Release Note: BIG-IP PEM 11.6.0
This release note documents the version 11.6.0 release of BIG-IP Policy Enforcement Manager (PEM).
View ArticleInformational: Most recent versions of F5 software
(SOL2200) To find the latest software version for your F5 product, view one of the following tables: The latest software versions for products that follow the F5 software life cycle policy The latest...
View ArticleInformational: Content length limits for HTTP and HTTPS health monitors
(SOL3451) An HTTP health monitor reads up to 5,120 bytes into HTTP data (including the HTTP response headers). If the monitor cannot find a match to the configured search string within the first 5,120...
View ArticleInformational: List of disabled Tcl commands for iRules (11.x)
(SOL15909) This article applies to BIG-IP 11.x.For information about other versions, refer to the following article: SOL6319: List of disabled Tcl commands for iRules (9.x - 10.x) The iRules feature of...
View ArticleInformational: List of disabled Tcl commands for iRules (9.x - 10.x)
(SOL6319) This article applies to BIG-IP 9.x through 10.x.For information about other versions, refer to the following article: SOL15909: List of disabled Tcl commands for iRules (11.x) The iRules...
View ArticleInformational: The version of Tcl used to develop iRules
(SOL6091) The BIG-IP iRules feature uses the industry-standard Tool Command Language (Tcl), which you can use to create scripts for managing local network traffic. The BIG-IP iRules command set was...
View ArticleInformational: Information required when opening a support case for BIG-IP AAM
(SOL14453) Note: For information about opening a support case for other F5 products, refer to SOL2633: Instructions for submitting a support case to F5. F5 Technical Support can help resolve issues...
View ArticleHow-To: Subscribing to email notifications regarding F5 products
(SOL9970) Note: For information about using an RSS reader to receive information for new and updated information from F5, refer to SOL9957: Creating a custom RSS feed to view new and updated documents....
View ArticleKnown Issue: The SIP monitor may erroneously mark resources down
(SOL15051) Description The Session Initiation Protocol (SIP) monitor may erroneously mark resources down. This issue occurs when the following condition is met: The SIP monitor is configured to use...
View ArticleKnown Issue: The lopd process may temporarily lose connectivity to the LOP LBH
(SOL14898) Description The lopd process may temporarily lose connectivity to the lights-out processor (LOP)Backplane Micro-Controller Hybrid (LBH). This issue occurs when the following condition is...
View ArticleOverview: Overview of maintenance mode
(SOL11787) Maintenance mode is a feature which allows an administrator to prepare the BIG-IP system for maintenance. When enabled, the BIG-IP system stops accepting new connections and slowly completes...
View ArticleHow-To: Forcing a file system check on the next system reboot
(SOL10328) The fsck utility can scan the file system for errors, and correct those errors if possible. To correct errors, the file systemsmust be unmounted. Performing a file system check using thefsck...
View ArticleHow-To: Using regular expressions in a health monitor Receive String
(SOL5917) Some BIG-IP application health monitors, suchas the HTTP monitor,include a Receive String field. This field specifies a string for comparison with the server response. Youcan specify a...
View ArticleInformational: Support for RFC4279: Pre-Shared Key Ciphersuites for Transport...
(SOL8871) The BIG-IP system does not currently support the use of pre-shared key ciphersuites (PSK) for Transport Layer Security (TLS), as defined in RFC4279. The following list includes the PSK...
View ArticleHow-To: Installing a UCS file containing an encrypted passphrase
(SOL9420) Passphrases are stored in the configuration file in encrypted format. The BIG-IP system uses a hardware-key encrypted master key to encrypt and decrypt passphrases contained in the...
View Article