Known Issue: Importing a BIG-IP APM access profile may fail
(SOL15850) Description Importing a BIG-IP APM access profile may fail. This issue occurs when all of the following conditions are met: You have configured the access profile with an SSL certificate...
View ArticleInformational: Lithium battery certifications for BIG-IP hardware platforms
(SOL11276) Each F5 platform contains a Lithium coin cell battery on the motherboard that is used to power non-volatile memory when the system is powered off. Some industries require the certification...
View ArticleInformational: VIPRION 2400 power cable options and requirements
(SOL13435) Summary The VIPRION 2400 requires a platform-specific power cable. The cable is rated to 20A and is included with the device. Description The available termination profiles and voltage...
View ArticleInformational: BIG-IP APM support for Active-Active high availability
(SOL13983) BIG-IP APM does not currently supportBIG-IP device service clustering (DSC) technology or active-active configurations. BIG-IP APM high availability failover is currently only supported on...
View ArticleHow-To: Analyzing SMTP server responses for use in rules or health checks
(SOL2446) Purpose You should consider using this procedure under the following condition: You want to use telnet to manually test mail server transactions and view the SMTP server response....
View ArticleOverview: Overview of Layer 2 (L2) forwarding virtual servers
(SOL4362) Layer 2 (L2) forwarding virtual servers are similar to IP forwarding virtual servers because they do not have pool members to load balance. Therefore, when the BIG-IP LTM system evaluates the...
View ArticleInformational: Batteries included in F5 hardware platforms
(SOL2848) Each F5 platform contains a lithium coin cell battery on the motherboard that is used to power non-volatile memory when the system is powered off. The battery is used to keep the real-time...
View ArticleInformational: Session variable logging within an access policy
(SOL11253) Using the BIG-IPAPM system, you can configure selective logging in an access policy. The system can capture individual session variables in the log file, which the system can use inmany...
View Article