Applies To:

Show Versions Show Versions

Manual Chapter: Upgrading Version 10.x BIG-IP Active-Active Systems
Manual Chapter
Table of Contents

Overview: Upgrading BIG-IP active-active systems

A BIG-IP system active-active pair for version 10.x includes two BIG-IP systems operating in active mode (Device A and Device B).
Important: In order to upgrade version 10.0.0 or 10.0.1 to the new version software, you must first upgrade to version 10.1.0 or 10.2.x, and then upgrade version 10.1.0 or 10.2.x to the new version software.
A version 10.x active-active pair A version 10.x active-active pair

After preparing the devices for an upgrade to the new version software, you force Device B to offline mode, and then install the new version software onto Device B (the offline device).

Important: Once Device B reboots, if the BIG-IP system is configured to use a network hardware security module (HSM), you must reinstall network HSM client software on Device B before upgrading Device A, to ensure that traffic groups using the network HSM function properly.
A version 10.x active-offline pair A version 10.x active-offline pair

When you finish the installation of the new version software onto Device B, it creates two traffic groups called traffic-group-1 and traffic-group-2. Each traffic group is in standby state on Device B, and Device A (the version 10.x device) is in active mode. You can then force Device A to offline mode, changing both the new version software traffic groups to active state on Device B. Note that the Unit ID that was used in version 10.x becomes obsolete in the new version software.

A version 10.x device in standby mode and new version software traffic groups in active     state A version 10.x device in offline mode and the new version software traffic groups in active state
You then install the new version software onto Device A.
Important: Once Device A reboots, if the BIG-IP system is configured to use a network HSM, you must reinstall network HSM client software on Device A to ensure that traffic groups using the network HSM function properly.

When you complete upgrading both devices to the new version software, the BIG-IP system configuration includes traffic-group-1 and traffic-group-2 in active state on Device B, a traffic-group-1 and traffic-group-2 in standby state on Device A, and a device group that includes both devices.

New version software traffic groups in active state on an upgraded device The new version software traffic groups in active state on an upgraded device

Once each device is upgraded to the new version software, you can reconfigure the traffic groups to become active on the devices that you want by forcing the active traffic group on a device to standby state. When forcing the traffic group to standby state, you can target the device upon which you want that traffic group to run in active state. For example, you can force traffic-group-1 on Device B into standby state, and into active state on Device A. Additionally, if you use HA groups, you can create a unique HA group for each traffic group on each device.

New version software traffic groups in active state on two different devices The new version software traffic groups in active state on two different devices

An upgrade of BIG-IP active-active systems to the new version software involves the following tasks.

Task Description
Preparing Device A (active mode on the BIG-IP 1 system) and Device B (active mode on the BIG-IP 2 system) In preparing to upgrade the active-active BIG-IP systems to the new version software, you need to understand any specific configuration or functional changes from the previous version, and prepare the systems. You also download the new version of software from the AskF5 web site (www.askf5.com) and import the files onto each device.
Forcing Device B to offline mode When you complete preparing the Device B, you can force Device B to offline mode.
Upgrading Device B (the offline mode BIG-IP 2 system) Once Device B is in offline mode, you can upgrade the software on that device, and reboot Device B to the location of the new version software image. Device B completes rebooting with traffic-group1 and traffic-group-2 in standby state.
Important: Once Device B reboots, if the BIG-IP system is configured to use a network hardware security module (HSM), you must reinstall network HSM client software on Device B before upgrading Device A, to ensure that traffic groups using the network HSM function properly.
Forcing Device A to offline mode When Device B completes rebooting to the location of the new version software image, you can force Device A to offline mode, changing traffic-group-1 and traffic-group-2 on Device B to active state.
Upgrading Device A (the offline mode BIG-IP 1 system) Once Device A is in offline mode, you can upgrade the software on Device A. When Device A completes rebooting, traffic-group-1 and traffic-group-2 are in standby state on Device A.
Important: Once Device A reboots, if the BIG-IP system is configured to use a network HSM, you must reinstall network HSM client software on Device A to ensure that traffic groups using the network HSM function properly.
Changing states of traffic groups When you finish upgrading all of the devices, you can restore the configuration of active traffic groups on each device.
Verifying the upgrade Finally, you should verify that your active traffic groups on the BIG-IP systems are functioning properly.
Configuring HA groups When you finish upgrading a device, the HA group on the device (in version 11.5, and later) applies to a traffic group, as opposed to the device. You can create a unique HA group for each traffic group on each device, as necessary.
Configuring module-specific settings According to your understanding of the configuration and functional changes from the previous version, you can reconfigure any customized module settings.

About new BIG-IP system configuration components

BIG-IP redundant system configuration is based on a few key components.

Devices

A device is a physical or virtual BIG-IP system, as well as a member of a local trust domain and a device group. Each device member has a set of unique identification properties that the BIG-IP system generates.

Device groups

A device group is a collection of BIG-IP devices that trust each other and can synchronize, and sometimes fail over, their BIG-IP configuration data.

Important: To configure redundancy on a device, you do not need to explicitly specify that you want the BIG-IP device to be part of a redundant configuration. Instead, this occurs automatically when you add the device to an existing device group.

You can create two types of devices groups:

Sync-Failover
A Sync-Failover device group contains devices that synchronize configuration data and support traffic groups for failover purposes when a device becomes unavailable.
Sync-Only
A Sync-Only device group contains devices that synchronize configuration data, such as policy data, but do not synchronize failover objects.

A BIG-IP device can be a member of only one Sync-Failover group. However, a device can be a member of both a Sync-Failover device group and a Sync-Only device group.

To minimize issues with config sync, failover, or mirroring, F5 Networks recommends as a best practice that devices in a device group match as closely as possible with respect to hardware platform, product licensing, and module provisioning. At a minimum, mirroring requires that the hardware platforms of the mirrored devices match, and config sync between devices requires that the devices are running the same version of BIG-IP system software.

Traffic groups

A traffic group is a collection of related configuration objects (such as a virtual IP address and a self IP address) that run on a BIG-IP device and process a particular type of application traffic. When a BIG-IP device becomes unavailable, a traffic group can float to another device in a device group to ensure that application traffic continues to be processed with little to no interruption in service.

Device trust and trust domains

Underlying successful operation of device groups and traffic groups is a feature known as device trust. Device trust establishes trust relationships between BIG-IP devices on the network, through mutual certificate-based authentication. A trust domain is a collection of BIG-IP devices that trust one another and can therefore synchronize and fail over their BIG-IP configuration data, as well as exchange status and failover messages on a regular basis. A local trust domain is a trust domain that includes the local device, that is, the device you are currently logged in to.

Folders and sub folders

Folders and sub-folders are containers for the configuration objects on a BIG-IP device. For every administrative partition on the BIG-IP system, there is a high-level folder. At the highest level of the folder hierarchy is a folder named root. The BIG-IP system uses folders to affect the level of granularity to which it synchronizes configuration data to other devices in the device group. You can create sub-folders within a high-level folder, using tmsh.

Note: In most cases, you can manage redundancy for all device group members remotely from one specific member. However, there are cases when you must log in locally to a device group member to perform a task. An example is when resetting device trust on a device.

About traffic groups

A traffic group is a collection of related configuration objects that run on a BIG-IP device. Together, these objects process a particular type of traffic on that device. When a BIG-IP device becomes unavailable, a traffic group floats (that is, fails over) to another device in a device group to ensure that application traffic continues to be processed with little to no interruption in service. In general, a traffic group ensures that when a device becomes unavailable, all of the failover objects in the traffic group fail over to any one of the devices in the device group, based on the number of active traffic groups on each device.

A traffic group is initially active on the device on which you create it, until the traffic group fails over to another device. For example, if you initially create three traffic groups on Device A, these traffic groups remain active on Device A until one or more traffic groups fail over to another device. If you want to balance the traffic group load among all devices in the device group, you can intentionally cause a traffic group to fail over to another device. You do this using the Force to Standby option of the Configuration utility.

Important: Although a specific traffic group can be active on only one device in a device group, the traffic group actually resides and is in a standby state on all other device group members, due to configuration synchronization.

Only certain types of configuration objects can belong to a traffic group. Examples of traffic group objects are self IP addresses and virtual IP addresses.

An example of a set of objects in a traffic group is an iApps application service. If a device with this traffic group is a member of a device group, and the device becomes unavailable, the traffic group floats to another member of the device group, and that member becomes the device that processes the application traffic.

When a traffic group fails over to another device in the device group, the device that the system selects is normally the device with the least number of active traffic groups. When you initially create the traffic group on a device, however, you specify the device in the group that you prefer that traffic group to run on in the event that the available devices have an equal number of active traffic groups (that is, no device has fewer active traffic groups than another). Note that, in general, the system considers the most available device in a device group to be the device that contains the fewest active traffic groups at any given time.

Note: A Sync-Failover device group can support a maximum of 15 traffic groups.

Task summary

The upgrade process involves preparation of the two BIG-IP devices (Device A and Device B) configured in an active-active implementation, followed by the installation and verification of the new version software on each device. When you upgrade each device, you perform several tasks. Completing these tasks results in a successful upgrade to the new version software on both BIG-IP devices, with an active traffic group configured properly on each device.
Important: In order to upgrade version 10.0.0 or 10.0.1 to the new version software, you must first upgrade to version 10.1.0 or 10.2.x, and then upgrade version 10.1.0 or 10.2.x to the new version software.

Preparing BIG-IP modules for an upgrade from version 10.x to the new version software

Before you upgrade the BIG-IP system from version 10.x to the new version software, you might need to manually prepare settings or configurations for specific modules.

Access Policy Manager system preparation

Access Policy Manager is not supported in an Active-Active configuration.

Supported high availability configuration for Access Policy Manager

Access Policy Manager is supported in an Active-Standby configuration with two BIG-IP systems only.

Important: Access Policy Manager is not supported in an Active-Active configuration.

Application Security Manager system preparation

The BIG-IP Application Security Manager (ASM) system does not require specific preparation when upgrading from version 10.x to the new version software. No additional configuration is required after completing the upgrade to the new software version.

What to expect after upgrading a redundant system

If you update two redundant systems that are running as an active-standby pair with BIG-IP Application Security Manager (ASM) and BIG-IP Local Traffic Manager (LTM) provisioned, the system maintains the active-standby status and automatically creates a Sync-Failover device group and a traffic group containing both systems. The device group is enabled for BIG-IP ASM (because both systems have ASM provisioned).

You can manually push or pull the updates (including BIG-IP LTM and ASM configurations and policies) from one system to the other (Device Management > Device Groups, then click Config Sync and choose Synchronize TO/FROM Group).

Global Traffic Manager system preparation and configuration

BIG-IP Global Traffic Manager systems require specific preparation tasks and changes to upgrade from version 10.x to the new version software.

Preparation Activities

Before you upgrade Global Traffic Manager systems that are in a synchronization group, from any software version to the new version software, you must install the software on an inactive volume on each device using Live Install. After you upgrade each device, you then switch all devices to the new volume at the same time. This is required because devices in a synchronization group that includes the new version software device, cannot effectively probe each other.

Post-upgrade changes

The following feature or functionality changes occur after you complete the upgrade process to the new version software:

Feature or Functionality Description
Assigning a BIG-IP system to probe a server to gather health and performance data Assigning a single BIG-IP system to probe a server to gather health and performance data, in version 10.x, is replaced by a Prober pool in the new software version.

Link Controller system preparation

The BIG-IP Link Controller (LC) system does not require specific preparation when upgrading from version 10.x to the new version software. No additional configuration is required after completing the upgrade to the new version software.

Local Traffic Manager system preparation

The BIG-IP Local Traffic Manager (LTM) system does not require specific preparation when upgrading from version 10.x to the new version software. No additional configuration is required after completing the upgrade to the new version software.

MAC masquerade addresses for VLANs
Note: If you configured MAC Masquerade addresses for VLANs on the version 10.x devices, one of the addresses will be included automatically in the MAC Masquerade Address field for traffic-group-1 during the upgrade.

Protocol Security Manager preparation

The BIG-IP Protocol Security Manager (PSM) does not require specific preparation when upgrading from version 10.x to the new version software. No additional configuration is required after completing the upgrade to the new version software.

WebAccelerator module preparation and configuration

BIG-IP WebAccelerator modules require specific preparation tasks and changes to upgrade from version 10.x to the new version software.

Preparation activities

Before you upgrade the WebAccelerator modules from version 10.x to the new software version, you need to prepare the systems, based on your configuration. The following table summarizes the applicable tasks that you need to complete.

Feature or Functionality Preparation Task
Symmetric deployment You must reconfigure symmetric WebAccelerator modules as asymmetric systems before you upgrade them from version 10.x to the new version software.
Unpublished policies You must publish any policies that you want to migrate to the new software version. Only published policies are migrated into the new version software.
Signed policies Signed policies are not supported in the new version software. If you use signed policies, you must replace them with predefined or user-defined policies before upgrading.
Configuration files Upgrading from version 10.x to the new version software does not include custom changes to configuration files. After upgrading to the new version software, you need to manually restore any customizations made to your configuration files by using the Configuration utility or Traffic Management Shell (tmsh). The following list includes examples of configuration files that might have been customized:
  • /config/wa/globalfragment.xml.10.x.0; in the new software version, all objtype entries are provided in tmsh.
  • /config/wa/pvsystem.conf.10.x.0
  • /config/wa/pvsystem.dtd.10.x.0
  • /config/wa/transforms/common.zip.10.x.0; the new software version does not include transforms.
Debug Options X-PV-Info response headers in version 10.x are changed to X-WA-Info response headers in the new software version. The default setting for X-WA-Info Headers is None (disabled). To use X-WA-Info response headers, you will need to change this setting, and update any associated iRules or scripts, accordingly.
Post-upgrade activities

When you complete upgrading to the new version software, you should consider the following feature or functionality changes that occur. Depending upon your configuration, you might need to perform these changes after you upgrade the systems.

Feature or Functionality Description
Web acceleration Web acceleration functionality requires configuration of the Web Acceleration profile.
Important: You must enable a WebAccelerator application in the Web Acceleration profile to enable the WebAccelerator system.
Compression Compression functionality requires configuration of the HTTP Compression profile in the new version software.
Request logging Request logging does not migrate to the new version software. You must recreate the configuration after upgrading by using the Request Logging profile.
Policy logging Policy logging does not migrate to the new version software. You must recreate the configuration after upgrading by using the Request Logging profile.
URL normalization URL normalization is not supported in the new version software.
ESI functionality Edge Side Include (ESI) functionality in the Application Acceleration Manager module is not supported in the new version software, with the exception of ESI invalidations.
iControl backward compatibility Backward compatibility for iControl Compression and RAM Cache API settings in the HTTP profile is not supported in the new version software. These settings appear in the HTTP Compression and Web Acceleration profiles in the new software version.

WAN Optimization Manager preparation

BIG-IP WAN Optimization Manager (WOM) systems do not require specific preparation when upgrading from version 10.x to the new version software. However, in a redundant system configuration, you must upgrade the standby system first (to avoid interrupting traffic on the active system), and then upgrade the other system. No additional configuration is required after completing the upgrade to the new version software.

Preparing BIG-IP active-active systems for an upgrade

The following prerequisites apply when you upgrade BIG-IP active-active devices from version 10.x to the new version software.
  • The BIG-IP systems (Device A and Device B) are configured as an active-active pair.
  • Each BIG-IP device is running the same version of 10.x software.
  • The BIG-IP active-active devices are the same model of hardware.
When you upgrade a BIG-IP active-active pair from version 10.x to the new version software, you begin by preparing the devices.
Note: If you prefer to closely observe the upgrade of each device, you can optionally connect to the serial console port of the device that you are upgrading.
  1. For each device, complete the following steps to prepare the configuration and settings.
    1. Examine the Release Notes for specific configuration requirements, and reconfigure the systems, as necessary. For example, you must reconfigure version 10.x symmetric WebAccelerator modules as asymmetric systems before upgrading to the new version software.
    2. Examine the Release Notes for specific changes to settings that occur when upgrading from version 10.x to the new version software, and complete any in-process settings. For example, you must publish any unpublished BIG-IP WebAccelerator module policies in order for them to migrate to the new version software.
  2. For each device, synchronize the configuration.
    1. On the Main menu, click System > High Availability > Device Connectivity > ConfigSync. A message appears for the Status Message.
    2. As indicated by the Status Message, click one of the following buttons.
      • Synchronize TO Peer
      • Synchronize FROM Peer
  3. For each device, click System > High Availability > Redundancy, and, from the Redundancy State Preference list, select None.
  4. For each device, create a backup file.
    1. Access the tmsh command line utility.
    2. At the prompt, type save /sys ucs /shared/filename.ucs.
    3. Copy the backup file to a safe location on your network.
  5. Download the BIG-IP new version software .iso file, and, if available, latest hotfix .iso file from the AskF5 downloads web site (https://downloads.f5.com) to a preferred location.
  6. Using a tool or utility that computes an md5 checksum, verify the integrity of the BIG-IP new version software .iso file.
  7. Import either the latest BIG-IP system hotfix image file, if available, or the new version software image file to each device.
    Option Description
    Import the latest BIG-IP system hotfix image file
    1. On the Main menu, click System > Software Management > Hotfix List > Import.
    2. Click Browse, locate and click the image file, click Open, and click Import.
    3. When the hotfix image file completes uploading to the BIG-IP device, click OK. A link to the image file appears in the Software Image list.
    Import the new version software image file
    1. On the Main menu, click System > Software Management > Image List > Import.
    2. Click Browse, locate and click the image file, click Open, and click Import.
    3. When the software image file completes uploading to the BIG-IP device, click OK. A link to the image file appears in the Software Image list.
The BIG-IP devices are now prepared to install the latest hotfix or new version software onto Device B (the active BIG-IP 2 device).

Upgrading the active BIG-IP 2 system

The following prerequisites apply for this task.
  • Device A (the active BIG-IP 1 system) and Device B (the active BIG-IP 2 system) must be prepared to upgrade Device B with the new version software.
  • Either the latest hotfix image file, if available, or the new version software image file is downloaded and accessible.
After you prepare Device A (the active BIG-IP 1 system) and Device B (the active BIG-IP 2 system) for upgrading the software, you can perform these steps to install the new version software onto Device B.
  1. Force Device B to offline mode.
    1. On the Main menu, click System > High Availability > Redundancy.
    2. Click Force Offline. The BIG-IP device (Device B) changes to offline mode.
  2. Reactivate the software license.
    1. On the Main menu, click System > License.
    2. Click Re-activate.
    3. In the Activation Method area, select the Automatic (requires outbound connectivity) option.
    4. Click Next. The BIG-IP software license renews automatically.
    5. Click Continue.
  3. Install either the latest hotfix image, if available, or the new version software.
    Option Description
    Install the latest hotfix image
    1. On the Main menu, click System > Software Management > Hotfix List.
    2. In the Available Images area, select the check box for the hotfix image, and click Install. The Install Software Hotfix popup screen opens.
    3. From the Volume set name list, select the location of the new version software volume to install the hotfix image, and click Install.
      Important: In the Install Status list for the specified location, a progress bar indicates the status of the installation. Ensure that installation successfully completes, as indicated by the progress bar, before proceeding.
    Install the new version software
    1. On the Main menu, click System > Software Management > Image List.
    2. In the Available Images area, select the check box for the new version software image, and click Install. The Install Software Image popup screen opens.
    3. From the Volume set name list, select a location to install the image, and click Install.
      Important: In the Install Status list for the specified location, a progress bar indicates the status of the installation. Ensure that installation successfully completes, as indicated by the progress bar, before proceeding.
  4. Reboot the BIG-IP device (Device B) to the location of the installed new version version software image.
    Important: Once Device B reboots, if the BIG-IP system is configured to use a network HSM, you must reinstall network HSM client software on Device B to ensure that traffic groups using the network HSM function properly.
    1. On the Main menu, click System > Software Management > Boot Locations.
    2. In the Boot Location list, click the boot location of the installed new version software image.
    3. Click Activate. The BIG-IP device (Device B) reboots to the new version software boot location with traffic-group-1 and traffic-group-2 in standby state.
      Note: If the device appears to be taking a long time to reboot, do not cycle the power off and on. Instead, verify the status of the device by connecting to its serial console port. The device might be performing firmware upgrades.
The new version software is installed on Device B, with traffic-group-1 and traffic-group-2 in standby state.

Upgrading the active BIG-IP 1 system

The following prerequisites apply in upgrading Device A (the BIG-IP 1 system).
  • Device A (the version 10.x BIG-IP 1 system) must be prepared to upgrade the software to the new version software.
  • Device A is in active mode.
  • Device B (the new version software BIG-IP device with traffic-group-1 and traffic-group-2 in standby state) is in standby state.
  • Either the latest hotfix image file, if available, or the new version software image file is downloaded and accessible.
After you prepare Device A (the active BIG-IP 1 system) for upgrading the software, you can perform these steps to upgrade the software to the new version software.
  1. Force Device A to offline mode.
    1. On the Main menu, click System > High Availability > Redundancy.
    2. Click Force Offline. The BIG-IP device (Device A) changes to offline mode.
  2. Reactivate the software license.
    1. On the Main menu, click System > License.
    2. Click Re-activate.
    3. In the Activation Method area, select the Automatic (requires outbound connectivity) option.
    4. Click Next. The BIG-IP software license renews automatically.
    5. Click Continue.
  3. Install either the latest hotfix image, if available, or the new version software.
    Option Description
    Install the latest hotfix image
    1. On the Main menu, click System > Software Management > Hotfix List.
    2. In the Available Images area, select the check box for the hotfix image, and click Install. The Install Software Hotfix popup screen opens.
    3. From the Volume set name list, select the location of the new version software volume to install the hotfix image, and click Install.
      Important: In the Install Status list for the specified location, a progress bar indicates the status of the installation. Ensure that installation successfully completes, as indicated by the progress bar, before proceeding.
    Install the new version software
    1. On the Main menu, click System > Software Management > Image List.
    2. In the Available Images area, select the check box for the new version software image, and click Install. The Install Software Image popup screen opens.
    3. From the Volume set name list, select a location to install the image, and click Install.
      Important: In the Install Status list for the specified location, a progress bar indicates the status of the installation. Ensure that installation successfully completes, as indicated by the progress bar, before proceeding.
  4. Reboot the BIG-IP device (Device A) to the location of the installed new version version software image.
    Important: Once Device A reboots, if the BIG-IP system is configured to use a network HSM, you must reinstall network HSM client software on Device A to ensure that traffic groups using the network HSM function properly.
    1. On the Main menu, click System > Software Management > Boot Locations.
    2. In the Boot Location list, click the boot location of the installed new version software image.
    3. Click Activate. The BIG-IP device (Device A) reboots to the new version software boot location with traffic-group-1 and traffic-group-2 in standby state.
      Note: If the device appears to be taking a long time to reboot, do not cycle the power off and on. Instead, verify the status of the device by connecting to its serial console port. The device might be performing firmware upgrades.
  5. Synchronize the configuration.
    1. On the Main tab, click Device Management > Device Groups
    2. Click the name of a device group.
    3. On the menu bar, click Config Sync. The Config Sync screen appears, displaying the status for each member.
    4. As indicated by the Status Message, click one of the following buttons.
      • Synchronize TO Group
      • Synchronize FROM Group
The new version software is now installed on Device A, with traffic-group-2 in active state and traffic-group-1 in standby state.

Changing states of the traffic groups

Manually configuring active state traffic groups across devices within a device group involves forcing an active state traffic group on a device to standby state, and retargeting that active state traffic group to a different device. Completing these tasks results in active state traffic groups on the appropriate devices in a device group.

Viewing a list of traffic groups for a device

You can view a list of the traffic groups that you previously created on the device.
  1. On the Main tab, click Network > Traffic Groups.
  2. In the Name column, view the names of the traffic groups on the local device.

Forcing a traffic group to a standby state

This task causes the selected traffic group on the local device to switch to a standby state. By forcing the traffic group into a standby state, the traffic group becomes active on another device in the device group. For device groups with more than two members, you can choose the specific device to which the traffic group fails over. This task is optional.

  1. Log in to the device on which the traffic group is currently active.
  2. On the Main tab, click Network > Traffic Groups.
  3. In the Name column, locate the name of the traffic group that you want to run on the peer device.
  4. Select the check box to the left of the traffic group name. If the check box is unavailable, the traffic group is not active on the device to which you are currently logged in. Perform this task on the device on which the traffic group is active.
  5. Click Force to Standby. This displays target device options.
  6. Choose one of these actions:
    • If the device group has two members only, click Force to Standby. This displays the list of traffic groups for the device group and causes the local device to appear in the Next Active Device column.
    • If the device group has more than two members, then from the Target Device list, select a value and click Force to Standby.
The selected traffic group is now active on another device in the device group.

Verifying a BIG-IP system active-active upgrade

Prerequisite: You must complete a software upgrade of the BIG-IP active-active pair from version 10.x to the new version software.
When you have completed upgrading the BIG-IP active-active pair from version 10.x to the new version software, you should verify that the upgraded configuration is working properly. Perform the following steps to verify the new version software upgrade.
  1. Verify the Platform configuration for each device.
    1. On the Main menu, click System > Platform.
    2. For the Root Folder Device Group setting, verify that the device group is identical on the pair of devices.
    3. From the Root Folder Group list, verify that the correct traffic group (traffic-group-1) is selected.
  2. Verify the configuration for each device.
    1. On the Main menu, click Device Management > Devices.
    2. Verify the following information for the device and the peer device.
      • active-active status
      • device name
      • management IP address
      • hostname
      • TMOS version
    3. On the Main menu, click Device Management > Device Trust > Local Domain.
    4. Verify that the peer device is specified as a Peer Authority Device.
      Note: Ensure that all information for the peer device appears correctly and complete.
  3. Verify the traffic groups for each device.
    1. On the Main menu, click Network > Traffic Groups.
    2. Click traffic-group-1.
    3. If you configured MAC Masquerade addresses for VLANs on the version 10.x devices, verify that the traffic-group-1 includes an address in the MAC Masquerade Address field.
    4. Click traffic-group-2.
    5. If you configured MAC Masquerade addresses for VLANs on the version 10.x devices, verify that the traffic-group-2 includes an address in the MAC Masquerade Address field.
    6. Verify that the floating traffic group is correct.
    7. Verify that the failover objects are correct.
  4. Verify the Current ConfigSync State for each device.
    1. In the area at right of the F5 logo, click Sync Recommended.
    2. Do one of the following steps to synchronize the configuration.
      • Click Synchronize TO Group.
      • Click Synchronize FROM Group.

Implementation result

Your upgrade of the BIG-IP active-active pair from version 10.x to the new version software is now complete. The new version software configuration includes a device group with two devices (Device A and Device B) and two traffic groups (traffic-group-1 and traffic-group-2), with the first traffic group (traffic-group-1) on one device (Device A) in active state and the second traffic group (traffic-group-2) on the other device (Device B) in active state.

A new version software device group and two traffic groups in active state on different devices The new version software device group and two traffic groups in active state on different devices
Table of Contents

Was this resource helpful in solving your issue?




NOTE: Please do not provide personal information.



Incorrect answer. Please try again: Please enter the words to the right: Please enter the numbers you hear:

Additional Comments (optional)