................................................................... 3-224profile serverssl .......................................................................................................................... 3-228profile sip ..................................................................................................................................... 3-236profile stats .................................................................................................................................. 3-239profile stream .............................................................................................................................. 3-241

vi

Page 9: BIG IP Reference

Table of Contents

profile tcp ..................................................................................................................................... 3-243profile udp .................................................................................................................................... 3-250provision ...................................................................................................................................... 3-252pva ................................................................................................................................................. 3-255radius server ............................................................................................................................... 3-256rate class ...................................................................................................................................... 3-258remote users ............................................................................................................................... 3-262remoterole .................................................................................................................................. 3-264route ............................................................................................................................................. 3-267route domain .............................................................................................................................. 3-269rtsp ................................................................................................................................................ 3-271rule ................................................................................................................................................ 3-272save ................................................................................................................................................ 3-275sctp ................................................................................................................................................ 3-277self .................................................................................................................................................. 3-278self allow ....................................................................................................................................... 3-280shell ............................................................................................................................................... 3-282snat ................................................................................................................................................ 3-284snat translation ........................................................................................................................... 3-286snatpool ........................................................................................................................................ 3-288snmpd ........................................................................................................................................... 3-290software ....................................................................................................................................... 3-303sshd ................................................................................................................................................ 3-307ssl ................................................................................................................................................... 3-311statemirror .................................................................................................................................. 3-312stop ................................................................................................................................................ 3-314stp .................................................................................................................................................. 3-315stp instance .................................................................................................................................. 3-318stream ........................................................................................................................................... 3-322sys-icheck ..................................................................................................................................... 3-323sys-reset ....................................................................................................................................... 3-324syslog ............................................................................................................................................. 3-325system ........................................................................................................................................... 3-329tcp .................................................................................................................................................. 3-334tmm ............................................................................................................................................... 3-335traffic class ................................................................................................................................... 3-336trunk .............................................................................................................................................. 3-339udp ................................................................................................................................................. 3-342unit ................................................................................................................................................. 3-343user ................................................................................................................................................ 3-344version .......................................................................................................................................... 3-347virtual ............................................................................................................................................ 3-348virtual address ............................................................................................................................. 3-354vlan ................................................................................................................................................ 3-357vlangroup ...................................................................................................................................... 3-361

4VIPRION System Command Reference

Introduction to VIPRION system commands ..........................................................................4-1Alphabetical list of commands ......................................................................................................4-1cluster ................................................................................................................................................4-2daemon ..............................................................................................................................................4-6failover ...............................................................................................................................................4-9pool ................................................................................................................................................. 4-14profile udp ...................................................................................................................................... 4-20

Bigpipe Utility Reference Guide vii

Page 10: BIG IP Reference

Table of Contents

software ......................................................................................................................................... 4-23system ............................................................................................................................................. 4-28vlan .................................................................................................................................................. 4-33

5WAN Optimization Command Reference

Introduction to WAN Optimization commands .....................................................................5-1Alphabetical list of commands ......................................................................................................5-1datastor .............................................................................................................................................5-2deduplication ....................................................................................................................................5-4drop policy ........................................................................................................................................5-5endpoint advertised route ............................................................................................................5-8endpoint discovery ...................................................................................................................... 5-10endpoint local ............................................................................................................................... 5-13endpoint remote .......................................................................................................................... 5-16endpoint remote route ............................................................................................................... 5-20profile cifs ....................................................................................................................................... 5-22profile isession .............................................................................................................................. 5-25profile mapi .................................................................................................................................... 5-29profile tunnel ................................................................................................................................. 5-31rate class ........................................................................................................................................ 5-33shaping policy ................................................................................................................................ 5-37shaping queue ................................................................................................................................ 5-40wccp ................................................................................................................................................ 5-43

Glossary

Index

viii

Page 11: BIG IP Reference

1

Introducing the BIG-IP System

• About the bigpipe utility

• About this guide

• Finding help and technical support resources

Page 12: BIG IP Reference
Page 13: BIG IP Reference

Introducing the BIG-IP System

About the bigpipe utilityThe BIG-IP® system includes a tool known as the bigpipe utility. The bigpipe utility consists of an extensive set of commands that you can use to configure and manage the system from the command line. Using the bigpipe utility, you can configure system features and set up network elements. You can also configure the BIG-IP system to manage local and global traffic passing through the system, and view statistics and system performance data.

You can use the bigpipe utility in conjunction with the Traffic Management Shell (tmsh) and the Configuration utility, which is the browser-based BIG-IP system and network management tool.

All products in the BIG-IP product family run on the powerful Traffic Management Operating System®, commonly referred to as TMOS®. For an overview of the complete BIG-IP product offering, see the introductory chapter of the TMOS™ Management Guide for BIG-IP® Systems.

Additionally, F5 Networks recommends that before you configure the BIG-IP system using bigpipe utility, you use the following worksheet and refer to the following guides, as appropriate, which are available in PDF format from the F5 Technical Support web site, https://support.f5.com. This worksheet and these guides are also available from the first web page you see when you log on to the administrative web server on the BIG-IP system.

◆ Configuration WorksheetThis worksheet provides you with a place to plan the basic configuration of the BIG-IP system.

◆ BIG-IP® Systems: Getting Started GuideThis guide provides detailed information about installing upgrades to the BIG-IP system. It also contains information about licensing the BIG-IP system software, and connecting the system to a management workstation or network.

◆ TMOS™ Management Guide for BIG-IP® Systems This guide contains the information you need to configure and maintain the network and system-related components of the BIG-IP system. With this guide, you can perform tasks such as configuring VLANs, assigning self IP addresses, creating administrative user accounts, and managing a redundant system.

◆ Configuration Guide for BIG-IP® Local Traffic ManagementThis guide contains the information you need for configuring the BIG-IP system to manage local network traffic. With this guide, you can perform tasks such as creating virtual servers and load balancing pools, configuring application and persistence profiles, implementing health monitors, and setting up remote authentication.

Bigpipe Utility Reference Guide 1 - 1

Page 14: BIG IP Reference

Chapter 1

◆ BIG-IP® Local Traffic Manager: ImplementationsThis guide contains complete procedures for implementing specific goals, such as processing SSL traffic with data compression or assigning privileges to remotely-authenticated user accounts. This guide ties together the detailed information contained in the Configuration Guide for BIG-IP® Local Traffic Management to help you implement specific traffic management configurations.

◆ Configuration Guide for the VIPRION® SystemThis guide contains information on how to implement the cluster-specific features of the BIG-IP software.

◆ Traffic Management Shell (tmsh) Reference GuideThis guide contains all command and syntax information for the Traffic Management Shell.

◆ Platform Guide: 1500, 3400, 6400, and 6800Platform Guide: 1600 and 3600Platform Guide: 6900 and 8900Platform Guide: 8400 and 8800Platform Guide: VIPRION™

These guides contains information about the BIG-IP hardware, including important environmental warnings.

Additional command line utilities and toolsThere are several command line utilities and tools that you can use to manage the BIG-IP system from the BIG-IP system prompt:

◆ The config utilityYou use the config utility to define the IP address, network mask, and gateway for the management (MGMT) port, when you initially set up your BIG-IP system.

◆ The bigpipe utilityThe bigpipe utility is a set of commands that you can use to configure elements of the BIG-IP system such as VLANs, load balancing pools, and virtual servers. Using bigpipe commands, you can manage the BIG-IP system and the BIG-IP network components, and control local application traffic to suit your exact needs.

◆ The bigtop commandThe bigtop command displays real-time statistics for local traffic. You can set a refresh interval and specify a sort order for this statistical information.

◆ The bigstart commandWith the bigstart command, you can start, stop, restart, and check the status of various daemons, such as snmpd.

◆ The gencert utilityYou can use the gencert utility to generate a key, a temporary certificate and a certificate signing request file. You then submit the request file to a certificate authority to obtain an SSL certificate.

1 - 2

Page 15: BIG IP Reference

Introducing the BIG-IP System

◆ Traffic Management ShellThe Traffic Management Shell (tmsh) is a set of commands that you can use to configure elements of the BIG-IP system and network components, and control local application traffic. Using tmsh commands, you can also configure the Global Traffic Manager resources. For more information about tmsh, see the Traffic Management Shell (tmsh) Reference Guide.

The industry-standard tools that you can also use to manage the BIG-IP system are:

◆ The Tools Command Language (Tcl) programming languageThe Tools Command Language (Tcl) programming language is an industry-standard programming language that you can use to create BIG-IP system iRules™. iRules™ are scripts you can write to direct and manipulate the way that the BIG-IP system manages application traffic.

◆ The OpenSSL utilityA component of the industry-standard OpenSSL toolkit, the OpenSSL utility is a set of commands that perform various cryptographic functions, such as generating SSL certificates and keys.

About this guideThe Bigpipe Utility Reference Guide is designed to help you understand how you can use the bigpipe utility to configure and manage the BIG-IP system. It is written for system administrators who prefer to configure the BIG-IP system using the command line interface, instead of the Configuration utility.

This guide contains the following chapters:

◆ Chapter 2, Understanding the Bigpipe Utility, describes the bigpipe utility and the bigpipe shell. It also includes a list of bigpipe commands.

◆ Chapter 3, Bigpipe Utility Command Reference, contains information about each bigpipe command that you can use to configure the BIG-IP system, including limited examples for usage of each command.

◆ Chapter 4, VIPRION System Command Reference, contains information about bigpipe commands used to configure VIPRION® systems, including limited examples for usage of each command.

◆ Chapter 5, WAN Optimization Command Reference, contains information about bigpipe commands used to configure WAN optimization, including limited examples for usage of each command.

Bigpipe Utility Reference Guide 1 - 3

Page 16: BIG IP Reference

Chapter 1

Stylistic conventionsTo help you easily identify and understand important information, all of our documentation uses the stylistic conventions described here.

Using the configuration examplesAll examples in this document use only private class IP addresses. When you set up the configurations we describe, you must use valid IP addresses suitable to your own network in place of our sample addresses.

Identifying new termsTo help you identify sections where a term is defined, the term itself is shown in bold italic text. For example, a floating IP address is an IP address assigned to a VLAN and shared between two computer systems.

Identifying references to objects, names, and commandsWe apply bold formatting to a variety of items to help you easily pick them out of a block of text. These items include web addresses, IP addresses, utility names, and portions of commands, such as variables and keywords. For example, with the bp> self <ip_address> show command, you can specify a specific self IP address to show by specifying an IP address for the <ip_address> variable.

Identifying references to other documentsWe use italic text to denote a reference to another document or section of a document. We use bold, italic text to denote a reference to a book title. For example, you can find information about local traffic virtual servers in the Configuring Virtual Servers chapter of the Configuration Guide for BIG-IP® Local Traffic Management.

Identifying command syntaxWe show complete commands in bold Courier text. In this guide, we include the corresponding screen prompt when the command is shown in a figure that depicts an entire command line screen. We also include the corresponding screen prompt when the command is used in the bigpipe shell or tmsh. For example:

• This command shows the configuration of the self IP address in the bigpipe shell:

bp> self <ip_address> show

• This command shows the configuration of the self IP address in tmsh:

(tmos)#>/ net show self <ip_address>

For more information about the bigpipe shell see Using the bigpipe shell, on page 2-1. For more information about tmsh, see the Traffic Management Shell (tmsh) Reference Guide.

1 - 4

Page 17: BIG IP Reference

Introducing the BIG-IP System

Note that we do not include the corresponding screen prompt when a command is used at the BIG-IP system prompt. For example, this command configures the network address for the system:

config

Table 1.1 explains additional special conventions used in command line syntax.

Item in text Description

\ Indicates that the command continues on the following line, and that users should type the entire command without typing a line break.

< > Identifies a user-defined parameter in the bigpipe shell. For example, if the command has <your name>, type in your name, but do not include the brackets.

| Indicates a choice between options on either side of the pipe.

[ ] Indicates that syntax inside the brackets is optional in the bigpipe shell, but required in tmsh.

( ) Indicates that the syntax inside the parentheses is optional in tmsh.

... Indicates that you can type a series of items.

::= Indicates the options that you can use in the bigpipe shell.

Table 1.1 Command line syntax conventions

Bigpipe Utility Reference Guide 1 - 5

Page 18: BIG IP Reference

Chapter 1

Finding help and technical support resourcesYou can find additional technical documentation and product information in the following locations:

◆ bigpipe man pagesThe BIG-IP product includes a complete set of man pages for the commands that make up bigpipe and tmsh.

You can access the man pages for bigpipe commands in one of two ways:

• From the BIG-IP system prompt, type man followed by the command name. You must use underscores between the words in the command name. For example:

man stp_instance

• From the bigpipe shell prompt, use the command name followed by help. Do not use underscores between the words in the command name. For example:bp> auth crldp help

You can access the man pages for tmsh commands from the tmsh prompt. You use the syntax / [module name] [component name] help. For example: (tmos) # / net arp help.

◆ Welcome screen in the Configuration utility

The Welcome screen in the Configuration utility contains links to many useful web sites and resources, including:

• The Ask F5SM Knowledge Base web site

• The F5 Solution Center

• The F5 DevCentral web site

• Plug-ins, SNMP MIBs, and SSH clients

• User documentation

◆ F5 Networks Technical Support web site

The F5 Networks Technical Support web site, https://support.f5.com, provides the latest documentation for the product, including:

• Release notes for the BIG-IP system, current and past

• Updates for guides (in PDF format)

• Technical notes

• Answers to frequently asked questions

• The Ask F5SM Knowledge Base

To access this site, you need to register at https://support.f5.com.

1 - 6

Page 19: BIG IP Reference

2

Understanding the Bigpipe Utility

• Using the bigpipe shell

• bigpipe command summary

• VIPRION system command summary

• WAN optimization command summary

Page 20: BIG IP Reference
Page 21: BIG IP Reference

Understanding the Bigpipe Utility

Using the bigpipe shellThe bigpipe utility includes an interactive shell that eases the task of typing bigpipe commands. You can invoke this shell by typing the bigpipe shell command at a BIG-IP® system prompt.

You can run bigpipe commands in the following ways:

• You can issue a single bigpipe command at the BIG-IP system prompt. You must use underscores between the words in the command name. For example:

auth_crldp

• You can open the bigpipe shell by typing the bigpipe shell command. This displays the prompt: bp>. At this prompt, you can type any bigpipe command sequence, using the syntax described in Chapter 3, Bigpipe Utility Command Reference. Do not use underscores between the words in the command name. For example:

bp> auth crldp

The bigpipe shell includes several features designed to optimize your use of the bigpipe utility. The following sections describe these features.

Controlling the bigpipe shellYou use the bigpipe shell command at the BIG-IP system prompt to invoke the bigpipe shell. If you include the prompt <string> option, the bigpipe shell command customizes the shell prompt. For more information, see Customizing the bigpipe shell, on page 2-4.

The shell itself has also its own set of subcommands that you can use:

• exitUse this command to exit the bigpipe shell.

• quitUse this command to exit the bigpipe shell (same as the exit command).

• stopUse this command to discontinue command continuation. For more information, see Using the bigpipe shell command completion feature, on page 2-3.

Bigpipe Utility Reference Guide 2 - 1

Page 22: BIG IP Reference

Chapter 2

Using the bigpipe shell command history featureThe bigpipe shell saves each command that you enter at the bigpipe shell prompt in a command history file. The command history persists when you log off of the system. The next time you log on to the system, you can access and edit the bigpipe commands that you entered in previous sessions. The bigpipe command history persists even through a reboot of the BIG-IP system. The only limit on the command history is the number of commands that the bigpipe shell saves in the command history file.

You use the shell history command to set the maximum number of commands that you want the bigpipe shell to save in the command history file. The default is 50 commands. If you do not want to use the command history feature, you set the maximum number of commands to 0 (zero). This means that the bigpipe shell does not save any commands in history.

To access commands in the bigpipe history

1. At the bigpipe shell prompt, press the up arrow key.The previously used commands display in the reverse order of use.

2. After you locate the command that you want to use again, press Enter, or edit the command and then press Enter.The command runs.

Using the bigpipe shell audit featureThe BIG-IP system contains a read-only audit file, /var/log/audit, which includes the following information, automatically provided by the bigpipe shell:

• All commands that users enter in the bigpipe shell, including commands that do not change the configuration of the BIG-IP system, such as show commands

• The user ID of the user who entered each command

• The date and time each command was entered

• All commands that are run by user-entered commands, based on the specified audit level, such as commands run by the merge command

• Some of the commands run by the system

Note

The bigpipe shell does not audit the commands run by system daemons, for example, the commands run by the mcpd daemon.

Tip

The audit file may be larger than you expect, because the bigpipe shell audits some of the commands that the system runs.

2 - 2

Page 23: BIG IP Reference

Understanding the Bigpipe Utility

The audit file merges consecutive white spaces into single spaces. This means that each command is a single, possibly very long, line.

You use the cli audit command to enable auditing for the bigpipe shell and to specify the level of auditing that you want the bigpipe shell to perform. There are four different levels of auditing available, including:

• disable The bigpipe shell does not audit any commands. This is the default.

• enableThe bigpipe shell audits all commands that users enter, and the commands run by the merge command, but not the commands run by the load and import commands.

• verboseThe bigpipe shell audits all of the commands that users enter, and the commands run by the merge command. Additionally, the bigpipe shell audits the commands run by the load and import commands, except for those commands that are found in these four system configuration files: config_base.conf, base_monitors.conf, profile_base.conf, and daemon.conf.

• allThe bigpipe shell audits all commands.

Using the bigpipe shell command completion featureAt any point while typing or editing a command, you can press the Tab key, and the bigpipe shell completes the word you are currently typing. If the command has only one option, the shell fills in the remainder of the word with that option. If the command has more than one option, you can press the Tab key a second time to list all available options. If the shell displays nothing after you press Tab, no options exist to complete the word.

Unlike other shell features, command completion works not only from inside the bigpipe shell, but also from the BIG-IP system prompt.

Using the bigpipe shell command continuation featureIf you type any command using an unbalanced opening brace, the bigpipe shell stores the command entered up to that point. The shell stores any subsequent commands in a similar way until you type a command that closes all open braces, or you type the stop command.

For example, suppose you type the auth radius command, with an opening brace, but no closing brace:

bp> auth radius rad-1 {

The shell does nothing and presents an empty prompt for continuing:

bp>

Bigpipe Utility Reference Guide 2 - 3

Page 24: BIG IP Reference

Chapter 2

At this point, you can continue to type more options for the auth radius command:

debug enable

retries 4

The shell continues to gather the syntax for the command. When finished typing, you can either type a command containing a closing brace ( } ), in which case the shell runs the full command sequence that you typed, or you can type:

stop

This discards the stored command sequence, without running the command.

Note

An opening brace that starts a continuation does not have to be the last character on the line. Also, you can use more than one brace on a single line.

Using grep functionality in the bigpipe shellThe bigpipe shell supports grep functionality. grep is a command line search utility. You can pipe the output of any bigpipe command through the grep utility. Piping allows the output of a bigpipe command to be used as input to the grep utility. You use the same syntax that you use in the system shell:

<command> | grep <grep options>

For more information about grep, see http://www.gnu.org/software/grep/.

Customizing the bigpipe shellYou can customize the bigpipe shell by changing the default prompt (bp>) to a prompt of your choice.

To customize the bigpipe shell prompt

At the bp> prompt, type the shell command with the prompt option and the text for the new prompt:

bp> shell prompt <string>

The prompt option sets the shell's prompt to the given string value.

For example, when you type

bp> shell prompt BIG-IP>

the system changes the shell prompt to:

BIG-IP>

2 - 4

Page 25: BIG IP Reference

Understanding the Bigpipe Utility

Using the bigpipe shell escape featureThe bigpipe shell does not directly support Linux® commands. You can type Linux commands by either exiting the bigpipe shell (returning to the BIG-IP system prompt) or by using the bigpipe shell escape feature. The shell escape is simply an exclamation point, followed by the Linux command itself. For example:

bp> !ls

You can disable this feature by typing the following command at the BIG-IP system prompt:

bigpipe shell -s

Bigpipe Utility Reference Guide 2 - 5

Page 26: BIG IP Reference

Chapter 2

bigpipe command summaryThe bigpipe utility contains an extensive set of commands that you can use to configure the BIG-IP system. Table 2.1 provides a list of these commands, along with a description of the action the command invokes. For more information on each command, see Chapter 3, Bigpipe Utility Command Reference.

Important

After you change the system configuration using any bigpipe command, you must run the save all command to save your changes to the stored configuration files. If you do not, your changes are lost.

Command Description

arp Creates static ARP addresses, and lists static and dynamic ARP addresses.

auth crldp Configures a Certificate Revocation List Distribution Point (CRLDP) configuration object for managing certificate revocation.

auth ldap Configures an LDAP configuration object for implementing remote LDAP-based client authentication.

auth radius Configures a Remote Access Dialup Service (RADIUS) configuration object for implementing remote RADIUS-based client authentication.

auth ssl cc ldap Configures an SSL client certificate LDAP configuration object for implementing remote SSL-based LDAP client authorization.

auth ssl ocsp Configures an SSL OCSP configuration object for managing remote certificate revocation based on the Online Certificate Revocation Protocol (OCSP).

auth tacacs Configures a TACACS+ configuration object for implementing remote TACACS+-based client authentication.

bigpipe shell When typed at the BIG-IP system prompt, starts the bigpipe utility in its shell mode, and configures the shell.

class Configures classes on the BIG-IP system.

cli Configures the bigpipe shell.

config Manages the BIG-IP system user configuration sets.

configsync Specifies the parameters for the task of synchronizing the configurations of two BIG-IP units in a redundant system.

conn Sets idle timeout for, displays, and deletes active connections on the BIG-IP system.

crldp server Creates a Certificate Revocation List Distribution Point (CRDLP) server for implementing a CRLDP authentication module.

Table 2.1 The bigpipe utility commands

2 - 6

Page 27: BIG IP Reference

Understanding the Bigpipe Utility

daemon Tunes the high availability functionality that is built into system daemons.

daemon_mcpd Sets internal settings for the mcpd daemon.

daemon_tmm Sets internal settings for the tmm daemon.

db Displays or modifies bigdb database entries.

dns Displays and resets global statistics for the DNS profile on the BIG-IP system.

exit Exits the bigpipe shell.

export Exports (saves) the running configuration into a flat, text file, with an extension of .scf. This file is known as the single configuration file or SCF.

f5adduser Used at the BIG-IP system prompt to add local user accounts to the BIG-IP system.

failover Sets the BIG-IP system as active or standby.

fasthttp Displays and resets global statistics for the Fast HTTP profile on the BIG-IP system.

fastL4 Displays and resets statistics for the Fast L4 profile on the BIG-IP system.

ftp Displays and resets global statistics for the FTP profile on the BIG-IP system.

global Sets global variable definitions.

ha table Displays the settings for high availability on a system.

hardware Displays the baud rate of the system hardware.

help Displays online help for bigpipe command syntax.

http Manages HTTP statistics.

httpd Configures the HTTP daemon for the BIG-IP system.

icmp Manages ICMP statistics.

import Resets the running configuration of the system to the values that are contained in the SCF that you are importing.

If you want the configuration that is contained in the SCF to be written to the configuration files (bigip.conf, bigip_base.conf, bigip_local.conf, and bigip_sys.conf), you must use the save all command following the import.

interface Sets options on individual interfaces.

ip Manages IP statistics.

list When the default Read partition is All, this command displays all objects the user has permission to see. When you specify a Read partition, this command displays all objects the user has permission to see, and all objects that are not in partitions.

Command Description

Table 2.1 The bigpipe utility commands (Continued)

Bigpipe Utility Reference Guide 2 - 7

Page 28: BIG IP Reference

Chapter 2

load Resets the running configuration of the BIG-IP system configuration with the values contained in the bigip.conf, bigip_base.conf, bigip_local.conf, and bigip_sys.conf files.

Note that after you run the load command, you must run the save or save all command; otherwise the system requires you to rerun the Setup utility.

logrotate Configures log rotation for the BIG-IP system.

ltm Configures the general properties for the BIG-IP local traffic management system.

mcp Displays the Master Control Program (MCP) state.

memory Manages memory statistics.

merge Loads the specified configuration file, which resets the running configuration.

mgmt Specifies network settings for the management interface (MGMT).

mgmt route Specifies route settings for the management interface (MGMT).

mirror Copies traffic from any port or set of ports to a single, separate port.

monitor Defines a health check monitor.

nat Defines external network address translations for nodes.

ndp Manages IPv6 neighbor discovery.

node Defines node property settings.

ntp Configures the Network Time Protocol (NTP) daemon for the BIG-IP system.

ocsp responder Configures Online Certificate System Protocol (OCSP) responder objects.

oneconnect Configures a OneConnect™ profile.

packet filter Configures packet filter rules and trusted allow lists.

partition Configures partitions for implementing access control for the BIG-IP system administrative users.

password policy Specifies the parameters of the valid passwords for the BIG-IP system.

persist Configures a session persistence mode on a specific pool or node, for client requests.

platform Displays platform information.

pool Defines load balancing pools.

profile Displays profile settings, resets statistics, or deletes a profile.

profile auth Configures a type of authentication profile.

Command Description

Table 2.1 The bigpipe utility commands (Continued)

2 - 8

Page 29: BIG IP Reference

Understanding the Bigpipe Utility

profile clientssl Configures a Client SSL type of profile.

profile dns Configures a domain name service (DNS) profile.

profile fasthttp Configures a Fast HTTP type of profile.

profile fastl4 Configures a Fast Layer 4 type of profile.

profile ftp Configures an FTP type of profile.

profile http Configures an HTTP type of profile.

profile httpclass Configures an HTTP Class type of profile.

profile oneconnect Configures a OneConnect type of profile.

profile persist Configures a session persistence profile.

profile rtsp Configures a Real Time Streaming Protocol (RTSP) profile.

profile sctp Configures a Stream Control Transmission Protocol (SCTP) profile.

profile serverssl Configures a Server SSL type of profile.

profile sip Configures a Session Initiation Protocol (SIP) profile.

profile stats Configures a Statistics type of profile.

profile stream Configures a Stream type of profile.

profile tcp Configures a TCP type of profile.

profile udp Configures a UDP type of profile.

provision Configures provisioning on the BIG-IP system.

pva Configures Packet Velocity® ASIC.

quit Exits the bigpipe shell.

radius server Configures a RADIUS server for RADIUS authentication.

rate class Configures a rate class.

remote users Configures the default user role, partition access, and console access for all remotely authenticated user accounts that have not been added as local user accounts on the BIG-IP system.

remoterole Creates a file (/config/bigip/auth/remoterole) that an LDAP or Active Directory server reads to determine the specific access rights to grant to groups of remotely authenticated users.

route Configures routes for the BIG-IP system traffic.

Command Description

Table 2.1 The bigpipe utility commands (Continued)

Bigpipe Utility Reference Guide 2 - 9

Page 30: BIG IP Reference

Chapter 2

route domain Configures route domains for traffic management.

rtsp Displays or resets Real Time Streaming Protocol (RTSP) statistics for the BIG-IP system.

rule Defines traffic-management iRules™.

save all Saves the running configuration to the stored configuration files.

sctp Displays or resets Stream Control Transmission Protocol (SCTP) statistics for the BIG-IP system.

self Assigns a self IP address for a VLAN.

self allow Configures the default allow list for all self IP addresses on the BIG-IP system.

shell Starts the bigpipe utility shell.

snat Defines and sets options for SNAT (Secure NAT).

snat translation Configures an explicit SNAT translation address.

snatpool Configures a SNAT pool.

snmpd Configures the simple network management protocol (SNMP) daemon for the BIG-IP system.

sshd Configures the Secure Shell (SSH) daemon for the BIG-IP system.

ssl Displays or modifies SSL statistics.

statemirror Configures connection mirroring for a BIG-IP unit that is part of a redundant system in a high availability system.

stop Discontinues command continuation.

stp Implements one of the spanning tree protocols.

stp instance Configures an STP configuration instance.

stream Displays or resets global stream statistics for the BIG-IP system.

syslog Configures connection mirroring for a BIG-IP system that is part of a redundant pair in a high availability system.

system Sets up the BIG-IP system.

tcp Manages TCP statistics for the system.

tmm Manages the tmm daemon.

traffic class Configures a traffic class.

trunk Configures a trunk, with link aggregation.

Command Description

Table 2.1 The bigpipe utility commands (Continued)

2 - 10

Page 31: BIG IP Reference

Understanding the Bigpipe Utility

udp Manages UDP statistics for the system.

unit Displays the unit number assigned to a particular BIG-IP system.

user Configures administrative user accounts on the BIG-IP system.

version Displays the bigpipe utility version number.

virtual Defines virtual servers, virtual server mappings, and virtual server properties.

virtual address Configures virtual addresses.

vlan Defines VLANs, VLAN mappings, and VLAN properties.

vlangroup Defines VLAN groups.

Command Description

Table 2.1 The bigpipe utility commands (Continued)

Bigpipe Utility Reference Guide 2 - 11

Page 32: BIG IP Reference

Chapter 2

VIPRION system command summaryThe bigpipe utility includes commands that are exclusive for use with the VIPRION® system. Table 2.2 provides a list of these commands, along with a description of the action the command invokes. For more information on each command, see Chapter 4, VIPRION System Command Reference.

Important

After you change the system configuration using any bigpipe command, you must run the save all command to save your changes to the stored configuration files. If you do not, your changes are lost.

Command Description

cluster Configures a cluster.

daemon Configures the high availability functionality that is built into daemons.

failover Configures and controls failover for a redundant system configuration.

pool Configures load balancing pools on the traffic management system.

profile udp Configures a UDP profile.

software Installs software on a clustered BIG-IP system.

system Sets up the system.

vlan Configures a virtual local area network (VLAN).

Table 2.2 The VIPRION system commands

2 - 12

Page 33: BIG IP Reference

Understanding the Bigpipe Utility

WAN optimization command summaryThe bigpipe utility contains an extensive set of commands that you can use to configure the WAN Optimization Module of the BIG-IP system. Table 2.3 provides a list of these commands, along with a description of the action the command invokes. For more information on each command, see Chapter 5, WAN Optimization Command Reference.

Important

After you change the system configuration using any bigpipe command, you must run the save all command to save your changes to the stored configuration files. If you do not, your changes are lost.

Command Description

datastor Configures the data storage used for optimization.

deduplication Configures symmetric data deduplication for WAN optimization.

drop policy Configures a custom drop policy that can be applied to rate shaping.

endpoint advertised route

Configures routes advertised by the local endpoint to remote endpoints for WAN optimization.

endpoint discovery Configures the automatic discovery of remote endpoints for WAN optimization.

endpoint local Creates, modifies, or deletes the local endpoint for the WAN Optimization Module.

endpoint remote Configures one or more remote endpoints for the WAN Optimization Module.

endpoint remote route

Displays the destination routes learned from the remote endpoints.

profile cifs Creates, modifies, displays, or deletes a Common Internet File System (CIFS) profile.

profile isession Creates, modifies, displays, or deletes an iSession profile.

profile mapi Creates, modifies, displays, or deletes a Messaging Application Profile Interface (MAPI) profile.

profile tunnel Creates, modifies, displays, or deletes a tunnel profile.

rate class Configures rate class.

shaping policy Configures rate class parameters for handling specific traffic flows.

shaping queue Configures a queuing method that can be applied to rate shaping policies.

wccp Configures Web Cache Communication Protocol (WCCP) services.

Table 2.3 The WAN optimization commands

Bigpipe Utility Reference Guide 2 - 13

Page 34: BIG IP Reference

Chapter 2

2 - 14

Page 35: BIG IP Reference

3

Bigpipe Utility Command Reference

• Introduction to command syntax

• Alphabetical list of commands

Page 36: BIG IP Reference
Page 37: BIG IP Reference

Bigpipe Utility Command Reference

Introduction to command syntaxThis chapter contains the command syntax for specific BIG-IP® system commands and each bigpipe command. Use the BIG-IP system commands at the BIG-IP system prompt. Use the bigpipe commands at the bigpipe shell prompt: bp>. In this chapter, we do not include the corresponding screen prompt. You can also find information about bigpipe command syntax in the man pages. For more information on viewing man pages, see Finding help and technical support resources, on page 1-6.

For more information about the bigpipe shell, see Using the bigpipe shell, on page 2-1.

Using the keyword, allWhen using bigpipe commands, you can globally modify or delete objects of a specified type only when all objects of that type reside in a single partition. In other words, it is important to note that when you use the all keyword with an object type, the action you are performing applies only to objects of the specified type in the current Write partition. For more information about partitions, see Understanding partitions and user accounts in the TMOS™ Management Guide for BIG-IP® Systems.

Identifying command typesIn the See also sections of this chapter, commands are followed by an industry-standard identifying number. The types that are listed in this chapter include:

• User commands, which are identified by (1), for example:

arp(1)

• System management commands, which are identified by (8), for example:

sys-reset(8)

Bigpipe Utility Reference Guide 3 - 1

Page 38: BIG IP Reference

Chapter 3

Basic definitionsThe following are basic definitions that apply to bigpipe commands.

<if name> ::= mgmt | <number> . <number>

<ip addr> ::= <IPv4 address> | <IPv6 address> | <node address screen name> | \

<host name> | any | any6 | *

<ip mask> ::= <IPv4 netmask> | <IPv6 netmask> | none

<name> ::= <letter> <letters, numbers, periods, hyphens, underscores>

<number> ::= <digit> ... | <digits> . <digits> (K | M | G)

<string> ::= <any set of characters, \

surrounded by double quotes if includes spaces, braces, or reserved words>

<service> ::= <number> | <name> | any | *

<protocol> ::= <number> | <name> | any | *

<member> ::= <IPv4 address> : <service> | <IPv6 address> . <service>

<network ip> ::= (<ip addr> [mask <ip mask> | (prefixlen | /) <number>] | \

default [inet | inet6])

<mac addr> ::= <six hexadecimal numbers separated by colons>

Most attributes accept a value of default, which sets the attribute to its default value.

Alphabetical list of commandsThe remainder of this chapter lists specific BIG-IP system commands and all of the bigpipe commands.

3 - 2

Page 39: BIG IP Reference

Bigpipe Utility Command Reference

arpManages static and dynamic Address Resolution Protocol (ARP) entries in the routing table. Provides the ability to add static ARP entries to the route table. Also provides the ability to display and delete static and dynamic route mappings between IP addresses and MAC addresses, or a list of IP addresses.

SyntaxUse this command to create, modify, display, or delete entries in the ARP cache.

Create/Modifyarp <arp key> {}

arp (<arp key> | all) [{] <arp arg list> [}]

<arp key> ::=

<ip addr>

(dynamic | static)

<arp arg> ::=

<ip addr>

(<mac addr> | none)

(dynamic | static)

Displayarp [<arp key> | all] [show [all]]

arp [<arp key> | all] list [all]

arp (<arp key> | all) ip addr [show]

arp (<arp key> | all) mac addr [show]

arp (<arp key> | all) type [show]

Deletearp (<arp key> | all) delete

DescriptionYou can use the arp command to create static ARP entries for IPv4 addresses to link-layer addresses, such as Ethernet MAC addresses. In addition to creating static ARP entries, you can view and delete static and dynamic ARP entries. You can also use the db command to configure how the system handles ARP entries for dynamic timeout, maximum dynamic entries, add reciprocal, and maximum retries. For more information, see db, on page 3-54, or the db command man page.

Bigpipe Utility Reference Guide 3 - 3

Page 40: BIG IP Reference

Chapter 3

ExamplesCreates an ARP mapping of the IP address 10.10.10.20 to the MAC address 00:0b:09:88:00:9a:

arp 10.10.10.20 00:0b:09:88:00:9a

Displays all ARP entries for the system:

arp show

Displays all dynamic ARP entries for the system:

arp dynamic show

Displays all static ARP entries for the system:

arp list

Displays the ARP entry for the IP address 10.10.10.20:

arp 10.10.10.20 show

Deletes the ARP entry for the IP address 10.10.10.20:

arp 10.10.10.20 delete

Deletes all static ARP entries for the system:

arp static delete

Deletes all ARP entries for the system:

arp all delete

OptionsYou can use these options with the arp command:

◆ ip addrSpecifies the IP address, for which you want to create an ARP entry, in one of four formats:

• IPv4 address in dotted-quad notation, for example: 10.10.10.1

• IPv6 address, for example: 1080::8:800:200C:417A

• host name, for example: www.f5.com

• node screen name, for example: node1

◆ mac addrSpecifies a 6-byte Ethernet address in not case-sensitive hexadecimal colon notation, for example: 00:0b:09:88:00:9a. You must specify a MAC address when you create an ARP entry.

◆ typeSpecifies if the IP address for an ARP entry is static or dynamic.

See alsodb(1), ndp(1), bigpipe(1)

3 - 4

Page 41: BIG IP Reference

Bigpipe Utility Command Reference

auth crldpConfigures a Certificate Revocation List Distribution Point (CRLDP) configuration object for implementing CRLDP to manage certificate revocation.

SyntaxUse this command to create, modify, display, or delete a CRLDP configuration object.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

auth crldp <auth crldp key> {}

auth crldp (<auth crldp key> | all) [{] <auth crldp arg list> [}]

<auth crldp key> ::=

<name>

<auth crldp arg> ::=

conn timeout (<number> | immediate | indefinite)

name <name>

servers (<crldp server key list> | none) [add | delete]

update interval <number>

use issuer (enable | disable)

Displayauth crldp [<auth crldp key> | all] [show [all]]

auth crldp [<auth crldp key> | all] list [all]

auth crldp (<auth crldp key> | all) conn timeout [show]

auth crldp (<auth crldp key> | all) name [show]

auth crldp (<auth crldp key> | all) partition [show]

auth crldp (<auth crldp key> | all) servers [show]

auth crldp (<auth crldp key> | all) update interval [show]

auth crldp (<auth crldp key> | all) use issuer [show]

Delete auth crldp (<auth crldp key> | all) delete

Bigpipe Utility Reference Guide 3 - 5

Page 42: BIG IP Reference

Chapter 3

DescriptionCRLDP authentication is a mechanism for checking certificate revocation status for client connections passing through the BIG-IP system. This module is useful when your authentication data is stored on a remote CRLDP server. You configure a CRLDP authentication module by defining a CRLDP server (using the crldp server command), creating a CRLDP configuration object (using the auth crldp command) and assigning CRLDP servers to the object, creating a CRLDP profile (using the profile auth command) and assigning the CRLDP configuration object to the profile, and assigning the CRLDP profile to a virtual server.

ExamplesCreates a configuration object named my_auth_crldp:

auth crldp my_auth_crldp {}

Deletes the configuration object named my_auth_crldp:

auth crldp my_auth_crldp delete

OptionsYou can use these options with the auth crldp command:

◆ connection timeoutSpecifies the number of seconds before the connection times out. The default value is 15 seconds.

◆ serversSpecifies the CRLDP server that you want to either assign to or remove from the CRLDP configuration object.

◆ update intervalSpecifies an update interval for CRL distribution points. The update interval for distribution points ensures that CRL status is checked at regular intervals, regardless of the CRL timeout value. This helps to prevent CRL information from becoming outdated before the BIG-IP system checks the status of a certificate. The default value is zero, which indicates an internal default value is active.

◆ use issuerIndicates whether the CRL distribution point should be extracted from the certificate of the client certificate issuer. The default value is disable.

See alsoprofile auth(1), bigpipe(1)

3 - 6

Page 43: BIG IP Reference

Bigpipe Utility Command Reference

auth krbdelegateConfigures a Kerberos delegation object. The Kerberos delegation module essentially acts like a proxy for Kerberos credentials. When connecting to a server that is inside its domain, the browser client fetches Kerberos credentials. These credentials should be known as delegated credentials. They are passed on to the system. Once the system has these credentials, it retrieves credentials for the real server that is on the back end, and passes those credentials back.

Each user is assigned a unique cookie that describes a session on the system. This cookie is encrypted in a cookie key.

SyntaxUse this command to create, modify, display, or delete a Kerberos delegation object.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

auth krbdelegate <auth krbdelegate key> {}

auth krbdelegate (<auth krbdelegate key> | all) [{] <auth krbdelegate arg list> [}]

<auth krbdelegate key> ::=

<name>

<auth krbdelegate arg> ::=

client principal (<string> | none)

debug (enable | disable)

name <name>

server principal (<string> | none)

Displayauth krbdelegate [<auth krbdelegate key> | all] [show [all]]

auth krbdelegate [<auth krbdelegate key> | all] list [all]

auth krbdelegate (<auth krbdelegate key> | all) client principal [show]

auth krbdelegate (<auth krbdelegate key> | all) debug [show]

auth krbdelegate (<auth krbdelegate key> | all) name [show]

auth krbdelegate (<auth krbdelegate key> | all) partition [show]

auth krbdelegate (<auth krbdelegate key> | all) server principal [show]

Bigpipe Utility Reference Guide 3 - 7

Page 44: BIG IP Reference

Chapter 3

Deleteauth krbdelegate (<auth krbdelegate key> | all) delete

DescriptionThe Kerberos delegation module obtains delegated Kerberos credentials for the client principal, and then retrieves Kerberos credentials for the server-side principal. The Kerberos delegation module essentially acts as a proxy for Kerberos credentials. When connecting to a server that is inside its domain, the browser client fetches Kerberos credentials. These credentials, known as delegated credentials, are passed to the BIG-IP system, which in turn retrieves credentials for the real server that is on the backend, and passes those credentials back.

ExamplesCreates a configuration object named my_auth_krbdelegate with the values shown:

bigpipe auth krbdelegate my_auth_krbdelegate \ { client principal HTTP/appserver.siterequest.com \ server principal HTTP/myserver1.siterequest.com }

Deletes the configuration object named my_auth_krbdelegate:

bigpipe auth krbdelegate my_auth_krbdelegate delete

OptionsYou can use these options with the auth ldap command:

◆ client principalSpecifies the principal that the client sees. This is usually a value such as HTTP/<fqdn>. This principal may be in a different domain from the server principal.

◆ server principalSpecifies the principal of the back-end web server. This is usually a value such as HTTP/<fqdn of server>. This may be in a different domain from the client principal.

See alsoprofile auth(1), bigpipe(1)

3 - 8

Page 45: BIG IP Reference

Bigpipe Utility Command Reference

auth ldapConfigures an LDAP configuration object for implementing remote LDAP-based client authentication.

SyntaxUse this command to create, modify, display, or delete an LDAP configuration object.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

auth ldap <auth ldap key> {}

auth ldap (<auth ldap key> | all) [{] <auth ldap arg list> [}]

<auth ldap key> ::=

<name>

<auth ldap arg> ::=

bind dn (<string> | none)

bind pw (<string> | none)

bind timeout <number>

check host attr (enable | disable)

debug (enable | disable)

filter (<string> | none)

group dn (<string> | none)

group member attr (<string> | none)

idle timeout <number>

ignore authinfo unavail (enable | disable)

login attr (<string> | none)

name <name>

scope (base | one | sub)

search base dn (<string> | none)

search timeout <number>

servers (<string list> | none) [add | delete]

service (<service> | none)

ssl (disable | enable)

ssl ca cert file (<string> | none)

ssl check peer (enable | disable)

Bigpipe Utility Reference Guide 3 - 9

Page 46: BIG IP Reference

Chapter 3

ssl ciphers (<string> | none)

ssl client cert (<string> | none)

ssl client key (<string> | none)

user template (<string> | none)

version <number>

warnings (enable | disable)

Displayauth ldap [<auth ldap key> | all] [show [all]]

auth ldap [<auth ldap key> | all] list [all]

auth ldap (<auth ldap key> | all) bind dn [show]

auth ldap (<auth ldap key> | all) bind pw [show]

auth ldap (<auth ldap key> | all) bind timeout [show]

auth ldap (<auth ldap key> | all) check host attr [show]

auth ldap (<auth ldap key> | all) debug [show]

auth ldap (<auth ldap key> | all) filter [show]

auth ldap (<auth ldap key> | all) group dn [show]

auth ldap (<auth ldap key> | all) group member attr [show]

auth ldap (<auth ldap key> | all) idle timeout [show]

auth ldap (<auth ldap key> | all) ignore authinfo unavail [show]

auth ldap (<auth ldap key> | all) login attr [show]

auth ldap (<auth ldap key> | all) name [show]

auth ldap (<auth ldap key> | all) partition [show]

auth ldap (<auth ldap key> | all) scope [show]

auth ldap (<auth ldap key> | all) search base dn [show]

auth ldap (<auth ldap key> | all) search timeout [show]

auth ldap (<auth ldap key> | all) servers [show]

auth ldap (<auth ldap key> | all) service [show]

auth ldap (<auth ldap key> | all) ssl [show]

auth ldap (<auth ldap key> | all) ssl ca cert file [show]

auth ldap (<auth ldap key> | all) ssl check peer [show]

auth ldap (<auth ldap key> | all) ssl ciphers [show]

auth ldap (<auth ldap key> | all) ssl client cert [show]

auth ldap (<auth ldap key> | all) ssl client key [show]

auth ldap (<auth ldap key> | all) user template [show]

auth ldap (<auth ldap key> | all) version [show]

auth ldap (<auth ldap key> | all) warnings [show]

Deleteauth ldap (<auth ldap key> | all) delete

3 - 10

Page 47: BIG IP Reference

Bigpipe Utility Command Reference

DescriptionLDAP authentication is a mechanism for authenticating or authorizing client connections passing through the system. LDAP authentication is useful when your authentication or authorization data is stored on a remote LDAP server or a Microsoft® Windows Active Directory server, and you want the client credentials to be based on basic HTTP authentication (that is, user name and password). You configure an LDAP authentication module by creating an LDAP configuration object, creating an LDAP profile, and assigning the profile and a default iRule to the virtual server.

ExamplesCreates a configuration object named my_auth_ldap:

auth ldap my_auth_ldap

Deletes the configuration object named my_auth_ldap:

auth ldap my_auth_ldap delete

OptionsYou can use these options with the auth ldap command:

◆ bind dnSpecifies the distinguished name of an account to which to bind, in order to perform searches. The admin account can be used as the search account. If no administrator DN is specified, then no bind is attempted. This setting is required only when a site does not allow anonymous searches. If the remote server is a Microsoft Windows Active Directory server, the distinguished name must be in the form of an email address. Possible values are a user-specified string, and none.

◆ bind pwSpecifies the password for the search account created on the LDAP server. This setting is required if you use a bind DN. Possible values are a user-specified string, and none.

◆ bind timeoutSpecifies a bind timeout limit, in seconds. The default value is 30 seconds.

◆ check host attrConfirms the password for the bind distinguished name. This setting is optional. The default value is disable.

◆ debugEnables or disables syslog-ng debugging information at LOG DEBUG level. Not recommended for normal use. The default value is disable.

◆ filterSpecifies a filter. This setting is used for authorizing client traffic. Possible values are a user-specified string, and none.

Bigpipe Utility Reference Guide 3 - 11

Page 48: BIG IP Reference

Chapter 3

◆ group dnSpecifies the group distinguished name. This setting is used for authorizing client traffic. Possible values are a user-specified string, and none.

◆ group member attrSpecifies a group member attribute. This setting is used for authorizing client traffic. Possible values are a user-specified string, and none.

◆ idle timeoutSpecifies the idle timeout, in seconds, for connections. The default value is 3600 seconds.

◆ ignore authinfo unavailIgnores the authentication information if it is not available. The default value is disable.

◆ login attrSpecifies a logon attribute. Normally, the value for this setting is uid; however, if the server is a Microsoft Windows Active Directory server, the value must be the account name SAMACCOUNTNAME (not case-sensitive). Possible values are a user-specified string, and none.

◆ scopeSpecifies the scope. Possible values are: base, one, and sub. The default value is sub.

◆ search base dnSpecifies the search base distinguished name. You must specify a search base distinguished name when you create an LDAP configuration object.

◆ search timeoutSpecifies the search timeout, in seconds. The default value is 30 seconds.

◆ serversSpecifies the LDAP servers that the system must use to obtain authentication information. You must specify a server when you create an LDAP configuration object.

◆ serviceSpecifies the port number for the LDAP service. Port 389 is typically used for non-SSL and port 636 is used for an SSL-enabled LDAP service.

◆ sslEnables or disables SSL. The default value is disable. Note that when you use the command line interface to enable SSL for an LDAP service, the system does not change the service port number from 389 to 636, as is required. To change the port number from the command line, use the service option of this command (see above), for example: auth ldap <name> ssl enable service 636.

◆ ssl ca cert fileSpecifies the name of an SSL CA certificate. Possible values are: none and specify full path.

3 - 12

Page 49: BIG IP Reference

Bigpipe Utility Command Reference

◆ ssl check peerChecks an SSL peer. The default value is disable.

◆ ssl ciphersSpecifies SSL ciphers. Possible values are a user-specified string, and none.

◆ ssl client certSpecifies the name of an SSL client certificate. Possible values are a user-specified string, and none.

◆ ssl client keySpecifies the name of an SSL client key. Possible values are a user-specified string, and none.

◆ version Specifies the version number of the LDAP application. The default value is 3.

◆ warningsEnables or disables warning messages. The default value is enable.

See alsoprofile auth(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 13

Page 50: BIG IP Reference

Chapter 3

auth radiusConfigures a RADIUS configuration object for implementing remote RADIUS-based client authentication.

SyntaxUse this command to create, modify, display, or delete a RADIUS authentication configuration object.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

auth radius <auth radius key> {}

auth radius (<auth radius key> | all) [{] <auth radius arg list> [}]

<auth radius key> ::=

<name>

<auth radius arg> ::=

accounting bug (enable | disable)

client (<string> | none)

debug (enable | disable)

name <name>

retries <number>

servers (<radius server key list> | none) [add | delete]

Displayauth radius [<auth radius key> | all] [show [all]]

auth radius [<auth radius key> | all] list [all]

auth radius (<auth radius key> | all) accounting bug [show]

auth radius (<auth radius key> | all) client [show]

auth radius (<auth radius key> | all) debug [show]

auth radius (<auth radius key> | all) name [show]

auth radius (<auth radius key> | all) partition [show]

auth radius (<auth radius key> | all) retries [show]

auth radius (<auth radius key> | all) servers [show]

3 - 14

Page 51: BIG IP Reference

Bigpipe Utility Command Reference

Deleteauth radius (<auth radius key> | all) delete

DescriptionBy creating a RADIUS configuration object, a RADIUS profile, and one or more RADIUS server objects, you can implement the RADIUS authentication module as the mechanism for authenticating client connections passing through the traffic management system. You use this module when your authentication data is stored on a remote RADIUS server. In this case, client credentials are based on basic HTTP authentication (that is, user name and password). You can use this configuration object in conjunction with a RADIUS profile and a RADIUS server object.

To use these commands, you must first create a RADIUS server object using the radius command.

ExamplesCreates a RADIUS configuration object named my_auth_radius:

auth radius my_auth_radius {}

Displays all auth radius configuration objects:

auth radius all

Deletes the auth radius configuration object named my_auth_radius:

auth radius my_auth_radius delete

OptionsYou can use these options with the auth radius command:

◆ accounting bugEnables or disables validation of the accounting response vector. This option should be necessary only on older servers. The default value is disable.

◆ clientSends a NAS-Identifier RADIUS attribute with string bar. If you do not specify a value for the Client ID setting, the system uses the pluggable authentication module (PAM) service type. You can disable this feature by specifying a blank client ID. Possible values are a user-specified string and none.

◆ debugEnables or disables syslog-ng debugging information at LOG DEBUG level. Not recommended for normal use. The default value is disable.

◆ retriesSpecifies the number of authentication retries that the BIG-IP local traffic management system allows before authentication fails. The default value is 3.

Bigpipe Utility Reference Guide 3 - 15

Page 52: BIG IP Reference

Chapter 3

◆ serversLists the IP addresses of the RADIUS servers that the BIG-IP local traffic management system uses to obtain authentication data. Note that for each server listed, you must create a corresponding RADIUS server object. A RADIUS server object specifies the server name, port number, RADIUS secret, and timeout value. Possible values are a user-specified list of IP addresses and none.

See alsoprofile auth(1), radius(1), bigpipe(1)

3 - 16

Page 53: BIG IP Reference

Bigpipe Utility Command Reference

auth ssl cc ldapConfigures an SSL client certificate configuration object for remote SSL-based LDAP authorization for client traffic passing through the traffic management system.

SyntaxUse this command to create, modify, display, or delete an SSL certificate-based LDAP configuration object.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

auth ssl cc ldap <auth ssl cc ldap key> {}

auth ssl cc ldap (<auth ssl cc ldap key> | all) [{] <auth ssl cc ldap arg list> [}]

<auth ssl cc ldap key> ::=

<name>

<auth ssl cc ldap arg> ::=

admin dn (<string> | none)

admin pw (<string> | none)

cache size <number>

cache timeout (<number> | immediate | indefinite)

certmap base (<string> | none)

certmap key (<string> | none)

certmap use serial (enable | disable)

group base (<string> | none)

group key (<string> | none)

group member key (<string> | none)

name <name>

role key (<string> | none)

search (user | certmap | cert)

secure (enable | disable)

servers (<string list> | none) [add | delete]

user base (<string> | none)

Bigpipe Utility Reference Guide 3 - 17

Page 54: BIG IP Reference

Chapter 3

user class (<string> | none)

user key (<string> | none)

valid groups (<string list> | none) [add | delete]

valid roles (<string list> | none) [add | delete]

Displayauth ssl cc ldap [<auth ssl cc ldap key> | all] [show [all]]

auth ssl cc ldap [<auth ssl cc ldap key> | all] list [all]

auth ssl cc ldap (<auth ssl cc ldap key> | all) admin dn [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) admin pw [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) cache size [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) cache timeout [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) certmap base [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) certmap key [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) certmap use serial [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) group base [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) group key [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) group member key [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) name [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) partition [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) role key [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) search [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) secure [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) servers [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) user base [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) user class [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) user key [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) valid groups [show]

auth ssl cc ldap (<auth ssl cc ldap key> | all) valid roles [show]

Deleteauth ssl cc ldap (<auth ssl cc ldap key> | all) delete

DescriptionYou can use the auth ssl cc ldap command to configure SSL client certificate-based remote LDAP authorization for client traffic passing through the traffic management system.

3 - 18

Page 55: BIG IP Reference

Bigpipe Utility Command Reference

OptionsYou can use these options with the auth ssl c ldap command:

◆ admin dnSpecifies the distinguished name of an account to which to bind, in order to perform searches. This search account is a read-only account used to do searches. The admin account can also be used as the search account. If no administrator DN is specified, then no bind is attempted. This parameter is required only when an LDAP database does not allow anonymous searches. Possible values are a user-specified string, and none.

◆ admin pwSpecifies the password for the admin account. See the admin dn option above. Possible values are a user-specified string, and none.

◆ cache size <number>Specifies the maximum size, in bytes, allowed for the SSL session cache. Setting this value to 0 disallows SSL session caching. The default value is 20000 bytes (that is 20KB).

◆ cache timeout <number> | immediate | indefiniteSpecifies the number of usable lifetime seconds of negotiable SSL session IDs. When this time expires, a client must negotiate a new session. Allowed values are: <number>, immediate, and indefinite. The default value is 300 seconds.

◆ certmap baseSpecifies the search base for the subtree used by the certmap search method. A typical search base is: ou=people,dc=company,dc=com. Possible values are a user-specified string, and none.

◆ certmap keySpecifies the name of the certificate map found in the LDAP database. Used by the certmap search method. Possible values are a user-specified string, and none.

◆ certmap use serialEnables or disables the use of the client certificate's subject or serial number (in conjunction with the certificate's issuer) when trying to match an entry in the certificate map subtree. A setting of enable uses the serial number. A setting of disable uses the subject. The default value is disable.

◆ group baseSpecifies the search base for the subtree used by group searches. This parameter is only used when specifying the valid groups option. The typical search base is similar to: ou=groups,dc=company,dc=com. Possible values are a user-specified string, and none.

◆ group keySpecifies the name of the attribute in the LDAP database that specifies the group name in the group subtree. An example of a typical key is cn (common name for the group). Possible values are a user-specified string, and none.

Bigpipe Utility Reference Guide 3 - 19

Page 56: BIG IP Reference

Chapter 3

◆ group member keySpecifies the name of the attribute in the LDAP database that specifies members (DNs) of a group. A typical key would be member. Possible values are a user-specified string, and none.

◆ role keySpecifies the name of the attribute in the LDAP database that specifies a user's authorization roles. This key is used only with the valid roles option. A typical role key might be authorizationRole. Possible values are a user-specified string, and none.

◆ searchSpecifies the type of LDAP search that is performed based on the client's certificate. Possible values are:

• user Searches for a user based on the common name found in the certificate.

• certSearches for the exact certificate.

• certmapSearches for a user by matching the certificate issuer and the certificate serial number or certificate.

The default value is user.

◆ secureEnables or disables an attempt to use secure LDAP (LDAP over SSL). The alternative to using secure LDAP is to use insecure (clear text) LDAP. Secure LDAP is a consideration when the connection between the BIG-IP system and the LDAP server cannot be trusted. The default value is disable.

◆ serversSpecifies a list of LDAP servers you want to search. Possible values are a user-specified list of servers and none. You must specify a server when you create an SSL client certificate configuration object.

◆ user baseSpecifies the search base for the subtree used by the user and cert search methods. A typical search base is: ou=people,dc=company,dc=com. Possible values are a user-specified string, and none. You must specify a user base when you create an SSL client certificate configuration object.

◆ user classSpecifies the object class in the LDAP database to which the user must belong to be authenticated.

◆ user keySpecifies the key that denotes a user ID in the LDAP database (for example, the common key for the user setting is uid). Possible values are a user-specified string, and none. You must always specify a user key when you create an SSL client certificate configuration object.

3 - 20

Page 57: BIG IP Reference

Bigpipe Utility Command Reference

◆ valid groupsSpecifies a space-delimited list specifying the names of groups in which the client must belong to be authorized (matches against the group key in the group subtree). The client needs to be a member of only one of the groups in the list. Possible values are a user-specified string or none.

◆ valid rolesSpecifies a space-delimited list specifying the valid roles that clients must have to be authorized. Possible values are a user-specified string and none.

See alsoprofile auth(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 21

Page 58: BIG IP Reference

Chapter 3

auth ssl ocspConfigures an OCSP configuration object for implementing remote OCSP-based client authentication.

SyntaxUse this command to create, display, modify, or delete an OCSP configuration object.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

auth ssl ocsp <auth ssl ocsp key> {}

auth ssl ocsp (<auth ssl ocsp key> | all) [{] <auth ssl ocsp arg list> [}]

<auth ssl ocsp key> ::=

<name>

<auth ssl ocsp arg> ::=

name <name>

responders (<ocsp responder key list> | none) [add | delete]

Displayauth ssl ocsp [<auth ssl ocsp key> | all] [show [all]]

auth ssl ocsp [<auth ssl ocsp key> | all] list [all]

auth ssl ocsp (<auth ssl ocsp key> | all) name [show]

auth ssl ocsp (<auth ssl ocsp key> | all) partition [show]

auth ssl ocsp (<auth ssl ocsp key> | all) responders [show]

Deleteauth ssl ocsp (<auth ssl ocsp key> | all) delete

3 - 22

Page 59: BIG IP Reference

Bigpipe Utility Command Reference

DescriptionOnline Certificate Status Protocol (OCSP) is an industry-standard protocol that offers an alternative to a certificate revocation list (CRL) when using public-key technology. A CRL is a list of revoked client certificates, which a server system can check during the process of verifying a client certificate.

To use these commands, you must first create an OCSP responder object using the ocsp responder command.

OptionsYou can use these options with the auth ssl ocsp command:

◆ partitionDisplays the partition within which the auth ssl ocsp object resides.

◆ respondersSpecifies a list of OCSP responders that you configured using the ocsp responder command.

See alsoprofile auth(1), ocsp responder(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 23

Page 60: BIG IP Reference

Chapter 3

auth tacacsConfigures a TACACS+ configuration object for implementing remote TACACS+-based client authentication.

SyntaxUse this command to create, modify, display, or delete a TACACS+ configuration object.

Create/ Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

auth tacacs <auth tacacs key> {}

auth tacacs (<auth tacacs key> | all) [{] <auth tacacs arg list> [}]

<auth tacacs key> ::=

<name>

<auth tacacs arg> ::=

acct all (enable | disable)

debug (enable | disable)

encrypt (enable | disable)

first hit (enable | disable)

name <name>

protocol (<string> | none)

secret (<string> | none)

servers (<string list> | none) [add | delete]

service (<string> | none)

Displayauth tacacs [<auth tacacs key> | all] [show [all]]

auth tacacs [<auth tacacs key> | all] list [all]

auth tacacs (<auth tacacs key> | all) acct all [show]

auth tacacs (<auth tacacs key> | all) debug [show]

auth tacacs (<auth tacacs key> | all) encrypt [show]

auth tacacs (<auth tacacs key> | all) first hit [show]

auth tacacs (<auth tacacs key> | all) name [show]

auth tacacs (<auth tacacs key> | all) partition [show]

3 - 24

Page 61: BIG IP Reference

Bigpipe Utility Command Reference

auth tacacs (<auth tacacs key> | all) protocol [show]

auth tacacs (<auth tacacs key> | all) secret [show]

auth tacacs (<auth tacacs key> | all) servers [show]

auth tacacs (<auth tacacs key> | all) service [show]

Deleteauth tacacs (<auth tacacs key> | all) delete

DescriptionUsing a TACACS+ configuration object and profile, you can implement the TACACS+ authentication module as the mechanism for authenticating client connections passing through the BIG-IP local traffic management system. You use this module when your authentication data is stored on a remote TACACS+ server. In this case, client credentials are based on basic HTTP authentication (that is, user name and password). You configure a TACACS+ authentication module by creating a TACACS+ configuration object, creating a TACACS+ profile, and assigning the profile to a virtual server.

ExamplesEnables encryption for TACACS+ packets:

auth tacacs encrypt

Provides the ability to send accounting start and stop packets to all servers:

auth tacacs myauth2 myauth3 acct all enable

OptionsYou can use these options with the auth tacacs command:

◆ acct allIf multiple TACACS+ servers are defined and pluggable authentication module (PAM) session accounting is enabled, sends accounting start and stop packets to the first available server or to all servers. Possible values are:

• enableSends to first available server.

• disableSends to all servers.

The default value is disable.

◆ debugEnables syslog-ng debugging information at LOG DEBUG level. Not recommended for normal use. The default value is disable.

◆ encryptEnables or disables encryption of TACACS+ packets. Recommended for normal use. The default value is enable.

Bigpipe Utility Reference Guide 3 - 25

Page 62: BIG IP Reference

Chapter 3

◆ first hitConfirms the secret key supplied for the Secret setting. This setting is required. The default value is disable.

◆ partitionDisplays the partition within which the auth tacacs object resides.

◆ protocolSpecifies the protocol associated with the value specified in the service option, which is a subset of the associated service being used for client authorization or system accounting.

◆ secretSets the secret key used to encrypt and decrypt packets sent or received from the server. This setting is required. Possible values are a user-specified string and none.

◆ serversSpecifies a host name or IP address for the TACACS+ server. This setting is required. Possible values are a user-specified string, and none. You must specify a server when you create a TACACS+ configuration object.

◆ serviceSpecifies the name of the service that the user is requesting to be authenticated to use. Identifying the service enables the TACACS+ server to behave differently for different types of authentication requests. This setting is required.

See alsoprofile auth(1), profile http(1), bigpipe(1), shell(1)

3 - 26

Page 63: BIG IP Reference

Bigpipe Utility Command Reference

bigpipe shellWhen typed at the BIG-IP system prompt, starts the bigpipe utility in its shell mode and configures the shell.

Modifybigpipe shell [{] <shell arg list> [}]

<shell arg> ::=

history <number>

partition <partition key>

prompt <string>

read partition (<partition key> | all)

write partition <partition key>

Displaybigpipe shell [show [all]]

bigpipe shell list [all]

bigpipe shell history [show]

bigpipe shell partition [show]

bigpipe shell prompt [show]

bigpipe shell read partition [show]

bigpipe shell write partition [show]

DescriptionWhen typed at the BIG-IP system prompt, the bigpipe shell command starts the bigpipe utility in its shell mode and presents a prompt at which you can type bigpipe commands. You can also use the bigpipe shell command from the BIG-IP system prompt to configure the shell.

ExamplesFrom the BIG-IP system prompt, starts the bigpipe utility in its shell mode and presents a prompt at which you can type bigpipe commands:

bigpipe shell

Customizes the bigpipe shell prompt to display as F5:

bigpipe shell prompt F5

For users with access to all partitions, changes the partition to which you have Write access to partition application1:

bigpipe shell write partition application1

For users with access to all partitions, changes the partition to which you have Read and Write access to partition application2:

bigpipe shell partition application2

Bigpipe Utility Reference Guide 3 - 27

Page 64: BIG IP Reference

Chapter 3

OptionsYou can use these options with the bigpipe shell command:

◆ partitionChanges the partition to which you have Read and Write access to the partition you specify. This option is only available to users with access to all partitions.

◆ promptSpecifies a string to use for the bigpipe shell prompt. The default prompt is bp>.

◆ read partitionChanges the partition to which you have Read access to the partition you specify. This option is only available to users with access to all partitions.

◆ write partitionChanges the partition to which you have Write access to the partition you specify. This option is only available to users with access to all partitions.

See alsopartition(1), bigpipe(1)

3 - 28

Page 65: BIG IP Reference

Bigpipe Utility Command Reference

classCreates, modifies, displays, or deletes classes.

SyntaxUse this command to configure classes.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

class <class key> {}

class (<class key> | all) [{] <class arg list> [}]

<class key> ::=

<name>

<class arg> ::=

filename (<file name> | none)

(<IP class item list> | none) [add | delete]

mode (read | rw)

name <name>

(<quoted string list> | none) [add | delete]

type (ip | string | value)

(<number list> | none) [add | delete]

<IP class item> ::= host <ip addr> | network <network ip>

Displayclass [<class key> | all] [show [all]]

class [<class key> | all] list [all]

class (<class key> | all) filename [show]

class (<class key> | all) ip [show]

class (<class key> | all) mode [show]

class (<class key> | all) name [show]

class (<class key> | all) partition [show]

class (<class key> | all) string [show]

class (<class key> | all) type [show]

class (<class key> | all) value [show]

Bigpipe Utility Reference Guide 3 - 29

Page 66: BIG IP Reference

Chapter 3

Deleteclass (<class key> | all) delete

DescriptionClasses are lists of data that you define and use with iRules™ operators. The system includes a number of predefined lists that you can use. They are:

• AOL Network

• Image Extensions

• Private class IP addresses

The above lists are located in the file /config/profile_base.conf. The load command loads these lists; however, unless the lists are modified, the load command does not save the lists to the bigip.conf file.

Classes are either internal or external. Internal classes are stored in the bigip.conf file. External classes are stored in external files that you define. Note that external classes can be very large, which is one reason why these classes are saved to external files. For example, a phone company may store a list of thousands of phone numbers in an external class.

Internal classes can be one of three types of lists, an ip class item list, a string list, or a number list. Strings must be surrounded by quotation marks. Numbers can be either positive or negative.

External classes are lists that specify:

• A file name where the list is saved

• The type, indicated by a list of ip addresses, strings, or values

• A permission mode that defines access to the class as either read or rw (Read/Write)

You can update the external class file by issuing the load command.

Note

When you use the bigpipe class command at the BIG-IP system prompt, you must use escape characters around the strings in the syntax to stop the operating system from interpreting the string literally.

ExamplesCreates an internal class named MyNewClass that contains a single IP address:

class MyNewClass host 10.0.0.0

Creates an internal class named MyNewClass2 that contains a list of three network addresses: 192.1.1.0/24, 192.2.1.1, and 10.0.0.5/24:

class MyNewClass2 network 192.1.1.0 mask 255.255.255.0 host 192.2.1.1 network 10.0.0.5/24

3 - 30

Page 67: BIG IP Reference

Bigpipe Utility Command Reference

Creates an internal class named AnotherNewClass that contains a list of four values:

class AnotherNewClass 111 222 333 444

Modifies the internal class named AnotherNewClass by adding the value 555:

class AnotherNewClass "555" add

Creates an internal class named ThirdNewClass that contains a list of strings:

class ThirdNewClass "aaaa" "bbbb" "cccccc" "dd"

Modifies the internal class named ThirdNewClass by deleting the member aaaa from the list of strings:

class ThirdNewClass "aaaa" delete

Creates an external class named MyExternalClass that contains IP addresses that are stored in the MyOtherNewClass.cls file. The external class has Read and Write permissions assigned to it:

class MyExternalClass type ip filename MyOtherNewClass.cls mode rw

Displays the file name where the class list information is stored:

class MyExternalClass filename show

OptionsYou can use these options with the class command:

◆ filenameSpecifies the path and file name that contains the list of data defined by the external class.

◆ mode (read | rw)Specifies a permission mode for the external class. Valid values are read and rw (read/write).

◆ nameSpecifies a unique string identifying the class.

◆ partitionDisplays the partition within which the internal or external class resides.

◆ type (ip | string | value)Specifies the type of data you want to add to, modify, display, or delete from an external class. This setting is required for external classes.

Specify the type by including a list of strings, values, or IP addresses. Strings must be surrounded by quotation marks. Values (numbers) can be either positive or negative. IP addresses can be in any of the following four formats:

• network <ip addr> mask < ip mask>

• network <ip addr> prefixlen <number>

Bigpipe Utility Reference Guide 3 - 31

Page 68: BIG IP Reference

Chapter 3

• network <ip addr> / <number>

• host <ip addr>

◆ <IP class item list>, <string list>, <number list>Specifies the data you want to add to, modify, display, or delete from an internal class. This setting is required for internal classes. Strings must be surrounded by quotation marks. Numbers can be either positive or negative.

See alsorule(1), bigpipe(1)

3 - 32

Page 69: BIG IP Reference

Bigpipe Utility Command Reference

cliConfigures the bigpipe shell.

SyntaxUse this command to configure the bigpipe shell.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

cli [{] <cli arg list> [}]

<cli arg> ::=

audit (enable | disable | verbose | all)

hostname lookup (enable | disable)

import save <number>

ip addr (name | number)

service (name | number)

Displaycli [show [all]]

cli list [all]

cli audit [show]

cli hostname lookup [show]

cli import save [show]

cli ip addr [show]

cli service [show]

DescriptionThis command provides the ability to configure the bigpipe shell to meet your specific needs.

Bigpipe Utility Reference Guide 3 - 33

Page 70: BIG IP Reference

Chapter 3

ExamplesSets the audit level of the bigpipe shell to enable:

cli audit enable

Configures the bigpipe shell to store three backup single configuration files (config/backup.scf, /config/backup-1.scf, and /config/backup-2.scf), and to display IP addresses and services by number, for example: 192.168.10.20:80:

cli import 3 ip addr number service number

OptionsYou can use these options with the cli command:

◆ auditSpecifies the global audit level of the bigpipe shell. The audited commands are stored in /var/log/audit. The audit levels are:

• disableThe bigpipe utility does not log any commands entered by users. This is the default value.

• enableThe bigpipe utility audits all commands entered by users, including the commands that the merge command runs. This does not include the commands that the load and import commands run.

• verboseThe bigpipe utility audits all commands entered by users, including the commands that the merge command runs. The bigpipe shell also audits the commands that the load and import commands run, except for those included in the system configuration files: config_base.conf, base_monitors.conf, profile_base.conf, and daemon.conf.

• allThe bigpipe utility audits all the commands that are run from all sources.

◆ hostname lookupWhen enabled, specifies that the bigpipe shell accepts host names in place of IP addresses in the syntax of bigpipe commands. The default value is disable.

◆ importSpecifies the number of backup single configuration files that the system stores. Each time you run the import command, the bigpipe shell saves the single configuration file. For example, if you set the import parameter to 3, after you run the import command for the third time, you see three files on your system:

• /config/backup.scf

• /config/backup-1.scf

• /config/backup-2.scf

3 - 34

Page 71: BIG IP Reference

Bigpipe Utility Command Reference

The newest backup file is /config/backup.scf. By default, the system saves only two backup single configuration files.

◆ ip addrSpecifies the format with which the bigpipe shell displays an IP address. Possible values are:

• nameThe bigpipe shell displays an IP address using a host name, for example: www.myhostname.com. This is the default value.

• numberThe bigpipe shell displays an IP address using a numeric address, for example: 192.168.10.20.

◆ partitionDisplays the partition within which the object resides.

◆ serviceSpecifies the format in which the bigpipe shell displays a service. Possible values are:

• nameThe bigpipe shell displays a service using a host name, for example: HTTP.

• numberThe bigpipe shell displays a service using a numeric value, for example, 192.168.10.20:80, where 80 indicates HTTP. This is the default value.

See alsobigpipe(1)

Bigpipe Utility Reference Guide 3 - 35

Page 72: BIG IP Reference

Chapter 3

configManages the BIG-IP system user configuration sets.

SyntaxUse this command to manage or display configuration data.

Modifyconfig show <file name>

config [support] save <file name> [passphrase [<string>]]

config install [all] <file name> [passphrase [<string>]]

[excludes <file name>]

config sync min

config sync pull

config sync [all]

config sync show

config check [all]

config diff <file name> [<file name>]

Displayconfig sync show

DescriptionThe config command manages user configuration sets. A user configuration set (UCS) is the set of all configuration files that a user may edit to configure a BIG-IP system. A UCS file is an archive that contains all the configuration files in a UCS.

The config command enables you to save the BIG-IP system configuration to a UCS file, install the configuration from a UCS file, or synchronize the configuration with the other BIG-IP system in a redundant system configuration.

ExamplesSaves <file.ucs>, overwriting all configuration files, including /config/bigip.conf:

config [support] save <file.ucs> [passphrase [<string>]]

Unpacks and installs myconfiguration.ucs, overwriting all configuration files, including /config/bigip.conf:

config install myconfiguration.ucs>

Displays the status of the configuration synchronization system and the date and time the last configuration change was made:

config sync show

3 - 36

Page 73: BIG IP Reference

Bigpipe Utility Command Reference

Unpacks and installs <file.ucs>, overwriting all configuration files, including /config/bigip.conf:

config install <file.ucs>

Copies a UCS file, without the license file, from one system to another:

config install all <file.ucs> [passphrase [<string>]] \ [excludes <file.ucs>]

Note that when copying the UCS file, using the above command, the system:

• Checks to see whether a license file exists and if so, checks whether the file is valid. If no license file exists or the license file is not valid, the bigpipe utility exits.

• Sets the system host name according to the host name in the UCS file.

• Saves the running configuration to the location /var/local/ucs/cs_backup.ucs.

• Installs the configuration from the UCS file onto the system, excluding the license file.

Saves the currently running configuration to /config/bigip.conf. Copies /config/bigip.conf to the other BIG-IP system in a redundant system configuration, and loads /config/bigip.conf on the other BIG-IP system:

config sync min

Creates a temporary UCS file and transfers it to the other BIG-IP system. Installs the UCS file on the other BIG-IP system:

config sync all

Runs a syntax check on the configuration files in the configuration synchronization system:

config check all

Use the following command to pull the configuration from the peer device and install it on the local device. This command saves the UCS file on the remote peer, then transfers the UCS file to the local system, and installs it on the local system. This command provides the ability to synchronize the configuration from the local device without having to log on to the peer device to push the configuration back:

config sync pull

Use the following command to configure a BIG-IP system using the UCS file of another BIG-IP system. To do this, copy the UCS file from a BIG-IP system, save it to the BIG-IP system that you want to configure, and then run the following command on the system that you want to configure:

config install [all] file_name.ucs passphrase mypassword

Bigpipe Utility Reference Guide 3 - 37

Page 74: BIG IP Reference

Chapter 3

OptionsYou can use these options with the config command:

◆ installInstalls the specified UCS file, overwriting the existing UCS file.

◆ saveSaves the password protected configuration file that has a UCS file extension.

◆ syncSaves the running configuration and copies it to the other unit in the redundant system configuration.

Note that the configsync command enables you to set the parameters for the task of running the configuration synchronization. For more information, see configsync, on page 3-39.

◆ <file.ucs>Specifies the name of a UCS file that you want to install or save.

See alsobigpipe(1), configsync(1)

3 - 38

Page 75: BIG IP Reference

Bigpipe Utility Command Reference

configsyncSpecifies the parameters for the task of synchronizing the configurations of two BIG-IP units in a redundant system configuration.

SyntaxUse this command to set up the environment for a configuration synchronization of two BIG-IP units in a redundant system configuration.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

configsync [{] <configsync arg list> [}]

<configsync arg> ::=

auto detect (enable | disable)

custom peer addr (<ip addr> | none)

encrypt (enable | disable)

passphrase (crypt (<string> | none) | <string> | none)

password (crypt (<string> | none) | <string> | none)

peer update interval <number>

time diff <number>

user (<string> | none)

Displayconfigsync [show [all]]

configsync list [all]

configsync auto detect [show]

configsync custom peer addr [show]

configsync encrypt [show]

configsync passphrase [show]

configsync password [show]

configsync peer update interval [show]

configsync time diff [show]

configsync user [show]

Bigpipe Utility Reference Guide 3 - 39

Page 76: BIG IP Reference

Chapter 3

DescriptionYou can use the configsync command to set up a the parameters for the task of synchronizing the configuration of two BIG-IP units in a redundant system configuration.

ExamplesIndicates that a user with the user name admin will have to enter the password 15GmA*4 when attempting to perform a configuration synchronization between two BIG-IP systems:

configsync encrypt enable password 15GmA*4 user admin

OptionsYou can use these options with the configsync command:

◆ auto detectEnables or disables the automatic detection of a difference in the configurations of two systems in a redundant system configuration. The default value is disable.

◆ custom peer addrSpecifies the IP address of the other BIG-IP system in a redundant system configuration. This is the IP address of the system to which you want to synchronize the configuration. The default value is the value of the statemirror peer addr field.

◆ encryptEnables or disables the encryption of the configuration synchronization action. When enabled, the system automatically requests a password when a user attempts to synchronize the configurations of two BIG-IP systems in a redundant system configuration. The default value is disable.

◆ partitionDisplays the partition within which the configsync object resides.

◆ passphraseWhen the encrypt parameter is enabled, specifies the passphrase that you must enter during a configuration synchronization of two systems in a redundant system configuration to decrypt any encrypted data. The system prompts you to enter this passphrase twice. Once to create the UCS file on one unit of a redundant system configuration, and a second time to unpack and install that UCS file on the peer unit.

◆ passwordSpecifies the password that is required to perform the configuration synchronization of two BIG-IP systems. By default, this value is the password for the admin user account.

◆ peer update intervalWhen auto detect is enabled, specifies how often the system monitors the configuration of the two units in a redundant system configuration. The default value is 30 seconds.

3 - 40

Page 77: BIG IP Reference

Bigpipe Utility Command Reference

◆ time diffSpecifies the maximum number of seconds of difference there can be in the time settings of the units in a redundant system configuration before a configuration synchronization occurs. The default time difference is 600 seconds.

◆ userSpecifies the name of the user account that has the necessary permissions to run the configsync command. You must specify an existing local user account. The default value is admin. It is important to note that if you change this option, F5 recommends that you also change the password option.

See alsobigpipe(1), config(1)

Bigpipe Utility Reference Guide 3 - 41

Page 78: BIG IP Reference

Chapter 3

connSets idle timeout for, displays, and deletes active connections on the BIG-IP system.

SyntaxUse this command to set the idle timeout for, display, or delete active connections on the BIG-IP system.

Create/Modifyconn (<conn key> | all) [{] <conn arg list> [}]

<conn key> ::=

[client (<ip addr> | <member>)] [server (<ip addr> | <member>)] \ [(any | local | mirror)] [protocol <protocol>] [age <number>]

<conn arg> ::=

age <number>

client (<ip addr> | <member>)

idle timeout (<number> | immediate | indefinite)

protocol <protocol>

server (<ip addr> | <member>)

(any | local | mirror)

Displayconn [<conn key> | all] [show [all]]

conn (<conn key> | all) stats reset

Deleteconn (<conn key> | all) delete

DescriptionThe conn command displays the current connections on the BIG-IP system, sets the idle timeout for a connection, or deletes the connection.

You can specify the <protocol> value using either a number or a name (http or 80).

If you do not specify a port or service, the system deletes all connections with the client-side source that match just the IP address. If you do not specify an IP address, the system deletes all connections, including mirrored connections.

3 - 42

Page 79: BIG IP Reference

Bigpipe Utility Command Reference

ExamplesShows basic connection information for all connections:

conn all show

Shows verbose connection information for all connections:

conn all show all

Shows idle timeout connection information for all connections:

conn all idle timeout show

OptionsYou can use this option with the conn command:

◆ <protocol> Specifies a port or service.

See alsobigpipe(1)

Bigpipe Utility Reference Guide 3 - 43

Page 80: BIG IP Reference

Chapter 3

crldp serverCreates a Certificate Revocation List Distribution Point (CRDLP) server object for implementing a CRLDP authentication module.

SyntaxUse this command to create, modify, display, or delete a CRLDP server object.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

crldp server <crldp server key> {}

crldp server (<crldp server key> | all) [{] <crldp server arg list> [}]

<crldp server key> ::=

<name>

<crldp server arg> ::=

base dn (<string> | none)

name <name>

reverse dn (enable | disable)

server (<string> | none)

service (<service> | none)

Displaycrldp server [<crldp server key> | all] [show [all]]

crldp server [<crldp server key> | all] list [all]

crldp server (<crldp server key> | all) base dn [show]

crldp server (<crldp server key> | all) name [show]

crldp server (<crldp server key> | all) partition [show]

crldp server (<crldp server key> | all) reverse dn [show]

crldp server (<crldp server key> | all) server [show]

crldp server (<crldp server key> | all) service [show]

Deletecrldp server (<crldp server key> | all) delete

3 - 44

Page 81: BIG IP Reference

Bigpipe Utility Command Reference

DescriptionCRLDP authentication is a mechanism for checking certificate revocation status for client connections passing through the BIG-IP system. This module is useful when your authentication data is stored on a remote CRLDP server. You configure a CRLDP authentication module by defining a CRLDP server (using the crldp server command), creating a CRLDP configuration object (using the auth crldp command), creating a CRLDP profile (using the profile auth command), and assigning the profile to the virtual server.

ExamplesCreates a CRLDP server named my_crldp_server:

crldp server my_auth_crldp {}

Deletes the CRLDP server named my_crldp_server:

crldp server my_crldp_server delete

OptionsYou can use these options with the crldp server command:

◆ base dnSpecifies the LDAP base directory name for certificates that specify the CRL distribution point in directory name (dirName) format. Used when the value of the X509v3 attribute crlDistributionPoints is of type dirName. In this case, the BIG-IP system attempts to match the value of the crlDistributionPoints attribute to the base dn value. An example of a base dn value is cn=lxxx,dc=f5,dc=com.

◆ partitionDisplays the partition within which the crldp server object resides.

◆ reverse dnSpecifies in which order the system is to attempt to match the Base DN value to the value of the X509v3 attribute crlDistributionPoints. When enabled, the system matches the base DN from left to right, or from the beginning of the DN string, to accommodate dirName strings in certificates such as C=US,ST=WA,L=SEA,OU=F5,CN=xxx. The default value is disable.

◆ serverSpecifies an IP address for the CRLDP server. This setting is required.

◆ serviceSpecifies the port for CRLDP authentication traffic. The default service is 389.

See alsoauth crldp(1), profile auth(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 45

Page 82: BIG IP Reference

Chapter 3

daemonTunes the high availability functionality that is built into daemons.

SyntaxUse this command to modify or display daemons.

Modifydaemon <daemon key> {}

daemon (<daemon key> | all) [{] <daemon arg list> [}]

<daemon key> ::=

<name>

<daemon arg> ::=

heartbeat monitor (enable | disable)

heartbeat monitor (reboot | restart | failover | go active | no action | \ restart all | failover restart tm | failover abort tm | go offline | \ go offline restart | go offline abort tm | go offline downlinks | \ go offline downlinks restart)

heartbeat monitor redundant (reboot | restart | failover | go active | \ no action | restart all | failover restart tm | failover abort tm | \ go offline | go offline restart | go offline abort tm | go offline downlinks | \ go offline downlinks restart)

heartbeat monitor stand alone (reboot | restart | failover | go active | \ no action | restart all | failover restart tm | failover abort tm | \ go offline | go offline restart | go offline abort tm | go offline downlinks | \ go offline downlinks restart)

name <name>

proc not run action (reboot | restart | failover | go active | no action | \ restart all | failover restart tm | failover abort tm | go offline | \ go offline restart | go offline abort tm | go offline downlinks | \ go offline downlinks restart)

running (enable | disable)

running timeout <number>

Displaydaemon [<daemon key> | all] [show [all]]

daemon [<daemon key> | all] list [all]

daemon (<daemon key> | all) heartbeat monitor [show]

daemon (<daemon key> | all) heartbeat monitor redundant [show]

daemon (<daemon key> | all) heartbeat monitor stand alone [show]

daemon (<daemon key> | all) name [show]

daemon (<daemon key> | all) proc not run action [show]

daemon (<daemon key> | all) running [show]

daemon (<daemon key> | all) running timeout [show]

3 - 46

Page 83: BIG IP Reference

Bigpipe Utility Command Reference

Deletedaemon (<daemon key> | all) delete

DescriptionThis command provides the ability to fine-tune the daemons that provide high availability functionality.

ExamplesEnables the system to fail over and reboot due to lack of a detected heartbeat from the sod daemon:

daemon sod heartbeat monitor enable

OptionsYou can use these options with the daemon command:

◆ heartbeat monitorEnables or disables the heartbeat on the specified daemon, or performs an action. Typically, if a daemon does not periodically connect with its heartbeat location, it is restarted automatically. This command enables you to disable automatic restart. The daemons that supply a heartbeat are: tmm, mcpd, bigd, sod, and bcm56xxd. The default value is enable.

Specify the action the daemon should take if no heartbeat is detected. Possible values are reboot, restart, failover, failover restart, go active no action, restart all, failover restart tm, go offline, go offline restart, go offline abort tm, go offline downlinks, go offline downlinks restart, and failover abort tm. The default value is restart.

◆ heartbeat monitor redundantSpecify the action the daemon should take if no heartbeat is detected on the redundant heartbeat monitor. Possible values are reboot, restart, failover, failover restart, go active no action, restart all, failover restart tm, go offline, go offline restart, go offline abort tm, go offline downlinks, go offline downlinks restart, and failover abort tm. The default value is restart.

◆ heartbeat monitor stand aloneSpecify the action the daemon should take if no heartbeat is detected on a standalone heartbeat monitor. Possible values are reboot, restart, failover, failover restart, go active no action, restart all, failover restart tm, go offline, go offline restart, go offline abort tm, go offline downlinks, go offline downlinks restart, and failover abort tm. The default value is restart.

Bigpipe Utility Reference Guide 3 - 47

Page 84: BIG IP Reference

Chapter 3

◆ proc not run actionSpecify the action the daemon should take if a configured traffic or system management action is not run. Possible values are reboot, restart, failover, failover restart, go active no action, restart all, failover restart tm, go offline, go offline restart, go offline abort tm, go offline downlinks, go offline downlinks restart, and failover abort tm. The default value is failover.

◆ runningEnables or disables actions configured for the traffic management and system management daemons. You can use this feature to disable the action a daemon takes during failover. For example, when you want to stop a daemon and you do not want the unit to failover, you can issue the running disable command for the daemon. The default value is disable.

◆ running timeoutSpecify the length of time you want disabled actions to remain disabled. The default value is 10 seconds.

See alsoha table(1), bigpipe(1)

3 - 48

Page 85: BIG IP Reference

Bigpipe Utility Command Reference

daemon mcpdSets internal settings for the mcpd daemon.

SyntaxUse this command to set the system log levels for the mcpd daemon.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

daemon mcpd [{] <daemon mcpd arg list> [}]

<daemon mcpd arg> ::=

audit (enable | disable | verbose | all)

loglevel (panic | emergency | alert | critical | error | warning | notice | \ informational | debug)

Displaydaemon mcpd [show [all]]

daemon mcpd list [all]

daemon mcpd audit [show]

daemon mcpd loglevel [show]

DescriptionYou use this command to enable auditing and to set the system log levels for the mcpd daemon.

ExamplesThe following command sets the log level of the mcpd daemon to critical. This means that the system logs critical, alert, emergency and panic messages from the daemon.

daemon mcpd loglevel critical

Bigpipe Utility Reference Guide 3 - 49

Page 86: BIG IP Reference

Chapter 3

OptionsYou can use these options with the daemon mcpd command:

◆ auditEnables or disables auditing for the mcpd daemon, and specifies verbose or all as the auditing level. The default value is disable.

◆ loglevelSpecifies the lowest level of mcp daemon messages to include in the system log. The default value is notice.

◆ partitionDisplays the partition within which the mcpd daemon resides.

See alsobigpipe(1), daemon(1), daemon tmm(1)

3 - 50

Page 87: BIG IP Reference

Bigpipe Utility Command Reference

daemon tmmSets internal settings for the tmm daemon.

SyntaxUse this command to set the system log levels for the tmm daemon.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

daemon tmm [{] <daemon tmm arg list> [}]

<daemon tmm arg> ::=

arp loglevel (error | warning | notice | informational | debug)

http compression loglevel (error | warning | notice | informational | debug)

http loglevel (error | warning | notice | informational | debug)

ip loglevel (warning | notice | informational | debug)

layer4 loglevel (notice | informational | debug)

net loglevel (critical | error | warning | notice | informational | debug)

os loglevel (emergency | alert | critical | error | warning | notice | \ informational | debug)

pva loglevel (debug | informational | notice)

rules loglevel (error | warning | notice | informational | debug)

ssl loglevel (emergency | alert | critical | error | warning | notice | \ informational | debug)

Displaydaemon tmm [show [all]]

daemon tmm list [all]

daemon tmm arp loglevel [show]

daemon tmm http compression loglevel [show]

daemon tmm http loglevel [show]

daemon tmm ip loglevel [show]

daemon tmm layer4 loglevel [show]

daemon tmm net loglevel [show]

Bigpipe Utility Reference Guide 3 - 51

Page 88: BIG IP Reference

Chapter 3

daemon tmm os loglevel [show]

daemon tmm pva loglevel [show]

daemon tmm rules loglevel [show]

daemon tmm ssl loglevel [show]

DescriptionYou use this command to set the system log levels for the tmm daemon.

ExamplesThe following command sets the ARP message log level for the tmm daemon to error. This means that the system logs only ARP error messages from the daemon.

daemon tmm arp loglevel error

OptionsYou can use these options with the daemon tmm command:

◆ arp loglevelSpecifies the lowest level of ARP messages from the tmm daemon to include in the system log. The default value is warning.

◆ http loglevelSpecifies the lowest level of HTTP messages from the tmm daemon to include in the system log. The default value is error.

◆ http compression loglevelSpecifies the lowest level of HTTP compression messages from the tmm daemon to include in the system log. The default value is error.

◆ ip loglevelSpecifies the lowest level of IP address messages from the tmm daemon to include in the system log. The default value is warning.

◆ layer4 loglevelSpecifies the lowest level of Layer 4 messages from the tmm daemon to include in the system log. The default value is notice.

◆ net loglevelSpecifies the lowest level of network messages from the tmm daemon to include in the system log. The default value is warning.

◆ os loglevelSpecifies the lowest level of operating system messages from the tmm daemon to include in the system log. The default value is notice.

◆ partitionDisplays the partition within which the tmm daemon resides.

◆ pva loglevelSpecifies the lowest level of PVA messages from the tmm daemon to include in the system log. The default value is informational.

3 - 52

Page 89: BIG IP Reference

Bigpipe Utility Command Reference

◆ rules loglevelSpecifies the lowest level of iRule messages from the tmm daemon to include in the system log. The default value is warning.

◆ ssl loglevelSpecifies the lowest level of SSL messages from the tmm daemon to include in the system log. The default value is warning.

See alsobigpipe(1), daemon(1), daemon mcpd(1)

Bigpipe Utility Reference Guide 3 - 53

Page 90: BIG IP Reference

Chapter 3

dbDisplays or modifies bigdb database entries.

SyntaxUse this command to modify or display configuration database entries.

Modifydb (<db key> | all) [{] <db arg list> [}]

<db key> ::=

<name>

<db arg> ::=

name <name>

<string>

Displaydb [<db key> | all] [show [all]]

db [<db key> | all] list [all]

db (<db key> | all) reset

db (<db key> | all) name [show]

db (<db key> | all) value [show]

DescriptionThe db command enables you to modify and retrieve the data that is stored in the bigdb configuration database.

Important

After you change a bigdb database variable using the db command, you must run the save all command. If you do not, the next time that you run the load command, the value of the bigdb database variable may be reset to the value in the stored configuration.

ExamplesResets each database entry and setting to its default:

db all reset

Sets the database entry, SYN Check™ Activation Threshold, back to the default value:

db Connection.SynCookies.Threshold 16384

3 - 54

Page 91: BIG IP Reference

Bigpipe Utility Command Reference

OptionsUse these options with the db command:

◆ nameThe name of the database entry that you want to modify or display.

◆ valueThe value that you want to assign to the database entry that you are modifying. When you are modifying a configuration database entry, this value is required.

See alsobigpipe(1)

Bigpipe Utility Reference Guide 3 - 55

Page 92: BIG IP Reference

Chapter 3

dnsConfigures the Domain Name Service (DNS) for the BIG-IP system. Also, displays and resets statistics for the DNS profile.

SyntaxUse this command to configure DNS for the system.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

dns [{] <dns arg list> [}]

<dns arg> ::=

include (<string> | none)

nameservers (<ip addr list> | none) [add | delete]

search (<string list> | none) [add | delete]

Displaydns [show [all]]

dns list [all]

dns include [show]

dns nameservers [show]

dns search [show]

DescriptionYou can use this command to manage configurations by server grouping, in this case, DNS servers.

ExamplesThe following commands display the global statistics for the DNS profile:

dns

dns show

Adds DNS name servers with the IP addresses, 192.168.10.20 and 192.168.10.22, to the BIG-IP system:

dns nameservers 192.168.10.20 192.168.10.22 add

3 - 56

Page 93: BIG IP Reference

Bigpipe Utility Command Reference

The following command syntax adds the host names, siterequest.com, store.siterequest.com, and london.siterequest.com, to the DNS search configuration for the BIG-IP system. When DNS searches for the host, siterequest, which is not a fully qualified domain name, it uses the IP address of the first match, in this case, siterequest.com.

dns search siterequest.com store.siterequest.com \ london.siterequest.com

OptionsUse these options with the dns command:

◆ include

Warning: Do not use this parameter without assistance from the F5 Technical Support team. The system does not validate the commands issued using the include parameter. If you use this parameter incorrectly, you put the functionality of the system at risk.

◆ nameserversAdds a group of DNS name servers to or deletes a group of DNS name servers from the BIG-IP system.

◆ partitionDisplays the partition within which the dns object resides.

◆ searchAdds a list of domain names in a specific order. DNS uses that order when searching for host names that are not fully qualified. You can also use this option to delete domain names in the list.

See alsobigpipe(1), profile dns(1)

Bigpipe Utility Reference Guide 3 - 57

Page 94: BIG IP Reference

Chapter 3

exitExits the bigpipe shell.

SyntaxUse this command to exit the bigpipe shell.

Usageexit

DescriptionYou can use this command at the bigpipe shell prompt to exit the shell and return to the BIG-IP system prompt.

ExamplesWhen you are finished running commands at the bigpipe shell prompt, type exit to exit the shell and return to the system prompt:

exit

See alsobigpipe(1)

3 - 58

Page 95: BIG IP Reference

Bigpipe Utility Command Reference

exportCreates a single configuration file (SCF) that you can use to configure another BIG-IP system using the import command.

Important

The export command is independent of and distinct from the save all command. For more information on the save all command, see save, on page 3-275.

SyntaxUse this command to create a single configuration file (SCF).

Create/Modifyexport [oneline] [<file name> | -]

DescriptionYou use the export command to save the running configuration in a flat, text file with the extension .scf.

ExamplesCreates the SCF, myconfiguration.scf, which contains the running configuration of the system:

export myconfiguration

Note

The system appends the specified file name with the extension .scf.

Creates the SCF, default.scf, which contains the running configuration of the system:

export /shared/default

WARNING

You cannot use the export command to create an SCF file named default, unless you explicitly include a path name to the file, as shown in the example above.

Bigpipe Utility Reference Guide 3 - 59

Page 96: BIG IP Reference

Chapter 3

OptionsUse these options with the export command:

◆ onelineSpecifies that each command in the file is written on one line without line feeds, and that there is one line feed after each command. This parameter can create very long lines of text. Note that if you do not use this parameter, each command is written with line feeds between the attributes and values for readability.

◆ <file name>Specifies the name of the SCF you are creating. The system appends this name with the extension .scf.

See alsobigpipe(1), import(1)

3 - 60

Page 97: BIG IP Reference

Bigpipe Utility Command Reference

f5adduserAdds local user accounts to the BIG-IP system.

SyntaxUse this command at the BIG-IP system prompt to add one or more local users.

Createf5adduser [-r <role name>|<role number>] [-n] [-s] -p <partition name> <username> ...

DescriptionYou can use this command at the BIG-IP system prompt to add one or more local users.

ExamplesAdds a user account with the user role of Manager and access to all partitions for Jim Smith:

f5adduser -r manager jsmith

OptionsYou can use these options with the f5adduser command at the BIG-IP system prompt:

◆ -rSpecifies the user role you are assigning to the user. The default user role is guest. The available user roles are:

• administrator

• resource admin

• user manager

• manager

• app editor

• operator

• guest

• policy editor

• none (no access)

◆ -nIndicates no password for the user account. If you indicate no password, the user cannot log on until an Administrator creates a password for the account. If you do not use this option, the system prompts you to enter a password, and then to confirm that password.

Bigpipe Utility Reference Guide 3 - 61

Page 98: BIG IP Reference

Chapter 3

◆ -s If you are creating a user account with the user role of administrator, the user is given access to the system prompt. If you are creating a user account with a user role other than administrator, the user is given access to the bigpipe shell.

◆ -p Specify a partition name. If you do not specify a partition, the user account is valid in all partitions.

See alsouser(1)

3 - 62

Page 99: BIG IP Reference

Bigpipe Utility Command Reference

failoverConfigures and controls failover for a redundant system configuration.

SyntaxUse this command to control the failover of a system and configure the failover feature for the system.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

Use this syntax to configure the failover feature for a system:

failover [{] <failover arg list> [}]

<failover arg> ::=

active-active mode (enable | disable)

force active (enable | disable)

force standby (enable | disable)

multicast peer (<multicast peer list> | none) [add | delete]

network failover (enable | disable)

peer mgmt addr (<ip addr> | none)

redundant (enable | disable)

standby link down time <float>

unicast peer (<unicast peer list> | none) [add | delete]

unit <number>

<multicast peer> ::= (<multicast peer key> | all) [{] <multicast peer arg list> [}]

<multicast peer key> ::=

<name>

<multicast peer arg> ::=

addr (<ip addr> | none)

interface (<string> | none)

name <name>

port <number>

<unicast peer> ::= (<unicast peer key> | all) [{] <unicast peer arg list> [}]

<unicast peer key> ::=

<name>

Bigpipe Utility Reference Guide 3 - 63

Page 100: BIG IP Reference

Chapter 3

<unicast peer arg> ::=

dest addr (<ip addr> | none)

name <name>

port <number>

source addr (<ip addr> | none)

Use this syntax to control failover of a system:

failover (standby | failback | offline | online)

Displayfailover [show [all]]

failover list [all]

failover active-active mode [show]

failover force active [show]

failover force standby [show]

failover multicast peer [<multicast peer key> | all] [show [all]]

failover multicast peer [<multicast peer key> | all] list [all]

failover multicast peer (<multicast peer key> | all) addr [show]

failover multicast peer (<multicast peer key> | all) interface [show]

failover multicast peer (<multicast peer key> | all) name [show]

failover multicast peer (<multicast peer key> | all) port [show]

failover network failover [show]

failover peer mgmt addr [show]

failover redundant [show]

failover standby link down time [show]

failover unicast peer [<unicast peer key> | all] [show [all]]

failover unicast peer [<unicast peer key> | all] list [all]

failover unicast peer (<unicast peer key> | all) dest addr [show]

failover unicast peer (<unicast peer key> | all) name [show]

failover unicast peer (<unicast peer key> | all) port [show]

failover unicast peer (<unicast peer key> | all) source addr [show]

failover unit [show]

Deletefailover multicast cluster peer (<multicast cluster peer list> | none) delete

failover unicast cluster peer (<unicast cluster peer list> | none) delete

DescriptionFailover is a process that occurs when one unit in a redundant system configuration becomes unavailable, thereby requiring the peer unit to assume the processing of traffic originally targeted for the unavailable unit. To facilitate coordination of the failover process, each unit has a unit ID (1 or 2).

3 - 64

Page 101: BIG IP Reference

Bigpipe Utility Command Reference

You can use the failover command to switch the active unit to be the standby unit in a redundant configuration. Be careful about using the failover command to control the unit. It is provided only for special situations. The unit automatically switches between active and standby modes, without operator intervention.

ExamplesCauses the active unit to go into the standby state, forcing the other unit in the redundant system configuration to become active:

failover standby

Restores an active-active configuration after a failure:

failover failback

OptionsUse these options to control failover of the system:

◆ failbackInitiates failback for an active-active system. Failback re-establishes normal BIG-IP system processing when a previously-unavailable BIG-IP system becomes available again.

◆ offlineChanges the status of a unit to Forced Offline.

◆ onlineChanges the status of a unit from Forced Offline to either Active or Standby, depending upon the status of the other unit in a redundant system configuration.

◆ standbySpecifies that the active unit fails over to a standby state, causing the standby unit to become active.

Use these options to configure failover for the system:

◆ active-active modeEnables or disables active mode for a unit in a redundant system configuration. The default value is disable.

◆ force activeWhen enabled, makes the unit prefer to be the active unit. The default value is disable.

◆ force standbyWhen enabled, makes the unit prefer to be the standby unit. The default value is disable.

Bigpipe Utility Reference Guide 3 - 65

Page 102: BIG IP Reference

Chapter 3

◆ multicast peerAdds a multicast peer or deletes a multicast peer from the specified unit for failover purposes. When you add a multicast peer you include the following options:

• addr

• interface

• name

• port

◆ network failoverSpecifies, when enabled, that this unit utilizes the network to determine the status of the peer unit. You can use network failover in addition to, or instead of, hard-wire failover. The default value is disable.

◆ partitionDisplays the partition within which the failover object resides.

◆ peer mgmt addrSpecifies the floating management IP address of the peer unit.

◆ redundantEnables or disables redundancy for a unit in a redundant system configuration. The default value is disable.

◆ standby link down timeSpecifies the amount of time, within the valid range of 0 - 10 seconds, that the interfaces are down before the unit fails over to standby. Use this setting to prompt peer switches to reset and relearn their Address Resolution Protocol (ARP) tables after a failover. The default value is 0 (zero) seconds, which disables this option.

When using network failover, do not enable this feature unless you configure the custom addr and custom peer addr settings to use the management port.

◆ unicast peerAdds a unicast peer or deletes a unicast peer from the specified unit for failover purposes. When you add a unicast peer you include the following options:

• dest addr

• name

• port

• source addr

◆ unitSpecifies a number for a unit in a BIG-IP redundant system configuration. The default value is 1.

See alsobigpipe(1), statemirror(1)

3 - 66

Page 103: BIG IP Reference

Bigpipe Utility Command Reference

fasthttpDisplays and resets global statistics for the Fast HTTP profile on the BIG-IP system.

SyntaxUse this command to display and reset statistics for the Fast HTTP profile.

Modifyfasthttp stats reset

Displayfasthttp [show [all]]

DescriptionYou can use this command to display and reset global statistics for the Fast HTTP profile.

ExamplesThe following commands display the global statistics for the Fast HTTP profile:

fasthttp

fasthttp show

Resets all statistics for the Fast HTTP profile on the system:

fasthttp stats reset

See alsoprofile fasthttp (1)

Bigpipe Utility Reference Guide 3 - 67

Page 104: BIG IP Reference

Chapter 3

fastL4Displays and resets statistics for the Fast Layer 4 profile on the BIG-IP system.

SyntaxUse this command to display and reset statistics for the Fast Layer 4 profile.

Modifyfastl4 stats reset

Displayfastl4 [show [all]]

DescriptionDisplay detailed Fast Layer 4 profile statistics. These statistics include connectivity statistics, errors generated, and SYN cookies used.

ExamplesThe following commands display statistics for the Fast Layer 4 profile:

fastl4

fastl4 show

Resets all statistics for the Fast Layer 4 profile on the system:

fastl4 stats reset

See alsoprofile fastl4 (1)

3 - 68

Page 105: BIG IP Reference

Bigpipe Utility Command Reference

fipscardsyncSynchronizes the FIPS hardware security modules (HSMs) of a redundant system configuration.

SyntaxUse this command at the BIG-IP system prompt to synchronize the FIPS HSMs of a redundant system configuration.

Modifyfipscardsync peer

DescriptionSynchronizes the FIPS hardware security modules (HSMs) of a redundant system configuration. Note that synchronizing the HSMs provides the ability to exchange keys between the units of a redundant system configuration.

ExamplesRun this command at the console of the active unit to synchronize the FIPS HSMs of a redundant system configuration:

fipscardsync peer

See alsofipsutil(1)

Bigpipe Utility Reference Guide 3 - 69

Page 106: BIG IP Reference

Chapter 3

fipsutilConfigures and maintains a FIPS security domain on a BIG-IP redundant system configuration.

SyntaxUse this command at the console to configure and maintain a FIPS security domain for a BIG-IP redundant system configuration.

Modifyfipsutil [flags] <action>

[flags] ::=

-d

-f

-v

<action> ::=

clean

crash

dump

fwcheck

fwupdate

genpbekey

init

labelcheck

monitor

login

logout

postfwupdate

reset

scupdate

test

DescriptionYou can use this command to initialize the FIPS hardware security module (HSM), and to create a security officer (SO) password and a security domain name on the active unit of a BIG-IP redundant system configuration. After you do this on the active unit, use the same security domain name and SO password to initialize and configure the other unit of the redundant system configuration.

3 - 70

Page 107: BIG IP Reference

Bigpipe Utility Command Reference

ExamplesInitializes the HSM, prompts you to create an SO password, and then prompts you to create a security domain name:

fipsutil -f init

OptionsYou can use these options with the fipsutil command:

◆ flagsThe flags include:

• -dIndicates to use the default SO Password. You are not prompted to create a password.

• -fRe-initializes the Nitrox FIPS board (NFB) or installs older firmware.

• -vDisplays verbose information about the FIPS security domain.

◆ actionsThe actions include:

• cleanDo not use this parameter without assistance from the F5 Technical Support team.

• crashDo not use this parameter without assistance from the F5 Technical Support team.

• dump Do not use this parameter without assistance from the F5 Technical Support team.

• fwcheckChecks for available NFB firmware updates.

• fwupdateUpdates NFB firmware, if necessary.

• genpbekeyThis option is not used.

• initInitializes and logs you in to the NFB, and sets the security domain name.

• labelcheckChecks to see if the FIPS card is set to the default.

• loginDo not use this parameter without assistance from the F5 Technical Support team.

• logoutDo not use this parameter without assistance from the F5 Technical Support team.

Bigpipe Utility Reference Guide 3 - 71

Page 108: BIG IP Reference

Chapter 3

• monitorDo not use this parameter without assistance from the F5 Technical Support team.

• postfwupdateDo not use this parameter without assistance from the F5 Technical Support team.

• reset Do not use this parameter without assistance from the F5 Technical Support team.

• scupdateDo not use this parameter without assistance from the F5 Technical Support team.

• testDo not use this parameter without assistance from the F5 Technical Support team.

See alsofipscardsync(1)

3 - 72

Page 109: BIG IP Reference

Bigpipe Utility Command Reference

ftpDisplays and resets global statistics for the FTP profile on the BIG-IP system.

SyntaxUse this command to display and reset the statistics for the FTP profile.

Modifyftp stats reset

Displayftp [show [all]]

DescriptionYou can use the ftp command to display and reset global statistics for the FTP profile.

ExamplesThe following commands display the global statistics for the FTP profile:

ftp

ftp show

Resets all statistics for the FTP profile on the system:

ftp stats reset

See alsoprofile ftp (1)

Bigpipe Utility Reference Guide 3 - 73

Page 110: BIG IP Reference

Chapter 3

globalDisplays and resets global statistics for the BIG-IP system.

SyntaxUse this command to display or reset global statistics for the system.

Displayglobal [show [all]]

Deleteglobal stats reset

DescriptionDisplay and reset global system statistics. These statistics include client side, server side, PVA connections, TMM cycles, denials, CPU usage, memory, packets, authorization, and OneConnect™ information.

ExamplesDisplays all global statistics:

global stats show

Resets all global statistics:

global stats reset

See alsobigpipe(1)

3 - 74

Page 111: BIG IP Reference

Bigpipe Utility Command Reference

ha tableDisplays the settings for high availability on a system.

SyntaxUse this command to display high availability settings.

Display<ha table key> ::=

[peer] [failures]

ha table [<ha table key> | all] [show [all]]

ha table (<ha table key> | all) failures [show]

ha table (<ha table key> | all) peer [show]

DescriptionDisplays high availability settings for the system. These settings include daemon settings and failover settings.

ExamplesDisplays all peer settings:

ha table peer

Displays all daemon and failover settings:

ha table show

Columns The HA table consists of several columns including Feature, Key, Action, En, Act, Proc, Time, and Data.

◆ FeatureDisplays the high availability feature.

◆ KeyDisplays the specific instance of the feature, for example which daemon's heartbeat is represented.

◆ ActionDisplays the action that should be taken when the Act (take action) column is yes.

◆ EnIndicates whether the feature is enabled.

Bigpipe Utility Reference Guide 3 - 75

Page 112: BIG IP Reference

Chapter 3

◆ ActIndicates that you should take action. For example, if the VLAN fail-safe functionality determined that the VLAN had failed, it would set this setting to yes which would cause the daemon to reboot the BIG-IP system.

◆ ProcIndicates the process that is exclusively responsible for creating and writing to this row in the HA table.

◆ TimeThe meaning of this column varies depending on the feature associated with it. Typically, this value is a timeout value. For example, the sod daemon heartbeat time is set to 20 (seconds). That means that if sod does not increment its heartbeat in 20 seconds, the BIG-IP system reboots.

◆ DataThe meaning of this column also varies depending on the feature. For daemon heartbeats, for example, this value shows the daemon incrementing the value of its heartbeat.

OptionsYou can use these options with the ha table command:

◆ failuresDisplays information about system failures only.

◆ peerDisplays the IP address for the system to use as an alternate for mirroring connections.

See alsodaemon(1), bigpipe(1)

3 - 76

Page 113: BIG IP Reference

Bigpipe Utility Command Reference

hardwareDisplays information about the system hardware.

SyntaxUse this command to display the baud rate of the system hardware.

Displayhardware [{] <hardware arg list> [}]

<hardware arg> ::=

baud rate <number>

hardware [show [all]]

DescriptionYou can use the hardware command to display the baud rate of the system hardware.

ExamplesThe following three commands display the baud rate of the system hardware:

hardware

hardware show

hardware baud rate

See alsobigpipe(1)

Bigpipe Utility Reference Guide 3 - 77

Page 114: BIG IP Reference

Chapter 3

helpDisplays online help for bigpipe command syntax.

SyntaxUse this command to display the man page for a bigpipe command.

Display<command> help

DescriptionYou can use this command to access the man page for the specified command.

ExamplesDisplays the man page for the specified command:

vlan help

See alsobigpipe(1)

3 - 78

Page 115: BIG IP Reference

Bigpipe Utility Command Reference

httpDisplays or resets HTTP statistics on the BIG-IP system.

SyntaxUse this command to display or reset HTTP statistics.

Modifyhttp stats reset

Displayhttp [show [all]]

DescriptionDisplay and reset HTTP statistics. The statistics you can view are standard HTTP statistics, including requests, responses, Set-Cookie header insertions, and OneConnect idle connections.

You can also view compression statistics (in bytes), such as the following: total, image, HTML, JS, XML, SGML, plain text, video, audio, and octet.

Tip

In the Compression Statistics, total bytes section of the http command output, saved indicates the ratio between the amount of content before compression and the amount of content after compression. null indicates content that is wrapped in compression headers, but is not compressed. The system wraps content in compression headers, but does not compress it when one of two situations occurs. Either the system exceeds the amount of compression (in megabytes) for which it is licensed, or the CPU saver is active. For more information about the CPU saver setting, see profile http, on page 3-197.

ExamplesDisplays all HTTP statistics including compression statistics:

http show all

Resets all HTTP statistics to zero:

http stats reset

See alsoprofile http(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 79

Page 116: BIG IP Reference

Chapter 3

httpdConfigures the HTTP daemon for the BIG-IP system.

SyntaxUse this command to configure the HTTP daemon for the system.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

httpd [{] <httpd arg list> [}]

<httpd arg> ::=

allow (<string list> | none) [add | delete]

authname (<string> | none)

authpamidletimeout <number>

fastcgitimeout <number>

hostnamelookups (On | Off | Double)

include (<string> | none)

loglevel (debug | info | notice | warn | error | \ crit | alert | emerg)

ssl include (<string> | none)

sslcertchainfile (<string> | none)

sslcertfile (<string> | none)

sslcertkeyfile (<string> | none)

sslciphersuite (<string> | none)

Displayhttpd [show [all]]

httpd list [all]

httpd allow [show]

httpd authname [show]

httpd authpamidletimeout [show]

httpd fastcgitimeout [show]

httpd hostnamelookups [show]

httpd include [show]

httpd loglevel [show]

3 - 80

Page 117: BIG IP Reference

Bigpipe Utility Command Reference

httpd ssl include [show]

httpd sslcertchainfile [show]

httpd sslcertfile [show]

httpd sslcertkeyfile [show]

httpd sslciphersuite [show]

DescriptionYou configure the HTTP daemon for the system using the httpd command.

Important

F5 recommends that users of the Configuration utility exit the utility before changes are made to the system using the httpd command. This is because making changes to the system using the httpd command causes a restart of the HTTP daemon. Likewise, restarting the HTTP daemon creates the necessity for a restart of the Configuration utility.

ExamplesWhen you change the SSL key, you must also change the SSL certificate. You change the certificate/key pair using following command:

httpd { sslcertfile <string> sslcertkeyfile <string> }

Sets the pluggable authentication module (PAM) cache timeout to half a day (in seconds):

httpd authpamcachetimeout 43200

Creates the SSL certificate file, mycert.crt, for the system:

sslcertfile /etc/httpd/conf/ssl.crt/mycert.crt

Replaces the existing list of hosts that can connect to the HTTP daemon with the hosts in the range, 172.27.0.0/255.255.0.0:

httpd allow 172.27.0.0/255.255.0.0

OptionsYou can use these options with the httpd command.

◆ allowAdds or deletes IP addresses, partial IP addresses, and IP address ranges, host names, partial host names, domain names, partial domain names, and network and netmask pairs for the HTTP clients from which the HTTP daemon accepts request. The default value is all.

Warning: Using the value none resets the HTTP daemon to allow all HTTP clients access to the system. F5 recommends that you do not use the value none with the httpd command.

◆ authnameSpecifies the name for the authentication realm. The default value is BIG-IP.

Bigpipe Utility Reference Guide 3 - 81

Page 118: BIG IP Reference

Chapter 3

◆ authpamidletimeoutSpecifies, in seconds, the timeout for PAM. The default value is 1200 seconds.

◆ fastcgitimeoutSpecifies, in seconds, the timeout for FastCGI.

◆ hostnamelookupsThe default value is Off.

◆ include

Warning: Do not use this parameter without assistance from the F5 Technical Support team. The system does not validate the commands issued using the include parameter. If you use this parameter incorrectly, you put the functionality of the system at risk.

◆ loglevelSpecifies the minimum httpd message level to include in the system log. The default value is warn.

◆ partitionDisplays the partition within which the HTTP daemon resides.

◆ sslcertchainfileSpecifies the name of the file that contains the SSL certificate chain. The default value is none.

◆ sslcertfileSpecifies the name of the file that contains the SSL certificate. The default value is /etc/httpd/conf/ssl.crt/server.crt.

Note that the path to the file must start with /etc/httpd/conf/ssl.crt/ or /config/httpd/conf/ssl.crt/ unless the path is a relative path. If the path is a relative path, then it must start with conf/ssl.crt/.

◆ sslcertkeyfileSpecifies the name of the file that contains the SSL certificate key. The default value is /etc/httpd/conf/ssl.key/server.key.

Note that the path to the file must start with /etc/httpd/conf/ssl.key/ or /config/httpd/conf/ssl.key/ unless the path is a relative path. If the path is a relative path, then it must start with conf/ssl.key/.

When you change the key file, you must also change the certificate file. In other words, the following command does not work to change the key: httpd sslcertkeyfile <string>. Instead, you must use the following command:

{ httpd sslcertfile <string> sslcerkeyfile <string> }

◆ sslciphersuiteSpecifies the ciphers that the system uses.

◆ ssl include

Warning: Do not use this parameter without assistance from the F5 Technical Support team. The system does not validate the commands issued using the include parameter. If you use this parameter incorrectly, you put the functionality of the system at risk.

3 - 82

Page 119: BIG IP Reference

Bigpipe Utility Command Reference

See alsobigpipe(1), ntp(1), dns(1), sshd(1), snmpd(1)

Bigpipe Utility Reference Guide 3 - 83

Page 120: BIG IP Reference

Chapter 3

icmpDisplays and resets ICMP statistics.

SyntaxUse this command to display or reset ICMP statistics.

Modifyicmp stats reset

Displayicmp [show [all]]]

DescriptionDisplay and reset ICMP statistics. The statistics you can view are standard ICMP statics, including ICMPv4 packets and errors, and ICMPv6 packets and errors.

ExamplesDisplays all ICMP statics including compression statistics:

icmp show all

Resets all ICMP statistics to zero:

icmp stats reset

See alsomonitor(1), bigpipe(1)

3 - 84

Page 121: BIG IP Reference

Bigpipe Utility Command Reference

importSaves a backup of the running configuration in the /var/local/scf/ directory, and then replaces the running configuration with the configuration contained in the single configuration file (SCF) that you are importing.

SyntaxUse this command to replace the running configuration of the system with the values contained in the SCF that you are importing. If you want to write the new running configuration to the stored configuration files, after you run the import command, you must run the save all command.

If you want to modify the running configuration of the BIG-IP system, rather than replace it, you must use the merge command. For more information, see the man page for the merge command.

Create/Modifyimport [<file> | default | -]

DescriptionYou import an SCF that was exported from another BIG-IP system after you edit the file to work on the system to which you are importing it.

ExamplesLoads the SCF, myconfiguration.scf, on the system:

import myconfiguration.scf

Resets the running configuration to the factory defaults; however, this does not reset the management IP address or the management default route:

import default

OptionsYou can use these options with the import command.

◆ - <contents of SCF>Use this option to replace the running configuration of the system using the data in an SCF. First copy the contents of an SCF. Then type import - and press the Enter key. The system responds with a Reading... message. When the system finishes responding, on the command line, paste the contents of the SCF that you copied, and then type Ctrl-D. After the command sequence runs, the system has replaced the running configuration. If you want to save the running configuration to the stored configuration files, run the save all command.

Warning: F5 recommends that you do not use this option to import an SCF. Instead, you should use the <file> option.

Bigpipe Utility Reference Guide 3 - 85

Page 122: BIG IP Reference

Chapter 3

◆ <file>Specifies the name of the SCF that you want to import.

◆ defaultResets the running configuration of the system to the factory defaults. However, note that this option does not change the management port networking information.

See alsobigpipe(1), export(1)

3 - 86

Page 123: BIG IP Reference

Bigpipe Utility Command Reference

interfaceConfigures the parameters of interfaces.

SyntaxUse this command to modify or display interface settings.

Modifyinterface <interface key> {}

interface (<interface key> | all) [{] <interface arg list> [}]

<interface key> ::=

<if name>

<interface arg> ::=

auto edge (enable | disable)

edge port (false | true)

(enable | disable)

link type (p2p | shared | auto)

media (auto | 10baseT half | 10baseT full | 100baseTX half | 100baseTX full | \ 1000baseT half | 1000baseT full | 1000baseSX full | 1000baseLX full | \ 10GbaseT full | 10GbaseSR full | 10GbaseLR full | 10GbaseER full)

media fixed (auto | 10baseT half | 10baseT full | 100baseTX half | \ 100baseTX full | 1000baseT half | 1000baseT full | 1000baseSX full | \ 1000baseLX full | 10GbaseT full | 10GbaseSR full | 10GbaseLR full | \ 10GbaseER full)

media sfp (auto | 10baseT half | 10baseT full | 100baseTX half | \ 100baseTX full | 1000baseT half | 1000baseT full | 1000baseSX full | \ 1000baseLX full | 10GbaseT full | 10GbaseSR full | 10GbaseLR full | \ 10GbaseER full)

name <if name>

pause (none | tx rx | rx tx | tx | rx)

prefer (fixed | sfp)

stp (enable | disable)

stp reset

interface (<interface key> | all) stats reset

Displayinterface [<interface key> | all] [show [all]]

interface [<interface key> | all] list [all]

interface (<interface key> | all) auto edge [show]

interface (<interface key> | all) edge port [show]

interface (<interface key> | all) enabled [show]

interface (<interface key> | all) errors [show]

interface (<interface key> | all) link type [show]

interface (<interface key> | all) mac addr [show]

interface (<interface key> | all) media [show]

Bigpipe Utility Reference Guide 3 - 87

Page 124: BIG IP Reference

Chapter 3

interface (<interface key> | all) media duplex [show]

interface (<interface key> | all) media fixed [show]

interface (<interface key> | all) media options [show]

interface (<interface key> | all) media options sfp [show]

interface (<interface key> | all) media sfp [show]

interface (<interface key> | all) media speed [show]

interface (<interface key> | all) name [show]

interface (<interface key> | all) pause [show]

interface (<interface key> | all) pending [show]

interface (<interface key> | all) prefer [show]

interface (<interface key> | all) stats [show]

interface (<interface key> | all) stp [show]

interface (<interface key> | all) trunk [show]

interface (<interface key> | all) vendor [show]

DescriptionThis command displays and sets media options, duplex mode, and status for an interface. In addition, this command provides the ability to set per-interface spanning tree parameters such as link type, edge port status, automatic edge port detection, and also whether the interface participates in the spanning tree configuration.

ExamplesEnables the interface named 1.1:

interface 1.1 enable

Disables the interface named 1.1:

interface 1.1 disable

Disables STP on the interface named 1.3:

interface 1.3 stp disable

Enables auto edge detection for STP on the interface named 1.3:

interface 1.3 auto edge enable

Sets the edge port attribute for STP on the interface named 1.3:

interface 1.3 edge port true

OptionsYou can use these options with the interface command:

◆ auto edgeWhen automatic edge port detection is enabled on an interface, the system monitors the interface for incoming STP, RSTP, or MSTP packets. If no such packets are received for a sufficient period of time (about three seconds), the interface is automatically given edge port

3 - 88

Page 125: BIG IP Reference

Bigpipe Utility Command Reference

status. When automatic edge port detection is disabled on an interface, the system never gives the interface edge port status automatically. By default, automatic edge port detection is enabled on all interfaces. Any STP setting set on a per-interface basis applies to all spanning tree instances. The default value is enable.

◆ edge portPossible values are true and false. The default value is true.

◆ enable | disableEnables or disables the specified interface.

◆ errorsDisplays the error statistics for an interface.

◆ <interface key>Specifies an interface key.

◆ <if name>Specifies an interface name, for example 3.1, where 3 is the physical slot number holding the network interface hardware and 1 is the physical port number of that interface on that hardware. Another example is mgmt, the name given to the management interface.

◆ link typeThe spanning tree system includes important optimizations that can be used only on point-to-point links. That is, on links which connect just two bridges. If these optimizations are used on shared links, incorrect or unstable behavior may result. By default, the implementation assumes that full-duplex links are point-to-point and that half-duplex links are shared. Possible values are p2p, shared, and auto. The default value is auto.

◆ mac addrDisplays the media access control (MAC) address for the interface.

◆ mediaSpecifies a media type for the specified interface. The options are: auto, 10baseT half, 10baseT full, 100baseTX half, 100baseTX full, 1000baseT half, 1000baseT full, 1000baseSX full, 1000baseLX full, 10GbaseT full, 10GbaseSR full, 10GbaseLR full, and 10GbaseER full. Note that you use this option only with a non-combo port.

◆ media duplexDisplays the duplex type for the interface. This information comes from the interface driver.

◆ media fixedSpecifies a media type for the specified interface. The options are: auto, 10baseT half, 10baseT full, 100baseTX half, 100baseTX full, 1000baseT half, 1000baseT full, 1000baseSX full, 1000baseLX full, 10GbaseT full, 10GbaseSR full, 10GbaseLR full, and 10GbaseER full. Note that you use this option only with a combo port to specify the media type for the fixed interface.

◆ media optionsDisplays all media types that are available for the specified interface.

Bigpipe Utility Reference Guide 3 - 89

Page 126: BIG IP Reference

Chapter 3

◆ media options sfpDisplays all media types that are available for the specified SFP interface.

◆ media sfpSpecifies a media type for the specified interface. The options are: auto, 10baseT half, 10baseT full, 100baseTX half, 100baseTX full, 1000baseT half, 1000baseT full, 1000baseSX full, 1000baseLX full, 10GbaseT full, 10GbaseSR full, 10GbaseLR full, and 10GbaseER full. Note that you use this option only with a combo port to specify the media type for the SFP interface.

◆ pausePossible values are rx, rx tx, tx, tx rx, and none. The default value is tx rx.

◆ preferIndicates which side of a combo port the interface uses. The options are fixed and SFP. The default value is fixed.

If you use the prefer option, use the media option to specify a media type for the interface. Note that for an SFP-only interface, the prefer option is ignored and you must use either the media or media sfp option to set the media type for the interface.

◆ stpEnables or disables STP. If you disable STP, no STP, RSTP, or MSTP packets are transmitted or received on the interface or trunk, and spanning tree has no control over forwarding or learning on the port or the trunk. The default value is enable.

◆ stp resetResets STP.

◆ trunkDisplays, if the interface is a member, the name of the trunk with which the interface is associated.

See alsomirror(1), stp(1), vlan(1), vlangroup(1), bigpipe(1)

3 - 90

Page 127: BIG IP Reference

Bigpipe Utility Command Reference

ipManages IP statistics on the BIG-IP system.

SyntaxUse this command to display or delete IP statistics on the BIG-IP system.

Displayip [show [all]]

Deleteip stats reset

DescriptionDisplay and reset IP statistics. The statistics you can view are standard IP statistics, including IPv4 and IPv6 packets, fragments, fragments reassembled, and errors.

ExamplesDisplays all IP statistics for the system:

ip show all

Resets all IP statistics to zero:

ip stats reset

See alsobigpipe(1)

Bigpipe Utility Reference Guide 3 - 91

Page 128: BIG IP Reference

Chapter 3

ip addrDisplays all IP addresses currently attached to a configuration object in the system.

SyntaxUse this command to display IP addresses in use on the system or to display information about a specific IP address in use on the system.

Displayip addr [<ip addr key> | all] [show [all]]

ip addr (<ip addr key> | all) arp [show]

ip addr (<ip addr key> | all) attribute [show]

ip addr (<ip addr key> | all) interface [show]

ip addr (<ip addr key> | all) ip [show]

ip addr (<ip addr key> | all) object [show]

<ip addr key> ::=

<ip addr>

DescriptionYou can use this command to view the IP addresses that are attached to a configuration object on the system.

ExamplesDisplays information about all IP addresses in use on the system:

bigpipe ip addr

Displays information about how the IP address of 10.2.3.11 is used on the system:

bigpipe ip addr 10.2.3.11 show

Displays how the IP addresses are used in the configuration for all IP addresses:

bigpipe ip addr all object show

OptionsYou can use these options with the ip addr command:

◆ arpSpecifies that you want to display only the ARP status of the IP addresses.

◆ attributeSpecifies that you want to display only the attribute information about the IP addresses.

3 - 92

Page 129: BIG IP Reference

Bigpipe Utility Command Reference

◆ interfaceSpecifies that you want to display only the interface information about the IP addresses.

◆ ipSpecifies that you want to display only the IP address information about the IP addresses.

◆ objectSpecifies that you want to display only the types of objects for the IP addresses.

See alsoarp(1), mgmt(1), mgmt_route(1), ndp(1), node(1), pool(1), route(1), self(1), virtual(1), virtual_address(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 93

Page 130: BIG IP Reference

Chapter 3

listDisplays all objects the user has permission to view. Depending on the user’s Read partition, all objects that are not in partitions and all objects in partition Common may also display.

SyntaxUse this command to display objects based on your Read partition setting.

Display[base] list [all]

DescriptionWhen the default Read partition is All, the list command displays all objects the user has permission to view. When you specify a Read partition, this command displays all objects the user has permission to view in the current partition, all objects that are not in partitions, and all objects in partition Common.

OptionsYou can use these options with the list command:

◆ baseLists the output of the single configuration file (SCF), including the configuration of the BIG-IP system network components: MGMT port address, MGMT route, internal and external VLANs, VLAN groups, self-IP addresses, and self-allow values.

◆ allDisplays the complete system configuration.

See alsobigpipe(1)

3 - 94

Page 131: BIG IP Reference

Bigpipe Utility Command Reference

loadReplaces the running configuration with the configuration in the stored configuration files.

SyntaxUse this command to replace the running configuration with the configuration in the stored configuration files.

Usage[base] load [<file> | - ]

verify load

DescriptionYou can also use the load command to replace the running configuration with the configuration stored in a specified file.

If you want to modify the running configuration of the BIG-IP system, rather than replace it, you must use the merge command. For more information, see the man page for the merge command.

ExamplesThe following command replaces the running configuration with the configuration in the stored configuration files. The configuration loads after you type Ctrl-D.

load -

<Ctrl-D>

The following command replaces the bigip.conf file with the myconfigurationfile.conf file:

load myconfigurationfile.conf

The base load command replaces the running configuration using the contents of the following files in the order shown:

• /defaults/config_base.conf

• /config/bigip_base.conf

• /config/bigip_sys.conf

Bigpipe Utility Reference Guide 3 - 95

Page 132: BIG IP Reference

Chapter 3

The load command replaces the entire running configuration using the contents of the following files in the order shown:

• /defaults/config_base.confThis file contains the commands, and their attributes and values, that configure the basic system information for all of the components of the BIG-IP system. When you run the base load or load commands, the system resets portions of the running configuration to the values contained in this file. When you run the base save or save all commands, the system writes portions of the running configuration into this file.

• /config/bigip_base.confThis file contains the commands, and their attributes and values, that configure the BIG-IP network components. When you run the base load or load commands, the system resets portions of the running configuration to the values contained in this file. When you run the base save or save all commands, the system writes portions of the running configuration into this file.

• /config/bigip_sys.confThis file contains the commands, and their attributes and values, that configure the BIG-IP network components, as well as the configuration commands that are synchronized on both units of a redundant system configuration when you run the configuration synchronization commands. When you run the base load or load commands, the system resets portions of the running configuration to the values contained in this file. When you run the base save or save all commands, the system writes portions of the running configuration into this file.

• /usr/bin/monitors/builtins/base_monitors.confThis file contains the default monitors that are delivered with the system. These monitors are the parents of all the new monitors that you add to the system.

• /config/profile_base.confThis file contains the default profiles that are delivered with the system. These profiles are the parents of all the new profiles that you add to the system.

• /config/daemon.confThis file contains the high-availability configuration data for all of the daemons that are delivered with the system.

• /config/bigip.confThis file contains the configuration commands, and their attributes and values, that you add to the system when you configure it to meet your network and system management and local traffic management needs. It also contains the configuration commands, and their attributes and values, that are synchronized on both units of a redundant system configuration when you run the configuration synchronization commands. When you run the load command, the system resets portions of the running configuration to the values contained in this file. When you run the save all command, the system writes portions of the running configuration into this file.

3 - 96

Page 133: BIG IP Reference

Bigpipe Utility Command Reference

• /config/bigip_local.confThis file contains the configuration commands, and their attributes and values, that you add to the system when you configure it to meet your network and system management and local traffic management needs. It also contains the configuration commands that are not synchronized on both units of a redundant system configuration when you run the configuration synchronization commands. These commands include the non-floating virtual addresses and the virtual addresses of the servers used by the BIG-IP® Global Traffic Manager. When you run the load command, the system resets portions of the running configuration to the values contained in this file. When you run the save all command, the system writes portions of the running configuration into this file.

OptionsYou can use these options with the load command:

◆ <file>Specifies a file name that replaces the /config/bigip.conf file.

◆ - Specifies that the BIG-IP system loads configuration commands from the standard input device after loading the configuration of the BIG-IP network components. Using this option replaces all of the values in the /config/bigip.conf file.

◆ - <contents of SCF>Use this option to replace only the values in the /config/bigip.conf file. First copy the contents of an SCF. Then type load - and press the Enter key. The system responds with a Reading... message. When the system finishes responding, on the command line, paste the contents of the SCF that you copied, and then type Ctrl-D. After the command sequence runs, the system has replaced the running configuration. To save the new values in the bigip.conf file, run the save all command.

Warning: This is not the preferred way to load an SCF. F5 recommends that you use the import command. For more information, see import, on page 3-85.

◆ base Replaces the configuration of the BIG-IP system network components with the values contained in the /config/bigip_base.conf and /config/bigip_sys.conf files.

◆ logCauses error messages to be written to /var/log/ltm, in addition to the terminal.

◆ verify Validates the specified configuration file.

See alsobigpipe(1), save(1)

Bigpipe Utility Reference Guide 3 - 97

Page 134: BIG IP Reference

Chapter 3

logrotateConfigures log rotation for the BIG-IP system.

SyntaxUse this command to configure log rotation for the system.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. F5 recommends that you create a monitor in the same partition in which the object that it monitors resides. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

logrotate [{] <logrotate arg list> [}]

<logrotate arg> ::=

common backlogs <number>

common include (<string> | none)

include (<string> | none)

mysql include (<string> | none)

syslog include (<string> | none)

tomcat include (<string> | none)

wa include (<string> | none)

Displaylogrotate [show [all]]

logrotate list [all]

logrotate common backlogs [show]

logrotate common include [show]

logrotate include [show]

logrotate mysql include [show]

logrotate syslog include [show]

logrotate tomcat include [show]

logrotate wa include [show]

DescriptionYou can configure the system to rotate the log files after a specified length of time. This helps you to clear the hard drive of unneeded log files.

3 - 98

Page 135: BIG IP Reference

Bigpipe Utility Command Reference

ExamplesSpecifies that the system saves seven copies of the common log files:

logrotate common backlogs 7

OptionsYou can use these options with the logrotate command:

◆ common backlogsSpecifies the number of logs that you want the system to save. Select a number from the valid range of 1 - 100.

◆ common include

Warning: Do not use this parameter without assistance from the F5 Technical Support team. The system does not validate the commands issued using the include parameter. If you use this parameter incorrectly, you put the functionality of the system at risk.

◆ include

Warning: Do not use this parameter without assistance from the F5 Technical Support team. The system does not validate the commands issued using the include parameter. If you use this parameter incorrectly, you put the functionality of the system at risk.

◆ partitionDisplays the partition within which the logrotate object resides.

◆ syslog include

Warning: Do not use this parameter without assistance from the F5 Technical Support team. The system does not validate the commands issued using the include parameter. If you use this parameter incorrectly, you put the functionality of the system at risk.

◆ tomcat include

Warning: Do not use this parameter without assistance from the F5 Technical Support team. The system does not validate the commands issued using the include parameter. If you use this parameter incorrectly, you put the functionality of the system at risk.

◆ wa include

Warning: Do not use this parameter without assistance from the F5 Technical Support team. The system does not validate the commands issued using the include parameter. If you use this parameter incorrectly, you put the functionality of the system at risk.

See alsobigpipe(1), ntp(1), dns(1), httpd(1), snmpd(1)

Bigpipe Utility Reference Guide 3 - 99

Page 136: BIG IP Reference

Chapter 3

ltmConfigures the general properties for the BIG-IP local traffic management system.

SyntaxUse this command to configure the general properties of the system.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. F5 recommends that you create a monitor in the same partition in which the object that it monitors resides. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

ltm [{] <ltm arg list> [}]

<ltm arg> ::=

accept ip options (enable | disable)

accept ip source route (enable | disable)

adaptive reaper hiwater <number>

adaptive reaper lowater <number>

allow ip source route (enable | disable)

auto last hop (enable | disable)

continue matching (enable | disable)

fastest max idle time <number>

l2 cache timeout <number>

maint (enable | disable)

max icmp rate <number>

max reject rate <number>

min path mtu <number>

path mtu discovery (enable | disable)

preserve client port (enable | disable)

reject unmatched (enable | disable)

share single mac (first member | global)

snat packet forward (enable | disable)

syncookies threshold <number>

vlan keyed conn (enable | disable)

3 - 100

Page 137: BIG IP Reference

Bigpipe Utility Command Reference

Displayltm [show [all]]

ltm list [all]

ltm accept ip options [show]

ltm accept ip source route [show]

ltm adaptive reaper hiwater [show]

ltm adaptive reaper lowater [show]

ltm allow ip source route [show]

ltm auto last hop [show]

ltm continue matching [show]

ltm fastest max idle time [show]

ltm l2 cache timeout [show]

ltm maint [show]

ltm max icmp rate [show]

ltm max reject rate [show]

ltm min path mtu [show]

ltm path mtu discovery [show]

ltm preserve client port [show]

ltm reject unmatched [show]

ltm share single mac [show]

ltm snat packet forward [show]

ltm syncookies threshold [show]

ltm vlan keyed conn [show]

DescriptionYou can use this command to set up the local traffic management system.

ExamplesSpecifies that the maximum rate per second at which the BIG-IP system issues reject packets (TCP RST or ICMP port unreach) is 1000 seconds:

ltm max reject rate 1000

OptionsYou can use these options with the ltm command:

◆ accept ip optionsSpecifies whether the system accepts IPv4 packets with IP options. The default value is disable.

◆ accept ip source routeSpecifies whether the system accepts IPv4 packets with IP source route options that are destined for Traffic Management Microkernel (TMM). The default value is disable. To enable this option, you must also enable the accept ip options setting.

Bigpipe Utility Reference Guide 3 - 101

Page 138: BIG IP Reference

Chapter 3

◆ adaptive reaper hiwaterSpecifies, in a percentage, the memory usage at which the system stops establishing new connections. Once the system meets the reaper high-water mark, the system does not establish new connections until the memory usage drops below the reaper low-water mark. The default value is 95. To disable the adaptive reaper, set the high-water mark to 100.

Note that the adaptive reaper settings help mitigate the effects of a denial-of-service attack.

◆ adaptive reaper lowaterSpecifies, in percent, the memory usage at which the system silently purges stale connections, without sending reset packets (RST) to the client. If the memory usage remains above the low-water mark after the purge, then the system starts purging established connections closest to their service timeout. The default value is 85. To disable the adaptive reaper, set the low-water mark to 100.

◆ allow ip source routeSpecifies whether the system allows IPv4 packets with IP source route options enabled to be routed through Traffic Management Microkernel (TMM). The default value is disable. To enable this option, you must also enable the accept ip options setting.

◆ auto last hopSpecifies that the system automatically maps the last hop for pools. The default value is enable.

◆ continue matchingSpecifies whether the system matches against a less-specific virtual server when the more-specific one is disabled. When continue matching is disabled, the system drops connections that request a disabled virtual server. In this case, the system rejects or drops packets depending on the setting of the reject unmatched option.

◆ fastest max idle timeSpecifies the number of seconds a node can be left idle by the fastest load balancing mode. The system sends fewer connections to a node that is responding slowly, and periodically recalculates the response time of the slow node. The default value is 0 (zero), which indicates disabled.

◆ l2 cache timeoutSpecifies, in seconds, the amount of time that records remain in the Layer 2 forwarding table, when the MAC address of the record is no longer detected on the network. The default value is 300 seconds.

◆ maintSpecifies, when enabled, that the unit is in maintenance mode. In maintenance mode, the system stops accepting new connections and slowly finishes off existing connections.

◆ max icmp rateSpecifies the maximum rate per second at which the system issues Internet Control Message Protocol (ICMP) errors. The default value is 100 errors per second. The range is from 1 to 1000 errors per second. This option is useful for preventing ICMP-message storms.

3 - 102

Page 139: BIG IP Reference

Bigpipe Utility Command Reference

◆ max reject rateSpecifies the maximum rate per second that the system issues reject packets (TCP RST or ICMP port unreach). The default value is 250 seconds.

◆ max path mtuSpecifies the minimum packet size that can traverse the path without suffering fragmentation, also known as path Maximum Transmission Unit (MTU). The default value is 296. The range is from 68 to 1500.

◆ partitionDisplays the partition within which the ltm object resides.

◆ path mtu discoverySpecifies, when enabled, that the system discovers the maximum transmission unit (MTU) that it can send over a path, without fragmenting TCP packets. The default value is enable.

◆ preserve client portSpecifies that the system preserves the client port of the connection.

◆ reject unmatchedSpecifies, when enabled, that the system returns a TCP RESET or ICMP_UNREACH packet if no virtual servers on the system match the destination address of the incoming packet. When this setting is disabled, the system silently drops the unmatched packet. The default value is enable.

◆ share single macSpecifies the MAC address that the system assigns to a VLAN. The default value is first member, which indicates that a VLAN uses the MAC address of its first unused member. The global value indicates that all of the VLANs on the system use the same MAC address.

◆ snat packet forwardEnables or disables SNAT packet forwarding. The default value is disable.

◆ syncookies thresholdSpecifies the number of new or untrusted TCP connections that can be established before the system activates the SYN Cookies authentication method for subsequent TCP connections. The default value is 16384.

◆ vlan keyed connEnables or disables VLAN-keyed connections. You use VLAN-keyed connections when traffic for the same connection must pass through the system several times, on multiple pairs of VLANs (or in different VLAN groups). The default value is enable.

See alsobigpipe(1)

Bigpipe Utility Reference Guide 3 - 103

Page 140: BIG IP Reference

Chapter 3

mac addrDisplays every MAC address currently attached to a configuration object in a BIG-IP system.

SyntaxUse this command to display the MAC addresses currently attached to a configuration object in the system.

Create/Modify<mac addr key> ::=

<mac addr>

Displaymac addr [<mac addr key> | all] [show [all]]

mac addr (<mac addr key> | all) attribute [show]

mac addr (<mac addr key> | all) mac [show]

mac addr (<mac addr key> | all) object [show]

DescriptionYou can use this command to view the MAC addresses that are attached to a configuration object on the system.

ExamplesDisplays all MAC addresses:

mac addr all

OptionsYou can use these options with the mac addr command:

◆ attributeLists the attributes for specified objects.

◆ macLists the MAC addresses for specified objects.

◆ objectLists the objects for specified objects.

See alsobigpipe(1)

3 - 104

Page 141: BIG IP Reference

Bigpipe Utility Command Reference

mcpDisplays the Master Control Program (MCP) state.

SyntaxUse this command to display the state of the MCP.

Displaymcp [show [all]]

Deletemcp stats reset

Note

This command is not currently implemented.

DescriptionDisplays the state of the MCP, whether running or inactive.

ExamplesDisplays the state of the MCP:

mcp show all

See alsobigpipe(1)

Bigpipe Utility Reference Guide 3 - 105

Page 142: BIG IP Reference

Chapter 3

memoryDisplays memory usage statistics.

SyntaxUse this command to display memory statistics.

Displaymemory [show [all]]

memory stats [show]

DescriptionDisplays detailed memory usage statistics, including:

• Total memory available

• Total memory used

• How the memory is currently allocated to objects

• The size of the objects

• The maximum memory that can be allocated to a specified object

ExamplesDisplays all memory usage information:

memory show all

See alsobigpipe(1)

3 - 106

Page 143: BIG IP Reference

Bigpipe Utility Command Reference

mergeLoads the specified configuration file. This modifies the running configuration.

SyntaxUse this command to load the specified configuration file or data to modify the running configuration.

Usagemerge (<file> | -)

DescriptionThe merge command loads the specified configuration file or data. This modifies the running configuration. After you run the merge command, if you want to save the modified running configuration in the stored configuration files, run the save all command.

It is important to note that if you want to replace the running configuration of the BIG-IP system, rather than modify it, you use the load command. For more information, see the man page for the load command.

OptionsYou can use these options with the merge command:

◆ <file>Specifies the file that you want to load to modify the running configuration.

◆ - Specifies that you want to load configuration commands from the standard input device after loading the configuration of the BIG-IP network components.

◆ - <contents of SCF>Use this option to modify the running configuration of the system using the data in an SCF. First copy the contents of an SCF. Then type merge - and press the Enter key. The system responds with a Reading... message. When the system finishes responding, paste the contents of the SCF that you copied on the command line, and then type Ctrl-D. After the command sequence runs, the system has modified the running configuration. If you want to save the running configuration to the stored configuration files, run the save all command.

Warning: F5 recommends that you do not use this option. Instead, you should use the <file> option.

Bigpipe Utility Reference Guide 3 - 107

Page 144: BIG IP Reference

Chapter 3

See alsobigpipe(1), save(1)

3 - 108

Page 145: BIG IP Reference

Bigpipe Utility Command Reference

mgmtSpecifies network settings for the management interface (MGMT).

SyntaxUse this command to create or delete settings for the management interface.

Create/Modifymgmt <mgmt key> {}

mgmt (<mgmt key> | all) [{] <mgmt arg list> [}]

<mgmt key> ::=

(<ip addr> | none)

<mgmt arg> ::=

addr (<ip addr> | none)

netmask (<ip mask> | none)

Displaymgmt [<mgmt key> | all] [show [all]]

mgmt [<mgmt key> | all] list [all]

mgmt (<mgmt key> | all) addr [show]

mgmt (<mgmt key> | all) netmask [show]

Deletemgmt (<mgmt key> | all) delete

DescriptionSpecifies network settings for the management interface. The management interface is available on all switch platforms and is designed for management purposes. You can access the browser-based Configuration utility and command line configuration utility through the management port. You cannot use the management interface in traffic management VLANs. You can only configure one IP address on the management interface.

After you make any changes using the mgmt command, issue the following command to save the changes to the bigip_base.conf file:

base save

Bigpipe Utility Reference Guide 3 - 109

Page 146: BIG IP Reference

Chapter 3

ExamplesCreates the IP address 10.10.10.1 on the management interface:

mgmt 10.10.10.1

Creates the IP address 10.10.10.1 with a netmask of 255.255.255.0 on the management interface:

mgmt 10.10.10.1 netmask 255.255.255.0

OptionsYou can use these options with the mgmt command:

◆ addrSpecifies the IP address in one of four formats:

• IPv4 address in dotted-quad notation, for example: 10.10.10.1

• IPv6 address, for example: 1080::8:800:200C:417A

• host name, for example: www.f5.com

• node screen name, for example: node1

◆ netmask <ip mask>Specifies the netmask for the management interface IP address.

See alsoroute(1), bigpipe(1), mgmt route(1)

3 - 110

Page 147: BIG IP Reference

Bigpipe Utility Command Reference

mgmt routeSpecifies route settings for the management interface (MGMT).

SyntaxUse this command to create, display, or delete route settings for the management interface.

Create/Modifymgmt route <mgmt route key> {}

mgmt route (<mgmt route key> | all) [{] <mgmt route arg list> [}]

<mgmt route key> ::=

<network ip>

<mgmt route arg> ::=

dest <network ip>

gateway (<ip addr> | none)

mtu <number>

(mgmt | reject)

Displaymgmt route [<mgmt route key> | all] [show [all]]

mgmt route [<mgmt route key> | all] list [all]

mgmt route (<mgmt route key> | all) dest [show]

mgmt route (<mgmt route key> | all) gateway [show]

mgmt route (<mgmt route key> | all) mtu [show]

mgmt route (<mgmt route key> | all) type [show]

Deletemgmt route (<mgmt route key> | all) delete

DescriptionSpecifies route settings for the management interface. You must configure a route on the management interface if you want to access the management network on the system by connecting from another network. The management interface is available on all switch platforms. It is designed for management purposes. All upgrades should be installed through the management port. You can access the browser-based Configuration utility and command line configuration utility through the management interface. You cannot include the management interface in traffic management VLANs.

Bigpipe Utility Reference Guide 3 - 111

Page 148: BIG IP Reference

Chapter 3

ExamplesSets the management interface default gateway IP address to 10.10.10.254:

mgmt route default gateway 10.10.10.254

Either one of the following command sequences sets the management interface to subnet 10.10.10.0/24, and the gateway to 172.24.74.62:

mgmt route 10.10.10.0 netmask 255.255.255.0 gateway 172.24.74.62

mgmt route 10.10.10.0/24 gateway 172.24.74.62

OptionsYou can use these options with the mgmt route command:

◆ gatewaySpecifies that the system forwards packets to the destination through the gateway with the specified IP address.

◆ mgmtSpecifies that the system forwards packets to the destination through the management interface.

◆ mtuSpecifies the maximum transmission unit (MTU) for the management interface. The value of the MTU is the largest size that the BIG-IP system allows for an IP datagram passing through the management interface.

◆ network ip Specifies the network IP address, in one of four formats:

• IPv4 address in dotted-quad notation, for example: 10.10.10.1

• IPv6 address, for example: 1080::8:800:200C:417A

• Host name, for example: www.siterequest.com

• Node screen name, for example: node1

◆ rejectSpecifies that the system drops packets that are sent to this destination.

See alsomgmt(1), bigpipe(1), route(1)

3 - 112

Page 149: BIG IP Reference

Bigpipe Utility Command Reference

mirrorConfigures interface (port) mirroring.

SyntaxUse this command to create, modify, display, or delete interface mirroring.

Create/Modifymirror <mirror key> {}

mirror (<mirror key> | all) [{] <mirror arg list> [}]

<mirror key> ::=

<if name>

<mirror arg> ::=

interfaces (<interface key list> | none) [add | delete]

name <if name>

Displaymirror [<mirror key> | all] [show [all]]

mirror [<mirror key> | all] list [all]

mirror (<mirror key> | all) interfaces [show]

mirror (<mirror key> | all) name [show]

Deletemirror (<mirror key> | all) delete

DescriptionUse the mirror command to create, display, modify, or delete port mirroring on given interfaces. You can mirror traffic from many ports to one port. The mirror-to port is dedicated to mirroring and cannot be a VLAN or a trunk member.

ExamplesCreates a port mirror, 1.1, that includes interfaces 1.2, 1.3, 1.4. Traffic from the interfaces 1.2, 1.3, and 1.4 is mirrored to the interface 1.1:

mirror 1.1 interfaces 1.2 1.3 1.4

Adds interfaces 1.2, 1.3, 1.4 to the existing port mirror 1.1:

mirror 1.1 interface 1.2 1.3 1.4 add

Bigpipe Utility Reference Guide 3 - 113

Page 150: BIG IP Reference

Chapter 3

OptionsYou can use these options with the mirror command:

◆ addAdds interfaces to an existing port mirror.

Important: If you do not use add, the list of interfaces you specify replaces the existing interfaces on the port mirror.

◆ allProvides the ability to apply a command to all existing port mirrors.

◆ deleteDeletes interfaces from an existing port mirror. The list of interfaces you specify is deleted from the port mirror.

◆ <interface key>Specifies an interface name, for example 3.1.

◆ <key>Provides the ability to apply a command to a list of existing port mirrors.

See alsointerface(1), bigpipe(1)

3 - 114

Page 151: BIG IP Reference

Bigpipe Utility Command Reference

monitorCreates, modifies, and deletes monitor instances or templates.

SyntaxUse this command to create, modify, display, or delete monitor instances or monitors.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. F5 recommends that you create a monitor in the same partition in which the object that it monitors resides. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

monitor <monitor key> {}

monitor (<monitor key> | all) [{] <monitor arg list> [}]

<monitor key> ::=

<name>

<monitor arg> ::=

<name> (<quoted string> | none)

accounting node (<quoted string> | none)

accounting port (<quoted string> | none)

agent (<quoted string> | none)

agent type (<quoted string> | none)

aggregate dynamic ratios (<quoted string> | none)

args (<quoted string> | none)

base (<quoted string> | none)

call id (<quoted string> | none)

cert (<quoted string> | none)

check until up (enable | disable)

cipherlist (<quoted string> | none)

cmd (<quoted string> | none)

community (<quoted string> | none)

compatibility (<quoted string> | none)

concurrency limit (<quoted string> | none)

count (<quoted string> | none)

cpu coefficient (<quoted string> | none)

cpu threshold (<quoted string> | none)

database (<quoted string> | none)

Bigpipe Utility Reference Guide 3 - 115

Page 152: BIG IP Reference

Chapter 3

debug (<quoted string> | none)

defaults from (<monitor key> | none)

dest (<ip addr> | <member>)

disk coefficient (<quoted string> | none)

disk threshold (<quoted string> | none)

domain (<quoted string> | none)

(enable | disable)

failure interval (<quoted string> | none)

failures (<quoted string> | none)

fault (<quoted string> | none)

filename (<quoted string> | none)

filter (<quoted string> | none)

filter neg (<quoted string> | none)

is read only

folder (<quoted string> | none)

framed addr (<quoted string> | none)

get (<quoted string> | none)

gwm addr (<quoted string> | none)

gwm interval (<quoted string> | none)

gwm protocol (<quoted string> | none)

gwm service (<quoted string> | none)

headers (<quoted string> | none)

ignore down response (enable | disable)

instance <monitor instance list>

interval <number>

key (<quoted string> | none)

mandatoryattrs (<quoted string> | none)

manual resume

max load average (<quoted string> | none)

mem coefficient (<quoted string> | none)

mem threshold (<quoted string> | none)

method (<quoted string> | none)

metrics (<quoted string> | none)

mode (<quoted string> | none)

name <name>

namespace (<quoted string> | none)

nasip (<quoted string> | none)

newsgroup (<quoted string> | none)

param name (<quoted string> | none)

param type (<quoted string> | none)

param value (<quoted string> | none)

password (<quoted string> | none)

pool name (<quoted string> | none)

post (<quoted string> | none)

3 - 116

Page 153: BIG IP Reference

Bigpipe Utility Command Reference

program (<quoted string> | none)

protocol (<quoted string> | none)

recv (<quoted string> | none)

recvcolumn (<quoted string> | none)

recvdrain (<quoted string> | none)

recvrow (<quoted string> | none)

request (<quoted string> | none)

response time (<quoted string> | none)

retry time (<quoted string> | none)

return type (<quoted string> | none)

return value (<quoted string> | none)

reverse

run (<quoted string> | none)

secret (<quoted string> | none)

security (<quoted string> | none)

send (<quoted string> | none)

sendpackets (<quoted string> | none)

server (<quoted string> | none)

server id (<quoted string> | none)

server ip (<quoted string> | none)

service (<quoted string> | none)

session id (<quoted string> | none)

snmp port (<quoted string> | none)

snmp version (<quoted string> | none)

timeout (<number> | immediate | indefinite)

timeoutpackets (<quoted string> | none)

transparent

urlpath (<quoted string> | none)

username (<quoted string> | none)

version (<quoted string> | none)

<monitor instance> ::= (<monitor instance key> | all) [{] <monitor instance arg list> [}]

<monitor instance key> ::=

(<ip addr> | <member>)

<monitor instance arg> ::=

addr (<ip addr> | <member>)

(enable | disable)

WARNING

Do not disable default monitors.

Note

If you disable a monitor instance and then run the load command, the monitor instance is automatically enabled.

Bigpipe Utility Reference Guide 3 - 117

Page 154: BIG IP Reference

Chapter 3

Displaymonitor [<monitor key> | all] [show [all]]

monitor [<monitor key> | all] list [all]

monitor (<monitor key> | all) <name> [show]

monitor (<monitor key> | all) accounting node [show]

monitor (<monitor key> | all) accounting port [show]

monitor (<monitor key> | all) agent [show]

monitor (<monitor key> | all) agent type [show]

monitor (<monitor key> | all) aggregate dynamic ratios [show]

monitor (<monitor key> | all) args [show]

monitor (<monitor key> | all) base [show]

monitor (<monitor key> | all) call id [show]

monitor (<monitor key> | all) cert [show]

monitor (<monitor key> | all) check until up [show]

monitor (<monitor key> | all) cipherlist [show]

monitor (<monitor key> | all) cmd [show]

monitor (<monitor key> | all) community [show]

monitor (<monitor key> | all) compatibility [show]

monitor (<monitor key> | all) concurrency limit [show]

monitor (<monitor key> | all) count [show]

monitor (<monitor key> | all) cpu coefficient [show]

monitor (<monitor key> | all) cpu threshold [show]

monitor (<monitor key> | all) database [show]

monitor (<monitor key> | all) debug [show]

monitor (<monitor key> | all) defaults from [show]

monitor (<monitor key> | all) dest [show]

monitor (<monitor key> | all) disk coefficient [show]

monitor (<monitor key> | all) disk threshold [show]

monitor (<monitor key> | all) domain [show]

monitor (<monitor key> | all) enabled [show]

monitor (<monitor key> | all) failure interval [show]

monitor (<monitor key> | all) failures [show]

monitor (<monitor key> | all) fault [show]

monitor (<monitor key> | all) filename [show]

monitor (<monitor key> | all) filter [show]

monitor (<monitor key> | all) filter neg [show]

monitor (<monitor key> | all) flags [show]

monitor (<monitor key> | all) folder [show]

monitor (<monitor key> | all) framed addr [show]

monitor (<monitor key> | all) get [show]

monitor (<monitor key> | all) gwm addr [show]

monitor (<monitor key> | all) gwm interval [show]

monitor (<monitor key> | all) gwm protocol [show]

monitor (<monitor key> | all) gwm service [show]

3 - 118

Page 155: BIG IP Reference

Bigpipe Utility Command Reference

monitor (<monitor key> | all) headers [show]

monitor (<monitor key> | all) ignore down response [show]

monitor (<monitor key> | all) instance [<monitor instance key> | all] [show [all]]

monitor (<monitor key> | all) instance [<monitor instance key> | all] list [all]

monitor (<monitor key> | all) instance (<monitor instance key> | all) addr [show]

monitor (<monitor key> | all) instance (<monitor instance key> | all) enabled [show]

monitor (<monitor key> | all) instance (<monitor instance key> | all) mon name [show]

monitor (<monitor key> | all) interval [show]

monitor (<monitor key> | all) key [show]

monitor (<monitor key> | all) mandatoryattrs [show]

monitor (<monitor key> | all) manual resume [show]

monitor (<monitor key> | all) max load average [show]

monitor (<monitor key> | all) mem coefficient [show]

monitor (<monitor key> | all) mem threshold [show]

monitor (<monitor key> | all) method [show]

monitor (<monitor key> | all) metrics [show]

monitor (<monitor key> | all) mode [show]

monitor (<monitor key> | all) name [show]

monitor (<monitor key> | all) namespace [show]

monitor (<monitor key> | all) nasip [show]

monitor (<monitor key> | all) newsgroup [show]

monitor (<monitor key> | all) param name [show]

monitor (<monitor key> | all) param type [show]

monitor (<monitor key> | all) param value [show]

monitor (<monitor key> | all) partition [show]

monitor (<monitor key> | all) password [show]

monitor (<monitor key> | all) pool name [show]

monitor (<monitor key> | all) post [show]

monitor (<monitor key> | all) program [show]

monitor (<monitor key> | all) protocol [show]

monitor (<monitor key> | all) recv [show]

monitor (<monitor key> | all) recvcolumn [show]

monitor (<monitor key> | all) recvdrain [show]

monitor (<monitor key> | all) recvrow [show]

monitor (<monitor key> | all) request [show]

monitor (<monitor key> | all) response time [show]

monitor (<monitor key> | all) retry time [show]

monitor (<monitor key> | all) return type [show]

monitor (<monitor key> | all) return value [show]

monitor (<monitor key> | all) reverse [show]

monitor (<monitor key> | all) run [show]

monitor (<monitor key> | all) secret [show]

monitor (<monitor key> | all) security [show]

monitor (<monitor key> | all) send [show]

Bigpipe Utility Reference Guide 3 - 119

Page 156: BIG IP Reference

Chapter 3

monitor (<monitor key> | all) sendpackets [show]

monitor (<monitor key> | all) server [show]

monitor (<monitor key> | all) server id [show]

monitor (<monitor key> | all) server ip [show]

monitor (<monitor key> | all) service [show]

monitor (<monitor key> | all) session id [show]

monitor (<monitor key> | all) snmp port [show]

monitor (<monitor key> | all) snmp version [show]

monitor (<monitor key> | all) timeout [show]

monitor (<monitor key> | all) timeoutpackets [show]

monitor (<monitor key> | all) transparent [show]

monitor (<monitor key> | all) urlpath [show]

monitor (<monitor key> | all) username [show]

monitor (<monitor key> | all) version [show]

Deletemonitor (<monitor key> | all) delete

DescriptionMonitors verify connections on pool members and nodes. A monitor can be either a health monitor or a performance monitor, designed to check the status of a pool, pool member, or node on an ongoing basis, at a set interval. If a pool member or node being checked does not respond within a specified timeout period, or the status of a pool member, or node indicates that performance is degraded, the system can redirect the traffic to another pool member or node. Some monitors are included as part of the system, while other monitors are user-created. Monitors that the system provides are known as pre-configured monitors. User-created monitors are known as custom monitors.

The task of implementing a monitor varies depending on whether you are using a pre-configured monitor or creating a custom monitor. If you want to implement a pre-configured monitor, you need only associate the monitor with a pool, pool member, or node. If you want to implement a custom monitor, you must first create the custom monitor, and then associate it with a pool, pool member, or node.

Note

To view the man page for the monitor command, enter man monitor at the BIG-IP system prompt.

3 - 120

Page 157: BIG IP Reference

Bigpipe Utility Command Reference

Pre-configured monitorsThe following monitors are pre-configured monitors:

• gateway icmp

• http

• https

• https_443

• icmp

• inband

• real_server

• snmp dca

• tcp

• tcp_echo

• tcp_half_open

• udp

ExamplesThis procedure describes how to create a custom HTTP monitor.

To create a custom HTTP monitor

1. Access the bigpipe shell.

2. View the variables for the default monitors, by typing the following command:

monitor list all |more

3. Find a default monitor on which you want to base the new monitor and make a note of the settings that you want to change.

For example, if you want to define a new monitor that is based on the default HTTP monitor, view the default HTTP monitor.

The default HTTP monitor appears as follows:

monitor http {

defaults from interval 5

timeout 16

dest *:*

password

recv

send GET /

username

}

Bigpipe Utility Reference Guide 3 - 121

Page 158: BIG IP Reference

Chapter 3

From the configuration statement of the default HTTP monitor, the following settings are available:

defaults from noneinterval 5timeout 16dest *.* password recv send GET / username

Important: The values for the password, recv, send, and username settings are contained in quotation marks. If you want to change these values, you must place the new values in quotation marks.

4. Define the new monitor, using the following command syntax:

monitor <name> '{ defaults from <monitor> <setting> <value>... }'>

a) Replace name with the name you want to use for the new monitor.

b) Replace monitor with the name of the default monitor on which you want to base the new monitor.

c) Replace setting and value with the name and value of each setting you want to change.

For example, if you want to create a monitor named myhttpmonitor that has an interval of 30, a timeout of 91, and a send string of GET /test.html, you would type the following command:

monitor myhttpmonitor '{ defaults from http interval 30 timeout 91 send GET /test.html }'

If you decide to change the timeout for the monitor to 121, you would type the following command:

monitor myhttpmonitor '{ interval 121 }'

5. Save the new monitor, by typing the following command:

save

For more information about configuring monitors, see the Configuration Guide for BIG-IP® Local Traffic Management.

OptionsYou can use these options with the monitor command:

◆ accounting nodeSpecifies the RADIUS server that provides authentication for the WAP target. Note that if you configure the accounting-port option, but you do not configure the this option, the system assumes that the RADIUS server and the WAP server are the same system.

3 - 122

Page 159: BIG IP Reference

Bigpipe Utility Command Reference

◆ accounting portSpecifies the port that the monitor uses for RADIUS accounting. The default value is none. A value of 0 (zero) disables RADIUS accounting.

◆ agentSpecifies an agent for use with Real Server, SNMP Base, and WMI monitors only.

◆ agent typeSpecifies the SNMP DCA agent type. This is the type of agent running on the server that you are monitoring with an SNMP DCA monitor.

◆ aggregate dynamic ratiosSpecifies the monitors response to a query. By default, the BIG-IP monitor uses the gtm_score value as the vs_score for a Local Traffic Manager virtual server.

◆ argsSpecifies any required command line arguments used by external monitors.

◆ baseSpecifies a base name, used by LDAP.

◆ call idSpecifies the 11-digit phone number for the RADIUS server. The default value is none.

◆ certProvides the ability to supply a certificate file to be presented to the server by an HTTPS monitor. If you do not provide the full path to the certificate file, the system adds the path /config/ssl/ssl.crt. The cert must be surrounded by quotation marks, for example: cert "client.crt" or cert "/config/ssl/ssl.crt/client.crt". The default value is null, that is, no certificate is supplied.

◆ check until upSpecifies how the active monitor performs health checks. The default value is disable.

◆ cipherlistChanges the cipher list that the HTTPS monitor uses, from the default. The default cipherlist used is: DEFAULT:+SHA:+3DES:+kEDH. The default cipher list is located in the file base_monitors.conf.

◆ cmdSpecifies a command associated with metrics and metric values. Applies to Real Server and WMI monitors.

◆ communitySpecifies an SNMP community name. Applies to SNMP DCA monitors only. The default value is Public.

◆ compatibilitySets the SSL options to ALL for an HTTPS monitor. You can enable or disable this option.

Bigpipe Utility Reference Guide 3 - 123

Page 160: BIG IP Reference

Chapter 3

◆ concurrency limitSpecifies the maximum percentage of licensed connections currently in use under which the monitor marks the FirePass system up. As an example, a value of 95 percent means that the monitor marks the FirePass system up until 95 percent of licensed connections are in use. When the number of in-use licensed connections exceeds 95 percent, the monitor marks the FirePass system down. The default value is 95.

◆ countSpecifies the number of instances for which the system keeps a connection open. By default, when you assign instances of this monitor to a resource, the system keeps the connection to the database open. With this option you can assign multiple instances to the database while reducing the overhead that multiple open connections can cause.

◆ cpu coefficientSpecifies an SNMP DCA CPU Coefficient. This is a CPU value used for calculating a ratio weight.

◆ cpu thresholdSpecifies an SNMP DCA CPU threshold. This is the highest disk threshold value allowed, used in calculating a ratio weight.

◆ databaseSpecifies a database name, used by SQL. This is the name of the data source on the node being pinged, for example: sales or hr.

◆ debugSpecifies whether the monitor provides debug mode. If the value is yes, the monitor redirects its stderr output to the file /var/log/<service> <ip addr>.<port>.log, and additional debug information is directed to stderr.

◆ defaults fromSpecifies the monitor that you want to use as the parent monitor. Your new monitor inherits all settings and values from the parent monitor specified. The new monitor will have the default settings of the monitor you specify, but you can change any of the settings. This option is required.

◆ destSpecifies a destination IP address. You can also set this to a node name.

◆ disk coefficientSpecifies an SNMP DCA Disk coefficient. This is a disk value used for calculating a ratio weight.

◆ disk thresholdSpecifies an SNMP DCA Disk threshold. This is the highest disk threshold value allowed, used in calculating a ratio weight.

◆ domainSpecifies a domain name, for SMTP monitors only.

3 - 124

Page 161: BIG IP Reference

Bigpipe Utility Command Reference

◆ failure intervalSpecifies an interval, in seconds. If the number of failures specified in the failures option occurs within this interval, the system marks the pool member as being unavailable.

◆ failuresSpecifies the number of times within a given time period that the system tries to connect to a pool member before marking that server as being unavailable. The default value is 30.

Specifying a value of 0 (zero) disables this option. A failure can be either a failure to connect or a failure of the pool member to respond within the time specified in the response time option.

◆ faultFor a SOAP monitor, fault is a Boolean operator specifying whether to check for a SOAP fault. Valid values are (0, 1). When the fault parameter is specified as a value of 1, the monitor expects the successful execution it is monitoring to include a returned fault. This is useful to test for situations when a fault is expected. This tests only for the existence of a SOAP fault. Any other server error codes signal a failure of the monitor.

◆ filterSpecifies a filter name, used by LDAP.

◆ filter negSpecifies the SIP status codes that the target can return to be considered down. By default the system always accepts status codes according to filter. After checking that, the status code is checked against this key. If a code is also in filter, the node is marked up.

◆ folderSpecifies a folder name, used by IMAP.

◆ framed addrSpecifies the RADIUS framed IP address. The default value is none.

◆ getGets a specified string.

◆ gwm addrSpecifies the IP address of the Group Workload Manager. The default value is none.

◆ gwm intervalSpecifies the frequency at which the system issues the monitor check. The default value is auto.

◆ gwm protocolSpecifies the protocol that the monitor uses to communicate with the target. The default value is tcp.

◆ gwm serviceSpecifies the port through which the SASP monitor communicates with the Group Workload Manager. The default port is 3000.

Bigpipe Utility Reference Guide 3 - 125

Page 162: BIG IP Reference

Chapter 3

◆ headersSpecifies the set of SIP headers in the SIP message that is sent to the target. Separate each header with a new line. The default value is none.

◆ intervalMonitor’s interval time in seconds. The default value is 0.

◆ keySpecifies the RSA private key to be used for client authentication. The key must be surrounded by quotation marks, for example: key "client.key".

Note that if you specify a key, you must also specify a value for the cert option. For more information, see the cert option on the previous page.

◆ mandatoryattrsSpecifies whether the target must include attributes in its response to be considered up. The default value is no.

◆ manual resumeSpecifies whether the system automatically changes the status of a resource to Enabled at the next successful monitor check. If you set this option to Yes, you must manually re-enable the resource before the system can use it for load balancing connections.

◆ max load averageSpecifies the number that the monitor uses to mark the FirePass system up or down. The system compares value of this option against a one-minute average of the FirePass system load. When the FirePass system-load average falls within the specified value, the monitor marks the FirePass system up. When the average exceeds the setting, the monitor marks the system down.

◆ mem coefficientSpecifies an SNMP DCA Memory coefficient. This is a memory value used for calculating a ratio weight.

◆ mem thresholdSpecifies an SNMP DCA Memory threshold. This is the highest disk threshold value allowed, used in calculating a ratio weight.

◆ methodSpecifies a method specification such as GET or POST. Applies to Real Server, SOAP, and WMI monitors only.

◆ metricsSpecifies metrics that you want to monitor, such as CPU percentage or memory usage. Applies to Real Server and WMI monitors only.

◆ modeSets the mode of the monitor. For example, an acceptable setting for this value is passive for an FTP monitor, or udp or tcp for a SIP monitor.

◆ nameSpecifies the monitor name.

3 - 126

Page 163: BIG IP Reference

Bigpipe Utility Command Reference

◆ namespaceSpecifies the namespace associated with the given web service for a SOAP monitor.

◆ nasipSpecifies the network access server’s IP address for a RADIUS monitor.

◆ newsgroupSpecifies a newsgroup name, for NNTP monitors only.

◆ param nameIf the method has a parameter, specifies the name of that parameter for the SOAP monitor.

◆ param typeSpecifies the basic type associated with the given parameter name in a SOAP monitor. Valid values are long, int, string, and bool.

◆ param valueSpecifies the value of the given parameter for the SOAP monitor.

◆ partitionDisplays the partition within which the monitor resides.

◆ passwordSpecifies the password for the specified user name.

◆ pool nameSpecifies the pool name.

◆ postSpecifies a WMI and Real Server post setting.

◆ protocolSpecifies the protocol to use for a SOAP monitor. Valid values are http or https.

◆ recvThis is an optional parameter, containing the value expected back for a particular row and column of the table retrieved by the send parameter, for example: Smith. The expected data must be of a database type that converts directly to a Java String (for example, VARCHAR). If no value is specified for this parameter, the returned data is not checked for any specific value and, as long as no discernible errors occurred (for example, data was received), the service is considered to be up.

◆ recvcolumnThis option is meaningful only if the recv option is specified. It contains the column in the returned table in which the recv value is expected.

◆ recvrowThis option is meaningful only if the recv option is specified. It contains the row in the returned table in which the recv value is expected.

◆ requestSpecifies the SIP request line in the SIP message that is sent to the target. The default value is none.

Bigpipe Utility Reference Guide 3 - 127

Page 164: BIG IP Reference

Chapter 3

◆ response timeSpecifies an amount of time, in seconds. If the pool member does not respond with data after the specified amount of time has passed, the number of failures in this interval increments by 1. Specifying a value of 0 (zero) disables this option.

◆ retry timeSpecifies the amount of time in seconds after the pool member has been marked unavailable before the system retries to connect to the pool member. Specifying a value of 0 (zero) disables this option.

◆ return typeIf a return type is to be tested, specifies the basic type of the return parameter. Valid values are:

• bool (Boolean)

• char

• double

• float

• int (integer)

• long

• short

• string

◆ return valueFor the SOAP monitor. If a return name is specified, this is the value to use for comparison to yield a successful service check.

◆ reverseChecks a monitor recv string reverse mode.

◆ runRuns a path name.

◆ secretSpecifies a secret or shared secret, used by RADIUS.

◆ securityValid values are:

• sslThis value requests that LDAP over SSL be used.

• tlsThis value requests that TLS be used.

• noneThis value (or a null value or any value that does not equal one of the above) invokes no special security. The monitor runs as the previous LDAP pinger was run.

◆ sendYou can use this parameter with TCP, HTTP, and HTTPS ECVs, as well as the SQL monitor. Since this may have special characters, it may require that it be enclosed with single quotation marks. If this value is

3 - 128

Page 165: BIG IP Reference

Bigpipe Utility Command Reference

null, then a valid connection suffices to determine that the service is up. In this case, the recv, recvrow, and recvcolumn options are not needed, and will be ignored even if not null.

◆ sendpacketsSpecifies the number of packets to send when using the UDP monitor.

◆ serverSpecifies the host name or IP address of the RADIUS server. This option is required.

◆ server idSpecifies the RADIUS NAS-ID for this system when configuring a RADIUS server. The default value is none.

◆ serviceSpecifies the name of the service that the user is requesting authentication to use. Identifying the service enables the TACACS+ server to behave differently for different types of authentication requests. This option is required.

◆ session idSpecifies the RADIUS session identification number when configuring a RADIUS server. The default value is none.

◆ snmp portSpecifies the port associated with the SNMP server. The default value is 161.

◆ snmp versionSpecifies the SNMP version.

◆ timeoutMonitor’s timeout in seconds. You can also set the timeout to immediate or indefinite. The default value is 0.

◆ timeoutpacketsSpecifies the timeout in seconds for receiving UDP packets.

◆ transparentSpecifies a monitor for transparent devices. In this mode, the node with which the monitor is associated is pinged through to the destination node.

◆ urlpathSupplies a URL path for a SOAP monitor.

◆ usernameSpecifies a user name for services with password security. For LDAP monitors only, this is a distinguished name, that is, LDAP-format user name.

See alsonode(1), pool(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 129

Page 166: BIG IP Reference

Chapter 3

natConfigures network address translation (NAT).

SyntaxUse this command to create, modify, display, or delete a NAT.

Create/Modifynat <nat key> {}

nat (<nat key> | all) [{] <nat arg list> [}]

<nat key> ::=

(<ip addr> | none)

[(<ip addr> | none)] [to (<ip addr> | none)]

[(<ip addr> | none)] [map (<ip addr> | none)]

<nat arg> ::=

arp (enable | disable)

(enable | disable)

map (<ip addr> | none)

to (<ip addr> | none)

unit <number>

vlans (<vlan key list> | none) (enable | disable)

nat (<nat key> | all) stats reset

Displaynat [<nat key> | all] [show [all]]

nat [<nat key> | all] list [all]

nat (<nat key> | all) arp [show]

nat (<nat key> | all) enabled [show]

nat (<nat key> | all) map [show]

nat (<nat key> | all) stats [show]

nat (<nat key> | all) to [show]

nat (<nat key> | all) unit [show]

nat (<nat key> | all) vlans [show]

Deletenat (<nat key> | all) delete

3 - 130

Page 167: BIG IP Reference

Bigpipe Utility Command Reference

DescriptionA network address translation (NAT) defines a bi-directional mapping between an originating IP address (orig addr) and a translated IP address (trans addr).

A primary reason for defining a NAT is to allow one of the servers in the server array behind the traffic management system to initiate communication with a computer in front of, or external to the system.

ExamplesThe node behind the system with the IP address 10.0.140.100 has a presence in front of the BIG-IP system as IP address 11.0.0.100:

nat 10.0.140.100 to 11.0.0.100

Permanently deletes the NAT from the system configuration:

nat 10.0.140.100 delete

Additional RestrictionsThe nat command has the following additional restrictions:

• A virtual server cannot use the IP address defined in the <trans addr> parameter.

• A NAT cannot use a BIG-IP system's IP address.

• A NAT cannot use an originating or translated IP address defined for and used by a SNAT or another NAT.

• You must delete a NAT before you can redefine it.

OptionsYou can use these options with the nat command:

◆ arpEnables or disables Address Resolution Protocol (ARP).

◆ <ip addr> to <ip addr> or <ip addr> map <ip addr>Specifies the IP address that is translated or mapped, and the IP address to which it is translated or mapped. One of these settings is required when creating a NAT.

◆ orig addrSpecifies the IP address from which traffic is being initiated.

◆ trans addrSpecifies the IP address that <orig addr> is translated to by the traffic management system.

◆ vlansSpecifies the name of an existing VLAN on which access to the NAT is enabled or disabled. A NAT is accessible on all VLANs by default.

Bigpipe Utility Reference Guide 3 - 131

Page 168: BIG IP Reference

Chapter 3

◆ unitSpecifies a unit ID, currently 1 or 2 for the redundant system configuration. The default unit ID is set to 1.

See alsosnat(1), snat translation(1), bigpipe(1)

3 - 132

Page 169: BIG IP Reference

Bigpipe Utility Command Reference

ndpManages IPv6 neighbor discovery.

SyntaxUse this command to create, display, and delete IPv6 neighbor discovery.

Create/Modifyndp <ndp key> {}

ndp (<ndp key> | all) [{] <ndp arg list> [}]

<ndp key> ::=

<ip addr>

(dynamic | static)

<ndp arg> ::=

<ip addr>

(<mac addr> | none)

(dynamic | static)

Displayndp [<ndp key> | all] [show [all]]

ndp [<ndp key> | all] list [all]

ndp (<ndp key> | all) ip addr [show]

ndp (<ndp key> | all) mac addr [show]

ndp (<ndp key> | all) type [show]

Deletendp (<ndp key> | all) delete

DescriptionThe ndp command provides the ability to display and modify the IPv6-to-Ethernet address translation tables used by the IPv6 neighbor discovery protocol.

ExamplesMaps the IPv6 address fec0:f515::c001 to the MAC address 00:0B:DB:3F:F6:57:

ndp fec0:f515::c001 00:0B:DB:3F:F6:57

Shows all static and dynamic IPv6 address-to-MAC address mapping:

ndp all show

Bigpipe Utility Reference Guide 3 - 133

Page 170: BIG IP Reference

Chapter 3

OptionsYou can use these options with the ndp command:

◆ allDisplays all static and dynamic IPv6 address-to-MAC address mapping.

◆ dynamicDisplays dynamic IPv6 address-to-MAC address mapping.

◆ ip addrSpecifies the IPv6 address to be mapped to the MAC address. For example: fec0:f515::c001.

◆ mac addrSpecifies a 6-byte Ethernet address in hexadecimal colon notation that is not case-sensitive. For example: 00:0b:09:88:00:9a. This option is required.

◆ staticDisplays static IPv6 address-to-MAC address mapping.

See alsoarp(1), bigpipe(1)

3 - 134

Page 171: BIG IP Reference

Bigpipe Utility Command Reference

nodeCreates, modifies, or displays node addresses and services.

SyntaxUse this command to create, modify, or display node addresses and services.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

node <node key> {}

node (<node key> | all) [{] <node arg list> [}]

<node key> ::=

<ip addr>

<node arg> ::=

addr <ip addr>

dynamic ratio <number>

limit <number>

monitor (default | <monitor key> |

<monitor key> and <monitor key> [and <monitor key> ...] |

min <number> of <monitor key list>)

(up | down)

ratio <number>

screen (<name> | none)

session (enable | disable)

node (<node key> | all) stats reset

Displaynode [<node key> | all] [show [all]]

node [<node key> | all] list [all]

node (<node key> | all) addr [show]

node (<node key> | all) dynamic ratio [show]

node (<node key> | all) limit [show]

node (<node key> | all) monitor [show]

node (<node key> | all) monitor state [show]

node (<node key> | all) partition [show]

Bigpipe Utility Reference Guide 3 - 135

Page 172: BIG IP Reference

Chapter 3

node (<node key> | all) ratio [show]

node (<node key> | all) screen [show]

node (<node key> | all) session [show]

node (<node key> | all) stats [show]

Deletenode (<node key> | all) delete

DescriptionDisplays information about nodes, and sets attributes of nodes and node IP addresses.

ExamplesDisplays information for all nodes in the system configuration:

node all show

Lists all nodes:

node all list

Removes all monitor associations from all nodes:

node all monitor none

Removes the default node monitor from all nodes. This command does not remove monitors that have been explicitly assigned to nodes:

node * monitor none

Removes all monitor associations from the node 10.10.10.15:

node 10.10.10.15 monitor none

OptionsYou can use these options with the node command:

◆ dynamic ratioSets the dynamic ratio number for the node. Used for dynamic ratio load balancing. The ratio weights are based on continuous monitoring of the servers and are therefore continually changing. Dynamic Ratio load balancing may currently be implemented on RealNetworks RealServer platforms, on Windows platforms equipped with Windows Management Instrumentation (WMI), or on a server equipped with either the UC Davis SNMP agent or Windows 2000 Server SNMP agent.

◆ limitSpecifies the maximum number of connections allowed for the node or node address.

◆ monitorSpecifies the name of the monitor that you want to associate with the node.

3 - 136

Page 173: BIG IP Reference

Bigpipe Utility Command Reference

◆ partitionDisplays the partition in which the node resides.

◆ ratioSpecifies the fixed ratio value used for a node during ratio load balancing.

◆ screen <name> | noneSpecifies the given name of the node, if any.

◆ sessionDisplays the current connections for the specified node.

◆ up | downMarks the node up or down.

See alsopool(1), monitor(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 137

Page 174: BIG IP Reference

Chapter 3

ntpConfigures the Network Time Protocol (NTP) daemon for the BIG-IP system.

SyntaxUse this command to configure the NTP servers for the system.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

ntp [{] <ntp arg list> [}]

<ntp arg> ::=

include (<string> | none)

servers (<ip addr list> | none) [add | delete]

timezone (<string> | none)

Displayntp [show [all]]

ntp list [all]

ntp include [show]

ntp servers [show]

ntp timezone [show]

DescriptionYou can use this command to configure the NTP servers for the system.

ExamplesAdds the NTP server with the IP address, 192.168.1.245, to the system:

ntp servers 192.168.1.245 add

Replaces the existing list of NTP servers with a single host, time.f5net.com:

ntp servers time.f5net.com

Sets the system time to Pacific Standard Time:

ntp timezone “America/Los Angeles”

3 - 138

Page 175: BIG IP Reference

Bigpipe Utility Command Reference

OptionsYou can use these options with the ntp command:

◆ include

Warning: Do not use this parameter without assistance from the F5 Technical Support team. The system does not validate the commands issued using the include parameter. If you use this parameter incorrectly, you put the functionality of the system at risk.

◆ partitionDisplays the partition within which the ntp object resides.

◆ serversAdds NTP servers to or deletes NTP servers from the BIG-IP system.

◆ timezoneSpecifies the time zone that you want to use for the system time.

See alsobigpipe(1), dns(1), httpd(1), snmpd(1), sshd(1)

Bigpipe Utility Reference Guide 3 - 139

Page 176: BIG IP Reference

Chapter 3

ocsp responderConfigures Online Certificate System Protocol (OCSP) responder objects.

SyntaxUse this command to create, modify, display, or delete an OCSP responder object.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

ocsp responder <ocsp responder key> {}

ocsp responder (<ocsp responder key> | all) [{] <ocsp responder arg list> [}]

<ocsp responder key> ::=

<name>

<ocsp responder arg> ::=

ca file (<file name> | none)

ca path (<string> | none)

certid digest (sha1 | md5)

certs (enable | disable)

chain (enable | disable)

check certs (enable | disable)

explicit (enable | disable)

ignore aia (enable | disable)

intern (enable | disable)

name <name>

sig verify (enable | disable)

sign digest (sha1 | md5)

sign key (<file name> | none)

sign key pass phrase (<string> | none)

sign other (<file name> | none)

signer (<file name> | none)

status age <number>

trust other (enable | disable)

url (<string> | none)

va file (<file name> | none)

3 - 140

Page 177: BIG IP Reference

Bigpipe Utility Command Reference

validity period <number>

verify (enable | disable)

verify cert (enable | disable)

verify other (<string> | none)

Displayocsp responder [<ocsp responder key> | all] [show [all]]

ocsp responder [<ocsp responder key> | all] list [all]

ocsp responder (<ocsp responder key> | all) ca file [show]

ocsp responder (<ocsp responder key> | all) ca path [show]

ocsp responder (<ocsp responder key> | all) certid digest [show]

ocsp responder (<ocsp responder key> | all) certs [show]

ocsp responder (<ocsp responder key> | all) chain [show]

ocsp responder (<ocsp responder key> | all) check certs [show]

ocsp responder (<ocsp responder key> | all) explicit [show]

ocsp responder (<ocsp responder key> | all) ignore aia [show]

ocsp responder (<ocsp responder key> | all) intern [show]

ocsp responder (<ocsp responder key> | all) name [show]

ocsp responder (<ocsp responder key> | all) partition [show]

ocsp responder (<ocsp responder key> | all) sig verify [show]

ocsp responder (<ocsp responder key> | all) sign digest [show]

ocsp responder (<ocsp responder key> | all) sign key [show]

ocsp responder (<ocsp responder key> | all) sign key pass phrase [show]

ocsp responder (<ocsp responder key> | all) sign other [show]

ocsp responder (<ocsp responder key> | all) signer [show]

ocsp responder (<ocsp responder key> | all) status age [show]

ocsp responder (<ocsp responder key> | all) trust other [show]

ocsp responder (<ocsp responder key> | all) url [show]

ocsp responder (<ocsp responder key> | all) va file [show]

ocsp responder (<ocsp responder key> | all) validity period [show]

ocsp responder (<ocsp responder key> | all) verify [show]

ocsp responder (<ocsp responder key> | all) verify cert [show]

ocsp responder (<ocsp responder key> | all) verify other [show]

Deleteocsp responder (<ocsp responder key> | all) delete

DescriptionTo implement the SSL OCSP authentication module, you must create the following objects: one or more OCSP responder objects, an SSL OCSP configuration object, and an SSL OCSP profile.

Bigpipe Utility Reference Guide 3 - 141

Page 178: BIG IP Reference

Chapter 3

OptionsYou can use these options with the ocsp responder command:

◆ ca fileSpecifies the name of the file containing trusted CA certificates used to verify the signature on the OCSP response.

◆ ca pathSpecifies the name of the path containing trusted CA certificates used to verify the signature on the OCSP response.

◆ certid digestSpecifies a specific algorithm identifier, either sha1 or md5. sha1 is newer and provides more security with a 160 bit hash length. md5 is older and has only a 128 bit hash length. The default value is sha1.

The cert ID is part of the OCSP protocol. The OCSP client (in this case, the BIG-IP system) calculates the cert ID using a hash of the Issuer and serial number for the certificate that it is trying to verify.

◆ certsEnables or disables the addition of certificates to an OCSP request. The default value is enable.

◆ chainConstructs a chain from certificates in the OCSP response. The default value is enable.

◆ check certsMakes additional checks to see if the signer's certificate is authorized to provide the necessary status information. Used for testing purposes only. The default value is enable.

◆ explicitSpecifies that the BIG-IP local traffic management system explicitly trusts that the OCSP response signer's certificate is authorized for OCSP response signing. If the signer's certificate does not contain the OCSP signing extension, specification of this setting causes a response to be untrusted. The default value is enable.

◆ ignore aiaCauses the system to ignore the URL contained in the certificate's AIA fields, and to always use the URL specified by the responder instead. The default value is disable.

◆ internCauses the system to ignore certificates contained in an OCSP response when searching for the signer's certificate. To use this setting, the signer's certificate must be specified with either the Verify Other or VA File setting. The default value is enable.

◆ partitionDisplays the partition within which the ocsp responder object resides.

3 - 142

Page 179: BIG IP Reference

Bigpipe Utility Command Reference

◆ sig verifyChecks the signature on the OCSP response. Used for testing purposes only. The default value is enable.

◆ sign keySpecifies the key that the system uses to sign an OCSP request.

◆ sign key pass phraseSpecifies the passphrase that the system uses to encrypt the sign key.

◆ sign otherAdds a list of additional certificates to an OCSP request.

◆ sign digestSpecifies the algorithm for signing the request, using the signing certificate and key. This parameter has no meaning if request signing is not in effect (that is, both the request signing certificate and request signing key parameters are empty). This parameter is required only when request signing is in effect. The default value is sha1.

◆ signerSpecifies a certificate used to sign an OCSP request. If the certificate is specified but the key is not specified, then the private key is read from the same file as the certificate. If neither the certificate nor the key is specified, then the request is not signed. If the certificate is not specified and the key is specified, then the configuration is considered to be invalid.

◆ status ageThe default value is 0.

◆ trust otherInstructs the BIG-IP local traffic management system to trust the certificates specified with the Verify Other setting. The default value is disable.

◆ urlSpecifies the URL used to contact the OCSP service on the responder. When using the ocsp responder command, you must specify a URL.

◆ va fileSpecifies the name of the file containing explicitly-trusted responder certificates. This parameter is needed in the event that the responder is not covered by the certificates already loaded into the responder's CA store.

◆ validity periodSpecifies the number of seconds used to specify an acceptable error range. This setting is used when the OCSP responder clock and a client clock are not synchronized, which could cause a certificate status check to fail. This value must be a positive number. The default value is 300 seconds.

◆ verifyEnables or disables verification of an OCSP response signature or the nonce values. Used for debugging purposes only. The default value is enable.

Bigpipe Utility Reference Guide 3 - 143

Page 180: BIG IP Reference

Chapter 3

◆ verify certThe default value is enable.

◆ verify otherSpecifies the name of the file used to search for an OCSP response signing certificate when the certificate has been omitted from the response.

See alsoauth ssl ocsp(1), profile auth(1), bigpipe(1)

3 - 144

Page 181: BIG IP Reference

Bigpipe Utility Command Reference

oneconnectDisplays or resets OneConnect™ statistics for the BIG-IP system.

SyntaxUse this command to display or reset OneConnect statistics for the BIG-IP system.

Displayoneconnect [show [all]]

Modifyoneconnect stats reset

DescriptionThe OneConnect feature optimizes the use of network connections by keeping server-side connections open and pooling them for reuse. You can use the oneconnect command to display or reset OneConnect statistics for the BIG-IP system.

See alsoprofile(1), profile oneconnect(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 145

Page 182: BIG IP Reference

Chapter 3

packet filterConfigures packet filter rules and trusted allow lists.

SyntaxUse this command to create, modify, display, or delete packet filtering.

Create/ModifyUse this syntax to create or modify packet filter rules:

packet filter <packet filter key> {}

packet filter (<packet filter key> | all) [{] <packet filter arg list> [}]

<packet filter key> ::=

<name>

<packet filter arg> ::=

action (none | accept | discard | reject | continue)

filter { <rule> }

log (enable | disable)

name <name>

order <number>

rate class (<rate class key> | none)

vlan (<vlan key> | none)

packet filter (<packet filter key> | all) stats reset

Use this syntax to modify the packet filter’s allow trusted lists:

packet filter {}

packet filter [{] <packet filter arg list> [}]

<packet filter arg> ::=

allow trusted <packet filter allow trusted>

<packet filter allow trusted> ::= [{] <packet filter allow trusted arg list> [}]

<packet filter allow trusted arg> ::=

addresses (<ip addr list> | none) [add | delete]

macs (<mac addr list> | none) [add | delete]

vlans (<vlan key list> | none) [add | delete]

packet filter <packet filter key> {}

Displaypacket filter [show [all]]

packet filter list [all]

packet filter allow trusted [show]

3 - 146

Page 183: BIG IP Reference

Bigpipe Utility Command Reference

Use this syntax to display allow trusted lists:

packet filter allow trusted vlans [show]

packet filter allow trusted macs [show]

packet filter allow trusted addresses [show]

Use this syntax to display packet filter rules:

packet filter (<packet filter key> | all) delete

packet filter [<packet filter key> | all] [show [all]]

packet filter [<packet filter key> | all] list [all]

packet filter (<packet filter key> | all) action [show]

packet filter (<packet filter key> | all) filter [show]

packet filter (<packet filter key> | all) log [show]

packet filter (<packet filter key> | all) name [show]

packet filter (<packet filter key> | all) order [show]

packet filter (<packet filter key> | all) rate class [show]

packet filter (<packet filter key> | all) stats [show]

packet filter (<packet filter key> | all) vlan [show]

Deletepacket filter (<packet filter key> | all) delete

DescriptionProvides the ability to create a layer of security for the traffic management system using packet filter rules or trusted allow lists.

The BIG-IP system packet filters are based on the Berkeley Software Design Packet Filter (BPF) architecture. Packet filter rules are composed of four mandatory attributes and three optional attributes. The mandatory attributes are name, order, action, and filter. The optional attributes are vlan, log, and rate class. The filter attribute you choose defines the BPF script to match for the rule.

Trusted allow lists are lists of IP addresses, MAC addresses, and VLANs that you want to allow to bypass the packet filter.

Important

You must enable the packet filter flag using the Configuration utility, for any packet filter configuration to work. By default, the packet filter flag is disabled.

Bigpipe Utility Reference Guide 3 - 147

Page 184: BIG IP Reference

Chapter 3

Trusted allow list exampleCreate a trusted allow list that allows anything listed to bypass the packet filter.

packet filter allow trusted {

vlan internal1 internal2

mac 00:02:3F:3E:2F:FE

}

In this example, you have an administrative laptop that you want to have unrestricted access to the traffic management system. This is a laptop, and therefore it might have a different IP address from time to time. One way to solve the problem is to add a trusted MAC address. A trusted MAC address is a MAC address that passes MAC address-based authentication.

This trusted allow list example shows the laptop MAC address as 00:02:3F:3E:2F:FE. Now the laptop can access the traffic management system regardless of what address it boots with or to which VLAN it is connected, as long as it is on the same physical segment as the traffic management system.

Also in this example, the traffic management system is configured with a basic firewall for the internal network. This example shows a way to filter incoming traffic and allow outgoing traffic to be unrestricted. To do this, you add trusted VLANs that represent all traffic that originated on the internal network.

Note

Another way to do this is to allow trusted IP addresses instead, for example: 192.168.26.0/24.

Packet filter rules examplesYou can create a set of rules that specify what incoming traffic to accept and how to accept it. See the examples following.

Example 1: Block spoofed addressesThis example prevents private IP addresses from being accepted on a public VLAN. This is a way of ensuring that no one can spoof private IP addresses through the external VLAN of the system. In this example, the system logs when this happens.

packet filter spoof_blocker {

order 5

action discard

vlan external

log enable

filter {( src net 172.19.255.0/24 )}

}

3 - 148

Page 185: BIG IP Reference

Bigpipe Utility Command Reference

Example 2: Allow restricted management accessYou can allow restricted SSH and HTTPS access to the traffic management system for management purposes, and keep a log of that access. However, note that this is not the same management access you can get through the management port/interface (MGMT); that interface is not affected by any packet filter configuration and if that is the only way you want to allow access to your system, this configuration is not necessary.

In the first rule, shown below, SSH is allowed access from a single fixed-address administrative workstation, and each access is logged. In the second rule, browser-based Configuration utility access is allowed from two fixed-address administrative workstations, however, access is not logged.

packet filter management_ssh {

order 10

action accept

log enable

filter {( proto TCP ) and ( src host 172.19.254.10 ) and ( dst port 22 )}

}

packet filter management_gui {

order 15

action accept

filter {( proto TCP ) and ( src host 172.19.254.2 or src host 172.19.254.10 ) and \

( dst port 443)}

}

Example 3: Allow access to all virtual serversIn this final example, you can verify that all of the virtual servers in your configuration are reachable from the public network. This is critical if you have decided to use a default-deny policy. A default-deny policy restricts Internet access to everything that is not explicitly permitted. This example also shows how to rate shape all traffic to the virtual server IP address with a default rate class (that can be overridden by individual virtual servers or iRules™ later).

Note

This example has a single virtual server IP, and it does not matter what interface the traffic is destined for. If you want to be more specific, you could specify each service port, as well (for example, HTTP, FTP, Telnet, and so on).

packet filter virtuals {

order 20

action accept

vlan external

rate class root

filter {( dst host 172.19.254.80 )}

}

Bigpipe Utility Reference Guide 3 - 149

Page 186: BIG IP Reference

Chapter 3

OptionsYou can use these options with the packet filter command to create packet filter rules:

◆ actionSpecifies the action that the packet filter rule should take. The values for action are: accept, discard, reject, continue, and none. There is no default; you must specify a value when you create a packet filter rule.

◆ filterSpecifies the BPF expression to match. The filter is mandatory, however you can leave it empty. If empty, the packet filter rule matches all packets.

◆ logEnables or disables packet filter logging. If you omit this value, no logging is performed.

◆ orderSpecifies a sort order. The values for the sort order are all integers between 0 and 999, inclusive. No two rules may have the same sort order.

There is a single, global list of rules. Each rule in the list has a relative integer sort-order. The rule with the lowest sort-order value is always evaluated first, the rule with the highest sort-order value is always evaluated last, and all other rules are evaluated in-between in order based on ascent of their sort-order value.

For example, if there are five rules, numbered 500, 100, 300, 200, 201; the rule evaluation order is 100, 200, 201, 300, 500.

Each packet to be filtered is compared against the list of rules in sequence, starting with the first. Evaluation of the rule list stops on the first match that has an action of accept, discard, or reject. A match on a rule with an action of none does not stop further evaluation of the rule list; the statistics count is updated and a log is generated if the rule indicates it, but otherwise rule processing continues with the next rule in the list.

Rules should be sequenced for effect and efficiency by the user; generally this means:

• More specific rules should be evaluated first, and thus have the lowest sort orders.

• One expression with multiple criteria is likely to evaluate more efficiently than multiple expressions each with a single criterion.

This is a required setting.

◆ rate classSpecifies the name of a rate class. The value for the rate class association is the name of any existing rate class. If omitted, no rate filter is applied.

3 - 150

Page 187: BIG IP Reference

Bigpipe Utility Command Reference

◆ vlanSpecifies the VLAN to which the packet filter rule should apply. The value for this option is any VLAN name currently in existence. If you omit this value, the rule applies to all VLANs.

You can use these options with the packet filter command to create trusted allow lists:

◆ addressesSpecifies a list of source IP addresses. Any traffic matching a source IP in the list is automatically allowed. This simplifies configuration of the packet filter to allow trusted internal traffic to be passed from VLAN to VLAN without a filter rule, including out to the Internet. Processing of traffic by this option occurs before rule list evaluation, making it impossible to override this option and mask out (block) certain types of traffic with a packet filter rule. This option is empty by default.

◆ macsSpecifies a list of MAC addresses. The system allows any traffic matching a MAC address in the source address list. This simplifies configuration of the packet filter to allow trusted internal traffic to be passed from VLAN to VLAN without a filter rule, including out to the Internet. Processing of traffic by this option occurs before rule list evaluation, making it impossible to override this option and mask out (block) certain types of traffic with a packet filter rule. This option is empty by default.

◆ vlansSpecifies a list of ingress VLANs. Any traffic matching received on a VLAN in the ingress VLAN list is automatically allowed. This simplifies configuration of the packet filter to allow trusted internal traffic to be passed from VLAN to VLAN without a filter rule, including out to the Internet. Processing of traffic by this option occurs before rule list evaluation, making it impossible to override this option and mask out (block) certain types of traffic with a packet filter rule. This option is empty by default.

See alsorate class(1), virtual(1), vlan(1), vlangroup(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 151

Page 188: BIG IP Reference

Chapter 3

partitionCreates, modifies, displays, and deletes administrative partitions that implement access control for the BIG-IP system users.

SyntaxUse this command to create, modify, and delete administrative partitions that implement access control for the BIG-IP system users. To use this command, you must have the Administrator user role assigned to your user account.

Create/Modifypartition <partition key> {}

partition (<partition key> | all) [{] <partition arg list> [}]

<partition key> ::=

<name>

<partition arg> ::=

description (<string> | none)

name <name>

Displaypartition [<partition key> | all] [show [all]]

partition [<partition key> | all] list [all]

partition (<partition key> | all) description [show]

partition (<partition key> | all) name [show]

Deletepartition (<partition key> | all) delete

DescriptionAn administrative partition is a logical container that you create, containing a defined set of BIG-IP system objects, such as virtual servers, pools, and profiles. When a specific set of objects resides in a partition, you can then give certain users the authority to view and manage the objects in that partition only, rather than to all objects on the BIG-IP system. This gives a finer degree of administrative control.

3 - 152

Page 189: BIG IP Reference

Bigpipe Utility Command Reference

OptionsYou can use this option with the partition command:

◆ descriptionSpecifies a description of the partition, for example: This partition contains local traffic management objects for managing HTTP traffic.

See alsouser(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 153

Page 190: BIG IP Reference

Chapter 3

password policySpecifies the parameters of the valid passwords for the BIG-IP system.

SyntaxUse this command to create a password policy for the BIG-IP system to enforce your company's security requirements.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

password policy [{] <password policy arg list> [}]

<password policy arg> ::=

max days <number>

min days <number>

min length <number>

remember <number>

required lowercase <number>

required numeric <number>

required special <number>

required uppercase <number>

strict (enable | disable)

warn age <number>

Displaypassword policy [show [all]]

password policy list [all]

password policy max days [show]

password policy min days [show]

password policy min length [show]

password policy remember [show]

password policy required lowercase [show]

password policy required numeric [show]

password policy required special [show]

3 - 154

Page 191: BIG IP Reference

Bigpipe Utility Command Reference

password policy required uppercase [show]

password policy strict [show]

password policy warn age [show]

DescriptionThis command provides the ability to define the parameters of valid passwords on the BIG-IP system.

ExamplesCreates a password policy that specifies that passwords are valid for a maximum of 90 days, and a minimum of 30 days. Also specifies that to be valid, a password must contain at least six characters, but not more than 10 characters, including two lowercase alpha characters, two uppercase alpha characters, and one number. Also states that the system automatically warns users five days before their passwords expire:

password policy max days 90 min days 30 min length 6 max length 10 required lowercase 2 \required uppercase 2 required special 1 required numeric 1 warn age 5

OptionsYou can use these options with the password policy command.

◆ max daysSpecifies the maximum number of days a password is valid. The default value is 99999.

◆ min daysSpecifies the minimum number of days a password is valid. The default value is 0 (zero).

◆ min lengthSpecifies the minimum number of characters in a valid password. The default value is 6.

◆ partitionDisplays the partition within which the password policy resides.

◆ rememberSpecifies whether the user has configured the BIG-IP system to remember a password on a specific computer. The default value is 0 (zero).

◆ required lowercaseSpecifies the number of lowercase alpha characters that must be present in a password for the password to be valid. The default value is 0 (zero).

◆ required numericSpecifies the number of numeric characters that must be present in a password for the password to be valid. The default value is 0 (zero).

◆ required specialSpecifies the number of special characters that must be present in a password for the password to be valid. The default value is 0 (zero).

Bigpipe Utility Reference Guide 3 - 155

Page 192: BIG IP Reference

Chapter 3

◆ required uppercaseSpecifies the number of uppercase alpha characters that must be present in a password for the password to be valid. The default value is 0 (zero).

◆ strictEnables or disables the password policy on the BIG-IP system. The default value is disable.

◆ warn ageSpecifies the number of days before a password expires. Based on this value, the BIG-IP system automatically warns users when their password is about to expire. The default value is 7.

See alsobigpipe(1), user(1), remote_users(1), remoterole(1)

3 - 156

Page 193: BIG IP Reference

Bigpipe Utility Command Reference

persistConfigures persistence for the system and manages the persistence table entries on the system.

SyntaxUse this command to configure persistence for the system and to manage the persistence table entries on the system. For information on configuring session persistence for a virtual server, see profile persist, on page 3-214.

Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

Use this syntax to configure persistence on the system:

persist [{] <persist arg list> [}]

<persist arg> ::=

dest addr limit (timeout | maxcount)

dest addr max <number>

proxy group (<string> | none)

Use this syntax to manage the persistence table entries:

persist <persist key> {}

persist <persist key> [{] <persist arg list> [}]

<persist key> ::=

[pool <pool key>] [virtual <virtual key>] \ [node (<ip addr> | <member>)] [mode (none | \ source addr | dest addr | cookie | msrdp | ssl | \ sip | universal | hash)] [key (<string> | none)] \ [client (<ip addr> | none)]

Displaypersist [show [all]]

persist list [all]

persist dest addr limit [show]

persist dest addr max [show]

persist proxy group [show]

Bigpipe Utility Reference Guide 3 - 157

Page 194: BIG IP Reference

Chapter 3

Deletepersist (<persist key> | all) delete

DescriptionYou can use the persist command to configure persistence for the BIG-IP system. You can also use the persist command to manage the records in the persistence table of the system. If you specify a parameter for persist key, you must specify a mode and no other parameter than mode.

ExamplesDisplays all persistence records with a mode of source addr:

persist mode source addr

Displays all persistence records persisting to node 11.12.13.10:80:

persist node 11.12.13.10:80 show

OptionsYou can use these options to configure persistence for the BIG-IP system:

◆ dest addr limitSpecifies that the persistence session is limited by either the number of seconds before the persistence entry times out, or by a maximum number of requests to the destination address.

◆ dest addr maxSpecifies the maximum number of entries that can be in the persistence table at any one time when using the destination address affinity mode and when the option dest addr limit is set to maxcount. The default value is 2048 entries.

◆ partitionDisplays the partition within which the persist object resides.

◆ proxy groupSpecifies a group of servers that are configured to process all of the requests from a single source address during a persistence session.

You can use these options to manage the persistence table entries:

◆ modeSpecifies the type of persistence you are setting up for the system. The following options are available:

• clientWhen you specify source addr for the mode option, use this option to specify the IP address on which the session persists.

• cookieCookie persistence uses an HTTP cookie stored on a client's computer to allow the client to connect to the same server previously visited at a web site.

3 - 158

Page 195: BIG IP Reference

Bigpipe Utility Command Reference

• dest addrAlso known as sticky persistence, destination address affinity persistence supports TCP and UDP protocols, and directs session requests to the same server based solely on the destination IP address of a packet.

• hashHash persistence is based on an existing iRule.

• keySpecifies a string for the system to use to persist a client session.

• msrdpMSRDP persistence provides an efficient way of load balancing traffic and maintaining persistent sessions between Windows clients and servers that are running the Microsoft Terminal Services service. The recommended scenario for enabling the MSRDP persistence feature is to create a load balancing pool that consists of members running Windows Server 2003, Enterprise Edition, or later, where all members belong to a Windows cluster and participate in a Windows session directory.

• sipSession Initiation Protocol (SIP) persistence is a type of persistence available for server pools. You can configure SIP persistence for proxy servers that receive SIP messages sent through UDP. The BIG-IP system currently supports persistence for SIP messages sent through UDP, TCP, or SCTP.

• source addrAlso known as simple persistence, source address affinity persistence supports TCP and UDP protocols, and directs session requests to the same server based solely on the source IP address of a packet. When you specify source addr as the mode of persistence, you must specify an IP address using the client option.

• sslSSL persistence is a type of persistence that tracks non-terminated SSL sessions, using the SSL session ID. Even when the client's IP address changes, the system still recognizes the connection as being persistent based on the session ID. Note that the term, non-terminated SSL sessions, refers to sessions in which the system does not perform the tasks of SSL certificate authentication and encryption/re-encryption.

• universalUniversal persistence allows you to write an expression that defines what to persist on in a packet. The expression, written using the same expression syntax that you use in iRules™, defines some sequence of bytes to use as a session identifier.

◆ nodeIndicates the node with which the client session remains persistent.

Bigpipe Utility Reference Guide 3 - 159

Page 196: BIG IP Reference

Chapter 3

◆ poolIndicates the pool member with which the client session remains persistent.

◆ virtualIndicates the virtual server with which the client session remains persistent.

See alsoprofile persist(1), virtual(1), bigpipe(1)

3 - 160

Page 197: BIG IP Reference

Bigpipe Utility Command Reference

platformDisplays information about the BIG-IP system platform.

SyntaxUse this command to display information about the system platform, including name and number, the license level of the installed hardware SSL compression cards, the amount of installed memory, the type and speed of the CPU, the PVA type (if present), and a list of licensed and enabled modules, such as the BIG-IP® Global Traffic Manager.

Displayplatform [show [all]]

platform base mac [show]

platform bios rev [show]

platform chassis 400 level bom num [show]

platform chassis slot id [show]

platform enable cmp ffp [show]

platform has pva [show]

platform host [show]

platform lacp capable [show]

platform mac offset free [show]

platform mac offset last [show]

platform marketing name [show]

platform max cluster size [show]

platform max static l2 [show]

platform max trunks [show]

platform max vlans [show]

platform mstp capable [show]

platform name [show]

platform netreboot capable [show]

platform num static l2 [show]

platform num trunks [show]

platform phy memory [show]

platform phy memory bytes [show]

platform portmirror capable [show]

platform pva version [show]

platform securekey capable [show]

platform stp capable [show]

platform system type [show]

platform trnk id mode [show]

platform valid baud rates [show]

platform wildcat serial num [show]

Bigpipe Utility Reference Guide 3 - 161

Page 198: BIG IP Reference

Chapter 3

DescriptionDisplay platform statistics such as CPU fan speed and temperature, chassis temperature, and power supply status.

ExamplesThis command:

platform show all

Displays the following information:

PLATFORM INFORMATION -

Type

Chassis serial number and part number

Switch board serial number and part number

Host board serial number and part number

Annunciator board serial number and part number

BIOS Rev

base MAC

CPU temp and fan speed

CHASSIS TEMPERATURE

CHASSIS FAN status

POWER SUPPLY status

This command:

platform base mac [show]

Displays the following information:

PLATFORM - base mac: 00:01:D7:2C:9F:40

See alsobigpipe(1)

3 - 162

Page 199: BIG IP Reference

Bigpipe Utility Command Reference

poolConfigures load balancing pools on the traffic management system.

SyntaxUse this command to create, modify, display, or delete a load balancing pool.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

pool <pool key> {}

pool (<pool key> | all) [{] <pool arg list> [}]

<pool key> ::=

<name>

<pool arg> ::=

action on svcdown (none | reset | drop | reselect)

ip tos to client (<number> | mimic | pass)

ip tos to server (<number> | mimic | pass)

lb method (round robin | rr | member ratio | member least conn | member observed | member predictive | ratio | node ratio | least conn | fastest | observed | predictive | dynamic ratio | fastest app resp | least sessions | member dynamic ratio | l3 addr)

link qos to client (<number> | mimic | pass)

link qos to server (<number> | mimic | pass)

members (<pool member list> | none) [add | delete]

min active members <number>

min up members <number>

min up members (enable | disable)

min up members (reboot | restart | failover | go active | no action | restart all | failover restart tm | failover abort tm | go offline | go offline restart | go offline abort tm | go offline downlinks | go offline downlinks restart)

monitor all (none | <monitor key> |

<monitor key> and <monitor key> [and <monitor key> ...] |

min <number> of <monitor key list>

name <name>

nat (enable | disable)

reselect tries <number>

slow ramp time <number>

Bigpipe Utility Reference Guide 3 - 163

Page 200: BIG IP Reference

Chapter 3

snat (enable | disable)

unit <number>

<pool member> ::= (<pool member key> | all) [{] <pool member arg list> [}]

<pool member key> ::=

<member>

<pool member arg> ::=

addr <member>

dynamic ratio <number>

limit <number>

monitor (default | <monitor key> |

<monitor key> and <monitor key> [and <monitor key> ...] |

min <number> of <monitor key list>)

(up | down)

priority <number>

ratio <number>

session (enable | disable)

weight <number>

pool (<pool key> | all) stats reset

Displaypool [<pool key> | all] [show [all]]

pool [<pool key> | all] list [all]

pool (<pool key> | all) action on svcdown [show]

pool (<pool key> | all) ip tos to client [show]

pool (<pool key> | all) ip tos to server [show]

pool (<pool key> | all) lb method [show]

pool (<pool key> | all) link qos to client [show]

pool (<pool key> | all) link qos to server [show]

pool (<pool key> | all) members (<pool member key> | all) stats reset

pool (<pool key> | all) members [<pool member key> | all] [show [all]]

pool (<pool key> | all) members [<pool member key> | all] list [all]

pool (<pool key> | all) members (<pool member key> | all) addr [show]

pool (<pool key> | all) members (<pool member key> | all) dynamic ratio [show]

pool (<pool key> | all) members (<pool member key> | all) limit [show]

pool (<pool key> | all) members (<pool member key> | all) monitor [show]

pool (<pool key> | all) members (<pool member key> | all) monitor state [show]

pool (<pool key> | all) members (<pool member key> | all) pool name [show]

pool (<pool key> | all) members (<pool member key> | all) priority [show]

pool (<pool key> | all) members (<pool member key> | all) ratio [show]

pool (<pool key> | all) members (<pool member key> | all) session [show]

pool (<pool key> | all) members (<pool member key> | all) stats [show]

pool (<pool key> | all) members (<pool member key> | all) weight [show]

pool (<pool key> | all) min active members [show]

pool (<pool key> | all) min up members [show]

3 - 164

Page 201: BIG IP Reference

Bigpipe Utility Command Reference

pool (<pool key> | all) monitor all [show]

pool (<pool key> | all) name [show]

pool (<pool key> | all) nat [show]

pool (<pool key> | all) partition [show]

pool (<pool key> | all) reselect tries [show]

pool (<pool key> | all) slow ramp time [show]

pool (<pool key> | all) snat [show]

pool (<pool key> | all) stats [show]

pool (<pool key> | all) unit [show]

Deletepool (<pool key> | all) delete

DescriptionThe pool command creates, deletes, modifies, and displays the pool definitions on the traffic management system. Pools group the member servers together to use a common load balancing algorithm.

ExamplesCreates a pool with two members 10.2.3.11, and 10.2.3.12, where both members use the round robin load balancing method, and the default HTTP monitor checks for member availability:

pool mypool {

monitor all http

member 10.2.3.11:http

member 10.2.3.12:http

}

Deletes the pool mypool: (Note that all references to a pool must be removed before a pool may be deleted.)

pool mypool delete

Displays statistics for all pools:

pool show

Displays settings of pool mypool:

pool mypool show

Bigpipe Utility Reference Guide 3 - 165

Page 202: BIG IP Reference

Chapter 3

OptionsYou can use these options with the pool command:

◆ <pool key>Specifies a list of pool names separated by a space. A pool name is a string from 1 to 31 characters, for example: new_pools.

◆ action on svcdownSpecifies the action to take if the service specified in the pool is marked down. Possible values are none, reset, drop, or reselect. You can specify no action with none, you can reset the system with reset, you can drop connections using drop, or you can reselect a node for the next packet that comes in on a Layer 4 connection if the existing connection’s service is marked down by specifying reselect. The default value is none.

◆ <ip:service>Specifies an IP address and service being assigned to a pool as a member. For example: 10.2.3.12:http.

◆ ip tos to client and ip tos to serverSpecifies the Type of Service (ToS) level to use when sending packets to a client or server. The default value is 65535.

◆ lb methodSpecifies the load balancing mode that the system is to use for the specified pool.

• dynamic ratioSpecifies a range of numbers that you want the system to use in conjunction with the ratio load balancing method. The default ratio number is 1.

• fastestIndicates that the system passes a new connection based on the fastest response of all currently active nodes in a pool. This method may be particularly useful in environments where nodes are distributed across different logical networks.

• fastest app respIndicates that the system passes a new connection based on the fastest application response of all currently active nodes in a pool.

• l3 addrIndicates that the system passes connections sequentially to each member configured using its IP address. The IP address is a Layer 3 address.

• least connIndicates that the system passes a new connection to the node that has the least number of current connections.

• least sessionsIndicates that the system passes a new connection to the node that has the least number of current sessions. Least Sessions methods work best in environments where the servers or other equipment you are load balancing have similar capabilities. This is a dynamic load

3 - 166

Page 203: BIG IP Reference

Bigpipe Utility Command Reference

balancing method, distributing connections based on various aspects of real-time server performance analysis, such as the current number of sessions

• member dynamic ratioIndicates that the system passes a new connection to the member based on continuous monitoring of the servers, which are continually changing. This is a dynamic load balancing method, distributing connections based on various aspects of real-time server performance analysis, such as the current number of connections per node or the fastest node response time.

• member least connIndicates that the system passes a new connection to the member that has the least number of current connections.

• member observedIndicates that the system passes connections sequentially to each member based on observed status of the member.

• member predictiveIndicates that the system passes connections sequentially to each member based on a predictive algorithm.

• member ratioSpecifies a ratio number that you want the system to use in conjunction with the ratio load balancing method. The default ratio number is 1.

• node ratioSpecifies a ratio number that you want the system to use in conjunction with the ratio load balancing method. The default ratio number is 1.

• observedIndicates that the system passes connections sequentially to each node based on observed status of the member.

• predictiveIndicates that the system passes connections sequentially to each node based on a predictive algorithm.

• rrIndicates that the system passes connections sequentially to each member. Round Robin is the default load balancing method.

◆ link qos to client and link qos to serverSpecifies the Quality of Service (QoS) level to use when sending packets to a client or server. The default value is 0.

◆ min active membersSpecifies the minimum number of members that must remain available for traffic to be confined to a priority group when using priority-based activation. The default value is 0.

◆ min up members Enables or disables this feature. The default value is disable.

Bigpipe Utility Reference Guide 3 - 167

Page 204: BIG IP Reference

Chapter 3

You can also specify the minimum number of members that must remain up for traffic to be confined to a priority group when using priority-based activation. If the number specified is exceeded, the action specified happens. The default value is 0.

You can also specify for the system to failover if the min up members number is exceeded.

◆ monitor allCreates a monitor rule for the pool. You can specify a monitor rule that marks the pool down if the specified number of monitors are not successful.

◆ natEnables or disables NAT connections for the pool.

◆ partitionDisplays the partition within which the pool resides.

◆ prioritySpecifies a priority that you want to assign to a pool member, to ensure that traffic is directed to that member before being directed to a member of a lower priority.

◆ slow ramp time Provides the ability to cause a pool member that has just been enabled, or marked up, to receive proportionally less traffic than other members in the pool. The proportion of traffic the member accepts is determined by how long the member has been up in comparison to the slow ramp time set for the pool. For example, if a pool using round robin has a slow ramp time of 60 seconds, and the pool member has been up for only 30 seconds, it receives approximately half the amount of new traffic as other pool members that have been up for more than 60 seconds. At 45 seconds, it receives approximately three quarters of the new traffic. Slow ramp time is particularly useful for least connections load balancing mode. The default value is 0.

◆ snatEnables or disables SNAT connections for the pool.

◆ unitSpecifies the unit number used by this pool in an active-active redundant system configuration.

See alsomonitor(1), node(1), virtual(1), bigpipe(1)

3 - 168

Page 205: BIG IP Reference

Bigpipe Utility Command Reference

profileDisplays profile settings, resets statistics, or deletes a profile.

SyntaxUse this command to display profile settings, reset statistics, or delete a profile.

Modifyprofile (<profile key> | all) [{] <profile arg list> [}]

<profile key> ::=

<name>

<profile arg> ::=

name <name>

profile (<profile key> | all) stats reset

Displayprofile [<profile key> | all] [show [all]]

profile [<profile key> | all] list [all]

profile (<profile key> | all) name [show]

Deleteprofile (<profile key> | all) delete

DescriptionYou can use this command to display or delete existing profiles. You can also reset statistics for an existing profile or display the configuration for a profile.

ExamplesDisplays all profiles on the system (includes all system profiles):

profile all show

See alsoprofile auth(1), profile clientssl(1), profile fastl4(1), profile fastthttp(1), profile ftp(1), profile http(1), profile oneconnect(1), profile persist(1), profile serverssl(1), profile statistics(1), profile stream(1), profile tcp(1), profile udp(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 169

Page 206: BIG IP Reference

Chapter 3

profile authConfigures a type of authentication profile.

SyntaxUse this command to create, modify, display, or delete a type of authentication profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile auth <profile auth key> {}

profile auth (<profile auth key> | all) [{] <profile auth arg list> [}]

<profile auth key> ::=

<name>

<profile auth arg> ::=

config (<name> | none)

cookie key (<string> | none)

cookie name <name>

credential source http basic auth

defaults from (<profile auth key> | none)

idle timeout (<number> | immediate | indefinite)

mode (disable | enable)

name <name>

rule (<rule key> | none)

type (ldap | radius | ssl cc ldap | ssl ocsp | tacacs | generic | ssl crldp | \ krbdelegate)

profile auth (<profile auth key> | all) stats reset

Displayprofile auth [<profile auth key> | all] [show [all]]

profile auth [<profile auth key> | all] list [all]

profile auth (<profile auth key> | all) config [show]

profile auth (<profile auth key> | all) cookie key [show]

profile auth (<profile auth key> | all) cookie name [show]

profile auth (<profile auth key> | all) credential source [show]

3 - 170

Page 207: BIG IP Reference

Bigpipe Utility Command Reference

profile auth (<profile auth key> | all) defaults from [show]

profile auth (<profile auth key> | all) idle timeout [show]

profile auth (<profile auth key> | all) mode [show]

profile auth (<profile auth key> | all) name [show]

profile auth (<profile auth key> | all) partition [show]

profile auth (<profile auth key> | all) rule [show]

profile auth (<profile auth key> | all) stats [show]

profile auth (<profile auth key> | all) type [show]

Deleteprofile auth (<profile auth key> | all) delete

DescriptionCreate, modify, display, or delete an authentication profile. An authentication profile is an object that specifies the type of authentication module you want to implement, a parent profile, and the configuration object. For example, you can use the profile auth command to create a TACACS+ profile (see example following). You can either use the default profile that the BIG-IP local traffic management system provides for each type of authentication module or create a custom profile. The types of authentication profiles you can create with the profile auth command are: LDAP, SSL CC LDAP, RADIUS, TACACS+, SSL OCSP, and CRLDP.

ExamplesCreates a profile named mytacacs_profile for TACACS+ authentication:

profile auth mytacacs_profile {

config mytacacs_profile config credential source http basic auth defaults from tacacs \ mode enable type tacacs rule myrule1 idle timeout 60

}

Example of auth module implementationFor example, to configure the LDAP authentication module, create the following objects.

1. Create an LDAP configuration object using the auth ldap command.

2. Create an LDAP profile, in which you specify the authentication module type as LDAP, specify a parent profile (either the default ldap profile or another custom profile that you created), and reference the LDAP configuration object. Use the profile auth command.

3. Configure the virtual server to reference the custom LDAP profile, using the virtual command.

Bigpipe Utility Reference Guide 3 - 171

Page 208: BIG IP Reference

Chapter 3

OptionsYou can use these options with the profile auth command:

◆ configSpecifies the type of authentication profile that you are creating. You can specify an LDAP, RADIUS, TACACS+, SSL client certificate, SSL OCSP, or CRLDP configuration object. This setting is required.

◆ cookie key/nameThe cookie name is only used for the kerberos delegation module. It is a unique session cookie assigned to each user. Each virtual server should use a different cookie name. The unique cookie is encrypted in a key. Each site should use a different key.

◆ credential sourceSpecifies the credential source as http basic auth or default. For LDAP, RADIUS, and TACACS+, specify http basic auth for the credential source. For SSL client certificate or SSL OCSP specify default.

◆ defaults fromSpecifies the name of the default authentication profile from which you want your custom profile to inherit settings. This setting is required.

◆ idle timeoutSets the idle timeout for the auth profile. The options are a number, immediate, indefinite, or default. The default value is 300 seconds.

◆ modeSpecifies the profile mode. The options are enable, disable, or default. The default value is enable.

◆ partitionDisplays the partition in which the authentication profile resides.

◆ ruleSpecifies the name of the default rule or custom rule that corresponds to the authentication method you want to use.

◆ typeSpecifies the type of authentication profile that you want use. The following types are available:

• genericUnlike the other authentication profile types, when you use the command line interface to create a generic authentication profile, you must manually create or edit a pluggable authentication module (PAM) configuration file. The name of this configuration file for a given authentication profile is /etc/pam.d/tmm_{name}, where {name} is the name of the profile instance. The bigpipe utility displays an informational message that specifies the file to create or edit when you manipulate a generic authentication profile. F5 recommends that only users with PAM expertise use this advanced feature.

3 - 172

Page 209: BIG IP Reference

Bigpipe Utility Command Reference

• ldapAn LDAP authentication module is a mechanism for authenticating or authorizing client connections passing through a traffic management system. This module is useful when your authentication or authorization data is stored on a remote LDAP server or a Microsoft Windows Active Directory server, and you want the client credentials to be based on basic HTTP authentication (that is, user name and password). You configure an LDAP authentication module by creating an LDAP configuration object, and creating an LDAP profile.

• radiusBy creating a RADIUS profile and one or more RADIUS server objects, you can implement the RADIUS authentication module as the mechanism for authenticating client connections passing through the BIG-IP local traffic management system. You use this module when your authentication data is stored on a remote RADIUS server. In this case, client credentials are based on basic HTTP authentication (that is, user name and password). To implement the RADIUS authentication module, you must create the following objects: one or more high-level RADIUS server objects, a RADIUS configuration object, and a RADIUS profile. After you create these objects, you must assign the RADIUS profile to a virtual server.

• ssl cc ldapUsing an SSL client certificate LDAP configuration object and profile, you can implement the SSL client certificate LDAP authentication module as the mechanism for authorizing client connections passing through a traffic management system. In this case, client credentials are based on SSL certificate credentials instead of user name and password. LDAP client authorization is based not only on SSL certificates, but also on user groups and roles that you define.

• ssl crldpA Certificate Revocation List Distribution Point (CRLDP) authentication module is a mechanism for handling certificate revocations on a network, for client connections passing through the BIG-IP system. To implement the CRLDP authentication module, you must create the following objects: One or more high-level CRLDP server objects, a CRLDP configuration object, and a CRLDP profile. After you create these objects, you must assign the RADIUS profile to a virtual server.

• ssl ocspOnline Certificate Status Protocol (OCSP) is an industry-standard protocol that offers an alternative to a certificate revocation list (CRL) when using public-key technology. A CRL is a list of revoked client certificates, which a server system can check during the process of verifying a client certificate. The BIG-IP local traffic management system supports both CRLs and the OCSP protocol. To implement the SSL OCSP authentication module, you must create the following objects: one or more high-level SSL OCSP responder objects, an SSL

Bigpipe Utility Reference Guide 3 - 173

Page 210: BIG IP Reference

Chapter 3

OCSP configuration object, and an SSL OCSP profile. After you create these objects, you must assign the SSL OCSP profile to a virtual server.

• tacacsUsing a TACACS+ profile, you can implement the TACACS+ authentication module as the mechanism for authenticating client connections passing through a traffic management system. You use this module when your authentication data is stored on a remote TACACS+ server. In this case, client credentials are based on basic HTTP authentication (that is, user name and password). You configure a TACACS+ authentication module by creating a TACACS+ configuration object, and then creating a TACACS+ profile.

See alsoauth crldp(1), auth ldap(1), auth radius(1), auth ssl cc ldap(1), auth ssl ocsp(1), auth tacacs(1), bigpipe(1)

3 - 174

Page 211: BIG IP Reference

Bigpipe Utility Command Reference

profile clientsslConfigures a Client SSL profile.

SyntaxUse this command to create, display, modify, or delete a Client SSL profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile clientssl <profile clientssl key> {}

profile clientssl (<profile clientssl key> | all) [{] <profile clientssl arg list> [}]

<profile clientssl key> ::=

<name>

<profile clientssl arg> ::=

alert timeout (<number> | immediate | indefinite)

authenticate (always | once)

authenticate depth <number>

ca file (<file name> | none)

cache size <number>

cache timeout (<number> | immediate | indefinite)

cert (<file name> | none)

chain (<file name> | none)

ciphers (<string> | none)

client cert ca (<file name> | none)

crl file (<file name> | none)

defaults from (<profile clientssl key> | none)

handshake timeout (<number> | immediate | indefinite)

key (<file name> | none)

mode (disable | enable)

modssl methods (enable | disable)

name <name>

nonssl (enable | disable)

options [all bugfixes] [cipher server preference] [dont insert empty fragments] \ [ephemeral rsa] [microsoft big sslv3 buffer] [msie sslv2 rsa padding] \ [netscape ca dn bug] [netscape challenge bug] [netscape demo cipher change bug] \ [netscape reuse cipher change bug] [no session resumption on renegotiation] \

Bigpipe Utility Reference Guide 3 - 175

Page 212: BIG IP Reference

Chapter 3

[no sslv2] [no sslv3] [no tlsv1] [passive close] [pkcs1 check 1] [pkcs1 check 2] \ [single dh use] [ssleay 080 client dh bug] [sslref2 reuse cert type bug] \ [tls block padding bug] [tls d5 bug] [tls rollback bug] [microsoft sess id bug] | \ none

passphrase (<string> | none)

peer cert mode (ignore | require | request | auto)

renegotiate max record delay (<number> | immediate | indefinite)

renegotiate period (<number> | immediate | indefinite)

renegotiate size (<number>[MB|mb] | indefinite)

strict resume (enable | disable)

unclean shutdown (enable | disable)

profile clientssl (<profile clientssl key> | all) stats reset

Displayprofile clientssl [<profile clientssl key> | all] [show [all]]

profile clientssl [<profile clientssl key> | all] list [all]

profile clientssl (<profile clientssl key> | all) alert timeout [show]

profile clientssl (<profile clientssl key> | all) authenticate [show]

profile clientssl (<profile clientssl key> | all) authenticate depth [show]

profile clientssl (<profile clientssl key> | all) ca file [show]

profile clientssl (<profile clientssl key> | all) cache size [show]

profile clientssl (<profile clientssl key> | all) cache timeout [show]

profile clientssl (<profile clientssl key> | all) cert [show]

profile clientssl (<profile clientssl key> | all) chain [show]

profile clientssl (<profile clientssl key> | all) ciphers [show]

profile clientssl (<profile clientssl key> | all) client cert ca [show]

profile clientssl (<profile clientssl key> | all) crl file [show]

profile clientssl (<profile clientssl key> | all) defaults from [show]

profile clientssl (<profile clientssl key> | all) handshake timeout [show]

profile clientssl (<profile clientssl key> | all) key [show]

profile clientssl (<profile clientssl key> | all) mode [show]

profile clientssl (<profile clientssl key> | all) modssl methods [show]

profile clientssl (<profile clientssl key> | all) name [show]

profile clientssl (<profile clientssl key> | all) nonssl [show]

profile clientssl (<profile clientssl key> | all) options [show]

profile clientssl (<profile clientssl key> | all) partition [show]

profile clientssl (<profile clientssl key> | all) passphrase [show]

profile clientssl (<profile clientssl key> | all) peer cert mode [show]

profile clientssl (<profile clientssl key> | all) renegotiate max record delay [show]

profile clientssl (<profile clientssl key> | all) renegotiate period [show]

profile clientssl (<profile clientssl key> | all) renegotiate size [show]

profile clientssl (<profile clientssl key> | all) stats [show]

profile clientssl (<profile clientssl key> | all) strict resume [show]

profile clientssl (<profile clientssl key> | all) unclean shutdown [show]

3 - 176

Page 213: BIG IP Reference

Bigpipe Utility Command Reference

Deleteprofile clientssl (<profile clientssl key> | all) delete

DescriptionThis command provides the ability to create a custom Client SSL profile. Client-side profiles allow the traffic management system to handle authentication and encryption tasks for any SSL connection coming into a traffic management system from a client system. You implement this type of profile by using the default profile, or creating a custom profile based on the default clientssl profile and modifying its settings. All default profiles are stored in the file /config/profile_base.conf.

ExamplesCreates a Client SSL profile named myclientsslprofile using the system defaults:

profile clientssl myclientsslprofile { mode enable }

ArgumentsSeveral command arguments are available for use with this command:

◆ ca fileSpecifies the certificate authority (CA) file name. To use the default CA file name, specify default. Configures certificate verification by specifying a list of client or server CAs that the traffic management system trusts.

◆ certSpecifies the name of the certificate installed on the traffic management system for the purpose of terminating or initiating an SSL connection. You can specify the default certificate name, which is default.crt.

◆ chainSpecifies or builds a certificate chain file that a client can use to authenticate the profile. To use the default chain name, specify default.

◆ ciphersSpecifies a cipher name. To use the default ciphers, specify default.

◆ client cert caSpecifies the client cert certificate authority name. To use the client cert certificate authority name, specify default.

◆ crl fileSpecifies the certificate revocation list file name. To use the default certificate revocation file name, specify default.

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the parent profile specified.

Bigpipe Utility Reference Guide 3 - 177

Page 214: BIG IP Reference

Chapter 3

◆ modeSpecifies the profile mode, which enables or disables SSL processing. The options are enable, disable, or default. The default value is enable.

◆ keySpecifies the name of a key file that you generated and installed on the system. When selecting this option, type a key file name or use the default key name default.key. The default key name is default.key.

OptionsSeveral options are available, including some industry-related workarounds:

◆ [ALL BUGFIXES]This option enables all of the industry-related defect workarounds. It is usually safe to use the ALL BUGFIXES option to enable the defect workaround options when you want compatibility with broken implementations. Note that if you edit the configuration in the browser-based Configuration utility, the syntax for this option is expanded into each individual option.

◆ [CIPHER SERVER PREFERENCE]When choosing a cipher, use this option to set all the server's preferences instead of the client’s preferences. When this option is not set, the SSL server always follows the client's preferences. When this option is set, the SSLv3/TLSv1 server chooses by using its own preferences. Due to the different protocol, for SSLv2 the server sends its list of preferences to the client and the client always chooses.

◆ [DONT INSERT EMPTY FRAGMENTS]This option disables a countermeasure against a SSL 3.0/TLS 1.0 protocol vulnerability affecting CBC ciphers. These ciphers cannot be handled by certain broken SSL implementations. This option has no effect for connections using other ciphers.

◆ [EPHEMERAL RSA]This option uses ephemeral (temporary) RSA keys when doing RSA operations. According to the specifications, this is done only when an RSA key can be used only for signature operations (namely under export ciphers with restricted RSA key length). By setting this option, you specify that ephemeral RSA keys are always used. This option breaks compatibility with the SSL/TLS specifications, and may lead to interoperability problems with clients. Therefore, F5 does not recommend it. You should use ciphers with EDH (Ephemeral Diffie-Hellman) key exchange instead. This option is ignored for server-side SSL.

◆ [MICROSOFT BIG SSLV3 BUFFER]This option enables a workaround for communicating with older Microsoft applications that use non-standard SSL record sizes.

◆ [MICROSOFT SESS ID BUG]This option handles a Microsoft session ID problem.

3 - 178

Page 215: BIG IP Reference

Bigpipe Utility Command Reference

◆ [MSIE SSLV2 RSA PADDING]This option enables a workaround for communicating with older Microsoft applications that use non-standard RSA key padding. This option is ignored for server-side SSL.

◆ [NETSCAPE CA DN BUG]This option handles a defect regarding the system crashing or hanging. If the system accepts a Netscape Navigator® browser connection, demands a client cert, has a non-self-signed CA that does not have its CA in Netscape Navigator, and the browser has a certificate, the system becomes unavailable. This option works for Netscape Navigator versions 3 and later.

◆ [NETSCAPE CHALLENGE BUG]This option handles the Netscape® challenge problem.

◆ [NETSCAPE DEMO CIPHER CHANGE BUG]This option deliberately manipulates the SSL server session resumption behavior to mimic that of certain Netscape servers (see the Netscape reuse cipher change bug workaround description). F5 does not recommend this option for normal use. The system ignores this option for server-side SSL.

◆ [NETSCAPE REUSE CIPHER CHANGE BUG]This option handles a defect within Netscape Enterprise Server version 2.01 that only appears when you are connecting through SSLv2/v3 then reconnecting through SSLv3. In this case, the cipher list changes.

First, a connection is established with the RC4-MD5 cipher list. If it is then resumed, the connection switches to using the DES-CBC3-SHA cipher list. However, according to RFC 2246 (section 7.4.1.3, cipher suite), the cipher list should remain RC4-MD5.

As a workaround, you can attempt to connect with a cipher list of DES-CBC-SHA:RC4-MD5 and so on. Each new connection uses the RC4-MD5 cipher list, but any re-connection attempts to use the DES-CBC-SHA cipher list. Thus Netscape, when reconnecting, always uses the first cipher in the cipher list.

◆ [NO SSLv2]Do not use the SSLv2 protocol.

◆ [NO SSLv3]Do not use the SSLv3 protocol.

◆ [NO TLSv1]Do not use the TLSv1 protocol.

◆ [NO SESSION RESUMPTION ON RENEGOTIATION]When performing renegotiation as an SSL server, this option always starts a new session (that is, session resumption requests are only accepted in the initial handshake). This option is ignored for server-side SSL.

Bigpipe Utility Reference Guide 3 - 179

Page 216: BIG IP Reference

Chapter 3

◆ [PASSIVE CLOSE]Indicates how to handle industry-related workarounds.

• noneChoose this option if you want to disable all workarounds. F5 does not recommend this option.

• defaultSpecifies the value, all bugfixes, which enables a set of industry-related miscellaneous workarounds related to SSL processing.

◆ [PKCS1 CHECK 1]This debugging option deliberately manipulates the PKCS1 padding used by SSL clients in an attempt to detect vulnerability to particular SSL server vulnerabilities. F5 does not recommend this option for normal use. The system ignores this option for client-side SSL.

◆ [PKCS1 CHECK 2]This debugging option deliberately manipulates the PKCS1 padding used by SSL clients in an attempt to detect vulnerability to particular SSL server vulnerabilities. F5 does not recommend this option for normal use. The system ignores this option for client-side SSL.

◆ [SINGLE DH USE]This option creates a new key when using temporary/ephemeral DH parameters. This option must be used to prevent small subgroup attacks, when the DH parameters were not generated using strong primes, for example, when using DSA-parameters. If strong primes were used, it is not strictly necessary to generate a new DH key during each handshake, but it is recommended. Enable the Single DH use option, whenever temporary/ephemeral DH parameters are used.

◆ [SSLEAY 080 CLIENT DH BUG]This option enables a workaround for communicating with older SSLeay-based applications that specify an incorrect Diffie-Hellman public value length. This option is ignored for server-side SSL.

◆ [SSLREF2 REUSE CERT TYPE BUG]This option handles the SSL reuse certificate type problem.

◆ [TLS D5 BUG]This option is a workaround for communicating with older TLSv1-enabled applications that specify an incorrect encrypted RSA key length. This option is ignored for server-side SSL.

◆ [TLS BLOCK PADDING BUG]This option enables a workaround for communicating with older TLSv1-enabled applications that use incorrect block padding.

◆ [TLS ROLLBACK BUG]This option disables version rollback attack detection. During the client key exchange, the client must send the same information about acceptable SSL/TLS protocol levels as it sends during the first hello. Some clients violate this rule by adapting to the server's answer. For example, the client sends an SSLv2 hello and accepts up to SSLv3.1 (TLSv1), but the server only understands up to SSLv3. In this case, the

3 - 180

Page 217: BIG IP Reference

Bigpipe Utility Command Reference

client must still use the same SSLv3.1 (TLSv1) announcement. Some clients step down to SSLv3 with respect to the server's answer and violate the version rollback protection. This option is ignored for server-side SSL.

◆ alert timeoutSpecifies the alert timeout in seconds. You can also specify immediate, indefinite, or default.

◆ authenticateSpecifies frequency of authentication. Options are once, always, or default.

◆ authenticate depthSpecifies the authenticate depth. This is the client certificate chain maximum traversal depth.

◆ cache sizeSpecifies the SSL session cache size. For client-side profiles only, you can configure timeout and size values for the SSL session cache. Because each profile maintains a separate SSL session cache, you can configure the values on a per-profile basis.

◆ cache timeoutSpecifies the SSL session cache timeout value. This specifies the number of usable lifetime seconds of negotiated SSL session IDs. The default timeout value for the SSL session cache is 300 seconds. Acceptable values are integers greater than or equal to 5. You can also set this value to indefinite.

◆ handshake timeoutSpecifies the handshake timeout in seconds. You can also specify indefinite or default.

◆ modssl methodsEnables or disables ModSSL methods. This setting enables or disables ModSSL method emulation. This setting should be enabled when OpenSSL methods are inadequate. For example, you can enable this when you want to use SSL compression over TLSv1.

◆ nonsslSpecifies enable to allow non-SSL connections to pass through the traffic management system as clear text.

◆ partitionDisplays the partition within which the clientssl profile resides.

◆ passphraseSpecifies the key passphrase if required.

◆ peer cert modeSpecifies the peer certificate mode. Options are request, require, ignore, auto, or default.

◆ renegotiate periodSpecifies the Renegotiate Period setting to renegotiate an SSL session based on the number of seconds that you specify.

Bigpipe Utility Reference Guide 3 - 181

Page 218: BIG IP Reference

Chapter 3

◆ renegotiate sizeSpecifies the Renegotiate Size setting forces the traffic management system to renegotiate an SSL session based on the size, in megabytes, of application data that is transmitted over the secure channel.

◆ renegotiate max record delayForces the traffic management system to renegotiate an SSL session based on the maximum number of SSL records that can be received while waiting for the client to initiate the renegotiation. If the maximum number of SSL records is received, the traffic management system closes the connection. This setting applies to client-side profiles only.

◆ strict resumeSpecifies enable to prevent an SSL session from being resumed after an unclean shutdown. The default option is disable, which causes the SSL profile to allow uncleanly shut down SSL sessions to be resumed. Conversely, when the enable option is set, the SSL profile refuses to resume SSL sessions after an unclean shutdown.

◆ unclean shutdownBy default, the SSL profile performs unclean shutdowns of all SSL connections, which means that underlying TCP connections are closed without exchanging the required SSL shutdown alerts. If you want to force the SSL profile to perform a clean shutdown of all SSL connections, you can disable the default setting.

See alsoprofile(1), profile serverssl(1), bigpipe(1)

3 - 182

Page 219: BIG IP Reference

Bigpipe Utility Command Reference

profile dnsConfigures a domain name service (DNS) profile.

SyntaxUse this command to create, modify, display, or delete a DNS profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile dns <profile dns key> {}

profile dns (<profile dns key> | all) [{] <profile dns arg list> [}]

<profile dns key> ::=

<name>

<profile dns arg> ::=

defaults from (<profile dns key> | none)

gtm (enable | disable)

name <name>

profile dns (<profile dns key> | all) stats reset

Displayprofile dns [<profile dns key> | all] [show [all]]

profile dns [<profile dns key> | all] list [all]

profile dns (<profile dns key> | all) defaults from [show]

profile dns (<profile dns key> | all) gtm [show]

profile dns (<profile dns key> | all) name [show]

profile dns (<profile dns key> | all) partition [show]

profile dns (<profile dns key> | all) stats [show]

Deleteprofile dns (<profile dns key> | all) delete

Bigpipe Utility Reference Guide 3 - 183

Page 220: BIG IP Reference

Chapter 3

DescriptionThis command provides the ability to define the behavior of DNS traffic.

ExamplesCreates a DNS profile named mydnsprofile that inherits its settings from the system default DNS profile:

profile dns mydnsprofile {}

OptionsYou can use these options with the profile dns command:

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the parent profile specified.

◆ gtmIndicates whether to allow the BIG-IP global traffic management system to handle DNS resolution for DNS queries and responses that contain wide IP names. The options are enable, disable, and default (that is, accept the default from the parent profile). The default value is enable.

◆ nameSpecifies the name of the profile.

◆ partitionDisplays the partition within which the profile resides.

See alsodns(1), profile(1), virtual(1), bigpipe(1)

3 - 184

Page 221: BIG IP Reference

Bigpipe Utility Command Reference

profile fasthttpConfigures a Fast HTTP profile.

SyntaxUse this command to create, modify, display, or delete a Fast HTTP profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile fasthttp <profile fasthttp key> {}

profile fasthttp (<profile fasthttp key> | all) [{] <profile fasthttp arg list> [}]

<profile fasthttp key> ::=

<name>

<profile fasthttp arg> ::=

client close timeout (<number> | immediate | indefinite)

conn pool idle timeout override ([<number>d] [<hh>:<mm>:<ss>] | disable | indefinite)

conn pool max reuse <number>

conn pool max size <number>

conn pool min size <number>

conn pool replenish (enable | disable)

conn pool step <number>

defaults from (<profile fasthttp key> | none)

force http10 response (enable | disable)

header insert (<string> | none)

http11 close workarounds (enable | disable)

idle timeout (<number> | immediate | indefinite)

insert xforwarded for (disable | enable)

layer7 (enable | disable)

max header size <number>

max requests <number>

mss override <number>

name <name>

reset on timeout (enable | disable)

server close timeout (<number> | immediate | indefinite)

unclean shutdown (disable | enable | fast)

Bigpipe Utility Reference Guide 3 - 185

Page 222: BIG IP Reference

Chapter 3

profile fasthttp (<profile fasthttp key> | all) stats reset

Displayprofile fasthttp [<profile fasthttp key> | all] [show [all]]

profile fasthttp [<profile fasthttp key> | all] list [all]

profile fasthttp (<profile fasthttp key> | all) client close timeout [show]

profile fasthttp (<profile fasthttp key> | all) conn pool idle timeout override [show]

profile fasthttp (<profile fasthttp key> | all) conn pool max reuse [show]

profile fasthttp (<profile fasthttp key> | all) conn pool max size [show]

profile fasthttp (<profile fasthttp key> | all) conn pool min size [show]

profile fasthttp (<profile fasthttp key> | all) conn pool replenish [show]

profile fasthttp (<profile fasthttp key> | all) conn pool step [show]

profile fasthttp (<profile fasthttp key> | all) defaults from [show]

profile fasthttp (<profile fasthttp key> | all) force http10 response [show]

profile fasthttp (<profile fasthttp key> | all) header insert [show]

profile fasthttp (<profile fasthttp key> | all) http11 close workarounds [show]

profile fasthttp (<profile fasthttp key> | all) idle timeout [show]

profile fasthttp (<profile fasthttp key> | all) insert xforwarded for [show]

profile fasthttp (<profile fasthttp key> | all) layer7 [show]

profile fasthttp (<profile fasthttp key> | all) max header size [show]

profile fasthttp (<profile fasthttp key> | all) max requests [show]

profile fasthttp (<profile fasthttp key> | all) mss override [show]

profile fasthttp (<profile fasthttp key> | all) name [show]

profile fasthttp (<profile fasthttp key> | all) partition [show]

profile fasthttp (<profile fasthttp key> | all) reset on timeout [show]

profile fasthttp (<profile fasthttp key> | all) server close timeout [show]

profile fasthttp (<profile fasthttp key> | all) stats [show]

profile fasthttp (<profile fasthttp key> | all) unclean shutdown [show]

Deleteprofile fasthttp (<profile fasthttp key> | all) delete

DescriptionThe Fast HTTP profile provides the ability to accelerate certain HTTP connections such as banner ads.

ExamplesCreates a Fast HTTP profile named myfasthttpprofile that inherits its settings from the system default fasthttp profile:

profile fasthttp myfasthttpprofile {}

3 - 186

Page 223: BIG IP Reference

Bigpipe Utility Command Reference

OptionsYou can use these options with the profile fasthttp command:

◆ client close timeoutSpecifies the number of seconds after which the system closes a client connection, when the system either receives a client FIN packet or sends a FIN packet. This setting overrides the idle timeout setting. The default value is 5.

◆ conn pool idle timeout overrideSpecifies the number of seconds after which a server-side connection in a OneConnect™ pool is eligible for deletion, when the connection has no traffic. This setting overrides the idle timeout that you specify. The default value is 0 seconds, which disables the override setting.

◆ conn pool max reuseSpecifies the maximum number of times that the system can reuse a current connection. The default value is 0.

◆ conn pool max sizeSpecifies the maximum number of connections to a load balancing pool. A setting of 0 specifies that a pool can accept an unlimited number of connections. The default value is 2048.

◆ conn pool min sizeSpecifies the minimum number of connections to a load balancing pool. A setting of 0 specifies that there is no minimum. The default value is 10.

◆ conn pool replenishThe default value is enable. When this setting is enabled, the system replenishes the number of connections to a load balancing pool to the number of connections that existed when the server closed the connection to the pool. When disabled, the system replenishes the connection that was closed by the server, only when there are fewer connections to the pool than the number of connections set in the conn pool min size connections option. See the conn pool min size option above.

◆ conn pool stepSpecifies the increment in which the system makes additional connections available, when all available connections are in use. The default value is 4.

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the parent profile specified.

◆ force http10 responseSpecifies whether to rewrite the HTTP version in the status line of the server to HTTP 1.0 to discourage the client from pipelining or chunking data. The default value is disable.

Bigpipe Utility Reference Guide 3 - 187

Page 224: BIG IP Reference

Chapter 3

◆ header insertSpecifies a string that the system inserts as a header in an HTTP request. If the header exists already, the system does not replace it.

◆ http11 close workaroundsEnables or disables HTTP 1.1 close workarounds. The default value is disable.

◆ idle timeoutSpecifies the number of seconds after which a connection is eligible for deletion, when the connection has no traffic. The default value is 300 seconds.

◆ insert xforwarded forSpecifies whether the system inserts the XForwarded For header in an HTTP request with the client IP address, to use with connection pooling.

• enableSpecifies that the system inserts the XForwarded For header with the client IP address.

• disableSpecifies that the system does not insert the XForwarded For header.

◆ layer7When enabled, the system parses HTTP data in the stream. Disable this setting if you want to use the performance HTTP profile to shield against denial-of-service attacks against non-HTTP protocols. The default value is enable.

◆ max header sizeSpecifies the maximum amount of HTTP header data that the system buffers before making a load balancing decision. The default value is 32768.

◆ max requestsSpecifies the maximum number of requests that the system can receive on a client-side connection, before the system closes the connection. A setting of 0 specifies that requests are not limited. The default value is 0.

◆ mss override Specifies a maximum segment size (MSS) override for server-side connections. The default value is 0, which corresponds to an MSS of 1460. You can specify any integer between 536 and 1460.

◆ partitionDisplays the partition within which the profile resides.

◆ reset on timeoutWhen enabled, the system sends a TCP RESET packet when a connection times out, and deletes the connection. The default value is enable.

◆ server close timeoutSpecifies the number of seconds after which the system closes a client connection, when the system either receives a client FIN packet or sends a FIN packet. This setting overrides the idle timeout setting. The default value is 5.

3 - 188

Page 225: BIG IP Reference

Bigpipe Utility Command Reference

◆ unclean shutdownSpecifies how the system handles closing a connection. The default value is enable, which allows unclean shutdown of a client connection. Use disable to prevent unclean shutdown of a client connection. Fast specifies that the system sends a RESET packet to close the connection only if the client attempts to send further data after the response has completed. Default specifies to use the setting from the parent profile.

See alsoprofile(1), virtual(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 189

Page 226: BIG IP Reference

Chapter 3

profile fastl4Configures a Fast Layer 4 profile.

SyntaxUse this command to create, modify, display, or delete a Fast Layer 4 profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile fastL4 <profile fastL4 key> {}

profile fastL4 (<profile fastL4 key> | all) [{] <profile fastL4 arg list> [}]

<profile fastL4 key> ::=

<name>

<profile fastL4 arg> ::=

defaults from (<profile fastL4 key> | none)

hardware syncookie (enable | disable)

idle timeout (<number> | immediate | indefinite)

ip tos to client (<number> | mimic | pass)

ip tos to server (<number> | mimic | pass)

link qos to client (<number> | mimic | pass)

link qos to server (<number> | mimic | pass)

loose close (enable | disable)

loose initiation (enable | disable)

mss override <number>

name <name>

pva acceleration (full | assist | none)

reassemble fragments (enable | disable)

reset on timeout (enable | disable)

rtt from client (enable | disable)

rtt from server (enable | disable)

software syncookie (enable | disable)

tcp close timeout (<number> | immediate | indefinite)

tcp generate isn (enable | disable)

tcp handshake timeout (<number> | immediate | indefinite)

3 - 190

Page 227: BIG IP Reference

Bigpipe Utility Command Reference

tcp strip sack (enable | disable)

tcp timestamp (preserve | strip | rewrite)

tcp wscale (preserve | strip)

profile fastL4 (<profile fastL4 key> | all) stats reset

Displayprofile fastL4 [<profile fastL4 key> | all] [show [all]]

profile fastL4 [<profile fastL4 key> | all] list [all]

profile fastL4 (<profile fastL4 key> | all) defaults from [show]

profile fastL4 (<profile fastL4 key> | all) hardware syncookie [show]

profile fastL4 (<profile fastL4 key> | all) idle timeout [show]

profile fastL4 (<profile fastL4 key> | all) ip tos to client [show]

profile fastL4 (<profile fastL4 key> | all) ip tos to server [show]

profile fastL4 (<profile fastL4 key> | all) link qos to client [show]

profile fastL4 (<profile fastL4 key> | all) link qos to server [show]

profile fastL4 (<profile fastL4 key> | all) loose close [show]

profile fastL4 (<profile fastL4 key> | all) loose initiation [show]

profile fastL4 (<profile fastL4 key> | all) mss override [show]

profile fastL4 (<profile fastL4 key> | all) name [show]

profile fastL4 (<profile fastL4 key> | all) partition [show]

profile fastL4 (<profile fastL4 key> | all) pva acceleration [show]

profile fastL4 (<profile fastL4 key> | all) reassemble fragments [show]

profile fastL4 (<profile fastL4 key> | all) reset on timeout [show]

profile fastL4 (<profile fastL4 key> | all) rtt from client [show]

profile fastL4 (<profile fastL4 key> | all) rtt from server [show]

profile fastL4 (<profile fastL4 key> | all) software syncookie [show]

profile fastL4 (<profile fastL4 key> | all) stats [show]

profile fastL4 (<profile fastL4 key> | all) tcp close timeout [show]

profile fastL4 (<profile fastL4 key> | all) tcp generate isn [show]

profile fastL4 (<profile fastL4 key> | all) tcp handshake timeout [show]

profile fastL4 (<profile fastL4 key> | all) tcp strip sack [show]

profile fastL4 (<profile fastL4 key> | all) tcp timestamp [show]

profile fastL4 (<profile fastL4 key> | all) tcp wscale [show]

Deleteprofile fastL4 (<profile fastL4 key> | all) delete

Bigpipe Utility Reference Guide 3 - 191

Page 228: BIG IP Reference

Chapter 3

DescriptionThe fastl4 profile is the default profile used by the system when you create a basic configuration for non-UDP traffic. Any changes you make to an active fastL4 profile (one that is in use by a virtual server) take affect after the idle timeout value has passed. That means new connections are affected by the profile change immediately. However, old connections need to be aged out by the idle timeout value or closed for the new values to take effect.

ExamplesCreates a custom Fast Layer 4 profile named myfastl4profile that inherits its settings from the system default fastl4 profile:

profile fastl4 myfastl4profile {}

OptionsYou can use these options with the profile fastL4 command:

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the parent profile specified.

◆ hardware syncookieEnables or disables hardware SYN cookie support when PVA10 is present on the system. Note that when you set the hardware syncookie option to enable, you may also want to set the following bigdb database variables using the db command, based on your requirements:

• pva.SynCookies.Full.ConnectionThreshold (default: 500000)

• pva.SynCookies.Assist.ConnectionThreshold (default: 500000)

• pva.SynCookies.ClientWindow (default: 0)

The default value is disable.

◆ idle timeoutSpecifies an idle timeout in seconds. You can also specify immediate, indefinite, or default. This setting specifies the number of seconds that a connection is idle before the connection is eligible for deletion. When you specify an idle timeout for the Fast L4 profile, the value needs to be greater than the bigdb database variable Pva.Scrub time in msec for it to work properly. The default value is 300 seconds.

◆ ip tos to clientSpecifies an IP ToS number for the client side. This setting specifies the Type of Service level that the traffic management system assigns to UDP packets when sending them to clients. The default value is 65535, which indicates, do not modify UDP packets.

◆ ip tos to serverSpecifies an IP ToS number for the server side. This setting specifies the Type of Service level that the traffic management system assigns to UDP packets when sending them to servers. The default value is 65535, which indicates, do not modify UDP packets.

3 - 192

Page 229: BIG IP Reference

Bigpipe Utility Command Reference

◆ link qos to clientSpecifies a Link QoS (VLAN priority) number for the client side. This setting specifies the Quality of Service level that the system assigns to UDP packets when sending them to clients. The default value is 65535, which indicates, do not modify UDP packets.

◆ link qos to serverSpecifies a Link QoS (VLAN priority) number for the server side. This setting specifies the Quality of Service level that the system assigns to UDP packets when sending them to servers. The default value is 65535, which indicates, do not modify UDP packets.

◆ loose closeSpecifies that the system closes a loosely-initiated connection when the system receives the first FIN packet from either the client or the server. The default value is disable.

◆ loose initiationSpecifies that the system initializes a connection when it receives any TCP packet, rather than requiring a SYN packet for connection initiation. The default value is disable.

◆ mss overrideSpecifies a maximum segment size (MSS) override for server-side connections. The default value is disable, which corresponds to an MSS of 1460. Disable specifies that the system does not use an MSS override. To choose a different value than the default, specify any integer between 536 and 1460 bytes. Note that this is also the MSS advertised to a client when a client first connects.

◆ partitionDisplays the partition within which the Fast L4 profile resides.

◆ pva accelerationSpecifies the Packet Velocity® ASIC acceleration mode. The options are none, assist, full, or default.

◆ reassemble fragmentsSpecifies whether to reassemble fragments. The options are enable, disable, or default. The default value is enable.

◆ reset on timeoutSpecifies whether you want to reset connections on timeout. The options are enable, disable, or default. The default value is enable.

◆ rtt from clientEnables or disables the TCP timestamp options to measure the round trip time to the client. The default value is disable.

◆ rtt from serverEnables or disables the TCP timestamp options to measure the round trip time to the server. The default value is disable.

◆ software syncookieEnables or disables software SYN cookie support when PVA10 is not present on the system. The default value is disable.

Bigpipe Utility Reference Guide 3 - 193

Page 230: BIG IP Reference

Chapter 3

◆ tcp close timeoutSpecifies an TCP close timeout in seconds. You can also specify immediate, indefinite, or default. The default value is 5 seconds.

◆ tcp timestampSpecifies how you want to handle the TCP timestamp. The options are preserve, strip, rewrite, or default. Preserve is the default setting for this option.

◆ tcp generate isnSpecifies whether you want to generate TCP sequence numbers on all SYNs that conform with RFC1948, and allow timestamp recycling. This option is disabled by default.

◆ tcp handshake timeoutSpecifies a TCP handshake timeout in seconds. You can also specify immediate, indefinite, or default. The default value is 5 seconds.

◆ tcp strip sackSpecifies whether you want to block the TCP SackOK option from passing to server on an initiating SYN. This option is disabled by default.

◆ tcp wscaleSpecifies how you want to handle the TCP window scale. The options are preserve, strip, rewrite, or default. The default setting for this option is preserve TCP window scale.

See alsoprofile(1), virtual(1), bigpipe(1)

3 - 194

Page 231: BIG IP Reference

Bigpipe Utility Command Reference

profile ftpConfigures an FTP profile.

SyntaxUse this command to create, modify, display, or delete an FTP profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile ftp <profile ftp key> {}

profile ftp (<profile ftp key> | all) [{] <profile ftp arg list> [}]

<profile ftp key> ::=

<name>

<profile ftp arg> ::=

data port (<service> | none)

defaults from (<profile ftp key> | none)

name <name>

security (enable | disable)

translate extended (enable | disable)

profile ftp (<profile ftp key> | all) stats reset

Displayprofile ftp [<profile ftp key> | all] [show [all]]

profile ftp [<profile ftp key> | all] list [all]

profile ftp (<profile ftp key> | all) data port [show]

profile ftp (<profile ftp key> | all) defaults from [show]

profile ftp (<profile ftp key> | all) name [show]

profile ftp (<profile ftp key> | all) partition [show]

profile ftp (<profile ftp key> | all) security [show]

profile ftp (<profile ftp key> | all) stats [show]

profile ftp (<profile ftp key> | all) translate extended [show]

Deleteprofile ftp (<profile ftp key> | all) delete

Bigpipe Utility Reference Guide 3 - 195

Page 232: BIG IP Reference

Chapter 3

DescriptionManages a profile for FTP traffic.

ExamplesCreates a custom FTP profile named myftpprofile that inherits its settings from the system default FTP profile:

profile ftp myftpprofile { }

OptionsYou can use these options with the profile ftp command:

◆ data portSpecifies a service for the data channel port used for this FTP profile. The default port is 20.

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the parent profile specified.

◆ partitionDisplays the partition within which the profile resides.

◆ securityEnables secure FTP traffic for the BIG-IP® Application Security Manager. You can set the security option only if the system is licensed for the BIG-IP® Application Security Manager.

◆ translate extendedThis setting is enabled by default, and thus, automatically translates RFC2428 extended requests EPSV and EPRT to PASV and PORT when communicating with IPv4 servers.

See alsoprofile(1), virtual(1), bigpipe(1)

3 - 196

Page 233: BIG IP Reference

Bigpipe Utility Command Reference

profile httpCreates, modifies, displays, or deletes an HTTP profile.

SyntaxUse this command to create, modify, display, or delete an HTTP profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile http <profile http key> {}

profile http (<profile http key> | all) [{] <profile http arg list> [}]

<profile http key> ::=

<name>

<profile http arg> ::=

adaptive parsing (enable | disable)

basic auth realm (<string> | none)

compress (disable | enable | selective)

compress browser workarounds (enable | disable)

compress buffer size <number>

compress content type exclude (<string list> | none) [add | delete]

compress content type include (<string list> | none) [add | delete]

compress cpu saver (enable | disable)

compress cpu saver high <number>

compress cpu saver low <number>

compress gzip level <number>

compress gzip memory level <number>[K|k]

compress gzip window size <number>[K|k]

compress http 1.0 (enable | disable)

compress keep accept encoding (enable | disable)

compress min size <number>

compress prefer (deflate | gzip)

compress uri exclude (<regex list> | none) [add | delete]

compress uri include (<regex list> | none) [add | delete]

compress vary header (enable | disable)

cookie secret (<string> | none)

Bigpipe Utility Reference Guide 3 - 197

Page 234: BIG IP Reference

Chapter 3

defaults from (<profile http key> | none)

encrypt cookies (<string list> | none) [add | delete]

fallback (<string> | none)

fallback status (<string list> | none) [add | delete]

header erase (<string> | none)

header insert (<string> | none)

insert xforwarded for (disable | enable)

lws separator [cr] [lf] [sp] | none

lws width <number>

max header size <number>

max requests <number>

name <name>

oneconnect transformations (enable | disable)

pipelining (disable | enable)

ramcache (disable | enable)

ramcache aging rate <number>

ramcache entry (<ramcache info key list> | none) [delete]

ramcache ignore client cache control (none | max age | all)

ramcache insert age header (disable | enable)

ramcache max age <number>

ramcache max entries <number>

ramcache max object size <number>

ramcache min object size <number>

ramcache size <number>[MB|mb]

ramcache uri exclude (<regex list> | none) [add | delete]

ramcache uri include (<regex list> | none) [add | delete]

ramcache uri pinned (<regex list> | none) [add | delete]

redirect rewrite (none | all | matching | nodes)

response (preserve chunk | selective chunk | unchunk | rechunk)

response headers allowed (<string list> | none) [add | delete]

security (enable | disable)

<ramcache info key> ::=

[exact] [max response <number>] [uri (<string> | none)] [host (<string> | none)]

profile http (<profile http key> | all) stats reset

Displayprofile http [<profile http key> | all] [show [all]]

profile http [<profile http key> | all] list [all]

profile http (<profile http key> | all) adaptive parsing [show]

profile http (<profile http key> | all) basic auth realm [show]

profile http (<profile http key> | all) compress [show]

profile http (<profile http key> | all) compress browser workarounds [show]

profile http (<profile http key> | all) compress buffer size [show]

profile http (<profile http key> | all) compress content type exclude [show]

3 - 198

Page 235: BIG IP Reference

Bigpipe Utility Command Reference

profile http (<profile http key> | all) compress content type include [show]

profile http (<profile http key> | all) compress cpu saver [show]

profile http (<profile http key> | all) compress cpu saver high [show]

profile http (<profile http key> | all) compress cpu saver low [show]

profile http (<profile http key> | all) compress gzip level [show]

profile http (<profile http key> | all) compress gzip memory level [show]

profile http (<profile http key> | all) compress gzip window size [show]

profile http (<profile http key> | all) compress http 1.0 [show]

profile http (<profile http key> | all) compress keep accept encoding [show]

profile http (<profile http key> | all) compress min size [show]

profile http (<profile http key> | all) compress prefer [show]

profile http (<profile http key> | all) compress uri exclude [show]

profile http (<profile http key> | all) compress uri include [show]

profile http (<profile http key> | all) compress vary header [show]

profile http (<profile http key> | all) cookie secret [show]

profile http (<profile http key> | all) defaults from [show]

profile http (<profile http key> | all) encrypt cookies [show]

profile http (<profile http key> | all) fallback [show]

profile http (<profile http key> | all) fallback status [show]

profile http (<profile http key> | all) header erase [show]

profile http (<profile http key> | all) header insert [show]

profile http (<profile http key> | all) insert xforwarded for [show]

profile http (<profile http key> | all) lws separator [show]

profile http (<profile http key> | all) lws width [show]

profile http (<profile http key> | all) max header size [show]

profile http (<profile http key> | all) max requests [show]

profile http (<profile http key> | all) name [show]

profile http (<profile http key> | all) oneconnect transformations [show]

profile http (<profile http key> | all) partition [show]

profile http (<profile http key> | all) pipelining [show]

profile http (<profile http key> | all) ramcache [show]

profile http (<profile http key> | all) ramcache aging rate [show]

profile http (<profile http key> | all) ramcache entry [<ramcache info key> | all] \[show [all]]

profile http (<profile http key> | all) ramcache ignore client cache control [show]

profile http (<profile http key> | all) ramcache insert age header [show]

profile http (<profile http key> | all) ramcache max age [show]

profile http (<profile http key> | all) ramcache max entries [show]

profile http (<profile http key> | all) ramcache max object size [show]

profile http (<profile http key> | all) ramcache min object size [show]

profile http (<profile http key> | all) ramcache size [show]

profile http (<profile http key> | all) ramcache uri exclude [show]

profile http (<profile http key> | all) ramcache uri include [show]

profile http (<profile http key> | all) ramcache uri pinned [show]

profile http (<profile http key> | all) redirect rewrite [show]

Bigpipe Utility Reference Guide 3 - 199

Page 236: BIG IP Reference

Chapter 3

profile http (<profile http key> | all) response [show]

profile http (<profile http key> | all) response headers allowed [show]

profile http (<profile http key> | all) security [show]

profile http (<profile http key> | all) stats [show]

Deleteprofile http (<profile http key> | all) ramcache entry \ (<ramcache info key list> | none) delete

profile http (<profile http key> | all) delete

DescriptionUse the default HTTP profile to create a custom HTTP profile. This default profile includes default values for any of the properties and settings related to managing HTTP traffic. When you create a custom HTTP profile, you can use the default settings, or you can change their values to suit your needs. This profile contains the configuration settings for compression and RAM Cache.

The BIG-IP system installation includes these HTTP-type profiles:

• http

• http-lan-optimized-caching

• http-wan-optimized-compression

• http-wan-optimized-compression-caching

You can modify the settings of these profiles or create new HTTP-type profiles using any of these existing profiles as parent profiles.

ExamplesCreates a custom HTTP profile named myhttpprofile that inherits its settings from the system default http profile:

profile http myhttpprofile { }

Replaces the header in the profile named myhttpprofile with the default header:

profile http myhttpprofile header insert default

Displays RAM cache entries for the profile named my_rc_profile:

profile http my_rc_profile ramcache entry show

3 - 200

Page 237: BIG IP Reference

Bigpipe Utility Command Reference

Displays all RAM cache entries for the graphic /static/graphic.jpg:

profile http myprofile ramcache entry max response 100 uri /static/graphic.jpg

Note

In the example above, you must place the parameters in the order shown, for example, place the max response parameter before the uri parameter and the uri parameter before object.

Displays all RAM cache entries for all HTTP profiles:

profile http all ramcache entry show

Note

When using the example above, the system displays the RAM cache entries in order based on how often an object is requested. The entries for the most frequently requested objects display first.

OptionsYou can use these options with the profile http command:

◆ adaptive parsingEnables or disables adaptive parsing.

◆ basic auth realmSpecifies a quoted string for the basic authentication realm. You can also specify none or default. The value of the Basic Auth Realm setting is a string that you provide. The system sends this string to a client whenever authorization fails.

◆ compressSpecifies the compression mode. The options are enable, disable, selective, and default. Note that the data compression feature compresses HTTP server responses, and not client requests.

◆ compress browser workaroundsEnables or disables browser workarounds. The default value is disable. Enabling this attribute causes turns of compression on server responses when any of the following conditions are detected:

• If the client browser is Netscape Navigator version 4.0.x, compression is turned off. Note that Netscape advertises that the browser can handle compression, but it does not handle compression gracefully. In this case, F5 disables compression entirely for that class of browser.

• If the client browser is Netscape Navigator version 4.x (4.1 and beyond) and the server response Content-Type is neither text/html or text/plain, compression is turned off. This class of Netscape browsers can handle plain text and HTML just fine, but there are known issues with other types of content.

Bigpipe Utility Reference Guide 3 - 201

Page 238: BIG IP Reference

Chapter 3

• If the client browser is Microsoft Internet Explorer (any version), the server response Content-Type is either text/css or application/x-javascript, and the clients connection is over SSL, compression is turned off. The Microsoft article ID for this problem is 825057.

• If the client browser is Microsoft Internet Explorer (any version), the server response Content-Type is either text/css or application/x-javascript, and the server set the header Cache-Control to no-cache, compression is turned off. The Microsoft article ID for this problem is 327286.

◆ compress buffer sizeSpecifies the maximum number of uncompressed bytes that the system buffers before determining whether or not to compress the response. Useful when the headers of a server response do not specify the length of the response content. The default value is 4096.

◆ compress content type excludeExcludes a specified list of content types from compression of HTTP Content-Type responses. Use a string list to specify a list of content types you want to compress.

◆ compress content type includeSpecifies a list of content types for compression of HTTP Content-Type responses. Use a string list to specify a list of content types you want to compress.

◆ compress cpu saverSpecifies the CPU saver setting. When the CPU saver is enabled, the system monitors the percent of CPU usage and adjusts compression rates automatically when the CPU usage reaches the percentage defined in the cpu saver low or the cpu saver high options. The default value is enable.

◆ compress cpu saver highSpecifies the percent of CPU usage at which the system starts automatically decreasing the amount of content being compressed, as well as the amount of compression which the system is applying. The default value is 90 percent.

◆ compress cpu saver low Specifies the percent CPU usage at which the system resumes content compression at the user-defined rates. The default value is 75 percent.

◆ compress gzip levelSpecifies a value that determines the amount of memory that the system uses when compressing a server response. The default value is 8.

◆ compress gzip memory levelSpecifies a value that determines the amount of memory that the system uses when compressing a server response. The default value is 8.

◆ compress gzip window sizeSpecifies the number of bits in the window size that the system uses when compressing a server response. The default value is 16 bits.

3 - 202

Page 239: BIG IP Reference

Bigpipe Utility Command Reference

◆ compress http 1.0Enables or disables compression of HTTP/1.0 server responses.

◆ compress min sizeSpecifies the minimum length in bytes of a server response that is acceptable for compressing that response. The length in bytes applies to content length only, not headers. The default value is 1024.

◆ compress preferSpecifies the type of compression that is preferred by the system. The options are deflate, gzip, or default.

◆ compress uri excludeDisables compression on a specified list of HTTP Request-URI responses. Use a regular expression to specify a list of URIs you do not want to compress.

◆ compress uri includeEnables compression on a specified list of HTTP Request-URI responses. Use a regular expression to specify a list of URIs you want to compress.

◆ compress vary headerEnables or disables the insertion of a Vary header into cacheable server responses. The default value is enable.

◆ cookie secretSpecifies a passphrase for the cookie encryption.

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the parent profile specified.

◆ encrypt cookiesEncrypts specified cookies that the BIG-IP system sends to a client system.

◆ fallbackSpecifies an HTTP fallback host. HTTP redirection allows you to redirect HTTP traffic to another protocol identifier, host name, port number, or URI path. For example, if all members of the targeted pool are unavailable (that is, the members are disabled, marked as down, or have exceeded their connection limit), the system can redirect the HTTP request to the fallback host, with the HTTP reply Status Code 302 Found. For details about how to configure this string, refer to the Configuration Guide for BIG-IP® Local Traffic Management.

◆ fallback statusSpecifies one or more three-digit status codes that can be returned by an HTTP server.

◆ header eraseSpecifies the header string that you want to erase from an HTTP request. You can also specify none or default.

Bigpipe Utility Reference Guide 3 - 203

Page 240: BIG IP Reference

Chapter 3

◆ header insertSpecifies the header string that you want to insert into an HTTP request. You can also specify none or default. An optional setting in an HTTP profile is HTTP header insertion. The HTTP header being inserted can include a client IP address. Including a client IP address in an HTTP header is useful when a connection goes through a secure network address translation (SNAT) and you need to preserve the original client IP address. The format of the header insertion that you specify must be a quoted string. When you assign the configured HTTP profile to a virtual server, the system then inserts the header specified by the profile into any HTTP request that the system sends to a pool or pool member.

◆ insert xforwarded forWhen using connection pooling, which allows clients to make use of other client requests' server-side connections, you can insert the X-Forwarded-For header and specify a client IP address.

◆ keep accept encodingEnables or disables keep accept encoding. When enabled, causes the target server, rather than the BIG-IP local traffic management system, to perform the data compression.

◆ lws separatorSpecifies the linear white space separator that the system should use between HTTP headers when a header exceeds the maximum width specified by the lws width setting. The options are cr, lf, or sp.

◆ lws widthSpecifies the maximum number of columns allowed for a header that is inserted into an HTTP request. See also the lws separator option above.

◆ max header sizeSpecifies the maximum header size.

◆ oneconnect transformationsEnables the system to perform HTTP header transformations for the purpose of keeping server-side connections open. This feature requires configuration of a OneConnect™ profile.

◆ partitionDisplays the partition within which the profile resides.

◆ pipeliningEnables HTTP/1.1 pipelining. This allows clients to make requests even when prior requests have not received a response. In order for this to succeed, however, destination servers must include support for pipelining.

◆ ramcacheEnables or disables the RAM Cache feature. The default value is disable. Note that you cannot insert a cookie on an HTTP RESPONSE when the RAM Cache is enabled and the document is cacheable.

3 - 204

Page 241: BIG IP Reference

Bigpipe Utility Command Reference

◆ ramcache aging rateSpecifies how quickly the system ages a cache entry. The aging rate ranges from 0 (slowest aging) to 10 (fastest aging). The default value is 9.

◆ ramcache entrySpecifies the following information about a ramcache entry:

• exact max responseSpecifies the maximum number of RAM cache entries to display.

• URISpecifies the URI from which the entry was cached.

• hostSpecifies the host from which the entry was cached.

◆ ramcache ignore client cache controlSpecifies if you want to ignore cache disabling headers sent by clients. You can set this to none, max age, or all.

◆ ramcache insert age headerWhen enabled, inserts Age and Date headers in the response.

◆ ramcache max ageSpecifies how long the system considers the cached content to be valid. The default value is 3600 seconds.

◆ ramcache max entriesSpecifies the maximum number of entries that can be in the RAM cache. The default value is 0, which means that the system does not limit the maximum entries.

◆ ramcache max object sizeSpecifies the largest object that the system considers eligible for caching. The default value is 50000 bytes.

◆ ramcache min object sizeSpecifies the smallest object that the system considers eligible for caching. The default value is 500 bytes.

◆ ramcache sizeSpecifies the maximum size for the RAM cache. When the cache reaches the maximum size, the system starts removing the oldest entries. The default value is 100 megabytes.

◆ ramcache uri excludeConfigures a list of URIs to exclude in the RAM Cache. A value of none specifies that URI pinning is not activated. The default value is none.

◆ ramcache uri includeConfigures a list of URIs to include in the RAM Cache. A value of none specifies that URI pinning is not activated. The default value is none.

◆ ramcache uri pinnedSpecifies whether the system retains or excludes certain URIs in the RAM cache. The pinning process forces the system either to cache URIs that typically are ineligible for caching or to not cache URIs that typically are eligible for caching.

Bigpipe Utility Reference Guide 3 - 205

Page 242: BIG IP Reference

Chapter 3

◆ redirect rewriteSpecifies which of the application HTTP redirects the system rewrites to HTTPS. Use this feature when the application is generating HTTP redirects that send the client to HTTP (a non-secure channel) when you want the client to continue accessing the application using HTTPS (a secure channel). This is a common occurrence when using client-side SSL processing on a BIG-IP system.

• allSpecifies that you want to rewrite to HTTPS all application redirects.

• matchingSpecifies that you want to rewrite to HTTPS only application redirects that match the original URI exactly.

• nodesIf the URI contains a node IP address, instead of a host name, specifies that the system rewrites the node IP address to the virtual server IP address.

• noneSpecifies that the system does not rewrite to HTTPS any application HTTP redirects. This is the default value.

• defaultSpecifies that you want to use the default value for this parameter, which is none.

◆ responseSpecifies how to handle chunked and unchunked requests and responses.

• unchunkIf the request or response is chunked, this option unchunks the request or response, processes the HTTP content, and then passes the request or response on as unchunked. The Keep-Alive value for the Connection header is not supported, and therefore the system sets the value of the header to Close.

If the request or response is unchunked, the BIG-IP local traffic management system processes the HTTP content and passes the request or response on untouched.

• rechunkIf the request or response is chunked, the system unchunks the request or response, processes the HTTP content, re-adds the chunk trailer headers, and then passes the request or response on as chunked. Any chunk extensions are lost.

If the request or response is unchunked, the system adds transfer encoding and chunking headers on egress.

• preserve chunkSpecifies that the system processes the HTTP content, and sends the response to the client unchanged.

3 - 206

Page 243: BIG IP Reference

Bigpipe Utility Command Reference

• selective chunkIf the request or response is chunked, the system unchunks the request or response, processes the HTTP content, re-adds the chunk trailer headers, and then passes the request or response on as chunked. Any chunk extensions are lost.

If the request is unchunked, the system processes the HTTP content and then passes the request or response on untouched.

• defaultIndicates to use the value in the default http profile.

◆ response headers allowedSpecifies headers that the BIG-IP system allows in an HTTP response.

See alsoprofile(1), virtual(1), profile fasthttp(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 207

Page 244: BIG IP Reference

Chapter 3

profile httpclassConfigures an HTTP Class type of profile.

SyntaxUse this command to create an HTTP class profile, redirect HTTP traffic to HTTPS using the same virtual server, and redirect HTTP traffic without changing the URL in the browser.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile httpclass <profile httpclass key> {}

profile httpclass (<profile httpclass key> | all) [{] <profile httpclass arg list> [}]

<profile httpclass key> ::=

<name>

<profile httpclass arg> ::=

asm (enable | disable)

cookies (<regex/glob list> | none) [add | delete]

defaults from (<profile httpclass key> | none)

headers (<regex/glob list> | none) [add | delete]

hosts (<regex/glob list> | none) [add | delete]

name <name>

paths (<regex/glob list> | none) [add | delete]

pool (<pool key> | none)

redirect (<string> | none)

url rewrite (<string> | none)

wa (enable | disable)

<regex/glob> ::= [glob | regex] <string>

Note

regex and glob act as sticky switches within a single list.

profile httpclass (<profile httpclass key> | all) stats reset

3 - 208

Page 245: BIG IP Reference

Bigpipe Utility Command Reference

Displayprofile httpclass [<profile httpclass key> | all] [show [all]]

profile httpclass [<profile httpclass key> | all] list [all]

profile httpclass (<profile httpclass key> | all) asm [show]

profile httpclass (<profile httpclass key> | all) cookies [show]

profile httpclass (<profile httpclass key> | all) defaults from [show]

profile httpclass (<profile httpclass key> | all) headers [show]

profile httpclass (<profile httpclass key> | all) hosts [show]

profile httpclass (<profile httpclass key> | all) name [show]

profile httpclass (<profile httpclass key> | all) partition [show]

profile httpclass (<profile httpclass key> | all) paths [show]

profile httpclass (<profile httpclass key> | all) pool [show]

profile httpclass (<profile httpclass key> | all) redirect [show]

profile httpclass (<profile httpclass key> | all) stats [show]

profile httpclass (<profile httpclass key> | all) url rewrite [show]

profile httpclass (<profile httpclass key> | all) wa [show]

Deleteprofile httpclass (<profile httpclass key> | all) delete

DescriptionYou can use this command to create an HTTP class profile, redirect HTTP traffic to HTTPS using the same virtual server, and redirect HTTP traffic without changing the URL in the browser.

ExamplesCreates an HTTP class profile named myhttpclassprofile that inherits its settings from the system default HTTP Class profile:

profile httpclass myhttpclassprofile { }

OptionsYou can use these options with the profile httpclass command:

◆ asmEnables application security management. You can set the asm option only if the system is licensed for the BIG-IP® Application Security Manager. The options are enable, disable, and default.

◆ cookiesSpecifies how the system routes all incoming HTTP traffic for the web application, based on cookie headers.

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the parent profile specified.

Bigpipe Utility Reference Guide 3 - 209

Page 246: BIG IP Reference

Chapter 3

◆ headersSpecifies how the system routes incoming HTTP traffic for the web application, based on HTTP headers and values.

◆ hostsSpecifies how the system routes incoming HTTP traffic, based on host information.

◆ partitionDisplays the partition within which the profile resides.

◆ pathsSpecifies how the system routes all incoming HTTP traffic for the web application, based on URI paths.

◆ poolSpecifies a local traffic pool to which the system sends the HTTP traffic. The options are <pool key>, none, and default.

◆ redirectSpecifies a URL to which the system redirects the traffic. The options are none, <string>, and default.

◆ url rewriteSpecifies the TCL expression that the system uses to rewrite the request URI that is forwarded to the server without sending an HTTP redirect to the client. The options are none, <string>, and default.

◆ waSpecifies web acceleration. You can set the wa option only if the system is licensed for the BIG-IP WebAccelerator Module. The options are enable, disable, and default.

See alsoprofile(1), profile http(1)

3 - 210

Page 247: BIG IP Reference

Bigpipe Utility Command Reference

profile oneconnectCreates, modifies, displays, or deletes a OneConnect™ profile.

SyntaxUse this command to create, modify, display, or delete a OneConnect profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile oneconnect <profile oneconnect key> {}

profile oneconnect (<profile oneconnect key> | all) [{] <profile oneconnect arg list> [}]

<profile oneconnect key> ::=

<name>

<profile oneconnect arg> ::=

defaults from (<profile oneconnect key> | none)

idle timeout override ([<number>d] [<hh>:<mm>:<ss>] | disable | indefinite)

max age <number>

max reuse <number>

max size <number>

name <name>

source mask (<ip mask> | none)

profile oneconnect (<profile oneconnect key> | all) stats reset

Displayprofile oneconnect [<profile oneconnect key> | all] [show [all]]

profile oneconnect [<profile oneconnect key> | all] list [all]

profile oneconnect (<profile oneconnect key> | all) defaults from [show]

profile oneconnect (<profile oneconnect key> | all) idle timeout override [show]

profile oneconnect (<profile oneconnect key> | all) max age [show]

profile oneconnect (<profile oneconnect key> | all) max reuse [show]

profile oneconnect (<profile oneconnect key> | all) max size [show]

profile oneconnect (<profile oneconnect key> | all) name [show]

Bigpipe Utility Reference Guide 3 - 211

Page 248: BIG IP Reference

Chapter 3

profile oneconnect (<profile oneconnect key> | all) partition [show]

profile oneconnect (<profile oneconnect key> | all) source mask [show]

profile oneconnect (<profile oneconnect key> | all) stats [show]

Deleteprofile oneconnect (<profile oneconnect key> | all) delete

DescriptionCreate a OneConnect profile that optimizes connections by improving client performance and increasing server capacity.

ExamplesCreates a OneConnect profile named myOCprofile that inherits its settings from the system default OneConnect profile:

profile oneconnect myOCprofile { }

OptionsYou can use these options with the profile oneconnect command:

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the parent profile specified.

◆ idle timeout overrideSpecifies the number of seconds that a connection is idle before the connection flow is eligible for deletion. Possible values are disable, indefinite, or a numeric value that you specify. The default value is disable.

◆ max sizeSpecifies the maximum number of connections that the system holds in the connection reuse pool. If the pool is already full, then the server-side connection closes after the response is completed. The default value is 10000.

◆ max ageSpecifies the maximum age in number of seconds allowed for a connection in the connection reuse pool. For any connection with an age higher than this value, the system removes that connection from the reuse pool. The default maximum age is 86400.

◆ max reuseSpecifies the maximum number of times that a server-side connection can be reused. The default value is 1000.

◆ partitionDisplays the partition within which the profile resides.

3 - 212

Page 249: BIG IP Reference

Bigpipe Utility Command Reference

◆ source maskSpecifies a source IP mask. The system applies the value of this setting to the source address to determine its eligibility for reuse. A mask of 0 causes the system to share reused connections across all clients. A host mask, that is, all 1 values in binary, causes the system to share only those reused connections originating from the same client IP address. The default mask is 0.0.0.0.

See alsoprofile(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 213

Page 250: BIG IP Reference

Chapter 3

profile persistConfigures a persistence profile.

SyntaxUse this command to create, modify, display, or delete a persistence profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile persist <profile persist key> {}

profile persist (<profile persist key> | all) [{] <profile persist arg list> [}]

<profile persist key> ::=

<name>

<profile persist arg> ::=

across pools (enable | disable)

across services (enable | disable)

across virtuals (enable | disable)

cookie expiration (<number> | immediate | indefinite)

cookie hash length <number>

cookie hash offset <number>

cookie mode (none | insert | rewrite | passive | hash)

cookie name (<string> | none)

defaults from (<profile persist key> | none)

hash alg (default | carp)

hash end (<string> | none)

hash length <number>

hash more (enable | disable)

hash offset <number>

hash start (<string> | none)

hash window <number>

map proxies (enable | disable)

mask (<ip mask> | none)

mirror (enable | disable)

mode (none | source addr | dest addr | cookie | msrdp | ssl | sip | universal | hash)

msrdp session directory (enable | disable)

3 - 214

Page 251: BIG IP Reference

Bigpipe Utility Command Reference

name <name>

override connection limit (enable | disable)

rule (<rule key> | none)

sip info (<string> | none)

timeout (<number> | immediate | indefinite)

Displayprofile persist [<profile persist key> | all] [show [all]]

profile persist [<profile persist key> | all] list [all]

profile persist (<profile persist key> | all) across pools [show]

profile persist (<profile persist key> | all) across services [show]

profile persist (<profile persist key> | all) across virtuals [show]

profile persist (<profile persist key> | all) cookie expiration [show]

profile persist (<profile persist key> | all) cookie hash length [show]

profile persist (<profile persist key> | all) cookie hash offset [show]

profile persist (<profile persist key> | all) cookie mode [show]

profile persist (<profile persist key> | all) cookie name [show]

profile persist (<profile persist key> | all) defaults from [show]

profile persist (<profile persist key> | all) hash alg [show]

profile persist (<profile persist key> | all) hash end [show]

profile persist (<profile persist key> | all) hash length [show]

profile persist (<profile persist key> | all) hash more [show]

profile persist (<profile persist key> | all) hash offset [show]

profile persist (<profile persist key> | all) hash start [show]

profile persist (<profile persist key> | all) hash window [show]

profile persist (<profile persist key> | all) map proxies [show]

profile persist (<profile persist key> | all) mask [show]

profile persist (<profile persist key> | all) mirror [show]

profile persist (<profile persist key> | all) mode [show]

profile persist (<profile persist key> | all) msrdp session directory [show]

profile persist (<profile persist key> | all) name [show]

profile persist (<profile persist key> | all) override connection limit [show]

profile persist (<profile persist key> | all) partition [show]

profile persist (<profile persist key> | all) rule [show]

profile persist (<profile persist key> | all) sip info [show]

profile persist (<profile persist key> | all) timeout [show]

Deleteprofile persist (<profile persist key> | all) delete

Bigpipe Utility Reference Guide 3 - 215

Page 252: BIG IP Reference

Chapter 3

DescriptionA persistence profile is a pre-configured object that automatically enables persistence when you assign the profile to a virtual server. Using a persistence profile avoids having to write an iRule to implement a type of persistence.

Each type of persistence that the traffic management system offers includes a corresponding default persistence profile. These persistence profiles each contain settings and setting values that define the behavior of the system for that type of persistence. You can either use the default profile or create a custom profile based on the default.

ExamplesCreates a custom persistence profile named mypersistprofile that inherits its settings from the default Cookie persistence profile:

profile persist mypersistprofile { defaults from cookie }

Creates a SIP persistence profile named mysippersistenceprofile that persists on Call-ID:

profile persist mysippersistenceprofile sip info Call-ID

OptionsYou can use these options with the profile persist command:

◆ across poolsEnables or disables persistence across pools. When enabled, specifies that the BIG-IP system can use any pool that contains this persistence entry. Persistence across all pools causes the traffic management system to maintain persistence for all connections requested by the same client, regardless of which pool hosts each individual connection initiated by the client. The default value is disable.

◆ across servicesEnables or disables persistence across services. When enabled, this setting specifies that all persistent connections from a client IP address that go to the same virtual IP address also go to the same node. The default value is disable.

◆ across virtualsEnables or disables persistence across virtual servers. When enabled, specifies that all persistent connections from a client IP address that go to the same virtual IP address also go to the same node. Persistence across all virtual servers causes the traffic management system to maintain persistence for all connections requested by the same client, regardless of which virtual server hosts each individual connection initiated by the client. The default value is disable.

◆ cookie expirationSpecifies the cookie expiration date in the format <number> <hh>:<mm>:<ss>. The default value is 0 seconds.

3 - 216

Page 253: BIG IP Reference

Bigpipe Utility Command Reference

◆ cookie hash lengthSpecifies the cookie hash length. The length is the number of bytes to use when calculating the hash value. The default value is 0 bytes.

◆ cookie hash offsetSpecifies the cookie hash offset. The offset is the number of bytes in the cookie to skip before calculating the hash value. The default value is 0 bytes.

◆ cookie modeSpecifies the cookie mode for cookie persistence. The default value is insert. Options are: none, insert, rewrite, passive, hash, and default.

• insertIf you specify HTTP cookie insert method within the profile, the information about the server to which the client connects is inserted in the header of the HTTP response from the server as a cookie. The cookie is named BIGipServer <pool name>, and it includes the address and port of the server handling the connection. The expiration date for the cookie is set, based on the timeout configured on the traffic management system. HTTP cookie insert method is the default value for the cookie mode setting.

• rewriteSpecifies cookie rewrite mode. HTTP cookie rewrite mode requires you to set up the cookie created by the server. For HTTP cookie rewrite mode to succeed, there needs to be a blank cookie coming from the web server for the system to rewrite. For web servers that are Apache server variants, you can add the cookie to every web page header by adding the following entry to the httpd.conf file of the web server:Header add Set-Cookie \ BIGipCookie=0000000000000000000000000...

(Note that the cookie must contain a total of 120 zeros.)

• passiveIf you specify HTTP cookie passive mode, the system does not insert or search for blank Set-Cookie headers in the response from the server. This method does not try to set up the cookie. With this method, the server provides the cookie, formatted with the correct server information and timeout.

• hashIf you specify cookie hash mode, the hash mode consistently maps a cookie value to a specific node. When the client returns to the site, the system uses the cookie information to return the client to a given node. With this mode, the web server must generate the cookie. The system does not create the cookie automatically, as it does with insert mode.

• defaultIndicates that you want to use the settings from the parent profile.

Bigpipe Utility Reference Guide 3 - 217

Page 254: BIG IP Reference

Chapter 3

◆ cookie nameSpecifies the cookie name. Type the name of an HTTP cookie being sent by the Web site. This could be something like Apache or SSLSESSIONID. The name depends on the type of web server your site is running. This attribute is used by cookie hash mode.

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the parent profile specified.

◆ map proxiesEnables or disables the map proxies attribute. The default setting for the map proxies for the persistence variable is enable. The AOL® proxy addresses are hard-coded. This enables you to use client IP address persistence with a simple persist mask, but forces all AOL clients to persist to the same server. All AOL clients persist to the node that was picked for the first AOL client connection received. The default value is disable.

◆ maskSpecifies an IP mask. This is the mask used by simple persistence for connections.

◆ mirrorEnables or disables mirroring of persistence date. The default value is disable.

◆ modeSpecifies the persistence mode. The default value is none. This setting is required. The options are: none, source addr, dest addr, cookie, ssl, msrdp, universal, hash, sip, or default.

• source addrAlso known as simple persistence, source address affinity persistence supports TCP and UDP protocols, and directs session requests to the same server based solely on the source IP address of a packet.

• dest addrAlso known as sticky persistence, destination address affinity persistence supports TCP and UDP protocols, and directs session requests to the same server based solely on the destination IP address of a packet.

• cookieCookie persistence uses an HTTP cookie stored on a client computer to allow the client to reconnect to the same server previously visited at a web site.

• sslSSL persistence is a type of persistence that tracks non-terminated SSL sessions, using the SSL session ID. Even when the client's IP address changes, the BIG-IP local traffic management system still recognizes the connection as being persistent based on the session ID. Note that the term non-terminated SSL sessions refers to sessions in which the traffic management system does not perform the tasks of SSL certificate authentication and encryption/re-encryption.

3 - 218

Page 255: BIG IP Reference

Bigpipe Utility Command Reference

• msrdpMicrosoft Remote Desktop persistence tracks sessions between clients and servers running Microsoft Remote Desktop Protocol (MSRDP).

• universalUniversal persistence allows you to write an expression that defines what to persist on in a packet. The expression, written using the same expression syntax that you use in iRules, defines some sequence of bytes to use as a session identifier.

• hashHash persistence allows you to create a persistence hash based on an existing iRule.

• sipSIP persistence load balances all of the SIP communications in a SIP session to the same SIP server based on SIP header field information.

• defaultSpecify default if you want to use the default system profile settings for persistence mode.

◆ msrdp session directoryEnables or disables the MSRDP session directory option for MSRDP persistence. Enable this option to implement Windows Terminal Server persistence for those Windows servers on which the Session Directory service is not available. The default value is enable.

◆ partitionDisplays the partition within which the profile resides.

◆ ruleSpecifies a rule name if you are using a rule for universal persistence.

◆ sip infoSpecifies the SIP header field on which you want SIP sessions to persist. The default value is Call-ID. Your options include, but are not limited to the following header fields:

• Call-IDSpecifies that the SIP sessions persist on the ID of the call. The Call-ID is a globally unique identifier of a call.

• SIP-ETagSpecifies that the SIP sessions persist on the SIP-ETag.

• ToSpecifies to persist on the destination of the SIP session.

• FromSpecifies that the SIP sessions persist on the origin of the SIP session.

• SubjectSpecifies that the SIP sessions persist on the subject of the SIP session.

Before you can use the sip info option of the profile persist command, you must create a SIP profile (using the profile sip command). Then, you must assign both profiles to the same virtual server.

Bigpipe Utility Reference Guide 3 - 219

Page 256: BIG IP Reference

Chapter 3

◆ timeoutSpecifies the timeout. Possible values are default, immediate, indefinite, or a numeric value that you specify. This is the simple persistence timeout. The default value is 180 seconds.

The timeout value that you specify allows the BIG-IP system to free up resources associated with old persistence entries, without having to test each inbound packet for one of the different types of final messages. A default timeout value exists, which is 180 seconds. If you change the timeout value, F5 recommends that the value be no lower than the default.

See alsoprofile(1), virtual(1), rule(1), bigpipe(1)

3 - 220

Page 257: BIG IP Reference

Bigpipe Utility Command Reference

profile rtsp Configures a Real Time Streaming Protocol (RTSP) profile.

SyntaxUse this command to create, modify, display, or delete an RTSP profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile rtsp <profile rtsp key> {}

profile rtsp (<profile rtsp key> | all) [{] <profile rtsp arg list> [}]

<profile rtsp key> ::=

<name>

<profile rtsp arg> ::=

check source (enable | disable)

defaults from (<profile rtsp key> | none)

idle timeout (<number> | immediate | indefinite)

max header size <number>

max queued data <number>

multicast redirect (enable | disable)

name <name>

proxy (none | external | internal)

proxy header (<string> | none)

real http persistence (enable | disable)

rtcp service (<service> | none)

rtp service (<service> | none)

session reconnect (enable | disable)

unicast redirect (enable | disable)

profile rtsp (<profile rtsp key> | all) stats reset

Displayprofile rtsp [<profile rtsp key> | all] [show [all]]

profile rtsp [<profile rtsp key> | all] list [all]

profile rtsp (<profile rtsp key> | all) check source [show]

profile rtsp (<profile rtsp key> | all) defaults from [show]

Bigpipe Utility Reference Guide 3 - 221

Page 258: BIG IP Reference

Chapter 3

profile rtsp (<profile rtsp key> | all) idle timeout [show]

profile rtsp (<profile rtsp key> | all) max header size [show]

profile rtsp (<profile rtsp key> | all) max queued data [show]

profile rtsp (<profile rtsp key> | all) multicast redirect [show]

profile rtsp (<profile rtsp key> | all) name [show]

profile rtsp (<profile rtsp key> | all) partition [show]

profile rtsp (<profile rtsp key> | all) proxy [show]

profile rtsp (<profile rtsp key> | all) proxy header [show]

profile rtsp (<profile rtsp key> | all) real http persistence [show]

profile rtsp (<profile rtsp key> | all) rtcp service [show]

profile rtsp (<profile rtsp key> | all) rtp service [show]

profile rtsp (<profile rtsp key> | all) session reconnect [show]

profile rtsp (<profile rtsp key> | all) stats [show]

profile rtsp (<profile rtsp key> | all) unicast redirect [show]

Deleteprofile rtsp (<profile rtsp key> | all) delete

DescriptionManages a profile for RTSP traffic.

ExamplesCreates a custom RTSP profile named myrtspprofile that inherits its settings from the system default RTSP profile:

profile rtsp myrtspprofile { }

OptionsYou can use these options with the profile rtsp command:

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all of the settings and values from the specified parent profile.

◆ idle timeoutSpecifies the number of seconds that a connection is idle before the connection is eligible for deletion. You can also specify immediate, indefinite or default. The default value is 300 seconds.

◆ max header sizeSpecifies the maximum size of an RTSP request or response header that the RTSP filter allows before dropping the connection. The default value is 4096 bytes.

◆ max queued dataSpecifies the maximum amount of data that the RTSP filter buffers before dropping the connection. The default value is 32768 bytes.

3 - 222

Page 259: BIG IP Reference

Bigpipe Utility Command Reference

◆ multicast redirectSpecifies whether to enable or disable multicast redirect. When enabled, the client can select the destination to which to stream data. The default value is disable.

◆ partitionDisplays the partition within which the profile resides.

◆ proxySpecifies whether the RTSP filter is associated with an RTSP proxy configuration. The default value is none.

◆ proxy headerWhen a proxy is set, specifies the name of the header in the RTSP proxy configuration that is passed from the client-side virtual server to the server-side virtual server. Note that the name of the header must begin with X-.

◆ real http persistenceSpecifies whether to enable or disable real HTTP persistence. When enabled, the RTSP filter automatically persists Real Networks RTSP over HTTP using the RTSP port. The default value is enable. If you disable this parameter, you can override the default behavior with an iRule.

◆ rtcp serviceThe Real Time Control Protocol (RTCP) allows monitoring of the real-time data delivery. This parameter specifies the number of the port to use for the RTCP service.

◆ rtp serviceThe Real Time Protocol (RTP) provides data transport functions suitable for applications transmitting real-time data. This parameter specifies the number of the port to use for the RTP service.

◆ session reconnectSpecifies whether to enable or disable session reconnect. When enabled, the RTSP filter persists the control connection, which is being resumed, to the correct server. The default value is disable.

◆ unicast redirectSpecifies whether to enable or disable unicast redirect. When enabled, the client can select the destination to which to stream data. The default value is disable.

See alsoprofile(1), virtual(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 223

Page 260: BIG IP Reference

Chapter 3

profile sctp Configures a Stream Control Transmission Protocol (SCTP) profile.

SyntaxUse this command to create, modify, display, or delete an SCTP profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile sctp <profile sctp key> {}

profile sctp (<profile sctp key> | all) [{] <profile sctp arg list> [}]

<profile sctp key> ::=

<name>

<profile sctp arg> ::=

cookie expiration (<number> | immediate | indefinite)

defaults from (<profile sctp key> | none)

heartbeat <number>

idle timeout (<number> | immediate | indefinite)

in streams <number>

init max retries <number>

ip tos (<number> | mimic | pass)

link qos (<number> | mimic | pass)

name <name>

out streams <number>

proxy buffer high <number>

proxy buffer low <number>

recv chunks <number>

recv ordered (enable | disable)

recv window <number>

reset on timeout (enable | disable)

secret (<string> | none)

send buffer <number>

send max retries <number>

send partial (enable | disable)

3 - 224

Page 261: BIG IP Reference

Bigpipe Utility Command Reference

tcp shutdown (enable | disable)

trans chunks <number>

profile sctp (<profile sctp key> | all) stats reset

Displayprofile sctp [<profile sctp key> | all] [show [all]]

profile sctp [<profile sctp key> | all] list [all]

profile sctp (<profile sctp key> | all) cookie expiration [show]

profile sctp (<profile sctp key> | all) defaults from [show]

profile sctp (<profile sctp key> | all) heartbeat [show]

profile sctp (<profile sctp key> | all) idle timeout [show]

profile sctp (<profile sctp key> | all) in streams [show]

profile sctp (<profile sctp key> | all) init max retries [show]

profile sctp (<profile sctp key> | all) ip tos [show]

profile sctp (<profile sctp key> | all) link qos [show]

profile sctp (<profile sctp key> | all) name [show]

profile sctp (<profile sctp key> | all) out streams [show]

profile sctp (<profile sctp key> | all) partition [show]

profile sctp (<profile sctp key> | all) proxy buffer high [show]

profile sctp (<profile sctp key> | all) proxy buffer low [show]

profile sctp (<profile sctp key> | all) recv chunks [show]

profile sctp (<profile sctp key> | all) recv ordered [show]

profile sctp (<profile sctp key> | all) recv window [show]

profile sctp (<profile sctp key> | all) reset on timeout [show]

profile sctp (<profile sctp key> | all) secret [show]

profile sctp (<profile sctp key> | all) send buffer [show]

profile sctp (<profile sctp key> | all) send max retries [show]

profile sctp (<profile sctp key> | all) send partial [show]

profile sctp (<profile sctp key> | all) stats [show]

profile sctp (<profile sctp key> | all) tcp shutdown [show]

profile sctp (<profile sctp key> | all) trans chunks [show]

Deleteprofile sctp (<profile sctp key> | all) delete

DescriptionManages a profile for SCTP traffic.

ExamplesCreates a custom SCTP profile named mysctpprofile that inherits its settings from the system default SCTP profile:

profile sctp mysctpprofile { }

Bigpipe Utility Reference Guide 3 - 225

Page 262: BIG IP Reference

Chapter 3

OptionsYou can use these options with the profile sctp command:

◆ cookie expirationSpecifies how many seconds the cookie is valid. The default value is 60 seconds.

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the parent profile specified.

◆ heartbeatSpecifies the number of seconds to wait before sending a heartbeat chunk. The default value is 30 seconds.

◆ idle timeoutSpecifies the number of seconds without traffic before a connection is eligible for deletion. The default value is 300 seconds.

◆ in streamsSpecifies the number of inbound streams. The default value is 2.

◆ init max retriesSpecifies the maximum number of retries to establish a connection. The default value is 4.

◆ ip tosSpecifies the type of IP service set in packets sent to peer. The default value is 0.

◆ link qosSpecifies the link quality of service set in sent packets. The default value is 0.

◆ out streamsSpecifies the number of outbound streams. The default value is 2.

◆ partitionDisplays the partition within which the profile resides.

◆ proxy buffer highSpecifies the proxy buffer level after which the system closes the receive window. The default value is 16384.

◆ proxy buffer lowSpecifies the proxy buffer level after which the system opens the receive window. The default value is 4096.

◆ recv chunksSpecifies the size (in chunks) of the rx_chunk buffer. The default value is 256.

◆ recv orderedWhen enabled, the system delivers messages to the application layer in order. The default value is enable.

3 - 226

Page 263: BIG IP Reference

Bigpipe Utility Command Reference

◆ recv windowSpecifies the size (in bytes) of the receive window. Prorate this value to the Receive Chunks value. The default value is 65536.

◆ reset on timeoutWhen enabled, the system resets a connection when the connection times out. The default value is enable.

◆ secretSpecifies the internal secret string that the system uses for HTTP Message Authenticated Code (HMAC) cookies.

◆ send bufferSpecifies the size in bytes of the buffer. The default value is 65536.

◆ send max retriesSpecifies the maximum number of times the system tries again to send data. The default value is 8.

◆ send partialWhen enabled, the system accepts partial application data. The default value is enable.

◆ tcp shutdownWhen enabled, the system emulates the closing of a TCP connection. The default value is enable.

◆ trans chunksSpecifies the size (in chunks) of the tx_chunk buffer. The default value is 256.

See alsoprofile(1), bigpipe(1), profile rtsp(1), profile sip(1)

Bigpipe Utility Reference Guide 3 - 227

Page 264: BIG IP Reference

Chapter 3

profile serversslConfigures a Server SSL profile.

SyntaxUse this command to create, modify, display, or delete a Server SSL profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile serverssl <profile serverssl key> {}

profile serverssl (<profile serverssl key> | all) [{] <profile serverssl arg list> [}]

<profile serverssl key> ::=

<name>

<profile serverssl arg> ::=

alert timeout (<number> | immediate | indefinite)

authenticate (always | once)

authenticate depth <number>

authenticate name (<string> | none)

ca file (<file name> | none)

cache size <number>

cache timeout (<number> | immediate | indefinite)

cert (<file name> | none)

chain (<file name> | none)

ciphers (<string> | none)

crl file (<file name> | none)

defaults from (<profile serverssl key> | none)

handshake timeout (<number> | immediate | indefinite)

key (<file name> | none)

mode (disable | enable)

modssl methods (enable | disable)

name <name>

options [all bugfixes] [cipher server preference] [dont insert empty fragments] \ [ephemeral rsa] [microsoft big sslv3 buffer] [msie sslv2 rsa padding] \ [netscape ca dn bug] [netscape challenge bug] [netscape demo cipher change bug] \ [netscape reuse cipher change bug] [no session resumption on renegotiation] \ [no sslv2] [no sslv3] [no tlsv1] [passive close] [pkcs1 check 1] [pkcs1 check 2] \

3 - 228

Page 265: BIG IP Reference

Bigpipe Utility Command Reference

[single dh use] [ssleay 080 client dh bug] [sslref2 reuse cert type bug] \ [tls block padding bug] [tls d5 bug] [tls rollback bug] \ [microsoft sess id bug] | none

passphrase (<string> | none)

peer cert mode (ignore | require)

renegotiate period (<number> | immediate | indefinite)

renegotiate size (<number>[MB|mb] | indefinite)

strict resume (enable | disable)

unclean shutdown (enable | disable)

profile serverssl (<profile serverssl key> | all) stats reset

Displayprofile serverssl [<profile serverssl key> | all] [show [all]]

profile serverssl [<profile serverssl key> | all] list [all]

profile serverssl (<profile serverssl key> | all) alert timeout [show]

profile serverssl (<profile serverssl key> | all) authenticate [show]

profile serverssl (<profile serverssl key> | all) authenticate depth [show]

profile serverssl (<profile serverssl key> | all) authenticate name [show]

profile serverssl (<profile serverssl key> | all) ca file [show]

profile serverssl (<profile serverssl key> | all) cache size [show]

profile serverssl (<profile serverssl key> | all) cache timeout [show]

profile serverssl (<profile serverssl key> | all) cert [show]

profile serverssl (<profile serverssl key> | all) chain [show]

profile serverssl (<profile serverssl key> | all) ciphers [show]

profile serverssl (<profile serverssl key> | all) crl file [show]

profile serverssl (<profile serverssl key> | all) defaults from [show]

profile serverssl (<profile serverssl key> | all) handshake timeout [show]

profile serverssl (<profile serverssl key> | all) key [show]

profile serverssl (<profile serverssl key> | all) mode [show]

profile serverssl (<profile serverssl key> | all) modssl methods [show]

profile serverssl (<profile serverssl key> | all) name [show]

profile serverssl (<profile serverssl key> | all) options [show]

profile serverssl (<profile serverssl key> | all) partition [show]

profile serverssl (<profile serverssl key> | all) passphrase [show]

profile serverssl (<profile serverssl key> | all) peer cert mode [show]

profile serverssl (<profile serverssl key> | all) renegotiate period [show]

profile serverssl (<profile serverssl key> | all) renegotiate size [show]

profile serverssl (<profile serverssl key> | all) stats [show]

profile serverssl (<profile serverssl key> | all) strict resume [show]

profile serverssl (<profile serverssl key> | all) unclean shutdown [show]

Deleteprofile serverssl (<profile serverssl key> | all) delete

Bigpipe Utility Reference Guide 3 - 229

Page 266: BIG IP Reference

Chapter 3

DescriptionServer-side profiles allow the traffic management system to handle encryption tasks for any SSL connection being sent from a local traffic management system to a target server. A server-side SSL profile is able to act as a client by presenting certificate credentials to a server when authentication of the local traffic management system is required. You implement this type of profile by using the default profile, or creating a custom profile based on the Server SSL profile template and modifying its settings.

ExamplesCreates a custom Server SSL profile named myserversslprofile that inherits its settings from the system default serverssl profile:

profile serverssl myserversslprofile { }

ArgumentsSeveral arguments are available for use with this command.

◆ ca fileSpecifies the certificate authority (CA) file name or indicates the system uses the certificate authority file name from the parent profile. Configures certificate verification by specifying a list of client or server CAs that the traffic management system trusts.

◆ certSpecifies the certificate file name or indicates the system uses the certificate file name from the parent profile. Specifies the name of the certificate installed on the traffic management system for the purpose of terminating or initiating an SSL connection. The default value is default.crt.

◆ chainSpecifies the chain name or indicates the system uses the chain name from the parent profile. Specifies or builds a certificate chain file that a client can use to authenticate the profile.

◆ ciphersSpecifies a cipher name or indicates the system uses the default ciphers from the parent profile.

◆ crl fileSpecifies the certificate revocation list file name or indicates the system uses the certificate revocation file name from the parent profile.

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the parent profile specified.

3 - 230

Page 267: BIG IP Reference

Bigpipe Utility Command Reference

◆ keyneaSpecifies the key file name or indicates the system uses the key file name from the parent profile. Specifies the name of the key installed on the traffic management system for the purpose of terminating or initiating an SSL connection. The default key file name is default.key.

◆ modeSpecifies the profile mode. The options are enable, disable, or default. Enables or disables SSL processing. The default value is enable.

OptionsThese options are available, including some industry-related workarounds:

◆ alert timeoutSpecifies the alert timeout in seconds. You can also specify immediate, indefinite, or default. The default value is 60 seconds.

◆ authenticateSpecifies frequency of authentication. Options are once, always, or default.

◆ authenticate depthSpecifies the client certificate chain maximum traversal depth.

◆ authenticate nameSpecifies a Common Name (CN) that is embedded in a server certificate. The system authenticates a server based on the specified CN.

◆ cache sizeSpecifies the SSL session cache size. For client-side profiles only, you can configure timeout and size values for the SSL session cache. Because each profile maintains a separate SSL session cache, you can configure the values on a per-profile basis.

◆ cache timeoutSpecifies the SSL session cache timeout value, which is the usable lifetime seconds of negotiated SSL session IDs. The default value is 300 seconds. Acceptable values are integers greater than or equal to 5. You can also set this value to immediate or indefinite.

◆ handshake timeoutSpecifies the handshake timeout in seconds. You can also specify immediate, indefinite, or default.

◆ modssl methodsEnables or disables ModSSL method emulation. Use enable when OpenSSL methods are inadequate. For example, you can enable ModSSL method emulation when you want to use SSL compression over TLSv1.

◆ partitionDisplays the partition within which the profile resides.

◆ passphraseSpecifies the key passphrase, if required.

Bigpipe Utility Reference Guide 3 - 231

Page 268: BIG IP Reference

Chapter 3

◆ peer cert modeSpecifies the peer certificate mode. Options are require, ignore, and default.

◆ renegotiate periodSpecifies the number of seconds from the initial connect time after which the system renegotiates an SSL session. The default value is indefinite meaning that you do not want the system to renegotiate SSL sessions. Each time the session renegotiation is successful, a new connection is started. Therefore, the system attempts to renegotiate the session again, in the specified amount of time following the successful session renegotiation. For example, setting the Renegotiate Period to 3600 seconds triggers session renegotiation at least once an hour.

◆ renegotiate sizeSpecifies a throughput size, in bytes, of SSL renegotiation. This setting forces the traffic management system to renegotiate an SSL session based on the size, in megabytes, of application data that is transmitted over the secure channel. The default value is indefinite specifying that you do not want a throughput size.

◆ strict resumeYou can enable or disable the resumption of SSL sessions after an unclean shutdown. The default value is disable, which indicates that the SSL profile refuses to resume SSL sessions after an unclean shutdown.

◆ unclean shutdownBy default, the SSL profile performs unclean shutdowns of all SSL connections, which means that underlying TCP connections are closed without exchanging the required SSL shutdown alerts. If you want to force the SSL profile to perform a clean shutdown of all SSL connections, you can disable the default setting.

◆ [ALL BUGFIXES]This option enables all of the industry-related defect workarounds. It is usually safe to use the ALL BUGFIXES option to enable the defect workaround options when compatibility with broken implementations is needed. Note that if you edit the configuration in the browser-based Configuration utility, the syntax for this option expands into each individual option.

◆ [CIPHER SERVER PREFERENCE]When choosing a cipher, use this option to set all the server's preferences instead of the client’s preferences. When this option is not set, the SSL server always follows the client's preferences. When this option is set, the SSLv3/TLSv1 server chooses by using its own preferences. Due to the different protocol, for SSLv2 the server sends its list of preferences to the client and the client always chooses.

◆ [DONT INSERT EMPTY FRAGMENTS]This option disables a countermeasure against a SSL 3.0/TLS 1.0 protocol vulnerability affecting CBC ciphers. These ciphers cannot be handled by certain broken SSL implementations. This option has no effect for connections using other ciphers.

3 - 232

Page 269: BIG IP Reference

Bigpipe Utility Command Reference

◆ [EPHEMERAL RSA]This option uses ephemeral (temporary) RSA keys when doing RSA operations. According to the specifications, this is only done when an RSA key can be used only for signature operations (namely under export ciphers with restricted RSA key length). By setting this option, you specify that you want to use ephemeral RSA keys always. This option breaks compatibility with the SSL/TLS specifications and may lead to interoperability problems with clients. Therefore, F5 does not recommend this option. You should use ciphers with EDH (ephemeral Diffie-Hellman) key exchange instead. This option is ignored for server-side SSL.

◆ [MICROSOFT BIG SSLV3 BUFFER]This option enables a workaround for communicating with older Microsoft applications that use non-standard SSL record sizes.

◆ [MICROSOFT SESS ID BUG]This option handles a Microsoft session ID problem.

◆ [MSIE SSLV2 RSA PADDING]This option enables a workaround for communicating with older Microsoft applications that use non-standard RSA key padding. This option is ignored for server-side SSL.

◆ [NETSCAPE CA DN BUG]This option handles a defect regarding the system crashing or hanging. If the system accepts a Netscape Navigator browser connection, demands a client cert, has a non-self-signed CA that does not have its CA in Netscape, and the browser has a certificate, the system crashes or hangs.

◆ [NETSCAPE CHALLENGE BUG]This option handles the Netscape challenge problem.

◆ [NETSCAPE DEMO CIPHER CHANGE BUG]This option deliberately manipulates the SSL server session resumption behavior to mimic that of certain Netscape servers (see the Netscape reuse cipher change bug workaround description). F5 does not recommend this option for normal use. It is ignored for server-side SSL.

◆ [NETSCAPE REUSE CIPHER CHANGE BUG]This option handles a defect within Netscape Enterprise Server version 2.01 that only appears when connecting through SSLv2/v3 then reconnecting through SSLv3. In this case, the cipher list changes.

First, a connection is established with the RC4-MD5 cipher list. If it is then resumed, the connection switches to using the DES-CBC3-SHA cipher list. However, according to RFC 2246 (section 7.4.1.3, cipher suite), the cipher list should remain RC4-MD5.

As a workaround, you can attempt to connect with a cipher list of DES-CBC-SHA:RC4-MD5, and so on. Each new connection uses the RC4-MD5 cipher list, but any re-connection attempts to use the DES-CBC-SHA cipher list. Thus Netscape, when reconnecting, always uses the first cipher in the cipher list.

Bigpipe Utility Reference Guide 3 - 233

Page 270: BIG IP Reference

Chapter 3

◆ [NO SESSION RESUMPTION ON RENEGOTIATION]When performing renegotiation as an SSL server, this option always starts a new session (that is, session resumption requests are only accepted in the initial handshake). The system ignores this option for server-side SSL.

◆ [NO SSLv2]Do not use the SSLv2 protocol.

◆ [NO SSLv3]Do not use the SSLv3 protocol.

◆ [NO TLSv1]Do not use the TLSv1 protocol.

◆ [PASSIVE CLOSE]Specifies how to handle passive closes.

• noneChoose this option if you want to disable all workarounds. F5 does not recommend this option.

• defaultSpecifies the value, all bugfixes, which enables a set of industry-related miscellaneous workarounds related to SSL processing.

◆ [PKCS1 CHECK 1]This debugging option deliberately manipulates the PKCS1 padding used by SSL clients in an attempt to detect vulnerability to particular SSL server vulnerabilities. F5 does not recommend this option for normal use. The system ignores this option for client-side SSL.

◆ [PKCS1 CHECK 2]This debugging option deliberately manipulates the PKCS1 padding used by SSL clients in an attempt to detect vulnerability to particular SSL server vulnerabilities. F5 does not recommend this option for normal use. The system ignores this option for client-side SSL.

◆ [SINGLE DH USE]This option creates a new key when using temporary/ephemeral DH parameters. This option must be used to prevent small subgroup attacks, when the DH parameters were not generated using strong primes (for example. when using DSA-parameters). If strong primes were used, it is not strictly necessary to generate a new DH key during each handshake, but it is recommended. You should enable the Single DH Use option whenever temporary or ephemeral DH parameters are used.

◆ [SSLEAY 080 CLIENT DH BUG]This option enables a workaround for communicating with older SSLeay-based applications that specify an incorrect Diffie-Hellman public value length. This option is ignored for server-side SSL.

◆ [SSLREF2 REUSE CERT TYPE BUG]This option handles the SSL reuse certificate type problem.

3 - 234

Page 271: BIG IP Reference

Bigpipe Utility Command Reference

◆ [TLS BLOCK PADDING BUG]This option enables a workaround for communicating with older TLSv1-enabled applications that use incorrect block padding.

◆ [TLS D5 BUG]This option is a workaround for communicating with older TLSv1-enabled applications that specify an incorrect encrypted RSA key length. This option is ignored for server-side SSL.

◆ [TLS ROLLBACK BUG]This option disables version rollback attack detection. During the client key exchange, the client must send the same information about acceptable SSL/TLS protocol levels as it sends during the first hello. Some clients violate this rule by adapting to the server's answer. For example, the client sends an SSLv2 hello and accepts up to SSLv3.1 (TLSv1), but the server only processes up to SSLv3. In this case, the client must still use the same SSLv3.1 (TLSv1) announcement. Some clients step down to SSLv3 with respect to the server's answer and violate the version rollback protection. The system ignores this option for server-side SSL.

See alsoprofile(1), profile clientssl(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 235

Page 272: BIG IP Reference

Chapter 3

profile sipConfigures a Session Initiation Protocol (SIP) profile.

SyntaxUse this command to create, modify, display, or delete a SIP profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile sip <profile sip key> {}

profile sip (<profile sip key> | all) [{] <profile sip arg list> [}]

<profile sip key> ::=

<name>

<profile sip arg> ::=

defaults from (<profile sip key> | none)

dialog aware (enable | disable)

insert record route (enable | disable)

insert via (enable | disable)

max size <number>

name <name>

secure via (enable | disable)

security (enable | disable)

sip community (<string> | none)

terminate bye (enable | disable)

via userdata (<string> | none)

profile sip (<profile sip key> | all) stats reset

Displayprofile sip [<profile sip key> | all] [show [all]]

profile sip [<profile sip key> | all] list [all]

profile sip (<profile sip key> | all) defaults from [show]

profile sip (<profile sip key> | all) dialog aware [show]

profile sip (<profile sip key> | all) insert record route [show]

profile sip (<profile sip key> | all) insert via [show]

3 - 236

Page 273: BIG IP Reference

Bigpipe Utility Command Reference

profile sip (<profile sip key> | all) max size [show]

profile sip (<profile sip key> | all) name [show]

profile sip (<profile sip key> | all) partition [show]

profile sip (<profile sip key> | all) secure via [show]

profile sip (<profile sip key> | all) security [show]

profile sip (<profile sip key> | all) sip community [show]

profile sip (<profile sip key> | all) stats [show]

profile sip (<profile sip key> | all) terminate bye [show]

profile sip (<profile sip key> | all) via userdata [show]

DescriptionThis command provides the ability to create a SIP profile.

ExamplesCreates a SIP profile named mysipprofile using the system defaults:

profile sip mysipprofile { }

Creates a SIP profile named mysipprofile that leaves a connection open following the completion of a BYE transaction:

profile sip mysipprofile { terminate bye disable }

OptionsYou can use these options with the profile sip command:

◆ defaults from Specifies the profile that you want to use as the parent profile. Your new profile inherits all of the settings and values from the specified parent profile. The default value is sip.

◆ dialog awareEnables or disables the ability for the system to be aware of unauthorized use of the SIP dialog. The default value is disable.

◆ insert record route Enables or disables the insertion of a Record-Route header, which indicates the next hop for the following SIP request messages. The default value is disable.

◆ insert via Enables or disables the insertion of a Via header, which indicates where the message originated. The response message uses this routing information. The default value is disable.

◆ max size Specifies the maximum SIP message size that the BIG-IP system accepts. The default value is 64000 bytes.

◆ partitionDisplays the partition within which the profile resides.

Bigpipe Utility Reference Guide 3 - 237

Page 274: BIG IP Reference

Chapter 3

◆ secure via Enables or disables the insertion of a Secure Via header, which indicates where the message originated. When you are using SSL/TLS (over TCP) to create a secure channel with the server node, use this setting to configure the BIG-IP system to insert a Secure Via header into SIP requests. The default value is disable.

◆ securityEnables or disables security for the SIP profile. The default value is disable.

◆ sip communitySpecifies the community to which you want to assign the virtual server that you associate with this profile. The default value is none.

◆ terminate bye Enables or disables the termination of a connection when a BYE transaction finishes. Use this parameter with UDP connections only, not with TCP connections. The default value is enable.

◆ via userdataEnables or disables the insertion of a Via header specified by a system administrator. The default value is none.

See alsobigpipe(1), profile(1), profile persist(1)

3 - 238

Page 275: BIG IP Reference

Bigpipe Utility Command Reference

profile statsCreates, modifies, displays, or deletes a Statistics profile.

SyntaxUse this command to create, modify, display, or delete a Statistics profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile stats <profile stats key> {}

profile stats (<profile stats key> | all) \

[{] <profile stats arg list> [}]

<profile stats key> ::=

<name>

<profile stats arg> ::=

defaults from (<profile stats key> | none)

field<i> (<name> | none | default) (i=1-32)

profile stats (<profile stats key> | all) stats reset

Displayprofile stats [<profile stats key> | all] [show [all]]

profile stats [<profile stats key> | all] list [all]

profile stats (<profile stats key> | all) defaults from [show]

profile stats (<profile stats key> | all) field<i> [show]

Deleteprofile stats (<profile stats key> | all) delete

DescriptionUse the stats profile to create a custom Statistics profile.

Bigpipe Utility Reference Guide 3 - 239

Page 276: BIG IP Reference

Chapter 3

ExamplesLists all available custom statistics fields:

profile stats all list

OptionsYou can use these options with the profile stats command:

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the specified parent profile.

◆ field Specifies the field identifier. This is a number from 1 to 32.

◆ partitionDisplays the partition within which the profile resides.

See alsoprofile(1), bigpipe(1)

3 - 240

Page 277: BIG IP Reference

Bigpipe Utility Command Reference

profile streamConfigures a Stream profile.

SyntaxUse this command to create, modify, display, or delete a Stream profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile stream <profile stream key> {}

profile stream (<profile stream key> | all) [{] <profile stream arg list> [}]

<profile stream key> ::=

<name>

<profile stream arg> ::=

defaults from (<profile stream key> | none)

name <name>

source (<string> | none)

target (<string> | none)

profile stream (<profile stream key> | all) stats reset

Displayprofile stream [<profile stream key> | all] [show [all]]

profile stream [<profile stream key> | all] list [all]

profile stream (<profile stream key> | all) defaults from [show]

profile stream (<profile stream key> | all) name [show]

profile stream (<profile stream key> | all) partition [show]

profile stream (<profile stream key> | all) source [show]

profile stream (<profile stream key> | all) stats [show]

profile stream (<profile stream key> | all) target [show]

Deleteprofile stream (<profile stream key> | all) delete

Bigpipe Utility Reference Guide 3 - 241

Page 278: BIG IP Reference

Chapter 3

DescriptionYou can use the Stream profile to search and replace strings within a data stream, such as a TCP connection.

ExamplesCreates a custom Stream profile named mystreamprofile that inherits its settings from the system default stream profile:

profile stream mystreamprofile { }

OptionsYou can use these options with the profile stream command:

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the parent profile specified.

◆ partitionDisplays the partition within which the profile resides.

◆ targetSpecifies the string you want to rewrite. You can also specify default if you want to use the default system profile value.

◆ sourceSpecifies the string that is used to rewrite the target string. You can also specify default if you want to use the default stream profile value.

See alsoprofile(1), virtual(1), bigpipe(1)

3 - 242

Page 279: BIG IP Reference

Bigpipe Utility Command Reference

profile tcpConfigures a TCP profile.

SyntaxUse this command to create, modify, display, or delete a TCP profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile tcp <profile tcp key> {}

profile tcp (<profile tcp key> | all) [{] <profile tcp arg list> [}]

<profile tcp key> ::=

<name>

<profile tcp arg> ::=

abc (enable | disable)

ack on push (enable | disable)

bandwidth delay (enable | disable)

close wait (<number> | immediate | indefinite)

cmetrics cache (enable | disable)

congestion control (reno | newreno | scalable | highspeed | none)

defaults from (<profile tcp key> | none)

deferred accept (enable | disable)

delayed acks (enable | disable)

dsack (enable | disable)

ecn (enable | disable)

fin wait (<number> | immediate | indefinite)

idle timeout (<number> | immediate | indefinite)

ip tos (<number> | mimic | pass)

keep alive interval <number>

limited transmit (enable | disable)

link qos (<number> | mimic | pass)

max retrans <number>

max retrans syn <number>

md5 sign (enable | disable)

md5 sign passphrase (<string> | none)

Bigpipe Utility Reference Guide 3 - 243

Page 280: BIG IP Reference

Chapter 3

nagle (enable | disable)

name <name>

pkt loss ignore burst <number>

pkt loss ignore rate <number>

proxy buffer high <number>

proxy buffer low <number>

proxy mss (enable | disable)

proxy options (enable | disable)

recv window <number>

reset on timeout (enable | disable)

rfc1323 (enable | disable)

selective acks (enable | disable)

send buffer <number>

slow start (enable | disable)

time wait (<number> | immediate | indefinite)

time wait recycle (enable | disable)

verified accept (enable | disable)

profile tcp (<profile tcp key> | all) stats reset

Displayprofile tcp [<profile tcp key> | all] [show [all]]

profile tcp [<profile tcp key> | all] list [all]

profile tcp (<profile tcp key> | all) abc [show]

profile tcp (<profile tcp key> | all) ack on push [show]

profile tcp (<profile tcp key> | all) bandwidth delay [show]

profile tcp (<profile tcp key> | all) close wait [show]

profile tcp (<profile tcp key> | all) cmetrics cache [show]

profile tcp (<profile tcp key> | all) congestion control [show]

profile tcp (<profile tcp key> | all) defaults from [show]

profile tcp (<profile tcp key> | all) deferred accept [show]

profile tcp (<profile tcp key> | all) delayed acks [show]

profile tcp (<profile tcp key> | all) dsack [show]

profile tcp (<profile tcp key> | all) ecn [show]

profile tcp (<profile tcp key> | all) fin wait [show]

profile tcp (<profile tcp key> | all) idle timeout [show]

profile tcp (<profile tcp key> | all) ip tos [show]

profile tcp (<profile tcp key> | all) keep alive interval [show]

profile tcp (<profile tcp key> | all) limited transmit [show]

profile tcp (<profile tcp key> | all) link qos [show]

profile tcp (<profile tcp key> | all) max retrans [show]

profile tcp (<profile tcp key> | all) max retrans syn [show]

profile tcp (<profile tcp key> | all) md5 sign [show]

profile tcp (<profile tcp key> | all) md5 sign passphrase [show]

profile tcp (<profile tcp key> | all) nagle [show]

3 - 244

Page 281: BIG IP Reference

Bigpipe Utility Command Reference

profile tcp (<profile tcp key> | all) name [show]

profile tcp (<profile tcp key> | all) partition [show]

profile tcp (<profile tcp key> | all) pkt loss ignore burst [show]

profile tcp (<profile tcp key> | all) pkt loss ignore rate [show]

profile tcp (<profile tcp key> | all) proxy buffer high [show]

profile tcp (<profile tcp key> | all) proxy buffer low [show]

profile tcp (<profile tcp key> | all) proxy mss [show]

profile tcp (<profile tcp key> | all) proxy options [show]

profile tcp (<profile tcp key> | all) recv window [show]

profile tcp (<profile tcp key> | all) reset on timeout [show]

profile tcp (<profile tcp key> | all) rfc1323 [show]

profile tcp (<profile tcp key> | all) selective acks [show]

profile tcp (<profile tcp key> | all) send buffer [show]

profile tcp (<profile tcp key> | all) slow start [show]

profile tcp (<profile tcp key> | all) stats [show]

profile tcp (<profile tcp key> | all) time wait [show]

profile tcp (<profile tcp key> | all) time wait recycle [show]

profile tcp (<profile tcp key> | all) verified accept [show]

Deleteprofile tcp (<profile tcp key> | all) delete

DescriptionThe TCP profile is a configuration tool for managing TCP network traffic. Many of the TCP profile settings are standard SYSCTL types of settings, while others are unique to the traffic management system. For most of the TCP profile settings, the default values usually meet your needs. The specific settings that you might want to change are: Reset on Timeout, Idle Timeout, IP ToS, and Link QoS.

The BIG-IP system installation includes these TCP-type profiles: tcp, tcp-lan-optimized, and tcp-wan-optimized. You can modify the settings of these profiles or create new TCP-type profiles using any of these existing profiles as parent profiles.

ExamplesCreates a custom TCP profile named mystcpprofile that inherits its settings from the system default tcp profile:

profile tcp mytcpprofile { }

Bigpipe Utility Reference Guide 3 - 245

Page 282: BIG IP Reference

Chapter 3

OptionsYou can use these options with the profile tcp command:

◆ abcWhen enabled, increases the congestion window by basing the increase amount on the number of previously unacknowledged bytes that each ACK covers. The default value is enable.

◆ ack on pushWhen enabled, significantly improves performance to Windows and MacOS peers who are writing out on a very small send buffer. The default value is disable.

◆ bandwidth delayWhen enabled, the system attempts to calculate the optimal bandwidth to use to contact the client, based on throughput and round-trip time, without exceeding the available bandwidth. The default value is enable.

◆ close waitSpecifies the number of seconds that a connection remains in a LAST-ACK state before quitting. A value of 0 represents a term of forever (or until the matrix of the FIN state). The default value is 5 seconds. You can also specify immediate, indefinite, or default.

◆ cmetrics cacheWhen enabled, specifies that the system uses a cache for storing congestion metrics. The default value is enable.

◆ congestion controlSpecifies the algorithm to use to share network resources among competing users to reduce congestion. The default value is New Reno.

The options are:

• High SpeedSpecifies that the system uses a more aggressive, loss-based algorithm.

• New RenoSpecifies that the system uses a modification to the Reno algorithm that responds to partial acknowledgements when SACKs are unavailable.

• NoneSpecifies that the system does not use a network-congestion-control mechanism, even when congestion occurs.

• RenoSpecifies that the system uses an implementation of the TCP Fast Recovery algorithm, which is based on the implementation in the BSD Reno release.

• ScalableSpecifies that the system uses a TCP algorithm modification that adds a scalable, delay-based and loss-based component into the Reno algorithm.

3 - 246

Page 283: BIG IP Reference

Bigpipe Utility Command Reference

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the parent profile.

◆ deferred acceptWhen enabled, the system defers allocation of the connection chain context until the client response is received. This setting is useful for dealing with 3-way handshake DOS attacks. The default value is disable.

◆ delayed acksWhen enabled, the traffic management system allows coalescing of multiple ACK responses. The default value is enable.

◆ dsackWhen enabled, specifies the use of the Selective ACKs (SACK) option to acknowledge duplicate segments. The default value is disable.

◆ ecnWhen enabled, the system uses the TCP flags CWR and ECE to notify its peer of congestion and congestion counter-measures. The default value is disable.

◆ fin waitSpecifies the number of seconds that a connection is in the FIN-WAIT or closing state before quitting. The default value is 5 seconds. A value of 0 represents a term of forever (or until the matrix of the FIN state). You can also specify immediate, indefinite, or default.

◆ idle timeoutSpecifies the number of seconds that a connection is idle before the connection is eligible for deletion. You can also specify indefinite or default. The default value is 300 seconds.

◆ ip tosSpecifies the Type of Service level that the traffic management system assigns to TCP packets when sending them to clients.

◆ keep alive intervalSpecifies the keep alive probe interval, in seconds. The default value is 1800 seconds.

◆ limited transmitWhen enabled, the system uses limited transmit recovery revisions for fast retransmits (as specified in RFC 3042) to reduce the recovery time for connections on a lossy network. The default value is enable.

◆ link qosSpecifies the Quality of Service level that the system assigns to TCP packets when sending them to clients.

◆ max retransSpecifies the maximum number of retransmissions of data segments that the system allows.

◆ max retrans synSpecifies the maximum number of retransmissions of SYN segments that the system allows.

Bigpipe Utility Reference Guide 3 - 247

Page 284: BIG IP Reference

Chapter 3

◆ md5 signSpecifies, when enabled, that the system uses RFC2385 TCP-MD5 signatures to protect TCP traffic against intermediate tampering. The default value is disable.

◆ md5 sign passphraseSpecifies, when enabled, a plaintext passphrase which may be between 1 and 80 characters in length, and is used in a shared-secret scheme to implement the spoof-prevention parts of RFC2385.

◆ nagleSpecifies, when enabled, that the system applies Nagle's algorithm to reduce the number of short segments on the network. The default value is enable. Note that for interactive protocols such as Telnet, rlogin, or SSH, F5 recommends disabling this setting on high-latency networks, to improve application responsiveness.

◆ partitionDisplays the partition within which the profile resides.

◆ pkt loss ignore rateSpecifies packet loss rate to ignore. Measured in packets per million. The default value is 0.

◆ pkt loss ignore burstIgnore burst controls sensitivity to burst lost. The default value is 0.

◆ proxy buffer highSpecifies the highest level at which the receive window is closed. The default value is 16384.

◆ proxy buffer lowSpecifies the lowest level at which the receive window is closed. The default value is 4096.

◆ proxy mssWhen enabled, the system advertises the same mss to the server as was negotiated with the client. The default value is enable.

◆ proxy optionsWhen enabled, the system advertises an option, such as a time-stamp to the server only if it was negotiated with the client. The default value is enable.

◆ recv windowSpecifies the size of the receive window, in bytes. The default value is 4096 bytes.

◆ reset on timeoutSpecifies whether to reset connections on timeout.

◆ rfc1323When enabled, the system uses the timestamp and window-scaling extensions for TCP (as specified in RFC 1323) to enhance high-speed network performance. The default value is enable.

3 - 248

Page 285: BIG IP Reference

Bigpipe Utility Command Reference

◆ selective acksWhen enabled, the system negotiates RFC2018-compliant Selective Acknowledgements with peers. The default value is enable.

◆ send bufferSpecifies the size of the buffer, in bytes. The default value is 8192 bytes.

◆ slow startWhen enabled, the system uses larger initial window sizes (as specified in RFC 3390) to help reduce round trip times. The default value is enable.

◆ time waitSpecifies the number of seconds that a connection is in the TIME-WAIT state before closing. You can also specify immediate, indefinite, or default. The default value is 2 seconds.

◆ time wait recycleSpecifies whether the system recycles the connection when a SYN packet is received in a TIME-WAIT state. The default value is enable.

◆ verified acceptSpecifies, when enabled, that a SYN-ACK acknowledgement code is sent only if the server port is open. The default value is disable.

See alsoprofile(1), virtual(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 249

Page 286: BIG IP Reference

Chapter 3

profile udpConfigures a UDP profile.

SyntaxUse this command to create, modify, display, or delete a UDP profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile udp <profile udp key> {}

profile udp (<profile udp key> | all) [{] <profile udp arg list> [}]

<profile udp key> ::=

<name>

<profile udp arg> ::=

allow no payload (enable | disable)

datagram lb (enable | disable)

defaults from (<profile udp key> | none)

idle timeout (<number> | immediate | indefinite)

ip tos (<number> | mimic | pass)

link qos (<number> | mimic | pass)

name <name>

no cksum (enable | disable)

profile udp (<profile udp key> | all) stats reset

Displayprofile udp [<profile udp key> | all] [show [all]]

profile udp [<profile udp key> | all] list [all]

profile udp (<profile udp key> | all) allow no payload [show]

profile udp (<profile udp key> | all) datagram lb [show]

profile udp (<profile udp key> | all) defaults from [show]

profile udp (<profile udp key> | all) idle timeout [show]

profile udp (<profile udp key> | all) ip tos [show]

profile udp (<profile udp key> | all) link qos [show]

profile udp (<profile udp key> | all) name [show]

profile udp (<profile udp key> | all) no cksum [show]

3 - 250

Page 287: BIG IP Reference

Bigpipe Utility Command Reference

profile udp (<profile udp key> | all) partition [show]

profile udp (<profile udp key> | all) stats [show]

Deleteprofile udp (<profile udp key> | all) delete

DescriptionThe UDP profile is a configuration tool for managing UDP network traffic.

ExamplesCreates a custom UDP profile named myudpprofile that inherits its settings from the system default udp profile:

profile udp myudpprofile { }

OptionsYou can use these options with the profile udp command:

◆ allow no payloadProvides the ability to allow the passage of datagrams that contain header information, but no essential data. The default value is disable.

◆ datagram lbProvides the ability to load balance UDP datagram by datagram. The default value is disable.

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the parent profile.

◆ idle timeoutSpecifies the number of seconds that a connection is idle before the connection is eligible for deletion. You can also specify immediate, indefinite, or default. The default value is 60 seconds.

◆ ip tosSpecifies the Type of Service level that the traffic management system assigns to UDP packets when sending them to clients.

◆ link qosSpecifies the Quality of Service level that the system assigns to UDP packets when sending them to clients.

◆ no cksumWhen enabled,

◆ partitionDisplays the partition within which the profile resides.

See alsoprofile(1), virtual(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 251

Page 288: BIG IP Reference

Chapter 3

provisionConfigures provisioning on the BIG-IP system.

SyntaxUse this command to configure provisioning on the system.

Create/Modifyprovision <provision key> {}

provision (<provision key> | all) [{] <provision arg list> [}]

<provision key> ::=

<name>

<provision arg> ::=

cpu ratio <number>

disk ratio <number>

level (none | minimum | nominal | dedicated | custom)

memory ratio <number>

name <name>

Displayprovision [<provision key> | all] [show [all]]

provision [<provision key> | all] list [all]

provision (<provision key> | all) cpu [show]

provision (<provision key> | all) cpu ratio [show]

provision (<provision key> | all) disk [show]

provision (<provision key> | all) disk ratio [show]

provision (<provision key> | all) host [show]

provision (<provision key> | all) level [show]

provision (<provision key> | all) memory [show]

provision (<provision key> | all) memory ratio [show]

provision (<provision key> | all) name [show]

Deleteprovision (<provision key> | all) delete

DescriptionModifies the allocation of resources to the licensed modules on the system.

3 - 252

Page 289: BIG IP Reference

Bigpipe Utility Command Reference

ExamplesProvisions the minimum amount of resources for the BIG-IP Application Security Manager:

provision asm level minimum

Displays the current provisioning of the system:

provision list

OptionsYou can use these options with the provision command.

◆ cpuDisplays the percentage of CPU available to a module.

◆ cpu ratioUse this option only when the level option is set to custom. F5 Networks recommends that you do not modify this option.

◆ diskDisplays the amount of disk space available to a module.

◆ disk ratioUse this option only when the level option is set to custom. F5 Networks recommends that you do not modify this option.

◆ hostDisplays the amount of allocated host memory space available to a module.

◆ levelSpecifies the level of resources that you want to provision for a module. The options are:

• customF5 Networks does not recommend that you specify this level.

• dedicatedSpecifies that all resources are dedicated to the module you are provisioning. For all other modules, the level option must be set to none.

• minimalSpecifies that you want to provision the minimal amount of resources for the module you are provisioning.

• nominalSpecifies that you want to share all of the available resources equally among all of the modules that are licensed on the unit.

• noneSpecifies that you do not want to provision any resources for this module.

◆ memoryDisplays the amount of memory available to a module.

Bigpipe Utility Reference Guide 3 - 253

Page 290: BIG IP Reference

Chapter 3

◆ memory ratioUse this option only when the level option is set to custom. F5 Networks recommends that you do not modify this option.

◆ nameDisplays the name of the module you are provisioning.

See alsobigpipe(1), list(1)

3 - 254

Page 291: BIG IP Reference

Bigpipe Utility Command Reference

pvaDisplays or resets Packet Velocity® ASIC statistics for the BIG-IP system.

SyntaxUse this command to display or reset Packet Velocity ASIC statistics.

Modifypva (<pva key> | all) stats reset

Display<pva key> ::=

(<number>.<number> | none)

pva [<pva key> | all] [show [all]]

DescriptionDisplays or resets Packet Velocity ASIC statistics for the BIG-IP system.

ExamplesResets all the PVA statistics for the system:

pva all stats reset

Displays all the PVA statistics for the system:

pva all show all

Note

The BIG-IP system has one PVA accelerator; however, when you run this command, the system displays a PVA statistics entry for each Traffic Management Microkernel (TMM).

See alsobigpipe(1)

Bigpipe Utility Reference Guide 3 - 255

Page 292: BIG IP Reference

Chapter 3

radius serverCreates, modifies, displays, or deletes a RADIUS server object for RADIUS authentication.

SyntaxUse this command to create, modify, display, or delete a RADIUS server.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

radius server <radius server key> {}

radius server (<radius server key> | all) [{] <radius server arg list> [}]

<radius server key> ::=

<name>

<radius server arg> ::=

name <name>

secret (<string> | none)

server (<string> | none)

service (<service> | none)

timeout (<number> | immediate | indefinite)

Displayradius server [<radius server key> | all] [show [all]]

radius server [<radius server key> | all] list [all]

radius server (<radius server key> | all) name [show]

radius server (<radius server key> | all) partition [show]

radius server (<radius server key> | all) secret [show]

radius server (<radius server key> | all) server [show]

radius server (<radius server key> | all) service [show]

radius server (<radius server key> | all) timeout [show]

Deleteradius server (<radius server key> | all) delete

3 - 256

Page 293: BIG IP Reference

Bigpipe Utility Command Reference

DescriptionCreates, modifies, or deletes the RADIUS server. Note that you must also create an auth radius profile to use a RADIUS server.

ExamplesLists the configuration for all RADIUS server objects on the system:

radius server all list

Creates a RADIUS server object named myserver2 with the secret of mysecret, an IP address of 12.12.10.4 on port 80, and a timeout of 65 seconds:

radius server myserver2 secret \mysecret\ server \12.12.10.4\ service 80 timeout 65>

OptionsYou can use these options with the radius server command:

◆ partitionDisplays the partition in which the RADIUS server resides.

◆ secretSets the secret key used to encrypt and decrypt packets sent or received from the server. This setting is required.

◆ serverSpecifies the host name or IP address of the RADIUS server. This setting is required.

◆ serviceSpecifies the port for RADIUS authentication traffic. The default value is port 1812.

◆ timeoutSpecifies the timeout value in seconds. The default value is 3 seconds. You can also specify immediate or indefinite.

See alsoauth_radius(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 257

Page 294: BIG IP Reference

Chapter 3

rate classConfigures rate classes.

SyntaxUse this command to create, modify, display, or delete a rate class.

Create/Modifyrate class <rate class key> {}

rate class (<rate class key> | all) [{] <rate class arg list> [}]

<rate class key> ::=

<name>

<rate class arg> ::=

burst <number>

ceiling <number>[bps]

direction (any | to client | to server | vlan egress)

drop policy (<drop policy key> | none)

name <name>

parent (<rate class key> | none)

percent ceil <number>

percent rate <number>

rate <number>[bps]

shaping policy (<shaping policy key> | none)

type (<shaping queue key> | none)

rate class (<rate class key> | all) stats reset

Displayrate class [<rate class key> | all] [show [all]]

rate class [<rate class key> | all] list [all]

rate class [<rate class key> | all] burst [show]

rate class [<rate class key> | all] ceiling [show]

rate class [<rate class key> | all] direction [show]

rate class [<rate class key> | all] drop policy [show]

rate class [<rate class key> | all] name [show]

rate class [<rate class key> | all] parent [show]

rate class [<rate class key> | all] percent ceil [show]

rate class [<rate class key> | all] percent rate [show]

rate class [<rate class key> | all] rate [show]

rate class [<rate class key> | all] shaping policy [show]

rate class [<rate class key> | all] stats [show]

rate class [<rate class key> | all] type [show]

3 - 258

Page 295: BIG IP Reference

Bigpipe Utility Command Reference

Deleterate class (<rate class key> | all) delete

DescriptionA rate class is a rate-shaping policy that you assign to a type of traffic, such as Layer 3 traffic that specifies a certain source, destination, or service. More specifically, a rate class defines the number of bits per second that the system allows per connection and the number of packets in a queue. You configure rate shaping by creating a rate class and then assigning the rate class to a packet filter, a virtual server, or from within an iRule.

ExamplesCreates the rate class myRTclass with a rate of 500 Mbps:

rate class myRTclass { rate 500M }

Deletes the rate class myRTclass:

rate class myRTclass delete

OptionsYou can use these options with the rate class command:

◆ burstSpecifies the maximum number of bytes that traffic is allowed to burst beyond the specified rate. You can configure the rate in kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps).

◆ ceilingSpecifies how far beyond the base rate traffic is allowed to flow when bursting. This number sets an absolute limit. No traffic can exceed this rate. You can configure the rate in bits per second (bps), kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps).

◆ directionSpecifies the direction of traffic to which the rate class is applied. Possible values are any, to client, or to server.

◆ drop policySpecifies the drop policy for this rate class, which tells the system when and how to drop packets, if required, when the traffic handling queue is full. The available pre-configured policies are red (randomly drops packets), fred (drops packets according to the type of traffic in the flow), and tail (drops the end of the traffic stream). The default value is tail. You can create a customized drop policy using the drop policy command. If you specify a custom shaping policy, the drop policy specified in the shaping policy takes precedence and changes this value to conform with it.

Bigpipe Utility Reference Guide 3 - 259

Page 296: BIG IP Reference

Chapter 3

◆ nameSpecifies the name of this rate class.

◆ parentAssociates this class with another class. The class you are configuring can borrow any unused bandwidth from the parent class' ceiling, thereby supplementing the rate of the child class. Note that borrowing bandwidth affects the rate, ceiling, and queuing method. The default value is none.

◆ percent ceilSpecifies the percentage of the ceiling specified for the associated parent class that is available for this rate class. The default value is 0 (zero), which indicates that the rate class uses the value of the ceiling option.

◆ percent rateSpecifies the percentage of the maximum throughput rate specified for the associated parent class that is available for this rate class. The default value is 0 (zero), which indicates that the system uses the value of the rate option.

◆ rateSpecifies the maximum throughput rate allowed for traffic handled by the rate class. Packets that exceed the specified number are dropped. This setting is required. You can configure the rate in bits per second (bps), kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps).

◆ shaping policySpecifies the name of a shaping policy that includes customized values for drop policy and queuing method. The system automatically changes the values for percent ceil, drop policy, burst, type, and percent rate options of this class to match the values in the specified shaping policy.

◆ typeSpecifies the queuing method. The pre-configured options are sfq and pfifo.

• sfqStochastic Fair Queuing is a queuing method that further queues traffic under a set of sub-queues, choosing the specific sub-queue based on a hash of the flow address information. This results in traffic from the same flow always being queued in the same list. SFQ then dequeues packets from the sub-queues in a round-robin fashion. The overall effect is that fairness of dequeuing is achieved, because packets from one flow cannot occupy the queues at the exclusion of those of another flow. If the rate class has a parent class, the default queuing method is that of the parent class. If the rate class has no parent class, the default value is sfq. You can create a custom queuing method using the shaping queue command.

• pfifoThe Priority FIFO queuing method queues all traffic under a set of five sub-queues based on the Type of Service (ToS) field of the traffic. Four of the sub-queues correspond to the four possible ToS values (Minimum delay, Maximum throughput, Maximum reliability, and Minimum cost). The fifth sub-queue represents

3 - 260

Page 297: BIG IP Reference

Bigpipe Utility Command Reference

traffic with no ToS value. The Priority FIFO method processes these five sub-queues in a way that preserves the meaning of the ToS field as much as possible. For example, a packet with the ToS field set to Minimum cost might yield dequeuing to a packet with the ToS field set to Minimum delay.

See alsopacket filter(1), rule(1), virtual(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 261

Page 298: BIG IP Reference

Chapter 3

remote usersConfigures the default user role, partition access, and console access for all remotely authenticated user accounts that have not been added as local user accounts on the BIG-IP system.

Note

To assign a different access to a specific remote user, you must create a local user account for that user. For more information, see user, on page 3-344.

SyntaxUse this command to configure the default parameters for all of the remote user accounts on the BIG-IP system as a group.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

remote users [{] <remote users arg list> [}]

<remote users arg> ::=

default partition (<partition key> | all)

default role (administrator | resource admin | \ user manager | manager | app editor | operator | \ guest | policy editor | none)

remote console access (enable | disable)

Displayremote users [show [all]]

remote users list [all]

remote users default partition [show]

remote users default role [show]

remote users remote console access [show]

DescriptionYou can use this command to configure the default parameters for all of the remote user accounts on the BIG-IP system as a group.

3 - 262

Page 299: BIG IP Reference

Bigpipe Utility Command Reference

ExamplesFor all remote users, sets the default partition access to partition Common, the default user role to none, and the default remote console access to disable:

remoteusers default partition Common default role none remote console access disable

OptionsYou can use these options with the remote users command.

◆ default partitionSpecifies the default partition for all remote user accounts. The default partition is Common.

◆ default roleSpecifies the default user role for all remote user accounts. The default value is none. The available user roles are:

• administrator

• resource admin

• user manager

• app editor

• operator

• guest

• policy editor

• none (no access)

◆ partitionDisplays the partition within which the remote users object resides.

◆ remote console accessEnables or disables the default console access for all remote user accounts. The default value is disable.

See alsobigpipe(1), user(1), remoterole(1)

Bigpipe Utility Reference Guide 3 - 263

Page 300: BIG IP Reference

Chapter 3

remoteroleCreates a file (/config/bigip/auth/remoterole) that an LDAP or Active Directory server reads to determine the specific access rights to grant to groups of remotely authenticated users.

SyntaxUse this command to grant access to a specific group of remotely authenticated users.

Create

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

remoterole [{] <remoterole arg list> [}]

<remoterole arg> ::=

role info (<role info list> | none) [add | delete]

<role info> ::= (<role info key> | all) [{] <role info arg list> [}]

<role info key> ::=

<name>

<role info arg> ::=

attribute (<string> | none)

console (<string> | none)

deny (enable | disable)

line order <number>

name <name>

role (<string> | none)

user partition (<string> | none)

Displayremoterole [show [all]]

remoterole list [all]

remoterole role info [<role info key> | all] [show [all]]

remoterole role info [<role info key> | all] list [all]

remoterole role info (<role info key> | all) attribute [show]

remoterole role info (<role info key> | all) console [show]

3 - 264

Page 301: BIG IP Reference

Bigpipe Utility Command Reference

remoterole role info (<role info key> | all) deny [show]

remoterole role info (<role info key> | all) line order [show]

remoterole role info (<role info key> | all) name [show]

remoterole role info (<role info key> | all) role [show]

remoterole role info (<role info key> | all) user partition [show]

DescriptionYou can use this command to grant access to a specific group of remotely authenticated users without having to create a local user account on the BIG-IP system for each user in the group.

ExamplesCreates the first line of the /config/bigip/auth/remoterole file and grants the Manager user role in partition_A to the group of remote users named mygroupofusers:

remoterole role info mygroupofusers { line order 1000 role manager user partition \partition_A attribute "application administrators" }

OptionsYou can use these options with the remoterole command.

◆ attributeSpecifies the name of the group of remotely authenticated users for whom you are configuring specific access rights to the BIG-IP system. This value is required.

◆ consoleEnables or disables console access for the specified group of remotely authenticated users. The default value is disable.

◆ denyEnables or disables remote access for the specified group of remotely authenticated users. The default value is disable.

◆ line orderSpecifies the order of the lines in the file, /config/bigip/auth/remoterole. The LDAP and Active Directory servers read this file line by line. The order of the information is important; therefore, F5 recommends that you set the first line at 1000. This allows you, in the future, to insert lines before the first line. This value is required.

◆ partitionDisplays the partition within which the remoterole object resides.

Bigpipe Utility Reference Guide 3 - 265

Page 302: BIG IP Reference

Chapter 3

◆ roleSpecifies the user role that you want to grant to the specified group of remotely authenticated users. The default value is none. The available user roles are:

• administrator

• resource admin

• user manager

• app editor

• operator

• guest

• policy editor

• none (no access)

◆ user partitionSpecifies the partition to which you are assigning access to the specified group of remotely authenticated users. The default value is Common.

See alsobigpipe(1), user(1), remote_users(1)

3 - 266

Page 303: BIG IP Reference

Bigpipe Utility Command Reference

routeConfigures routes for traffic management.

SyntaxUse this command to create, display, or delete a traffic route.

Createroute <route key> {}

route (<route key> | all) [{] <route arg list> [}]

<route key> ::=

<network ip>

(auto | connected | dynamic | static)

<route arg> ::=

dest <network ip>

gateway (<ip addr> | none)

mtu <number>

pool (<pool key> | none)

(auto | connected | dynamic | static)

(reject)

vlan (<vlan key> | none)

Displayroute [<route key> | all] [show [all]]

route [<route key> | all] list [all]

route (<route key> | all) dest [show]

route (<route key> | all) gateway [show]

route (<route key> | all) mtu [show]

route (<route key> | all) pool [show]

route (<route key> | all) source [show]

route (<route key> | all) type [show]

route (<route key> | all) vlan [show]

Deleteroute (<route key> | all) delete

DescriptionConfigure static routes for the system, including default routes. When configuring a static route, you can specify a gateway (that is, the next- or last-hop router) to be an IP address, a VLAN name, or the name of a pool of routers.

Bigpipe Utility Reference Guide 3 - 267

Page 304: BIG IP Reference

Chapter 3

ExamplesSets the route 12.12.3.0/24 on the VLAN named internal:

route 12.12.3.0/24 vlan internal

OptionsYou can use these options with the route command.

Note

The options gateway, vlan, pool, and reject are mutually exclusive. You can use only one of these options at a time, and at least one of these options is required when using the route command.

◆ defaultSets the default routing type to IPv4 (inet) or IPv6 (inet6).

◆ gatewaySpecifies a gateway address for the system.

◆ ip addrCreates an IP address/netmask route. You can also specify the route using CIDR notation, such as 12.12.3.0/24.

◆ mtuSets a specific maximum transition unit (MTU).

◆ poolSpecifies a gateway pool. A gateway pool allows multiple, load-balanced gateways to be used for a given route.

◆ rejectRejects packets coming from the specified route.

◆ vlanSpecifies the VLAN name for the route.

See alsomgmt(1), bigpipe(1), mgmt route(1), pool(1), vlan(1), vlangroup(1)

3 - 268

Page 305: BIG IP Reference

Bigpipe Utility Command Reference

route domainConfigures route domains for traffic management.

SyntaxUse this command to configure the route domain for the system.

Create/Modifyroute domain <route domain key> {}

route domain (<route domain key> | all) [{] <route domain arg list> [}]

<route domain key> ::=

<number>

<route domain arg> ::=

description (<string> | none)

id <number>

parent id <number>

vlans (<vlan key> | none) [add | delete]

Displayroute domain [<route domain key> | all] [show [all]]

route domain [<route domain key> | all] list [all]

route domain (<route domain key> | all) description [show]

route domain (<route domain key> | all) id [show]

route domain (<route domain key> | all) parent id [show]

route domain (<route domain key> | all) vlans [show]

Deleteroute domain (<route domain key> | all) delete

DescriptionYou can use route domains to assign the same IP address to more than one device on a network, as long as each instance of the IP address resides in a separate routing domain.

ExamplesCreates a route domain with an ID of 1:

route domain 1

Displays all of the properties of all route domains:

route domain list all

Bigpipe Utility Reference Guide 3 - 269

Page 306: BIG IP Reference

Chapter 3

OptionsYou can use these options with the route domain command.

◆ descriptionSpecifies identifying text for the route domain.

◆ idSpecifies a unique numeric identifier for the route domain.

◆ parent idSpecifies the route domain from which this route domain inherits settings.

◆ vlansSpecifies VLANs, by name, for the system to use in the route domain.

See alsobigpipe(1), vlan(1), vlangroup(1)

3 - 270

Page 307: BIG IP Reference

Bigpipe Utility Command Reference

rtspDisplays or resets Real Time Streaming Protocol (RTSP) statistics for the BIG-IP system.

SyntaxUse this command to display or reset RTSP statistics for the system.

Displayrtsp [show [all]]

Modifyrtsp stats reset

DescriptionDisplays or resets RTSP statistics for the system.

ExamplesDisplays all RTSP statistics for the system:

rtsp show all

See alsobigpipe(1), profile rtsp (1)

Bigpipe Utility Reference Guide 3 - 271

Page 308: BIG IP Reference

Chapter 3

ruleCreates, modifies, deletes, and displays iRules™ for traffic management system configuration.

SyntaxUse this command to create, modify, display, or delete an iRule.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

rule <rule key> {}

rule (<rule key> | all) { <rule arg list> }

<rule key> ::=

<name>

<rule arg> ::=

<iRule>

name <name>

rule (<rule key> | all) stats reset

Displayrule [<rule key> | all] [show [all]]

rule [<rule key> | all] list [all]

rule (<rule key> | all) definition [show]

rule (<rule key> | all) name [show]

rule (<rule key> | all) partition [show]

Deleterule (<rule key> | all) delete

3 - 272

Page 309: BIG IP Reference

Bigpipe Utility Command Reference

DescriptioniRules can direct traffic not only to specific pools, but also to individual pool members, including port numbers and URI paths, either to implement persistence or to meet specific load balancing requirements. The syntax that you use to write iRules is based on the Tools Command Language (Tcl) programming standard. Thus, you can use many of the standard Tcl commands, plus a robust set of extensions that the BIG-IP local traffic management system provides to help you further increase load balancing efficiency.

For information about standard Tcl syntax, see http://tmml.sourceforge.net/doc/tcl/index.html. For a list of Tcl commands that have been disabled within the traffic management system and therefore cannot be used in the traffic management system, see the Configuration Guide for BIG-IP® Local Traffic Management. This guide is available at https://support.f5.com.

ExamplesIn this example, the iRule my_Rule includes the event declaration CLIENT_ACCEPTED, as well as the iRule command IP::remote_addr. In this case, the IP address that the iRule command returns is that of the client, because the default context of the event declaration CLIENT_ACCEPTED is clientside:

rule my_Rule '{ when CLIENT_ACCEPTED { if [[IP::remote_addr] == 10.1.1.80] \{ pool myPool }}}'

This example shows the iRule my_Rule2, which includes the event declaration SERVER_CONNECTED, as well as the iRule command IP::remote_addr. In this case, the IP address that the iRule command returns is that of the server, because the default context of the event declaration SERVER_CONNECTED is serverside:

rule my_Rule2 '{ when SERVER_CONNECTED { if { [IP::remote_addr] == 10.1.1.80 } \{ pool my_pool2 }}}'

In this example, the iRule my_Rule3 includes the event declaration CLIENT_ACCEPTED, as well as the iRule command IP::remote_addr. In this case, the IP address 10.1.1.80 is directed to the pool named blackhole, while traffic originating from other addresses is directed to the pool normalService. Instead of one IP address, you could also specify a class that contains IP addresses that you want to send to the blackhole pool:

rule my_Rule3 '{ when CLIENT_ACCEPTED { if [[IP::remote_addr] == 10.1.1.80] \{ pool blackhole } else { pool normalService }}}'

Bigpipe Utility Reference Guide 3 - 273

Page 310: BIG IP Reference

Chapter 3

OptionsYou can use this option with the rule command:

◆ partitionDisplays the partition in which the rule resides.

See alsopersist(1), pool(1), profile(1), rate class(1), snat(1), bigpipe(1)

3 - 274

Page 311: BIG IP Reference

Bigpipe Utility Command Reference

saveWrites the running configuration into the stored configuration files.

SyntaxUse this command to write the running configuration into the stored configuration files.

Modifysave

save all

[base] save

DescriptionYou can use this command to save the running configuration of the BIG-IP system.

OptionsYou can use these options with the save command.

Important

When you want to save to the stored configuration files the changes that you make to the system, F5 recommends that you use the save all command.

◆ base saveSaves only the portions of the running configuration that reside in these stored configuration files:

• /config/bigip_base.conf

• /config/bigip_sys.conf

◆ saveSaves only the portions of the running configuration that reside in these stored configuration files:

• /config/bigip.conf

• /config/bigip_local.conf

• /config/bigip_sys.conf

◆ save allSaves the entire running configuration into these stored configuration files:

• /config/bigip.conf

• /config/bigip_local.conf

• /config/bigip_base.conf

• /config/bigip_sys.conf

Bigpipe Utility Reference Guide 3 - 275

Page 312: BIG IP Reference

Chapter 3

See alsobigpipe(1), load(1)

3 - 276

Page 313: BIG IP Reference

Bigpipe Utility Command Reference

sctpDisplays or resets Stream Control Transmission Protocol (SCTP) statistics for the BIG-IP system.

SyntaxUse this command to display or reset SCTP statistics for the system.

Displaysctp [show [all]]

Modifysctp stats reset

DescriptionDisplays or resets SCTP statistics for the system.

ExamplesDisplays all SCTP statistics for the system:

sctp show all

See alsobigpipe(1), profile sctp (1)

Bigpipe Utility Reference Guide 3 - 277

Page 314: BIG IP Reference

Chapter 3

selfConfigures a self IP address for a VLAN.

SyntaxUse this command to create, modify, display, and delete a self IP address.

Create/Modifyself <self key> {}

self (<self key> | all) [{] <self arg list> [}]

<self key> ::=

<ip addr>

<self arg> ::=

addr <ip addr>

allow (<protocol/service list> | none) [add | delete]

floating (enable | disable)

netmask (<ip mask> | none)

unit <number>

vlan <vlan key>

<protocol/service> ::= proto <protocol list> | \ (tcp | udp) (<service list> | none | all)

Displayself [<self key> | all] [show [all]]

self [<self key> | all] list [all]

self (<self key> | all) addr [show]

self (<self key> | all) allow [show]

self (<self key> | all) floating [show]

self (<self key> | all) netmask [show]

self (<self key> | all) unit [show]

self (<self key> | all) vlan [show]

Deleteself (<self key> | all) delete

DescriptionA self IP address is an IP address that is assigned to the system. Self IP addresses are part of the configuration of the BIG-IP network components. You must define at least one self IP address for each VLAN.

3 - 278

Page 315: BIG IP Reference

Bigpipe Utility Command Reference

ExamplesAdds the self IP address 10.10.10.24 to the VLAN named internal:

self 10.10.10.24 vlan internal

Enables a floating IP address on the external VLAN. The floating attribute makes this virtual address available to whichever unit of a redundant system configuration is active at a given time. In other words, when the standby unit becomes the active unit, it uses this virtual address. Only one of the units in a redundant system configuration can use the floating IP address at any given time.

self 10.1.1.1 vlan external netmask 255.255.0.0 floating enable

OptionsYou can use these options with the self command.

◆ addrSpecifies the self IP address for a VLAN.

◆ allowSpecifies the type of protocol/service that the VLAN handles.

◆ floatingEnables or disables a floating self IP address for the VLAN. A floating self IP address is an additional self IP address for a VLAN that serves as a shared address by both units of a BIG-IP redundant system configuration.

◆ netmaskSpecifies a netmask for the self IP address for the VLAN.

◆ unitSpecifies the unit number in a redundant system configuration.

◆ vlanSpecifies the VLAN for which you are setting a self IP address. This setting is required.

See alsovlan(1), vlangroup(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 279

Page 316: BIG IP Reference

Chapter 3

self allowConfigures the default allow list for all self IP addresses on the BIG-IP system.

SyntaxUse this command to delete, modify, or display the default allow list for all self IP addresses on the BIG-IP system. The default allow list displays which service and protocol ports allow connections from outside the system. Connections made to a service or protocol port that is not on the list are refused.

Modifyself allow {}

self allow [{] <self allow arg list> [}]

<self allow arg> ::=

default (<protocol/service list> | none) [add | delete]

Displayself allow [show [all]]

self allow list [all]

self allow default [show]

Deleteself allow delete

DescriptionYou can use this command to modify, display, or delete the default allow list for all self IP addresses on the BIG-IP system.

ExamplesSets the default allow list for all self IP addresses on the system to the system default:

self allow default tcp 22 53 161 443 4353 udp 53 161 520 1026 4353 proto 89

Sets the default allow list for all self IP addresses on the system to TCP:

self allow default tcp 55

Displays the default allow list for all self IP addresses on the system:

self allow default

3 - 280

Page 317: BIG IP Reference

Bigpipe Utility Command Reference

OptionsYou can use these options with the self allow command:

◆ defaultSpecifies that you want to set the default allow list to one of the following:

• allSpecifies all protocols and services allow connections from outside the system. Use this option to open the system to complete access.

• noneSpecifies that no protocols or services allow connections from outside the system.

• protocol/service listSpecifies a list of protocols/services that allow connections from outside the system.

◆ deleteDeletes the default self allow list.

See alsovlan(1), vlangroup(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 281

Page 318: BIG IP Reference

Chapter 3

shellDisplays information about and customizes the bigpipe shell.

SyntaxUse this command to customize the bigpipe shell and display information about the shell.

Modifyshell [{] <shell arg list> [}]

<shell arg> ::=

history <number>

partition <partition key>

prompt <string>

read partition (<partition key> | all)

write partition <partition key>

Displayshell [show [all]]

shell list [all]

shell history [show]

shell partition [show]

shell prompt [show]

shell read partition [show]

shell write partition [show]

DescriptionWhen typed at the BIG-IP system prompt, the bigpipe shell command starts the bigpipe utility in its shell mode and presents a prompt at which you can type bigpipe commands. You can also use the bigpipe shell command from the BIG-IP system prompt to configure the shell.

Once the bigpipe utility is started in its shell mode, you can use the shell command to configure the shell.

ExamplesCustomizes the bigpipe shell prompt to display as F5>:

shell prompt F5>

Displays the bigpipe shell prompt, and the Read and Write partitions:

shell list

3 - 282

Page 319: BIG IP Reference

Bigpipe Utility Command Reference

Specifies that you want to save up to 100 commands in the bigpipe shell history:

shell history 100

Displays the maximum number of commands that the bigpipe shell saves in the shell history file, $HOME/.bphistory-<user>.

shell history show

For users with access to all partitions, changes the partition to which you have Write access to the partition named Application1:

shell write partition Application1

For users with access to all partitions, changes the partition to which you have Read and Write access to the partition named Application2:

shell partition Application2

OptionsYou can use these options with the shell command:

◆ historySpecifies the maximum number of commands that the bigpipe shell saves in the shell history file, $HOME/.bphistory-<user>. The default value is 50. A value of 0 (zero) specifies that the bigpipe shell does not save any commands in history.

◆ partitionChanges the partition to which you have Read and Write access to the partition you specify. This option is available only to users with access to all partitions.

◆ promptSpecifies a string to use for the bigpipe shell prompt. The default prompt is bp>.

◆ read partitionChanges the partition to which you have Read access to the partition you specify. This option is only available to users with access to all partitions.

◆ write partitionChanges the partition to which you have Write access to the partition you specify. This option is only available to users with access to all partitions.

See alsopartition(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 283

Page 320: BIG IP Reference

Chapter 3

snat Configures secure network address translation (SNAT).

SyntaxUse this command to create, modify, display, or delete a SNAT.

Create/Modifysnat <snat key> {}

snat (<snat key> | all) [{] <snat arg list> [}]

<snat key> ::=

<name>

<snat arg> ::=

mirror (enable | disable)

name <name>

origins (<network ip list> | none) [add | delete]

snatpool (<snatpool key> | none)

srcport (preserve | preserve strict | change)

translation (<snat translation key> | none)

(none | automap)

vlans (<vlan key list> | none) (enable | disable)

snat (<snat key> | all) stats reset

Displaysnat [<snat key> | all] [show [all]]

snat [<snat key> | all] list [all]

snat (<snat key> | all) mirror [show]

snat (<snat key> | all) name [show]

snat (<snat key> | all) origins [show]

snat (<snat key> | all) snatpool [show]

snat (<snat key> | all) srcport [show]

snat (<snat key> | all) stats [show]

snat (<snat key> | all) translation [show]

snat (<snat key> | all) type [show]

snat (<snat key> | all) vlans [show]

Deletesnat (<snat key> | all) delete

3 - 284

Page 321: BIG IP Reference

Bigpipe Utility Command Reference

DescriptionThe snat command creates, deletes, sets properties on, and displays information about SNATs. A SNAT defines the relationship between an externally visible IP address, SNAT IP, or translated address, and a group of internal IP addresses, or originating addresses, of individual servers at your site.

ExamplesCreates the SNAT mysnat that translates the address of connections that originate from the address 10.1.1.3 to the translation address 11.1.1.3:

snat mysnat { origin 10.1.1.3 translation 11.1.1.3 }

OptionsYou can use these options with the snat command:

◆ automapTurns on SNAT automapping. This setting can be used only when snatpool and translation are not used.

◆ mirrorEnables or disables mirroring of SNAT connections.

◆ originSpecifies an originating IP address. Note that originating addresses are behind the unit. This setting is required.

◆ snatpoolSpecifies the name of a SNAT pool. This setting can be used only when automap and translation are not used.

◆ translationSpecifies a translated IP address. Note that translated addresses are outside the traffic management system. This setting can be used only when automap and snatpool are not used.

◆ typeDisplays the type of SNAT. The types are automap, snatpool, and translation.

◆ vlansSpecifies the name of the VLAN to which you want to assign the SNAT. The default value is vlans all enable.

See alsonat(1), snat translation(1), snatpool(1), virtual(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 285

Page 322: BIG IP Reference

Chapter 3

snat translationConfigures an explicit SNAT translation address.

SyntaxUse this command to create, modify, display, or delete an explicit SNAT translation address.

Create/Modifysnat translation <snat translation key> {}

snat translation (<snat translation key> | all) [{] <snat translation arg list> [}]

<snat translation key> ::=

(<ip addr> | none)

<snat translation arg> ::=

addr (<ip addr> | none)

arp (enable | disable)

(enable | disable)

ip timeout (<number> | immediate | indefinite)

limit <number>

tcp timeout (<number> | immediate | indefinite)

udp timeout (<number> | immediate | indefinite)

unit <number>

snat translation (<snat translation key> | all) stats reset

Displaysnat translation [<snat translation key> | all] [show [all]]

snat translation [<snat translation key> | all] list [all]

snat translation (<snat translation key> | all) addr [show]

snat translation (<snat translation key> | all) arp [show]

snat translation (<snat translation key> | all) enabled [show]

snat translation (<snat translation key> | all) ip timeout [show]

snat translation (<snat translation key> | all) limit [show]

snat translation (<snat translation key> | all) stats [show]

snat translation (<snat translation key> | all) tcp timeout [show]

snat translation (<snat translation key> | all) udp timeout [show]

snat translation (<snat translation key> | all) unit [show]

Deletesnat translation (<snat translation key> | all) delete

3 - 286

Page 323: BIG IP Reference

Bigpipe Utility Command Reference

DescriptionExplicitly defines the properties of a SNAT translation address.

ExamplesDisables Address Resolution Protocol (ARP) on all SNAT translation addresses:

snat translation all arp disable

OptionsYou can use these options with the snat translation command:

◆ arpIndicates whether or not the system responds to ARP requests or sends gratuitous ARPs. The default value is enable.

◆ ip timeoutSpecifies the number of seconds that IP connections initiated using a SNAT address are allowed to remain idle before being automatically disconnected. Possible values are immediate, indefinite, or a number that you specify.

◆ limitSpecifies the number of connections a translation address must reach before it no longer initiates a connection. The default value of 0 indicates that the setting is disabled.

◆ tcp timeoutSpecifies the number of seconds that TCP connections initiated using a SNAT address are allowed to remain idle before being automatically disconnected. Possible values are immediate, indefinite, or a number that you specify. The default value is indefinite.

◆ udp timeoutSpecifies the number of seconds that UDP connections initiated using a SNAT address are allowed to remain idle before being automatically disconnected. Possible values are immediate, indefinite, or a number that you specify. The default value is indefinite.

◆ unitSpecifies the unit number in a redundant system configuration.

See alsonat(1), snat(1), snatpool(1), virtual(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 287

Page 324: BIG IP Reference

Chapter 3

snatpoolConfigures a SNAT pool.

SyntaxUse this command to create, modify, display, or delete a SNAT pool.

Create/Modifysnatpool <snatpool key> {}

snatpool (<snatpool key> | all) [{] <snatpool arg list> [}]

<snatpool key> ::=

<name>

<snatpool arg> ::=

members (<snat translation key list> | none) [add | delete]

name <name>

snatpool (<snatpool key> | all) stats reset

Displaysnatpool [<snatpool key> | all] [show [all]]

snatpool [<snatpool key> | all] list [all]

snatpool (<snatpool key> | all) members (<snat translation key> | all) stats reset

snatpool (<snatpool key> | all) members [<snat translation key> | all] [show [all]]

snatpool (<snatpool key> | all) members (<snat translation key> | all) \snatpool name [show]

snatpool (<snatpool key> | all) members (<snat translation key> | all) stats [show]

snatpool (<snatpool key> | all) members (<snat translation key> | all) trans addr [show]

snatpool (<snatpool key> | all) name [show]

snatpool (<snatpool key> | all) stats [show]

Deletesnatpool (<snatpool key> | all) delete

DescriptionA SNAT pool is a pool of translation addresses that you can map to one or more original IP addresses. Translation addresses in a SNAT pool are not self-IP addresses. You can simply create a SNAT pool and then assign it as a resource directly to a virtual server. This eliminates the need for you to explicitly define original IP addresses to which to map translation addresses.

3 - 288

Page 325: BIG IP Reference

Bigpipe Utility Command Reference

ExamplesCreates the SNAT pool mysnatpool1 that contains the translation addresses (members) 11.12.11.24 and 11.12.11.25:

snatpool mysnatpool1 { members 11.12.11.24 11.12.11.25 }

Deletes the SNAT pool named mysnatpool1:

snatpool mysnatpool1 delete

OptionsYou can use this option with the snatpool command:

◆ membersSpecifies the addition of a translation address to, or the deletion of a translation address from, a SNAT pool.

See alsonat(1), snat(1), snat translation(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 289

Page 326: BIG IP Reference

Chapter 3

snmpdConfigures the simple network management protocol (SNMP) daemon for the BIG-IP system.

SyntaxUse this command to configure the snmpd daemon for the system.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

snmpd [{] <snmpd arg list> [}]

<snmpd arg> ::=

agent address (<string list> | none) [add | delete]

agenttrap (enable | disable)

allow (<string list> | none) [add | delete]

authtrapenable (enable | disable)

bigip traps (enable | disable)

community (<community list> | none) [add | delete]

disk (<disk list> | none) [add | delete]

include (<string> | none)

l2forward vlan (<string> | none)

load max1 <number>

load max15 <number>

load max5 <number>

proc (<proc list> | none) [add | delete]

syscontact (<string> | none)

syslocation (<string> | none)

sysservices <number>

trap2sink (<trap2sink list> | none) [add | delete]

trapcommunity (<string> | none)

trapsess (<trapsess list> | none) [add | delete]

trapsink (<trapsink list> | none) [add | delete]

trapsource (<ip addr> | none)

usmuser (<usmuser list> | none) [add | delete]

3 - 290

Page 327: BIG IP Reference

Bigpipe Utility Command Reference

<community> ::= (<community key> | all) [{] <community arg list> [}]

<community key> ::=

<name>

<community arg> ::=

access (ro | rw)

community name (<string> | none)

ipv6 (enable | disable)

name <name>

oid (<string> | none)

source (<string> | none)

<disk> ::= (<disk key> | all) [{] <disk arg list> [}]

<disk key> ::=

<name>

<disk arg> ::=

minspace <number>

minspace type (size | percent)

name <name>

path (<string> | none)

<proc> ::= (<proc key> | all) [{] <proc arg list> [}]

<proc key> ::=

<name>

<proc arg> ::=

max (<string> | none)

min <number>

name <name>

process (<string> | none)

<trap2sink> ::= (<trap2sink key> | all) [{] <trap2sink arg list> [}]

<trap2sink key> ::=

<name>

<trap2sink arg> ::=

community (<string> | none)

host (<ip addr> | <host name> | none)

name <name>

port <number>

<trapsess> ::= (<trapsess key> | all) [{] <trapsess arg list> [}]

<trapsess key> ::=

<name>

<trapsess arg> ::=

auth password (crypt (<string> | none) | <string> | none)

auth protocol (MD5 | SHA | NONE)

community (<string> | none)

engine id (<string> | none)

host (<ip addr> | <host name> | none)

name <name>

Bigpipe Utility Reference Guide 3 - 291

Page 328: BIG IP Reference

Chapter 3

port <number>

privacy password (crypt (<string> | none) | <string> | none)

privacy protocol (DES | NONE)

security level (noAuthNoPriv | authNoPriv | authPriv)

security name (<string> | none)

version (1 | 2c | 3)

<trapsink> ::= (<trapsink key> | all) [{] <trapsink arg list> [}]

<trapsink key> ::=

<name>

<trapsink arg> ::=

community (<string> | none)

host (<ip addr> | <host name> | none)

name <name>

port <number>

<usmuser> ::= (<usmuser key> | all) [{] <usmuser arg list> [}]

<usmuser key> ::=

<name>

<usmuser arg> ::=

access (ro | rw)

auth password (crypt (<string> | none) | <string> | none)

auth protocol (MD5 | SHA | NONE)

name <name>

oid (<string> | none)

privacy password (crypt (<string> | none) | <string> | none)

privacy protocol (DES | NONE)

security level (noAuthNoPriv | authNoPriv | authPriv)

username (<string> | none)

Displaysnmpd [show [all]]

snmpd list [all]

snmpd agent address [show]

snmpd agenttrap [show]

snmpd allow [show]

snmpd authtrapenable [show]

snmpd bigip traps [show]

snmpd community [<community key> | all] [show [all]]

snmpd community [<community key> | all] list [all]

snmpd community (<community key> | all) access [show]

snmpd community (<community key> | all) community name [show]

snmpd community (<community key> | all) ipv6 [show]

snmpd community (<community key> | all) name [show]

3 - 292

Page 329: BIG IP Reference

Bigpipe Utility Command Reference

snmpd community (<community key> | all) oid [show]

snmpd community (<community key> | all) source [show]

snmpd disk [<disk key> | all] [show [all]]

snmpd disk [<disk key> | all] list [all]

snmpd disk (<disk key> | all) minspace [show]

snmpd disk (<disk key> | all) minspace type [show]

snmpd disk (<disk key> | all) name [show]

snmpd disk (<disk key> | all) path [show]

snmpd include [show]

snmpd l2forward vlan [show]

snmpd load max1 [show]

snmpd load max15 [show]

snmpd load max5 [show]

snmpd proc [<proc key> | all] [show [all]]

snmpd proc [<proc key> | all] list [all]

snmpd proc (<proc key> | all) max [show]

snmpd proc (<proc key> | all) min [show]

snmpd proc (<proc key> | all) name [show]

snmpd proc (<proc key> | all) process [show]

snmpd syscontact [show]

snmpd syslocation [show]

snmpd sysservices [show]

snmpd trap2sink [<trap2sink key> | all] [show [all]]

snmpd trap2sink [<trap2sink key> | all] list [all]

snmpd trap2sink (<trap2sink key> | all) community [show]

snmpd trap2sink (<trap2sink key> | all) host [show]

snmpd trap2sink (<trap2sink key> | all) name [show]

snmpd trap2sink (<trap2sink key> | all) port [show]

snmpd trapcommunity [show]

snmpd trapsess [<trapsess key> | all] [show [all]]

snmpd trapsess [<trapsess key> | all] list [all]

snmpd trapsess (<trapsess key> | all) auth password [show]

snmpd trapsess (<trapsess key> | all) auth protocol [show]

snmpd trapsess (<trapsess key> | all) community [show]

snmpd trapsess (<trapsess key> | all) engine id [show]

snmpd trapsess (<trapsess key> | all) host [show]

snmpd trapsess (<trapsess key> | all) name [show]

snmpd trapsess (<trapsess key> | all) port [show]

snmpd trapsess (<trapsess key> | all) privacy password [show]

snmpd trapsess (<trapsess key> | all) privacy protocol [show]

snmpd trapsess (<trapsess key> | all) security level [show]

snmpd trapsess (<trapsess key> | all) security name [show]

Bigpipe Utility Reference Guide 3 - 293

Page 330: BIG IP Reference

Chapter 3

snmpd trapsess (<trapsess key> | all) version [show]

snmpd trapsink [<trapsink key> | all] [show [all]]

snmpd trapsink [<trapsink key> | all] list [all]

snmpd trapsink (<trapsink key> | all) community [show]

snmpd trapsink (<trapsink key> | all) host [show]

snmpd trapsink (<trapsink key> | all) name [show]

snmpd trapsink (<trapsink key> | all) port [show]

snmpd trapsource [show]

snmpd usmuser [<usmuser key> | all] [show [all]]

snmpd usmuser [<usmuser key> | all] list [all]

snmpd usmuser (<usmuser key> | all) access [show]

snmpd usmuser (<usmuser key> | all) auth password [show]

snmpd usmuser (<usmuser key> | all) auth protocol [show]

snmpd usmuser (<usmuser key> | all) name [show]

snmpd usmuser (<usmuser key> | all) oid [show]

snmpd usmuser (<usmuser key> | all) privacy password [show]

snmpd usmuser (<usmuser key> | all) privacy protocol [show]

snmpd usmuser (<usmuser key> | all) security level [show]

snmpd usmuser (<usmuser key> | all) username [show]

DescriptionYou can use this command to configure the snmpd daemon for the system.

Important

F5 recommends that users of the Configuration utility exit the utility before changes are made to the system using the command snmpd. This is because making changes to the system using the command snmpd causes a restart of the snmpd daemon. Likewise, restarting the snmpd daemon creates the necessity for a restart of the Configuration utility.

ExamplesSpecifies that the person who administers the snmpd daemon for the system can be reached using the email address, [email protected]:

snmpd syscontact [email protected]

Specifies that the physical location of the system is the central office:

snmpd syslocation "central office"

Disables agent traps:

snmpd agenttrap disable

Adds a range of SNMP clients to the /etc/hosts.allow file:

snmpd allow 10.10.0.0/255.255.240.0

3 - 294

Page 331: BIG IP Reference

Bigpipe Utility Command Reference

Adds the SNMP version 2c trapsess, ts1, to the system. The IP address of ts1 is 192.168.1.245 and the community that has access to ts1 is public:

snmpd trapsses ts1 { host 192.168.1.245 community public }

Adds the SNMP version 2 trapsink, number1, to the system. The host of number1 is 10.20.5.11, the port is 162, and the community that has access to number1 is public.

snmpd trap2sink number1 { community public host 10.20.5.11 port 162 }

Adds an SNMP version 3 trapsess, ts2, to the system:

snmpd trapsess ts2 { host 192.168.1.246 community public auth protocol MD5 \auth password myAuthPassword engine id 80001030204 security level authNoPriv \security name mySecurityName version 3 }

Creates a community specification, named community1, for the BIG-IP system. community1 includes a community, named mycommunity, that provides read-only access to the host at 192.168.1.126. This host cannot be an IPv6 address. The oid for this community is 5:

snmpd community community1 { community name mycommunity access ro source 192.168.1.246\ oid 5 ipv6 disable }

Replaces the default community specification for the BIG-IP system. Using this command, the default community includes a community, named public, that provides read-only access to the default host. The oid for this community is 1:

snmpd community default { community name public source default oid 1 access ro }

Deletes the default community for the BIG-IP system:

snmpd community default delete

Disables monitoring of the snmpd load average on the BIG-IP system:

snmpd load max1 0 load max5 0 load max15 0

OptionsYou can use the following commands with the snmpd command:

◆ agent addressIndicates that the SNMP agent listens on the specified address. F5 recommends that you do not change this setting without fully understanding the impact of the change.

◆ agenttrapSpecifies, when enabled, that snmpd sends traps, for example: start/stop traps. The default value is enable.

◆ allowAdds or deletes IP addresses for the SNMP clients from which the snmpd daemon accepts requests. An SNMP client is a system that runs the SNMP manager software for the purpose of remotely managing the BIG-IP system. The default value is 127.

Bigpipe Utility Reference Guide 3 - 295

Page 332: BIG IP Reference

Chapter 3

◆ authtrapenableSpecifies, when enabled, the snmpd daemon generates authentication failure traps. The default value is disable.

◆ bigip trapsSpecifies, when enabled, that the BIG-IP system sends device warning traps to the trap destinations. The default value is enable.

◆ communityAdds or deletes a community. Note that you must include a community key, and you must enclose the attributes in braces. The options are additive, and include:

• accessSpecifies the community access level to the MIB. The options are ro (Read-Only community), and rw (Read-Write community). The default value is ro.

• community nameSpecifies the name of the community that you are adding or deleting. This setting is required. The default value is public.

• ipv6Enables or disables IPv6 addresses for the community that you are adding or deleting. The default value is disable.

• oidSpecifies that you want to restrict access for the community to every object below the specified object identifier (OID) for the record.

• sourceSpecifies the source addresses with the specified community name that can access the management information base (MIB). The default value is default, which means allow any source address to access the MIB.

◆ diskChecks the disks mounted at the specified path for available disk space. The options are:

• minspace typeSpecifies a minimum disk space measurement type of either size (in kBs) or percent. Please note that the minspace setting is based on the this setting.

• minspaceSpecifies the minimum disk space threshold in either kBs or percentage based on the minspace type setting. If the available disk space is less than this amount, the associated entry in the 1.3.6.1.4.1.2021.9.1.100 MIB table is set to (1) and a descriptive error message is returned to queries of 1.3.6.1.4.1.2021.9.1.101.

• pathSpecifies the path to the disk that the system checks for disk space.

3 - 296

Page 333: BIG IP Reference

Bigpipe Utility Command Reference

◆ include

Warning: Do not use this parameter without assistance from the F5 Technical Support team. The system does not validate the commands issued using the include parameter. If you use this parameter incorrectly, you put the functionality of the system at risk.

◆ l2forward vlanSpecifies the VLANs for which you want the snmpd daemon to expose Layer 2 forwarding information. Layer 2 forwarding is the means by which frames are exchanged directly between hosts, with no IP routing required.

• noneThis is the default value; it means this parameter is not set.

Important: The default value is not the same as setting the l2forward vlan parameter to the string "none," which indicates that you do not want the snmpd daemon to expose Layer 2 forwarding for any VLAN.

• <vlan key>Specifies the names of the VLANs for which the snmpd daemon exposes Layer 2 forwarding information. The snmpd daemon overwrites the value of the sysL2ForwardAttrVlan object identifier (OID) with the specified VLAN names. Once you set this parameter, users cannot change the value of the sysL2FowardAttrVlan OID using the SNMP set method.

• allSpecifies that the snmpd daemon exposes Layer 2 forwarding information for all VLANs.

Warning: When you set this parameter to all, the system can create a very large table of statistics, and potentially affect system performance.

◆ load max1Specifies the maximum 1-minute load average of the machine. If the load exceeds this threshold, the associated entry in the 1.3.6.1.4.1.2021.10.1.100 MIB table is set to (1) and a descriptive error message is returned to queries of 1.3.6.1.4.1.2021.10.1.101.

Note: When you specify a 0 (zero) for all of the load max1, load max5, and load max15 options, the system does not monitor the load average.

◆ load max15Specifies the maximum 15-minute load average of the machine. If the load exceeds this threshold, the associated entry in the 1.3.6.1.4.1.2021.10.1.100 MIB table is set to (1) and a descriptive error message is returned to queries of 1.3.6.1.4.1.2021.10.1.101.

Note: When you specify a 0 (zero) for all of the load max1, load max5, and load max15 options, the system does not monitor the load average.

Bigpipe Utility Reference Guide 3 - 297

Page 334: BIG IP Reference

Chapter 3

◆ load max5Specifies the maximum 5-minute load average of the machine. If the load exceeds this threshold, the associated entry in the 1.3.6.1.4.1.2021.10.1.100 MIB table is set to (1) and a descriptive error message is returned to queries of 1.3.6.1.4.1.2021.10.1.101.

Note: When you specify a 0 (zero) for all of the load max1, load max5, and load max15 options, the system does not monitor the load average.

◆ partitionDisplays the partition within which the snmpd daemon resides.

◆ procSpecifies a check of the machine to determine if the specified process is running. An error flag (1) and a description message are passed to the 1.3.6.1.4.1.2021.2.1.100 and 1.3.6.1.4.1.2021.2.1.101 MIB columns (respectively) if the specified program is not found in the process table as reported by /bin/ps -e.

F5 recommends that you do not modify or delete system processes; however, you can add, modify, or delete user-defined processes.

• maxSpecifies the maximum number of instances of the process that can run. If min and max settings are not specified, the max setting is 1 by default. The maximum is infinity.

• minSpecifies the minimum number of instances of the process that can run. If max setting is specified, but min setting is not specified, the min setting is 1 by default.

• processSpecifies the name of the process for which you are checking. The maximum length for a process name is 16 characters.

◆ syscontactSpecifies the name of the person who administers the snmpd daemon for this system.

◆ syslocationDescribes this system's physical location.

◆ sysservicesSpecifies the value of the system.sysServices.0 object.

◆ trap2sinkAdds or deletes an SNMP version 2 trap destination. Note that you must include a trap2sink key, and you must enclose the attributes in braces.

• communitySpecifies the community name for the trap destination that you are adding or deleting.

• hostSpecifies the IP address or the FQDN for the trap2sink host that you are adding or deleting. Note that you must configure the DNS Server on the BIG-IP system. You can use the dns command to do this.

3 - 298

Page 335: BIG IP Reference

Bigpipe Utility Command Reference

• portSpecifies the port for the trap destination that you are adding or deleting. The default value is 162.

◆ trapcommunitySpecifies the common community name for the trap destination.

◆ trapsessAdds or deletes an SNMP trap destination.

Note: You must include a trapsess key, and you must enclose the attributes in braces.

• auth passwordSpecifies the authentication password only for an SNMP version 3 trap. Note that if you enter an authentication password, the auth protocol option cannot equal NONE.

• auth protocolSpecifies the authentication method only for an SNMP version 3 trap. The default value is NONE. You must use capital letters for the following authentication methods:

• MD5Specifies that the system uses the MD5 algorithm to authenticate the user. This option is valid only for SNMP version 3.

• SHASpecifies that the system uses the secure hash algorithm (SHA) to authenticate the user. This option is valid only for SNMP version 3.

• NONESpecifies that user does not require authentication. Note that if you use this option, you do not use the auth password option. This option is not valid for SNMP version 3.

• engine idSpecifies the authoritative security engine ID for SNMP version 3.

• hostSpecifies the IP address or the FQDN for the trapsess host that you are adding or deleting. Note that you must configure the DNS Server on the BIG-IP system. You can use the dns command to do this. This setting is required.

• portSpecifies the port for the trapsess destination. The default value is 162.

• privacy passwordSpecifies the privacy pass phrase to use for encrypted SNMP version 3 messages. Note that if you enter a privacy password, the privacy protocol option cannot equal NONE. Use this setting to set only SNMP version 3 traps.

Bigpipe Utility Reference Guide 3 - 299

Page 336: BIG IP Reference

Chapter 3

• privacy protocolSpecifies the encryption protocol to use to deliver authentication information for this trapsess. The default value is NONE. Use this setting to set only SNMP version 3 traps. You must use the specified case for the following options exactly:

• DESSpecifies that the system encrypts the user information using DES (Data Encryption Standard). This option is valid only for SNMP version 3.

• NONESpecifies that the system does not encrypt the user information. Note that if you use this option, you do not use the privacy password option.

• security levelSpecifies the security level for the trapsess. The default value is noAuthNoPriv. Use this setting to set only SNMP version 3 traps. You must use the specified case for the following options exactly:

• noAuthNoPrivSpecifies that if the system cannot authenticate the user, the system does not grant the user access to the system. This setting is required if the SNMP version is other than version 3.

• authNoPrivSpecifies that the SNMP trap destination uses the auth protocol setting, but not the privacy protocol setting. Note that if you use this option, auth protocol cannot be NONE, and auth password must be set. This option is valid only for SNMP version 3.

• authPrivSpecifies that the SNMP trap destination uses both the authentication protocol setting and the privacy protocol setting. Note that if you use this option, auth protocol cannot be set to NONE, and privacy protocol cannot be set to NONE. This option is valid only for SNMP version 3.

• security nameSpecifies the security name the system uses to authenticate SNMP version 3 messages.

• versionSpecifies the SNMP version to which the trap destination applies. The default value is 2c.

◆ trapsinkAdds or deletes an SNMP version 1 trap destination.

• communitySpecifies the community name for the trap destination.

• hostSpecifies the IP address or the FQDN for the trapsink host that you are adding or deleting. Note that you must configure the DNS Server on the BIG-IP system. You can use the dns command to do this.

3 - 300

Page 337: BIG IP Reference

Bigpipe Utility Command Reference

• portSpecifies the port for the trapsink destination.

◆ trapsourceSpecifies the source of the SNMP trap. The default value is none.

◆ usmuserAdds or deletes a user for which you are setting an SNMP access level for SNMP version 3. Note that you must include a usmuser key, and you must enclose the attributes in braces. The options are additive and include:

• accessSpecifies the user access level to the MIB. The default value is ro (Read Only).

• authpasswordSpecifies the user’s authentication password. Note that if you enter an authentication password, the auth type option cannot equal NONE.

• auth protocolSpecifies the authentication method for this user. This setting is required. You must use capital letters for the following authentication methods:

• MD5Specifies that the system uses the MD5 algorithm to authenticate the user.

• SHASpecifies that the system uses the secure hash algorithm (SHA) to authenticate the user.

• NONESpecifies that user does not require authentication.

• oidSpecifies an object identifier (OID) for the record.

• privacy passwordSpecifies the password for the user. Note that if you enter a privacy password, the privacy protocol option cannot equal NONE.

• privacy protocolSpecifies the encryption protocol to use to deliver authentication information for this user. Note that if you enter a privacy protocol, the auth type option cannot equal NONE. This setting is required. You must use capital letters for the following authentication methods:

• DESSpecifies that the system encrypts the user information using DES. This option is valid only for SNMP version 3.

• NONESpecifies that the system does not encrypt the user information. Note that if you use this option, you do not use the privacy password option.

Bigpipe Utility Reference Guide 3 - 301

Page 338: BIG IP Reference

Chapter 3

• security levelSpecifies the security level for the user. The default value is noAuthNoPriv. Use this setting to set only SNMP version 3 traps. You must use the specified case for the following options exactly:

• noAuthNoPrivSpecifies that if the user cannot be authenticated, the system does not grant access to the system. This setting is required if the SNMP version is other than version 3.

• authNoPrivSpecifies that the SNMP trap destination uses the auth protocol setting, but not the privacy protocol setting. Note that if you use this option, auth protocol cannot be NONE, and auth password must be set. This option is valid only for SNMP version 3.

• authPrivSpecifies that the SNMP trap destination uses the authentication protocol setting and the privacy protocol setting. Note that if you use this option, auth protocol cannot be set to NONE, and privacy protocol cannot be set to NONE. This option is valid only for SNMP version 3.

• usernameSpecifies the name of the user who is using SNMP version 3 to access the MIB. This setting is required.

See alsobigpipe(1), httpd(1), ntp(1), dns(1), sshd(1)

3 - 302

Page 339: BIG IP Reference

Bigpipe Utility Command Reference

softwareDownloads and installs software onto a BIG-IP system.

SyntaxUse this command to download software, and then install it onto a BIG-IP system.

Create/Modifysoftware [{] <software arg list> [}]

<software arg> ::=

desired (<software desired list> | none) [add | delete]

hotfixes (<software hotfix key list> | none) [add | delete]

images (<software image key list> | none) [add | delete]

status <software status key list>

volumes <software volume key list>

<software desired> ::= (<software desired key> | all) \ [{] <software desired arg list> [}]

<software desired key> ::=

<name>

<software desired arg> ::=

active (enable | disable)

build (<string> | none)

product (<string> | none)

retry (enable | disable)

retry count <number>

version (<string> | none)

volume <name>

<software hotfix key> ::=

(<string> | none)

<software image key> ::=

(<string> | none)

<software status key> ::=

<name>

<software volume key> ::=

<name>

Displaysoftware [show [all]]

software list [all]

software desired [<software desired key> | all] [show [all]]

software desired [<software desired key> | all] list [all]

software desired (<software desired key> | all) active [show]

Bigpipe Utility Reference Guide 3 - 303

Page 340: BIG IP Reference

Chapter 3

software desired (<software desired key> | all) build [show]

software desired (<software desired key> | all) product [show]

software desired (<software desired key> | all) retry [show]

software desired (<software desired key> | all) retry count [show]

software desired (<software desired key> | all) version [show]

software desired (<software desired key> | all) volume [show]

software hotfixes [<software hotfix key> | all] [show [all]]

software hotfixes (<software hotfix key> | all) build [show]

software hotfixes (<software hotfix key> | all) chksum [show]

software hotfixes (<software hotfix key> | all) filename [show]

software hotfixes (<software hotfix key> | all) hotfix id [show]

software hotfixes (<software hotfix key> | all) hotfix title [show]

software hotfixes (<software hotfix key> | all) product [show]

software hotfixes (<software hotfix key> | all) verified [show]

software hotfixes (<software hotfix key> | all) version [show]

software images [<software image key> | all] [show [all]]

software images (<software image key> | all) build [show]

software images (<software image key> | all) build date [show]

software images (<software image key> | all) chksum [show]

software images (<software image key> | all) file size [show]

software images (<software image key> | all) filename [show]

software images (<software image key> | all) last modified [show]

software images (<software image key> | all) product [show]

software images (<software image key> | all) verified [show]

software images (<software image key> | all) version [show]

software status [<software status key> | all] [show [all]]

software status (<software status key> | all) active [show]

software status (<software status key> | all) basebuild [show]

software status (<software status key> | all) build [show]

software status (<software status key> | all) edition [show]

software status (<software status key> | all) product [show]

software status (<software status key> | all) status [show]

software status (<software status key> | all) version [show]

software status (<software status key> | all) volume [show]

software volumes [<software volume key> | all] [show [all]]

software volumes (<software volume key> | all) active [show]

software volumes (<software volume key> | all) media [show]

software volumes (<software volume key> | all) name [show]

software volumes (<software volume key> | all) size [show]

3 - 304

Page 341: BIG IP Reference

Bigpipe Utility Command Reference

Deletesoftware delete

software desired(<software desired list> delete

software hotfixes <software hotfix key list> delete

software images <software image key list> delete

software status <software status key list> delete

software volumes <software volume key list> delete

DescriptionYou can use the software command to:

• Download and install software images and hotfixes onto the system

• Delete software that you have downloaded

ExamplesCopies the software image file local-install-9.6.0.565.0.im from /root to /shared/images:

software image /root/local-9.6.0.565.0.im add

When you are currently running on volume HD1.1, switchboot reboots the system to volume HD1.2:

software desired HD1.2 active enable

OptionsYou can use these options with the software command:

◆ activeIndicates whether the volume is running. Note that you cannot delete the active volume.

◆ buildDisplays the F5 Networks build number related to the installed software image.

◆ build dateDisplays the date associated with the software image file.

◆ chksumDisplays the MD5 checksum for the software image.

◆ desiredInitiates installation of the specified version of the software on the specified volume.

◆ file sizeDisplays the size of the software image file.

◆ filenameDisplays the name of the software image file.

Bigpipe Utility Reference Guide 3 - 305

Page 342: BIG IP Reference

Chapter 3

◆ hotfix idDisplays the ID number related to the hotfix.

◆ hotfix titleDisplays the name of the hotfix.

◆ hotfixesInitiates installation of the specified software hotfix on the specified volume.

◆ imagesCopies the specified files to a location from which the system can install the software.

◆ last modifiedDisplays the date on which the software image was last changed.

◆ mediaDisplays the type of media on which the volume exists.

◆ nameSpecifies the name of the volume.

◆ productDisplays the F5 Networks product related to the installed software.

◆ retryEnables the retry option, which automatically retries installing in case of installation failure.

◆ sizeDisplays the size of the volume.

◆ statusDisplays the status of currently installing or installed software.

◆ versionDisplays the F5 Networks product version number related to the installed software image.

◆ volumeDisplays the volumes on the system.

• active (enable | disable)

• build

• product

• size

• version

Note: The volume option is not applicable to partitioned systems.

See alsobigpipe(1), ntp(1), dns(1), httpd(1), snmpd(1)

3 - 306

Page 343: BIG IP Reference

Bigpipe Utility Command Reference

sshdConfigures the Secure Shell (SSH) daemon for the BIG-IP system.

SyntaxUse this command to configure the sshd daemon on the system.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

Note

You must enter the values for the loglevel argument using the exact case shown below. In other words, to assign a log level of ERROR, you use the syntax: sshd loglevel ERROR.

sshd [{] <sshd arg list> [}]

<sshd arg> ::=

allow (<string list> | none) [add | delete]

banner (enable | disable)

banner text (<string> | none)

inactivity timeout <number>

include (<string> | none)

login (enable | disable)

loglevel (QUIET | FATAL | ERROR | INFO | VERBOSE | \ DEBUG | DEBUG1 | DEBUG2 | DEBUG3)

Displaysshd [show [all]]

sshd list [all]

sshd allow [show]

sshd banner [show]

sshd banner text [show]

sshd inactivity timeout [show]

sshd include [show]

sshd login [show]

sshd loglevel [show]

Bigpipe Utility Reference Guide 3 - 307

Page 344: BIG IP Reference

Chapter 3

DescriptionUse the sshd command to configure a secure channel between the BIG-IP system and other devices.

Important

F5 recommends that users of the Configuration utility exit the utility before changes are made to the system using the sshd command. This is because making changes to the system using the sshd command causes a restart of the sshd daemon. Likewise, restarting the sshd daemon creates the necessity for a restart of the Configuration utility.

ExamplesCreates an initial range of IP addresses (192.168.0.0 with a netmask of 255.255.0.0) that are allowed to log on to the system:

sshd allow 192.168.0.0/255.255.0.0

Adds the IP address, 192.168.1.245, to the existing list of IP addresses that are allowed to log on to the system:

sshd allow 192.168.1.245 add

Enables SSH logon to the system:

sshd login enable

Sets an inactivity timeout of 60 minutes for SSH logons to the system:

sshd inactivity timeout 3600

Sets the sshd message log level to ERROR:

sshd loglevel ERROR

Note

In the following examples, the banner text can be composed of multiple lines, but you must type (double) quotation marks around the text, and type apostrophes (single quotation marks) outside the (double) quotation marks.

Enables the display of an SSH banner upon logon and sets the contents of that banner to: NOTICE: Improper use of this computer is prohibited.

sshd banner enable banner text ‘"NOTICE: Improper use of this computer may result in prosecution!"’

Creates a three-line banner that displays when a user attempts to log on to a system using SSH.

sshd banner enable banner text ‘”Attention:This system is private.Illegal use is punishable by law.“’

3 - 308

Page 345: BIG IP Reference

Bigpipe Utility Command Reference

OptionsYou can use these options with the sshd command:

◆ allowAdds a server to or removes a server from the /etc/hosts.allow file. Use this option to either add servers that are allowed to access the BIG-IP system or delete these servers from the system.

Warning: Using the value none resets the sshd daemon to allow all servers access to the system. F5 recommends that you do not use the value none with the sshd command.

◆ bannerEnables or disables the display of the banner text field when a user logs in to the system using SSH. The default value is disable.

◆ banner textWhen banner is enabled, specifies the text to include in the banner that displays when a user attempts to log on to the system.

◆ inactivity timeoutSpecifies the number of seconds before inactivity causes an SSH session to log off. The default value is 0 (zero) seconds, which indicates that inactivity timeout is disabled.

◆ include

Warning: Do not use this parameter without assistance from the F5 Technical Support team. The system does not validate the commands issued using the include parameter. If you use this parameter incorrectly, you put the functionality of the system at risk.

◆ loginEnables or disables SSH logons to the system. The default value is enable.

◆ loglevelSpecifies the minimum sshd message level to include in the system log. You must enter the following values in capital letters:

• DEBUG - DEBUG3Indicates that the minimum sshd message level that the system logs is the specified debugging level.

• ERRORIndicates that the minimum sshd message level that the system logs is error.

• FATALIndicates that the minimum sshd message level that the system logs is fatal.

• INFOIndicates that the minimum sshd message level that the system logs is informational.

Bigpipe Utility Reference Guide 3 - 309

Page 346: BIG IP Reference

Chapter 3

• QUIETIndicates that the system does not log sshd messages.

• VERBOSEIndicates that the system logs all sshd messages.

◆ partitionDisplays the partition within which the sshd daemon resides.

See alsobigpipe(1), ntp(1), dns(1), httpd(1), snmpd(1)

3 - 310

Page 347: BIG IP Reference

Bigpipe Utility Command Reference

sslDisplays or resets Secure Sockets Layer (SSL) statistics for the BIG-IP system.

SyntaxUse this command to display or reset SSL statistics for the system.

Modifyssl stats reset

Displayssl [show [all]]

DescriptionDisplays or resets SSL statistics for the system.

ExamplesDisplays all SSL statistics for the system:

ssl show all

See alsobigpipe(1)

Bigpipe Utility Reference Guide 3 - 311

Page 348: BIG IP Reference

Chapter 3

statemirrorConfigures connection mirroring for a BIG-IP unit that is part of a redundant system configuration.

SyntaxUse this command to enable and configure connection mirroring for the system.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

statemirror [{] <statemirror arg list> [}]

<statemirror arg> ::=

addr (<ip addr> | none)

peer addr (<ip addr> | none)

secondary addr (<ip addr> | none)

secondary peer addr (<ip addr> | none)

state (enable | disable)

Displaystatemirror [show [all]]

statemirror list [all]

statemirror addr [show]

statemirror peer addr [show]

statemirror secondary addr [show]

statemirror secondary peer addr [show]

statemirror state [show]

Description You use this command to configure connection mirroring on a system that is part of a redundant system configuration in a high availability system. Connection mirroring is the process of duplicating connections from the active system to the standby system. Enabling this setting ensures a higher level of connection reliability, but it may also have an impact on system performance.

3 - 312

Page 349: BIG IP Reference

Bigpipe Utility Command Reference

ExamplesEnables and configures connection mirroring for a high availability system in which one BIG-IP system has an IP address of 192.168.10.10 and its peer has an IP address of 192.168.10.20:

statemirror state enable addr 192.168.10.10 peer addr 192.168.10.20

Re-enables connection mirroring for a system for which connection mirroring was disabled:

statemirror state enable

OptionsYou can use these options with the statemirror command:

◆ addrSpecifies the primary self-IP address on this unit to which the peer unit mirrors its connections. This is a required setting.

◆ partitionDisplays the partition within which the statemirror object resides.

◆ peer addrSpecifies the primary self-IP address on the peer unit to which this unit mirrors its connections. This is a required setting.

◆ secondary addrSpecifies another self-IP address on this unit to which the peer unit mirrors its connections when the primary address is unavailable.

◆ secondary peer addrSpecifies another self-IP address on the peer unit to which this unit mirrors its connections when the primary peer address is unavailable.

◆ stateEnables or disables connection mirroring. The default value is enable.

See alsobigpipe(1), failover(1)

Bigpipe Utility Reference Guide 3 - 313

Page 350: BIG IP Reference

Chapter 3

stop Discontinues command continuation.

SyntaxUse this command to discontinue command continuation.

Usagestop

DescriptionIf you type any command using an unbalanced opening brace, the bigpipe shell stores the command entered up to that point. The shell stores any subsequent commands in a similar way until you type a command that closes all open braces, or you type the stop command.

ExamplesSuppose you type the auth radius command, with an opening brace, but no closing brace:

bp> auth radius rad-1 {

The shell does nothing. At this point, you can continue to type more options for the auth radius command:

debug enable

retries 4

The shell continues to gather the syntax for the command. When finished typing, you can either type a command containing a closing brace (}), in which case the shell runs the full command sequence that you typed, or you can type:

stop

The shell presents an empty prompt:

bp>

3 - 314

Page 351: BIG IP Reference

Bigpipe Utility Command Reference

stpConfigures spanning tree protocols on the system.

SyntaxUse this command to modify or display an RSTP, MSTP, or STP configuration.

Modifystp [{] <stp arg list> [}]

<stp arg> ::=

config name (<string> | none)

config revision <number>

forward delay <number>

hello <number>

max age <number>

max hops <number>

mode (disable | stp | rstp | mstp | passthru)

transmit hold <number>

Displaystp [show [all]]

stp list [all]

stp config name [show]

stp config revision [show]

stp forward delay [show]

stp hello [show]

stp max age [show]

stp max hops [show]

stp mode [show]

stp transmit hold [show]

DescriptionProvides the ability to configure spanning tree protocols for the traffic management system. Spanning tree protocols are Layer 2 protocols for preventing bridging loops. The system supports multiple spanning tree protocol (MSTP), rapid spanning tree protocol (RSTP), and spanning tree protocol (STP).

Bigpipe Utility Reference Guide 3 - 315

Page 352: BIG IP Reference

Chapter 3

ExamplesSets the STP mode to passthru. Passthru mode forwards spanning tree bridge protocol data units (BPDUs) received on any interface to all other interfaces:

stp mode passthru

Sets the STP mode to disable. No STP, RSTP, or MSTP packets are transmitted or received on the interface or trunk, and the spanning tree algorithm exerts no control over forwarding or learning on the port or the trunk:

stp mode disable

OptionsYou can use these options with the stp command:

◆ config nameSpecifies the configuration name (1 - 32 characters in length) only when the spanning tree mode is MSTP. The default configuration name is a string representation of a globally-unique MAC address belonging to the traffic management system.

The MSTP standard introduces the concept of spanning tree regions, which are groups of adjacent bridges with identical configuration names, configuration revision levels, and assignments of VLANs to spanning tree instances.

◆ config revisionSpecifies the revision level of the MSTP configuration only when the spanning tree mode is MSTP. The specified number must be in the range 0 to 65535. The default value is 0.

◆ forward delayIn the original Spanning Tree Protocol, the forward delay parameter controlled the number of seconds for which an interface was blocked from forwarding network traffic after a reconfiguration of the spanning tree topology. This parameter has no effect when RSTP or MSTP are used, as long as all bridges in the spanning tree use the RSTP or MSTP protocol. If any legacy STP bridges are present, then neighboring bridges must fall back to the old protocol, whose reconfiguration time is affected by the forward delay value. The default forward delay value is 15, and the valid range is 4 to 30 seconds.

◆ helloSpecifies the time interval in seconds between the periodic transmissions that communicate spanning tree information to the adjacent bridges in the network. The default value is 2 seconds, and the valid range is 1 to 10. The default hello time is optimal in virtually all cases. Changing the hello time is not recommended.

3 - 316

Page 353: BIG IP Reference

Bigpipe Utility Command Reference

◆ max ageSpecifies the number of seconds for which spanning tree information received from other bridges is considered valid. The default value is 20 seconds, and the valid range is 6 to 40 seconds.

◆ max hopsSpecifies the maximum number of hops an MSTP packet may travel before it is discarded. Use this option only when the spanning tree mode is MSTP. The number of hops must be in the range of 1 to 255 hops. The default number of hops is 20.

◆ modeSpecifies one of three spanning tree modes:

• disableDisable mode discards spanning tree bridge protocol data units (BPDUs) received on any interface.

• mstpMSTP mode supports multiple spanning tree instances. The spanning tree instances operate independently of one another. Each instance asserts control over one or more VLANs, called the members of the spanning tree instance. STP and RSTP do not support multiple spanning tree instances. They support only a single instance (instance 0), which contains all VLANs.

• passthruPassthru mode forwards spanning tree bridge protocol data units (BPDUs) received on any interface to all other interfaces. Essentially, passthru mode makes the traffic management system transparent to spanning tree BPDUs.

• rstpThe default mode is RSTP (rapid spanning tree protocol). RSTP converges to a fully-connected state quickly.

• stpSTP mode is supported for legacy systems. If STP is detected in the network, the traffic management system changes to STP mode even when the mode option is set to rstp or mstp.

◆ transmit holdSpecifies the absolute limit on the number of spanning tree protocol packets the traffic management system may transmit on a port in any hello time interval. It is used to ensure that spanning tree packets do not unduly load the network even in unstable situations. The default value is 6 packets, and the valid range is 1 to 10 packets.

See alsointerface(1), stp instance(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 317

Page 354: BIG IP Reference

Chapter 3

stp instanceConfigures an STP configuration instance.

SyntaxUse this command to create, modify, display, or delete an STP configuration instance.

Create/Modifystp instance help [usage]

stp instance <stp instance key> {}

stp instance (<stp instance key> | all) [{] <stp instance arg list> [}]

<stp instance key> ::=

<number>

<stp instance arg> ::=

instance id <number>

interfaces (<stp interface list> | none) [add | delete]

priority <number>

trunks (<stp trunk list> | none) [add | delete]

vlans (<vlan key list> | none) [add | delete]

<stp interface> ::= (<stp interface key> | all) [{] <stp interface arg list> [}]

<stp interface key> ::=

<interface key>

<stp interface arg> ::=

external path cost <number>

internal path cost <number>

name <interface key>

priority <number>

<stp trunk> ::= (<stp trunk key> | all) [{] <stp trunk arg list> [}]

<stp trunk key> ::=

<trunk key>

<stp trunk arg> ::=

external path cost <number>

internal path cost <number>

name <trunk key>

priority <number>

stp instance (<stp instance key> | all) stats reset

Displaystp instance [<stp instance key> | all] [show [all]]

stp instance [<stp instance key> | all] list [all]

stp instance (<stp instance key> | all) instance id [show]

3 - 318

Page 355: BIG IP Reference

Bigpipe Utility Command Reference

stp instance (<stp instance key> | all) interfaces [<stp interface key> | all] \[show [all]]

stp instance (<stp instance key> | all) interfaces [<stp interface key> | all] \list [all]

stp instance (<stp instance key> | all) interfaces (<stp interface key> | all) \external path cost [show]

stp instance (<stp instance key> | all) interfaces (<stp interface key> | all) \internal path cost [show]

stp instance (<stp instance key> | all) interfaces (<stp interface key> | all) name [show]

stp instance (<stp instance key> | all) interfaces (<stp interface key> | all) \pending [show]

stp instance (<stp instance key> | all) interfaces (<stp interface key> | all) \priority [show]

stp instance (<stp instance key> | all) priority [show]

stp instance (<stp instance key> | all) stats [show]

stp instance (<stp instance key> | all) trunks [<stp trunk key> | all] [show [all]]

stp instance (<stp instance key> | all) trunks [<stp trunk key> | all] list [all]

stp instance (<stp instance key> | all) trunks (<stp trunk key> | all) \external path cost [show]

stp instance (<stp instance key> | all) trunks (<stp trunk key> | all) \internal path cost [show]

stp instance (<stp instance key> | all) trunks (<stp trunk key> | all) name [show]

stp instance (<stp instance key> | all) trunks (<stp trunk key> | all) pending [show]

stp instance (<stp instance key> | all) trunks (<stp trunk key> | all) priority [show]

stp instance (<stp instance key> | all) vlans [show]

Deletestp instance (<stp instance key> | all) delete

DescriptionCreates, modifies, and displays an STP configuration instance.

ExamplesDisplays all STP instances on the system:

stp instance show

Lists the configuration information for all STP instances:

stp instance list

All members are removed from the instance, and then the instance itself is deleted. Spanning tree instance 0 (the Common and Internal Spanning Tree) cannot be deleted. This command may be used only in MSTP mode:

stp instance 2 delete

Bigpipe Utility Reference Guide 3 - 319

Page 356: BIG IP Reference

Chapter 3

OptionsYou can use these options with the stp instance command:

◆ interface path costSpecifies the interface internal or external path cost number. Each network interface has an associated path cost within each spanning tree instance. The path cost represents the relative cost of sending network traffic through that interface. In calculating the spanning tree, the algorithm tries to minimize the total path cost between each point of the tree and the root bridge. By manipulating the path costs of different interfaces, it is possible to steer traffic toward paths that are faster, more reliable, and/or more economical. Path costs can take values in the range 1 to 200,000,000. The default path cost for an interface is based on the interface's maximum speed, not its actual speed.

In MSTP mode there are two kinds of path cost: external and internal. The external path cost applies only to spanning tree instance 0, the Common and Internal Spanning Tree (CIST). It is used to calculate the cost to reach an adjacent spanning tree region. Independently, internal path costs can be set for each spanning tree instance (including instance 0) in MSTP mode. The internal path costs are used to calculate the costs of reaching adjacent bridges within the same spanning tree region.

◆ interface prioritySpecifies the interface priority number. Each network interface has an associated priority within each spanning tree instance. The relative values of the interface priorities influence which interfaces are chosen to carry network traffic. All other things being equal, interfaces with numerically lower priority values are favored to carry traffic. Interface priorities take values in the range 0 to 240 in increments of 16. The default interface priority is 128, the middle of the valid range.

◆ prioritySpecifies the priority number. Each bridge in a spanning tree instance has a priority value. The relative values of the bridge priorities control the topology of the spanning tree chosen by the protocol. The bridge with the lowest priority value (numerically) becomes the root of the spanning tree. Priority values vary from 0 to 61440 in increments of 4096.

◆ trunk path costSpecifies the trunk internal or external path cost number.

In MSTP mode there are two kinds of path cost: external and internal. The external path cost applies only to spanning tree instance 0, the Common and Internal Spanning Tree (CIST). It is used to calculate the cost to reach an adjacent spanning tree region. Independently, internal path costs can be set for each spanning tree instance (including instance 0) in MSTP mode. The internal path costs are used to calculate the costs of reaching adjacent bridges within the same spanning tree region.

3 - 320

Page 357: BIG IP Reference

Bigpipe Utility Command Reference

◆ trunk prioritySpecifies the trunk priority number. Each network trunk has an associated priority within each spanning tree instance. The relative values of the trunk priorities influence which trunks are chosen to carry network traffic. All other things being equal, trunks with numerically lower priority values are favored to carry traffic. Trunk priorities take values in the range 0 to 240 in increments of 16. The default trunk priority is 128, the middle of the valid range.

◆ vlansSpecifies a list of VLAN names.

See alsointerface(1), stp(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 321

Page 358: BIG IP Reference

Chapter 3

streamDisplays or resets global stream statistics for the BIG-IP system.

SyntaxUse this command to display or reset global stream statistics for the system.

Modifystream stats reset

Displaystream [show [all]]

DescriptionDisplays or resets stream statistics for the system.

ExamplesDisplays the global stream statistics for the system:

stream show

Resets all global stream statistics on the system:

stream stats reset

See alsobigpipe(1)

3 - 322

Page 359: BIG IP Reference

Bigpipe Utility Command Reference

sys-icheckIdentifies unintended modifications to BIG-IP system files.

SyntaxUse this command at the BIG-IP system prompt to identify any unintended modifications to BIG-IP system files. Note that a hot fix (patch) is an intended modification that will not be identified by the sys-icheck command.

Usagesys-icheck [options]

OptionsYou can use these options with the sys-icheck command.

◆ -hUse this option to show help for the sys-reset command.

◆ -wUse this option to report Warn issues, as well as the default, Error issues.

◆ -iUse this option to report Info and Warn issues, as well as the default, Error issues.

DescriptionThe sys-icheck command identifies any unintended modifications to BIG-IP system files and returns Error issues. Use the options to report Warn or Info issues, as well.

ExamplesRuns the sys-icheck utility, and returns Info, Error, and Warn issues:

sys-reset -i

See alsosys-reset(8)

Bigpipe Utility Reference Guide 3 - 323

Page 360: BIG IP Reference

Chapter 3

sys-resetReturns the configuration of the system to the factory default (installation time) state.

SyntaxUse this command at the BIG-IP system prompt to return the configuration of the system to the factory default (installation time) state.

Usagesys-reset <file name> [options]

OptionsYou can use these options with the sys-reset command.

◆ -hUse this option to show help for the sys-reset command.

◆ -pUse this option to ignore all applied hot fixes.

DescriptionThe sys-reset command returns the system to the factory default state. You must specify the full path to the installation media (ISO image). Note that if you have applied hot fixes (patches) to your system, you must specify an override option for sys-reset to run.

ExamplesRuns the sys-reset command to restore the system to the factory default state ignoring any hot fixes that have been applied to the system:

sys-reset -p

Runs the sys-reset command to restore the system to the factory default state without changing the /shared file system.

sys-reset -s

See alsosys-icheck(8)

3 - 324

Page 361: BIG IP Reference

Bigpipe Utility Command Reference

syslogConfigures the system log, /var/run/config/syslog-ng.conf.

SyntaxUse this command to configure the system log.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

syslog [{] <syslog arg list> [}]

<syslog arg> ::=

authpriv from (emerg | alert | crit | err | warning | notice | info | debug)

authpriv to (emerg | alert | crit | err | warning | notice | info | debug)

cron from (emerg | alert | crit | err | warning | notice | info | debug)

cron to (emerg | alert | crit | err | warning | notice | info | debug)

daemon from (emerg | alert | crit | err | warning | notice | info | debug)

daemon to (emerg | alert | crit | err | warning | notice | info | debug)

include (<string> | none)

kern from (emerg | alert | crit | err | warning | notice | info | debug)

kern to (emerg | alert | crit | err | warning | notice | info | debug)

mail from (emerg | alert | crit | err | warning | notice | info | debug)

mail to (emerg | alert | crit | err | warning | notice | info | debug)

messages from (emerg | alert | crit | err | warning | notice | info | debug)

messages to (emerg | alert | crit | err | warning | notice | info | debug)

remote server (<remote server list> | none) [add | delete]

userlog from (emerg | alert | crit | err | warning | notice | info | debug)

userlog to (emerg | alert | crit | err | warning | notice | info | debug)

<remote server> ::= (<remote server key> | all) [{] <remote server arg list> [}]

<remote server key> ::=

<name>

<remote server arg> ::=

host (<ip addr> | <host name> | none)

local ip (<ip addr> | none)

name <name>

remote port <number>

Bigpipe Utility Reference Guide 3 - 325

Page 362: BIG IP Reference

Chapter 3

Displaysyslog [show [all]]

syslog list [all]

syslog authpriv from [show]

syslog authpriv to [show]

syslog cron from [show]

syslog cron to [show]

syslog daemon from [show]

syslog daemon to [show]

syslog include [show]

syslog kern from [show]

syslog kern to [show]

syslog mail from [show]

syslog mail to [show]

syslog messages from [show]

syslog messages to [show]

syslog remote server [<remote server key> | all] [show [all]]

syslog remote server [<remote server key> | all] list [all]

syslog remote server (<remote server key> | all) host [show]

syslog remote server (<remote server key> | all) local ip [show]

syslog remote server (<remote server key> | all) name [show]

syslog remote server (<remote server key> | all) \ remote port [show]

syslog userlog from [show]

syslog userlog to [show]

DescriptionYou can use this command to configure the system log.

ExamplesResets the message range of the security/authorization messages that are included in the system log to messages with a level of warning, error, critical, alert, and emergency:

syslog authpriv from warning

OptionsYou can use these options with the syslog command:

◆ authpriv fromSpecifies the lowest level of security/authorization messages to include in the log. The default value is notice.

◆ authpriv toSpecifies the highest level of messages about user authentication to include in the log. The default value is emerg.

3 - 326

Page 363: BIG IP Reference

Bigpipe Utility Command Reference

◆ cron fromSpecifies the lowest level of messages about time-based scheduling to include in the log. The default value is warning.

◆ cron toSpecifies the highest level of messages about time-based scheduling to include in the log. The default value is emerg.

◆ daemon fromSpecifies the lowest level of messages about daemon performance to include in the log. The default value is notice.

◆ daemon toSpecifies the highest level of messages about daemon performance to include in the log. The default value is emerg.

◆ include

Warning: Do not use this parameter without assistance from the F5 Technical Support team. The system does not validate the commands issued using the include parameter. If you use this parameter incorrectly, you put the functionality of the system at risk.

◆ kern fromSpecifies the lowest level of kern messages to include in the log. The default value is notice.

◆ kern toSpecifies the highest level of kern messages to include in the log. The default value is emerg.

◆ local ipSpecifies the IP address of the interface that the syslog-ng utility binds with to log messages to a remote host. For example, if you want the syslog-ng utility to log messages to a remote host that is connected to a VLAN, you set this parameter to the self IP address of the VLAN.

◆ mail fromSpecifies the lowest level of mail log messages to include in the log. The default value is notice.

◆ mail toSpecifies the highest level of mail log messages to include in the log. The default value is emerg.

◆ messages fromSpecifies the lowest level of system messages to include in the log. The default value is notice.

◆ messages toSpecifies the highest level of system messages to include in the log. The default value is warning.

◆ remote portSpecifies the port number of a remote server to which the Syslog utility sends messages. The default value is 514.

Bigpipe Utility Reference Guide 3 - 327

Page 364: BIG IP Reference

Chapter 3

◆ remote serverSpecifies the IP address of a remote server to which the Syslog utility sends messages. The default value is none.

◆ userlog fromSpecifies the lowest level of user account messages to include in the log. The default value is notice.

◆ userlog toSpecifies the highest level of user account messages to include in the log. The default value is emerg.

See alsobigpipe(1)

3 - 328

Page 365: BIG IP Reference

Bigpipe Utility Command Reference

systemSets up the BIG-IP system.

SyntaxUse this command to set up the BIG-IP system.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

system [{] <system arg list> [}]

<system arg> ::=

archive encrypt (on | on request | off)

auth source type (local | ldap | radius | activedirectory | tacacs)

console inactivity timeout <number>

custom addr (<ip addr> | none)

failsafe action (go offline | reboot | restart all | go offline abort tm | \| failover abort tm)

gui security banner (enable | disable)

gui security banner text (<string> | none)

gui setup (enable | disable)

host addr mode (mgmt | statemirror | custom)

hostname (<string> | none)

hosts allow include (<string> | none)

lcd display (enable | disable)

net reboot (enable | disable)

password prompt (<string> | none)

quiet boot (enable | disable)

remote host (<remote host list> | none) [add | delete]

username prompt (<string> | none)

<remote host> ::= (<remote host key> | all) [{] <remote host arg list> [}]

<remote host key> ::=

<name>

<remote host arg> ::=

addr (<ip addr> | none)

hostname (<string> | none)

name <name>

Bigpipe Utility Reference Guide 3 - 329

Page 366: BIG IP Reference

Chapter 3

Displaysystem [show [all]]

system list [all]

system archive encrypt [show]

system auth source type [show]

system console inactivity timeout [show]

system custom addr [show]

system failsafe action [show]

system gui security banner [show]

system gui security banner text [show]

system gui setup [show]

system host addr mode [show]

system hostname [show]

system hosts allow include [show]

system lcd display [show]

system net reboot [show]

system password prompt [show]

system quiet boot [show]

system remote host [<remote host key> | all] [show [all]]

system remote host [<remote host key> | all] list [all]

system remote host (<remote host key> | all) addr [show]

system remote host (<remote host key> | all) hostname [show]

system remote host (<remote host key> | all) name [show]

system username prompt [show]

DescriptionYou use this command to set up the general properties of the BIG-IP system.

ExamplesSets up the BIG-IP system using the system defaults:

system {}

Sets up a remote host named bigip151 with an IP address of 172.27.226.151 and a host name of bigip151.saxon.net:

system remote host bigip151 { addr 172.27.226.151 hostname bigip151.saxon.net }

3 - 330

Page 367: BIG IP Reference

Bigpipe Utility Command Reference

OptionsYou can use these options with the system command:

◆ archive encryptSpecifies whether the system archive encryption feature is set to on, off, or on request. The default value is on request. Note that you must configure the system archive encrypt option in conjunction with the configsync encrypt and configsync passphrase options.

The reason for this is when you perform a configuration synchronization of two BIG-IP units in a redundant system configuration, the process involves saving a UCS file from one system onto the peer system, and then installing the saved file on the peer system. You use the system archive encrypt option to indicate whether the process of saving the UCS file creates an encrypted or unencrypted file. For example, you can set the configsync encrypt option to enable, and configure a passphrase using the configsync passphrase option. If you use the default value, on request, for the system archive encrypt option, then when a user saves the UCS file, and provides the passphrase, the UCS file is encrypted. If the user does not provide the passphrase, the UCS file is not encrypted.

◆ auth source type Specifies the default user authorization source. The default value is local. When user accounts that access the BIG-IP system reside on a remote server, the value of auth source type is the type of server that you are using for authentication, for example: ldap.

◆ console inactivity timeoutSpecifies the number of seconds of inactivity before the console is locked. The default value is 0. This means that no timeout is set.

◆ custom addrIndicates a user-specified IP address for the BIG-IP system. The default value is none.

It is important to note that you must set the host addr mode option to custom, if you want to specify an IP address using custom addr. For more information, see the host addr mode option.

◆ failsafe actionSpecifies the action that the system takes when the switch board fails. The default value is failover restart tm.

• failoverSpecifies that the active unit fails over to its peer.

• failover restart tmSpecifies that the active unit fails over to its peer and restarts the traffic management service.

• rebootSpecifies that after the active unit fails over to its peer, it reboots while the peer processes the traffic.

• restart allSpecifies that the system restarts all system services.

Bigpipe Utility Reference Guide 3 - 331

Page 368: BIG IP Reference

Chapter 3

◆ gui security bannerSpecifies whether the system presents on the logon screen the text you specify in the Security banner text to show on the logon screen field. If you disable this option, the system presents an empty frame in the right portion of the logon screen. The default value is enable.

◆ gui security banner textSpecifies the text to present on the logon screen when the Show the security banner on the login screen option is enabled. The default value is: Welcome to the BIG-IP Configuration Utility. Log in with your username and password using the fields on the left.

◆ gui setupEnables or disables the Setup utility in the browser-based Configuration utility. The default value is enable.

When you configure a BIG-IP system using the command line interface, disable this option. Disabling the gui setup option of the system command enables your system administrators to use the browser-based Configuration utility without having to run the Setup utility.

◆ host addr modeSpecifies the type of host address assigned to the system. The default value is mgmt, which indicates that the host address is the management port of the system.

If you use the statemirror option, then the host address of the system is shared by the other unit in a redundant system configuration. In case of system failure, the traffic to the other system is routed to this system.

If you use the custom option, you must specify a custom IP address for the system using the custom addr option. For more information, see the custom addr option.

◆ hostnameSpecifies a local name for the BIG-IP system. The default value is bigip1.

◆ hosts allow include

Warning: Do not use this parameter without assistance from the F5 Technical Support team. The system does not validate the commands issued using the include parameter. If you use this parameter incorrectly, you put the functionality of the system at risk.

◆ lcd displayEnables or disables the system menu to display on the LCD panel on the front of the BIG-IP system. The default value is enable.

◆ net rebootEnables or disables the network reboot feature. The default value is disable. If you enable this feature and then reboot the system, the system boots from an ISO image on the network, rather than from an internal media drive. Use this option only when you want to install software on the system, for example, for an upgrade or a re-installation. Note that this setting reverts to disabled after you reboot the system a second time.

3 - 332

Page 369: BIG IP Reference

Bigpipe Utility Command Reference

◆ password promptSpecifies the text to present above the password field (the second of the two text boxes) on the logon screen.

◆ partitionDisplays the partition within which the system object resides.

◆ quiet bootEnables or disables the quiet boot feature. The default value is enable. If you enable this feature, the system suppresses informational text on the console during the boot cycle.

◆ remote hostAdds a remote host to or removes a remote host from the /etc/hosts file. The default value is none. You must enter both an IP address and a fully qualified domain name (FQDN) or alias for each host that you want to add to the file.

◆ username promptSpecifies the text to present above the user name field (the first of the two text boxes) on the logon screen.

See alsobigpipe(1)

Bigpipe Utility Reference Guide 3 - 333

Page 370: BIG IP Reference

Chapter 3

tcpDisplays or resets TCP statistics for the BIG-IP system.

SyntaxUse this command to display or reset TCP statistics for the BIG-IP system.

Modifytcp stats reset

Displaytcp [show [all]]

DescriptionDisplay or reset TCP statistics for the system.

ExamplesResets TCP statistics for the system:

tcp stats reset

See alsobigpipe(1)

3 - 334

Page 371: BIG IP Reference

Bigpipe Utility Command Reference

tmmDisplays or resets statistics about the tmm daemon.

SyntaxUse this command to display or reset statistics about the tmm daemon.

Create/Modify<tmm key> ::=

(<number>.<number> | none)

tmm (<tmm key> | all) stats reset

Displaytmm [<tmm key> | all] [show [all]]

DescriptionYou use this command to view or reset statistics about the Traffic Management Microkernel (tmm) daemon. The purpose of this daemon is to direct all application traffic passing through the BIG-IP system.

OptionsYou can use the following option with the tmm command:

◆ stats resetResets the statistics for the tmm daemon.

See alsobigpipe(1)

Bigpipe Utility Reference Guide 3 - 335

Page 372: BIG IP Reference

Chapter 3

traffic classConfigures a traffic class.

SyntaxUse this command to configure a traffic class on the system.

Create/Modifytraffic class <traffic class key> {}

traffic class (<traffic class key> | all) [{] <traffic class arg list> [}]

<traffic class key> ::=

<name>

<traffic class arg> ::=

class name <name>

classification tag (<string> | none)

dst ip (<ip addr> | none)

dst mask (<ip addr> | none)

dst port (<service> | none)

proto <number>

src ip (<ip addr> | none)

src mask (<ip addr> | none)

src port (<service> | none)

Displaytraffic class [<traffic class key> | all] [show [all]]

traffic class [<traffic class key> | all] list [all]

traffic class (<traffic class key> | all) class name [show]

traffic class (<traffic class key> | all) classification tag [show]

traffic class (<traffic class key> | all) dst ip [show]

traffic class (<traffic class key> | all) dst mask [show]

traffic class (<traffic class key> | all) dst port [show]

traffic class (<traffic class key> | all) partition [show]

traffic class (<traffic class key> | all) proto [show]

traffic class (<traffic class key> | all) src ip [show]

traffic class (<traffic class key> | all) src mask [show]

traffic class (<traffic class key> | all) src port [show]

Deletetraffic class (<traffic class key> | all) delete

3 - 336

Page 373: BIG IP Reference

Bigpipe Utility Command Reference

DescriptionYou can use the traffic class command to configure a traffic class, which is a named group of ports, machines, and subnets. You can then assign this traffic class to a virtual server to configure the virtual server to achieve specific Quality of Service (QoS) standards.

ExamplesDisplays tags for a traffic class named my_traffic_class:

traffic class my_traffic_class classification tag

Displays all of the properties of all of the traffic classes.:

traffic class list all

Deletes the traffic class named my_traffic_class:

traffic class my_traffic_class delete

OptionsYou can use these options with the traffic class command.

◆ class nameSpecifies a unique name for the component.

◆ classificationSpecifies the actual textual tag to be associated with the flow if the traffic class is matched.

◆ dst ipSpecifies destination IP addresses for the system to use when evaluating traffic flow.

◆ dst maskSpecifies a destination IP address mask for the system to use when evaluating traffic flow.

◆ dst portSpecifies a destination port for the system to use when evaluating traffic flow.

◆ partitionSpecifies the partition to which the traffic class configuration belongs. Only users with access to a partition can view the objects (such as traffic class configurations) that it contains.

◆ protoSpecifies a protocol for the system to use when evaluating traffic flow.

◆ src ipSpecifies source IP addresses for the system to use when evaluating traffic flow.

Bigpipe Utility Reference Guide 3 - 337

Page 374: BIG IP Reference

Chapter 3

◆ src maskSpecifies a source IP address mask for the system to use when evaluating traffic flow.

◆ src portSpecifies a source port for the system to use when evaluating traffic flow.

See alsobigpipe(1), list(1), virtual(1)

3 - 338

Page 375: BIG IP Reference

Bigpipe Utility Command Reference

trunkConfigures a trunk, with link aggregation.

SyntaxUse this command to create, modify, display, or delete a trunk.

Create/Modifytrunk <trunk key> {}

trunk (<trunk key> | all) [{] <trunk arg list> [}]

<trunk key> ::=

<name>

<trunk arg> ::=

distribution (src dest mac | dest mac | src dest ip | src dest port | index)

interfaces (<interface key list> | none) [add | delete]

lacp (enable | disable)

lacp mode (active | passive)

lacp timeout (long | short)

name <name>

policy (auto | max bw)

stp (enable | disable)

stp reset

trunk (<trunk key> | all) stats reset

Displaytrunk [<trunk key> | all] [show [all]]

trunk [<trunk key> | all] list [all]

trunk (<trunk key> | all) agg addr [show]

trunk (<trunk key> | all) distribution [show]

trunk (<trunk key> | all) interfaces [<interface key> | all] [show [all]]

trunk (<trunk key> | all) interfaces (<interface key> | all) lacp info [show]

trunk (<trunk key> | all) interfaces (<interface key> | all) name [show]

trunk (<trunk key> | all) interfaces (<interface key> | all) trunk name [show]

trunk (<trunk key> | all) lacp [show]

trunk (<trunk key> | all) lacp info [show]

trunk (<trunk key> | all) lacp mode [show]

trunk (<trunk key> | all) lacp timeout [show]

trunk (<trunk key> | all) name [show]

trunk (<trunk key> | all) policy [show]

trunk (<trunk key> | all) stats [show]

trunk (<trunk key> | all) stp [show]

Bigpipe Utility Reference Guide 3 - 339

Page 376: BIG IP Reference

Chapter 3

Deletetrunk (<trunk key> | all) delete

DescriptionLink aggregation allows multiple physical links to be treated as one logical link. It is also referred to as trunking. The main objective of link aggregation is to provide increased bandwidth at a lower cost, without having to upgrade hardware. The bandwidth of the aggregated trunk is the sum of the capacity of individual member links. Thus it provides an option for linearly incremental bandwidth as opposed to bandwidth options available through physical layer technology. The traffic management system supports link aggregation control protocol (LACP).

When a trunk is created, LACP is disabled by default. In this mode, no control packets are exchanged and the member links carry traffic as long as the physical layer is operational. In the event of physical link failure, an LACP member is removed from the aggregation.

It should be noted that both endpoints of the trunk should have identical LACP configuration to work properly. A mixed configuration where one endpoint is LACP enabled and other LACP disabled is not valid.

ExamplesCreates a trunk named mytrunk that includes the interfaces 1.1, 1.2, and 1.3:

trunk mytrunk { interface 1.1 1.2 1.3 }

Enable LACP on the trunk named mytrunk:

trunk mytrunk lacp enable

Enable active LACP mode on the trunk mytrunk:

trunk mytrunk lacp mode active

OptionsYou can use these options with the trunk command:

◆ distributionSpecifies the method of frame distribution. The options are src dest mac, dest mac, or src dest ip. When frames are transmitted on a trunk, they are distributed across the working member links. The distribution function ensures that the frames belonging to a particular conversation are neither mis-ordered nor duplicated at the receiving end. Distribution is done by calculating a hash value based on source and destination addresses carried in the frame, and associating the hash value with a link. All frames with a particular hash value are transmitted on the same link, thereby maintaining frame order.

◆ interfacesSpecifies a list of interface names separated by spaces.

3 - 340

Page 377: BIG IP Reference

Bigpipe Utility Command Reference

◆ lacpIndicates whether to enable or disable Link Aggregation Control Protocol (LACP).

◆ lacp modeSets the LACP mode to active or passive.

• In active mode, LACP packets are transmitted periodically, regardless of peer systems control value.

• In passive mode, LACP packets are not transmitted periodically, unless peer system's control value is active.

◆ lacp timeoutSets the LACP timeout to short or long. The default value is long.

• When you use the short timeout value, LACP packets are exchanged every second.

• When you use the long timeout value, LACP packets are exchanged every 30 seconds.

◆ policySets the LACP policy to auto or max bw (maximum bandwidth). Link aggregation is allowed only when all the interfaces are operating at the same media speed and connected to the same partner aggregation system. When there is a mismatch among configured members due to configuration errors or topology changes (auto-negotiation), link selection policy determines which links become working members and form the aggregation.

• With auto link selection, the lowest numbered operational link is chosen as the reference link. All the members that have the same media speed and are connected to the same partner as that of the reference link are declared as working members, and they are aggregated. The other configured members do not carry traffic.

• With max bw link selection, a subset of links that gives maximum aggregate bandwidth to the trunk is added to the aggregation.

◆ stpEnables or disables spanning tree protocols (STP).

◆ stp resetEnables or disables STP reset.

See alsointerface(1), vlan(1), vlangroup(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 341

Page 378: BIG IP Reference

Chapter 3

udpDisplays or resets all UDP statistics for the system.

SyntaxUse this command to display or reset all UDP statistics for the system.

Modifyudp stats reset

Displayudp [show [all]]

DescriptionDisplays or resets all UDP statistics for the system.

ExamplesDisplays the UDP statistics for the system:

udp stats show

See alsobigpipe(1)

3 - 342

Page 379: BIG IP Reference

Bigpipe Utility Command Reference

unitDisplays the unit ID for the unit, or peer unit, in a redundant system configuration.

SyntaxUse this command to display the unit ID of a unit in a redundant system configuration.

Displayunit [peer] [show]

DescriptionDisplays the unit ID for the unit, or peer unit, in a redundant system configuration.

ExamplesDisplays the unit number of the peer unit in the redundant system configuration:

unit peer show

Displays the unit number of the unit in the redundant system configuration:

unit show

See alsoha table(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 343

Page 380: BIG IP Reference

Chapter 3

userConfigures user accounts for managing the BIG-IP system.

SyntaxUse this command to create, display, modify, or delete user accounts on the BIG-IP system.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

user <user key> {}

user (<user key> | all) [{] <user arg list> [}]

<user key> ::=

<name>

<user arg> ::=

description <string>

group <number>

home <string>

id <number>

name <name>

password (crypt <encrypted password> | <old password> <new password>)

role <user role partition>

shell (<file name> | none)

<user role partition> ::=

(administrator | resource admin | user manager | manager | app editor | operator | \ guest | policy editor | none)

in (<partition key> | all)

Displayuser [<user key> | all] [show [all]]

user [<user key> | all] list [all]

user (<user key> | all) description [show]

user (<user key> | all) group [show]

user (<user key> | all) home [show]

user (<user key> | all) id [show]

3 - 344

Page 381: BIG IP Reference

Bigpipe Utility Command Reference

user (<user key> | all) name [show]

user (<user key> | all) partition [show]

user (<user key> | all) password [show]

user (<user key> | all) role [show]

user (<user key> | all) shell [show]

Deleteuser (<user key> | all) delete

DescriptionThe user command enables you to create, display, modify, or delete user accounts.

You can create user accounts where the user names differ only by case sensitivity (for example, david and DAVID). F5 Networks may reinstate case sensitivity in a future release. There are restrictions on reserved user names, for example, admin and root. You cannot create a user account using any variation of these two names, such as Admin or ADMIN.

Note

Only users with the Administrator or Resource Admin user role can save user accounts. If you are assigned a different user role, when you complete creating or modifying user accounts, you must contact an Administrator or Resource Admin to save the user accounts to the bigip.conf file.

ExamplesCreates a new user named nwinters with a password of abc123 and a role of guest in all partitions:

user nwinters password none abc123 role guest in all

Changes the partition, within which the user nwinters can create and modify objects, to pm_users:

user nwinters bigpipe shell write partition pm_users

Changes the password for the nwinters account from none to h411pass:

user nwinters password none h411pass

Displays all the user accounts and the user role and partition to which each account is assigned:

user show

Bigpipe Utility Reference Guide 3 - 345

Page 382: BIG IP Reference

Chapter 3

OptionsYou can use these options with the user command:

◆ description <string>Describes the user account.

◆ home <string>Displays the home directory for the user account. The home directory is based on the user name.

◆ partitionDisplays the partition within which the user account resides.

◆ password <old password> <new password>Changes the password for a user account, by specifying the old and the new password.

◆ role <role name> in <partition key>Specifies the user role you want to assign to the user account and the partition that the user account can access. The available user roles are administrator, resource admin, user manager, app editor, manager, operator, guest, and policy editor. You can indicate that you do not want to assign a user role to the user account by using the option none.

◆ shell (<file name> | none)Specifies the shell to which the user has access. Valid file names are bpsh (bigpipe shell), false (no shell), or bash (an unrestricted system prompt).

Important: You can assign access to the bash shell only to users with the Administrator or Resource Admin user role. However, F5 recommends that you do not give bash shell access to users with the Resource Admin user role unless they use the tcpdump, ssldump, or qkview utilities, or manage certificate and key files using the console. Instead, F5 recommends that you give these users bpsh shell access.

◆ user <name>Specifies the name of the user account you are configuring.

See alsobigpipe(1), remote users(1), remoterole(1)

3 - 346

Page 383: BIG IP Reference

Bigpipe Utility Command Reference

versionDisplays software version information for the system.

SyntaxUse this command to display the software version information for the system.

Displayversion [show [all]]

DescriptionDisplays detailed licensing and version information for the system, including kernel version, BIG-IP software version, installed hot fixes, and a list of licensed features.

ExamplesDisplays detailed licensing and version information for the system:

version

See alsobigpipe(1)

Bigpipe Utility Reference Guide 3 - 347

Page 384: BIG IP Reference

Chapter 3

virtualConfigures a virtual server.

SyntaxUse this command to create, modify, display, or delete a virtual server.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

virtual <virtual key> {}

virtual (<virtual key> | all) [{] <virtual arg list> [}]

<virtual key> ::=

<name>

<virtual arg> ::=

auth (<profile auth key list> | none) [add | delete]

clone pools (<clone pool name/type list> | none) [add | delete]

cmp (enable | disable)

cmp processor (<number>.<number> | none)

destination <member>

(enable | disable)

fallback persist (<profile persist key> | none)

httpclass (<profile httpclass key list> | none) [add | delete]

ip protocol <protocol>

lasthop pool (<pool key> | none)

limit <number>

mask (<ip mask> | none)

mirror (enable | disable)

modules <(asm | sam | wam) list>

name <name>

persist (<profile persist key list> | none) [add | delete]

pool (<pool key> | none)

profiles (<virtual server profile list> | none) [add | delete]

rate class (<rate class key> | none)

rules (<rule key list> | none) [add | delete]

snat (none | automap)

3 - 348

Page 385: BIG IP Reference

Bigpipe Utility Command Reference

snatpool (<snatpool key> | none)

srcport (preserve | preserve strict | change)

traffic classes (<traffic class key list> | none) [add | delete]

translate address (enable | disable)

translate service (enable | disable)

(ip forward | l2 forward | reject)

vlans (<vlan key list> | none) (enable | disable)

<clone pool/name type> ::= <pool key> (clientside | serverside)

<virtual server profile> ::=

<profile key> [clientside | serverside]

virtual (<virtual key> | all) stats reset

Displayvirtual [<virtual key> | all] [show [all]]

virtual [<virtual key> | all] list [all]

virtual (<virtual key> | all) auth [show]

virtual (<virtual key> | all) clone pools [show]

virtual (<virtual key> | all) cmp [show]

virtual (<virtual key> | all) cmp mode [show]

virtual (<virtual key> | all) cmp processor [show]

virtual (<virtual key> | all) destination [show]

virtual (<virtual key> | all) enabled [show]

virtual (<virtual key> | all) fallback persist [show]

virtual (<virtual key> | all) gtm score [show]

virtual (<virtual key> | all) httpclass [show]

virtual (<virtual key> | all) ip protocol [show]

virtual (<virtual key> | all) lasthop pool [show]

virtual (<virtual key> | all) limit [show]

virtual (<virtual key> | all) mask [show]

virtual (<virtual key> | all) mirror [show]

virtual (<virtual key> | all) modules [(asm | sam | wam) | all] [show [all]]

virtual (<virtual key> | all) modules ((asm | sam | wam) | all) module type [show]

virtual (<virtual key> | all) modules ((asm | sam | wam) | all) score [show]

virtual (<virtual key> | all) modules ((asm | sam | wam) | all) vs name [show]

virtual (<virtual key> | all) name [show]

virtual (<virtual key> | all) partition [show]

virtual (<virtual key> | all) persist [show]

virtual (<virtual key> | all) pool [show]

virtual (<virtual key> | all) profiles [<virtual server profile key> | all] [show [all]]

virtual (<virtual key> | all) profiles [<virtual server profile key> | all] list [all]

virtual (<virtual key> | all) profiles (<virtual server profile key> | all) \profile context [show]

virtual (<virtual key> | all) profiles (<virtual server profile key> | all) \profile name [show]

Bigpipe Utility Reference Guide 3 - 349

Page 386: BIG IP Reference

Chapter 3

virtual (<virtual key> | all) profiles (<virtual server profile key> | all) \virtual [show]

virtual (<virtual key> | all) rate class [show]

virtual (<virtual key> | all) rules [show]

virtual (<virtual key> | all) snat [show]

virtual (<virtual key> | all) snatpool [show]

virtual (<virtual key> | all) srcport [show]

virtual (<virtual key> | all) stats [show]

virtual (<virtual key> | all) traffic classes [show]

virtual (<virtual key> | all) translate address [show]

virtual (<virtual key> | all) translate service [show]

virtual (<virtual key> | all) type [show]

virtual (<virtual key> | all) vlans [show]

Deletevirtual (<virtual key> | all) delete

DescriptionThe virtual command creates, deletes, modifies properties on, and displays information about virtual servers. Virtual servers are externally visible IP addresses that receive client requests, and instead of sending the requests directly to the destination IP address specified in the packet header, virtual servers send the requests to any of several content servers that make up a load balancing pool. Virtual servers also apply various behavioral settings to multiple traffic types, enable persistence for multiple traffic types, and direct traffic according to user-written iRules™. For more information see, the Configuration Guide for BIG-IP® Local Traffic Management.

ExamplesCreate a virtual server named myV20, which uses the source address persistence method:

virtual myV20 { destination 11.11.11.12:* persist source addr pool myPool }

Replaces the profile associated with the virtual server vs_fast14_http4. Note that to replace the profile associated with a virtual server, you must enclose the name of the new profile in braces:

virtual vs_fastl4_http4 {profile udp}

Delete the virtual servers named myV4, myV5, myV6, myV7, myV8, myV9, and myV10:

virtual myV4 myV5 myV6 myV7 myV8 myV9 myV10 delete

3 - 350

Page 387: BIG IP Reference

Bigpipe Utility Command Reference

OptionsYou can use these options with the virtual command:

◆ authSpecifies a list of authentication profile names separated by spaces that the virtual server uses to manage authentication.

◆ clone poolsSpecifies clone pools that the virtual server uses to replicate either client-side traffic (that is, prior to address translation) or server-side traffic (that is, after address translation) to a member of the specified clone pool. This feature is used for intrusion detection.

◆ cmpEnables or disables clustered multi-processor (CMP) acceleration. This feature applies to certain platforms only. The default value is enable.

◆ cmp modeDisplays the CMP mode for a virtual server.

◆ cmp processorSpecifies the processor for CMP acceleration. This feature applies to certain platforms only.

◆ destinationSpecifies the IP address and service on which the virtual server listens for connections.

◆ (enable | disable) Specifies the state of the virtual server. The default value is enable. Note that when you disable a virtual server, the virtual server no longer accepts new connection requests. However, it allows current connections to finish processing before going to a down state.

◆ fallback persistSpecifies a fallback persistence profile for the virtual server to use when the default persistence profile is not available.

◆ httpclassSpecifies a list of httpclass profiles, separated by spaces, with which the virtual server works to increase the speed at which the virtual server processes HTTP requests.

◆ (ip forward | l2 forward | reject)Specifies whether to enable IP forwarding or Layer 2 (L2) forwarding or to reject forwarding for the virtual server. IP forwarding allows the virtual server to simply forward packets directly to the destination IP address specified in the client request.

◆ ip protocolSpecifies the IP protocol for which you want the virtual server to direct traffic. Sample protocol names are TCP and UDP. Note that you do not use this setting when creating an httpclass virtual server.

Bigpipe Utility Reference Guide 3 - 351

Page 388: BIG IP Reference

Chapter 3

◆ lasthop poolSpecifies the name of the last hop pool that you want the virtual server to use to direct reply traffic to the last hop router.

◆ limitSpecifies the maximum number of concurrent connections you want to allow for the virtual server.

◆ maskSpecifies the netmask for a network virtual server only. This setting is required for a network virtual server. The netmask clarifies whether the host bit is an actual zero or a wildcard representation.

◆ mirrorEnables or disables state mirroring. You can use state mirroring to maintain the same state information in the standby unit that is in the active unit, allowing transactions such as FTP file transfers to continue as though uninterrupted. The default value is enable.

◆ nameSpecifies a unique name for the virtual server. This setting is required.

◆ partitionDisplays the name of the partition within which the virtual server resides.

◆ persistSpecifies a list of profiles separated by spaces that the virtual server uses to manage connection persistence.

◆ poolSpecifies a default pool to which you want the virtual server to automatically direct traffic.

◆ profilesSpecifies a list of profiles for the virtual server to use to direct and manage traffic.

◆ rate classSpecifies the name of an existing rate class you that you the virtual server to use to enforce a throughput policy for incoming network traffic.

◆ rulesSpecifies a list of iRules™ separated by spaces that customizes the virtual server to direct and manage traffic.

◆ snatIndicates to enable SNAT automap for the virtual server.

◆ snatpoolSpecifies the name of an existing SNAT pool that you want the virtual server to use to implement selective and intelligent SNATs.

◆ translate addressEnables or disables address translation for the virtual server. Turn address translation off for a virtual server if you want to use the virtual server to load balance connections to any address. This option is useful when the system is load balancing devices that have the same IP address.

3 - 352

Page 389: BIG IP Reference

Bigpipe Utility Command Reference

◆ translate serviceEnables or disables port translation. Turn port translation off for a virtual server if you want to use the virtual server to load balance connections to any service.

◆ vlan (enable | disable)Specifies a list of names of external VLANs from which you want the virtual server to accept traffic. Indicates whether or not the VLAN is enabled or disabled. The default value is vlans all enable.

See alsopool(1), profile auth(1), profile persist(1), rule(1), vlan(1), vlangroup(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 353

Page 390: BIG IP Reference

Chapter 3

virtual addressConfigures virtual addresses.

SyntaxUse this command to enable, disable, display, or delete a virtual address.

Modifyvirtual address <virtual address key> {}

virtual address (<virtual address key> | all) [{] <virtual address arg list> [}]

<virtual address key> ::=

<ip addr>

<virtual address arg> ::=

addr <ip addr>

arp (enable | disable)

(enable | disable)

floating (enable | disable)

limit <number>

mask (<ip mask> | none)

route advertisement (enable | disable)

server (none | any | all)

unit <number>

virtual address (<virtual address key> | all) stats reset

Displayvirtual address [<virtual address key> | all] [show [all]]

virtual address [<virtual address key> | all] list [all]

virtual address (<virtual address key> | all) addr [show]

virtual address (<virtual address key> | all) arp [show]

virtual address (<virtual address key> | all) enabled [show]

virtual address (<virtual address key> | all) floating [show]

virtual address (<virtual address key> | all) limit [show]

virtual address (<virtual address key> | all) mask [show]

virtual address (<virtual address key> | all) partition [show]

virtual address (<virtual address key> | all) route advertisement [show]

virtual address (<virtual address key> | all) server [show]

virtual address (<virtual address key> | all) stats [show]

virtual address (<virtual address key> | all) unit [show]

Deletevirtual address (<virtual address key> | all) delete

3 - 354

Page 391: BIG IP Reference

Bigpipe Utility Command Reference

DescriptionProvides the ability to enable, disable, display and delete virtual addresses. You can also list the virtual address configuration.

ExamplesDisables the virtual address 10.10.10.20:

virtual address 10.10.10.20 disable

Deletes the virtual address 10.10.10.20:

virtual address 10.10.10.20 delete

Lists the configuration information for the virtual server 10.10.10.25:

virtual address 10.10.10.25 list

OptionsYou can use these options with the virtual address command:

◆ arpEnables or disables ARP for the specified virtual address. The default value is enable.

◆ (enable | disable)Enables or disables the specified virtual address. The default value is enable.

◆ floatingEnables or disables floating self IP addresses for the specified virtual address. The default value is enable. A floating self IP address is an additional self IP address for a VLAN that serves as a shared address by both units of a BIG-IP redundant system configuration.

◆ limitSets a concurrent connection limit in seconds for one or more virtual servers. The default value is 0 seconds.

◆ mask Sets the netmask or one or more network virtual servers only. This setting is required for network virtual servers.

◆ partitionDisplays the partition within which the virtual address resides.

◆ route advertisementEnables or disables route advertisement for the specified virtual address. The default value is disable.

◆ serverSpecifies the server that uses the specified virtual address. The options are none, any, or all.

◆ unitSpecifies the unit number of a redundant system configuration that uses the specified virtual address. The default value is 0.

Bigpipe Utility Reference Guide 3 - 355

Page 392: BIG IP Reference

Chapter 3

See alsovirtual(1), bigpipe(1)

3 - 356

Page 393: BIG IP Reference

Bigpipe Utility Command Reference

vlanConfigures a virtual local area network (VLAN).

SyntaxUse this command to create, modify, display, or delete a VLAN.

Create/Modifyvlan <vlan key> {}

vlan (<vlan key> | all) [{] <vlan arg list> [}]

<vlan key> ::=

<name>

<vlan arg> ::=

failsafe (enable | disable)

failsafe (reboot | restart | failover | go active | no action | restart all | \ failover restart tm | failover abort tm | go offline | go offline restart | \ go offline abort tm | go offline downlinks | go offline downlinks restart)

fdb (<fdb list> | none) [add | delete]

interfaces (<interface key list> | none) [add | delete]

interfaces tagged (<interface key list> | none) [add | delete]

learning (enable | disable forward | disable drop)

mac masq (<mac addr> | none)

mtu <number>

name <name>

source check (enable | disable)

tag <number>

timeout (<number> | immediate | indefinite)

trunks (<trunk key list> | none) [add | delete]

trunks tagged (<trunk key list> | none) [add | delete]

<fdb> ::= (<fdb key> | all) [{] <fdb arg list> [}]

<fdb key> ::=

<mac addr>

(dynamic | static)

<fdb arg> ::=

(dynamic | static)

interface <interface key>

mac addr <mac addr>

trunk <trunk key>

Bigpipe Utility Reference Guide 3 - 357

Page 394: BIG IP Reference

Chapter 3

Displayvlan [<vlan key> | all] [show [all]]

vlan [<vlan key> | all] list [all]

vlan (<vlan key> | all) failsafe [show]

vlan (<vlan key> | all) fdb [<fdb key> | all] [show [all]]

vlan (<vlan key> | all) fdb [<fdb key> | all] list [all]

vlan (<vlan key> | all) fdb (<fdb key> | all) dynamic [show]

vlan (<vlan key> | all) fdb (<fdb key> | all) interface [show]

vlan (<vlan key> | all) fdb (<fdb key> | all) mac addr [show]

vlan (<vlan key> | all) fdb (<fdb key> | all) trunk [show]

vlan (<vlan key> | all) fdb (<fdb key> | all) vlan [show]

vlan (<vlan key> | all) ifname [show]

vlan (<vlan key> | all) interfaces [<interface key> | all] [show [all]]

vlan (<vlan key> | all) interfaces (<interface key> | all) parent vname [show]

vlan (<vlan key> | all) interfaces (<interface key> | all) pending [show]

vlan (<vlan key> | all) interfaces (<interface key> | all) vmname [show]

vlan (<vlan key> | all) interfaces tagged [<interface key> | all] [show [all]]

vlan (<vlan key> | all) interfaces tagged (<interface key> | all) parent vname [show]

vlan (<vlan key> | all) interfaces tagged (<interface key> | all) pending [show]

vlan (<vlan key> | all) interfaces tagged (<interface key> | all) vmname [show]

vlan (<vlan key> | all) learning [show]

vlan (<vlan key> | all) mac masq [show]

vlan (<vlan key> | all) mac true [show]

vlan (<vlan key> | all) mtu [show]

vlan (<vlan key> | all) name [show]

vlan (<vlan key> | all) source check [show]

vlan (<vlan key> | all) tag [show]

vlan (<vlan key> | all) timeout [show]

vlan (<vlan key> | all) trunks [<trunk key> | all] [show [all]]

vlan (<vlan key> | all) trunks (<trunk key> | all) parent vname [show]

vlan (<vlan key> | all) trunks (<trunk key> | all) pending [show]

vlan (<vlan key> | all) trunks (<trunk key> | all) vmname [show]

vlan (<vlan key> | all) trunks tagged [<trunk key> | all] [show [all]]

vlan (<vlan key> | all) trunks tagged (<trunk key> | all) parent vname [show]

vlan (<vlan key> | all) trunks tagged (<trunk key> | all) pending [show]

vlan (<vlan key> | all) trunks tagged (<trunk key> | all) vmname [show]

Deletevlan (<vlan key> | all) delete

3 - 358

Page 395: BIG IP Reference

Bigpipe Utility Command Reference

DescriptionThis command creates, displays and modifies settings for VLANs. VLANs are part of the configuration of the BIG-IP network components. VLANs can be based on either ports or tags.

When creating a VLAN, a tag value for the VLAN is automatically chosen unless you specify a tag value on the command line. VLANs can have both tagged and untagged interfaces. You can add an interface to a single VLAN as an untagged interface. You can also add an interface to multiple VLANs as a tagged interface.

ExamplesCreate the VLAN myvlan that includes the interfaces 1.2, 1.3, and 1.4:

vlan myvlan interface 1.2 1.3 1.4

Delete the VLAN named myvlan:

vlan myvlan delete>

OptionsYou can use these options with the vlan command:

◆ failsafeEnables a fail-safe mechanism that causes the active unit to fail over to a redundant unit when loss of traffic is detected on a VLAN, and traffic is not restored during the failover timeout period for that VLAN. The default action set with VLAN fail-safe is restart all. When the fail-safe mechanism is triggered, all the daemons are restarted and the unit fails over. The default value is disable.

◆ fdbSpecifies the forwarding database. You can edit the Layer 2 forwarding table to enter static MAC address assignments. The forwarding database has an entry for each node in the VLAN and associates the MAC address of that node with the traffic management system.

◆ interfacesSpecifies a list of interfaces that you want to assign to the VLAN.

◆ interfaces taggedSpecifies a list of tagged interfaces. A tagged interface is an interface that you assign to a VLAN in a way that causes the system to add a VLAN tag into the header of any frame passing through that interface. Use tagged interfaces when you want to assign a single interface to multiple VLANs.

◆ learningSpecifies whether switch ports placed in the VLAN are configured for switch learning, forwarding only, or dropped. Possible values are: enable, disable forward, or disable drop. The default value is enable.

Bigpipe Utility Reference Guide 3 - 359

Page 396: BIG IP Reference

Chapter 3

◆ mac masqConfigures a shared MAC masquerade address. You can share the media access control (MAC) masquerade address between units in a redundant system configuration. This has the following advantages:

• Increased reliability and failover speed, especially in lossy networks

• Interoperability with switches that are slow to respond to the network changes

• Interoperability with switches that are configured to ignore network changes

◆ mtuSets a specific maximum transition unit (MTU) for the VLAN. The default value is 1500.

◆ source checkSpecifies that only connections that have a return route in the routing table are accepted. The default value is disable.

◆ tagSpecifies a number that the system adds into the header of any frame passing through the VLAN.

◆ timeoutSpecifies the number of seconds that an active unit can run without detecting network traffic on this VLAN before it initiates a failover. The default value is 90 seconds.

◆ trunksSpecifies a list of trunks. A trunk is a combination of two or more interfaces and cables configured as one link.

◆ trunks taggedSpecifies a list of tagged trunks. A tagged trunk is a trunk that you assign to a VLAN in a way that causes the system to add a VLAN tag into the header of any frame passing through the trunk. Use tagged trunks when you want to assign a single trunk to multiple VLANs.

See alsointerface(1), self(1), vlangroup(1), virtual(1), bigpipe(1)

3 - 360

Page 397: BIG IP Reference

Bigpipe Utility Command Reference

vlangroupConfigures a VLAN group.

SyntaxUse this command to create, modify, display, or delete a VLAN group.

Create/Modifyvlangroup <vlangroup key> {}

vlangroup (<vlangroup key> | all) [{] <vlangroup arg list> [}]

<vlangroup key> ::=

<name>

<vlangroup arg> ::=

bridge all (enable | disable)

bridge in standby (enable | disable)

bridge multicast (enable | disable)

mac masq (<mac addr> | none)

members (<vlan key list> | none) [add | delete]

name <name>

proxy excludes (<ip addr list> | none) [add | delete]

transparency (transparent | translucent | opaque)

Displayvlangroup [<vlangroup key> | all] [show [all]]

vlangroup [<vlangroup key> | all] list [all]

vlangroup (<vlangroup key> | all) bridge all [show]

vlangroup (<vlangroup key> | all) bridge in standby [show]

vlangroup (<vlangroup key> | all) bridge multicast [show]

vlangroup (<vlangroup key> | all) ifname [show]

vlangroup (<vlangroup key> | all) mac masq [show]

vlangroup (<vlangroup key> | all) mac true [show]

vlangroup (<vlangroup key> | all) members [show]

vlangroup (<vlangroup key> | all) name [show]

vlangroup (<vlangroup key> | all) proxy excludes [show]

vlangroup (<vlangroup key> | all) transparency [show]

Deletevlangroup (<vlangroup key> | all) delete

Bigpipe Utility Reference Guide 3 - 361

Page 398: BIG IP Reference

Chapter 3

DescriptionThe vlangroup command defines a VLAN group, which is a grouping of two or more VLANs belonging to the same IP network for the purpose of allowing Layer 2 packet forwarding between those VLANs.

The VLANs between which the packets are to be passed must be on the same IP network, and they must be grouped using the vlangroup command. For example:

vlangroup network11 { vlans add internal external }

Sets the global VLAN group proxy exclusion list:

vlangroup all [{] proxy excludes <ip addr list> [add | delete ] [}]

ExamplesCreates a VLAN group named myvlangroup that consists of VLANs named vlan1 and vlan2:

vlangroup myvlangroup member vlan1 vlan2

Shows the statistics for all elements of the specified VLAN group:

vlangroup myvlangroup show

Deletes the specified VLAN group named myvlangroup:

vlangroup myvlangroup delete

OptionsYou can use these options with the vlangroup command:

◆ bridge allWhen enabled, specifies that the VLAN group forwards all frames, including non-IP traffic. The default value is disable.

◆ bridge in standbyWhen enabled, specifies that the VLAN group forwards packets, even when the system is the standby unit in a redundant system configuration. Note that this setting is designed for deployments in which the VLAN group exists on only one of the units. If that does not match your configuration, using this setting may cause adverse effects. The default value is enable.

◆ mac masqSpecifies a MAC address to be used with a redundant system configuration. This is a 6-byte Ethernet address in not case-sensitive hexadecimal colon notation, for example: 00:0b:09:88:00:9a.

◆ membersThe names of the VLANs you want to add to the VLAN group.

3 - 362

Page 399: BIG IP Reference

Bigpipe Utility Command Reference

◆ proxy excludesSpecifies the IP addresses that you want to include in the proxy ARP exclusion list. If you use VLAN groups, you must configure a proxy ARP forwarding exclusion list. F5 recommends that you configure this feature if you use VLAN groups with a redundant system configuration. The reason is that both units need to communicate directly with their gateways and the back-end nodes. Creating a proxy ARP exclusion list prevents traffic from being proxied through the active unit due to proxy ARP. This traffic needs to be sent directly to the destination, not proxied.

◆ tagSpecifies a number to be the tag for the VLAN. A VLAN tag is an identification number the system inserts into the header of a frame that indicates the VLAN to which the destination device belongs. Use VLAN tags when a single interface forwards traffic for multiple VLANs.

◆ transparencySpecifies the level of exposure of remote MAC addresses within VLAN groups. Possible values are: opaque, translucent, or transparent. The default value is translucent.

• Use opaque when you have a Cisco® router in the network sending CDP packets to the system. Because opaque VLAN groups require a source and destination MAC address and CDP packets do not contain a source and destination MAC address, the CDP packets are not forwarded through the VLAN group. This mode changes the MAC address to the MAC address assigned to the VLAN group. A proxy ARP with Layer 3 forwarding.

• Use transparent when you want to leave the MAC address unchanged by the traffic management system. Layer 2 forwarding with the original MAC address of the remote system preserved across VLANs.

• Use translucent when you want to use the real MAC address of the requested host with the locally unique bit toggled. Layer 2 forwarding with locally-unique bit, toggled in ARP response across VLANs.

See alsointerface(1), self(1), vlan(1), virtual(1), bigpipe(1)

Bigpipe Utility Reference Guide 3 - 363

Page 400: BIG IP Reference

Chapter 3

3 - 364

Page 401: BIG IP Reference

4

VIPRION System Command Reference

• Introduction to VIPRION system commands

• Alphabetical list of commands

Page 402: BIG IP Reference
Page 403: BIG IP Reference

VIPRION System Command Reference

Introduction to VIPRION system commandsIf you are running a VIPRION® system, you can license the system for the first time, configure, and then maintain the system using the browser-based Configuration utility or a command line interface utility. This chapter contains syntax for commands that are used only when configuring VIPRION systems. You can also use the bigpipe commands listed in Chapter 3, Bigpipe Utility Command Reference, to configure VIPRION systems.

For more information about configuring VIPRION systems, see the Configuration Guide for the VIPRION® System.

Alphabetical list of commandsThe remainder of this chapter lists bigpipe commands used to configure VIPRION systems.

Bigpipe Utility Reference Guide 4 - 1

Page 404: BIG IP Reference

Chapter 4

clusterConfigures a cluster.

SyntaxUse this command to configure clusters.

Create/Modifycluster (<cluster key> | all) [{] <cluster arg list> [}]

<cluster key> ::=

<name>

<cluster arg> ::=

addr (<network ip> | none)

(enable | disable)

members <cluster mbr list>

min up members <number>

min up members (enable | disable)

name <name>

<cluster mbr> ::= (<cluster mbr key> | all) [{] <cluster mbr arg list> [}]

<cluster mbr key> ::=

(<chassis slot key> | none)

<cluster mbr arg> ::=

addr (<network ip> | none)

(enable | disable)

priming (enable | disable)

slot id (<chassis slot key> | none)

Displaycluster [<cluster key> | all] [show [all]]

cluster [<cluster key> | all] list [all]

cluster (<cluster key> | all) addr [show]

cluster (<cluster key> | all) current primary slot id [show]

cluster (<cluster key> | all) enabled [show]

cluster (<cluster key> | all) ha state [show]

cluster (<cluster key> | all) members [<cluster mbr key> | all] [show [all]]

cluster (<cluster key> | all) members [<cluster mbr key> | all] list [all]

cluster (<cluster key> | all) members (<cluster mbr key> | all) addr [show]

cluster (<cluster key> | all) members (<cluster mbr key> | all) cluster [show]

cluster (<cluster key> | all) members (<cluster mbr key> | all) enabled [show]

cluster (<cluster key> | all) members (<cluster mbr key> | all) ha state [show]

cluster (<cluster key> | all) members (<cluster mbr key> | all) licensed [show]

cluster (<cluster key> | all) members (<cluster mbr key> | all) priming [show]

cluster (<cluster key> | all) members (<cluster mbr key> | all) slot id [show]

4 - 2

Page 405: BIG IP Reference

VIPRION System Command Reference

cluster (<cluster key> | all) members (<cluster mbr key> | all) state [show]

cluster (<cluster key> | all) min up members [show]

cluster (<cluster key> | all) name [show]

Deletecluster (<cluster key> | all) members (<cluster mbr list> | none) delete

DescriptionYou use the cluster command to modify the configuration of the primary blade in a cluster. When you do this, the system automatically propagates the changes to the other blades in the cluster. This is known as cluster synchronization.

ExamplesSets the floating management IP address for cluster default to an IP address of 192.168.217.44:

cluster default addr 192.168.217.44/24

Displays the floating management IP address of cluster my_cluster:

cluster my_cluster addr

Deletes the floating management IP address of cluster default:

cluster default addr none

Deletes the cluster member IP address of cluster member 1:

cluster default member 1 addr none

Sets the static IP address for slot 1 of cluster default to an IP address of 192.168.217.43:

cluster default member 1 addr 192.168.217.43

OptionsYou can use these options with the cluster command:

◆ addrSpecifies an IP address for the cluster or cluster member.

◆ current primary slot IDDisplays the slot number into which the primary blade in the cluster is inserted.

◆ (enable | disable)Enables or disables the specified cluster or cluster member.

◆ ha stateDisplays the high availability state of the cluster. The options are:

• ActiveIndicates that a cluster is online and actively passing traffic.

Bigpipe Utility Reference Guide 4 - 3

Page 406: BIG IP Reference

Chapter 4

• Forced OfflineIndicates that a cluster is offline and cannot become Active due to an Administrator action.

• OfflineIndicates that a cluster is offline and cannot become Active.

• StandbyIndicates that a cluster is online and available to become Active. A cluster with a status of Standby changes to an Active status when the other cluster in a redundant system configuration fails over.

◆ licensedIndicates whether the cluster member is licensed.

◆ listDisplays the current configuration of the cluster.

◆ membersAdds a member to or deletes a member from a cluster. A cluster member is a slot into which you insert a blade. The cluster member is identified by the number of the slot.

◆ min up membersSpecifies the minimum number of cluster members that must be up for the cluster to remain Active. The default value is 0 (zero).

◆ min up members (enable/disable)When enabled, specifies that when the number of active cluster members is below the value of the min up members option, the cluster fails over to its peer. Enable this parameter when you configure a redundant system configuration. The default value is disable.

◆ primingWhen enabled, if the cluster’s primary slot becomes unavailable, the specified cluster member can become the primary slot. The default value is enable.

◆ showDisplays the current state of the cluster and each cluster member.

◆ stateDisplays the following information about a cluster member.

• buildDisplays the build number of the software that is currently installed on the blade in the specified slot.

• hotfix versionDisplays the version of the software hotfix that is currently installed on the blade in the specified slot.

• productDisplays the type of system.

• slot idDisplays the slot number into which the blade is inserted.

4 - 4

Page 407: BIG IP Reference

VIPRION System Command Reference

• versionDisplays the version of the software, including the license information, that is currently installed on the blade in the specified slot.

See alsobigpipe(1)

Bigpipe Utility Reference Guide 4 - 5

Page 408: BIG IP Reference

Chapter 4

daemonConfigures the high availability functionality that is built into daemons.

SyntaxUse this command to modify or display daemons.

Modifydaemon <daemon key> {}

daemon (<daemon key> | all) [{] <daemon arg list> [}]

<daemon key> ::=

<name>

<daemon arg> ::=

heartbeat monitor (enable | disable)

heartbeat monitor (reboot | restart | failover | go active | no action | \ restart all | failover restart tm | failover abort tm | go offline | \ go offline restart | go offline abort tm | go offline downlinks | \ go offline downlinks restart)

heartbeat monitor redundant (reboot | restart | failover | go active | \ no action | restart all | failover restart tm | failover abort tm | \ go offline | go offline restart | go offline abort tm | go offline downlinks | \ go offline downlinks restart)

heartbeat monitor stand alone (reboot | restart | failover | go active | \ no action | restart all | failover restart tm | failover abort tm | \ go offline | go offline restart | go offline abort tm | go offline downlinks | \ go offline downlinks restart)

name <name>

proc not run action (reboot | restart | failover | go active | no action | \ restart all | failover restart tm | failover abort tm | go offline | \ go offline restart | go offline abort tm | go offline downlinks | \ go offline downlinks restart)

running (enable | disable)

running timeout <number>

Displaydaemon [<daemon key> | all] [show [all]]

daemon [<daemon key> | all] list [all]

daemon (<daemon key> | all) heartbeat monitor [show]

daemon (<daemon key> | all) heartbeat monitor redundant [show]

daemon (<daemon key> | all) heartbeat monitor stand alone [show]

daemon (<daemon key> | all) name [show]

daemon (<daemon key> | all) proc not run action [show]

daemon (<daemon key> | all) running [show]

daemon (<daemon key> | all) running timeout [show]

4 - 6

Page 409: BIG IP Reference

VIPRION System Command Reference

Deletedaemon (<daemon key> | all) delete

DescriptionThe daemon command provides the ability to precisely configure the daemons that provide high availability functionality.

ExamplesEnables the system to fail over and reboot due to lack of a detected heartbeat from the sod daemon:

daemon sod heartbeat monitor enable

OptionsYou can use these options with the daemon command:

◆ heartbeat monitorEnables or disables the heartbeat on the specified daemon, or performs an action. Typically, if a daemon does not periodically connect with its heartbeat location, it is restarted automatically. This command enables you to disable automatic restart. The daemons that supply a heartbeat are: bcm56xxd, clusterd, com_srv, gtmd, mcpd, pvac, sod, and tmm. The default value is enable.

Specifies the action the daemon should take if no heartbeat is detected. You can specify the following actions with the specified daemon:

• bcm56xxdThe default and only action available for use with daemon bcm56xxd is restart.

• clusterdThe default and only action available for use with daemon clusterd is go offline and down links and restart.

• com_srvThe default and only action available for use with daemon com_srv is restart.

• gtmdThe actions that are available for use with the daemon gtmd when the system is licensed for the Global Traffic Manager are restart, restart all, reboot, go offline, go offline and restart. The default value is go offline and restart.

• mcpdThe actions that are available for use with the daemon mcpd are restart, restart all, reboot, go offline, go offline and restart. The default value is restart all.

• pvacThe default and only action available for use with daemon pvac is restart.

Bigpipe Utility Reference Guide 4 - 7

Page 410: BIG IP Reference

Chapter 4

• sodThe default and only action available for use with daemon sod is restart all.

• tmmThe default and only action available for use with the TMM daemon is go offline and down links.

◆ heartbeat monitor redundantSpecifies the action the daemon should take if no heartbeat is detected on the redundant heartbeat monitor. See the heartbeat monitor option for a list of actions that are available for each daemon.

◆ heartbeat monitor stand aloneSpecifies the action the daemon should take if no heartbeat is detected on a standalone heartbeat monitor. See the heartbeat monitor option for a list of actions that are available for each daemon.

◆ proc not run actionSpecifies the action the daemon should take if a configured traffic or system management action is not run. See the heartbeat monitor option for a list of actions that are available for each daemon.

◆ runningEnables or disables actions configured for the traffic management and system management daemons. You can use this feature to disable the action a daemon takes during failover. For example, when you want to stop a daemon and you do not want the cluster to failover, you can issue the running disable command for the daemon. The default value is disable.

◆ running timeoutSpecifies the length of time you want disabled actions to remain disabled. The default value is 10 seconds.

See alsoha table(1), bigpipe(1)

4 - 8

Page 411: BIG IP Reference

VIPRION System Command Reference

failoverConfigures and controls failover for a redundant system configuration.

SyntaxUse this command to control the failover of a system and configure the failover feature for the system.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

Use this syntax to configure the failover feature for a system:

failover [{] <failover arg list> [}]

<failover arg> ::=

(failback | offline | online | slave | standby)

failover [show [all]]

failover list [all]

failover cable [show]

failover [{] <failover arg list> [}]

<failover arg> ::=

active-active mode (enable | disable)

force active (enable | disable)

force standby (enable | disable)

multicast peer (<multicast peer list> | none) [add | delete]

network failover (enable | disable)

peer mgmt addr (<ip addr> | none)

redundant (enable | disable)

standby link down time <float>

unicast peer (<unicast peer list> | none) [add | delete]

unit <number>

<multicast peer> ::= (<multicast peer key> | all) [{] <multicast peer arg list> [}]

<multicast peer key> ::=

<name>

<multicast peer arg> ::=

addr (<ip addr> | none)

Bigpipe Utility Reference Guide 4 - 9

Page 412: BIG IP Reference

Chapter 4

interface (<string> | none)

name <name>

port <number>

<unicast peer> ::= (<unicast peer key> | all) [{] <unicast peer arg list> [}]

<unicast peer key> ::=

<name>

<unicast peer arg> ::=

dest addr (<ip addr> | none)

name <name>

port <number>

source addr (<ip addr> | none)

Use this syntax to control failover of a system:

failover (standby | offline | online | failback)

Displayfailover [show [all]]

failover list [all]

failover active-active mode [show]

failover force active [show]

failover force standby [show]

failover multicast peer [<multicast peer key> | all] [show [all]]

failover multicast peer [<multicast peer key> | all] list [all]

failover multicast peer (<multicast peer key> | all) addr [show]

failover multicast peer (<multicast peer key> | all) interface [show]

failover multicast peer (<multicast peer key> | all) name [show]

failover multicast peer (<multicast peer key> | all) port [show]

failover network failover [show]

failover peer mgmt addr [show]

failover redundant [show]

failover standby link down time [show]

failover unicast peer [<unicast peer key> | all] [show [all]]

failover unicast peer [<unicast peer key> | all] list [all]

failover unicast peer (<unicast peer key> | all) dest addr [show]

failover unicast peer (<unicast peer key> | all) name [show]

failover unicast peer (<unicast peer key> | all) port [show]

failover unicast peer (<unicast peer key> | all) source addr [show]

failover unit [show]

4 - 10

Page 413: BIG IP Reference

VIPRION System Command Reference

Deletemulticast cluster peer (<multicast cluster peer list> | none) delete

unicast cluster peer (<unicast cluster peer list> | none) delete

DescriptionFailover is a process that occurs when one unit in a redundant system configuration becomes unavailable, thereby requiring a peer unit to assume the processing of traffic originally targeted for the unavailable unit. To facilitate coordination of the failover process, each unit has a Unit ID.

ExamplesCauses the active unit to go into the standby state, forcing the other unit in the redundant system configuration to become active:

failover standby

Restores an active-active configuration after a failure:

failover failback

OptionsUse these options to control failover for the system:

◆ failbackInitiates failback for an active-active system. Failback re-establishes normal system processing when a previously-unavailable unit becomes available again. F5 recommends that you do not use active-active mode.

◆ offlineChanges the status of a unit to Forced Offline.

◆ onlineChanges the status of a unit from Forced Offline to either Active or Standby, depending upon the status of the other unit in a redundant system configuration.

◆ standbyCauses the active unit to fail over to a Standby status, causing the standby unit to become Active.

Use these options to configure failover for the system:

◆ active-active modeEnables or disables active mode for a unit in a redundant system configuration. The default value is disable. F5 recommends that you do not use active-active mode.

◆ custom addrSpecifies the self-IP address or management IP address on the unit that the network failover mechanism uses to listen for peer responses. When using network failover, this is a required setting.

Bigpipe Utility Reference Guide 4 - 11

Page 414: BIG IP Reference

Chapter 4

◆ custom peer addrSpecifies the self-IP address or management IP address on the peer system that the network failover mechanism uses to determine whether the peer is responsive. When using network failover, this is a required setting.

◆ failover cluster peer idSpecifies the floating management IP address of the peer unit.

◆ failover multicast cluster peerAdds a multicast unit peer or deletes a multicast unit peer from the specified unit for failover purposes. When you add a multicast unit peer you include the following options:

• addrSpecifies the multicast IP address associated with the management interface on the peer unit.

• interfaceSpecifies the management interface of the unit you are configuring. The options are mgmt or eth0. The default value is eth0.

• nameSpecifies the name of peer unit in this redundant system configuration.

• portSpecifies the number of the service that you want to process the multicast failover communication traffic between the units.

◆ failover unicast cluster peerAdds a unicast unit peer or deletes a unicast unit peer from the specified unit for failover purposes. When you add a unicast unit peer, you include the following options:

• dest addrSpecifies a static self IP address associated with VLAN HA1 on the peer unit. This is the IP address on the peer that receives a failover message from the unit you are configuring.

• nameSpecifies the name of peer unit in this redundant system configuration.

• portSpecifies the number of the service that you want to process the unicast failover communication traffic between the units.

• source addrSpecifies a static self IP address associated with VLAN HA1 on the unit you are configuring. Failover messages from the unit to its peer originate from this address.

◆ force activeWhen enabled, makes the unit prefer to be the active unit. The default value is disable.

4 - 12

Page 415: BIG IP Reference

VIPRION System Command Reference

◆ force standbyWhen enabled, makes the unit prefer to be the standby unit. The default value is disable.

◆ network failoverSpecifies, when enabled, that this unit uses the network to determine the status of the peer unit. The default value is disable.

◆ partitionDisplays the partition within which the failover object resides.

◆ redundantEnables or disables redundancy for a unit in a redundant system configuration. The default value is disable.

◆ standby link down timeSpecifies the amount of time, within the valid range of 0 - 10 seconds, that the interfaces are down before the unit fails over to standby. Use this setting to prompt peer switches to reset and relearn their Address Resolution Protocol (ARP) tables after a failover. The default value is 0 (zero) seconds, which disables this option.

When using network failover, do not enable this feature unless you configure the custom addr and custom peer addr settings to use the management port.

◆ unitSpecifies a number for a unit in a redundant system configuration. The default value is 1.

See alsobigpipe(1), statemirror(1)

Bigpipe Utility Reference Guide 4 - 13

Page 416: BIG IP Reference

Chapter 4

poolConfigures load balancing pools on the traffic management system.

SyntaxUse this command to create, modify, display, or delete a load balancing pool.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

pool <pool key> {}

pool (<pool key> | all) [{] <pool arg list> [}]

<pool key> ::=

<name>

<pool arg> ::=

action on svcdown (none | reset | drop | reselect)

ip tos to client (<number> | mimic | pass)

ip tos to server (<number> | mimic | pass)

lb method (round robin | rr | member ratio | member least conn | member observed | \ member predictive | ratio | node ratio | least conn | fastest | observed | \ predictive | dynamic ratio | fastest app resp | least sessions | \ member dynamic ratio | l3 addr)

link qos to client (<number> | mimic | pass)

link qos to server (<number> | mimic | pass)

members (<pool member list> | none) [add | delete]

min active members <number>

min up members <number>

min up members (enable | disable)

min up members (reboot | restart | failover | go active | no action | \ restart all | failover restart tm | failover abort tm | go offline | \ go offline restart | go offline abort tm | go offline downlinks | \ go offline downlinks restart)

monitor all (none | <monitor key> |

<monitor key> and <monitor key> [and <monitor key> ...] |

min <number> of <monitor key list>

name <name>

nat (enable | disable)

4 - 14

Page 417: BIG IP Reference

VIPRION System Command Reference

reselect tries <number>

slow ramp time <number>

snat (enable | disable)

unit <number>

<pool member> ::= (<pool member key> | all) [{] <pool member arg list> [}]

<pool member key> ::=

<member>

<pool member arg> ::=

addr <member>

dynamic ratio <number>

limit <number>

monitor (default | <monitor key> |

<monitor key> and <monitor key> [and <monitor key> ...] |

min <number> of <monitor key list>)

(up | down)

priority <number>

ratio <number>

session (enable | disable)

weight <number>

pool (<pool key> | all) stats reset

Displaypool [<pool key> | all] [show [all]]

pool [<pool key> | all] list [all]

pool (<pool key> | all) action on svcdown [show]

pool (<pool key> | all) ip tos to client [show]

pool (<pool key> | all) ip tos to server [show]

pool (<pool key> | all) lb method [show]

pool (<pool key> | all) link qos to client [show]

pool (<pool key> | all) link qos to server [show]

pool (<pool key> | all) members (<pool member key> | all) stats reset

pool (<pool key> | all) members [<pool member key> | all] [show [all]]

pool (<pool key> | all) members [<pool member key> | all] list [all]

pool (<pool key> | all) members (<pool member key> | all) addr [show]

pool (<pool key> | all) members (<pool member key> | all) dynamic ratio [show]

pool (<pool key> | all) members (<pool member key> | all) limit [show]

pool (<pool key> | all) members (<pool member key> | all) monitor [show]

pool (<pool key> | all) members (<pool member key> | all) monitor state [show]

pool (<pool key> | all) members (<pool member key> | all) pool name [show]

pool (<pool key> | all) members (<pool member key> | all) priority [show]

pool (<pool key> | all) members (<pool member key> | all) ratio [show]

pool (<pool key> | all) members (<pool member key> | all) session [show]

pool (<pool key> | all) members (<pool member key> | all) stats [show]

pool (<pool key> | all) members (<pool member key> | all) weight [show]

Bigpipe Utility Reference Guide 4 - 15

Page 418: BIG IP Reference

Chapter 4

pool (<pool key> | all) min active members [show]

pool (<pool key> | all) min up members [show]

pool (<pool key> | all) monitor all [show]

pool (<pool key> | all) name [show]

pool (<pool key> | all) nat [show]

pool (<pool key> | all) partition [show]

pool (<pool key> | all) reselect tries [show]

pool (<pool key> | all) slow ramp time [show]

pool (<pool key> | all) snat [show]

pool (<pool key> | all) stats [show]

pool (<pool key> | all) unit [show]

Deletepool (<pool key> | all) delete

DescriptionThe pool command creates, deletes, modifies, and displays the pool definitions on the traffic management system. Pools group the member servers together to use a common load balancing algorithm.

ExamplesCreates a pool with two members 10.2.3.11, and 10.2.3.12, where both members use the Round Robin load balancing method, and the default HTTP monitor checks for member availability:

pool mypool {

monitor all http

member 10.2.3.11:http

member 10.2.3.12:http

}

Deletes the pool mypool: (Note that all references to a pool must be removed before a pool may be deleted.)

pool mypool delete

Displays statistics for all pools:

pool show

Displays settings of pool mypool:

pool mypool show

4 - 16

Page 419: BIG IP Reference

VIPRION System Command Reference

OptionsYou can use these options with the pool command:

◆ action on svcdownSpecifies the action to take if the service specified in the pool is marked down. Possible values are none, reset, drop, or reselect. You can specify no action with none, you can reset the system with reset, you can drop connections using drop, or you can reselect a node for the next packet that comes in on a Layer 4 connection if the existing connection’s service is marked down by specifying reselect. The default value is none.

◆ <ip:service>Specifies an IP address and service being assigned to a pool as a member. For example: 10.2.3.12:http.

◆ ip tos to client and ip tos to serverSpecifies the Type of Service (ToS) level to use when sending packets to a client or server. The default value is 65535.

◆ lb methodSpecifies the load balancing mode that the system is to use for the specified pool.

• dynamic ratioSpecifies a range of numbers that you want the system to use in conjunction with the ratio load balancing method. The default ratio number is 1.

• fastestIndicates that the system passes a new connection based on the fastest response of all currently active nodes in a pool. This method may be particularly useful in environments where nodes are distributed across different logical networks.

• fastest app respIndicates that the system passes a new connection based on the fastest application response of all currently active nodes in a pool.

• l3 addrIndicates that the system passes connections sequentially to each member configured using its IP address. The IP address is a Layer 3 address.

• least connIndicates that the system passes a new connection to the node that has the least number of current connections.

• least sessionsIndicates that the system passes a new connection to the node that has the least number of current sessions. Least Sessions methods work best in environments where the servers or other equipment you are load balancing have similar capabilities. This is a dynamic load balancing method, distributing connections based on various aspects of real-time server performance analysis, such as the current number of sessions.

Bigpipe Utility Reference Guide 4 - 17

Page 420: BIG IP Reference

Chapter 4

• member dynamic ratioIndicates that the system passes a new connection to the member based on continuous monitoring of the servers, which are continually changing. This is a dynamic load balancing method, distributing connections based on various aspects of real-time server performance analysis, such as the current number of connections per node or the fastest node response time.

• member least connIndicates that the system passes a new connection to the member that has the least number of current connections.

• member observedIndicates that the system passes connections sequentially to each member based on observed status of the member.

• member predictiveIndicates that the system passes connections sequentially to each member based on a predictive algorithm.

• member ratioSpecifies a ratio number that you want the system to use in conjunction with the ratio load balancing method. The default ratio number is 1.

• node ratioSpecifies a ratio number that you want the system to use in conjunction with the ratio load balancing method. The default ratio number is 1.

• observedIndicates that the system passes connections sequentially to each node based on observed status of the member.

• predictiveIndicates that the system passes connections sequentially to each node based on a predictive algorithm.

• rrIndicates that the system passes connections sequentially to each member. Round Robin is the default load balancing method.

◆ link qos to client and link qos to serverSpecifies the Quality of Service (QoS) level to use when sending packets to a client or server. The default value is 0.

◆ min active membersSpecifies the minimum number of members that must remain available for traffic to be confined to a priority group when using priority-based activation. The default value is 0.

◆ min up members Enables or disables this feature. The default value is disable.

You can also specify the minimum number of members that must remain up for traffic to be confined to a priority group when using priority-based activation. If the number specified is exceeded, the action specified happens. The default value is 0.

4 - 18

Page 421: BIG IP Reference

VIPRION System Command Reference

You can also specify that the system should fail over if the min up members number is exceeded.

◆ monitor allCreates a monitor rule for the pool. You can specify a monitor rule that marks the pool down if the specified number of monitors are not successful.

◆ natEnables or disables NAT connections for the pool.

◆ partitionDisplays the partition within which the pool resides.

◆ <pool key>Specifies a list of pool names separated by a space. A pool name is an identifying string from 1 to 31 characters, for example: new_pools.

◆ prioritySpecifies a priority that you want to assign to a pool member, to ensure that traffic is directed to that member before being directed to a member of a lower priority.

◆ slow ramp time Provides the ability to cause a pool member that has just been enabled, or marked up, to receive proportionally less traffic than other members in the pool. The proportion of traffic the member accepts is determined by how long the member has been up in comparison to the slow ramp time set for the pool. For example, if a pool using Round Robin has a slow ramp time of 60 seconds, and the pool member has been up for only 30 seconds, it receives approximately half the amount of new traffic as other pool members that have been up for more than 60 seconds. At 45 seconds, it receives approximately three quarters of the new traffic. Slow ramp time is particularly useful for least connections load balancing mode. The default value is 0.

◆ snatEnables or disables SNAT connections for the pool.

◆ unitSpecifies the Unit ID used by this pool in an active-active redundant system configuration.

See alsomonitor(1), node(1), virtual(1), bigpipe(1)

Bigpipe Utility Reference Guide 4 - 19

Page 422: BIG IP Reference

Chapter 4

profile udpConfigures a UDP profile.

SyntaxUse this command to create, modify, display, or delete a UDP profile.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile udp <profile udp key> {}

profile udp (<profile udp key> | all) [{] <profile udp arg list> [}]

<profile udp key> ::=

<name>

<profile udp arg> ::=

allow no payload (enable | disable)

datagram lb (enable | disable)

defaults from (<profile udp key> | none)

idle timeout (<number> | immediate | indefinite)

ip tos (<number> | mimic | pass)

link qos (<number> | mimic | pass)

name <name>

no cksum (enable | disable)

profile udp (<profile udp key> | all) stats reset

Displayprofile udp [<profile udp key> | all] [show [all]]

profile udp [<profile udp key> | all] list [all]

profile udp (<profile udp key> | all) allow no payload [show]

profile udp (<profile udp key> | all) datagram lb [show]

profile udp (<profile udp key> | all) defaults from [show]

profile udp (<profile udp key> | all) idle timeout [show]

profile udp (<profile udp key> | all) ip tos [show]

profile udp (<profile udp key> | all) link qos [show]

profile udp (<profile udp key> | all) name [show]

profile udp (<profile udp key> | all) no cksum [show]

4 - 20

Page 423: BIG IP Reference

VIPRION System Command Reference

profile udp (<profile udp key> | all) partition [show]

profile udp (<profile udp key> | all) stats [show]

Deleteprofile udp (<profile udp key> | all) delete

DescriptionThe UDP profile is a configuration tool for managing UDP network traffic.

ExamplesCreates a custom UDP profile named myudpprofile that inherits its settings from the system default udp profile:

profile udp myudpprofile { }

OptionsYou can use these options with the profile udp command:

◆ allow payloadProvides the ability to allow the passage of datagrams that contain header information, but no essential data. The default value is disable.

◆ datagram lbProvides the ability to load balance UDP datagram by datagram. The default value is disable.

◆ defaults fromSpecifies the profile that you want to use as the parent profile. Your new profile inherits all settings and values from the parent profile.

◆ idle timeoutSpecifies the number of seconds that a connection is idle before the connection is eligible for deletion. You can also specify immediate, indefinite, or default. The default value is 60 seconds.

◆ ip tosSpecifies the Type of Service level that the traffic management system assigns to UDP packets when sending them to clients.

◆ link qosSpecifies the Quality of Service level that the system assigns to UDP packets when sending them to clients.

◆ no cksumWhen enabled, the system does not perform the check summing process on the packets that the virtual server to which this profile is assigned processes. The default value is disable.

◆ partitionDisplays the partition within which the profile resides.

Bigpipe Utility Reference Guide 4 - 21

Page 424: BIG IP Reference

Chapter 4

See alsoprofile(1), virtual(1), bigpipe(1)

4 - 22

Page 425: BIG IP Reference

VIPRION System Command Reference

softwareDownloads and installs software onto a VIPRION system.

SyntaxUse this command to download software, and then install it onto a VIPRION system.

Create/Modifysoftware [{] <software arg list> [}]

<software arg> ::=

desired (<software desired list> | none) [add | delete]

hotfixes (<software hotfix key list> | none) [add | delete]

images (<software image key list> | none) [add | delete]

status <software status key list>

volumes <software volume key list>

<software desired> ::= (<software desired key> | all) \ [{] <software desired arg list> [}]

<software desired key> ::=

<name>

<software desired arg> ::=

active (enable | disable)

build (<string> | none)

product (<string> | none)

retry (enable | disable)

retry count <number>

version (<string> | none)

volume <name>

<software hotfix key> ::=

(<string> | none)

<software image key> ::=

(<string> | none)

<software status key> ::=

<name>

<software volume key> ::=

<name>

Displaysoftware [show [all]]

software list [all]

software desired [<software desired key> | all] [show [all]]

software desired [<software desired key> | all] list [all]

software desired (<software desired key> | all) active [show]

Bigpipe Utility Reference Guide 4 - 23

Page 426: BIG IP Reference

Chapter 4

software desired (<software desired key> | all) build [show]

software desired (<software desired key> | all) product [show]

software desired (<software desired key> | all) retry [show]

software desired (<software desired key> | all) retry count [show]

software desired (<software desired key> | all) version [show]

software desired (<software desired key> | all) volume [show]

software hotfixes [<software hotfix key> | all] [show [all]]

software hotfixes (<software hotfix key> | all) build [show]

software hotfixes (<software hotfix key> | all) chksum [show]

software hotfixes (<software hotfix key> | all) filename [show]

software hotfixes (<software hotfix key> | all) hotfix id [show]

software hotfixes (<software hotfix key> | all) hotfix title [show]

software hotfixes (<software hotfix key> | all) product [show]

software hotfixes (<software hotfix key> | all) verified [show]

software hotfixes (<software hotfix key> | all) version [show]

software images [<software image key> | all] [show [all]]

software images (<software image key> | all) build [show]

software images (<software image key> | all) build date [show]

software images (<software image key> | all) chksum [show]

software images (<software image key> | all) file size [show]

software images (<software image key> | all) filename [show]

software images (<software image key> | all) last modified [show]

software images (<software image key> | all) product [show]

software images (<software image key> | all) verified [show]

software images (<software image key> | all) version [show]

software status [<software status key> | all] [show [all]]

software status (<software status key> | all) active [show]

software status (<software status key> | all) basebuild [show]

software status (<software status key> | all) build [show]

software status (<software status key> | all) edition [show]

software status (<software status key> | all) product [show]

software status (<software status key> | all) status [show]

software status (<software status key> | all) version [show]

software status (<software status key> | all) volume [show]

software volumes [<software volume key> | all] [show [all]]

software volumes (<software volume key> | all) active [show]

software volumes (<software volume key> | all) media [show]

software volumes (<software volume key> | all) name [show]

software volumes (<software volume key> | all) size [show]

4 - 24

Page 427: BIG IP Reference

VIPRION System Command Reference

Deletesoftware delete

software desired(<software desired list> delete

software hotfixes <software hotfix key list> delete

software images <software image key list> delete

software status <software status key list> delete

software volumes <software volume key list> delete

DescriptionYou can use the software command to:

• Download and install software images and hotfixes onto the system

• Delete software that you have downloaded

ExamplesYou can install the software using the following steps as an example:

1. To copy the software image file.im to the software staging area /root, use this syntax:

software image /root/file.im add

The system copies the software image file file.im to the software staging area.

2. When you are currently running on volume HD1.1, to install build 565.0 of BIG-IP version 9.6.0 on volume HD1.2 of the cluster, use this syntax:

software desired HD1.2 product BIG-IP build 565.0 version 9.6.0 add

The system returns to a UNIX prompt, and installs the specified software.

3. To observe the progress of the software installation, use this syntax:

watch bigpipe software status status show

The system displays the installation progress.

4. When you are currently running on volume HD1.1, to reboot the system to volume HD1.2, use this syntax

software desired HD1.2 active enable

Displays the software image table:

software image show

Displays the status of the software for each volume on each blade:

software status show

Bigpipe Utility Reference Guide 4 - 25

Page 428: BIG IP Reference

Chapter 4

OptionsYou can use these options with the software command:

◆ activeDisplays whether the volume is running. Note that you cannot delete the active volume.

◆ buildDisplays the F5 Networks build number related to the installed software image.

◆ build dateDisplays the date associated with the software image file.

◆ chksumDisplays the MD5 checksum for the software image.

◆ desiredInstalls the specified version of the software on the cluster or deletes the specified version of the software from the cluster.

◆ file sizeDisplays the size of the software image file.

◆ filenameDisplays the name of the software image file.

◆ hotfix idDisplays the ID number related to the hotfix.

◆ hotfix titleDisplays the name of the hotfix.

◆ hotfixesCopies the specified files to a location on the cluster from which the system can install the hotfix.

◆ imagesCopies the specified files to a location on the cluster from which the system can install the software.

◆ last modifiedDisplays the date on which the software image was last changed.

◆ mediaDisplays the type of media on which the volume exists.

◆ nameSpecifies the name of the volume.

◆ productDisplays the F5 Networks product related to the installed software.

◆ retryEnables the retry option, which automatically retries installing in case of install failure.

◆ sizeDisplays the size of the volume.

4 - 26

Page 429: BIG IP Reference

VIPRION System Command Reference

◆ statusDisplays the current status of the software installation on all disk volumes for all slots in the cluster.

◆ versionDisplays the F5 Networks product version number related to the installed software image.

◆ volumeDisplays the volumes on the cluster.

• active (enable | disable)

• build

• product

• size

• version

Note: The volume option is not applicable to partitioned systems.

See alsobigpipe(1), ntp(1), dns(1), httpd(1), snmpd(1)

Bigpipe Utility Reference Guide 4 - 27

Page 430: BIG IP Reference

Chapter 4

systemSets up the system.

SyntaxUse this command to set up the system.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

system [{] <system arg list> [}]

<system arg> ::=

archive encrypt (on | on request | off)

auth source type (local | ldap | radius | activedirectory | tacacs)

console inactivity timeout <number>

custom addr (<ip addr> | none)

failsafe action (go offline | reboot | restart all | go offline abort tm | failover abort tm)

gui security banner (enable | disable)

gui security banner text (<string> | none)

gui setup (enable | disable)

host addr mode (mgmt | statemirror | custom)

hostname (<string> | none)

hosts allow include (<string> | none)

lcd display (enable | disable)

net reboot (enable | disable)

password prompt (<string> | none)

quiet boot (enable | disable)

remote host (<remote host list> | none) [add | delete]

username prompt (<string> | none)

<remote host> ::= (<remote host key> | all) [{] <remote host arg list> [}]

<remote host key> ::=

<name>

<remote host arg> ::=

addr (<ip addr> | none)

hostname (<string> | none)

name <name>

4 - 28

Page 431: BIG IP Reference

VIPRION System Command Reference

Displaysystem [show [all]]

system list [all]

system archive encrypt [show]

system auth source type [show]

system console inactivity timeout [show]

system custom addr [show]

system failsafe action [show]

system gui security banner [show]

system gui security banner text [show]

system gui setup [show]

system host addr mode [show]

system hostname [show]

system hosts allow include [show]

system lcd display [show]

system net reboot [show]

system password prompt [show]

system quiet boot [show]

system remote host [<remote host key> | all] [show [all]]

system remote host [<remote host key> | all] list [all]

system remote host (<remote host key> | all) addr [show]

system remote host (<remote host key> | all) hostname [show]

system remote host (<remote host key> | all) name [show]

system username prompt [show]

DescriptionYou can use the system command to set up the general properties of the system.

ExamplesSets up the system using the system defaults:

system {}

Sets up a remote host named bigip151 with an IP address of 172.27.226.151 and a host name of bigip151.saxon.net:

system remote host bigip151 { addr 172.27.226.151 hostname bigip151.saxon.net }

Bigpipe Utility Reference Guide 4 - 29

Page 432: BIG IP Reference

Chapter 4

OptionsYou can use these options with the system command:

◆ archive encryptSpecifies whether the system archive encryption feature is set to on, off, or on request. The default value is on request. Note that you must configure the system archive encrypt option in conjunction with the configsync encrypt and configsync passphrase options.

The reason for this is that when you perform a configuration synchronization of two clusters in a redundant system configuration, the process involves saving a UCS file from one system onto the peer system, and then installing the saved file on the peer system. You use the system archive encrypt option to indicate whether the process of saving the UCS file creates an encrypted or unencrypted file. For example, you can set the configsync encrypt option to enable, and configure a passphrase using the configsync passphrase option. If you use the default value, on request, for the system archive encrypt option, then when a user saves the UCS file, and provides the passphrase, the UCS file is encrypted. If the user does not provide the passphrase, the UCS file is not encrypted.

◆ auth source type Specifies the default user authorization source. The default value is local. When user accounts that access the system reside on a remote server, the value of auth source type is the type of server that you are using for authentication, for example: ldap.

◆ console inactivity timeoutSpecifies the number of seconds of inactivity before the system logs off a user who is logged on. The default value is 0. This means that no timeout is set.

◆ custom addrIndicates a user-specified IP address for the system. The default value is none.

It is important to note that you must set the host addr mode option to custom, if you want to specify an IP address using custom addr. For more information, see the host addr mode option.

◆ failsafe actionSpecifies the action that the system takes when the switch board fails. The default value is go offline and abort tm.

• go offlineSpecifies that when the switch board fails, the system goes offline.

• go offline abort tmSpecifies that when the switch board fails, the system goes offline and stops the traffic management system.

• rebootSpecifies that after the active cluster fails over to its peer, it reboots while the peer processes the traffic.

4 - 30

Page 433: BIG IP Reference

VIPRION System Command Reference

• restart allSpecifies that when the switch board fails, the system restarts all system services.

◆ gui security bannerSpecifies whether the system presents on the logon screen the text you specify in the Security banner text to show on the login screen field. If you disable this option, the system presents an empty frame in the right portion of the logon screen. The default value is enable.

◆ gui security banner textSpecifies the text to present on the logon screen when the Show the security banner on the login screen option is enabled. The default value is: Welcome to the BIG-IP Configuration Utility. Log in with your username and password using the fields on the left.

◆ gui setupEnables or disables the Setup utility in the browser-based Configuration utility. The default value is enable.

When you configure a system using the command line interface, disable this option. Disabling the gui setup option of the system command enables your system administrators to use the browser-based Configuration utility without having to run the Setup utility.

◆ host addr modeSpecifies the type of host address assigned to the system. The default value is mgmt, which indicates that the host address is the management port of the system.

If you use the statemirror option, then the host address of the system is shared by the other cluster in a redundant system configuration. In case of system failure, the traffic to the other system is routed to this system.

If you use the custom option, you must specify a custom IP address for the system using the custom addr option. For more information, see the custom addr option.

◆ hostnameSpecifies a local name for the system. The default value is bigip1.

◆ hosts allow include

Warning: Do not use this parameter without assistance from the F5 Technical Support team. The system does not validate the commands issued using the include parameter. If you use this parameter incorrectly, you put the functionality of the system at risk.

◆ lcd displayEnables or disables the system menu to display on the LCD panel on the front of the system. The default value is enable.

◆ net rebootEnables or disables the network reboot feature. The default value is disable. If you enable this feature and then reboot the system, the system boots from an ISO image on the network, rather than from an internal

Bigpipe Utility Reference Guide 4 - 31

Page 434: BIG IP Reference

Chapter 4

media drive. Use this option only when you want to install software on the system, for example, for an upgrade or a re-installation. Note that this setting reverts to disabled after you reboot the system a second time.

◆ partitionDisplays the partition within which the system object resides.

◆ password promptSpecifies the text to present above the password field (the second of the two text boxes) on the logon screen.

◆ quiet bootEnables or disables the quiet boot feature. The default value is enable. If you enable this feature, the system suppresses informational text on the console during the boot cycle.

◆ remote hostAdds a remote host to, or removes a remote host from, the /etc/hosts file. The default value is none. You must enter both an IP address and a fully qualified domain name (FQDN) or alias for each host that you want to add to the file.

◆ username promptSpecifies the text to present above the user name field (the first of the two text boxes) on the logon screen.

See alsobigpipe(1)

4 - 32

Page 435: BIG IP Reference

VIPRION System Command Reference

vlanConfigures a virtual local area network (VLAN).

SyntaxUse this command to create, modify, display, or delete a VLAN.

Create/Modifyvlan <vlan key> {}

vlan (<vlan key> | all) [{] <vlan arg list> [}]

<vlan key> ::=

<name>

<vlan arg> ::=

failsafe (enable | disable)

failsafe (reboot | restart | failover | go active | no action | restart all | \ failover restart tm | failover abort tm | go offline | go offline restart | \ go offline abort tm | go offline downlinks | go offline downlinks restart)

fdb (<fdb list> | none) [add | delete]

interfaces (<interface key list> | none) [add | delete]

interfaces tagged (<interface key list> | none) [add | delete]

learning (enable | disable forward | disable drop)

mac masq (<mac addr> | none)

mtu <number>

name <name>

source check (enable | disable)

tag <number>

timeout (<number> | immediate | indefinite)

trunks (<trunk key list> | none) [add | delete]

trunks tagged (<trunk key list> | none) [add | delete]

<fdb> ::= (<fdb key> | all) [{] <fdb arg list> [}]

<fdb key> ::=

<mac addr>

(dynamic | static)

<fdb arg> ::=

(dynamic | static)

interface <interface key>

mac addr <mac addr>

trunk <trunk key>

Bigpipe Utility Reference Guide 4 - 33

Page 436: BIG IP Reference

Chapter 4

Displayvlan [<vlan key> | all] [show [all]]

vlan [<vlan key> | all] list [all]

vlan (<vlan key> | all) failsafe [show]

vlan (<vlan key> | all) fdb [<fdb key> | all] [show [all]]

vlan (<vlan key> | all) fdb [<fdb key> | all] list [all]

vlan (<vlan key> | all) fdb (<fdb key> | all) dynamic [show]

vlan (<vlan key> | all) fdb (<fdb key> | all) interface [show]

vlan (<vlan key> | all) fdb (<fdb key> | all) mac addr [show]

vlan (<vlan key> | all) fdb (<fdb key> | all) trunk [show]

vlan (<vlan key> | all) fdb (<fdb key> | all) vlan [show]

vlan (<vlan key> | all) ifname [show]

vlan (<vlan key> | all) interfaces [<interface key> | all] [show [all]]

vlan (<vlan key> | all) interfaces (<interface key> | all) parent vname [show]

vlan (<vlan key> | all) interfaces (<interface key> | all) pending [show]

vlan (<vlan key> | all) interfaces (<interface key> | all) vmname [show]

vlan (<vlan key> | all) interfaces tagged [<interface key> | all] [show [all]]

vlan (<vlan key> | all) interfaces tagged (<interface key> | all) parent vname [show]

vlan (<vlan key> | all) interfaces tagged (<interface key> | all) pending [show]

vlan (<vlan key> | all) interfaces tagged (<interface key> | all) vmname [show]

vlan (<vlan key> | all) learning [show]

vlan (<vlan key> | all) mac masq [show]

vlan (<vlan key> | all) mac true [show]

vlan (<vlan key> | all) mtu [show]

vlan (<vlan key> | all) name [show]

vlan (<vlan key> | all) source check [show]

vlan (<vlan key> | all) tag [show]

vlan (<vlan key> | all) timeout [show]

vlan (<vlan key> | all) trunks [<trunk key> | all] [show [all]]

vlan (<vlan key> | all) trunks (<trunk key> | all) parent vname [show]

vlan (<vlan key> | all) trunks (<trunk key> | all) pending [show]

vlan (<vlan key> | all) trunks (<trunk key> | all) vmname [show]

vlan (<vlan key> | all) trunks tagged [<trunk key> | all] [show [all]]

vlan (<vlan key> | all) trunks tagged (<trunk key> | all) parent vname [show]

vlan (<vlan key> | all) trunks tagged (<trunk key> | all) pending [show]

vlan (<vlan key> | all) trunks tagged (<trunk key> | all) vmname [show]

Deletevlan (<vlan key> | all) delete

4 - 34

Page 437: BIG IP Reference

VIPRION System Command Reference

DescriptionThe vlan command enables you to create, display, and modify settings for VLANs. VLANs are part of the configuration of the network components. VLANs can be based on either ports or tags.

When creating a VLAN, the system automatically assigns a tag value for the VLAN, unless you specify a tag value on the command line. VLANs can have both tagged and untagged interfaces. You can add an interface to a single VLAN as an untagged interface. You can also add an interface to multiple VLANs as a tagged interface.

ExamplesCreate the VLAN myvlan that includes the interfaces 1.2, 1.3, and 1.4:

vlan myvlan interface 1.2 1.3 1.4

Delete the VLAN named myvlan:

vlan myvlan delete>

OptionsYou can use these options with the vlan command:

◆ failsafeEnables a fail-safe mechanism that causes the active cluster to fail over to a redundant cluster when loss of traffic is detected on a VLAN, and traffic is not restored during the failsafe timeout period for that VLAN. The default action set with VLAN fail-safe is restart all. When the fail-safe mechanism is triggered, all the daemons are restarted and the cluster fails over. The default value is disable.

◆ fdbSpecifies that the fdb (forwarding database) associates MAC addresses with interfaces and trunks.

◆ interfacesSpecifies a list of interfaces that you want to assign to the VLAN.

◆ interfaces taggedSpecifies a list of tagged interfaces. A tagged interface is an interface that you assign to a VLAN in a way that causes the system to add a VLAN tag into the header of any frame passing through that interface. Use tagged interfaces when you want to assign a single interface to multiple VLANs.

◆ learningSpecifies whether switch ports placed in the VLAN are configured for switch learning, forwarding only, or dropped. Possible values are: enable, disable forward, or disable drop. The default value is enable.

Bigpipe Utility Reference Guide 4 - 35

Page 438: BIG IP Reference

Chapter 4

◆ mac masqConfigures a shared MAC masquerade address. You can share the media access control (MAC) masquerade address between clusters in a redundant system configuration. This has the following advantages:

• Increased reliability and failover speed, especially in lossy networks

• Interoperability with switches that are slow to respond to the network changes

• Interoperability with switches that are configured to ignore network changes

◆ mtuSets a specific maximum transition unit (MTU) for the VLAN. The default value is 1500.

◆ source checkSpecifies that only connections that have a return route in the routing table are accepted. The default value is disable.

◆ tagSpecifies a number that the system adds into the header of any frame passing through the VLAN.

◆ timeoutSpecifies the number of seconds that an active cluster can run without detecting network traffic on this VLAN before it initiates a failover. The default value is 90 seconds.

◆ trunksSpecifies a list of trunks. A trunk is a combination of two or more interfaces and cables configured as one link.

◆ trunks taggedSpecifies a list of tagged trunks. A tagged trunk is a trunk that you assign to a VLAN in a way that causes the system to add a VLAN tag into the header of any frame passing through the trunk. Use tagged trunks when you want to assign a single trunk to multiple VLANs.

See alsointerface(1), self(1), vlangroup(1), virtual(1), bigpipe(1)

4 - 36

Page 439: BIG IP Reference

5

WAN Optimization Command Reference

• Introduction to WAN Optimization commands

• Alphabetical list of commands

Page 440: BIG IP Reference
Page 441: BIG IP Reference

WAN Optimization Command Reference

Introduction to WAN Optimization commandsYou can use bigpipe commands to configure the WAN (Wide Area Network) Optimization Module. This chapter includes WAN optimization-specific commands that you can use in addition to the bigpipe commands listed in Chapter 3, Bigpipe Utility Command Reference. It also includes commands for rate shaping and WCCP, which you might also use when configuring local and network traffic that does not travel through the WAN Optimization Module.

Note

F5 Networks recommends that only advanced users of the BIG-IP system configure WAN optimization from the command line.

For more information about configuring WAN optimization, see the Configuration Guide for the BIG-IP® WAN Optimization Module.

Alphabetical list of commandsThe remainder of this chapter lists bigpipe commands used to configure WAN optimization.

Bigpipe Utility Reference Guide 5 - 1

Page 442: BIG IP Reference

Chapter 5

datastorConfigures the data storage used for optimization.

Syntax

Use this command to enable, disable, or modify the parameters for data storage.

Create/Modifydatastor [{] <datastor arg list> [}]

<datastor arg> ::=

disk usage (enable | disable)

high water mark <number>

low water mark <number>

Displaydatastor [show [all]]

datastor list [all]

datastor disk usage [show]

datastor high water mark [show]

datastor low water mark [show]

Description

The datastor command specifies parameters for the data storage that is used for disk I/O operations and optimized page cache for frequently accessed sectors. Symmetric data deduplication is one consumer of this storage space.

Examples

Displays the data storage settings:

datastor show all

Options

You can use these options with the datastor command:

◆ disk usageSpecifies the use of the disk (in addition to memory) for data storage.

◆ high water markSpecifies the percentage of full cache above which pruning starts. The default value is 92.

5 - 2

Page 443: BIG IP Reference

WAN Optimization Command Reference

◆ low water markSpecifies the percentage of full cache below which pruning stops. The default value is 80.

See also

deduplication(1), bigpipe(1)

Bigpipe Utility Reference Guide 5 - 3

Page 444: BIG IP Reference

Chapter 5

deduplicationConfigures symmetric data deduplication for WAN optimization.

Syntax

Use this command to enable, disable, or modify symmetric data deduplication for WAN optimization.

Create/Modifydeduplication [{] <deduplication arg list> [}]

<deduplication arg> ::=

deduplication service (enable | disable)

max endpoint count <number>

Displaydeduplication [show [all]]

deduplication list [all]

deduplication deduplication service [show]

deduplication max endpoint count [show]

DescriptionThe deduplication command specifies parameters for symmetric data deduplication, which compresses data on the WAN by identifying and removing repetitive data patterns.

Examples

Displays the symmetric data deduplication settings for WAN optimization:

deduplication show all

Options

You can use these options with the deduplication command:

◆ deduplication serviceSpecifies whether symmetric data deduplication is enabled.

◆ max endpoint countSpecifies the maximum number of concurrent remote WAN Optimization Modules supported by symmetric data deduplication, up to a maximum of 32. The default value is 4.

See also

datastor(1), profile isession(1), bigpipe(1)

5 - 4

Page 445: BIG IP Reference

WAN Optimization Command Reference

drop policyConfigures a custom drop policy that can be applied to rate shaping.

Syntax

Use this command to create, modify, display, or delete a drop policy.

Note

This command is intended for expert users only. Changing these parameters could have an unintended negative impact on traffic shaping. We recommend using the rate class command in most situations.

Create/Modifydrop policy <drop policy key> {}

drop policy (<drop policy key> | all) [{] <drop policy arg list> [}]

<drop policy key> ::=

<name>

<drop policy arg> ::=

average pkt size <number>

fred max active flow <number>

fred max drop mul <number>

fred min drop mul <number>

inverse weight <number>

max probability <number>

max threshold <number>

min threshold <number>

name <name>

red hard limit <number>

type (tail | red | fred)

Displaydrop policy [<drop policy key> | all] [show [all]]

drop policy [<drop policy key> | all] list [all]

drop policy (<drop policy key> | all) average pkt size [show]

drop policy (<drop policy key> | all) fred max active flow [show]

drop policy (<drop policy key> | all) fred max drop mul [show]

drop policy (<drop policy key> | all) fred min drop mul [show]

drop policy (<drop policy key> | all) inverse weight [show]

drop policy (<drop policy key> | all) max probability [show]

drop policy (<drop policy key> | all) max threshold [show]

drop policy (<drop policy key> | all) min threshold [show]

Bigpipe Utility Reference Guide 5 - 5

Page 446: BIG IP Reference

Chapter 5

drop policy (<drop policy key> | all) name [show]

drop policy (<drop policy key> | all) red hard limit [show]

drop policy (<drop policy key> | all) type [show]

Deletedrop policy (<drop policy key> | all) delete

Description

A drop policy determines when and how to drop packets, if required, when the traffic handling queue is full. Use the command drop policy in conjunction with the command shaping queue to shape traffic.

Examples

Creates the drop policy customfred that specifies a minimum and maximum threshold:

drop policy customfred type fred min threshold 1500 max threshold 10000

Options

You can use these options with the drop policy command:

◆ average pkt size Specifies the average MTU (maximum transmission unit) size in the range of 0 to 10000 bytes. The default value is 0.

◆ fred max active flowSpecifies the maximum number of flows that can be active for each queue. The range is 0 to 10000. The default value is 0, which disables active flow limitation.

◆ fred max drop mulSpecifies the hard drop limit in the range of 0 to 400. The default value is 0. Setting this to a small value does not change the hard drop limit, but a higher number increases the limit.

◆ fred min drop mul Specifies the hard no drop limit in the range of 0 to 100. The default value is 0. Setting this to a large value prevents packets from being dropped.

◆ inverse weightSpecifies the weight used to calculate the average queue length. Valid values are 0, 64, 128, 256, 512, and 1024. The default value is 0.

◆ max probabilitySpecifies the maximum percentage probability in the range of 0 to 100 according to which packets are dropped when the average queue length is between the minimum and maximum thresholds. The default value is 0.

5 - 6

Page 447: BIG IP Reference

WAN Optimization Command Reference

◆ max thresholdSpecifies the queue length below which packets are not dropped. The default value is 0.

◆ min thresholdSpecifies the queue length above which packets are not dropped. The default value is 0.

◆ nameSpecifies the custom name for the queue. Use this name in the command shaping policy or rate class.

◆ red hard limitSpecifies the maximum queue size in kilobytes or megabytes. Additional packets are dropped. The default value is 0. This option applies only to the red type.

◆ typeSpecifies the type of drop policy. The available settings are tail (drops the end of the traffic stream), red (randomly drops packets), and fred (drops packets according to the type of traffic in the flow). The default value is red. Although you could create a drop policy based on tail, that is already the default value for drop policy in both the shaping policy and rate class commands.

See also

rate class(1), shaping policy(1), shaping queue(1), bigpipe(1)

Bigpipe Utility Reference Guide 5 - 7

Page 448: BIG IP Reference

Chapter 5

endpoint advertised routeConfigures routes advertised by the local endpoint to remote endpoints for WAN optimization.

Syntax

Use this command to create, display, or modify routes advertised for optimization by the local endpoint of the WAN Optimization Module.

Create/Modifyendpoint advertised route <endpoint advertised route key> {}

endpoint advertised route (<endpoint advertised route key> | all) [{]

<endpoint advertised route arg> [}]

<endpoint advertised route key> ::=

<network ip>

<endpoint advertised route arg> ::=

addr <network ip>

include (enable | disable)

label (<string> | none)

metric <number>

Displayendpoint advertised route [<endpoint advertised route key> | all] [show [all]]

endpoint advertised route [<endpoint advertised route key> | all] list [all]

endpoint advertised route [<endpoint advertised route key> | all] addr [show]

endpoint advertised route [<endpoint advertised route key> | all] include [show]

endpoint advertised route [<endpoint advertised route key> | all] label [show]

endpoint advertised route (<endpoint advertised route key> | all) metric [show]

endpoint advertised route (<endpoint advertised route key> | all) origin [show]

Deleteendpoint advertised route (<endpoint advertised route key> | all) delete

Description

The endpoint advertised route command enables you to configure routes advertised by the local endpoint to remote endpoints. You can specify a netmask or use slash format. Optimization is enabled for all included local endpoint advertised routes, except for any subsets that have been excluded. Routes are advertised to all connected WAN Optimization Modules.

5 - 8

Page 449: BIG IP Reference

WAN Optimization Command Reference

Examples

Displays all endpoint advertised routes for the local WAN Optimization Module:

endpoint advertised route show all

Options

You can use these options with the endpoint advertised route command:

◆ addrSpecifies the IP address and netmask of the advertised route.

◆ includeSpecifies whether the route is included or excluded from optimization. This allows you to define a subset of IP addresses to exclude from optimization within a larger included subnet. Excluded endpoint advertised routes must be a proper address range subset of an included endpoint advertised route.

◆ labelSpecifies an optional descriptive label for this route.

◆ metricDisplays a routing number to select between WAN Optimization Module pairs. The higher the number, the more expensive the route in terms of resources. Not implemented in this release.

◆ originDisplays whether the route was discovered or explicitly configured.

See also

endpoint local(1), endpoint remote(1), endpoint remote route(1), bigpipe(1)

Bigpipe Utility Reference Guide 5 - 9

Page 450: BIG IP Reference

Chapter 5

endpoint discoveryConfigures the automatic discovery of remote endpoints for WAN optimization.

Syntax

Use this command to enable, disable, modify, or delete remote endpoint discovery.

Create/Modifyendpoint discovery {}

endpoint discovery [{] <endpoint discovery arg list> [}]

<endpoint discovery arg> ::=

discoverable (enable | disable)

discovered endpoint (enable | disable)

icmp max requests <number>

icmp min backoff <number>

icmp num retries <number>

max endpoint count <number>

mode (enable all | disable | enable icmp | enable tcp)

endpoint discovery stats reset

Displayendpoint discovery [show [all]]

endpoint discovery list [all]

endpoint discovery discoverable [show]

endpoint discovery discovered endpoint [show]

endpoint discovery icmp max requests [show]

endpoint discovery icmp min backoff [show]

endpoint discovery icmp num retries [show]

endpoint discovery max endpoint count [show]

endpoint discovery mode [show]

endpoint discovery stats [show]

Deleteendpoint discovery delete

5 - 10

Page 451: BIG IP Reference

WAN Optimization Command Reference

Description

The endpoint discovery command enables you to specify parameters for automatically discovering remote endpoints for WAN optimization. These endpoints are configured WAN Optimized Modules on remote BIG-IP systems that advertise themselves to the configured WAN Optimization Module on the local BIG-IP system.

Examples

Displays the discovered remote endpoints, which are configured WAN Optimized Modules on remote BIG-IP systems:

endpoint discovery show all

Options

You can use these options with the endpoint discovery command:

◆ discoverableSpecifies that the WAN Optimization Module responds to probe messages it receives from WAN Optimization Modules on remote BIG-IP systems.

◆ discovered endpointSpecifies that the WAN Optimization Module sends out probe messages to discover other WAN Optimization Modules on remote BIG-IP systems in the network.

◆ icmp max requestsSpecifies the maximum number of ICMP probe message requests, after which the system stops sending probe message requests until at least one message is cleared from the queue by either a timeout or a response. The default value is 1024.

◆ icmp min backoffSpecifies the maximum number of seconds to wait before abandoning an ICMP probe message request and resending it. The range is from 0 to 255. The default value is 5.

◆ icmp num retriesSpecifies the maximum number of times the system sends an ICMP probe message request for a single flow. The range is from 0 to 255. The default value is 5.

◆ max endpoint countSpecifies the maximum number of WAN Optimization Modules on remote BIG-IP systems with symmetric deduplication enabled that share the available cache. Any added remote WAN Optimization Module that exceeds this number receives no cache for symmetric data deduplication.

Bigpipe Utility Reference Guide 5 - 11

Page 452: BIG IP Reference

Chapter 5

◆ modeSpecifies the type of probe messages the system should send.

• enable icmpSend only ICMP probe messages.

• enable tcpSend only TCP probe messages.

• enable allSend both ICMP and TCP probe messages.

• disableDisable probe messages.

◆ statsDisplays information about the ICMP and TCP probe messages and the discovered remote endpoints.

See also

endpoint local(1), endpoint remote(1), bigpipe(1)

5 - 12

Page 453: BIG IP Reference

WAN Optimization Command Reference

endpoint localConfigures the local endpoint for the WAN Optimization Module.

Syntax

Use this command to create, modify, or delete the local endpoint for the WAN Optimization Module.

Create/Modifyendpoint local {}

endpoint local [{] <endpoint local arg list> [}]

<endpoint local arg> ::=

addresses (<ip addr list> | none) [add | delete]

allow nat (enable | disable)

serverssl (<string> | none)

source address (none | client | wom | tunnel)

(enable | disable)

tunnel port <number>

Displayendpoint local [show [all]]

endpoint local list [all]

endpoint local UUID [show]

endpoint local addresses [show]

endpoint local allow nat [show]

endpoint local mgmt addr [show]

endpoint local serverssl [show]

endpoint local source address [show]

endpoint local status [show]

endpoint local tunnel port [show]

endpoint local version [show]

Deleteendpoint local delete

Description

The endpoint local command enables you to configure the local endpoint for the WAN Optimization Module on the local BIG-IP system.

Bigpipe Utility Reference Guide 5 - 13

Page 454: BIG IP Reference

Chapter 5

Examples

Configures the local endpoint for the WAN Optimization Module, which has the IP address of 12.16.0.5, and uses the SSL profile named serverssl:

endpoint local {

addresses 12.16.0.5

serverssl serverssl

}

Options

You can use these options with the endpoint local command:

◆ addressesSpecifies the IP address used for the local endpoint. The IP address must be in the same subnet as a self IP address on the BIG-IP system.

◆ allow natWhen enabled, specifies that the system accepts connections for traffic behind a Network Address Translation device.

◆ mgmt addrDisplays the management IP address for the local endpoint.

◆ serversslSpecifies the default server SSL profile the system uses for authentication.

◆ source addressSpecifies the address the system uses as the source IP address of the TCP connection between the WAN Optimization Module and the server for incoming traffic.

• clientIndicates that the system uses the client IP address from the tunnel data as the source IP address. This is the default value.

• womIndicates that the system uses the WAN Optimization Module endpoint local IP address as the source IP address.

• tunnelIndicates that the system uses the source IP address in the header of the tunnel connection as the source IP address.

◆ (enable | disable)When enabled, specifies that the local endpoint is available for initiating and receiving optimized traffic. To turn off WAN optimization on this endpoint, use disable.

◆ statusIndicates whether the local endpoint is enabled.

5 - 14

Page 455: BIG IP Reference

WAN Optimization Command Reference

◆ tunnel portSpecifies the number of the port on the local endpoint that the WAN Optimization Module uses for control connections. It must be a port that is allowed access through the firewall. The range is from 1 to 65535. The default value is 443.

◆ UUIDDisplays the Universal Unique Identifier, a 128-bit number that identifies this local endpoint.

◆ versionDisplays the number of the software release on the BIG-IP system that hosts this local endpoint.

See also

endpoint advertised route(1), endpoint remote(1), endpoint remote route(1), bigpipe(1)

Bigpipe Utility Reference Guide 5 - 15

Page 456: BIG IP Reference

Chapter 5

endpoint remoteConfigures one or more remote endpoints for the WAN Optimization Module.

Syntax

Use this command to create, modify, or delete the remote endpoints for the WAN Optimization Module.

Create/Modifyendpoint remote <endpoint remote key> {}

endpoint remote (<endpoint remote key> | all) [{] <endpoint remote arg list> [}]

<endpoint remote key> ::=

(<ip addr> | none)

<endpoint remote arg> ::=

allow routing (enable | disable)

dedup (none | cache refresh)

(enable | disable)

(discovered | configured | persistable | manually saved)

ref (<ip addr> | none)

serverssl (<string> | none)

source address (none | client | wom | tunnel)

tunnel encrypt (enable | disable)

tunnel port <number>

endpoint remote (<endpoint remote key> | all) stats reset

Displayendpoint remote [<endpoint remote key > | all] [show [all]]

endpoint remote [<endpoint remote key > | all] list [all]

endpoint remote [<endpoint remote key > | all] UUID [show]

endpoint remote [<endpoint remote key > | all] addr list [show]

endpoint remote [<endpoint remote key > | all] allow routing [show]

endpoint remote [<endpoint remote key > | all] behind nat [show]

endpoint remote [<endpoint remote key > | all] cache refresh count [show]

endpoint remote [<endpoint remote key > | all] cache refresh timestamp [show

endpoint remote [<endpoint remote key > | all] config status [show]]

endpoint remote [<endpoint remote key > | all] dedup cache [show]

endpoint remote [<endpoint remote key > | all] is enabled [show]

endpoint remote [<endpoint remote key > | all] mgmt addr [show]

endpoint remote [<endpoint remote key > | all] name [show]

endpoint remote [<endpoint remote key > | all] origin [show]

endpoint remote [<endpoint remote key > | all] ref [show]

endpoint remote [<endpoint remote key > | all] serverssl [show]

5 - 16

Page 457: BIG IP Reference

WAN Optimization Command Reference

endpoint remote [<endpoint remote key > | all] source address [show]

endpoint remote [<endpoint remote key > | all] state [show]

endpoint remote [<endpoint remote key > | all] stats [show]

endpoint remote [<endpoint remote key > | all] tunnel encrypt [show]

endpoint remote [<endpoint remote key > | all] tunnel port [show]

endpoint remote [<endpoint remote key > | all] version [show]

Deleteendpoint remote (<endpoint remote key> | all) delete

If you delete a remote endpoint without also disabling endpoint dynamic discovery, the remote endpoint may reappear as it is rediscovered. To remove a remote endpoint from traffic initiated by this WAN Optimization Module, use the disable option.

Description

The endpoint remote command enables you to configure a remote endpoint for traffic from the WAN Optimization Module.

ExamplesConfigures a connection to the remote endpoint for the WAN Optimization Module that has the IP address of 13.16.0.5:

endpoint remote 13.16.0.5 {

serverssl serverssl

}

Options

You can use these options with the endpoint remote command:

◆ allow routingWhen enabled, specifies that this remote endpoint can initiate traffic to the local endpoint. If you specify disable, the remote endpoint can receive traffic from the local endpoint, but it cannot initiate traffic to the local endpoint.

◆ behind natIndicates that this remote endpoint is on a WAN Optimization Module located behind a Network Address Translation device.

◆ cache refresh countDisplays the number of times the cash used for symmetric data deduplication has been refreshed since system startup.

Bigpipe Utility Reference Guide 5 - 17

Page 458: BIG IP Reference

Chapter 5

◆ cache refresh timestampDisplays when the last refresh of the cache occurred.

◆ config statusDisplays a diagnostic string used in troubleshooting.

◆ dedupUse cache refresh to clear the cache used for symmetric data deduplication on the remote endpoint. The default value is none.

◆ dedup cacheDisplays in megabytes the total amount of cache available for symmetric data deduplication. The system apportions this cache according to the number of remote endpoints and the amount of cache available at each endpoint.

◆ (enable | disable)When enabled, specifies that traffic can be optimized between the local and remote endpoints. Disabling a remote endpoint affects only the connection between the local endpoint and this remote endpoint.

◆ ip addrSpecifies the IP address that the local endpoint uses to communicate with the WAN Optimization Module on a remote BIG-IP system.

◆ mgmt addrDisplays the management IP address for the remote endpoint.

◆ nameDisplays the host name of the BIG-IP system that hosts this remote endpoint.

◆ originIndicates whether the remote endpoint was discovered automatically or configured manually. You can change the origin from discovered to persistable, if you want to save the endpoint to the file bigip_local.conf when you use the command b save. After you run the command b save, this attribute changes to manually saved. Endpoints that have the attribute discovered are not saved to the file bigip_local.conf.

◆ refSpecifies the IP address of the remote endpoint.

◆ serversslSpecifies the server SSL profile to use for traffic to this remote endpoint.

◆ source addressSpecifies the address the system uses as the source IP address of the TCP connection between the WAN Optimization Module and the server.

• noneIndicates that the system uses the source address value set for the local endpoint. This is the default value.

• clientIndicates that the system uses the client IP address from the tunnel data as the source IP address.

5 - 18

Page 459: BIG IP Reference

WAN Optimization Command Reference

• womIndicates that the system uses the WAN Optimization Module endpoint local IP address as the source IP address.

• tunnelIndicates that the system uses the source IP address in the header of the tunnel connection as the source IP address.

◆ stateIndicates the condition of the connection for traffic optimization between the local endpoint and this remote endpoint.

• unknownAppears when this endpoint is first created, before the connection is complete.

• authenticatedIndicates that TMM has validated this connection based on the SSL profiles.

• downIndicates that the local endpoint cannot connect to this remote endpoint.

• negotiatingIndicates that the connection has been made, and the endpoints are negotiating the deduplication cache size.

• readyIndicates that the connection is available for optimization.

• holdingIndicates that the connection is established, but the remote endpoint is not receiving traffic.

◆ statsDisplays data about the connections and traffic between this remote endpoint and the local endpoint.

◆ tunnel encryptSpecifies whether traffic passing between the two WAN Optimization Modules is encrypted.

◆ tunnel portSpecifies whether to use a specific port for traffic optimized to this endpoint or to use port transparency (0).

◆ UUIDDisplays the Universal Unique Identifier, a 128-bit number that identifies this remote endpoint.

◆ versionDisplays the number of the software release on the BIG-IP system that hosts this remote endpoint.

See also

endpoint discovery(1), endpoint local(1), endpoint remote route(1), endpoint advertised route(1), bigpipe(1)

Bigpipe Utility Reference Guide 5 - 19

Page 460: BIG IP Reference

Chapter 5

endpoint remote routeDisplays the destination routes learned from the remote endpoints.

Syntax

Use this command to display the routes advertised by remote endpoints for WAN optimization.

Modifyendpoint remote route <endpoint remote route key> {}

endpoint remote route (<endpoint remote route key> | all) [{] <endpoint remote route arg list> [}]

<endpoint remote route key> ::=

[ref <endpoint remote key>] [dest <network ip>]

Displayendpoint remote route [<endpoint remote route key> | all] [show [all]]

endpoint remote route [<endpoint remote route key> | all] dest [all]

endpoint remote route [<endpoint remote route key> | all] include [show]

endpoint remote route [<endpoint remote route key> | all] label [show]

endpoint remote route [<endpoint remote route key> | all] metric [show]

endpoint remote route [<endpoint remote route key> | all] origin [show]

endpoint remote route [<endpoint remote route key> | all] ref [show]

Deleteendpoint remote route (<endpoint remote route key> | all) delete

Description

The endpoint remote route command enables you to display routes learned from remote endpoints for WAN Optimization Modules that have been configured on remote BIG-IP systems. You can also display the origin, label, and include flag for these routes.

Examples

Displays the routes for all the remote endpoints on connected WAN Optimization Modules:

endpoint remote route show all

5 - 20

Page 461: BIG IP Reference

WAN Optimization Command Reference

Options

You can use these options with the endpoint remote route command:

◆ destDisplays the IP address and mask of the destination route.

◆ includeDisplays whether the destination route is included or excluded from optimization for a given remote endpoint.

◆ labelDisplays a descriptive label for this route.

◆ metricDisplays a routing number to select between WAN Optimization Module pairs. The higher the number, the more expensive the route in terms of resources. Not implemented in this release.

◆ originDisplays whether the route was discovered or explicitly configured.

◆ refDisplays the IP address of the remote endpoint.

See also

endpoint local(1), endpoint advertised route(1), endpoint remote(1), bigpipe(1)

Bigpipe Utility Reference Guide 5 - 21

Page 462: BIG IP Reference

Chapter 5

profile cifsCreates, modifies, displays, or deletes a Common Internet File System (CIFS) profile.

Syntax

Use this command to configure a profile for CIFS traffic.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile cifs <profile cifs key> {}

profile cifs (<profile cifs key> | all) [{] <profile cifs arg list> [}]

<profile cifs key> ::=

<name>

<profile cifs arg> ::=

defaults from (<name> | none)

extended security (enable | disable)

fast close (enable | disable

latency optimization (enable | disable)

name (<name> | none)

read ahead optimization (enable | disable)

record play optimization (enable | disable)

write optimization (enable | disable)

Displayprofile cifs [<profile cifs key> | all] [show [all]]

profile cifs [<profile cifs key> | all] list [all]

profile cifs (<profile cifs key> | all) defaults from [show]

profile cifs (<profile cifs key> | all) extended security [show]

profile cifs (<profile cifs key> | all) fast close [show]

profile cifs (<profile cifs key> | all) latency optimization [show]

profile cifs (<profile cifs key> | all) name [show]

5 - 22

Page 463: BIG IP Reference

WAN Optimization Command Reference

profile cifs (<profile cifs key> | all) read ahead optimization [show]

profile cifs (<profile cifs key> | all) record play optimization [show]

profile cifs (<profile cifs key> | all) write optimization [show]

Deleteprofile cifs (<profile cifs key> | all) delete

Description

The profile cifs command enables you to configure a profile for CIFS traffic. The CIFS profile is a configuration tool for optimizing CIFS traffic over the WAN.

Examples

Creates a CIFS profile named mycifsprofile that inherits its settings from the system default cifs profile:

profile cifs mycifsprofile { }

Options

You can use these options with the profile cifs command:

◆ defaults fromSpecifies the profile that you want to use as the parent profile. The new profile inherits all settings and values from the parent profile.

◆ extended securitySpecifies that the system allows custom authentication for CIFS traffic to be configured on the server. If this setting is disabled, the system relies on basic CIFS authentication. The default value is disable.

◆ fast closeSpecifies that the system remembers all CIFS responses, except close.

◆ latency optimizationWhen enabled, specifies that the system optimizes all CIFS traffic, not just read and write operations.

◆ nameSpecifies a name for this custom CIFS profile.

◆ read ahead optimizationWhen enabled, specifies that the system optimizes traffic that is using the CIFS protocol to fulfill a request for a file download from a CIFS server.

◆ record replay optimizationWhen enabled, specifies that the system tries to remember how the client opened a file the last time it was requested.

Bigpipe Utility Reference Guide 5 - 23

Page 464: BIG IP Reference

Chapter 5

◆ write optimizationWhen enabled, specifies that the system optimizes traffic that is using the CIFS protocol to upload a file to a CIFS server.

See also

profile(1), virtual(1), bigpipe(1)

5 - 24

Page 465: BIG IP Reference

WAN Optimization Command Reference

profile isessionCreates, modifies, displays, or deletes an iSession profile.

Syntax

Use this command to configure an iSession profile, which is required for WAN optimization.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile isession <profile isession key> {}

profile isession (<profile isession key> | all) [{] <profile isession arg list> [}]

<profile isession key> ::=

<name>

<profile isession arg> ::=

compression adaptive (enable | disable)

compression deflate (enable | disable)

compression lzo (enable | disable)

compression null (enable | disable)

connection reuse (enable | disable)

deduplication (enable | disable)

defaults from (<name> | none)

endpoint pool (<string> | none)

mode (enable | disable)

name <name>

port transparency (enable | disable)

target virtual (none | host match no isession | host match all | match all)

profile isession (<profile isession key> | all) stats reset

Displayprofile isession [<profile isession key> | all] [show [all]]

profile isession [<profile isession key> | all] list [all]

profile isession (<profile isession key> | all) compression adaptive [show]

profile isession (<profile isession key> | all) compression deflate [show]

profile isession (<profile isession key> | all) compression lzo [show]

Bigpipe Utility Reference Guide 5 - 25

Page 466: BIG IP Reference

Chapter 5

profile isession (<profile isession key> | all) compression null [show]

profile isession (<profile isession key> | all) connection reuse [show]

profile isession (<profile isession key> | all) deduplication [show]

profile isession (<profile isession key> | all) defaults from [show]

profile isession (<profile isession key> | all) endpoint pool [show]

profile isession (<profile isession key> | all) mode [show]

profile isession (<profile isession key> | all) name [show]

profile isession (<profile isession key> | all) parent name [show]

profile isession (<profile isession key> | all) port transparency [show]

profile isession (<profile isession key> | all) stats [show]

profile isession (<profile isession key> | all) target virtual [show]

Deleteprofile isession (<profile isession key> | all) delete

Description

Use the profile isession command to specify how the WAN Optimization Module handles traffic.

ExamplesCreates an iSession profile named myisessionprofile that inherits its settings from the system default isession profile:

profile isession myisessionprofile { }

Options

You can use these options with the profile isession command:

◆ compression adaptiveSpecifies whether the system selects the enabled compression algorithm that is the most suitable for the current traffic. The system can use only compression algorithms that are enabled. To establish and maintain the connection, you must enable at least one compression setting.

◆ compression deflateSpecifies whether the system can use the Deflate data compression algorithm. To establish and maintain the connection, you must enable at least one compression setting.

◆ compression lzoSpecifies whether the system can use the Lempel-Ziv-Oberhumer (LZO) data compression algorithm. To establish and maintain the connection, you must enable at least one compression setting.

◆ compression nullWhen enabled, and all other compression algorithms are disabled, specifies that the system does not use compression. Enabling this setting

5 - 26

Page 467: BIG IP Reference

WAN Optimization Command Reference

allows the connection, even when you do not want compression. To establish and maintain the connection, you must enable at least one compression setting.

◆ connection reuseSpecifies that the system saves and reuses connections between the local and remote WAN Optimization Modules. The default value is enable.

◆ deduplicationWhen enabled, specifies that the system optimizes traffic using symmetric data deduplication, which means locating byte patterns that were previously sent over the WAN, and replacing them with references. The default value is enable.

◆ defaults fromSpecifies the profile that you want to use as the parent profile. The new profile inherits all settings and values from the parent profile.

◆ endpoint poolSpecifies the pool that was created to act as an endpoint to the tunnel between the two systems. This setting is used for paired tunneling.

◆ modeWhen enabled, specifies that this profile is used for WAN optimization traffic. The default value is enable.

◆ nameSpecifies a name for this profile.

◆ port transparencyWhen enabled, specifies that the destination port specified by the client is preserved over the WAN. The default value is enable.

◆ statsDisplays information about the connections and traffic to which this iSession profile has been applied.

◆ target virtualFor terminated iSession traffic, specifies the matching criteria that a client-side BIG-IP system uses to select a target virtual server on the server-side BIG-IP system. Options are:

• noneSpecifies that the system sends the terminated iSession traffic directly to the server. This is the default value.

• host match no isessionSpecifies that the system matches only host virtual servers with no iSession profile.

• host match allSpecifies that the system selects the closest match from all the host virtual servers.

• match allSpecifies that the system selects the closest match from all the virtual servers.

Bigpipe Utility Reference Guide 5 - 27

Page 468: BIG IP Reference

Chapter 5

See also

profile(1), virtual(1), bigpipe(1)

5 - 28

Page 469: BIG IP Reference

WAN Optimization Command Reference

profile mapiCreates, modifies, displays, or deletes a Messaging Application Profile Interface (MAPI) profile.

Syntax

Use this command to configure a profile for MAPI traffic.

Create/Modify

Important

If you are assigned a user role that allows you to create objects, and you are assigned access to all partitions, then before you create an object in a specific partition, you must use the bigpipe shell command to set your Write partition to the partition in which you want to create the object. For more information, see the Configuring Administrative Partitions and Managing User Accounts chapters in the TMOS™ Management Guide for BIG-IP® Systems.

profile mapi <profile mapi key> {}

profile mapi (<profile mapi key> | all) [{] <profile mapi arg list> [}]

<profile mapi key> ::=

<name>

<profile mapi arg> ::=

defaults from (<name> | none)

name <name>

native compression (enable | disable)

Displayprofile mapi [<profile mapi key> | all] [show [all]]

profile mapi [<profile mapi key> | all] list [all]

profile mapi (<profile mapi key> | all) defaults from [show]

profile mapi (<profile mapi key> | all) name [show]

profile mapi (<profile mapi key> | all) native compression [show]

Deleteprofile mapi (<profile mapi key> | all) delete

Description

The MAPI profile is a configuration tool for optimizing MAPI traffic over the WAN.

Bigpipe Utility Reference Guide 5 - 29

Page 470: BIG IP Reference

Chapter 5

Examples

Creates a MAPI profile named mymapiprofile that inherits its settings from the system default mapi profile:

profile mapi mymapiprofile { }

Options

You can use these options with the profile mapi command:

◆ defaults fromSpecifies the profile that you want to use as the parent profile. The new profile inherits all settings and values from the parent profile.

◆ nameSpecifies a name for this custom MAPI profile.

◆ native compressionEnables or disables native Microsoft Exchange compression. The default value is disable, because symmetric adaptive compression yields better results. Use the command profile isession to enable symmetric adaptive compression.

See also

profile(1), profile isession(1), virtual(1), bigpipe(1)

5 - 30

Page 471: BIG IP Reference

WAN Optimization Command Reference

profile tunnelCreates, modifies, displays, or deletes a tunnel profile.

Syntax

Use this command to configure a tunnel profile.

Create/Modifyprofile tunnel <profile tunnel key> {}

profile tunnel (<profile tunnel key> | all) [{] <profile tunnel arg list> [}]

<profile tunnel key> ::=

<name>

<profile tunnel arg> ::=

defaults from (<name> | none)

name (<name> | none)

Displayprofile tunnel [<profile tunnel key> | all] [show [all]]

profile tunnel [<profile tunnel key> | all] list [all]

profile tunnel (<profile tunnel key> | all) defaults from [show]

profile tunnel (<profile tunnel key> | all) name [show]

Deleteprofile tunnel (<profile tunnel key> | all) delete

Description

The tunnel profile is a configuration tool required for terminating the tunnel used for optimizing traffic over the WAN.

Examples

Creates a tunnel profile named mytunnelprofile that inherits its settings from the system default tunnel profile:

profile tunnel mytunnelprofile { }

Bigpipe Utility Reference Guide 5 - 31

Page 472: BIG IP Reference

Chapter 5

Options

You can use these options with the profile tunnel command:

◆ defaults fromSpecifies the profile that you want to use as the parent profile. The new profile inherits all settings and values from the parent profile.

◆ nameSpecifies a name for this custom tunnel profile.

See also

profile(1), virtual(1), bigpipe(1)

5 - 32

Page 473: BIG IP Reference

WAN Optimization Command Reference

rate classConfigures rate classes.

Syntax

Use this command to create, modify, display, or delete a rate class.

Create/Modifyrate class <rate class key> {}

rate class (<rate class key> | all) [{] <rate class arg list> [}]

<rate class key> ::=

<name>

<rate class arg> ::=

burst <number>

ceiling <number>[bps]

direction (any | to client | to server | vlan egress)

drop policy (<drop policy key> | none)

name <name>

parent (<rate class key> | none)

percent ceil <number>

percent rate <number>

rate <number>[bps]

shaping policy (<shaping policy key> | none)

type (<shaping queue key> | none)

rate class (<rate class key> | all) stats reset

Displayrate class [<rate class key> | all] [show [all]]

rate class [<rate class key> | all] list [all]

rate class [<rate class key> | all] burst [show]

rate class [<rate class key> | all] ceiling [show]

rate class [<rate class key> | all] direction [show]

rate class [<rate class key> | all] drop policy [show]

rate class [<rate class key> | all] name [show]

rate class [<rate class key> | all] parent [show]

rate class [<rate class key> | all] percent ceil [show]

rate class [<rate class key> | all] percent rate [show]

rate class [<rate class key> | all] rate [show]

rate class [<rate class key> | all] shaping policy [show]

rate class [<rate class key> | all] stats [show]

rate class [<rate class key> | all] type [show]

Bigpipe Utility Reference Guide 5 - 33

Page 474: BIG IP Reference

Chapter 5

Deleterate class (<rate class key> | all) delete

Description

A rate class is a rate-shaping policy that you assign to a type of traffic, such as Layer 3 traffic that specifies a certain source, destination, or service. More specifically, a rate class defines the number of bits per second that the system allows per connection, and it also defines the number of packets in a queue. You configure rate shaping by creating a rate class and then assigning the rate class to a packet filter, a virtual server, or from within an iRule.

Examples

Creates the rate class myRTclass with a rate of 500 Mbps:

rate class myRTclass { rate 500M }

Deletes the rate class myRTclass:

rate class myRTclass delete

Options

You can use these options with the rate class command:

◆ burstSpecifies the maximum number of bytes that traffic is allowed to burst beyond the specified rate. You can configure the rate in kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps).

◆ ceilingSpecifies how far beyond the value of the rate class that traffic can flow when bursting. This number sets an absolute limit. No traffic can exceed this rate. You can configure the rate in bits per second (bps), kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps).

◆ directionSpecifies the direction of traffic to which the rate class is applied. Possible values are any, to client, and to server.

◆ drop policySpecifies the drop policy for this rate class, which tells the system when and how to drop packets, if required, when the traffic handling queue is full. The available pre-configured policies are red (randomly drops packets), fred (drops packets according to the type of traffic in the flow), and tail (drops the end of the traffic stream). The default value is tail. You can create a customized drop policy using the command drop policy. If you specify a custom shaping policy, the drop policy specified in the shaping policy takes precedence and changes this value to conform.

5 - 34

Page 475: BIG IP Reference

WAN Optimization Command Reference

◆ nameSpecifies the name of this rate class.

◆ parentAssociates this class with another class. The class you are configuring can borrow any unused bandwidth from the parent class' ceiling, thereby supplementing the rate of the child class. Note that borrowing bandwidth affects the rate, ceiling, and queuing method. The default value is none.

◆ percent ceilSpecifies the percentage of the ceiling specified for the associated parent class that is available for this rate class. The default value is 0 (zero), which indicates that the system uses the value of the ceiling option.

◆ percent rateSpecifies the percentage of the maximum throughput rate specified for the associated parent class that is available for this rate class. The default value is 0 (zero), which indicates that the system uses the value of the rate option.

◆ rateSpecifies the maximum throughput rate allowed for traffic handled by the rate class. Packets that exceed the specified number are dropped. This feature is required. You can configure the rate in bits per second (bps), kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps).

◆ shaping policySpecifies the name of a shaping policy that includes customized values for drop policy and queuing method. The system automatically changes the values for percent ceil, drop policy, burst, type, and percent rate options of this class to match the values in the specified shaping policy.

◆ typeSpecifies the queuing method. The pre-configured options are sfq and pfifo.

• sfqStochastic Fair Queuing is a queuing method that further queues traffic under a set of sub-queues, choosing the specific sub-queue based on a hash of the flow address information. This results in traffic from the same flow always being queued in the same list. SFQ then dequeues packets from the sub-queues in a round-robin fashion. The overall effect is that fairness of dequeuing is achieved, because packets from one flow cannot occupy the queues at the exclusion of those of another flow. If the rate class has a parent class, the default queuing method is that of the parent class. If the rate class has no parent class, the default value is sfq. You can create a custom queuing method using the command shaping queue.

Bigpipe Utility Reference Guide 5 - 35

Page 476: BIG IP Reference

Chapter 5

• pfifoThe Priority FIFO queuing method queues all traffic under a set of five sub-queues based on the Type of Service (ToS) field of the traffic. Four of the sub-queues correspond to the four possible ToS values (Minimum delay, Maximum throughput, Maximum reliability, and Minimum cost). The fifth sub-queue represents traffic with no ToS value. The Priority FIFO method processes these five sub-queues in a way that preserves the meaning of the ToS field as much as possible. For example, a packet with the ToS field set to Minimum cost might yield dequeuing to a packet with the ToS field set to Minimum delay.

See also

packet filter(1), shaping policy(1), drop policy(1), shaping queue(1), bigpipe(1)

5 - 36

Page 477: BIG IP Reference

WAN Optimization Command Reference

shaping policyConfigures rate class parameters for handling specific traffic flows.

Syntax

Use this command to customize the parameters for a rate class.

Note

This command is intended only for expert users. Changing these parameters could have an unintended negative impact on traffic shaping. We recommend using the command rate class in most situations.

Create/Modifyshaping policy <shaping policy key> {}

shaping policy (<shaping policy key> | all) [{] <shaping policy arg list> [}]

<shaping policy key> ::=

<name>

<shaping policy arg> ::=

burst <number>

drop policy (<drop policy key> | none)

name <name>

percent ceil <number>

percent rate <number>

queue (<shaping queue key> | none)

Displayshaping policy [<shaping policy key> | all] [show [all]]

shaping policy [<shaping policy key> | all] list [all]

shaping policy (<shaping policy key> | all) burst [show]

shaping policy (<shaping policy key> | all) drop policy [show]

shaping policy (<shaping policy key> | all) name [show]

shaping policy (<shaping policy key> | all) percent ceil [show]

shaping policy (<shaping policy key> | all) percent rate [show]

shaping policy (<shaping policy key> | all) queue [show]

Deleteshaping policy (<shaping policy key> | all) delete

Bigpipe Utility Reference Guide 5 - 37

Page 478: BIG IP Reference

Chapter 5

Description

A shaping policy specifies settings customized for a particular type of traffic. Settings can include drop policy and queue type. You can use the commands shaping queue and drop policy together with the command shaping policy to build a custom rate class.

Examples

Creates a shaping policy called custom that uses a drop policy called tunedfred (created using the command drop policy) with a queue called customsfq (created using the command shaping queue):

shaping policy custom drop policy tunedfred queue customsfq

Options

You can use these options with the shaping policy command:

◆ burstSpecifies the maximum number of bytes that traffic is allowed to burst beyond the rate.

◆ drop policySpecifies the drop policy for this traffic flow, which tells the system when and how to drop packets, if required, when the traffic handling queue is full. The available settings are tail (drops the end of the traffic stream), red (randomly drops packets), and fred (drops packets according to the type of traffic in the flow). The default value is tail. You can create a customized drop policy using the command drop policy.

◆ nameSpecifies a name for the shaping policy. Use this name in the command rate class.

◆ percent ceilSpecifies the percentage of the ceiling specified for the associated parent class that is available for the rate class with which this shaping policy is associated. The default value is 0 (zero).

◆ percent rateSpecifies the percentage of the maximum throughput rate specified for the associated parent class in the command rate class that is available for this traffic flow.

◆ queueSpecifies the queuing method for this traffic flow. The available pre-configuredsettings are pfifo (Priority First in, First out), sfq (Stochastic Fair Queuing), and none. The default value is none. You can create a customized queuing method using the command shaping queue. You cannot use a shaping policy with the queue value none in the command rate class.

5 - 38

Page 479: BIG IP Reference

WAN Optimization Command Reference

See also

rate class(1), shaping queue(1), drop policy(1), bigpipe(1)

Bigpipe Utility Reference Guide 5 - 39

Page 480: BIG IP Reference

Chapter 5

shaping queueConfigures a queuing method that can be applied to rate shaping policies.

Syntax

Use this command to create, modify, display, or delete a queuing method.

Note

This command is intended only for expert users. Changing these parameters could have an unintended negative impact on traffic shaping. We recommend using the command rate class in most situations.

Create/Modifyshaping queue <shaping queue key> {}

shaping queue (<shaping queue key> | all) [{] <shaping queue arg list> [}]

<shaping queue key> ::=

<name>

<shaping queue arg> ::=

name <name>

pfifo max size <number>

pfifo min size <number>

sfq bucket count <number>

sfq bucket size <number>

sfq perturbation <number>

type (none | sfq | pfifo | drr)

Displayshaping queue [<shaping queue key> | all] [show [all]]

shaping queue [<shaping queue key> | all] list [all]

shaping queue (<shaping queue key> | all) name [show]

shaping queue (<shaping queue key> | all) pfifo max size [show]

shaping queue (<shaping queue key> | all) pfifo min size [show]

shaping queue (<shaping queue key> | all) sfq bucket count [show]

shaping queue (<shaping queue key> | all) sfq bucket size [show]

shaping queue (<shaping queue key> | all) sfq perturbation [show]

shaping queue (<shaping queue key> | all) type [show]

Deleteshaping queue (<shaping queue key> | all) delete

5 - 40

Page 481: BIG IP Reference

WAN Optimization Command Reference

Description

The queuing method determines how the rate class handles traffic.

Examples

Creates the shaping queue customsfq that uses Stochastic Fair Queuing with a perturbation value of 10:

shaping queue customsfq type sfq sfq perturbation 10

Options

You can use these options with the shaping queue command:

◆ nameSpecifies a name for the custom queue. Use this name in the command shaping policy or rate class.

◆ pfifo max sizeSpecifies the size in kilobytes (k) or megabytes (m) of the largest queue for the pfifo type only.

◆ pfifo min sizeSpecifies the size in kilobytes (k) or megabytes (m) of the smallest queue for the pfifo type only.

◆ sfq bucket countSpecifies the number of buckets in kilobytes (k) or megabytes (m) into which the queue is divided when you are configuring the sfq type. Valid values are 0, 16, 32, 64, 128, 256, 512, and 1024.

◆ sfq bucket sizeSpecifies the bucket size in kilobytes (k) or megabytes (m) for the sfq type.

◆ sfq perturbationSpecifies the interval in seconds at which the system reconfigures the SFQ hash function. This option applies only to the sfq type.

◆ typeSpecifies the queuing method this custom queue uses. The available values are none, sfq, and pfifo.

• sfqStochastic Fair Queuing is a queuing method that further queues traffic under a set of sub-queues, choosing the specific sub-queue based on a hash of the flow address information. This results in traffic from the same flow always being queued in the same list. SFQ then dequeues packets from the sub-queues in a round-robin fashion. The overall effect is that fairness of dequeuing is achieved, because packets from one flow cannot occupy the queues at the exclusion of those of another flow. If the rate class has a parent class, the default queuing method is that of the parent class. If the rate class has no parent class, the default value is sfq. You can create a custom queuing method using the command shaping queue.

Bigpipe Utility Reference Guide 5 - 41

Page 482: BIG IP Reference

Chapter 5

• pfifoThe Priority FIFO queuing method queues all traffic under a set of five sub-queues based on the Type of Service (ToS) field of the traffic. Four of the sub-queues correspond to the four possible ToS values (Minimum delay, Maximum throughput, Maximum reliability, and Minimum cost). The fifth sub-queue represents traffic with no ToS value. The Priority FIFO method processes these five sub-queues in a way that preserves the meaning of the ToS field as much as possible. For example, a packet with the ToS field set to Minimum cost might yield dequeuing to a packet with the ToS field set to Minimum delay.

See also

rate class(1), drop policy(1), shaping policy(1), bigpipe(1)

5 - 42

Page 483: BIG IP Reference

WAN Optimization Command Reference

wccpConfigures Web Cache Communication Protocol (WCCP) services.

Syntax

Use this command to create, display, modify, or delete WCCP services.

Create/Modifywccp <wccp key> {}

wccp (<wccp key> | all) [{] <wccp arg list> [}]

<wccp key> ::=

<name>

<wccp arg> ::=

cache timeout (<number> | immediate | indefinite)

services (<wccp service list> | none) [add | delete]

wccp name <name>

<wccp service> ::= (<wccp service key> | all) [{] <wccp service arg list> [}]

<wccp service key> ::=

<number>

<wccp service arg> ::=

egress method (negotiated | ip forwarding)

hash fields [destip] [destport] [srcip] [srcport] | none

password (<string> | none)

port (<number list> | none) [add | delete]

port type (none | dest | source)

priority <number>

protocol <protocol>

redirection (gre | l2)

return (gre | l2)

routers (<ip addr list> | none) [add | delete]

traffic assign (hash | mask)

tunnel local addr (<ip addr> | none)

tunnel remote addr (<ip addr> | none) [add | delete]

weight <number>

Displaywccp [<wccp key> | all] [show [all]]

wccp [<wccp key> | all] list [all]

wccp [<wccp key> | all] cache timeout [show]

wccp [<wccp key> | all] services [<wccp service key> | all] [show [all]]

wccp [<wccp key> | all] services [<wccp service key> | all] egress method [show]

wccp [<wccp key> | all] services [<wccp service key> | all] hash fields [show]

Bigpipe Utility Reference Guide 5 - 43

Page 484: BIG IP Reference

Chapter 5

wccp [<wccp key> | all] services [<wccp service key> | all] password [show]

wccp [<wccp key> | all] services [<wccp service key> | all] port [show]

wccp [<wccp key> | all] services [<wccp service key> | all] port type [show]

wccp [<wccp key> | all] services [<wccp service key> | all] priority [show]

wccp [<wccp key> | all] services [<wccp service key> | all] protocol [show]

wccp [<wccp key> | all] services [<wccp service key> | all] redirection [show]

wccp [<wccp key> | all] services [<wccp service key> | all] return [show]

wccp [<wccp key> | all] services [<wccp service key> | all] routers [show]

wccp [<wccp key> | all] services [<wccp service key> | all] traffic assign [show]

wccp [<wccp key> | all] services [<wccp service key> | all] tunnel local addr [show]

wccp [<wccp key> | all] services [<wccp service key> | all] tunnel remote addr [show]

wccp [<wccp key> | all] services [<wccp service key> | all] wccp name [show]

wccp [<wccp key> | all] services [<wccp service key> | all] weight [show]

Deletewccp (<wccp key> | all) delete

DescriptionThe wccp command enables you to create WCCP services and groups of services, or to display, modify, or delete existing WCCP services and groups.

Examples

Displays all wccp services on the system:

wccp all show

Options

You can use these options with the wccp command:

◆ cache timeoutSpecifies the frequency of control messages between the system and the router. The range is from 1 to 10 seconds.

◆ egress methodSpecifies how the return method is determined. The default value is negotiated. Options are:

• negotiatedSpecifies that the system negotiates with the router regarding the return method for optimized traffic, depending on whether the router can support the method specified for the option return.

• ip forwardingSpecifies that the system forwards optimized traffic normally (without tunneling), regardless of the value specified for the option return.

5 - 44

Page 485: BIG IP Reference

WAN Optimization Command Reference

◆ hash fieldsSpecifies which traffic attributes the router should use to determine which BIG-IP system it should forward traffic to for load balancing. You can specify the following options: destination IP address (destip), destination port (destport), source IP address (srcip), and/or source port (srcport).

◆ nameSpecifies the name of a WCCP service group.

◆ passwordSpecifies a password or none.

◆ portSpecifies one or more ports (up to 8) for which traffic is redirected.

◆ port typeSpecifies whether the WCCP interception of traffic is based on the destination port (dest) or source port (source), or is not specified (none). The default value is none.

◆ prioritySpecifies the precedence of the service group relative to the other service groups. The range is from 1 to 255.

◆ protocol Specifies the network protocol used to redirect traffic: TCP or UCP. The default value is tcp.

◆ redirectionSpecifies the method the router uses to redirect traffic: GRE or L2. The default value is gre.

◆ returnSpecifies the method used to return passthrough traffic to the router; GRE or L2. The default value is gre.

◆ routersSpecifies the IP addresses of the WCCP-enabled routers that redirect traffic.

◆ traffic assignSpecifies whether load balancing is achieved by a hash algorithm or a mask. If you specify hash, specify one or more attributes using the option hash fields.

◆ tunnel local addrSpecifies an IP address on the BIG-IP system to which the WCCP-enabled routers should redirect traffic. Specify a self IP address of an external VLAN on the BIG-IP system.

◆ tunnel remote addrSpecifies the Router Identifier IP address of the router that redirects traffic.

◆ WCCP serviceSpecifies a group number between 51 and 255. Numbers between 0 and 50 are reserved and cannot be used.

Bigpipe Utility Reference Guide 5 - 45

Page 486: BIG IP Reference

Chapter 5

◆ weightSpecifies the relative importance of this traffic in a load balancing environment. The range is from 1 to 100.

See also

bigpipe(1)

5 - 46

Page 487: BIG IP Reference

Glossary

Page 488: BIG IP Reference
Page 489: BIG IP Reference

Glossary

administrative partition

An administrative partition is a logical container that you create, containing a defined set of BIG-IP® system objects, such as virtual servers, pools, and profiles. See also pool, profile, and virtual server.

allow list

An allow list displays which service and protocol ports allow connections from outside the system.

ARP (Address Resolution Protocol)

ARP is an industry-standard protocol that determines a host’s Media Access Control (MAC) address based on its IP address.

authentication

Authentication is the process of verifying a user’s identity when the user is attempting to log on to a system.

authentication profile

An authentication profile is a configuration tool that you use to implement a PAM authentication module. Types of authentication modules that you can implement with an authentication profile are: LDAP, RADIUS, TACACS+, SSL Client Certificate LDAP, and OCSP. See also profile.

bigdb

Every BIG-IP system includes a bigdb database. The bigdb database holds a set of bigdb database variables, which define the behavior of various aspects of the BIG-IP system.

bigpipe

The BIG-IP system includes a command line tool known as the bigpipe utility. It consists of an extensive set of commands that you can use to manage the BIG-IP system.

bigtop

The bigtop utility is a statistical monitoring utility that ships on the BIG-IP system. This utility provides real-time statistical information.

CA (certificate authority)

A CA is an external, trusted organization that issues a signed digital certificate to a requesting computer system for use as a credential to obtain authentication for SSL network traffic. See also certificate.

certificate

A certificate is an online credential signed by a trusted certificate authority and used for SSL network traffic as a method of authentication. See also CA (certificate authority).

Bigpipe Utility Reference Guide Glossary - 1

Page 490: BIG IP Reference

Glossary

certificate verification

Certificate verification is the part of an SSL handshake that verifies that a client’s SSL credentials have been signed by a trusted certificate authority. See also certificate.

class

A class is a list of data that you define and use with iRules™ operators. Internal classes are stored in the bigip.conf file. External classes are stored in external files that you define.

client-side SSL profile

A client-side SSL profile is an SSL profile that controls the behavior of SSL traffic going from a client system to the BIG-IP system. See also profile.

clone pool

A clone pool replicates all traffic coming into it and sends that traffic to a duplicate pool. See also pool.

configuration object

A configuration object is a user-created object that the BIG-IP system uses to implement a PAM authentication module. There is one type of configuration object for each type of authentication module that you create.

Configuration utility

The Configuration utility is the browser-based application that you use to configure the BIG-IP system.

connection persistence

Connection persistence is an optimization technique whereby a network connection is intentionally kept open for the purpose of reducing handshaking.

cookie persistence

Cookie persistence is a mode of persistence where the BIG-IP system stores persistent connection information in a cookie.

CRL (certificate revocation list)

A CRL is a list that an authenticating system checks to see if the SSL certificate that the requesting system presents for authentication has been revoked. See also certificate.

CRLDP (Certificate Revocation List Distribution Point)

A CRLDP authentication module is a mechanism for handling certificate revocations on a network, for client connections passing through the BIG-IP system.

Glossary - 2

Page 491: BIG IP Reference

Glossary

current partition

When a user logs in, the system determines the default current partition (usually the Common partition) based on the user’s account. If the user’s account grants permission to access more than one partition, the user can change the current partition, and can also change the default current partition. See also administrative partition.

custom monitor

A custom monitor is a user-created monitor. See also monitor.

custom profile

A custom profile is a profile that you create. A custom profile can inherit its default settings from a parent profile that you specify. See also profile.

default-deny policy

A default-deny policy restricts all network traffic unless it is explicitly permitted.

failover

Failover is the process whereby a standby unit in a redundant system configuration takes over when a software failure or a hardware failure is detected on the active unit. See also redundant system configuration.

floating IP address

An IP address assigned to a VLAN and shared between two computer systems is known as a floating IP address. See also VLAN (virtual local area network).

hash persistence

Hash persistence allows you to create a persistence hash based on an existing iRule. See also iRules.

health monitor

A health monitor checks a node to see if it is up and functioning for a given service. If the node fails the check, it is marked down. Different monitors exist for checking different services. See also monitor.

host

A host is a virtual server that represents a specific site, such as an Internet web site or an FTP site, and it load balances traffic targeted to content servers that are members of a pool. See also virtual server and pool.

HTTP header transformation

When the BIG-IP system performs an HTTP transformation, the system manipulates the Connection header of a server-side HTTP request, to ensure that the connection stays open.

Bigpipe Utility Reference Guide Glossary - 3

Page 492: BIG IP Reference

Glossary

HTTP redirect

An HTTP redirect sends an HTTP 302 Object Found message to clients. You can configure a pool with an HTTP redirect to send clients to another node or virtual server if the members of the pool are marked down. See also virtual server and pool.

ICMP (Internet Control Message Protocol)

ICMP is an Internet communications protocol used to determine information about routes to destination addresses.

interface

An interface is a physical port on a BIG-IP system.

internal VLAN

The internal VLAN is a default VLAN on the BIG-IP system. In a basic configuration, this VLAN has the administration ports open. In a normal configuration, this is a network interface that handles connections from internal servers. See also VLAN (virtual local area network).

iRules

iRules™ are user-written scripts that control the behavior of a connection passing through the BIG-IP system. iRules are an F5 Networks feature and are frequently used to direct certain connections to a non-default load balancing pool. However, iRules can perform other tasks, such as implementing secure network address translation and enabling session persistence.

LACP (Link Aggregation Control Protocol)

LACP is an industry-standard protocol that aggregates links in a trunk, to increase bandwith and provide for link failover.

last hop

A last hop is the final hop a connection takes to get to the BIG-IP system. You can allow the BIG-IP system to determine the last hop automatically to send packets back to the device from which they originated. You can also specify the last hop manually by making it a member of a last hop pool. See also pool.

Layer 1 through Layer 7

Layers 1 through 7 refer to the seven layers of the Open System Interconnection (OSI) model. Thus, Layer 2 represents the data-link layer, Layer 3 represents the IP layer, and Layer 4 represents the transport layer (TCP and UDP). Layer 7 represents the application layer, handling traffic such as HTTP and SSL.

Glossary - 4

Page 493: BIG IP Reference

Glossary

LDAP (Lightweight Directory Access Protocol)

LDAP is an Internet protocol that email programs use to look up contact information from a server.

LDAP authentication module

An LDAP authentication module is a user-created module that you implement on an BIG-IP system to authenticate client traffic using a remote LDAP server. See also LDAP (Lightweight Directory Access Protocol).

link aggregation

The main objective of link aggregation is to provide increased bandwith at a lower cost, without having to upgrade hardware. The bandwidth of the aggregated trunk is the sum of the capacity of individual member links. Thus it provides an option for linearly incremental bandwith as opposed to bandwith options available through physical layer technology. The traffic management system supports link aggregation control protocol (LACP). See also LACP (Link Aggregation Control Protocol).

load balancing method

A load balancing method is a method of determining how to distribute connections across a load balancing pool. See also pool.

local traffic management

Local traffic management is the process of managing network traffic that comes into or goes out of a local area network (LAN), including an intranet.

MAC (Media Access Control)

MAC is a protocol that defines the way workstations gain access to transmission media, and is most widely used in reference to LANs. For IEEE LANs, the MAC layer is the lower sublayer of the data link layer protocol.

MAC address

A MAC address is used to represent hardware devices on an Ethernet network. See also MAC (Media Access Control).

management interface

The management interface is a special port on the BIG-IP system, used for managing administrative traffic. Named MGMT, the management interface does not forward user application traffic, such as traffic slated for load balancing.

management route

A management route is a route that forwards traffic through the special management (MGMT) interface. See also management interface.

Bigpipe Utility Reference Guide Glossary - 5

Page 494: BIG IP Reference

Glossary

MCPD (Master Control Program Daemon) service

The MCPD service manages the configuration data on a BIG-IP system.

MGMT

See management interface.

monitor

The BIG-IP system uses monitors to determine whether nodes are up or down. There are several different types of monitors, and they use various methods to determine the status of a server or service.

monitor association

A monitor association is an association that a user makes between a health or performance monitor and a pool, pool member, or node. See also monitor.

NAT (Network Address Translation)

A NAT is an alias IP address that identifies a specific node managed by the BIG-IP system to the external network.

network virtual server

A network virtual server is a virtual server whose IP address has no bits set in the host portion of the IP address (that is, the host portion of its IP address is 0). There are two kinds of network virtual servers: those that direct client traffic based on a range of destination IP addresses, and those that direct client traffic based on specific destination IP addresses that the BIG-IP system does not recognize. See also virtual server.

node address

A node address is the IP address associated with one or more nodes. This IP address can be the real IP address of a network server, or it can be an alias IP address on a network server.

non-terminated SSL session

A non-terminated SSL session is a session in which the system does not perform the tasks of SSL certificate authentication, encryption and re-encryption. See also SSL (Secure Sockets Layer).

OCSP (Online Certificate Status Protocol)

Online Certificate Status Protocol (OCSP) is a protocol that authenticating systems can use to check on the revocation status of digitally-signed SSL certificates. The use of OCSP is an alternative to the use of a CRL. See also CRL (certificate revocation list).

Glossary - 6

Page 495: BIG IP Reference

Glossary

OCSP responder

An OCSP responder is an external server used for communicating SSL certificate revocation status to an authentication server such as the BIG-IP system. See also OCSP (Online Certificate Status Protocol).

OneConnect

The F5 Networks OneConnect™ feature optimizes the use of network connections by keeping server-side connections open and pooling them for reuse.

packet rate

The packet rate is the number of data packets per second processed by a server.

PAM (pluggable authentication module)

A pluggable authentication module is a mechanism that integrates multiple low-level authentication schemes into a high-level application programming interface.

partition

See administrative partition.

persistence profile

A persistence profile is a pre-configured object that automatically enables persistence when you assign the profile to a virtual server. See also profile.

pool

A pool is composed of a group of network devices (called members). The BIG-IP system load balances requests to the nodes within a pool based on the load balancing method and persistence method you choose when you create the pool or edit its properties.

pool member

A pool member is a server that is a member of a load balancing pool. See also pool.

pre-configured monitor

A pre-configured monitor is a monitor that the BIG-IP system provides. See also monitor.

profile

A profile is a configuration tool containing settings for defining the behavior of network traffic. The BIG-IP system contains profiles for managing FastL4, HTTP, TCP, FTP, SSL, and RTSP traffic, as well as for implementing persistence and application authentication.

Bigpipe Utility Reference Guide Glossary - 7

Page 496: BIG IP Reference

Glossary

profile setting

A profile setting is a configuration attribute within a profile that has a value associated with it. You can configure a profile setting to customize the way that the BIG-IP system manages a type of traffic. See also profile.

QoS (Quality of Service) level

The QoS level is a means by which network equipment can identify and treat traffic differently based on an identifier. Essentially, the QoS level specified in a packet enforces a throughput policy for that packet. See also ToS (Type of Service) level.

rate class

A rate class determines the volume of traffic allowed through a rate filter.

rate shaping

Rate shaping is a type of extended IP filter. Rate shaping uses the same IP filter method but applies a rate class, which determines the volume of network traffic allowed.

redundant system configuration

A redundant system configuration is a pair of units that are configured for failover. In a redundant system configuration, there are two units, one running as the active unit and one running as the standby unit. If the active unit fails, the standby unit takes over and manages connection requests.

self IP address

A self IP address is an IP address that is assigned to the system. Self IP addresses are part of the base configuration. You must define at least one self IP address for each VLAN.

SIP (Session Initiation Protocol) persistence

SIP persistence is a type of persistence used for servers that receive Session Initiation Protocol (SIP) messages sent through UDP. SIP is a protocol that enables real-time messaging, voice, data, and video.

SNAT (Secure Network Address Translation)

A SNAT is a feature you can configure on the BIG-IP system. A SNAT defines a routable alias IP address that one or more nodes can use as a source IP address when making connections to hosts on the external network.

SNAT pool

A SNAT pool is a pool of translation addresses that you can map to one or more original IP addresses. Translation addresses in a SNAT pool are not self-IP addresses. See also pool.

Glossary - 8

Page 497: BIG IP Reference

Glossary

SSH (Secure Shell)

SSH is a protocol for secure remote logon and other secure network services over a non-secure network.

SSL (Secure Sockets Layer)

Secure Sockets Layer (SSL) is a network communications protocol that uses public-key technology as a way to transmit data in a secure manner.

SSL persistence

SSL persistence is a type of persistence that tracks non-terminated SSL sessions, using the SSL session ID. See also SSL (Secure Sockets Layer).

SSL profile

An SSL profile is a configuration tool that you use to terminate and initiate SSL connections from clients and servers. See also SSL (Secure Sockets Layer) and profile.

STP (Spanning Tree Protocol)

Defined by IEEE, STP is a protocol that provides loop resolution in configurations where one or more external switches are connected in parallel with the BIG-IP system.

TACACS (Terminal Access Controller Access Control System)

TACACS is an older authentication protocol common to UNIX systems. TACACS allows a remote access server to forward a user’s logon password to an authentication server. See also TACACS+.

TACACS+

TACACS+ is an authentication mechanism designed as a replacement for the older TACACS protocol. There is little similarity between the two protocols, however, and they are therefore not compatible. See also TACACS (Terminal Access Controller Access Control System).

Tcl (Tools Command Language)

Tcl is an industry-standard scripting language. On the BIG-IP system, users use Tcl to write iRules. See also iRules.

TMM (Traffic Management Microkernel) service

The TMM service is the process running on the BIG-IP system that performs most traffic management for the product.

ToS (Type of Service) level

The ToS level is another means, in addition to the QoS level, by which network equipment can identify and treat traffic differently based on an identifier. See also QoS (Quality of Service) level.

Bigpipe Utility Reference Guide Glossary - 9

Page 498: BIG IP Reference

Glossary

trunking

Trunking is link aggregation that allows multiple physical links to be treated as one logical link. The main objective of link aggregation is to provide increased bandwidth at a lower cost, without having to upgrade hardware. The bandwidth of the aggregated trunk is the sum of the capacity of individual member links. Thus it provides an option for linearly incremental bandwidth as opposed to bandwidth options available through physical layer technology. The traffic management system supports LACP (Link Aggregation Control Protocol).

trusted CA file

A trusted CA file is a file containing a list of certificate authorities that an authenticating system can trust when processing client requests for authentication. A trusted CA file resides on the authenticating system and is used for authenticating SSL network traffic. See also CA (certificate authority).

trusted MAC address

A trusted MAC address is a MAC address that passes MAC address-based authentication. See also MAC address.

user role

A user role is a type and level of access that you assign to a BIG-IP system user account. By assigning user roles, you can control the extent to which BIG-IP system administrators can view or modify the BIG-IP system configuration.

virtual address

A virtual address is an IP address associated with one or more virtual servers managed by the BIG-IP system.

virtual server

A virtual server is a specific combination of virtual address and virtual port, associated with a content site that is managed by an BIG-IP system or other type of host server.

VLAN (virtual local area network)

A virtual local area network (VLAN) is a logical grouping of interfaces connected to network devices. You can use a VLAN to logically group devices that are on different network segments. Devices within a VLAN use Layer 2 networking to communicate and define a broadcast domain.

VLAN group

A VLAN group is a logical container that includes two or more distinct VLANs. VLAN groups are intended for load balancing traffic in a Layer 2 network, when you want to minimize the reconfiguration of hosts on that network. See also VLAN (virtual local area network).

Glossary - 10

Page 499: BIG IP Reference

Index

Page 500: BIG IP Reference
Page 501: BIG IP Reference

Index

Aadditional information

in BIG-IP Local Traffic Manager Implementations 1-2

in bigpipe man pages 1-6in the BIG-IP Systems Getting Started Guide 1-1in the Configuration Guide for the BIG-IP WAN

Optimization Module 5-1in the Configuration Guide for the VIPRION System

1-2in the TMOS Management Guide for BIG-IP Systems

1-1in the Traffic Management Shell (tmsh) Reference

Guide 1-2on Ask F5 1-6on Configuration utility Welcome screen 1-6on support.f5.com 1-6

arp command 3-3auth crldp command 3-5auth krbdelegate command 3-7auth ldap command 3-9auth radius command 3-14auth ssl cc ldap command 3-17auth ssl ocsp command 3-22auth tacacs command 3-24

BBIG-IP Local Traffic Manager Implementations 1-2BIG-IP Systems Getting Started Guide 1-1bigpipe shell

and command completion 2-3and command continuation 2-3and command history 2-2and escape feature 2-5and grep functionality 2-4and log file 2-2controlling 2-1customizing 2-4using 2-1using command continuation 3-314

bigpipe shell command 3-27bigpipe shell prompt, customizing 2-4bigpipe utility

and command list 2-6defined 1-2using man pages 1-6

bigstart command 1-2bigtop utility

defined 1-2

Cclass command 3-29cli audit command 2-3cli command 3-33

cluster command 4-2cluster synchronization 4-3command completion 2-3command continuation 2-3, 3-314command history 2-2command line utilities and tools 1-2command summary 2-6command syntax for bigpipe shell command, identifying 1-4commands

See individual command entries.config command 3-36config utility, defined 1-2configsync command 3-39Configuration Guide for BIG-IP Local Traffic Management 1-1Configuration Guide for the BIG-IP WAN Optimization Module 5-1Configuration Guide for the VIPRION System 1-2Configuration utility

about Welcome screen 1-6conn command 3-42crldp server command 3-44

Ddaemon command 3-46daemon command, on VIPRION systems 4-6daemon mcpd command 3-49daemon tmm command 3-51datastor command 5-2db command 3-54deduplication command 5-4dns command 3-56drop policy command 5-5

Eendpoint advertised route command 5-8endpoint discovery command 5-10endpoint local command 5-13endpoint remote command 5-16endpoint remote route command 5-20escape feature, using in the bigpipe shell 2-5exit command 2-1, 3-58export command 3-59

Ff5adduser command 3-61failover command 3-63failover command, on VIPRION systems 4-9fasthttp command 3-67fastL4 command 3-68fastl4 command 3-67finding help 1-6

Bigpipe Utility Reference Guide Index - 1

Page 502: BIG IP Reference

Index

fipscardsync command 3-69fipsutil command 3-70formatting conventions 1-4ftp command 3-73

Ggencert utility

defined 1-2global command 3-74grep functionality 2-4

Hha table command 3-75hardware command 3-77help command 3-78help, finding 1-6http command 3-79httpd command 3-80

Iicmp command 3-84import command 3-85interface command 3-87ip addr command 3-92ip command 3-91iRules

and Tcl commands 1-3

Llist command 3-94load command 3-95log file 2-2logrotate command 3-98ltm command 3-100

Mmac addr command 3-104man pages

about 1-6accessing from shell prompt 1-6accessing from system prompt 1-6

mcp command 3-105memory command 3-106merge command 3-107mgmt command 3-109mgmt route command 3-111mirror command 3-113monitor command 3-115

Nnat command 3-130ndp command 3-133

node command 3-135ntp command 3-138

Oocsp responder command 3-140oneconnect command 3-145opening brace, using in command syntax 2-4openssl utility 1-3

Ppacket filter command 3-146partition command 3-152password policy command 3-154persist command 3-157platform command 3-161Platform Guides 1-2pool command 3-163pool command, on VIPRION systems 4-14profile auth command 3-170profile cifs command 5-22profile clientssl command 3-175profile command 3-169profile dns command 3-183profile fasthttp command 3-185profile fastl4 command 3-190profile ftp command 3-195profile http command 3-197profile httpclass command 3-208profile isession command 5-25profile mapi command 5-29profile oneconnect command 3-211profile persist command 3-214profile rtsp command 3-221profile sctp command 3-224profile sip command 3-236profile tunnel command 5-31pva command 3-255

Qquit command 2-1

Rrate class command 5-33references to other documents, identifying 1-4remote users command 3-262remoterole command 3-264route domain command 3-269rtsp command 3-271

Ssave command 3-275sctp command 3-277shaping policy command 5-37

Index - 2

Page 503: BIG IP Reference

Index

shaping queue command 5-40shell prompt, accessing man pages from 1-6SIP profile 3-236snat command 3-284snat translation command 3-286snatpool command 3-288snmpd command 3-290software command 3-303software command, on VIPRION systems 4-23solution examples, about 1-4sshd command 3-307ssl command 3-311statemirror command 3-312stop command 2-1, 3-314stp command 3-315stp instance command 3-318stream command 3-322style conventions 1-4support, technical 1-6sys-icheck command 3-323syslog command 3-325sys-reset command 3-324system command 3-329system command, on VIPRION systems 4-28system prompt

accessing man pages from 1-6identifying command syntax 1-5

TTcl, defined 1-3tcp command 3-334technical support 1-6tmm command 3-335TMOS Management Guide for BIG-IP Systems 1-1Tools Command Language 1-3Traffic Management Shell (tmsh) Reference Guide 1-2trunk command 3-339

Uudp command 3-342unit command 3-343user command 3-344

Vversion command 3-347VIPRION system, commands for configuring 4-1virtual address command 3-354virtual command

and command syntax 3-348vlan command 3-357vlan command, on VIPRION systems 4-33vlangroup command 3-361

WWAN optimization 5-1WAN Optimization Module, commands for configuring 5-1wccp command 5-43Welcome screen, in the Configuration utility 1-6wide area network optimization 5-1

Bigpipe Utility Reference Guide Index - 3

Page 504: BIG IP Reference

Index

Index - 4